Auto Update 2021/01/21 18:10:06

This commit is contained in:
motikan2010-bot 2021-01-21 18:10:06 +09:00
parent cd3f5ef1c5
commit 5be96612cf
26 changed files with 228 additions and 234 deletions

View file

@ -1,25 +0,0 @@
[
{
"id": 155039044,
"name": "CVE-2010-5327",
"full_name": "Michael-Main\/CVE-2010-5327",
"owner": {
"login": "Michael-Main",
"id": 44539668,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/44539668?v=4",
"html_url": "https:\/\/github.com\/Michael-Main"
},
"html_url": "https:\/\/github.com\/Michael-Main\/CVE-2010-5327",
"description": null,
"fork": false,
"created_at": "2018-10-28T05:37:23Z",
"updated_at": "2018-10-28T05:37:23Z",
"pushed_at": "2018-10-28T05:37:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 155044548,
"name": "CVE-2011-4905",
"full_name": "Michael-Main\/CVE-2011-4905",
"owner": {
"login": "Michael-Main",
"id": 44539668,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/44539668?v=4",
"html_url": "https:\/\/github.com\/Michael-Main"
},
"html_url": "https:\/\/github.com\/Michael-Main\/CVE-2011-4905",
"description": null,
"fork": false,
"created_at": "2018-10-28T07:07:42Z",
"updated_at": "2018-10-28T07:25:54Z",
"pushed_at": "2018-10-28T07:25:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,24 +1,24 @@
[
{
"id": 155046587,
"id": 195067727,
"name": "CVE-2012-4431",
"full_name": "Michael-Main\/CVE-2012-4431",
"full_name": "imjdl\/CVE-2012-4431",
"owner": {
"login": "Michael-Main",
"id": 44539668,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/44539668?v=4",
"html_url": "https:\/\/github.com\/Michael-Main"
"login": "imjdl",
"id": 31382943,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/31382943?v=4",
"html_url": "https:\/\/github.com\/imjdl"
},
"html_url": "https:\/\/github.com\/Michael-Main\/CVE-2012-4431",
"html_url": "https:\/\/github.com\/imjdl\/CVE-2012-4431",
"description": null,
"fork": false,
"created_at": "2018-10-28T07:38:58Z",
"updated_at": "2018-10-28T07:56:34Z",
"created_at": "2019-07-03T14:13:23Z",
"updated_at": "2021-01-21T03:19:39Z",
"pushed_at": "2018-10-28T07:55:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
"fork": false,
"created_at": "2018-01-04T00:28:50Z",
"updated_at": "2021-01-05T10:18:00Z",
"updated_at": "2021-01-21T04:25:39Z",
"pushed_at": "2018-01-10T01:14:44Z",
"stargazers_count": 686,
"watchers_count": 686,
"stargazers_count": 687,
"watchers_count": 687,
"forks_count": 184,
"forks": 184,
"watchers": 686,
"watchers": 687,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
"fork": false,
"created_at": "2018-08-21T00:09:56Z",
"updated_at": "2021-01-01T11:31:42Z",
"updated_at": "2021-01-21T07:24:53Z",
"pushed_at": "2020-08-18T00:00:15Z",
"stargazers_count": 427,
"watchers_count": 427,
"stargazers_count": 428,
"watchers_count": 428,
"forks_count": 142,
"forks": 142,
"watchers": 427,
"watchers": 428,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-04-01T13:19:49Z",
"stargazers_count": 269,
"watchers_count": 269,
"forks_count": 82,
"forks": 82,
"forks_count": 83,
"forks": 83,
"watchers": 269,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-09-08T06:09:11Z",
"stargazers_count": 681,
"watchers_count": 681,
"forks_count": 60,
"forks": 60,
"forks_count": 61,
"forks": 61,
"watchers": 681,
"score": 0
}

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-01-20T13:34:49Z",
"updated_at": "2021-01-21T07:04:03Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2280,
"watchers_count": 2280,
"forks_count": 640,
"forks": 640,
"watchers": 2280,
"stargazers_count": 2283,
"watchers_count": 2283,
"forks_count": 641,
"forks": 641,
"watchers": 2283,
"score": 0
},
{

