cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
54
1.07k
cve_metrics
dict
cve_references
listlengths
1
34
cve_configurations
listlengths
1
5
url
stringlengths
39
77
cve_tags
listlengths
1
4
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
3
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
58
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
39
62
issue_github_id
int64
128M
2.09B
issue_number
int64
1
122k
CVE-2023-51350
2024-01-11T23:15:08.570
A spoofing attack in ujcms v.8.0.2 allows a remote attacker to obtain sensitive information and execute arbitrary code via a crafted script to the X-Forwarded-For function in the header.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/ujcms/ujcms" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ujcms/ujcms/issues/7" }, { "sour...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ujcms:ujcms:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E0B2489F-50F7-45FE-BC2E-9AA8E6309ADD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/ujcms/ujcms/issues/7
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ujcms", "ujcms" ]
[Vulnerability description] Ujcms v8.0.2 has a vulnerability that is Reliance on IP Address for Authentication(CWE-291), attacker could spoofing servers with IP addresses and impact log record. [Vulnerability Type] CWE-291: Reliance on IP Address for Authentication [Vendor of Product] https://gitee.com/ujcms...
Ujcms v8.0.2 has a vulnerability that attacker could spoofing servers with IP addresses.
https://api.github.com/repos/dromara/ujcms/issues/7/comments
0
2023-12-17T10:20:56Z
2023-12-18T08:23:31Z
https://github.com/dromara/ujcms/issues/7
2,045,160,053
7
CVE-2023-51790
2024-01-12T13:15:11.733
Cross Site Scripting vulnerability in piwigo v.14.0.0 allows a remote attacker to obtain sensitive information via the lang parameter in the Admin Tools plug-in component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/Piwigo/AdminTools/issues/21" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DF997677-CC8C-40D2-BAA6-EF1374DC731F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/Piwigo/Piwigo/issues/2069
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
### **Summary** A reflected cross-site scripting (XSS) vulnerability has been discovered in the "ato_lang" parameter. This vulnerability can be exploited by an attacker to inject malicious HTML and JS code into the HTML page, which could then be executed by webmaster or administrators when they visit the URL with the...
piwigo v14.0.0 has a reflected XSS vulnerability
https://api.github.com/repos/Piwigo/AdminTools/issues/21/comments
0
2023-12-18T04:03:44Z
2024-06-06T09:48:54Z
https://github.com/Piwigo/AdminTools/issues/21
2,054,769,328
21
CVE-2023-51806
2024-01-12T13:15:11.807
File Upload vulnerability in Ujcms v.8.0.2 allows a local attacker to execute arbitrary code via a crafted file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/ujcms/ujcms" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ujcms/ujcms/issues/8" }, { "source": "cve@mitre.org", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ujcms:ujcms:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E0B2489F-50F7-45FE-BC2E-9AA8E6309ADD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/ujcms/ujcms/issues/8
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ujcms", "ujcms" ]
[Vulnerability description] Ujcms v8.0.2 has a vulnerability that upload a pdf file with hidden Cross Site Scripting (XSS). [Vulnerability Type] CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') [Vendor of Product] https://gitee.com/ujcms/ujcms https://github.com/u...
Ujcms v8.0.2 has a vulnerability that upload a pdf file with hidden Cross Site Scripting (XSS).
https://api.github.com/repos/dromara/ujcms/issues/8/comments
0
2023-12-18T09:31:31Z
2023-12-18T09:31:31Z
https://github.com/dromara/ujcms/issues/8
2,046,165,973
8
CVE-2024-22562
2024-01-19T15:15:09.463
swftools 0.9.2 was discovered to contain a Stack Buffer Underflow via the function dict_foreach_keyvalue at swftools/lib/q.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/210" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/matthiaskramm/swftools/issues/210
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# project https://github.com/matthiaskramm/swftools version:0.9.2 # os info Ubuntu18.04 TLS # poc [poc.zip](https://github.com/matthiaskramm/swftools/files/13785772/poc.zip) # build git clone https://github.com/matthiaskramm/swftools.git cd swftools ./configure --disable-shared && make /swftools/src/swfc ./p...
