cve_id stringlengths 13 16 | cve_published stringlengths 23 23 | cve_descriptions stringlengths 54 1.07k | cve_metrics dict | cve_references listlengths 1 34 | cve_configurations listlengths 1 5 | url stringlengths 39 77 | cve_tags listlengths 1 4 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 3 88.6k ⌀ | issue_title stringlengths 3 335 | issue_comments_url stringlengths 58 81 | issue_comments_count int64 0 146 | issue_created_at stringlengths 20 20 | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 39 62 | issue_github_id int64 128M 2.09B | issue_number int64 1 122k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2023-51350 | 2024-01-11T23:15:08.570 | A spoofing attack in ujcms v.8.0.2 allows a remote attacker to obtain sensitive information and execute arbitrary code via a crafted script to the X-Forwarded-For function in the header. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/ujcms/ujcms"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ujcms/ujcms/issues/7"
},
{
"sour... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ujcms:ujcms:8.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E0B2489F-50F7-45FE-BC2E-9AA8E6309ADD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/ujcms/ujcms/issues/7 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ujcms",
"ujcms"
] | [Vulnerability description]
Ujcms v8.0.2 has a vulnerability that is Reliance on IP Address for Authentication(CWE-291), attacker could spoofing servers with IP addresses and impact log record.
[Vulnerability Type]
CWE-291: Reliance on IP Address for Authentication
[Vendor of Product]
https://gitee.com/ujcms... | Ujcms v8.0.2 has a vulnerability that attacker could spoofing servers with IP addresses. | https://api.github.com/repos/dromara/ujcms/issues/7/comments | 0 | 2023-12-17T10:20:56Z | 2023-12-18T08:23:31Z | https://github.com/dromara/ujcms/issues/7 | 2,045,160,053 | 7 |
CVE-2023-51790 | 2024-01-12T13:15:11.733 | Cross Site Scripting vulnerability in piwigo v.14.0.0 allows a remote attacker to obtain sensitive information via the lang parameter in the Admin Tools plug-in component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/Piwigo/AdminTools/issues/21"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DF997677-CC8C-40D2-BAA6-EF1374DC731F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/Piwigo/Piwigo/issues/2069 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"Piwigo",
"Piwigo"
] | ### **Summary**
A reflected cross-site scripting (XSS) vulnerability has been discovered in the "ato_lang" parameter. This vulnerability can be exploited by an attacker to inject malicious HTML and JS code into the HTML page, which could then be executed by webmaster or administrators when they visit the URL with the... | piwigo v14.0.0 has a reflected XSS vulnerability | https://api.github.com/repos/Piwigo/AdminTools/issues/21/comments | 0 | 2023-12-18T04:03:44Z | 2024-06-06T09:48:54Z | https://github.com/Piwigo/AdminTools/issues/21 | 2,054,769,328 | 21 |
CVE-2023-51806 | 2024-01-12T13:15:11.807 | File Upload vulnerability in Ujcms v.8.0.2 allows a local attacker to execute arbitrary code via a crafted file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/ujcms/ujcms"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ujcms/ujcms/issues/8"
},
{
"source": "cve@mitre.org",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ujcms:ujcms:8.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E0B2489F-50F7-45FE-BC2E-9AA8E6309ADD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/ujcms/ujcms/issues/8 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ujcms",
"ujcms"
] | [Vulnerability description]
Ujcms v8.0.2 has a vulnerability that upload a pdf file with hidden Cross Site Scripting (XSS).
