Dataset Viewer
Auto-converted to Parquet Duplicate
cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
sequencelengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
sequencelengths
1
5
domain
stringclasses
1 value
issue_owner_repo
sequencelengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2018-20652
2019-01-01T16:29:00.403
An attempted excessive memory allocation was discovered in the function tinyexr::AllocateImage in tinyexr.h in tinyexr v0.9.5. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted input, which leads to an out-of-memory exception.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/syoyo/tinyexr/issues/104" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tinyexr_project:tinyexr:0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "6839BA33-4B4D-413F-8E81-0C4F9784EBBB", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "770" ]
770
https://github.com/syoyo/tinyexr/issues/104
[ "Exploit", "Third Party Advisory" ]
github.com
[ "syoyo", "tinyexr" ]
Hi, there. I test the program at the master branch. ``` commit b3eb24bf635c0ed92f1080a1b269bc8271cbb919 Author: Syoyo Fujita <syoyo@lighttransport.com> Date: Mon Dec 24 20:33:23 2018 +0900 Add IsEXR() API. ``` An Out of Memory problem was discovered in function tinyexr::AllocateImage in tinyexr.h. T...
Program crash due to Out-of-memory in function tinyexr::AllocateImage
https://api.github.com/repos/syoyo/tinyexr/issues/104/comments
3
2018-12-31T13:56:35Z
2018-12-31T15:25:33Z
https://github.com/syoyo/tinyexr/issues/104
394,984,060
104
0
CVE-2019-3500
2019-01-02T07:29:00.197
aria2c in aria2 1.33.1, when --log is used, can store an HTTP Basic Authentication username and password in a file, which might allow local users to obtain sensitive information by reading this file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/aria2/aria2/issues/1329" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:aria2_project:aria2:1.33.1:*:*:*:*:*:*:*", "matchCriteriaId": "96C8BA0F-F5C0-4768-A381-B61A776211B2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "532" ]
532
https://github.com/aria2/aria2/issues/1329
[ "Patch", "Third Party Advisory" ]
github.com
[ "aria2", "aria2" ]
Hi Team, I am using aria2 version 1.33.1 on 4.15.0-43-generic 46-Ubuntu. 1. It was observed that URL's which gets downloaded via `--log=` attribute stored sensitive information. 2. In combination with HTTP authentication a username and password can be part of the URL. `aria2c --log=file https://user:passwd@ex...
Metadata and potential password leaks via --log=
https://api.github.com/repos/aria2/aria2/issues/1329/comments
4
2019-01-01T12:52:33Z
2019-01-05T00:33:48Z
https://github.com/aria2/aria2/issues/1329
395,080,684
1,329
1
CVE-2019-3501
2019-01-02T13:29:00.283
The OUGC Awards plugin before 1.8.19 for MyBB allows XSS via a crafted award reason that is mishandled on the awards page or in a user profile.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Sama34/OUGC-Awards/issues/29" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Sama34/OUG...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ougc_awards_project:ougc_awards:*:*:*:*:*:mybb:*:*", "matchCriteriaId": "5B7E7E8E-4508-44F9-861D-A5D9FEE232E7", "versionEndExcluding": "1.8.19", "versionEndIncluding": null, ...
[ "79" ]
79
https://github.com/Sama34/OUGC-Awards/issues/29
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Sama34", "OUGC-Awards" ]
**Describe the bug** Apparently custom reasons are not sanitized on output. **To Reproduce** Steps to reproduce the behavior: 1. Have a mod account level or higher. 2. Go to Manage Awards in ModCP. 3. Give an award to a user and input payload for reason. ```JS <script>alert('XSS')</script> ``` 4. Payload ex...