View file

@ -36,8 +36,8 @@
"description": null,
"fork": false,
"created_at": "2020-12-31T15:40:28Z",
"updated_at": "2020-12-31T15:50:39Z",
"pushed_at": "2020-12-31T15:50:37Z",
"updated_at": "2021-01-21T07:59:40Z",
"pushed_at": "2021-01-21T07:59:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -59,8 +59,8 @@
"description": "TelerikUI Vulnerability Scanner (CVE-2019-18935)",
"fork": false,
"created_at": "2020-05-17T04:22:45Z",
"updated_at": "2020-11-20T20:16:55Z",
"pushed_at": "2020-11-20T20:16:52Z",
"updated_at": "2021-01-21T06:12:59Z",
"pushed_at": "2021-01-21T06:12:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,

View file

@ -178,8 +178,8 @@
"pushed_at": "2019-08-08T09:48:20Z",
"stargazers_count": 379,
"watchers_count": 379,
"forks_count": 156,
"forks": 156,
"forks_count": 157,
"forks": 157,
"watchers": 379,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Synaptics Audio Driver LPE",
"fork": false,
"created_at": "2019-04-14T06:16:34Z",
"updated_at": "2021-01-02T13:00:32Z",
"updated_at": "2021-01-21T03:16:33Z",
"pushed_at": "2019-04-15T11:17:39Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 12,
"forks": 12,
"watchers": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 13,
"forks": 13,
"watchers": 32,
"score": 0
}
]

View file

@ -206,75 +206,6 @@
"watchers": 2,
"score": 0
},
{
"id": 234920281,
"name": "curveball_lua",
"full_name": "dlee35\/curveball_lua",
"owner": {
"login": "dlee35",
"id": 7849311,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7849311?v=4",
"html_url": "https:\/\/github.com\/dlee35"
},
"html_url": "https:\/\/github.com\/dlee35\/curveball_lua",
"description": "Repo containing lua scripts and PCAP to find CVE-2020-0601 exploit attempts via network traffic",
"fork": false,
"created_at": "2020-01-19T15:20:19Z",
"updated_at": "2020-01-19T21:25:55Z",
"pushed_at": "2020-01-19T21:25:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 234944443,
"name": "-CVE-2020-0601-ECC---EXPLOIT",
"full_name": "IIICTECH\/-CVE-2020-0601-ECC---EXPLOIT",
"owner": {
"login": "IIICTECH",
"id": 5104528,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5104528?v=4",
"html_url": "https:\/\/github.com\/IIICTECH"
},
"html_url": "https:\/\/github.com\/IIICTECH\/-CVE-2020-0601-ECC---EXPLOIT",
"description": "CurveBall (CVE-2020-0601) - PoC CVE-2020-0601, or commonly referred to as CurveBall, is a vulnerability in which the signature of certificates using elliptic curve cryptography (ECC) is not correctly verified. Attackers can supply hand-rolled generators, bypassing validation, antivirus & all non-protections. ",
"fork": false,
"created_at": "2020-01-19T18:20:26Z",
"updated_at": "2020-01-27T17:28:54Z",
"pushed_at": "2020-01-19T18:26:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 235000073,
"name": "CVE-2020-0601",
"full_name": "Ash112121\/CVE-2020-0601",
"owner": {
"login": "Ash112121",
"id": 50549802,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/50549802?v=4",
"html_url": "https:\/\/github.com\/Ash112121"
},
"html_url": "https:\/\/github.com\/Ash112121\/CVE-2020-0601",
"description": null,
"fork": false,
"created_at": "2020-01-20T02:04:05Z",
"updated_at": "2020-01-20T02:05:22Z",
"pushed_at": "2020-01-20T02:05:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 235145190,
"name": "curveball",

View file

@ -59,13 +59,13 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-27T02:54:27Z",
"updated_at": "2021-01-19T05:57:18Z",
"updated_at": "2021-01-21T05:19:54Z",
"pushed_at": "2020-06-19T09:28:15Z",
"stargazers_count": 255,
"watchers_count": 255,
"stargazers_count": 256,
"watchers_count": 256,
"forks_count": 89,
"forks": 89,
"watchers": 255,
"watchers": 256,
"score": 0
},
{