stack-buffer-underflow exists in the function dict_foreach_keyvalue in swftools/lib/q.c
https://api.github.com/repos/swftools/swftools/issues/210/comments
0
2023-12-28T11:52:17Z
2024-01-10T03:23:59Z
https://github.com/swftools/swftools/issues/210
2,058,345,861
210
CVE-2024-22920
2024-01-19T15:15:09.560
swftools 0.9.2 was discovered to contain a heap-use-after-free via the function bufferWriteData in swftools/lib/action/compile.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/211" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/matthiaskramm/swftools/issues/211
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# project https://github.com/matthiaskramm/swftools version 0.9.2 # os info Ubuntu18.04 TLS # poc [poc.zip](https://github.com/matthiaskramm/swftools/files/13786202/poc.zip) # build git clone https://github.com/matthiaskramm/swftools.git cd swftools ./configure --disable-shared && make ./swftools/src/swfc ./...
heap-use-after-free exists in the function bufferWriteData in swftools/lib/action/compile.c:223
https://api.github.com/repos/swftools/swftools/issues/211/comments
0
2023-12-28T12:06:28Z
2024-01-10T03:23:28Z
https://github.com/swftools/swftools/issues/211
2,058,359,151
211
CVE-2024-22911
2024-01-19T18:15:08.680
A stack-buffer-underflow vulnerability was found in SWFTools v0.9.2, in the function parseExpression at src/swfc.c:2602.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/216" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/matthiaskramm/swftools/issues/216
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# Summary A stack-buffer-overflow caused when using swfc. # Version ``` $ ./swfc -V swfc - part of swftools 0.9.2 $ git log --oneline -1 772e55a2 (HEAD, origin/master, origin/HEAD, master) ``` # Platform ``` $ uname -a Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ubuntu SMP Wed May 24 00:51:42 UTC 2023...
stack-buffer-overflow exit in parseExpression at src/swfc.c:2602
https://api.github.com/repos/swftools/swftools/issues/216/comments
0
2024-01-10T13:04:05Z
2024-01-11T06:44:59Z
https://github.com/swftools/swftools/issues/216
2,074,336,039
216
CVE-2024-22912
2024-01-19T18:15:08.723
A global-buffer-overflow was found in SWFTools v0.9.2, in the function countline at swf5compiler.flex:327. It allows an attacker to cause code execution.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/212" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/matthiaskramm/swftools/issues/212
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# Summary A global-buffer-overflow caused when using swfc. # Version ``` $ ./swfc -V swfc - part of swftools 0.9.2 $ git log --oneline -1 772e55a2 (HEAD, origin/master, origin/HEAD, master) ``` # Platform ``` $ uname -a Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ubuntu SMP Wed May 24 00:51:42 UTC 202...
global-buffer-overflow exists in countline() at lib/swf5compiler.flex:327
https://api.github.com/repos/swftools/swftools/issues/212/comments
0
2024-01-10T12:20:57Z
2024-01-11T06:47:20Z
https://github.com/swftools/swftools/issues/212
2,074,257,410
212
CVE-2024-22913
2024-01-19T18:15:08.767
A heap-buffer-overflow was found in SWFTools v0.9.2, in the function swf5lex at lex.swf5.c:1321. It allows an attacker to cause code execution.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/213" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/matthiaskramm/swftools/issues/213
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# Summary A heap-buffer-overflow caused when using swfc, which results in out-of-bounds write. # Version ``` $ ./swfc -V swfc - part of swftools 0.9.2 $ git log --oneline -1 772e55a2 (HEAD, origin/master, origin/HEAD, master) ``` # Platform ``` $ uname -a Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ub...
