cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list sequencelengths 1 1 | cve_primary_cwe stringclasses 164
values | url stringlengths 36 97 | cve_tags sequencelengths 1 5 ⌀ | domain stringclasses 1
value | issue_owner_repo sequencelengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2018-20652 | 2019-01-01T16:29:00.403 | An attempted excessive memory allocation was discovered in the function tinyexr::AllocateImage in tinyexr.h in tinyexr v0.9.5. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted input, which leads to an out-of-memory exception. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/syoyo/tinyexr/issues/104"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.co... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tinyexr_project:tinyexr:0.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6839BA33-4B4D-413F-8E81-0C4F9784EBBB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"770"
] | 770 | https://github.com/syoyo/tinyexr/issues/104 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"syoyo",
"tinyexr"
] | Hi, there.
I test the program at the master branch.
```
commit b3eb24bf635c0ed92f1080a1b269bc8271cbb919
Author: Syoyo Fujita <syoyo@lighttransport.com>
Date: Mon Dec 24 20:33:23 2018 +0900
Add IsEXR() API.
```
An Out of Memory problem was discovered in function tinyexr::AllocateImage in tinyexr.h. T... | Program crash due to Out-of-memory in function tinyexr::AllocateImage | https://api.github.com/repos/syoyo/tinyexr/issues/104/comments | 3 | 2018-12-31T13:56:35Z | 2018-12-31T15:25:33Z | https://github.com/syoyo/tinyexr/issues/104 | 394,984,060 | 104 | 0 |
CVE-2019-3500 | 2019-01-02T07:29:00.197 | aria2c in aria2 1.33.1, when --log is used, can store an HTTP Basic Authentication username and password in a file, which might allow local users to obtain sensitive information by reading this file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/aria2/aria2/issues/1329"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-an... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:aria2_project:aria2:1.33.1:*:*:*:*:*:*:*",
"matchCriteriaId": "96C8BA0F-F5C0-4768-A381-B61A776211B2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
"532"
] | 532 | https://github.com/aria2/aria2/issues/1329 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"aria2",
"aria2"
] | Hi Team,
I am using aria2 version 1.33.1 on 4.15.0-43-generic 46-Ubuntu.
1. It was observed that URL's which gets downloaded via `--log=` attribute stored sensitive information.
2. In combination with HTTP authentication a username and password can be part of the URL.
`aria2c --log=file https://user:passwd@ex... | Metadata and potential password leaks via --log= | https://api.github.com/repos/aria2/aria2/issues/1329/comments | 4 | 2019-01-01T12:52:33Z | 2019-01-05T00:33:48Z | https://github.com/aria2/aria2/issues/1329 | 395,080,684 | 1,329 | 1 |
CVE-2019-3501 | 2019-01-02T13:29:00.283 | The OUGC Awards plugin before 1.8.19 for MyBB allows XSS via a crafted award reason that is mishandled on the awards page or in a user profile. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Sama34/OUGC-Awards/issues/29"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Sama34/OUG... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ougc_awards_project:ougc_awards:*:*:*:*:*:mybb:*:*",
"matchCriteriaId": "5B7E7E8E-4508-44F9-861D-A5D9FEE232E7",
"versionEndExcluding": "1.8.19",
"versionEndIncluding": null,
... | [
"79"
] | 79 | https://github.com/Sama34/OUGC-Awards/issues/29 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Sama34",
"OUGC-Awards"
] | **Describe the bug**
Apparently custom reasons are not sanitized on output.
**To Reproduce**
Steps to reproduce the behavior:
