Skip to content
This repository has been archived by the owner on Oct 16, 2024. It is now read-only.

Commit

Permalink
Update cvex_v2.json
Browse files Browse the repository at this point in the history
  • Loading branch information
racheljiang310 authored Jun 7, 2024
1 parent de4c993 commit 848c413
Showing 1 changed file with 7 additions and 7 deletions.
14 changes: 7 additions & 7 deletions data/cvex_data/cvex_v2.json
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
"authors":["racheljiang310"],
"version": 2.0,
"domain": "ghcr.io/ucsb-seclab",
"link": "https:/ucsb-seclab/cvex-xplor/blob/main/compose-files/cvex-xplor.docker-compose.yml",
"link": "https:/ucsb-seclab/xplor-cvex/blob/main/data/cvex_data/compose-files/cvex-xplor.docker-compose.yml",
"images": ["demo/client", "demo/server", "demo/listener"],
"description": "A Proof of Concept Demonstration of our CVEX model/framework",
"page": "/CVEX-XPLOR/"
Expand All @@ -17,7 +17,7 @@
"authors":["racheljiang310"],
"version": 2.0,
"domain": "ghcr.io/ucsb-seclab",
"link": "https:/ucsb-seclab/cvex-xplor/blob/main/CVEX-2017-1000499/docker-compose.yml",
"link": "https:/ucsb-seclab/xplor-cvex/blob/main/data/cvex_data/compose-files/cvex-2017-1000499.docker-compose.yml",
"images": ["cvex-2017-1000499/client", "cvex-2017-1000499/server", "cvex-2017-1000499/db", "cvex-2017-1000499/listener"],
"description": "phpMyAdmin versions 4.7.x (prior to 4.7.6.1/4.7.7) are vulnerable to a CSRF weakness. By deceiving a user to click on a crafted URL, it is possible to perform harmful database operations such as deleting records, dropping/truncating tables etc.",
"page": "/CVEX-2017-1000499/"
Expand All @@ -28,7 +28,7 @@
"authors":["racheljiang310"],
"version": 2.0,
"domain": "ghcr.io/ucsb-seclab",
"link": "https:/ucsb-seclab/cvex-xplor/blob/main/CVEX-2023-28155/docker-compose.yml",
"link": "https:/ucsb-seclab/xplor-cvex/blob/main/data/cvex_data/compose-files/CVEX-2023-28155.docker-compose.yml",
"images": ["cvex-2023-28155/listener", "cvex-2023-28155/client", "cvex-2023-28155/bad_server", "cvex-2023-28155/php_server"],
"description": "The Request package through 2.88.1 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP). This vulnerability only affects products that are no longer supported by the maintainer.",
"page": "/CVEX-2023-28155/"
Expand All @@ -39,7 +39,7 @@
"authors":["racheljiang310"],
"version": 2.0,
"domain": "ghcr.io/ucsb-seclab",
"link": "https:/ucsb-seclab/cvex-xplor/blob/main/CVEX-2023-31419/docker-compose.yml",
"link": "https:/ucsb-seclab/xplor-cvex/blob/main/data/cvex_data/compose-files/CVEX-2023-31419.docker-compose.yml",
"images": ["cvex-2023-31419/client","cvex-2023-31419/server","cvex-2023-31419/listener"],
"description": "A flaw was discovered in Elasticsearch, affecting the _search API that allowed a specially crafted query string to cause a Stack Overflow and ultimately a Denial of Service.",
"page": "/CVEX-2023-31419/"
Expand All @@ -50,7 +50,7 @@
"authors":["racheljiang310"],
"version": 2.0,
"domain": "ghcr.io/ucsb-seclab",
"link":"https:/ucsb-seclab/cvex-xplor/blob/main/CVEX-2023-42282/docker-compose.yml",
"link":"https:/ucsb-seclab/xplor-cvex/blob/main/data/cvex_data/compose-files/CVEX-2023-42282.docker-compose.yml",
"images": ["cvex-2023-42282/client", "cvex-2023-42282/server", "cvex-2023-42282/listener"],
"description": "The ip package before 1.1.9 for Node.js might allow SSRF because some IP addresses (such as 0x7f.1) are improperly categorized as globally routable via isPublic.",
"page": "/CVEX-2023-42282/"
Expand All @@ -61,7 +61,7 @@
"authors":["racheljiang310"],
"version": 2.0,
"domain": "ghcr.io/ucsb-seclab",
"link": "https:/ucsb-seclab/cvex-xplor/blob/main/CVEX-2024-21508/docker-compose.yml",
"link": "https:/ucsb-seclab/xplor-cvex/blob/main/data/cvex_data/compose-files/CVEX-2024-21508.docker-compose.yml",
"images": ["cvex-2023-42282/client", "cvex-2023-42282/server", "cvex-2023-42282/listener"],
"description": "Found in versions of the mysql2 <= 3.9.4, this vulnerability allows for Remote Code Execution (RCE) through the readCodeFor function, due to improper validation of the supportBigNumbers and bigNumberStrings values. The potential impact includes high integrity and confidentiality impact, as well as high availability impact.",
"page": "/CVEX-2024-21508/"
Expand All @@ -72,7 +72,7 @@
"authors":["yarwinliu"],
"version": 2.0,
"domain": "ghcr.io/ucsb-seclab",
"link": "https:/ucsb-seclab/cvex-xplor/tree/main/CVEX-2023-0286",
"link": "https:/ucsb-seclab/xplor-cvex/blob/main/data/cvex_data/compose-files/CVEX-2023-0286.docker-compose.yml",
"images": ["cvex-2024-21508/listener", "cvex-2024-21508/server", "cvex-2024-21508/client"],
"description": "Clones openssl version 3.0.7, containing a vulnerability that attributes the wrong variable type (ASN1_TYPE rather than ASN1_STRING) to a x509 address, allowing elevation of privilege.",
"page": "/CVEX-2023-0286/"
Expand Down

0 comments on commit 848c413

Please sign in to comment.