heap-buffer-overflow exit in swf5lex() at lib/lex.swf5.c:1321
https://api.github.com/repos/swftools/swftools/issues/213/comments
0
2024-01-10T12:41:19Z
2024-01-11T06:46:59Z
https://github.com/swftools/swftools/issues/213
2,074,294,602
213
CVE-2024-22914
2024-01-19T18:15:08.807
A heap-use-after-free was found in SWFTools v0.9.2, in the function input at lex.swf5.c:2620. It allows an attacker to cause denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/214" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/matthiaskramm/swftools/issues/214
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# Summary A heap-use-after-free caused when using swfc. # Version ``` $ ./swfc -V swfc - part of swftools 0.9.2 $ git log --oneline -1 772e55a2 (HEAD, origin/master, origin/HEAD, master) ``` # Platform ``` $ uname -a Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ubuntu SMP Wed May 24 00:51:42 UTC 2023 x...
heap-use-after-free exit in input() at lib/lex.swf5.c:2620
https://api.github.com/repos/swftools/swftools/issues/214/comments
0
2024-01-10T12:47:45Z
2024-01-11T06:46:39Z
https://github.com/swftools/swftools/issues/214
2,074,305,829
214
CVE-2024-22915
2024-01-19T18:15:08.847
A heap-use-after-free was found in SWFTools v0.9.2, in the function swf_DeleteTag at rfxswf.c:1193. It allows an attacker to cause code execution.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/215" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/matthiaskramm/swftools/issues/215
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# Summary A heap-use-after-free caused when using swfc, which results in out-of-bounds write. # Version ``` $ ./swfc -V swfc - part of swftools 0.9.2 $ git log --oneline -1 772e55a2 (HEAD, origin/master, origin/HEAD, master) ``` # Platform ``` $ uname -a Linux 1cc373898f58 5.4.0-150-generic #167~18.04.1-Ubu...
heap-use-after-free exit in swf_DeleteTag() at lib/rfxswf.c:1193
https://api.github.com/repos/swftools/swftools/issues/215/comments
0
2024-01-10T12:59:20Z
2024-01-11T06:45:39Z
https://github.com/swftools/swftools/issues/215
2,074,326,548
215
CVE-2024-22919
2024-01-19T18:15:08.950
swftools0.9.2 was discovered to contain a global-buffer-overflow vulnerability via the function parseExpression at swftools/src/swfc.c:2587.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/209" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/matthiaskramm/swftools/issues/209
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# project https://github.com/matthiaskramm/swftools version:0.9.2 # os info Ubuntu20.04 TLS # poc [poc.zip](https://github.com/matthiaskramm/swftools/files/13783540/poc.zip) # build git clone https://github.com/matthiaskramm/swftools.git cd swftools ./configure --disable-shared && make ./swftools/src...
global-buffer-overflow exists in the function parseExpression in swftools/src/swfc.c:2587
https://api.github.com/repos/swftools/swftools/issues/209/comments
0
2023-12-28T05:21:08Z
2024-01-11T01:14:11Z
https://github.com/swftools/swftools/issues/209
2,058,003,911
209
CVE-2024-22955
2024-01-19T18:15:09.003
swftools 0.9.2 was discovered to contain a stack-buffer-underflow vulnerability via the function parseExpression at swftools/src/swfc.c:2576.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/207" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/matthiaskramm/swftools/issues/207
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# project https://github.com/matthiaskramm/swftools version:0.9.2 # os info Ubuntu20.04 TLS # poc [gbo_poc.zip](https://github.com/matthiaskramm/swftools/files/13783442/gbo_poc.zip) # build git clone https://github.com/matthiaskramm/swftools.git cd swftools ./configure --disable-shared && make ./swftools/s...
stack-buffer-underflow exists in the function parseExpression in swftools/src/swfc.c:2576
https://api.github.com/repos/swftools/swftools/issues/207/comments
0
2023-12-28T05:05:17Z
2024-01-25T06:24:07Z
https://github.com/swftools/swftools/issues/207
2,057,993,750
207
CVE-2024-22956
2024-01-19T18:15:09.050
swftools 0.9.2 was discovered to contain a heap-use-after-free vulnerability via the function removeFromTo at swftools/src/swfc.c:838
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/208" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/matthiaskramm/swftools/issues/208
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# project https://github.com/matthiaskramm/swftools version:0.9.2 # os info Ubuntu18.04 TLS # poc [poc.zip](https://github.com/matthiaskramm/swftools/files/13783478/poc.zip) # build git clone https://github.com/matthiaskramm/swftools.git cd swftools ./configure --disable-shared && make ./swftools/src/s...
