mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2020/11/13 00:09:10
This commit is contained in:
parent
f41d5f9e28
commit
06ff607a4e
26 changed files with 235 additions and 85 deletions
|
@ -59,7 +59,7 @@
|
|||
"description": "An exploit for CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2015-09-10T23:00:59Z",
|
||||
"updated_at": "2020-09-09T16:16:48Z",
|
||||
"updated_at": "2020-11-12T10:10:45Z",
|
||||
"pushed_at": "2015-09-10T23:01:09Z",
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
|
|
|
@ -82,7 +82,7 @@
|
|||
"description": "PoC code for 32 bit Android OS",
|
||||
"fork": false,
|
||||
"created_at": "2015-09-12T01:31:36Z",
|
||||
"updated_at": "2020-10-12T09:52:11Z",
|
||||
"updated_at": "2020-11-12T10:10:34Z",
|
||||
"pushed_at": "2015-12-15T05:42:02Z",
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-16T00:23:30Z",
|
||||
"updated_at": "2020-03-29T08:18:39Z",
|
||||
"updated_at": "2020-11-12T13:12:48Z",
|
||||
"pushed_at": "2017-12-16T00:39:19Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2020-03-23T15:56:02Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2018-09-04T21:35:36Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-10T03:44:04Z",
|
||||
"updated_at": "2020-09-23T11:03:49Z",
|
||||
"updated_at": "2020-11-12T10:36:38Z",
|
||||
"pushed_at": "2017-04-12T09:17:27Z",
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"forks_count": 81,
|
||||
"forks": 81,
|
||||
"watchers": 170,
|
||||
"watchers": 171,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2017-03-09T19:50:50Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "海康威视未授权访问检测poc及口令爆破",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-12T09:02:10Z",
|
||||
"updated_at": "2020-11-12T09:02:15Z",
|
||||
"pushed_at": "2020-11-12T09:02:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"updated_at": "2020-11-12T11:53:42Z",
|
||||
"pushed_at": "2020-11-12T09:33:24Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -473,8 +473,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-18T14:01:59Z",
|
||||
"updated_at": "2020-11-12T02:52:44Z",
|
||||
"pushed_at": "2020-11-12T02:52:42Z",
|
||||
"updated_at": "2020-11-12T12:21:51Z",
|
||||
"pushed_at": "2020-11-12T12:21:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-12T22:53:14Z",
|
||||
"updated_at": "2020-10-27T13:33:49Z",
|
||||
"updated_at": "2020-11-12T11:45:52Z",
|
||||
"pushed_at": "2019-03-13T07:11:23Z",
|
||||
"stargazers_count": 440,
|
||||
"watchers_count": 440,
|
||||
"stargazers_count": 441,
|
||||
"watchers_count": 441,
|
||||
"forks_count": 145,
|
||||
"forks": 145,
|
||||
"watchers": 440,
|
||||
"watchers": 441,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2047,
|
||||
"watchers_count": 2047,
|
||||
"forks_count": 546,
|
||||
"forks": 546,
|
||||
"forks_count": 545,
|
||||
"forks": 545,
|
||||
"watchers": 2047,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-01-18T07:01:29Z",
|
||||
"stargazers_count": 352,
|
||||
"watchers_count": 352,
|
||||
"forks_count": 114,
|
||||
"forks": 114,
|
||||
"forks_count": 113,
|
||||
"forks": 113,
|
||||
"watchers": 352,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "Test a host for susceptibility to CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T00:26:16Z",
|
||||
"updated_at": "2020-10-23T20:03:04Z",
|
||||
"updated_at": "2020-11-12T11:23:32Z",
|
||||
"pushed_at": "2020-10-23T19:35:42Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 98,
|
||||
"watchers": 99,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-02-25T07:37:07Z",
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"watchers": 134,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2020-11-09T17:44:53Z",
|
||||
"updated_at": "2020-11-12T13:58:04Z",
|
||||
"pushed_at": "2020-10-21T12:10:28Z",
|
||||
"stargazers_count": 1182,
|
||||
"watchers_count": 1182,
|
||||
"stargazers_count": 1183,
|
||||
"watchers_count": 1183,
|
||||
"forks_count": 267,
|
||||
"forks": 267,
|
||||
"watchers": 1182,
|
||||
"watchers": 1183,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2020-11-11T15:44:42Z",
|
||||
"updated_at": "2020-11-12T14:01:25Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 694,
|
||||
"watchers_count": 694,
|
||||
"stargazers_count": 695,
|
||||
"watchers_count": 695,
|
||||
"forks_count": 201,
|
||||
"forks": 201,
|
||||
"watchers": 694,
|
||||
"watchers": 695,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -266,13 +266,13 @@
|
|||
"description": "Ladon Moudle CVE-2020-1472 Exploit 域控提权神器",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-15T16:10:21Z",
|
||||
"updated_at": "2020-11-08T11:21:47Z",
|
||||
"updated_at": "2020-11-12T14:04:11Z",
|
||||
"pushed_at": "2020-09-15T16:40:53Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2047,
|
||||
"watchers_count": 2047,
|
||||
