Skip to content

Commit

Permalink
Update Sun Mar 2 12:21:23 UTC 2025
Browse files Browse the repository at this point in the history
  • Loading branch information
trickest-workflows committed Mar 2, 2025
1 parent aa55ff1 commit b72c5ee
Show file tree
Hide file tree
Showing 8 changed files with 110 additions and 0 deletions.
17 changes: 17 additions & 0 deletions 2004/CVE-2004-0110.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2004-0110](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0110)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description

Buffer overflow in the (1) nanohttp or (2) nanoftp modules in XMLSoft Libxml 2 (Libxml2) 2.6.0 through 2.6.5 allow remote attackers to execute arbitrary code via a long URL.

### POC

#### Reference
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A833

#### Github
No PoCs found on GitHub currently.

17 changes: 17 additions & 0 deletions 2007/CVE-2007-4070.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2007-4070](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4070)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description

Unspecified vulnerability in Low Bandwidth X proxy (lbxproxy) on Sun Solaris 8 through 10 before 20070725 allows local users to read arbitrary files with root group ownership via unknown vectors.

### POC

#### Reference
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8334

#### Github
No PoCs found on GitHub currently.

1 change: 1 addition & 0 deletions 2009/CVE-2009-3877.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@ Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JD

#### Reference
- http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8330

#### Github
No PoCs found on GitHub currently.
Expand Down
17 changes: 17 additions & 0 deletions 2018/CVE-2018-19490.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2018-19490](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19490)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description

An issue was discovered in datafile.c in Gnuplot 5.2.5. This issue allows an attacker to conduct a heap-based buffer overflow with an arbitrary amount of data in df_generate_ascii_array_entry. To exploit this vulnerability, an attacker must pass an overlong string as the right bound of the range argument that is passed to the plot function.

### POC

#### Reference
- https://sourceforge.net/p/gnuplot/gnuplot-main/ci/d5020716834582b20a5e12cdd49f39ee4f9dd949/

#### Github
No PoCs found on GitHub currently.

17 changes: 17 additions & 0 deletions 2018/CVE-2018-19491.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2018-19491](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19491)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description

An issue was discovered in post.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the PS_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot postscript terminal is used as a backend.

### POC

#### Reference
- https://sourceforge.net/p/gnuplot/gnuplot-main/ci/d5020716834582b20a5e12cdd49f39ee4f9dd949/

#### Github
No PoCs found on GitHub currently.

17 changes: 17 additions & 0 deletions 2018/CVE-2018-19492.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2018-19492](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19492)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description

An issue was discovered in cairo.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the cairotrm_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot pngcairo terminal is used as a backend.

### POC

#### Reference
- https://sourceforge.net/p/gnuplot/gnuplot-main/ci/d5020716834582b20a5e12cdd49f39ee4f9dd949/

#### Github
No PoCs found on GitHub currently.

17 changes: 17 additions & 0 deletions 2021/CVE-2021-46952.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2021-46952](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46952)
![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=9954bf92c0cd%3C%2096fa26b74cdc%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description

In the Linux kernel, the following vulnerability has been resolved:NFS: fs_context: validate UDP retrans to prevent shift out-of-boundsFix shift out-of-bounds in xprt_calc_majortimeo(). This is causedby a garbage timeout (retrans) mount option being passed to nfs mount,in this case from syzkaller.If the protocol is XPRT_TRANSPORT_UDP, then 'retrans' is a shiftvalue for a 64-bit long integer, so 'retrans' cannot be >= 64.If it is >= 64, fail the mount and return an error.