heap-use-after-free exists in the function removeFromTo in swftools/src/swfc.c:838
https://api.github.com/repos/swftools/swftools/issues/208/comments
0
2023-12-28T05:12:39Z
2024-01-09T01:24:38Z
https://github.com/swftools/swftools/issues/208
2,057,998,005
208
CVE-2024-22957
2024-01-19T18:15:09.093
swftools 0.9.2 was discovered to contain an Out-of-bounds Read vulnerability via the function dict_do_lookup in swftools/lib/q.c:1190.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/206" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/matthiaskramm/swftools/issues/206
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# project https://github.com/matthiaskramm/swftools version:0.9.2 # os info Ubuntu18.04 TLS # poc [swfc_crash.zip](https://github.com/matthiaskramm/swftools/files/13815139/swfc_crash.zip) # build git clone https://github.com/matthiaskramm/swftools.git cd swftools ./configure --disable-shared && make ./sw...
Out-of-bounds Read swftools/lib/q.c:1190 in dict_do_lookup
https://api.github.com/repos/swftools/swftools/issues/206/comments
0
2023-12-28T04:25:13Z
2024-01-03T02:33:59Z
https://github.com/swftools/swftools/issues/206
2,057,972,921
206
CVE-2024-22749
2024-01-25T16:15:09.010
GPAC v2.3 was detected to contain a buffer overflow via the function gf_isom_new_generic_sample_description function in the isomedia/isom_write.c:4577
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/gpac/gpac/issues/2713" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hanxuer/crashes...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "58C43523-0CB3-474F-B88B-6ACA538645FF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
https://github.com/gpac/gpac/issues/2713
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at https://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough inf...
buffer-overflow in gf_isom_new_generic_sample_description function at isomedia/isom_write.c:4577
https://api.github.com/repos/gpac/gpac/issues/2713/comments
1
2024-01-06T06:07:11Z
2024-01-08T10:22:24Z
https://github.com/gpac/gpac/issues/2713
2,068,418,306
2,713
CVE-2024-22570
2024-01-29T20:15:15.420
A stored cross-site scripting (XSS) vulnerability in /install.php?m=install&c=index&a=step3 of GreenCMS v2.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/Num-Nine/CVE/issues/11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:njtech:greencms:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7271D633-9BD0-4E2B-BA69-E732E3E19D43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/Num-Nine/CVE/issues/11
[ "Issue Tracking" ]
github.com
[ "Num-Nine", "CVE" ]
1.Download address: https://codeload.github.com/GreenCMS/GreenCMS/zip/refs/heads/beta 2.Hole location: http://greencms.com/install.php?m=install&c=index&a=step3 3.Fill in the payload at the site name `<script>alert(/xss/)</script>` 4.After the installation is complete, xss can be triggered by visiting the fol...
GreenCMS v2.3 exists storage xss
https://api.github.com/repos/QianGeG/CVE/issues/11/comments
0
2023-12-30T08:57:42Z
2023-12-30T08:57:42Z
https://github.com/QianGeG/CVE/issues/11
2,060,685,426
11
CVE-2024-22569
2024-01-31T02:15:54.467
Stored Cross-Site Scripting (XSS) vulnerability in POSCMS v4.6.2, allows attackers to execute arbitrary code via a crafted payload to /index.php?c=install&m=index&step=2&is_install_db=0.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Num-Nine/CVE/issues/12" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:poscms:poscms:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "A62614D0-0876-4DEA-BADB-2ADDA028B7FA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/Num-Nine/CVE/issues/12
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Num-Nine", "CVE" ]
1.Download address: http://www.poscms.net/xiazai/ 2.Hole location: http://127.0.0.1/index.php? c=install&m=index&step=2&is_install_db=0 3.Fill in the payload at the project name `<script>alert(/xss/)</script>` 4.xss is triggered when you return to the home page after installation ![image](https://github.co...
