Auto Update 2020/08/25 06:08:33

This commit is contained in:
motikan2010-bot 2020-08-25 06:08:33 +09:00
parent f3c95c181c
commit 8492400eb1
27 changed files with 149 additions and 125 deletions

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-09-06T20:13:10Z", "pushed_at": "2017-09-06T20:13:10Z",
"stargazers_count": 13, "stargazers_count": 13,
"watchers_count": 13, "watchers_count": 13,
"forks_count": 11, "forks_count": 10,
"forks": 11, "forks": 10,
"watchers": 13, "watchers": 13,
"score": 0 "score": 0
} }

View file

@ -36,13 +36,13 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431", "description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false, "fork": false,
"created_at": "2016-06-30T11:56:44Z", "created_at": "2016-06-30T11:56:44Z",
"updated_at": "2020-08-11T13:37:17Z", "updated_at": "2020-08-24T15:11:29Z",
"pushed_at": "2016-06-30T15:32:42Z", "pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 282, "stargazers_count": 283,
"watchers_count": 282, "watchers_count": 283,
"forks_count": 88, "forks_count": 88,
"forks": 88, "forks": 88,
"watchers": 282, "watchers": 283,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "Qualcomm TrustZone kernel privilege escalation", "description": "Qualcomm TrustZone kernel privilege escalation",
"fork": false, "fork": false,
"created_at": "2016-06-15T11:21:24Z", "created_at": "2016-06-15T11:21:24Z",
"updated_at": "2020-07-31T09:13:27Z", "updated_at": "2020-08-24T15:11:33Z",
"pushed_at": "2016-06-15T11:27:42Z", "pushed_at": "2016-06-15T11:27:42Z",
"stargazers_count": 42, "stargazers_count": 43,
"watchers_count": 42, "watchers_count": 43,
"forks_count": 21, "forks_count": 21,
"forks": 21, "forks": 21,
"watchers": 42, "watchers": 43,
"score": 0 "score": 0
}, },
{ {
@ -36,13 +36,13 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431", "description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false, "fork": false,
"created_at": "2016-06-30T11:56:44Z", "created_at": "2016-06-30T11:56:44Z",
"updated_at": "2020-08-11T13:37:17Z", "updated_at": "2020-08-24T15:11:29Z",
"pushed_at": "2016-06-30T15:32:42Z", "pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 282, "stargazers_count": 283,
"watchers_count": 282, "watchers_count": 283,
"forks_count": 88, "forks_count": 88,
"forks": 88, "forks": 88,
"watchers": 282, "watchers": 283,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.", "description": "A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.",
"fork": false, "fork": false,
"created_at": "2016-09-16T07:34:50Z", "created_at": "2016-09-16T07:34:50Z",
"updated_at": "2020-06-13T14:45:33Z", "updated_at": "2020-08-24T17:38:26Z",
"pushed_at": "2016-09-18T06:55:38Z", "pushed_at": "2016-09-18T06:55:38Z",
"stargazers_count": 78, "stargazers_count": 77,
"watchers_count": 78, "watchers_count": 77,
"forks_count": 20, "forks_count": 20,
"forks": 20, "forks": 20,
"watchers": 78, "watchers": 77,
"score": 0 "score": 0
} }
] ]

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-01-04T23:42:46Z", "pushed_at": "2017-01-04T23:42:46Z",
"stargazers_count": 132, "stargazers_count": 132,
"watchers_count": 132, "watchers_count": 132,
"forks_count": 52, "forks_count": 51,
"forks": 52, "forks": 51,
"watchers": 132, "watchers": 132,
"score": 0 "score": 0
} }