View file

@ -385,8 +385,8 @@
"pushed_at": "2020-03-14T10:04:59Z",
"stargazers_count": 263,
"watchers_count": 263,
"forks_count": 108,
"forks": 108,
"forks_count": 109,
"forks": 109,
"watchers": 263,
"score": 0
},
@ -822,8 +822,8 @@
"pushed_at": "2020-03-18T08:57:36Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 7,
"forks": 7,
"forks_count": 8,
"forks": 8,
"watchers": 11,
"score": 0
},
@ -914,8 +914,8 @@
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1063,
"watchers_count": 1063,
"forks_count": 355,
"forks": 355,
"forks_count": 356,
"forks": 356,
"watchers": 1063,
"score": 0
},
@ -937,8 +937,8 @@
"pushed_at": "2020-04-02T08:01:38Z",
"stargazers_count": 212,
"watchers_count": 212,
"forks_count": 85,
"forks": 85,
"forks_count": 86,
"forks": 86,
"watchers": 212,
"score": 0
},

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-04-12T13:38:19Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 7,
"forks": 7,
"forks_count": 8,
"forks": 8,
"watchers": 20,
"score": 0
},
@ -82,13 +82,13 @@
"description": "CVE-2020-10199 Nexus <= 3.21.1 远程代码执行脚本(有回显)",
"fork": false,
"created_at": "2020-04-16T09:40:15Z",
"updated_at": "2021-01-01T16:03:25Z",
"updated_at": "2021-01-21T03:34:57Z",
"pushed_at": "2020-05-26T10:23:34Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 9,
"forks": 9,
"watchers": 30,
"watchers": 31,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC demonstrating the use of cve-2020-1034 for privilege escalation",
"fork": false,
"created_at": "2020-11-23T10:24:07Z",
"updated_at": "2021-01-20T11:53:30Z",
"updated_at": "2021-01-21T07:16:04Z",
"pushed_at": "2020-11-23T11:20:28Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 24,
"forks": 24,
"watchers": 76,
"watchers": 77,
"score": 0
}
]

View file

@ -86,8 +86,8 @@
"pushed_at": "2020-07-18T06:38:11Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 9,
"forks": 9,
"forks_count": 10,
"forks": 10,
"watchers": 14,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2021-01-20T02:06:07Z",
"updated_at": "2021-01-21T09:07:10Z",
"pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1226,
"watchers_count": 1226,
"stargazers_count": 1228,
"watchers_count": 1228,
"forks_count": 285,
"forks": 285,
"watchers": 1226,
"watchers": 1228,
"score": 0
},
{
@ -335,13 +335,13 @@
"description": "cve-2020-1472 复现利用及其exp",
"fork": false,
"created_at": "2020-09-16T03:40:47Z",
"updated_at": "2021-01-21T03:06:29Z",
"updated_at": "2021-01-21T06:52:07Z",
"pushed_at": "2020-09-16T15:03:32Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 9,
"forks": 9,
"watchers": 40,
"watchers": 44,
"score": 0
},
{
@ -680,13 +680,13 @@
"description": null,
"fork": false,
"created_at": "2020-09-26T08:31:47Z",
"updated_at": "2020-11-29T03:32:16Z",
"updated_at": "2021-01-21T09:02:23Z",
"pushed_at": "2020-09-26T08:44:42Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-01-20T13:34:49Z",
"updated_at": "2021-01-21T07:04:03Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2280,
"watchers_count": 2280,
"forks_count": 640,
"forks": 640,
"watchers": 2280,
"stargazers_count": 2283,
"watchers_count": 2283,
"forks_count": 641,
"forks": 641,
"watchers": 2283,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "Vulmap - Web vulnerability scanning and verification tools支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519",
"fork": false,
"created_at": "2020-10-09T06:34:36Z",
"updated_at": "2021-01-20T13:34:42Z",
"updated_at": "2021-01-21T08:09:58Z",
"pushed_at": "2021-01-13T10:38:48Z",
"stargazers_count": 772,
"watchers_count": 772,
"forks_count": 139,
"forks": 139,
"watchers": 772,
"stargazers_count": 775,
"watchers_count": 775,
"forks_count": 143,
"forks": 143,
"watchers": 775,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "CVE-202014882、CVE-202014883",
"fork": false,
"created_at": "2020-10-28T11:43:37Z",
"updated_at": "2021-01-20T03:05:29Z",
"updated_at": "2021-01-21T07:36:43Z",
"pushed_at": "2020-11-16T04:23:09Z",
"stargazers_count": 207,
"watchers_count": 207,
"stargazers_count": 208,
"watchers_count": 208,
"forks_count": 40,
"forks": 40,
"watchers": 207,
"watchers": 208,
"score": 0
},
{