poscms 4.6.2 Storage xss Exists
https://api.github.com/repos/QianGeG/CVE/issues/12/comments
0
2023-12-30T09:06:40Z
2023-12-30T09:08:11Z
https://github.com/QianGeG/CVE/issues/12
2,060,687,596
12
CVE-2024-22927
2024-02-01T23:15:10.960
Cross Site Scripting (XSS) vulnerability in the func parameter in eyoucms v.1.6.5 allows a remote attacker to run arbitrary code via crafted URL.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/57" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "C5AE12B9-F8D6-4F10-9B49-50E0263ECA55", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/57
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
### **Summary** EyouCMS-V1.6.5 When uploading images locally, the program will use the info parameter to set the parameters carried by the upload form. Multiple reflective XSS vulnerabilities can be created by modifying the JWT encrypted HEADER of the accepted JSON data and setting the parameter it contains to a mali...
EyouCMS-V1.6.5 has multiple reflective XSS vulnerabilities
https://api.github.com/repos/weng-xianhu/eyoucms/issues/57/comments
1
2024-01-05T08:05:47Z
2024-03-22T01:36:04Z
https://github.com/weng-xianhu/eyoucms/issues/57
2,066,903,491
57
CVE-2024-24267
2024-02-05T18:15:52.427
gpac v2.2.1 was discovered to contain a memory leak via the gfio_blob variable in the gf_fileio_from_blob function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/gpac/gpac/commit/d28d9ba45cf4f628a7b2c351849a895e6fcf2234" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/gpac/gpac/issues/2571" }, { "source": "cve@mitre.org", "tags": [ "Ex...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "81FBED81-2989-4E6D-83CF-BF8E4989F5ED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/2571
null
github.com
[ "gpac", "gpac" ]
Memory leak in function [gf_fileio_from_mem](https://github.com/gpac/gpac/blob/941a0891b989f5ad86b739cfb12c84b7e62e8ee4/src/utils/os_file.c#L1447) The memory leak is reported by a static analyzer tool developed at CAST (https://www.linkedin.com/company/cast-center). Dynamic memory is allocated [here](https://github...
Memory leak in function gf_fileio_from_mem
https://api.github.com/repos/gpac/gpac/issues/2571/comments
0
2023-08-29T11:13:38Z
2023-08-29T13:47:19Z
https://github.com/gpac/gpac/issues/2571
1,871,446,973
2,571
CVE-2024-24130
2024-02-07T14:15:52.720
Mail2World v12 Business Control Center was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Usr parameter at resellercenter/login.asp.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Hebing123/cve/issues/13" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mail2world:mail2world:12:*:*:*:*:*:*:*", "matchCriteriaId": "814F8AA9-4951-4025-A7F3-A434BE630122", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/Hebing123/cve/issues/13
[ "Exploit", "Issue Tracking" ]
github.com
[ "Hebing123", "cve" ]
### **Summary** Mail2World V12 Business Control Center has a reflective cross-site vulnerability. ### **Details** A reflective XSS vulnerability exists in the resellercenter/login.asp path of Mail2World v12 Business Control Center. The cause of this XSS vulnerability is that Usr parameters are displayed to the fron...
Mail2World v12 Business Control Center has a reflective XSS vulnerability
https://api.github.com/repos/Hebing123/cve/issues/13/comments
1
2024-01-12T17:37:39Z
2024-03-11T06:20:40Z
https://github.com/Hebing123/cve/issues/13
2,079,360,954
13
CVE-2024-24131
2024-02-07T14:15:52.770
SuperWebMailer v9.31.0.01799 was discovered to contain a reflected cross-site scripting (XSS) vulenrability via the component api.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Hebing123/cve/issues/14" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:superwebmailer:superwebmailer:9.31.0.01799:*:*:*:*:*:*:*", "matchCriteriaId": "E69A9B02-9E6A-421A-8E38-9A315640DD73", "versionEndExcluding": null, "versionEndIncluding": null, ...
https://github.com/Hebing123/cve/issues/14
[ "Exploit", "Issue Tracking" ]
github.com
[ "Hebing123", "cve" ]
### **Summary** SuperWebMailer 9.31.0.01799 has a reflective cross-site vulnerability. ### **Details** SuperWebMailer in version 9.31.0.01799 has a reflection cross-site attack vulnerability caused by api.php directly referencing urls without filtering. ### **Proof of Concept (POC)** http://ip:port/api/api.php/%3...