View file

@ -13,13 +13,13 @@
"description": "POC Exploit for Apache Tomcat 7.0.x CVE-2017-12615 PUT JSP vulnerability.", "description": "POC Exploit for Apache Tomcat 7.0.x CVE-2017-12615 PUT JSP vulnerability.",
"fork": false, "fork": false,
"created_at": "2017-09-23T06:15:48Z", "created_at": "2017-09-23T06:15:48Z",
"updated_at": "2020-08-17T13:46:09Z", "updated_at": "2020-08-24T15:57:51Z",
"pushed_at": "2019-12-20T07:22:17Z", "pushed_at": "2019-12-20T07:22:17Z",
"stargazers_count": 71, "stargazers_count": 72,
"watchers_count": 71, "watchers_count": 72,
"forks_count": 21, "forks_count": 21,
"forks": 21, "forks": 21,
"watchers": 71, "watchers": 72,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)", "description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
"fork": false, "fork": false,
"created_at": "2018-06-24T05:34:05Z", "created_at": "2018-06-24T05:34:05Z",
"updated_at": "2020-08-17T12:15:44Z", "updated_at": "2020-08-24T19:40:30Z",
"pushed_at": "2020-03-08T00:08:20Z", "pushed_at": "2020-03-08T00:08:20Z",
"stargazers_count": 372, "stargazers_count": 373,
"watchers_count": 372, "watchers_count": 373,
"forks_count": 336, "forks_count": 336,
"forks": 336, "forks": 336,
"watchers": 372, "watchers": 373,
"score": 0 "score": 0
}, },
{ {

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-08-17T23:31:46Z", "pushed_at": "2018-08-17T23:31:46Z",
"stargazers_count": 152, "stargazers_count": 152,
"watchers_count": 152, "watchers_count": 152,
"forks_count": 30, "forks_count": 31,
"forks": 30, "forks": 31,
"watchers": 152, "watchers": 152,
"score": 0 "score": 0
} }

View file

@ -13,13 +13,13 @@
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)", "description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
"fork": false, "fork": false,
"created_at": "2018-04-28T11:50:00Z", "created_at": "2018-04-28T11:50:00Z",
"updated_at": "2020-08-11T04:34:42Z", "updated_at": "2020-08-24T18:12:19Z",
"pushed_at": "2018-08-30T05:37:03Z", "pushed_at": "2018-08-30T05:37:03Z",
"stargazers_count": 405, "stargazers_count": 406,
"watchers_count": 405, "watchers_count": 406,
"forks_count": 53, "forks_count": 53,
"forks": 53, "forks": 53,
"watchers": 405, "watchers": 406,
"score": 0 "score": 0
}, },
{ {

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-05-03T17:20:24Z", "pushed_at": "2018-05-03T17:20:24Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 1,
"forks": 0, "forks": 1,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
}, },

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-0230 & s2-059 poc.", "description": "CVE-2019-0230 & s2-059 poc.",
"fork": false, "fork": false,
"created_at": "2020-08-20T08:21:54Z", "created_at": "2020-08-20T08:21:54Z",
"updated_at": "2020-08-24T14:52:07Z", "updated_at": "2020-08-24T18:08:35Z",
"pushed_at": "2020-08-21T12:41:14Z", "pushed_at": "2020-08-21T12:41:14Z",
"stargazers_count": 16, "stargazers_count": 17,
"watchers_count": 16, "watchers_count": 17,
"forks_count": 8, "forks_count": 8,
"forks": 8, "forks": 8,
"watchers": 16, "watchers": 17,
"score": 0 "score": 0
} }
] ]

View file

@ -1094,13 +1094,13 @@
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln", "description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
"fork": false, "fork": false,
"created_at": "2019-05-22T00:08:44Z", "created_at": "2019-05-22T00:08:44Z",
"updated_at": "2020-08-21T05:53:06Z", "updated_at": "2020-08-24T19:02:25Z",
"pushed_at": "2019-10-01T12:23:59Z", "pushed_at": "2019-10-01T12:23:59Z",
"stargazers_count": 1115, "stargazers_count": 1114,
"watchers_count": 1115, "watchers_count": 1114,
"forks_count": 379, "forks_count": 379,
"forks": 379, "forks": 379,
"watchers": 1115, "watchers": 1114,
"score": 0 "score": 0
}, },
{ {
@ -1301,13 +1301,13 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.", "description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false, "fork": false,
"created_at": "2019-05-23T22:50:12Z", "created_at": "2019-05-23T22:50:12Z",
"updated_at": "2020-08-23T10:01:57Z", "updated_at": "2020-08-24T19:01:58Z",
"pushed_at": "2019-06-22T21:48:45Z", "pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 754, "stargazers_count": 753,
"watchers_count": 754, "watchers_count": 753,
"forks_count": 182, "forks_count": 182,
"forks": 182, "forks": 182,
"watchers": 754, "watchers": 753,
"score": 0 "score": 0
}, },
{ {