XSS in reason field.
https://api.github.com/repos/OUGC-Network/ougc-Awards/issues/29/comments
1
2019-01-02T05:47:24Z
2019-01-02T06:23:28Z
https://github.com/OUGC-Network/ougc-Awards/issues/29
395,154,317
29
2
CVE-2019-3573
2019-01-02T15:29:00.360
In libsixel v1.8.2, there is an infinite loop in the function sixel_decode_raw_impl() in the file fromsixel.c, as demonstrated by sixel2png.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/TeamSeri0us/pocs/tree/master/libsixel" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saitoha/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "835" ]
835
https://github.com/saitoha/libsixel/issues/83
[ "Exploit", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
./sixel2png [infinite_loop_poc1](https://github.com/TeamSeri0us/pocs/blob/master/libsixel/infinite_loop_poc1) ``` ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────[ source:../../src/fromsixel.c+561 ]──...
two bugs in img2sixel and sixel2png
https://api.github.com/repos/saitoha/libsixel/issues/83/comments
7
2019-01-02T08:08:21Z
2019-12-14T21:01:47Z
https://github.com/saitoha/libsixel/issues/83
395,173,691
83
4
CVE-2018-20659
2019-01-02T17:29:00.220
An issue was discovered in Bento4 1.5.1-627. The AP4_StcoAtom class in Core/Ap4StcoAtom.cpp has an attempted excessive memory allocation when called from AP4_AtomFactory::CreateAtomFromStream in Core/Ap4AtomFactory.cpp, as demonstrated by mp42hls.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/350" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*", "matchCriteriaId": "F87642DF-B939-4195-A2AE-F0F1D39CD16D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "770" ]
770
https://github.com/axiomatic-systems/Bento4/issues/350
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
A crafted input will lead to Memory allocation failed in Ap4StcoAtom.cpp at Bento4 1.5.1-627 Triggered by ./mp42hls crash7.mp4 Poc [crash7.mp4.zip](https://github.com/axiomatic-systems/Bento4/files/2718552/crash7.mp4.zip) Bento4 Version 1.5.1-627 The ASAN information is as follows: ``` ==10432==ERROR: Add...
Allocate for large amounts of memory failed in Ap4StcoAtom.cpp:81 at Bento4 1.5.1-627 when running mp42hls
https://api.github.com/repos/axiomatic-systems/Bento4/issues/350/comments
2
2018-12-31T15:52:26Z
2019-01-12T21:14:48Z
https://github.com/axiomatic-systems/Bento4/issues/350
394,998,583
350
5
CVE-2019-3577
2019-01-02T17:29:00.300
An issue was discovered in Waimai Super Cms 20150505. web/Lib/Action/ProductAction.class.php allows blind SQL Injection via the id[0] parameter to the /product URI.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/caokang/waimai/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/caokang/waimai/issues/9" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bijiadao:waimai_super_cms:20150505:*:*:*:*:*:*:*", "matchCriteriaId": "8945479A-0C5E-4FC7-9D88-BC42E8EA0C3C", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "89" ]
89
https://github.com/caokang/waimai/issues/9
[ "Third Party Advisory" ]
github.com
[ "caokang", "waimai" ]
There is a blind sql injection. waimaiCMS is based on thinkphp3.1.3, vulnerable code in web/Lib/Action/ProductAction.class.php ```php public function index(){ $data['fid']=I('id');//店铺分类 $Food=M('Food'); $fooditem=$Food->where($data)->find(); $this->assign('fooditem',$fooditem); $thi...
There is a SQL Injection vulnerability
https://api.github.com/repos/caokang/waimai/issues/9/comments
1
2019-01-02T16:02:56Z
2019-01-03T03:00:52Z
https://github.com/caokang/waimai/issues/9
395,294,746
9
6
CVE-2018-14718
2019-01-02T18:29:00.310
FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106601" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:0959" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2097
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
This issue covers following CVEs related to polymorphic deserialization, gadgets: * CVE-2018-14718: RCE with slf4j-ext jar * CVE-2018-14719: RCE with blaze-ds-opt, -core jars * CVE-2018-14720: exfiltration/XXE with only JDK classes (some JDK versions) * CVE-2018-14721: exfiltration/SSRF with axis2-jaxws Origin...