[Vulnerability Type]
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[Vendor of Product]
https://gitee.com/ujcms/ujcms
https://github.com/u... | Ujcms v8.0.2 has a vulnerability that upload a pdf file with hidden Cross Site Scripting (XSS). | https://api.github.com/repos/dromara/ujcms/issues/8/comments | 0 | 2023-12-18T09:31:31Z | 2023-12-18T09:31:31Z | https://github.com/dromara/ujcms/issues/8 | 2,046,165,973 | 8 |
CVE-2024-22562 | 2024-01-19T15:15:09.463 | swftools 0.9.2 was discovered to contain a Stack Buffer Underflow via the function dict_foreach_keyvalue at swftools/lib/q.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/210"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/matthiaskramm/swftools/issues/210 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # project
https://github.com/matthiaskramm/swftools
version:0.9.2
# os info
Ubuntu18.04 TLS
# poc
[poc.zip](https://github.com/matthiaskramm/swftools/files/13785772/poc.zip)
# build
git clone https://github.com/matthiaskramm/swftools.git
cd swftools
./configure --disable-shared && make
/swftools/src/swfc ./p... | stack-buffer-underflow exists in the function dict_foreach_keyvalue in swftools/lib/q.c | https://api.github.com/repos/swftools/swftools/issues/210/comments | 0 | 2023-12-28T11:52:17Z | 2024-01-10T03:23:59Z | https://github.com/swftools/swftools/issues/210 | 2,058,345,861 | 210 |
CVE-2024-22920 | 2024-01-19T15:15:09.560 | swftools 0.9.2 was discovered to contain a heap-use-after-free via the function bufferWriteData in swftools/lib/action/compile.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/211"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/matthiaskramm/swftools/issues/211 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # project
https://github.com/matthiaskramm/swftools
version 0.9.2
# os info
Ubuntu18.04 TLS
# poc
[poc.zip](https://github.com/matthiaskramm/swftools/files/13786202/poc.zip)
# build
git clone https://github.com/matthiaskramm/swftools.git
cd swftools
./configure --disable-shared && make
./swftools/src/swfc ./... | heap-use-after-free exists in the function bufferWriteData in swftools/lib/action/compile.c:223 | https://api.github.com/repos/swftools/swftools/issues/211/comments | 0 | 2023-12-28T12:06:28Z | 2024-01-10T03:23:28Z | https://github.com/swftools/swftools/issues/211 | 2,058,359,151 | 211 |
CVE-2024-22911 | 2024-01-19T18:15:08.680 | A stack-buffer-underflow vulnerability was found in SWFTools v0.9.2, in the function parseExpression at src/swfc.c:2602. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/216"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/matthiaskramm/swftools/issues/216 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # Summary
A stack-buffer-overflow caused when using swfc.
# Version
```
$ ./swfc -V
swfc - part of swftools 0.9.2
$ git log --oneline -1
772e55a2 (HEAD, origin/master, origin/HEAD, master)
```
# Platform
```
$ uname -a
Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ubuntu SMP Wed May 24 00:51:42 UTC 2023... | stack-buffer-overflow exit in parseExpression at src/swfc.c:2602 | https://api.github.com/repos/swftools/swftools/issues/216/comments | 0 | 2024-01-10T13:04:05Z | 2024-01-11T06:44:59Z | https://github.com/swftools/swftools/issues/216 | 2,074,336,039 | 216 |
CVE-2024-22912 | 2024-01-19T18:15:08.723 | A global-buffer-overflow was found in SWFTools v0.9.2, in the function countline at swf5compiler.flex:327. It allows an attacker to cause code execution. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/212"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/matthiaskramm/swftools/issues/212 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # Summary
A global-buffer-overflow caused when using swfc.
# Version
```
$ ./swfc -V
swfc - part of swftools 0.9.2
$ git log --oneline -1
772e55a2 (HEAD, origin/master, origin/HEAD, master)
```
# Platform
```
$ uname -a
Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ubuntu SMP Wed May 24 00:51:42 UTC 202... | global-buffer-overflow exists in countline() at lib/swf5compiler.flex:327 | https://api.github.com/repos/swftools/swftools/issues/212/comments | 0 | 2024-01-10T12:20:57Z | 2024-01-11T06:47:20Z | https://github.com/swftools/swftools/issues/212 | 2,074,257,410 | 212 |
CVE-2024-22913 | 2024-01-19T18:15:08.767 | A heap-buffer-overflow was found in SWFTools v0.9.2, in the function swf5lex at lex.swf5.c:1321. It allows an attacker to cause code execution. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/213"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/matthiaskramm/swftools/issues/213 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # Summary
A heap-buffer-overflow caused when using swfc, which results in out-of-bounds write.
