Daniel
33 exploits
Active since Jun 2020
SiYuan: Incomplete Fix Bypass for CVE-2026-30869: Path Traversal via Double URL Encoding in `/export/` Endpoint
SiYuan: Incomplete sanitization of bazaar README allows stored XSS via iframe srcdoc (incomplete fix for CVE-2026-33066)
CVSS 5.4
SiYuan has an Unauthenticated Arbitrary File Read via Path Traversal
CVSS 7.5
SiYuan has Stored XSS to RCE via Unsanitized Bazaar README Rendering
CVSS 9.0
SiYuan: Authorization Bypass Allows Arbitrary SQL Execution via Search API
CVSS 9.8
SiYuan has an Arbitrary File Read in its Desktop Publish Service
CVSS 9.9
SiYuan has a SanitizeSVG bypass via data:text/xml in getDynamicIcon (incomplete fix for CVE-2026-29183)
CVSS 9.3
SiYuan: Incomplete sensitive path blocklist in globalCopyFiles allows reading /proc and Docker secrets
CVSS 6.8
SiYuan importSY/importZipMd: Path Traversal via multipart filename enables arbitrary file write
CVSS 7.6
SiYuan importStdMd: unvalidated localPath imports arbitrary host directories as persistent notes
CVSS 6.8
SiYuan Vulnerable to Remote Code Execution via Stored XSS in Notebook Name - Mobile Interface
SiYuan: Cross-Origin WebSocket Hijacking via Authentication Bypass — Unauthenticated Information Disclosure
IOBit Advanced SystemCare Free <13.5.0.263 - Privilege Escalation
CVSS 7.1
AVideo <8.9 - Info Disclosure
CVSS 7.5
Wwbn Avideo < 11.6 - XSS
CVSS 6.1
Wwbn Avideo < 11.6 - Open Redirect
CVSS 6.1
Wwbn Avideo < 12.4 - XSS
CVSS 6.1
Tumult Hype Animations <1.9.15 - RCE
CVSS 9.9
B3log Siyuan - Path Traversal
CVSS 7.5
B3log Siyuan - Path Traversal
CVSS 7.5
B3log Siyuan - Path Traversal
CVSS 5.4
SiYuan <3.1.16 - SSRF
CVSS 9.8
SiYuan Note <3.1.18 - File Deletion
CVSS 9.1
DNN - Info Disclosure
CVSS 4.2
DNN - Info Disclosure
CVSS 4.3