Block more classes from polymorphic deserialization (CVE-2018-14718 - CVE-2018-14721)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2097/comments
11
2018-07-27T05:58:22Z
2019-10-16T04:34:07Z
https://github.com/FasterXML/jackson-databind/issues/2097
345,100,313
2,097
7
CVE-2018-19360
2019-01-02T18:29:00.717
FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107985" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:0959" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "5128ECDA-6F9A-42AC-9063-CDFC4C256537", "versionEndExcluding": null, "versionEndIncluding": "2.6.7.2", "versio...
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2186
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
This issue covers following CVEs related to polymorphic deserialization, gadgets: CVE-2018-19360 (axis2-transport-jms) CVE-2018-19361 (openjpa) CVE-2018-19362 (jboss-common-core) See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the gen...
Block more classes from polymorphic deserialization (CVE-2018-19360, CVE-2018-19361, CVE-2018-19362)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2186/comments
8
2018-11-18T23:39:02Z
2020-07-31T17:29:54Z
https://github.com/FasterXML/jackson-databind/issues/2186
382,014,049
2,186
8
CVE-2019-3580
2019-01-03T01:29:00.490
OpenRefine through 3.1 allows arbitrary file write because Directory Traversal can occur during the import of a crafted project file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OpenRefine/OpenRefine/issues/1927" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrefine:openrefine:*:*:*:*:*:*:*:*", "matchCriteriaId": "A371C8E5-A486-40DE-8750-DAFA4D592354", "versionEndExcluding": null, "versionEndIncluding": "3.1", "versionStartExc...
[ "22" ]
22
https://github.com/OpenRefine/OpenRefine/issues/1927
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OpenRefine", "OpenRefine" ]
**Describe the bug** The import of a project is prone to a path traversal and thus an arbitrary file write. **To Reproduce** Steps to reproduce the behavior: 1. Download [payload.txt](https://github.com/OpenRefine/OpenRefine/files/2721399/payload.txt) 2. `gzip payload.txt`, `payload.txt.gz` is greated 3. Go to ...
Project import vulnerable to arbitrary file write
https://api.github.com/repos/OpenRefine/OpenRefine/issues/1927/comments
3
2019-01-02T17:44:47Z
2019-02-22T19:13:17Z
https://github.com/OpenRefine/OpenRefine/issues/1927
395,324,645
1,927
9
CVE-2018-20663
2019-01-03T19:29:01.633
The Reporting Addon (aka Reports Addon) through 2019-01-02 for CUBA Platform through 6.10.x has Persistent XSS via the "Reports > Reports" name field.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cuba-platform/reports/issues/140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haulmont:cuba_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F6B5878-0971-4E5A-A121-439A3E3F0DEA", "versionEndExcluding": null, "versionEndIncluding": "6.10.7", "versionStar...
[ "79" ]
79
https://github.com/cuba-platform/reports/issues/140
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cuba-platform", "reports" ]
<!-- Please use https://www.cuba-platform.com/discuss for discussion, support, and reporting problems about CUBA Studio. This repository is only for issues of the Reporting addon. When creating an issue, provide as much as possible of the following information: --> ### Environment - Platform version: 6.9....
Permanent XSS attack through Report's Name field
https://api.github.com/repos/cuba-platform/reports/issues/140/comments
5
2018-12-21T13:58:43Z
2019-03-04T13:25:39Z
https://github.com/cuba-platform/reports/issues/140
393,468,080
140
10
CVE-2019-3575
2019-01-03T19:29:01.727
Sqla_yaml_fixtures 0.9.1 allows local users to execute arbitrary python code via the fixture_text argument in sqla_yaml_fixtures.load.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/schettino72/sqla_yaml_fixtures/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sqla_yaml_fixtures_project:sqla_yaml_fixtures:0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "7ED3C927-3CA7-415E-9574-6D108DC91EA7", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "94" ]
94
https://github.com/schettino72/sqla_yaml_fixtures/issues/20
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "schettino72", "sqla_yaml_fixtures" ]
import sqla_yaml_fixtures test_str ='!!python/object/apply:os.system ["dir"]' sqla_yaml_fixtures.load('a','a',test_str) Hi, there is a vulnerability in load methods in sqla_yaml_fixtures,please see PoC above. It can execute arbitrary python commands resulting in command execution.