# Version
```
$ ./swfc -V
swfc - part of swftools 0.9.2
$ git log --oneline -1
772e55a2 (HEAD, origin/master, origin/HEAD, master)
```
# Platform
```
$ uname -a
Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ub... | heap-buffer-overflow exit in swf5lex() at lib/lex.swf5.c:1321 | https://api.github.com/repos/swftools/swftools/issues/213/comments | 0 | 2024-01-10T12:41:19Z | 2024-01-11T06:46:59Z | https://github.com/swftools/swftools/issues/213 | 2,074,294,602 | 213 |
CVE-2024-22914 | 2024-01-19T18:15:08.807 | A heap-use-after-free was found in SWFTools v0.9.2, in the function input at lex.swf5.c:2620. It allows an attacker to cause denial of service. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/214"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/matthiaskramm/swftools/issues/214 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # Summary
A heap-use-after-free caused when using swfc.
# Version
```
$ ./swfc -V
swfc - part of swftools 0.9.2
$ git log --oneline -1
772e55a2 (HEAD, origin/master, origin/HEAD, master)
```
# Platform
```
$ uname -a
Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ubuntu SMP Wed May 24 00:51:42 UTC 2023 x... | heap-use-after-free exit in input() at lib/lex.swf5.c:2620 | https://api.github.com/repos/swftools/swftools/issues/214/comments | 0 | 2024-01-10T12:47:45Z | 2024-01-11T06:46:39Z | https://github.com/swftools/swftools/issues/214 | 2,074,305,829 | 214 |
CVE-2024-22915 | 2024-01-19T18:15:08.847 | A heap-use-after-free was found in SWFTools v0.9.2, in the function swf_DeleteTag at rfxswf.c:1193. It allows an attacker to cause code execution. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/215"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/matthiaskramm/swftools/issues/215 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # Summary
A heap-use-after-free caused when using swfc, which results in out-of-bounds write.
# Version
```
$ ./swfc -V
swfc - part of swftools 0.9.2
$ git log --oneline -1
772e55a2 (HEAD, origin/master, origin/HEAD, master)
```
# Platform
```
$ uname -a
Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ubu... | heap-use-after-free exit in swf_DeleteTag() at lib/rfxswf.c:1193 | https://api.github.com/repos/swftools/swftools/issues/215/comments | 0 | 2024-01-10T12:59:20Z | 2024-01-11T06:45:39Z | https://github.com/swftools/swftools/issues/215 | 2,074,326,548 | 215 |
CVE-2024-22919 | 2024-01-19T18:15:08.950 | swftools0.9.2 was discovered to contain a global-buffer-overflow vulnerability via the function parseExpression at swftools/src/swfc.c:2587. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/209"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/matthiaskramm/swftools/issues/209 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # project
https://github.com/matthiaskramm/swftools
version:0.9.2
# os info
Ubuntu20.04 TLS
# poc
[poc.zip](https://github.com/matthiaskramm/swftools/files/13783540/poc.zip)
# build
git clone https://github.com/matthiaskramm/swftools.git
cd swftools
./configure --disable-shared && make
./swftools/src... | global-buffer-overflow exists in the function parseExpression in swftools/src/swfc.c:2587 | https://api.github.com/repos/swftools/swftools/issues/209/comments | 0 | 2023-12-28T05:21:08Z | 2024-01-11T01:14:11Z | https://github.com/swftools/swftools/issues/209 | 2,058,003,911 | 209 |
CVE-2024-22955 | 2024-01-19T18:15:09.003 | swftools 0.9.2 was discovered to contain a stack-buffer-underflow vulnerability via the function parseExpression at swftools/src/swfc.c:2576. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/207"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/matthiaskramm/swftools/issues/207 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # project
https://github.com/matthiaskramm/swftools
version:0.9.2
# os info
Ubuntu20.04 TLS
# poc
[gbo_poc.zip](https://github.com/matthiaskramm/swftools/files/13783442/gbo_poc.zip)
# build
git clone https://github.com/matthiaskramm/swftools.git
cd swftools
./configure --disable-shared && make
./swftools/s... | stack-buffer-underflow exists in the function parseExpression in swftools/src/swfc.c:2576 | https://api.github.com/repos/swftools/swftools/issues/207/comments | 0 | 2023-12-28T05:05:17Z | 2024-01-25T06:24:07Z | https://github.com/swftools/swftools/issues/207 | 2,057,993,750 | 207 |
CVE-2024-22956 | 2024-01-19T18:15:09.050 | swftools 0.9.2 was discovered to contain a heap-use-after-free vulnerability via the function removeFromTo at swftools/src/swfc.c:838 | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/208"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/matthiaskramm/swftools/issues/208 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # project
https://github.com/matthiaskramm/swftools
version:0.9.2
# os info
Ubuntu18.04 TLS
# poc
[poc.zip](https://github.com/matthiaskramm/swftools/files/13783478/poc.zip)