25
2020/CVE-2020-17456.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 331533622,
"name": "CVE-2020-17456",
"full_name": "Al1ex\/CVE-2020-17456",
"owner": {
"login": "Al1ex",
"id": 38161463,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/38161463?v=4",
"html_url": "https:\/\/github.com\/Al1ex"
},
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-17456",
"description": "CVE-2020-17456 & Seowon SLC 130 Router RCE",
"fork": false,
"created_at": "2021-01-21T06:16:40Z",
"updated_at": "2021-01-21T06:48:06Z",
"pushed_at": "2021-01-21T06:17:00Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-12-18T00:57:50Z",
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 17,
"forks": 17,
"forks_count": 18,
"forks": 18,
"watchers": 38,
"score": 0
},

25
2020/CVE-2020-24032.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 331558019,
"name": "CVE-2020-24032",
"full_name": "jet-pentest\/CVE-2020-24032",
"owner": {
"login": "jet-pentest",
"id": 71512502,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/71512502?v=4",
"html_url": "https:\/\/github.com\/jet-pentest"
},
"html_url": "https:\/\/github.com\/jet-pentest\/CVE-2020-24032",
"description": null,
"fork": false,
"created_at": "2021-01-21T08:07:09Z",
"updated_at": "2021-01-21T08:08:29Z",
"pushed_at": "2021-01-21T08:08:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2020/CVE-2020-35713.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 331538426,
"name": "CVE-2020-35713",
"full_name": "Al1ex\/CVE-2020-35713",
"owner": {
"login": "Al1ex",
"id": 38161463,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/38161463?v=4",
"html_url": "https:\/\/github.com\/Al1ex"
},
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-35713",
"description": "CVE-2020-35713",
"fork": false,
"created_at": "2021-01-21T06:39:58Z",
"updated_at": "2021-01-21T06:40:17Z",
"pushed_at": "2021-01-21T06:40:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2021/CVE-2021-3130.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 331557374,
"name": "CVE-2021-3130",
"full_name": "jet-pentest\/CVE-2021-3130",
"owner": {
"login": "jet-pentest",
"id": 71512502,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/71512502?v=4",
"html_url": "https:\/\/github.com\/jet-pentest"
},
"html_url": "https:\/\/github.com\/jet-pentest\/CVE-2021-3130",
"description": null,
"fork": false,
"created_at": "2021-01-21T08:04:32Z",
"updated_at": "2021-01-21T08:06:09Z",
"pushed_at": "2021-01-21T08:06:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -35,6 +35,14 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic
- [ambionics/laravel-exploits](https://github.com/ambionics/laravel-exploits)
### CVE-2021-3130 (2021-01-20)
<code>
Within the Open-AudIT up to version 3.5.3 application, the web interface hides SSH secrets, Windows passwords, and SNMP strings from users using HTML 'password field' obfuscation. By using Developer tools or similar, it is possible to change the obfuscation so that the credentials are visible.
</code>
- [jet-pentest/CVE-2021-3130](https://github.com/jet-pentest/CVE-2021-3130)
### CVE-2021-3131 (2021-01-13)
<code>
@ -178,9 +186,6 @@ A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) valid
- [saleemrashid/badecparams](https://github.com/saleemrashid/badecparams)
- [0xxon/cve-2020-0601-utils](https://github.com/0xxon/cve-2020-0601-utils)
- [YoannDqr/CVE-2020-0601](https://github.com/YoannDqr/CVE-2020-0601)