"forks_count": 546,
|
||||
"forks": 546,
|
||||
"forks_count": 545,
|
||||
"forks": 545,
|
||||
"watchers": 2047,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020–14882、CVE-2020–14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T11:43:37Z",
|
||||
"updated_at": "2020-11-11T07:10:25Z",
|
||||
"updated_at": "2020-11-12T14:47:52Z",
|
||||
"pushed_at": "2020-11-04T02:26:59Z",
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 153,
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 164,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -381,13 +381,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-09T08:03:44Z",
|
||||
"updated_at": "2020-11-12T06:23:26Z",
|
||||
"updated_at": "2020-11-12T10:07:30Z",
|
||||
"pushed_at": "2020-11-12T06:23:23Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2020/CVE-2020-15228.json
Normal file
25
2020/CVE-2020-15228.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 312263531,
|
||||
"name": "fix-CVE-2020-15228",
|
||||
"full_name": "guettli\/fix-CVE-2020-15228",
|
||||
"owner": {
|
||||
"login": "guettli",
|
||||
"id": 414336,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/414336?v=4",
|
||||
"html_url": "https:\/\/github.com\/guettli"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/guettli\/fix-CVE-2020-15228",
|
||||
"description": "Fix CVE-2020-15228 (set-env, add-path in Github-Actions)",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-12T11:59:47Z",
|
||||
"updated_at": "2020-11-12T15:02:45Z",
|
||||
"pushed_at": "2020-11-12T15:02:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-15999",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T16:16:25Z",
|
||||
"updated_at": "2020-11-11T03:47:51Z",
|
||||
"updated_at": "2020-11-12T09:46:24Z",
|
||||
"pushed_at": "2020-11-03T17:53:20Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-16126.json
Normal file
25
2020/CVE-2020-16126.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 312235133,
|
||||
"name": "Ubuntu-Gnome-privilege-escalation",
|
||||
"full_name": "zev3n\/Ubuntu-Gnome-privilege-escalation",
|
||||
"owner": {
|
||||
"login": "zev3n",
|
||||
"id": 31406753,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/31406753?v=4",
|
||||
"html_url": "https:\/\/github.com\/zev3n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zev3n\/Ubuntu-Gnome-privilege-escalation",
|
||||
"description": "A bash script exploit of [CVE-2020-16126\/CVE-2020-16127] to achieve privilege escalation.",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-12T09:58:42Z",
|
||||
"updated_at": "2020-11-12T10:34:58Z",
|
||||
"pushed_at": "2020-11-12T10:24:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC exploits for CVE-2020-17382",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-17T18:26:32Z",
|
||||
"updated_at": "2020-11-09T11:40:46Z",
|
||||
"updated_at": "2020-11-12T14:57:06Z",
|
||||
"pushed_at": "2020-10-02T18:45:43Z",
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 97,
|
||||
"watchers": 98,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-2020.json
Normal file
25
2020/CVE-2020-2020.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 312256179,
|
||||
"name": "CVE-2020-2020-14882",
|
||||
"full_name": "x51\/CVE-2020-2020-14882",
|
||||
"owner": {
|
||||
"login": "x51",
|
||||
"id": 45651912,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/45651912?v=4",
|
||||
"html_url": "https:\/\/github.com\/x51"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/x51\/CVE-2020-2020-14882",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-12T11:27:39Z",
|
||||
"updated_at": "2020-11-12T12:16:35Z",
|
||||
"pushed_at": "2020-11-12T12:26:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-28414.json
Normal file
25
2020/CVE-2020-28414.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 312285919,
|
||||
"name": "CVE-2020-28414",
|
||||
"full_name": "jet-pentest\/CVE-2020-28414",
|
||||
"owner": {
|
||||
"login": "jet-pentest",
|
||||
"id": 71512502,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/71512502?v=4",
|
||||
"html_url": "https:\/\/github.com\/jet-pentest"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jet-pentest\/CVE-2020-28414",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-12T13:31:50Z",
|
||||
"updated_at": "2020-11-12T13:32:04Z",
|
||||
"pushed_at": "2020-11-12T13:32:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-28415.json
Normal file
25
2020/CVE-2020-28415.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 312286062,
|
||||
"name": "CVE-2020-28415",
|
||||
"full_name": "jet-pentest\/CVE-2020-28415",
|
||||
"owner": {
|
||||
"login": "jet-pentest",
|
||||
"id": 71512502,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/71512502?v=4",
|
||||