# build
git clone https://github.com/matthiaskramm/swftools.git
cd swftools
./configure --disable-shared && make
./swftools/src/s... | heap-use-after-free exists in the function removeFromTo in swftools/src/swfc.c:838 | https://api.github.com/repos/swftools/swftools/issues/208/comments | 0 | 2023-12-28T05:12:39Z | 2024-01-09T01:24:38Z | https://github.com/swftools/swftools/issues/208 | 2,057,998,005 | 208 |
CVE-2024-22957 | 2024-01-19T18:15:09.093 | swftools 0.9.2 was discovered to contain an Out-of-bounds Read vulnerability via the function dict_do_lookup in swftools/lib/q.c:1190. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/206"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/matthiaskramm/swftools/issues/206 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # project
https://github.com/matthiaskramm/swftools
version:0.9.2
# os info
Ubuntu18.04 TLS
# poc
[swfc_crash.zip](https://github.com/matthiaskramm/swftools/files/13815139/swfc_crash.zip)
# build
git clone https://github.com/matthiaskramm/swftools.git
cd swftools
./configure --disable-shared && make
./sw... | Out-of-bounds Read swftools/lib/q.c:1190 in dict_do_lookup | https://api.github.com/repos/swftools/swftools/issues/206/comments | 0 | 2023-12-28T04:25:13Z | 2024-01-03T02:33:59Z | https://github.com/swftools/swftools/issues/206 | 2,057,972,921 | 206 |
CVE-2024-22749 | 2024-01-25T16:15:09.010 | GPAC v2.3 was detected to contain a buffer overflow via the function gf_isom_new_generic_sample_description function in the isomedia/isom_write.c:4577 | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/gpac/gpac/issues/2713"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/hanxuer/crashes... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "58C43523-0CB3-474F-B88B-6ACA538645FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": nu... | https://github.com/gpac/gpac/issues/2713 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at https://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough inf... | buffer-overflow in gf_isom_new_generic_sample_description function at isomedia/isom_write.c:4577 | https://api.github.com/repos/gpac/gpac/issues/2713/comments | 1 | 2024-01-06T06:07:11Z | 2024-01-08T10:22:24Z | https://github.com/gpac/gpac/issues/2713 | 2,068,418,306 | 2,713 |
CVE-2024-22570 | 2024-01-29T20:15:15.420 | A stored cross-site scripting (XSS) vulnerability in /install.php?m=install&c=index&a=step3 of GreenCMS v2.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/Num-Nine/CVE/issues/11"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:njtech:greencms:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7271D633-9BD0-4E2B-BA69-E732E3E19D43",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | https://github.com/Num-Nine/CVE/issues/11 | [
"Issue Tracking"
] | github.com | [
"Num-Nine",
"CVE"
] | 1.Download address: https://codeload.github.com/GreenCMS/GreenCMS/zip/refs/heads/beta
2.Hole location: http://greencms.com/install.php?m=install&c=index&a=step3
3.Fill in the payload at the site name
`<script>alert(/xss/)</script>`
4.After the installation is complete, xss can be triggered by visiting the fol... | GreenCMS v2.3 exists storage xss | https://api.github.com/repos/QianGeG/CVE/issues/11/comments | 0 | 2023-12-30T08:57:42Z | 2023-12-30T08:57:42Z | https://github.com/QianGeG/CVE/issues/11 | 2,060,685,426 | 11 |
CVE-2024-22569 | 2024-01-31T02:15:54.467 | Stored Cross-Site Scripting (XSS) vulnerability in POSCMS v4.6.2, allows attackers to execute arbitrary code via a crafted payload to /index.php?c=install&m=index&step=2&is_install_db=0. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Num-Nine/CVE/issues/12"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:poscms:poscms:4.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A62614D0-0876-4DEA-BADB-2ADDA028B7FA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | https://github.com/Num-Nine/CVE/issues/12 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Num-Nine",
"CVE"
] | 1.Download address: http://www.poscms.net/xiazai/
2.Hole location: http://127.0.0.1/index.php? c=install&m=index&step=2&is_install_db=0
3.Fill in the payload at the project name
`<script>alert(/xss/)</script>`
4.xss is triggered when you return to the home page after installation
 vulnerability in the func parameter in eyoucms v.1.6.5 allows a remote attacker to run arbitrary code via crafted URL. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/57"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C5AE12B9-F8D6-4F10-9B49-50E0263ECA55",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/weng-xianhu/eyoucms/issues/57 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | ### **Summary**
EyouCMS-V1.6.5 When uploading images locally, the program will use the info parameter to set the parameters carried by the upload form.
