Get a Pentest and security assessment of your IT network.

2021-current

CVE-2019-6986 – SPARQL Injection in VIVO Vitro v1.10.0 allows a remote attacker to execut

SPARQL Injection in VIVO Vitro v1.10.0 allows a remote attacker to execute arbitrary SPARQL via the uri parameter, leading to a regular expression denial of service (ReDoS), as demonstrated by crafted use of FILTER%20regex in a /individual?uri= request.

 

Source: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6986

Reference (s):

  • https://github.com/kevinbackhouse/SecurityExploits/tree/0ec74459ac53685a7959ed58d580ef8abece3685/vivo-project
  • https://github.com/vivo-project/Vitro/pull/111
Related posts
2021-current

CVE-2004-1715 - Directory traversal vulnerability in MIMEsweeper for Web before 5.0.4 all

2021-current

CVE-2020-25058 - An issue was discovered on LG mobile devices with Android OS 8.0, 8.1, 9,

2021-current

CVE-2014-9236 - Cross-site scripting (XSS) vulnerability in php/edit_photos.php in Zoph (

2021-current

CVE-2020-0829 - A remote code execution vulnerability exists in the way that the ChakraCo