sqla_yaml_fixtures.load method is vulnerable
https://api.github.com/repos/schettino72/sqla_yaml_fixtures/issues/20/comments
2
2019-01-02T15:02:16Z
2019-01-04T20:53:01Z
https://github.com/schettino72/sqla_yaml_fixtures/issues/20
395,274,955
20
11
CVE-2018-19600
2019-01-03T20:29:00.437
Rhymix CMS 1.9.8.1 allows XSS via an index.php?module=admin&act=dispModuleAdminFileBox SVG upload.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/rhymix/rhymix/issues/1088" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rhymix:rhymix:1.9.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "D2833B50-FE4E-40C7-AB0B-3572D5C8A103", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/rhymix/rhymix/issues/1088
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "rhymix", "rhymix" ]
Affected software: Rhymix CMS 1.9.8.1 Type of vulnerability: XSS via SVG file upload. Description: Rhymix CMS is prone to a Persistent Cross-Site Scripting attack that allows a malicious user to inject HTML or scripts that can access any cookies, session tokens, or other sensitive information retained by your bro...
XSS via SVG file upload in Rhymix CMS 1.9.8.1
https://api.github.com/repos/rhymix/rhymix/issues/1088/comments
7
2018-09-16T08:51:31Z
2019-01-11T07:12:45Z
https://github.com/rhymix/rhymix/issues/1088
360,618,894
1,088
12
CVE-2018-19601
2019-01-03T20:29:00.500
Rhymix CMS 1.9.8.1 allows SSRF via an index.php?module=admin&act=dispModuleAdminFileBox SVG upload.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/rhymix/rhymix/issues/1089" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rhymix:rhymix:1.9.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "D2833B50-FE4E-40C7-AB0B-3572D5C8A103", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "918" ]
918
https://github.com/rhymix/rhymix/issues/1089
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "rhymix", "rhymix" ]
Affected software: Rhymix CMS 1.9.8.1 Type of vulnerability: SSRF via SVG file upload. Description: Discovered by: BreachLock Website: https://www.breachlock.com Author: Subodh Kumar Description: SSRF as in Server Side Request Forgery is a vulnerability that allows an attacker to force server interfa...
SSRF via SVG file upload in Rhymix CMS 1.9.8.1
https://api.github.com/repos/rhymix/rhymix/issues/1089/comments
3
2018-09-16T08:56:44Z
2019-01-11T07:13:30Z
https://github.com/rhymix/rhymix/issues/1089
360,619,275
1,089
13
CVE-2019-5310
2019-01-04T14:29:00.457
YUNUCMS 1.1.8 has XSS in app/admin/controller/System.php because crafted data can be written to the sys.php file, as demonstrated by site_title in an admin/system/basic POST request.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/doublefast/yunucms/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yunucms:yunucms:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3219173C-4A6B-496B-A8BA-D0879257DF03", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/doublefast/yunucms/issues/6
[ "Exploit", "Third Party Advisory" ]
github.com
[ "doublefast", "yunucms" ]
There is an Stored Cross Site Scripting vulnerability in your latest version of the CMS v1.1.8 Download link: "http://img.yunucms.com/o_1cvnmdq4igqv3i713iq183fu7qa.zip?attname=" In the /YUNUCMSv1.1.8/app/admin/controller/System.php The judgment code of the basic settings page is: ![image](https://user-images.git...