Multiple reflective XSS vulnerabilities can be created by modifying the JWT encrypted HEADER of the accepted JSON data and setting the parameter it contains to a mali... | EyouCMS-V1.6.5 has multiple reflective XSS vulnerabilities | https://api.github.com/repos/weng-xianhu/eyoucms/issues/57/comments | 1 | 2024-01-05T08:05:47Z | 2024-03-22T01:36:04Z | https://github.com/weng-xianhu/eyoucms/issues/57 | 2,066,903,491 | 57 |
CVE-2024-24267 | 2024-02-05T18:15:52.427 | gpac v2.2.1 was discovered to contain a memory leak via the gfio_blob variable in the gf_fileio_from_blob function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/gpac/gpac/commit/d28d9ba45cf4f628a7b2c351849a895e6fcf2234"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/gpac/gpac/issues/2571"
},
{
"source": "cve@mitre.org",
"tags": [
"Ex... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "81FBED81-2989-4E6D-83CF-BF8E4989F5ED",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/2571 | null | github.com | [
"gpac",
"gpac"
] | Memory leak in function [gf_fileio_from_mem](https://github.com/gpac/gpac/blob/941a0891b989f5ad86b739cfb12c84b7e62e8ee4/src/utils/os_file.c#L1447)
The memory leak is reported by a static analyzer tool developed at CAST (https://www.linkedin.com/company/cast-center).
Dynamic memory is allocated [here](https://github... | Memory leak in function gf_fileio_from_mem | https://api.github.com/repos/gpac/gpac/issues/2571/comments | 0 | 2023-08-29T11:13:38Z | 2023-08-29T13:47:19Z | https://github.com/gpac/gpac/issues/2571 | 1,871,446,973 | 2,571 |
CVE-2024-24130 | 2024-02-07T14:15:52.720 | Mail2World v12 Business Control Center was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Usr parameter at resellercenter/login.asp. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Hebing123/cve/issues/13"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mail2world:mail2world:12:*:*:*:*:*:*:*",
"matchCriteriaId": "814F8AA9-4951-4025-A7F3-A434BE630122",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/Hebing123/cve/issues/13 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"Hebing123",
"cve"
] | ### **Summary**
Mail2World V12 Business Control Center has a reflective cross-site vulnerability.
### **Details**
A reflective XSS vulnerability exists in the resellercenter/login.asp path of Mail2World v12 Business Control Center.
The cause of this XSS vulnerability is that Usr parameters are displayed to the fron... | Mail2World v12 Business Control Center has a reflective XSS vulnerability | https://api.github.com/repos/Hebing123/cve/issues/13/comments | 1 | 2024-01-12T17:37:39Z | 2024-03-11T06:20:40Z | https://github.com/Hebing123/cve/issues/13 | 2,079,360,954 | 13 |
CVE-2024-24131 | 2024-02-07T14:15:52.770 | SuperWebMailer v9.31.0.01799 was discovered to contain a reflected cross-site scripting (XSS) vulenrability via the component api.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Hebing123/cve/issues/14"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:superwebmailer:superwebmailer:9.31.0.01799:*:*:*:*:*:*:*",
"matchCriteriaId": "E69A9B02-9E6A-421A-8E38-9A315640DD73",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/Hebing123/cve/issues/14 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"Hebing123",
"cve"
] | ### **Summary**
SuperWebMailer 9.31.0.01799 has a reflective cross-site vulnerability.