1. Have a mod account level or higher.
2. Go to Manage Awards in ModCP.
3. Give an award to a user and input payload for reason.
```JS
<script>alert('XSS')</script>
```
4. Payload ex... | XSS in reason field. | https://api.github.com/repos/OUGC-Network/ougc-Awards/issues/29/comments | 1 | 2019-01-02T05:47:24Z | 2019-01-02T06:23:28Z | https://github.com/OUGC-Network/ougc-Awards/issues/29 | 395,154,317 | 29 | 2 |
CVE-2019-3573 | 2019-01-02T15:29:00.360 | In libsixel v1.8.2, there is an infinite loop in the function sixel_decode_raw_impl() in the file fromsixel.c, as demonstrated by sixel2png. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/TeamSeri0us/pocs/tree/master/libsixel"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/saitoha/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"835"
] | 835 | https://github.com/saitoha/libsixel/issues/83 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"saitoha",
"libsixel"
] | ./sixel2png [infinite_loop_poc1](https://github.com/TeamSeri0us/pocs/blob/master/libsixel/infinite_loop_poc1)
```
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────[ source:../../src/fromsixel.c+561 ]──... | two bugs in img2sixel and sixel2png | https://api.github.com/repos/saitoha/libsixel/issues/83/comments | 7 | 2019-01-02T08:08:21Z | 2019-12-14T21:01:47Z | https://github.com/saitoha/libsixel/issues/83 | 395,173,691 | 83 | 4 |
CVE-2018-20659 | 2019-01-02T17:29:00.220 | An issue was discovered in Bento4 1.5.1-627. The AP4_StcoAtom class in Core/Ap4StcoAtom.cpp has an attempted excessive memory allocation when called from AP4_AtomFactory::CreateAtomFromStream in Core/Ap4AtomFactory.cpp, as demonstrated by mp42hls. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/350"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https:... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*",
"matchCriteriaId": "F87642DF-B939-4195-A2AE-F0F1D39CD16D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"770"
] | 770 | https://github.com/axiomatic-systems/Bento4/issues/350 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | A crafted input will lead to Memory allocation failed in Ap4StcoAtom.cpp at Bento4 1.5.1-627
Triggered by
./mp42hls crash7.mp4
Poc
[crash7.mp4.zip](https://github.com/axiomatic-systems/Bento4/files/2718552/crash7.mp4.zip)
Bento4 Version 1.5.1-627
The ASAN information is as follows:
```
==10432==ERROR: Add... | Allocate for large amounts of memory failed in Ap4StcoAtom.cpp:81 at Bento4 1.5.1-627 when running mp42hls | https://api.github.com/repos/axiomatic-systems/Bento4/issues/350/comments | 2 | 2018-12-31T15:52:26Z | 2019-01-12T21:14:48Z | https://github.com/axiomatic-systems/Bento4/issues/350 | 394,998,583 | 350 | 5 |
CVE-2019-3577 | 2019-01-02T17:29:00.300 | An issue was discovered in Waimai Super Cms 20150505. web/Lib/Action/ProductAction.class.php allows blind SQL Injection via the id[0] parameter to the /product URI. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/caokang/waimai/issues/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/caokang/waimai/issues/9"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bijiadao:waimai_super_cms:20150505:*:*:*:*:*:*:*",
"matchCriteriaId": "8945479A-0C5E-4FC7-9D88-BC42E8EA0C3C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"89"
] | 89 | https://github.com/caokang/waimai/issues/9 | [
"Third Party Advisory"
] | github.com | [
"caokang",
"waimai"
] | There is a blind sql injection.
waimaiCMS is based on thinkphp3.1.3, vulnerable code in web/Lib/Action/ProductAction.class.php
```php
public function index(){
$data['fid']=I('id');//店铺分类
$Food=M('Food');
$fooditem=$Food->where($data)->find();
$this->assign('fooditem',$fooditem);
$thi... | There is a SQL Injection vulnerability | https://api.github.com/repos/caokang/waimai/issues/9/comments | 1 | 2019-01-02T16:02:56Z | 2019-01-03T03:00:52Z | https://github.com/caokang/waimai/issues/9 | 395,294,746 | 9 | 6 |
CVE-2018-14718 | 2019-01-02T18:29:00.310 | FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106601"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHBA-2019:0959"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD",
"versionEndExcluding": "2.6.7.3",
"versionEndIncluding": null,
"versio... | [
"502"
] | 502 | https://github.com/FasterXML/jackson-databind/issues/2097 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | This issue covers following CVEs related to polymorphic deserialization, gadgets:
* CVE-2018-14718: RCE with slf4j-ext jar
* CVE-2018-14719: RCE with blaze-ds-opt, -core jars
* CVE-2018-14720: exfiltration/XXE with only JDK classes (some JDK versions)
* CVE-2018-14721: exfiltration/SSRF with axis2-jaxws
Origin... | Block more classes from polymorphic deserialization (CVE-2018-14718 - CVE-2018-14721) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2097/comments | 11 | 2018-07-27T05:58:22Z | 2019-10-16T04:34:07Z | https://github.com/FasterXML/jackson-databind/issues/2097 | 345,100,313 | 2,097 | 7 |
CVE-2018-19360 | 2019-01-02T18:29:00.717 | FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107985"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHBA-2019:0959"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5128ECDA-6F9A-42AC-9063-CDFC4C256537",