SuperWebMailer 9.31.0.01799 has a reflective XSS vulnerability
https://api.github.com/repos/Hebing123/cve/issues/14/comments
1
2024-01-12T18:45:40Z
2024-03-11T06:20:34Z
https://github.com/Hebing123/cve/issues/14
2,079,480,963
14
CVE-2024-24133
2024-02-07T14:15:52.820
Atmail v6.6.0 was discovered to contain a SQL injection vulnerability via the username parameter on the login page.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/16" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atmail:atmail:6.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F9DFF09-D9A8-46F7-A466-6C538C591651", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/Hebing123/cve/issues/16
[ "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
### **Summary** On January 12, we discovered that atmail 6.6.0 and atmail 6.3.0 weretested for SQL injection vulnerabilities that could be larger than 6.6.0. The username parameter during admin login is at risk of SQL injection. ### **Details** We can prove this with delayed SQL injection, which we have tes...
SQL Injection Vulnerability in Atmail 6.6.0
https://api.github.com/repos/Hebing123/cve/issues/16/comments
2
2024-01-16T06:20:56Z
2024-03-11T06:17:35Z
https://github.com/Hebing123/cve/issues/16
2,083,096,416
16
CVE-2024-24186
2024-02-07T14:15:52.870
Jsish v3.5.0 (commit 42c694c) was discovered to contain a stack-overflow via the component IterGetKeysCallback at /jsish/src/jsiValue.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/98" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/98
[ "Exploit", "Vendor Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f Version: v3.5.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh export JSI__SANITIZE=1 make ``` ###### Test case <details><summary>testcase<...
stack-overflow ./jsish/src/jsiValue.c:1451 in IterGetKeysCallback
https://api.github.com/repos/pcmacdon/jsish/issues/98/comments
0
2024-01-14T11:31:14Z
2024-01-14T11:31:14Z
https://github.com/pcmacdon/jsish/issues/98
2,080,689,779
98
CVE-2024-24188
2024-02-07T14:15:52.917
Jsish v3.5.0 was discovered to contain a heap-buffer-overflow in ./src/jsiUtils.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/100" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/100
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f Version: v3.5.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh export JSI__SANITIZE=1 make ``` ###### Test case <details><summary>testcase<...
heap-buffer-overflow in ./jsish/src/jsiUtils.c
https://api.github.com/repos/pcmacdon/jsish/issues/100/comments
0
2024-01-20T05:53:20Z
2024-01-20T05:53:20Z
https://github.com/pcmacdon/jsish/issues/100
2,091,916,967
100
CVE-2024-24189
2024-02-07T14:15:52.967
Jsish v3.5.0 (commit 42c694c) was discovered to contain a use-after-free via the SplitChar at ./src/jsiUtils.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/101" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/101
[ "Vendor Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f Version: v3.5.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh export JSI__SANITIZE=1 make ``` ###### Test case <details><summary>testcase<...
heap-use-after-free ./jsish/src/jsiUtils.c:2060:17 in SplitChar
https://api.github.com/repos/pcmacdon/jsish/issues/101/comments
0
2024-01-20T05:58:02Z
2024-01-20T05:58:02Z
https://github.com/pcmacdon/jsish/issues/101
2,091,919,351
101
CVE-2024-24113
2024-02-08T13:15:09.807
xxl-job =< 2.4.1 has a Server-Side Request Forgery (SSRF) vulnerability, which causes low-privileged users to control executor to RCE.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xuxueli/xxl-job/issues/3375" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xuxueli:xxl-job:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C421D48-E483-44C2-A4A9-F0FBC31E17C7", "versionEndExcluding": null, "versionEndIncluding": "2.4.1", "versionStartExcludi...
