Auto Update 2021/02/04 12:09:41

This commit is contained in:
motikan2010-bot 2021-02-04 12:09:41 +09:00
parent 9405a8aeb6
commit 2f45f57129
26 changed files with 184 additions and 142 deletions

View file

@ -13,13 +13,13 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2021-02-03T13:14:57Z",
"updated_at": "2021-02-03T23:57:06Z",
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 286,
"watchers_count": 286,
"stargazers_count": 285,
"watchers_count": 285,
"forks_count": 90,
"forks": 90,
"watchers": 286,
"watchers": 285,
"score": 0
},
{
@ -59,7 +59,7 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166) http:\/\/web.archive.org\/web\/20110723091928\/http:\/\/digitaloffense.net\/tools\/debian-openssl\/",
"fork": false,
"created_at": "2019-02-28T18:22:06Z",
"updated_at": "2021-02-03T14:55:26Z",
"updated_at": "2021-02-03T21:34:29Z",
"pushed_at": "2019-02-28T18:30:21Z",
"stargazers_count": 2,
"watchers_count": 2,

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-03T09:22:03Z",
"updated_at": "2021-02-04T02:56:24Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 911,
"watchers_count": 911,
"stargazers_count": 912,
"watchers_count": 912,
"forks_count": 216,
"forks": 216,
"watchers": 911,
"watchers": 912,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-03T09:22:03Z",
"updated_at": "2021-02-04T02:56:24Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 911,
"watchers_count": 911,
"stargazers_count": 912,
"watchers_count": 912,
"forks_count": 216,
"forks": 216,
"watchers": 911,
"watchers": 912,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
"updated_at": "2021-02-03T16:03:44Z",
"updated_at": "2021-02-04T00:53:51Z",
"pushed_at": "2021-02-03T16:03:40Z",
"stargazers_count": 857,
"watchers_count": 857,
"stargazers_count": 858,
"watchers_count": 858,
"forks_count": 406,
"forks": 406,
"watchers": 857,
"watchers": 858,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-03T09:22:03Z",
"updated_at": "2021-02-04T02:56:24Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 911,
"watchers_count": 911,
"stargazers_count": 912,
"watchers_count": 912,
"forks_count": 216,
"forks": 216,
"watchers": 911,
"watchers": 912,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-03-29T07:26:41Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 16,
"forks": 16,
"forks_count": 17,
"forks": 17,
"watchers": 16,
"score": 0
},

View file

@ -0,0 +1,25 @@
[
{
"id": 335788673,
"name": "CVE-2018-1000542",
"full_name": "forse01\/CVE-2018-1000542",
"owner": {
"login": "forse01",
"id": 76189258,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76189258?v=4",
"html_url": "https:\/\/github.com\/forse01"
},
"html_url": "https:\/\/github.com\/forse01\/CVE-2018-1000542",
"description": null,
"fork": false,
"created_at": "2021-02-04T00:01:33Z",
"updated_at": "2021-02-04T00:11:53Z",
"pushed_at": "2021-02-04T00:11:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
"fork": false,
"created_at": "2018-08-21T00:09:56Z",
"updated_at": "2021-02-02T04:33:12Z",
"updated_at": "2021-02-03T23:57:23Z",
"pushed_at": "2020-08-18T00:00:15Z",
"stargazers_count": 436,
"watchers_count": 436,
"stargazers_count": 435,
"watchers_count": 435,
"forks_count": 146,
"forks": 146,
"watchers": 436,
"watchers": 435,
"score": 0
},
{

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-03T09:22:03Z",
"updated_at": "2021-02-04T02:56:24Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 911,
"watchers_count": 911,
"stargazers_count": 912,
"watchers_count": 912,
"forks_count": 216,
"forks": 216,
"watchers": 911,
"watchers": 912,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-01-23T14:27:21Z",
"stargazers_count": 441,
"watchers_count": 441,
"forks_count": 183,
"forks": 183,
"forks_count": 184,
"forks": 184,
"watchers": 441,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in \/tmp\/eximrce.",
"fork": false,
"created_at": "2019-06-12T03:47:16Z",
"updated_at": "2020-09-06T02:39:13Z",
"updated_at": "2021-02-03T22:54:05Z",
"pushed_at": "2019-07-08T18:25:12Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 13,
"forks": 13,
"watchers": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 12,
"forks": 12,
"watchers": 14,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-02-03T19:43:44Z",
"updated_at": "2021-02-04T01:21:44Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2323,
"watchers_count": 2323,
"stargazers_count": 2325,
"watchers_count": 2325,
"forks_count": 652,
"forks": 652,
"watchers": 2323,
"watchers": 2325,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-03T09:22:03Z",
"updated_at": "2021-02-04T02:56:24Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 911,
"watchers_count": 911,
"stargazers_count": 912,
"watchers_count": 912,
"forks_count": 216,
"forks": 216,
"watchers": 911,
"watchers": 912,
"score": 0
}
]