"versionEndExcluding": null,
"versionEndIncluding": "2.6.7.2",
"versio... | [
"502"
] | 502 | https://github.com/FasterXML/jackson-databind/issues/2186 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | This issue covers following CVEs related to polymorphic deserialization, gadgets:
CVE-2018-19360 (axis2-transport-jms)
CVE-2018-19361 (openjpa)
CVE-2018-19362 (jboss-common-core)
See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the gen... | Block more classes from polymorphic deserialization (CVE-2018-19360, CVE-2018-19361, CVE-2018-19362) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2186/comments | 8 | 2018-11-18T23:39:02Z | 2020-07-31T17:29:54Z | https://github.com/FasterXML/jackson-databind/issues/2186 | 382,014,049 | 2,186 | 8 |
CVE-2019-3580 | 2019-01-03T01:29:00.490 | OpenRefine through 3.1 allows arbitrary file write because Directory Traversal can occur during the import of a crafted project file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/OpenRefine/OpenRefine/issues/1927"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrefine:openrefine:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A371C8E5-A486-40DE-8750-DAFA4D592354",
"versionEndExcluding": null,
"versionEndIncluding": "3.1",
"versionStartExc... | [
"22"
] | 22 | https://github.com/OpenRefine/OpenRefine/issues/1927 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"OpenRefine",
"OpenRefine"
] | **Describe the bug**
The import of a project is prone to a path traversal and thus an arbitrary file write.
**To Reproduce**
Steps to reproduce the behavior:
1. Download [payload.txt](https://github.com/OpenRefine/OpenRefine/files/2721399/payload.txt)
2. `gzip payload.txt`, `payload.txt.gz` is greated
3. Go to ... | Project import vulnerable to arbitrary file write | https://api.github.com/repos/OpenRefine/OpenRefine/issues/1927/comments | 3 | 2019-01-02T17:44:47Z | 2019-02-22T19:13:17Z | https://github.com/OpenRefine/OpenRefine/issues/1927 | 395,324,645 | 1,927 | 9 |
CVE-2018-20663 | 2019-01-03T19:29:01.633 | The Reporting Addon (aka Reports Addon) through 2019-01-02 for CUBA Platform through 6.10.x has Persistent XSS via the "Reports > Reports" name field. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cuba-platform/reports/issues/140"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:haulmont:cuba_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6B5878-0971-4E5A-A121-439A3E3F0DEA",
"versionEndExcluding": null,
"versionEndIncluding": "6.10.7",
"versionStar... | [
"79"
] | 79 | https://github.com/cuba-platform/reports/issues/140 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cuba-platform",
"reports"
] | <!--
Please use https://www.cuba-platform.com/discuss for discussion, support, and reporting problems about CUBA Studio.
This repository is only for issues of the Reporting addon.
When creating an issue, provide as much as possible of the following information:
-->
### Environment
- Platform version: 6.9.... | Permanent XSS attack through Report's Name field | https://api.github.com/repos/cuba-platform/reports/issues/140/comments | 5 | 2018-12-21T13:58:43Z | 2019-03-04T13:25:39Z | https://github.com/cuba-platform/reports/issues/140 | 393,468,080 | 140 | 10 |
CVE-2019-3575 | 2019-01-03T19:29:01.727 | Sqla_yaml_fixtures 0.9.1 allows local users to execute arbitrary python code via the fixture_text argument in sqla_yaml_fixtures.load. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/schettino72/sqla_yaml_fixtures/issues/20"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sqla_yaml_fixtures_project:sqla_yaml_fixtures:0.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7ED3C927-3CA7-415E-9574-6D108DC91EA7",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"94"
] | 94 | https://github.com/schettino72/sqla_yaml_fixtures/issues/20 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"schettino72",
"sqla_yaml_fixtures"
] | import sqla_yaml_fixtures
test_str ='!!python/object/apply:os.system ["dir"]'
sqla_yaml_fixtures.load('a','a',test_str)
Hi, there is a vulnerability in load methods in sqla_yaml_fixtures,please see PoC above. It can execute arbitrary python commands resulting in command execution. | sqla_yaml_fixtures.load method is vulnerable | https://api.github.com/repos/schettino72/sqla_yaml_fixtures/issues/20/comments | 2 | 2019-01-02T15:02:16Z | 2019-01-04T20:53:01Z | https://github.com/schettino72/sqla_yaml_fixtures/issues/20 | 395,274,955 | 20 | 11 |
CVE-2018-19600 | 2019-01-03T20:29:00.437 | Rhymix CMS 1.9.8.1 allows XSS via an index.php?module=admin&act=dispModuleAdminFileBox SVG upload. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rhymix/rhymix/issues/1088"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rhymix:rhymix:1.9.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D2833B50-FE4E-40C7-AB0B-3572D5C8A103",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"79"
] | 79 | https://github.com/rhymix/rhymix/issues/1088 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"rhymix",
"rhymix"
] | Affected software: Rhymix CMS 1.9.8.1
Type of vulnerability: XSS via SVG file upload.