View file

@ -201,8 +201,8 @@
"pushed_at": "2019-12-25T13:48:27Z", "pushed_at": "2019-12-25T13:48:27Z",
"stargazers_count": 8, "stargazers_count": 8,
"watchers_count": 8, "watchers_count": 8,
"forks_count": 3, "forks_count": 2,
"forks": 3, "forks": 2,
"watchers": 8, "watchers": 8,
"score": 0 "score": 0
}, },

View file

@ -228,5 +228,28 @@
"forks": 0, "forks": 0,
"watchers": 2, "watchers": 2,
"score": 0 "score": 0
},
{
"id": 289977484,
"name": "CVE-2019-16759",
"full_name": "sunian19\/CVE-2019-16759",
"owner": {
"login": "sunian19",
"id": 53205380,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/53205380?v=4",
"html_url": "https:\/\/github.com\/sunian19"
},
"html_url": "https:\/\/github.com\/sunian19\/CVE-2019-16759",
"description": null,
"fork": false,
"created_at": "2020-08-24T16:15:10Z",
"updated_at": "2020-08-24T16:25:07Z",
"pushed_at": "2020-08-24T16:25:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
} }
] ]

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-08-24T06:58:14Z", "updated_at": "2020-08-24T19:17:29Z",
"pushed_at": "2020-08-03T04:37:30Z", "pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1528, "stargazers_count": 1529,
"watchers_count": 1528, "watchers_count": 1529,
"forks_count": 398, "forks_count": 398,
"forks": 398, "forks": 398,
"watchers": 1528, "watchers": 1529,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,13 +36,13 @@
"description": "Proof of Concept for CVE-2019-18634", "description": "Proof of Concept for CVE-2019-18634",
"fork": false, "fork": false,
"created_at": "2020-02-07T18:07:03Z", "created_at": "2020-02-07T18:07:03Z",
"updated_at": "2020-08-22T23:48:37Z", "updated_at": "2020-08-24T15:29:53Z",
"pushed_at": "2020-06-04T13:17:10Z", "pushed_at": "2020-06-04T13:17:10Z",
"stargazers_count": 67, "stargazers_count": 68,
"watchers_count": 67, "watchers_count": 68,
"forks_count": 17, "forks_count": 17,
"forks": 17, "forks": 17,
"watchers": 67, "watchers": 68,
"score": 0 "score": 0
}, },
{ {

View file

@ -1,25 +0,0 @@
[
{
"id": 289938288,
"name": "CVE-2020-0002",
"full_name": "Polo35\/CVE-2020-0002",
"owner": {
"login": "Polo35",
"id": 489662,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/489662?v=4",
"html_url": "https:\/\/github.com\/Polo35"
},
"html_url": "https:\/\/github.com\/Polo35\/CVE-2020-0002",
"description": "CVE-2020-0002 vulnerability experimentations",
"fork": false,
"created_at": "2020-08-24T13:38:23Z",
"updated_at": "2020-08-24T13:40:39Z",
"pushed_at": "2020-08-24T13:38:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -46,7 +46,7 @@
"score": 0 "score": 0
}, },
{ {
"id": 289939274, "id": 290022016,
"name": "CVE-2020-0022", "name": "CVE-2020-0022",
"full_name": "Polo35\/CVE-2020-0022", "full_name": "Polo35\/CVE-2020-0022",
"owner": { "owner": {
@ -58,9 +58,9 @@
"html_url": "https:\/\/github.com\/Polo35\/CVE-2020-0022", "html_url": "https:\/\/github.com\/Polo35\/CVE-2020-0022",
"description": "CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami (Android TV 8.0 - ARM32 Cortex A9)", "description": "CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami (Android TV 8.0 - ARM32 Cortex A9)",
"fork": false, "fork": false,
"created_at": "2020-08-24T13:42:25Z", "created_at": "2020-08-24T19:33:10Z",
"updated_at": "2020-08-24T14:35:44Z", "updated_at": "2020-08-24T19:34:41Z",
"pushed_at": "2020-08-24T14:35:41Z", "pushed_at": "2020-08-24T19:34:39Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "Support ALL Windows Version", "description": "Support ALL Windows Version",
"fork": false, "fork": false,
"created_at": "2020-06-16T08:57:51Z", "created_at": "2020-06-16T08:57:51Z",
"updated_at": "2020-08-24T10:33:28Z", "updated_at": "2020-08-24T15:16:52Z",
"pushed_at": "2020-06-18T00:42:57Z", "pushed_at": "2020-06-18T00:42:57Z",
"stargazers_count": 399, "stargazers_count": 400,
"watchers_count": 399, "watchers_count": 400,
"forks_count": 95, "forks_count": 95,
"forks": 95, "forks": 95,
"watchers": 399, "watchers": 400,
"score": 0 "score": 0
} }
] ]