### **Details**
SuperWebMailer in version 9.31.0.01799 has a reflection cross-site attack vulnerability caused by api.php directly referencing urls without filtering.
### **Proof of Concept (POC)**
http://ip:port/api/api.php/%3... | SuperWebMailer 9.31.0.01799 has a reflective XSS vulnerability | https://api.github.com/repos/Hebing123/cve/issues/14/comments | 1 | 2024-01-12T18:45:40Z | 2024-03-11T06:20:34Z | https://github.com/Hebing123/cve/issues/14 | 2,079,480,963 | 14 |
CVE-2024-24133 | 2024-02-07T14:15:52.820 | Atmail v6.6.0 was discovered to contain a SQL injection vulnerability via the username parameter on the login page. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/16"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:atmail:atmail:6.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F9DFF09-D9A8-46F7-A466-6C538C591651",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | https://github.com/Hebing123/cve/issues/16 | [
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | ### **Summary**
On January 12, we discovered that atmail 6.6.0 and atmail 6.3.0 weretested for SQL injection vulnerabilities that could be larger than 6.6.0.
The username parameter during admin login is at risk of SQL injection.
### **Details**
We can prove this with delayed SQL injection, which we have tes... | SQL Injection Vulnerability in Atmail 6.6.0 | https://api.github.com/repos/Hebing123/cve/issues/16/comments | 2 | 2024-01-16T06:20:56Z | 2024-03-11T06:17:35Z | https://github.com/Hebing123/cve/issues/16 | 2,083,096,416 | 16 |
CVE-2024-24186 | 2024-02-07T14:15:52.870 | Jsish v3.5.0 (commit 42c694c) was discovered to contain a stack-overflow via the component IterGetKeysCallback at /jsish/src/jsiValue.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/98"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/98 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f
Version: v3.5.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
export JSI__SANITIZE=1
make
```
###### Test case
<details><summary>testcase<... | stack-overflow ./jsish/src/jsiValue.c:1451 in IterGetKeysCallback | https://api.github.com/repos/pcmacdon/jsish/issues/98/comments | 0 | 2024-01-14T11:31:14Z | 2024-01-14T11:31:14Z | https://github.com/pcmacdon/jsish/issues/98 | 2,080,689,779 | 98 |
CVE-2024-24188 | 2024-02-07T14:15:52.917 | Jsish v3.5.0 was discovered to contain a heap-buffer-overflow in ./src/jsiUtils.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/100"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/100 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f
Version: v3.5.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
export JSI__SANITIZE=1
make
```
###### Test case
<details><summary>testcase<... | heap-buffer-overflow in ./jsish/src/jsiUtils.c | https://api.github.com/repos/pcmacdon/jsish/issues/100/comments | 0 | 2024-01-20T05:53:20Z | 2024-01-20T05:53:20Z | https://github.com/pcmacdon/jsish/issues/100 | 2,091,916,967 | 100 |
CVE-2024-24189 | 2024-02-07T14:15:52.967 | Jsish v3.5.0 (commit 42c694c) was discovered to contain a use-after-free via the SplitChar at ./src/jsiUtils.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/101"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/101 | [
"Vendor Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f
Version: v3.5.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
export JSI__SANITIZE=1
make
```
###### Test case
<details><summary>testcase<... | heap-use-after-free ./jsish/src/jsiUtils.c:2060:17 in SplitChar | https://api.github.com/repos/pcmacdon/jsish/issues/101/comments | 0 | 2024-01-20T05:58:02Z | 2024-01-20T05:58:02Z | https://github.com/pcmacdon/jsish/issues/101 | 2,091,919,351 | 101 |
CVE-2024-24113 | 2024-02-08T13:15:09.807 | xxl-job =< 2.4.1 has a Server-Side Request Forgery (SSRF) vulnerability, which causes low-privileged users to control executor to RCE. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xuxueli/xxl-job/issues/3375"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xuxueli:xxl-job:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1C421D48-E483-44C2-A4A9-F0FBC31E17C7",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.1",
"versionStartExcludi... | https://github.com/xuxueli/xxl-job/issues/3375 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"xuxueli",
"xxl-job"
] | ### Which version of XXL-JOB do you using?
2.4.1(latest)
### vulnerability description
XXL-JOB is a distributed task scheduling platform based on java language in the XXL (XXL-JOB) community.