Description: Rhymix CMS is prone to a Persistent Cross-Site Scripting attack that allows a malicious user to inject HTML or scripts that can access any cookies, session tokens, or other sensitive information retained by your bro... | XSS via SVG file upload in Rhymix CMS 1.9.8.1 | https://api.github.com/repos/rhymix/rhymix/issues/1088/comments | 7 | 2018-09-16T08:51:31Z | 2019-01-11T07:12:45Z | https://github.com/rhymix/rhymix/issues/1088 | 360,618,894 | 1,088 | 12 |
CVE-2018-19601 | 2019-01-03T20:29:00.500 | Rhymix CMS 1.9.8.1 allows SSRF via an index.php?module=admin&act=dispModuleAdminFileBox SVG upload. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rhymix/rhymix/issues/1089"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rhymix:rhymix:1.9.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D2833B50-FE4E-40C7-AB0B-3572D5C8A103",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"918"
] | 918 | https://github.com/rhymix/rhymix/issues/1089 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"rhymix",
"rhymix"
] | Affected software: Rhymix CMS 1.9.8.1
Type of vulnerability: SSRF via SVG file upload.
Description:
Discovered by: BreachLock
Website: https://www.breachlock.com
Author: Subodh Kumar
Description: SSRF as in Server Side Request Forgery is a vulnerability that allows an attacker to force server interfa... | SSRF via SVG file upload in Rhymix CMS 1.9.8.1 | https://api.github.com/repos/rhymix/rhymix/issues/1089/comments | 3 | 2018-09-16T08:56:44Z | 2019-01-11T07:13:30Z | https://github.com/rhymix/rhymix/issues/1089 | 360,619,275 | 1,089 | 13 |
CVE-2019-5310 | 2019-01-04T14:29:00.457 | YUNUCMS 1.1.8 has XSS in app/admin/controller/System.php because crafted data can be written to the sys.php file, as demonstrated by site_title in an admin/system/basic POST request. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/doublefast/yunucms/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yunucms:yunucms:1.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3219173C-4A6B-496B-A8BA-D0879257DF03",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"79"
] | 79 | https://github.com/doublefast/yunucms/issues/6 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"doublefast",
"yunucms"
] | There is an Stored Cross Site Scripting vulnerability in your latest version of the CMS v1.1.8
Download link: "http://img.yunucms.com/o_1cvnmdq4igqv3i713iq183fu7qa.zip?attname="
In the /YUNUCMSv1.1.8/app/admin/controller/System.php
The judgment code of the basic settings page is:
 function:
.
Unfortunately, the vulnerability is still present in version `3.3.0`, see the image below.
 to escape value. But some variables do not use the function db_escape().