- [dlee35/curveball_lua](https://github.com/dlee35/curveball_lua)
- [IIICTECH/-CVE-2020-0601-ECC---EXPLOIT](https://github.com/IIICTECH/-CVE-2020-0601-ECC---EXPLOIT)
- [Ash112121/CVE-2020-0601](https://github.com/Ash112121/CVE-2020-0601)
- [gentilkiwi/curveball](https://github.com/gentilkiwi/curveball)
- [Hans-MartinHannibalLauridsen/CurveBall](https://github.com/Hans-MartinHannibalLauridsen/CurveBall)
- [apodlosky/PoC_CurveBall](https://github.com/apodlosky/PoC_CurveBall)
@ -2952,6 +2957,14 @@ The MSI AmbientLink MsIo64 driver 1.0.0.8 has a Buffer Overflow (0x80102040, 0x8
- [uf0o/CVE-2020-17382](https://github.com/uf0o/CVE-2020-17382)
### CVE-2020-17456 (2020-08-19)
<code>
SEOWON INTECH SLC-130 And SLR-120S devices allow Remote Code Execution via the ipAddr parameter to the system_log.cgi page.
</code>
- [Al1ex/CVE-2020-17456](https://github.com/Al1ex/CVE-2020-17456)
### CVE-2020-17496 (2020-08-12)
<code>
@ -3103,6 +3116,14 @@ ForLogic Qualiex v1 and v3 has weak token expiration. This allows remote unauthe
- [underprotection/CVE-2020-24030](https://github.com/underprotection/CVE-2020-24030)
### CVE-2020-24032 (2020-08-18)
<code>
tz.pl on XoruX LPAR2RRD and STOR2RRD 2.70 virtual appliances allows cmd=set&amp;tz=OS command injection via shell metacharacters in a timezone.
</code>
- [jet-pentest/CVE-2020-24032](https://github.com/jet-pentest/CVE-2020-24032)
### CVE-2020-24033 (2020-10-22)
<code>
@ -3732,6 +3753,14 @@ Arbitrary command execution can occur in Webmin through 1.962. Any user authoriz
- [anasbousselham/webminscan](https://github.com/anasbousselham/webminscan)
### CVE-2020-35713 (2020-12-25)
<code>
Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page.
</code>
- [Al1ex/CVE-2020-35713](https://github.com/Al1ex/CVE-2020-35713)
### CVE-2020-35717 (2021-01-01)
<code>
@ -16213,7 +16242,7 @@ diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG)
org/apache/catalina/filters/CsrfPreventionFilter.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.32 allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism via a request that lacks a session identifier.
</code>
- [Michael-Main/CVE-2012-4431](https://github.com/Michael-Main/CVE-2012-4431)
- [imjdl/CVE-2012-4431](https://github.com/imjdl/CVE-2012-4431)
### CVE-2012-4681 (2012-08-27)
@ -16472,14 +16501,6 @@ Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MI
- [lol-fi/cve-2011-4862](https://github.com/lol-fi/cve-2011-4862)
- [kpawar2410/CVE-2011-4862](https://github.com/kpawar2410/CVE-2011-4862)
### CVE-2011-4905 (2012-01-05)
<code>
Apache ActiveMQ before 5.6.0 allows remote attackers to cause a denial of service (file-descriptor exhaustion and broker crash or hang) by sending many openwire failover:tcp:// connection requests.
</code>
- [Michael-Main/CVE-2011-4905](https://github.com/Michael-Main/CVE-2011-4905)
### CVE-2011-4919 (2019-11-19)
<code>
@ -16636,14 +16657,6 @@ The Android browser in Android before 2.3.4 allows remote attackers to obtain SD
- [thomascannon/android-cve-2010-4804](https://github.com/thomascannon/android-cve-2010-4804)
### CVE-2010-5327 (2017-01-13)
<code>
Liferay Portal through 6.2.10 allows remote authenticated users to execute arbitrary shell commands via a crafted Velocity template.
</code>
- [Michael-Main/CVE-2010-5327](https://github.com/Michael-Main/CVE-2010-5327)
## 2009
### CVE-2009-0229 (2009-06-10)