### POC

#### Reference
- https://git.kernel.org/stable/c/96fa26b74cdcf9f5c98996bf36bec9fb5b19ffe2

#### Github
No PoCs found on GitHub currently.

7 changes: 7 additions & 0 deletions references.txt
Original file line number Diff line number Diff line change
Expand Up @@ -780,6 +780,7 @@ CVE-2004-0092 - http://www.securityfocus.com/bid/9504
CVE-2004-0104 - http://www.kb.cert.org/vuls/id/518518
CVE-2004-0105 - http://www.kb.cert.org/vuls/id/513062
CVE-2004-0109 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A940
CVE-2004-0110 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A833
CVE-2004-0112 - http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml
CVE-2004-0112 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A928
CVE-2004-0112 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9580
Expand Down Expand Up @@ -8532,6 +8533,7 @@ CVE-2007-4065 - https://oval.cisecurity.org/repository/search/definition/oval%3A
CVE-2007-4067 - https://www.exploit-db.com/exploits/4226
CVE-2007-4068 - https://www.exploit-db.com/exploits/4224
CVE-2007-4069 - https://www.exploit-db.com/exploits/4225
CVE-2007-4070 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8334
CVE-2007-4071 - http://securityreason.com/securityalert/2946
CVE-2007-4093 - http://securityreason.com/securityalert/2931
CVE-2007-4094 - http://securityreason.com/securityalert/2932
Expand Down Expand Up @@ -17317,6 +17319,7 @@ CVE-2009-3874 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084
CVE-2009-3875 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html
CVE-2009-3876 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html
CVE-2009-3877 - http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html
CVE-2009-3877 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8330
CVE-2009-3878 - http://www.h-online.com/security/news/item/Alleged-critical-vulnerability-in-Sun-Java-System-Web-Server-839598.html
CVE-2009-3879 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9568
CVE-2009-3887 - http://ocert.org/advisories/ocert-2009-013.html
Expand Down Expand Up @@ -56845,6 +56848,9 @@ CVE-2018-19487 - https://github.com/Antho59/wp-jobhunt-exploit
CVE-2018-19487 - https://wpvulndb.com/vulnerabilities/9206
CVE-2018-19488 - https://github.com/Antho59/wp-jobhunt-exploit
CVE-2018-19488 - https://wpvulndb.com/vulnerabilities/9206
CVE-2018-19490 - https://sourceforge.net/p/gnuplot/gnuplot-main/ci/d5020716834582b20a5e12cdd49f39ee4f9dd949/
CVE-2018-19491 - https://sourceforge.net/p/gnuplot/gnuplot-main/ci/d5020716834582b20a5e12cdd49f39ee4f9dd949/
CVE-2018-19492 - https://sourceforge.net/p/gnuplot/gnuplot-main/ci/d5020716834582b20a5e12cdd49f39ee4f9dd949/
CVE-2018-19493 - https://gitlab.com/gitlab-org/gitlab-ce/issues/53037
CVE-2018-19495 - https://gitlab.com/gitlab-org/gitlab-ee/issues/8167
CVE-2018-19497 - https://github.com/sleuthkit/sleuthkit/pull/1374
Expand Down Expand Up @@ -86189,6 +86195,7 @@ CVE-2021-46850 - https://www.exploit-db.com/exploits/49674
CVE-2021-46888 - https://www.youtube.com/watch?v=QnRO-VkfIic
CVE-2021-46889 - https://packetstormsecurity.com/files/162227/WordPress-Photo-Gallery-1.5.69-Cross-Site-Scripting.html
CVE-2021-46898 - https://github.com/sehmaschine/django-grappelli/issues/975
CVE-2021-46952 - https://git.kernel.org/stable/c/96fa26b74cdcf9f5c98996bf36bec9fb5b19ffe2
CVE-2021-47607 - https://git.kernel.org/stable/c/a82fe085f344ef20b452cd5f481010ff96b5c4cd
CVE-2021-47607 - https://git.kernel.org/stable/c/f87a6c160ecc8c7b417d25f508d3f076fe346136
CVE-2022-0001 - https://www.kb.cert.org/vuls/id/155143
Expand Down

0 comments on commit b72c5ee

Please sign in to comment.