**environment** : docker mattrayner/lamp:latest-1604
### 0x00 Description
includes/db/class.reflines_db.inc:156
If I set parameter ... | SQL Injection | https://api.github.com/repos/FrontAccountingERP/FA/issues/38/comments | 2 | 2019-01-07T11:10:06Z | 2020-07-13T11:48:08Z | https://github.com/FrontAccountingERP/FA/issues/38 | 396,445,072 | 38 | 17 |
CVE-2016-10735 | 2019-01-09T05:29:00.883 | In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHBA-2019:1076"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHBA-2019:1570"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8497B424-E8CC-4FEF-844B-FE33F2C18E6E",
"versionEndExcluding": "3.4.0",
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/twbs/bootstrap/issues/20184 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"twbs",
"bootstrap"
] | The data-target attribute is vulnerable to Cross-Site Scripting attacks:
``` html
<script src="https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script>
<script src="http://maxcdn.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script>
<button data-toggle="collapse" data-target="<img src=x on... | XSS in data-target attribute | https://api.github.com/repos/twbs/bootstrap/issues/20184/comments | 44 | 2016-06-27T15:33:54Z | 2023-08-16T13:52:10Z | https://github.com/twbs/bootstrap/issues/20184 | 162,481,500 | 20,184 | 18 |
CVE-2016-10735 | 2019-01-09T05:29:00.883 | In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHBA-2019:1076"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHBA-2019:1570"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8497B424-E8CC-4FEF-844B-FE33F2C18E6E",
"versionEndExcluding": "3.4.0",
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"twbs",
"bootstrap"
] | Github considers Bootstrap 3.4.0 an insecure dependency via its [security vulnerability alerts tool](https://help.github.com/articles/about-security-alerts-for-vulnerable-dependencies). It points to the [NVD CVE-2018-14041](https://nvd.nist.gov/vuln/detail/CVE-2018-14041) page, which shows that only >4.1.2 is secure. I... | Github considers bootstrap 3.4.0 as insecure | https://api.github.com/repos/twbs/bootstrap/issues/27915/comments | 19 | 2018-12-23T16:23:10Z | 2019-02-04T07:45:21Z | https://github.com/twbs/bootstrap/issues/27915 | 393,762,774 | 27,915 | 19 |
CVE-2018-20676 | 2019-01-09T05:29:01.287 | In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHBA-2019:1076"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHBA-2019:1570"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5E9597E-65BB-4E8A-B0E8-467D2903511B",
"versionEndExcluding": "3.4.0",
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/twbs/bootstrap/issues/27044 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"twbs",
"bootstrap"
] | found in bootstrap 3.3.7
`<a href="#" data-toggle="tooltip" data-viewport="<img src=1 onerror=alert(123) />" title="Hooray!">Hover over me</a>`
https://jsbin.com/qipirurise/edit?html,output
Win 7 x64
Chrome 67.0.3396.99
Firefox 61.0.1 (64-Bit) | tooltip - XSS on data-viewport attribute | https://api.github.com/repos/twbs/bootstrap/issues/27044/comments | 0 | 2018-08-10T09:04:03Z | 2018-08-13T16:10:06Z | https://github.com/twbs/bootstrap/issues/27044 | 349,433,528 | 27,044 | 20 |
CVE-2018-20676 | 2019-01-09T05:29:01.287 | In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHBA-2019:1076"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHBA-2019:1570"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5E9597E-65BB-4E8A-B0E8-467D2903511B",
"versionEndExcluding": "3.4.0",
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628 | [
"Third Party Advisory"
] | github.com | [
"twbs",
"bootstrap"
] | Github considers Bootstrap 3.4.0 an insecure dependency via its [security vulnerability alerts tool](https://help.github.com/articles/about-security-alerts-for-vulnerable-dependencies). It points to the [NVD CVE-2018-14041](https://nvd.nist.gov/vuln/detail/CVE-2018-14041) page, which shows that only >4.1.2 is secure. I... | Github considers bootstrap 3.4.0 as insecure | https://api.github.com/repos/twbs/bootstrap/issues/27915/comments | 19 | 2018-12-23T16:23:10Z | 2019-02-04T07:45:21Z | https://github.com/twbs/bootstrap/issues/27915 | 393,762,774 | 27,915 | 21 |
CVE-2018-20677 | 2019-01-09T05:29:01.397 | In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHBA-2019:1076"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHBA-2019:1570"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5E9597E-65BB-4E8A-B0E8-467D2903511B",
"versionEndExcluding": "3.4.0",
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/twbs/bootstrap/issues/27045 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"twbs",