"html_url": "https:\/\/github.com\/jet-pentest"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jet-pentest\/CVE-2020-28415",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-12T13:32:23Z",
|
||||
"updated_at": "2020-11-12T13:32:34Z",
|
||||
"pushed_at": "2020-11-12T13:32:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-05-10T09:29:36Z",
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 163,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T07:40:51Z",
|
||||
"updated_at": "2020-11-10T15:40:43Z",
|
||||
"updated_at": "2020-11-12T11:31:31Z",
|
||||
"pushed_at": "2020-04-16T08:38:42Z",
|
||||
"stargazers_count": 224,
|
||||
"watchers_count": 224,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"watchers": 224,
|
||||
"stargazers_count": 225,
|
||||
"watchers_count": 225,
|
||||
"forks_count": 54,
|
||||
"forks": 54,
|
||||
"watchers": 225,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Original Metasploit PR module: https:\/\/github.com\/rapid7\/metasploit-framework\/pull\/13852\/commits\/d1e2c75b3eafa7f62a6aba9fbe6220c8da97baa8 This PoC only create user with unauthentication permission and no more administrator permission set. This project is created only for educational purposes and cannot be used for law violation or personal gain. The author of this project is not responsible for any possible harm caused by the materials of this project. Original finding: CVE-2020-6287: Pablo Artuso CVE-2020-6286: Yvan 'iggy' G. Usage: python sap-CVE-2020-6287-add-user.py <HTTP(s):\/\/IP:Port",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-20T18:45:53Z",
|
||||
"updated_at": "2020-11-05T07:49:02Z",
|
||||
"updated_at": "2020-11-12T09:29:22Z",
|
||||
"pushed_at": "2020-07-21T18:50:07Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 68,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
README.md
25
README.md
|
@ -645,6 +645,9 @@ A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and
|
|||
|
||||
- [wuzuowei/CVE-2020-1983](https://github.com/wuzuowei/CVE-2020-1983)
|
||||
|
||||
### CVE-2020-2020
|
||||
- [x51/CVE-2020-2020-14882](https://github.com/x51/CVE-2020-2020-14882)
|
||||
|
||||
### CVE-2020-2034 (2020-07-08)
|
||||
|
||||
<code>
|
||||
|
@ -2368,6 +2371,14 @@ Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerab
|
|||
- [Langriklol/CVE-2020-15227](https://github.com/Langriklol/CVE-2020-15227)
|
||||
- [hu4wufu/CVE-2020-15227](https://github.com/hu4wufu/CVE-2020-15227)
|
||||
|
||||
### CVE-2020-15228 (2020-10-01)
|
||||
|
||||
<code>
|
||||
In the `@actions/core` npm module before version 1.2.6,`addPath` and `exportVariable` functions communicate with the Actions Runner over stdout by generating a string in a specific format. Workflows that log untrusted data to stdout may invoke these commands, resulting in the path or environment variables being modified without the intention of the workflow or action author. The runner will release an update that disables the `set-env` and `add-path` workflow commands in the near future. For now, users should upgrade to `@actions/core v1.2.6` or later, and replace any instance of the `set-env` or `add-path` commands in their workflows with the new Environment File Syntax. Workflows and actions using the old commands or older versions of the toolkit will start to warn, then error out during workflow execution.
|
||||
</code>
|
||||
|
||||
- [guettli/fix-CVE-2020-15228](https://github.com/guettli/fix-CVE-2020-15228)
|
||||
|
||||
### CVE-2020-15367 (2020-07-07)
|
||||
|
||||
<code>
|
||||
|
@ -2443,6 +2454,14 @@ Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed
|
|||
|
||||
- [marcinguy/CVE-2020-15999](https://github.com/marcinguy/CVE-2020-15999)
|
||||
|
||||
### CVE-2020-16126 (2020-11-10)
|
||||
|
||||
<code>
|
||||
An Ubuntu-specific modification to AccountsService in versions before 0.6.55-0ubuntu13.2, among other earlier versions, improperly dropped the ruid, allowing untrusted users to send signals to AccountService, thus stopping it from handling D-Bus messages in a timely fashion.
|
||||
</code>
|
||||
|
||||
- [zev3n/Ubuntu-Gnome-privilege-escalation](https://github.com/zev3n/Ubuntu-Gnome-privilege-escalation)
|
||||
|
||||
### CVE-2020-16152
|
||||
- [eriknl/CVE-2020-16152](https://github.com/eriknl/CVE-2020-16152)
|
||||
|
||||
|
@ -2865,6 +2884,12 @@ The conferencing component on Mitel ShoreTel 19.46.1802.0 devices could allow an
|
|||
|
||||
- [dievus/CVE-2020-28351](https://github.com/dievus/CVE-2020-28351)
|
||||
|
||||
### CVE-2020-28414
|
||||
- [jet-pentest/CVE-2020-28414](https://github.com/jet-pentest/CVE-2020-28414)
|
||||
|
||||
### CVE-2020-28415
|
||||
- [jet-pentest/CVE-2020-28415](https://github.com/jet-pentest/CVE-2020-28415)
|
||||
|
||||
### CVE-2020-72381
|
||||
- [jdordonezn/CVE-2020-72381](https://github.com/jdordonezn/CVE-2020-72381)
|
||||
|
||||
|
|
Loading…
Reference in a new issue