Bug: V1.1.8 Stored Cross Site Scripting Vulnerability
https://api.github.com/repos/doublefast/yunucms/issues/6/comments
0
2019-01-04T06:48:58Z
2019-01-04T06:48:58Z
https://github.com/doublefast/yunucms/issues/6
395,824,686
6
14
CVE-2019-5311
2019-01-04T15:29:00.563
An issue was discovered in YUNUCMS V1.1.8. app/index/controller/Show.php has an XSS vulnerability via the index.php/index/show/index cw parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/doublefast/yunucms/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yunucms:yunucms:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3219173C-4A6B-496B-A8BA-D0879257DF03", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/doublefast/yunucms/issues/5
[ "Exploit", "Third Party Advisory" ]
github.com
[ "doublefast", "yunucms" ]
There is an xss vulnerability in your latest version of the CMS v1.1.8 Download link: "http://img.yunucms.com/o_1cvnmdq4igqv3i713iq183fu7qa.zip?attname=" 1. In the YUNUCMSv1.1.8/app/index/controller/Show.php , No filtering to cw in the index( ) function: ![image](https://user-images.githubusercontent.com/15666994...
Bug: V1.1.8 Cross Site Scripting Vulnerability
https://api.github.com/repos/doublefast/yunucms/issues/5/comments
0
2019-01-04T03:42:16Z
2019-01-04T03:42:16Z
https://github.com/doublefast/yunucms/issues/5
395,800,185
5
15
CVE-2019-5312
2019-01-04T16:29:00.307
An issue was discovered in weixin-java-tools v3.3.0. There is an XXE vulnerability in the getXmlDoc method of the BaseWxPayResult.java file. NOTE: this issue exists because of an incomplete fix for CVE-2018-20318.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/Wechat-Group/WxJava/issues/903" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wxjava_project:wxjava:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "63AA5095-3A9E-42DC-9A13-2E6F14BA0B09", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "611" ]
611
https://github.com/Wechat-Group/WxJava/issues/903
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "Wechat-Group", "WxJava" ]
Hello, i have tested the fix for the XXE vulnerability of the issue [889](https://github.com/Wechat-Group/WxJava/issues/889). Unfortunately, the vulnerability is still present in version `3.3.0`, see the image below. ![image](https://user-images.githubusercontent.com/5180740/50690962-9a50ba80-102f-11e9-8fea-9...
XXE Vulnerability
https://api.github.com/repos/binarywang/WxJava/issues/903/comments
2
2019-01-04T14:04:31Z
2019-01-12T13:21:37Z
https://github.com/binarywang/WxJava/issues/903
395,936,486
903
16
CVE-2019-5720
2019-01-08T10:29:00.193
includes/db/class.reflines_db.inc in FrontAccounting 2.4.6 contains a SQL Injection vulnerability in the reference field that can allow the attacker to grab the entire database of the application via the void_transaction.php filterType parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/FrontAccountingERP/FA/issues/38" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:frontaccounting:frontaccounting:2.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "8E2A02E8-987B-46A5-A775-30F0B6DE55E7", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
[ "89" ]
89
https://github.com/FrontAccountingERP/FA/issues/38
[ "Exploit", "Third Party Advisory" ]
github.com
[ "FrontAccountingERP", "FA" ]
> Sorry,This is my first time to chat with people in English. Frontaccounting is using function db_escape() to escape value. But some variables do not use the function db_escape(). **environment** : docker mattrayner/lamp:latest-1604 ### 0x00 Description includes/db/class.reflines_db.inc:156 If I set parameter ...
SQL Injection
https://api.github.com/repos/FrontAccountingERP/FA/issues/38/comments
2
2019-01-07T11:10:06Z
2020-07-13T11:48:08Z
https://github.com/FrontAccountingERP/FA/issues/38
396,445,072
38
17
CVE-2016-10735
2019-01-09T05:29:00.883
In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHBA-2019:1076" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHBA-2019:1570" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*", "matchCriteriaId": "8497B424-E8CC-4FEF-844B-FE33F2C18E6E", "versionEndExcluding": "3.4.0", "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/twbs/bootstrap/issues/20184
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "twbs", "bootstrap" ]
The data-target attribute is vulnerable to Cross-Site Scripting attacks: ``` html <script src="https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script> <script src="http://maxcdn.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script> <button data-toggle="collapse" data-target="<img src=x on...