"bootstrap"
] | found in bootstrap 3.3.7
`$('.js-affixed-element-top').affix({
offset: {
top: $('.js-page-header').outerHeight(true) - 10
, bottom: $('.js-footer').outerHeight(true) + 10
},
target: '<img src=x onerror=alert(0)>'
})`
https://jsbin.com/palokaxina/edit?html,output
Win 7 x64
Chrome ... | affix - XSS on target config | https://api.github.com/repos/twbs/bootstrap/issues/27045/comments | 0 | 2018-08-10T09:07:08Z | 2018-08-13T16:10:22Z | https://github.com/twbs/bootstrap/issues/27045 | 349,434,502 | 27,045 | 22 |
CVE-2018-20680 | 2019-01-09T17:29:00.247 | Frog CMS 0.9.5 has XSS in the admin/?/page/edit/1 body field. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/philippe/FrogCMS/issues/22"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:frog_cms_project:frog_cms:0.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BC916FD5-B582-4EC0-AD00-BD72FCF82BF3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"79"
] | 79 | https://github.com/philippe/FrogCMS/issues/22 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"philippe",
"FrogCMS"
] | ## Frog CMS 0.9.5 has xss in /FrogCMS/admin/?/page/edit/1 body field
### 1.login
### 2.Input exp `<img src=1 onerror=alert(/du/)>`

### 3.save and close
### 4.open http://127.0.0.1/FrogCMS/index.php
![ima... | Frog CMS 0.9.5 has xss in /FrogCMS/admin/?/page/edit/1 body field | https://api.github.com/repos/philippe/FrogCMS/issues/22/comments | 0 | 2018-12-31T07:53:42Z | 2018-12-31T07:53:42Z | https://github.com/philippe/FrogCMS/issues/22 | 394,943,057 | 22 | 23 |
CVE-2018-20681 | 2019-01-09T23:29:05.230 | mate-screensaver before 1.20.2 in MATE Desktop Environment allows physically proximate attackers to view screen content and possibly control applications. By unplugging and re-plugging or power-cycling external output devices (such as additionally attached graphical outputs via HDMI, VGA, DVI, etc.) the content of a sc... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/mate-desktop/mate-screensaver/issues/152"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mate-desktop:mate-screensaver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "795C0DDF-0421-4B68-9B1D-E054518D0BF0",
"versionEndExcluding": "1.20.2",
"versionEndIncluding": null,
"vers... | [
"200"
] | 200 | https://github.com/mate-desktop/mate-screensaver/issues/152 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"mate-desktop",
"mate-screensaver"
] | #### Expected behaviour
mate-screensaver should keep the user's session locked until valid authentication has taken place (password entered, etc.)
#### Actual behaviour & steps to reproduce the behaviour
Do the following:
1. Have two display-port attached displays on a fresh install of Fedora 27. Mine are in por... | mate-screensaver does not maintain user lockout / screen lock under certain conditions | https://api.github.com/repos/mate-desktop/mate-screensaver/issues/152/comments | 9 | 2018-04-10T19:53:17Z | 2019-01-10T14:04:12Z | https://github.com/mate-desktop/mate-screensaver/issues/152 | 313,066,344 | 152 | 24 |
CVE-2018-20681 | 2019-01-09T23:29:05.230 | mate-screensaver before 1.20.2 in MATE Desktop Environment allows physically proximate attackers to view screen content and possibly control applications. By unplugging and re-plugging or power-cycling external output devices (such as additionally attached graphical outputs via HDMI, VGA, DVI, etc.) the content of a sc... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/mate-desktop/mate-screensaver/issues/152"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mate-desktop:mate-screensaver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "795C0DDF-0421-4B68-9B1D-E054518D0BF0",
"versionEndExcluding": "1.20.2",
"versionEndIncluding": null,
"vers... | [
"200"
] | 200 | https://github.com/mate-desktop/mate-screensaver/issues/155 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"mate-desktop",
"mate-screensaver"
] | #### Expected behaviour
Lock Screen
Turn off monitor (either by power management putting it to sleep, or by pressing power button)
Turn monitor on
Start typing
Expect to see lock screen on monitor
#### Actual behaviour
Lock Screen
Turn off monitor
Turn monitor on
Start typing
Expect to see lock screen on m... | mate-screensaver screen lock can be bypassed by power cycling monitor [$110] | https://api.github.com/repos/mate-desktop/mate-screensaver/issues/155/comments | 60 | 2018-05-01T20:44:51Z | 2021-07-21T13:48:18Z | https://github.com/mate-desktop/mate-screensaver/issues/155 | 319,321,909 | 155 | 25 |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 4