View file

@ -36,8 +36,8 @@
"description": "Zeek Plugin that detects CallStranger (CVE-2020-12695) attempts (http:\/\/callstranger.com\/)", "description": "Zeek Plugin that detects CallStranger (CVE-2020-12695) attempts (http:\/\/callstranger.com\/)",
"fork": false, "fork": false,
"created_at": "2020-06-10T14:18:34Z", "created_at": "2020-06-10T14:18:34Z",
"updated_at": "2020-06-11T19:14:12Z", "updated_at": "2020-08-24T19:45:22Z",
"pushed_at": "2020-06-10T16:35:16Z", "pushed_at": "2020-08-24T19:45:19Z",
"stargazers_count": 4, "stargazers_count": 4,
"watchers_count": 4, "watchers_count": 4,
"forks_count": 0, "forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability", "description": "Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability",
"fork": false, "fork": false,
"created_at": "2020-07-29T15:56:50Z", "created_at": "2020-07-29T15:56:50Z",
"updated_at": "2020-08-23T15:34:03Z", "updated_at": "2020-08-24T19:01:26Z",
"pushed_at": "2020-07-30T07:48:40Z", "pushed_at": "2020-07-30T07:48:40Z",
"stargazers_count": 99, "stargazers_count": 100,
"watchers_count": 99, "watchers_count": 100,
"forks_count": 17, "forks_count": 17,
"forks": 17, "forks": 17,
"watchers": 99, "watchers": 100,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1337 Windows Print Spooler Privilege Escalation", "description": "CVE-2020-1337 Windows Print Spooler Privilege Escalation",
"fork": false, "fork": false,
"created_at": "2020-07-21T08:01:20Z", "created_at": "2020-07-21T08:01:20Z",
"updated_at": "2020-08-24T08:10:35Z", "updated_at": "2020-08-24T17:21:50Z",
"pushed_at": "2020-07-21T10:28:42Z", "pushed_at": "2020-07-21T10:28:42Z",
"stargazers_count": 125, "stargazers_count": 126,
"watchers_count": 125, "watchers_count": 126,
"forks_count": 22, "forks_count": 22,
"forks": 22, "forks": 22,
"watchers": 125, "watchers": 126,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2020-07-18T05:15:05Z", "created_at": "2020-07-18T05:15:05Z",
"updated_at": "2020-08-23T22:33:58Z", "updated_at": "2020-08-24T17:01:42Z",
"pushed_at": "2020-07-18T11:52:31Z", "pushed_at": "2020-07-18T11:52:31Z",
"stargazers_count": 64, "stargazers_count": 65,
"watchers_count": 64, "watchers_count": 65,
"forks_count": 8, "forks_count": 9,
"forks": 8, "forks": 9,
"watchers": 64, "watchers": 65,
"score": 0 "score": 0
} }
] ]