25
2019/CVE-2019-5413.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 335788904,
"name": "CVE-2019-5413",
"full_name": "forse01\/CVE-2019-5413",
"owner": {
"login": "forse01",
"id": 76189258,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76189258?v=4",
"html_url": "https:\/\/github.com\/forse01"
},
"html_url": "https:\/\/github.com\/forse01\/CVE-2019-5413",
"description": null,
"fork": false,
"created_at": "2021-02-04T00:02:59Z",
"updated_at": "2021-02-04T02:36:14Z",
"pushed_at": "2021-02-04T02:36:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 170398859,
"name": "cve-2019-5736-poc",
"full_name": "q3k\/cve-2019-5736-poc",
"owner": {
"login": "q3k",
"id": 315234,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/315234?v=4",
"html_url": "https:\/\/github.com\/q3k"
},
"html_url": "https:\/\/github.com\/q3k\/cve-2019-5736-poc",
"description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)",
"fork": false,
"created_at": "2019-02-12T22:07:47Z",
"updated_at": "2021-01-12T20:08:04Z",
"pushed_at": "2019-02-20T15:35:34Z",
"stargazers_count": 181,
"watchers_count": 181,
"forks_count": 62,
"forks": 62,
"watchers": 181,
"score": 0
},
{
"id": 171668415,
"name": "RunC-CVE-2019-5736",

View file

@ -13,13 +13,13 @@
"description": "Exploits for Android Binder bug CVE-2020-0041",
"fork": false,
"created_at": "2020-03-31T17:53:57Z",
"updated_at": "2021-02-03T11:00:24Z",
"updated_at": "2021-02-04T02:40:25Z",
"pushed_at": "2020-04-08T08:55:30Z",
"stargazers_count": 148,
"watchers_count": 148,
"stargazers_count": 149,
"watchers_count": 149,
"forks_count": 45,
"forks": 45,
"watchers": 148,
"watchers": 149,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC of CVE-2020-0108",
"fork": false,
"created_at": "2020-08-05T04:50:42Z",
"updated_at": "2020-08-31T02:49:53Z",
"updated_at": "2021-02-04T02:18:03Z",
"pushed_at": "2020-08-05T02:55:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2021-02-03T21:10:28Z",
"updated_at": "2021-02-04T02:35:24Z",
"pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1234,
"watchers_count": 1234,
"stargazers_count": 1235,
"watchers_count": 1235,
"forks_count": 288,
"forks": 288,
"watchers": 1234,
"watchers": 1235,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-02-03T19:43:44Z",
"updated_at": "2021-02-04T01:21:44Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2323,
"watchers_count": 2323,
"stargazers_count": 2325,
"watchers_count": 2325,
"forks_count": 652,
"forks": 652,
"watchers": 2323,
"watchers": 2325,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "shiro-cve-2020-17523 漏洞分析",
"fork": false,
"created_at": "2021-02-03T08:14:03Z",
"updated_at": "2021-02-03T17:23:35Z",
"updated_at": "2021-02-04T02:20:26Z",
"pushed_at": "2021-02-03T09:38:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"watchers": 7,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-11-13T14:46:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-03T09:22:03Z",
"updated_at": "2021-02-04T02:56:24Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 911,
"watchers_count": 911,
"stargazers_count": 912,
"watchers_count": 912,
"forks_count": 216,
"forks": 216,
"watchers": 911,
"watchers": 912,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。",
"fork": false,
"created_at": "2020-05-16T03:01:32Z",
"updated_at": "2021-01-17T16:49:21Z",
"updated_at": "2021-02-04T02:47:26Z",
"pushed_at": "2020-05-17T12:07:01Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 16,
"forks": 16,
"watchers": 50,
"watchers": 52,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Apache Druid 远程代码执行;检测脚本",
"fork": false,
"created_at": "2021-02-03T03:59:52Z",
"updated_at": "2021-02-03T09:00:04Z",
"updated_at": "2021-02-04T01:40:47Z",
"pushed_at": "2021-02-03T06:06:24Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2021-02-03T06:45:54Z",
"updated_at": "2021-02-03T06:53:27Z",
"updated_at": "2021-02-04T01:40:33Z",
"pushed_at": "2021-02-03T06:53:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Laravel debug rce",
"fork": false,
"created_at": "2021-01-22T05:12:21Z",
"updated_at": "2021-02-01T10:38:02Z",
"updated_at": "2021-02-03T22:53:13Z",
"pushed_at": "2021-01-24T05:28:07Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"forks_count": 19,
"forks": 19,
"watchers": 53,
"watchers": 54,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-26T19:53:04Z",
"updated_at": "2021-01-30T00:25:42Z",
"updated_at": "2021-02-03T23:09:04Z",
"pushed_at": "2021-01-26T20:09:53Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 38,
"forks": 38,
"watchers": 34,
"watchers": 33,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "CVE-2021-3156",
"fork": false,
"created_at": "2021-01-27T16:03:34Z",
"updated_at": "2021-02-03T09:11:15Z",
"updated_at": "2021-02-03T22:52:31Z",
"pushed_at": "2021-01-31T04:56:56Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"forks_count": 43,
"forks": 43,
"watchers": 93,
"watchers": 94,
"score": 0
},
{
@ -174,13 +174,13 @@
"description": "cve-2021-3156;sudo堆溢出漏洞漏洞检测",
"fork": false,
"created_at": "2021-01-28T02:20:24Z",
"updated_at": "2021-01-30T16:37:48Z",
"updated_at": "2021-02-04T01:22:08Z",
"pushed_at": "2021-01-28T02:21:30Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
},
{
@ -335,13 +335,13 @@
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
"fork": false,
"created_at": "2021-01-30T03:22:04Z",
"updated_at": "2021-02-03T20:17:21Z",
"updated_at": "2021-02-04T00:52:12Z",
"pushed_at": "2021-01-30T04:30:24Z",
"stargazers_count": 265,
"watchers_count": 265,
"forks_count": 75,
"forks": 75,
"watchers": 265,
"stargazers_count": 269,
"watchers_count": 269,
"forks_count": 76,
"forks": 76,
"watchers": 269,
"score": 0
},
{
@ -381,13 +381,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-02-03T20:23:52Z",
"updated_at": "2021-02-04T02:24:21Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 460,
"watchers_count": 460,
"forks_count": 124,
"forks": 124,
"watchers": 460,
"stargazers_count": 481,
"watchers_count": 481,
"forks_count": 126,
"forks": 126,
"watchers": 481,
"score": 0
},
{
@ -634,13 +634,13 @@
"description": "Root shell PoC for CVE-2021-3156",
"fork": false,
"created_at": "2021-02-03T19:57:56Z",
"updated_at": "2021-02-03T21:13:29Z",
"pushed_at": "2021-02-03T21:13:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2021-02-03T23:30:21Z",
"pushed_at": "2021-02-03T22:28:14Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 3,
"score": 0
}
]