XSS in data-target attribute
https://api.github.com/repos/twbs/bootstrap/issues/20184/comments
44
2016-06-27T15:33:54Z
2023-08-16T13:52:10Z
https://github.com/twbs/bootstrap/issues/20184
162,481,500
20,184
18
CVE-2016-10735
2019-01-09T05:29:00.883
In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHBA-2019:1076" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHBA-2019:1570" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*", "matchCriteriaId": "8497B424-E8CC-4FEF-844B-FE33F2C18E6E", "versionEndExcluding": "3.4.0", "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "twbs", "bootstrap" ]
Github considers Bootstrap 3.4.0 an insecure dependency via its [security vulnerability alerts tool](https://help.github.com/articles/about-security-alerts-for-vulnerable-dependencies). It points to the [NVD CVE-2018-14041](https://nvd.nist.gov/vuln/detail/CVE-2018-14041) page, which shows that only >4.1.2 is secure. I...
Github considers bootstrap 3.4.0 as insecure
https://api.github.com/repos/twbs/bootstrap/issues/27915/comments
19
2018-12-23T16:23:10Z
2019-02-04T07:45:21Z
https://github.com/twbs/bootstrap/issues/27915
393,762,774
27,915
19
CVE-2018-20676
2019-01-09T05:29:01.287
In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHBA-2019:1076" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHBA-2019:1570" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5E9597E-65BB-4E8A-B0E8-467D2903511B", "versionEndExcluding": "3.4.0", "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/twbs/bootstrap/issues/27044
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "twbs", "bootstrap" ]
found in bootstrap 3.3.7 `<a href="#" data-toggle="tooltip" data-viewport="<img src=1 onerror=alert(123) />" title="Hooray!">Hover over me</a>` https://jsbin.com/qipirurise/edit?html,output Win 7 x64 Chrome 67.0.3396.99 Firefox 61.0.1 (64-Bit)
tooltip - XSS on data-viewport attribute
https://api.github.com/repos/twbs/bootstrap/issues/27044/comments
0
2018-08-10T09:04:03Z
2018-08-13T16:10:06Z
https://github.com/twbs/bootstrap/issues/27044
349,433,528
27,044
20
CVE-2018-20676
2019-01-09T05:29:01.287
In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHBA-2019:1076" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHBA-2019:1570" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5E9597E-65BB-4E8A-B0E8-467D2903511B", "versionEndExcluding": "3.4.0", "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628
[ "Third Party Advisory" ]
github.com
[ "twbs", "bootstrap" ]
Github considers Bootstrap 3.4.0 an insecure dependency via its [security vulnerability alerts tool](https://help.github.com/articles/about-security-alerts-for-vulnerable-dependencies). It points to the [NVD CVE-2018-14041](https://nvd.nist.gov/vuln/detail/CVE-2018-14041) page, which shows that only >4.1.2 is secure. I...
Github considers bootstrap 3.4.0 as insecure
https://api.github.com/repos/twbs/bootstrap/issues/27915/comments
19
2018-12-23T16:23:10Z
2019-02-04T07:45:21Z
https://github.com/twbs/bootstrap/issues/27915
393,762,774
27,915
21
CVE-2018-20677
2019-01-09T05:29:01.397
In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHBA-2019:1076" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHBA-2019:1570" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5E9597E-65BB-4E8A-B0E8-467D2903511B", "versionEndExcluding": "3.4.0", "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/twbs/bootstrap/issues/27045
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "twbs", "bootstrap" ]
found in bootstrap 3.3.7 `$('.js-affixed-element-top').affix({ offset: { top: $('.js-page-header').outerHeight(true) - 10 , bottom: $('.js-footer').outerHeight(true) + 10 }, target: '<img src=x onerror=alert(0)>' })` https://jsbin.com/palokaxina/edit?html,output Win 7 x64 Chrome ...