There is an SSRF vulnerability in xxl-job-2.4.1/xxl-job-admin/src/main/java/com/xxl/job/admin/controller/JobInfoController... | xxl-job =< 2.4.1 version has SSRF vulnerability, which causes low-privileged users to control executor to RCE | https://api.github.com/repos/xuxueli/xxl-job/issues/3375/comments | 1 | 2024-01-11T12:24:35Z | 2024-04-17T08:45:56Z | https://github.com/xuxueli/xxl-job/issues/3375 | 2,076,500,051 | 3,375 |
CVE-2024-25451 | 2024-02-09T15:15:09.143 | Bento4 v1.6.0-640 was discovered to contain an out-of-memory bug via the AP4_DataBuffer::ReallocateBuffer() function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/872"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*",
"matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/axiomatic-systems/Bento4/issues/872 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | Hi,
Thanks for fixing the issue #741, but still there is out-of-memory bug in the latest version (1.6.0-640) of multiple programs because of the function AP4_DataBuffer::ReallocateBuffer() at Ap4DataBuffer.cpp:210.
We observed the same bug in mp4info, mp42aac, mp42avc, mp4decrypt, and mp4dump with the same root c... | Out-of-memory bug from AP4_DataBuffer::ReallocateBuffer() in multiple programs (v1.6.0-640) | https://api.github.com/repos/axiomatic-systems/Bento4/issues/872/comments | 2 | 2023-06-12T09:44:14Z | 2024-02-17T17:35:35Z | https://github.com/axiomatic-systems/Bento4/issues/872 | 1,752,341,840 | 872 |
CVE-2024-25452 | 2024-02-09T15:15:09.193 | Bento4 v1.6.0-640 was discovered to contain an out-of-memory bug via the AP4_UrlAtom::AP4_UrlAtom() function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/873"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*",
"matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/axiomatic-systems/Bento4/issues/873 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | Hi,
There is another out-of-memory bug in the latest version (1.6.0-640) of mp4info because of the function AP4_UrlAtom::AP4_UrlAtom() at Ap4UrlAtom.cpp:71.
Unlike the issue #771, this vunerability happened in the different function AP4_UrlAtom::AP4_UrlAtom().
Here is the output of program with address saniti... | Out-of-memory bug from AP4_UrlAtom::AP4_UrlAtom() in v1.6.0-640 | https://api.github.com/repos/axiomatic-systems/Bento4/issues/873/comments | 1 | 2023-06-12T10:03:27Z | 2024-02-20T02:41:04Z | https://github.com/axiomatic-systems/Bento4/issues/873 | 1,752,379,751 | 873 |
CVE-2024-25453 | 2024-02-09T15:15:09.240 | Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_StszAtom::GetSampleSize() function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/204"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bent... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*",
"matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/axiomatic-systems/Bento4/issues/204 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | On master compiled on 2017-09-10 (but please confirm if this affects current stable):
```
# mp4compact $FILE out.mp4
ASAN:DEADLYSIGNAL
=================================================================
==156195==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000060a4b3 bp 0x7ffed6dd9e30 s... | NULL pointer dereference in AP4_StszAtom::GetSampleSize (Ap4StszAtom.cpp) | https://api.github.com/repos/axiomatic-systems/Bento4/issues/204/comments | 0 | 2017-09-15T07:10:24Z | 2017-12-17T00:59:26Z | https://github.com/axiomatic-systems/Bento4/issues/204 | 257,947,117 | 204 |
CVE-2024-25453 | 2024-02-09T15:15:09.240 | Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_StszAtom::GetSampleSize() function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/204"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bent... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*",
"matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/axiomatic-systems/Bento4/issues/874 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | Hi,
There still exists the null pointer reference bug in the latest version (1.6.0-640) of mp4info by the function AP4_StszAtom::GetSampleSize().
Here is the output of program with address sanitizer attached.