View file

@ -4721,6 +4721,14 @@ An exploitable code execution vulnerability exists in the processing of multi-pa
- [papinnon/CVE-2019-5096-GoAhead-Web-Server-Dos-Exploit](https://github.com/papinnon/CVE-2019-5096-GoAhead-Web-Server-Dos-Exploit)
### CVE-2019-5413 (2019-03-17)
<code>
An attacker can use the format parameter to inject arbitrary commands in the npm package morgan &lt; 1.9.1.
</code>
- [forse01/CVE-2019-5413](https://github.com/forse01/CVE-2019-5413)
### CVE-2019-5418 (2019-03-27)
<code>
@ -4819,7 +4827,6 @@ NVIDIA Shield TV Experience prior to v8.0.1, NVIDIA Tegra software contains a vu
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
</code>
- [q3k/cve-2019-5736-poc](https://github.com/q3k/cve-2019-5736-poc)
- [twistlock/RunC-CVE-2019-5736](https://github.com/twistlock/RunC-CVE-2019-5736)
- [yyqs2008/CVE-2019-5736-PoC-2](https://github.com/yyqs2008/CVE-2019-5736-PoC-2)
- [zyriuse75/CVE-2019-5736-PoC](https://github.com/zyriuse75/CVE-2019-5736-PoC)
@ -10817,6 +10824,14 @@ Grails Fields plugin version 2.2.7 contains a Cross Site Scripting (XSS) vulnera
- [martinfrancois/CVE-2018-1000529](https://github.com/martinfrancois/CVE-2018-1000529)
### CVE-2018-1000542 (2018-06-26)
<code>
netbeans-mmd-plugin version &lt;= 1.4.3 contains a XML External Entity (XXE) vulnerability in MMD file import that can result in Possible information disclosure, server-side request forgery, or remote code execution. This attack appear to be exploitable via Specially crafted MMD file.
</code>
- [forse01/CVE-2018-1000542](https://github.com/forse01/CVE-2018-1000542)
### CVE-2018-1000802 (2018-09-18)
<code>