affix - XSS on target config
https://api.github.com/repos/twbs/bootstrap/issues/27045/comments
0
2018-08-10T09:07:08Z
2018-08-13T16:10:22Z
https://github.com/twbs/bootstrap/issues/27045
349,434,502
27,045
22
CVE-2018-20680
2019-01-09T17:29:00.247
Frog CMS 0.9.5 has XSS in the admin/?/page/edit/1 body field.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/philippe/FrogCMS/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:frog_cms_project:frog_cms:0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "BC916FD5-B582-4EC0-AD00-BD72FCF82BF3", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "79" ]
79
https://github.com/philippe/FrogCMS/issues/22
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "philippe", "FrogCMS" ]
## Frog CMS 0.9.5 has xss in /FrogCMS/admin/?/page/edit/1 body field ### 1.login ### 2.Input exp `<img src=1 onerror=alert(/du/)>` ![image](https://user-images.githubusercontent.com/30485210/50556394-8c3f2900-0d13-11e9-8346-ced58cab4346.png) ### 3.save and close ### 4.open http://127.0.0.1/FrogCMS/index.php ![ima...
Frog CMS 0.9.5 has xss in /FrogCMS/admin/?/page/edit/1 body field
https://api.github.com/repos/philippe/FrogCMS/issues/22/comments
0
2018-12-31T07:53:42Z
2018-12-31T07:53:42Z
https://github.com/philippe/FrogCMS/issues/22
394,943,057
22
23
CVE-2018-20681
2019-01-09T23:29:05.230
mate-screensaver before 1.20.2 in MATE Desktop Environment allows physically proximate attackers to view screen content and possibly control applications. By unplugging and re-plugging or power-cycling external output devices (such as additionally attached graphical outputs via HDMI, VGA, DVI, etc.) the content of a sc...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/mate-desktop/mate-screensaver/issues/152" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mate-desktop:mate-screensaver:*:*:*:*:*:*:*:*", "matchCriteriaId": "795C0DDF-0421-4B68-9B1D-E054518D0BF0", "versionEndExcluding": "1.20.2", "versionEndIncluding": null, "vers...
[ "200" ]
200
https://github.com/mate-desktop/mate-screensaver/issues/152
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "mate-desktop", "mate-screensaver" ]
#### Expected behaviour mate-screensaver should keep the user's session locked until valid authentication has taken place (password entered, etc.) #### Actual behaviour & steps to reproduce the behaviour Do the following: 1. Have two display-port attached displays on a fresh install of Fedora 27. Mine are in por...
mate-screensaver does not maintain user lockout / screen lock under certain conditions
https://api.github.com/repos/mate-desktop/mate-screensaver/issues/152/comments
9
2018-04-10T19:53:17Z
2019-01-10T14:04:12Z
https://github.com/mate-desktop/mate-screensaver/issues/152
313,066,344
152
24
CVE-2018-20681
2019-01-09T23:29:05.230
mate-screensaver before 1.20.2 in MATE Desktop Environment allows physically proximate attackers to view screen content and possibly control applications. By unplugging and re-plugging or power-cycling external output devices (such as additionally attached graphical outputs via HDMI, VGA, DVI, etc.) the content of a sc...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/mate-desktop/mate-screensaver/issues/152" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mate-desktop:mate-screensaver:*:*:*:*:*:*:*:*", "matchCriteriaId": "795C0DDF-0421-4B68-9B1D-E054518D0BF0", "versionEndExcluding": "1.20.2", "versionEndIncluding": null, "vers...
[ "200" ]
200
https://github.com/mate-desktop/mate-screensaver/issues/155
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mate-desktop", "mate-screensaver" ]
#### Expected behaviour Lock Screen Turn off monitor (either by power management putting it to sleep, or by pressing power button) Turn monitor on Start typing Expect to see lock screen on monitor #### Actual behaviour Lock Screen Turn off monitor Turn monitor on Start typing Expect to see lock screen on m...
mate-screensaver screen lock can be bypassed by power cycling monitor [$110]
https://api.github.com/repos/mate-desktop/mate-screensaver/issues/155/comments
60
2018-05-01T20:44:51Z
2021-07-21T13:48:18Z
https://github.com/mate-desktop/mate-screensaver/issues/155
319,321,909
155
25
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
4