https://github.com/xuxueli/xxl-job/issues/3375
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xuxueli", "xxl-job" ]
### Which version of XXL-JOB do you using? 2.4.1(latest) ### vulnerability description XXL-JOB is a distributed task scheduling platform based on java language in the XXL (XXL-JOB) community. There is an SSRF vulnerability in xxl-job-2.4.1/xxl-job-admin/src/main/java/com/xxl/job/admin/controller/JobInfoController...
xxl-job =< 2.4.1 version has SSRF vulnerability, which causes low-privileged users to control executor to RCE
https://api.github.com/repos/xuxueli/xxl-job/issues/3375/comments
1
2024-01-11T12:24:35Z
2024-04-17T08:45:56Z
https://github.com/xuxueli/xxl-job/issues/3375
2,076,500,051
3,375
CVE-2024-25451
2024-02-09T15:15:09.143
Bento4 v1.6.0-640 was discovered to contain an out-of-memory bug via the AP4_DataBuffer::ReallocateBuffer() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/872" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/872
[ "Exploit", "Issue Tracking" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, Thanks for fixing the issue #741, but still there is out-of-memory bug in the latest version (1.6.0-640) of multiple programs because of the function AP4_DataBuffer::ReallocateBuffer() at Ap4DataBuffer.cpp:210. We observed the same bug in mp4info, mp42aac, mp42avc, mp4decrypt, and mp4dump with the same root c...
Out-of-memory bug from AP4_DataBuffer::ReallocateBuffer() in multiple programs (v1.6.0-640)
https://api.github.com/repos/axiomatic-systems/Bento4/issues/872/comments
2
2023-06-12T09:44:14Z
2024-02-17T17:35:35Z
https://github.com/axiomatic-systems/Bento4/issues/872
1,752,341,840
872
CVE-2024-25452
2024-02-09T15:15:09.193
Bento4 v1.6.0-640 was discovered to contain an out-of-memory bug via the AP4_UrlAtom::AP4_UrlAtom() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/873" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/873
[ "Exploit", "Issue Tracking" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, There is another out-of-memory bug in the latest version (1.6.0-640) of mp4info because of the function AP4_UrlAtom::AP4_UrlAtom() at Ap4UrlAtom.cpp:71. Unlike the issue #771, this vunerability happened in the different function AP4_UrlAtom::AP4_UrlAtom(). Here is the output of program with address saniti...
Out-of-memory bug from AP4_UrlAtom::AP4_UrlAtom() in v1.6.0-640
https://api.github.com/repos/axiomatic-systems/Bento4/issues/873/comments
1
2023-06-12T10:03:27Z
2024-02-20T02:41:04Z
https://github.com/axiomatic-systems/Bento4/issues/873
1,752,379,751
873
CVE-2024-25453
2024-02-09T15:15:09.240
Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_StszAtom::GetSampleSize() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/204" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bent...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/204
[ "Exploit", "Issue Tracking" ]
github.com
[ "axiomatic-systems", "Bento4" ]
On master compiled on 2017-09-10 (but please confirm if this affects current stable): ``` # mp4compact $FILE out.mp4 ASAN:DEADLYSIGNAL ================================================================= ==156195==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000060a4b3 bp 0x7ffed6dd9e30 s...
NULL pointer dereference in AP4_StszAtom::GetSampleSize (Ap4StszAtom.cpp)
https://api.github.com/repos/axiomatic-systems/Bento4/issues/204/comments
0
2017-09-15T07:10:24Z
2017-12-17T00:59:26Z
https://github.com/axiomatic-systems/Bento4/issues/204
257,947,117
204
CVE-2024-25453
2024-02-09T15:15:09.240
Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_StszAtom::GetSampleSize() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/204" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bent...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/874
[ "Exploit", "Issue Tracking" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, There still exists the null pointer reference bug in the latest version (1.6.0-640) of mp4info by the function AP4_StszAtom::GetSampleSize(). Here is the output of program with address sanitizer attached. ### Bug Report File: major brand: isom minor version: 200 compatible brand: isom ...