### Bug Report
File:
major brand: isom
minor version: 200
compatible brand: isom
... | NULL pointer reference from AP4_StszAtom::GetSampleSize() in v1.6.0-640 | https://api.github.com/repos/axiomatic-systems/Bento4/issues/874/comments | 1 | 2023-06-12T10:08:57Z | 2024-02-17T17:33:31Z | https://github.com/axiomatic-systems/Bento4/issues/874 | 1,752,392,145 | 874 |
CVE-2024-25454 | 2024-02-09T15:15:09.293 | Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_DescriptorFinder::Test() function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/875"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*",
"matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/axiomatic-systems/Bento4/issues/875 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | Hi,
There still exists the null pointer reference bug in the latest version (1.6.0-640) of mp4info by the function AP4_DescriptorFinder::Test().
Here is the output of program with address sanitizer attached.
### Bug Report
File:
major brand: isom
minor version: 200
compatible brand: isom
c... | NULL pointer reference from AP4_DescriptorFinder::Test() in v1.6.0-640 | https://api.github.com/repos/axiomatic-systems/Bento4/issues/875/comments | 1 | 2023-06-12T10:12:34Z | 2024-02-17T17:30:47Z | https://github.com/axiomatic-systems/Bento4/issues/875 | 1,752,398,555 | 875 |
CVE-2024-24146 | 2024-02-29T01:44:11.657 | A memory leak issue discovered in parseSWF_DEFINEBUTTON in libming v0.4.8 allows attackers to cause s denial of service via a crafted SWF file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/307"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/libming/libming/issues/307 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | ### Envrionment
```bash
ubuntu ~/lab/libming/util master lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 22.04.2 LTS
Release: 22.04
Codename: jammy
```
### Compiler
```bash
ubuntu ~/lab/libming/util master clang -v
Ubuntu clang vers... | Memory leaks on parseSWF_DEFINEBUTTON | https://api.github.com/repos/libming/libming/issues/307/comments | 1 | 2024-01-12T22:46:35Z | 2024-02-21T22:35:18Z | https://github.com/libming/libming/issues/307 | 2,079,829,395 | 307 |
CVE-2024-24147 | 2024-02-29T01:44:11.693 | A memory leak issue discovered in parseSWF_FILLSTYLEARRAY in libming v0.4.8 allows attackers to cause s denial of service via a crafted SWF file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/311"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/libming/libming/issues/311 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | ### Envrionment
```bash
ubuntu ~/lab/libming/util master lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 22.04.2 LTS
Release: 22.04
Codename: jammy
```
### Compiler
```bash
ubuntu ~/lab/libming/util master clang -v
Ubuntu clang vers... | Memory leaks on parseSWF_FILLSTYLEARRAY | https://api.github.com/repos/libming/libming/issues/311/comments | 1 | 2024-01-13T00:00:25Z | 2024-02-21T22:33:33Z | https://github.com/libming/libming/issues/311 | 2,079,901,582 | 311 |
CVE-2024-24149 | 2024-02-29T01:44:11.737 | A memory leak issue discovered in parseSWF_GLYPHENTRY in libming v0.4.8 allows attackers to cause a denial of service via a crafted SWF file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/310"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/libming/libming/issues/310 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | ### Envrionment
```bash
ubuntu ~/lab/libming/util master lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 22.04.2 LTS
Release: 22.04
Codename: jammy
```
### Compiler
```bash
ubuntu ~/lab/libming/util master clang -v
Ubuntu clang vers... | Memory leaks on parseSWF_GLYPHENTRY | https://api.github.com/repos/libming/libming/issues/310/comments | 1 | 2024-01-12T23:51:34Z | 2024-02-21T22:35:36Z | https://github.com/libming/libming/issues/310 | 2,079,896,237 | 310 |
CVE-2024-24150 | 2024-02-29T01:44:11.777 | A memory leak issue discovered in parseSWF_TEXTRECORD in libming v0.4.8 allows attackers to cause a denial of service via a crafted SWF file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/309"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/libming/libming/issues/309 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | ### Envrionment
```bash
ubuntu ~/lab/libming/util master lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 22.04.2 LTS
Release: 22.04
Codename: jammy
```
### Compiler
```bash
ubuntu ~/lab/libming/util master clang -v
Ubuntu clang vers... | Memory leaks on parseSWF_TEXTRECORD | https://api.github.com/repos/libming/libming/issues/309/comments | 1 | 2024-01-12T23:44:59Z | 2024-02-21T22:47:44Z | https://github.com/libming/libming/issues/309 | 2,079,890,770 | 309 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.