25
2020/CVE-2020-24572.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 289633451,
"name": "cve-2020-24572",
"full_name": "lb0x\/cve-2020-24572",
"owner": {
"login": "lb0x",
"id": 336581,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/336581?v=4",
"html_url": "https:\/\/github.com\/lb0x"
},
"html_url": "https:\/\/github.com\/lb0x\/cve-2020-24572",
"description": null,
"fork": false,
"created_at": "2020-08-23T06:58:04Z",
"updated_at": "2020-08-24T20:44:45Z",
"pushed_at": "2020-08-24T20:39:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-08-24T06:58:14Z", "updated_at": "2020-08-24T19:17:29Z",
"pushed_at": "2020-08-03T04:37:30Z", "pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1528, "stargazers_count": 1529,
"watchers_count": 1528, "watchers_count": 1529,
"forks_count": 398, "forks_count": 398,
"forks": 398, "forks": 398,
"watchers": 1528, "watchers": 1529,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "Python exploit of cve-2020-7247", "description": "Python exploit of cve-2020-7247",
"fork": false, "fork": false,
"created_at": "2020-01-30T19:29:27Z", "created_at": "2020-01-30T19:29:27Z",
"updated_at": "2020-07-19T21:18:23Z", "updated_at": "2020-08-24T16:37:57Z",
"pushed_at": "2020-02-19T10:55:15Z", "pushed_at": "2020-02-19T10:55:15Z",
"stargazers_count": 16, "stargazers_count": 17,
"watchers_count": 16, "watchers_count": 17,
"forks_count": 8, "forks_count": 9,
"forks": 8, "forks": 9,
"watchers": 16, "watchers": 17,
"score": 0 "score": 0
}, },
{ {

View file

@ -1,14 +1,6 @@
# PoC in GitHub # PoC in GitHub
## 2020 ## 2020
### CVE-2020-0002
<code>
In ih264d_init_decoder of ih264d_api.c, there is a possible out of bounds write due to a use after free. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation Product: Android Versions: Android-8.0, Android-8.1, Android-9, and Android-10 Android ID: A-142602711
</code>
- [Polo35/CVE-2020-0002](https://github.com/Polo35/CVE-2020-0002)
### CVE-2020-0022 ### CVE-2020-0022
<code> <code>
@ -1962,6 +1954,14 @@ vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWid
### CVE-2020-24033 ### CVE-2020-24033
- [M0NsTeRRR/CVE-2020-24033](https://github.com/M0NsTeRRR/CVE-2020-24033) - [M0NsTeRRR/CVE-2020-24033](https://github.com/M0NsTeRRR/CVE-2020-24033)
### CVE-2020-24572
<code>
An issue was discovered in includes/webconsole.php in RaspAP 2.5. With authenticated access, an attacker can use a misconfigured (and virtually unrestricted) web console to attack the underlying OS (Raspberry Pi) running this software, and execute commands on the system (including ones for uploading of files and execution of code).
</code>
- [lb0x/cve-2020-24572](https://github.com/lb0x/cve-2020-24572)
### CVE-2020-72381 ### CVE-2020-72381
- [jdordonezn/CVE-2020-72381](https://github.com/jdordonezn/CVE-2020-72381) - [jdordonezn/CVE-2020-72381](https://github.com/jdordonezn/CVE-2020-72381)
@ -4757,6 +4757,7 @@ vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig
- [jd-961/CVE-2019-16759-bypass](https://github.com/jd-961/CVE-2019-16759-bypass) - [jd-961/CVE-2019-16759-bypass](https://github.com/jd-961/CVE-2019-16759-bypass)
- [nako48/CVE-2019-16759](https://github.com/nako48/CVE-2019-16759) - [nako48/CVE-2019-16759](https://github.com/nako48/CVE-2019-16759)
- [mas1337/CVE-2019-16759](https://github.com/mas1337/CVE-2019-16759) - [mas1337/CVE-2019-16759](https://github.com/mas1337/CVE-2019-16759)
- [sunian19/CVE-2019-16759](https://github.com/sunian19/CVE-2019-16759)
### CVE-2019-16784 ### CVE-2019-16784