NULL pointer reference from AP4_StszAtom::GetSampleSize() in v1.6.0-640
https://api.github.com/repos/axiomatic-systems/Bento4/issues/874/comments
1
2023-06-12T10:08:57Z
2024-02-17T17:33:31Z
https://github.com/axiomatic-systems/Bento4/issues/874
1,752,392,145
874
CVE-2024-25454
2024-02-09T15:15:09.293
Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_DescriptorFinder::Test() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/875" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/875
[ "Exploit", "Issue Tracking" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, There still exists the null pointer reference bug in the latest version (1.6.0-640) of mp4info by the function AP4_DescriptorFinder::Test(). Here is the output of program with address sanitizer attached. ### Bug Report File: major brand: isom minor version: 200 compatible brand: isom c...
NULL pointer reference from AP4_DescriptorFinder::Test() in v1.6.0-640
https://api.github.com/repos/axiomatic-systems/Bento4/issues/875/comments
1
2023-06-12T10:12:34Z
2024-02-17T17:30:47Z
https://github.com/axiomatic-systems/Bento4/issues/875
1,752,398,555
875
CVE-2024-24146
2024-02-29T01:44:11.657
A memory leak issue discovered in parseSWF_DEFINEBUTTON in libming v0.4.8 allows attackers to cause s denial of service via a crafted SWF file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/307" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/libming/libming/issues/307
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
### Envrionment ```bash ubuntu  ~/lab/libming/util   master  lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 22.04.2 LTS Release: 22.04 Codename: jammy ``` ### Compiler ```bash ubuntu  ~/lab/libming/util   master  clang -v Ubuntu clang vers...
Memory leaks on parseSWF_DEFINEBUTTON
https://api.github.com/repos/libming/libming/issues/307/comments
1
2024-01-12T22:46:35Z
2024-02-21T22:35:18Z
https://github.com/libming/libming/issues/307
2,079,829,395
307
CVE-2024-24147
2024-02-29T01:44:11.693
A memory leak issue discovered in parseSWF_FILLSTYLEARRAY in libming v0.4.8 allows attackers to cause s denial of service via a crafted SWF file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/311" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/libming/libming/issues/311
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
### Envrionment ```bash ubuntu  ~/lab/libming/util   master  lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 22.04.2 LTS Release: 22.04 Codename: jammy ``` ### Compiler ```bash ubuntu  ~/lab/libming/util   master  clang -v Ubuntu clang vers...
Memory leaks on parseSWF_FILLSTYLEARRAY
https://api.github.com/repos/libming/libming/issues/311/comments
1
2024-01-13T00:00:25Z
2024-02-21T22:33:33Z
https://github.com/libming/libming/issues/311
2,079,901,582
311
CVE-2024-24149
2024-02-29T01:44:11.737
A memory leak issue discovered in parseSWF_GLYPHENTRY in libming v0.4.8 allows attackers to cause a denial of service via a crafted SWF file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/310" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/libming/libming/issues/310
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
### Envrionment ```bash ubuntu  ~/lab/libming/util   master  lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 22.04.2 LTS Release: 22.04 Codename: jammy ``` ### Compiler ```bash ubuntu  ~/lab/libming/util   master  clang -v Ubuntu clang vers...
Memory leaks on parseSWF_GLYPHENTRY
https://api.github.com/repos/libming/libming/issues/310/comments
1
2024-01-12T23:51:34Z
2024-02-21T22:35:36Z
https://github.com/libming/libming/issues/310
2,079,896,237
310
CVE-2024-24150
2024-02-29T01:44:11.777
A memory leak issue discovered in parseSWF_TEXTRECORD in libming v0.4.8 allows attackers to cause a denial of service via a crafted SWF file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/309" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/libming/libming/issues/309
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
### Envrionment ```bash ubuntu  ~/lab/libming/util   master  lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 22.04.2 LTS Release: 22.04 Codename: jammy ``` ### Compiler ```bash ubuntu  ~/lab/libming/util   master  clang -v Ubuntu clang vers...
Memory leaks on parseSWF_TEXTRECORD
https://api.github.com/repos/libming/libming/issues/309/comments
1
2024-01-12T23:44:59Z
2024-02-21T22:47:44Z
https://github.com/libming/libming/issues/309
2,079,890,770
309