mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-27 18:14:12 +01:00
Auto Update 2020/04/27 00:08:39
This commit is contained in:
parent
44460cd104
commit
933d13b9b9
28 changed files with 165 additions and 92 deletions
2010
2014
2017
2018
2019
CVE-2019-0708.jsonCVE-2019-1003000.jsonCVE-2019-1040.jsonCVE-2019-11580.jsonCVE-2019-13720.jsonCVE-2019-18371.jsonCVE-2019-2618.jsonCVE-2019-8936.jsonCVE-2019-9787.json
2020
CVE-2020-0668.jsonCVE-2020-0688.jsonCVE-2020-0796.jsonCVE-2020-10199.jsonCVE-2020-2546.jsonCVE-2020-2551.jsonCVE-2020-7961.json
README.md
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 114424141,
|
||||
"name": "privesc-CVE-2010-0426",
|
||||
"full_name": "t0kx\/privesc-CVE-2010-0426",
|
||||
"owner": {
|
||||
"login": "t0kx",
|
||||
"id": 24924517,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/24924517?v=4",
|
||||
"html_url": "https:\/\/github.com\/t0kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/t0kx\/privesc-CVE-2010-0426",
|
||||
"description": "Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-16T01:16:44Z",
|
||||
"updated_at": "2020-04-20T12:29:23Z",
|
||||
"pushed_at": "2017-12-16T01:19:11Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 164330369,
|
||||
"name": "cve-2010-0426",
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A checker (site and tool) for CVE-2014-0160",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-07T23:03:09Z",
|
||||
"updated_at": "2020-04-22T18:15:00Z",
|
||||
"updated_at": "2020-04-26T14:04:45Z",
|
||||
"pushed_at": "2016-05-07T19:35:14Z",
|
||||
"stargazers_count": 2243,
|
||||
"watchers_count": 2243,
|
||||
"stargazers_count": 2242,
|
||||
"watchers_count": 2242,
|
||||
"forks_count": 484,
|
||||
"forks": 484,
|
||||
"watchers": 2243,
|
||||
"watchers": 2242,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 62805078,
|
||||
"name": "cve-2014-9707",
|
||||
"full_name": "ench4nt3r\/cve-2014-9707",
|
||||
"full_name": "zhw-01\/cve-2014-9707",
|
||||
"owner": {
|
||||
"login": "ench4nt3r",
|
||||
"login": "zhw-01",
|
||||
"id": 17694288,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/17694288?v=4",
|
||||
"html_url": "https:\/\/github.com\/ench4nt3r"
|
||||
"html_url": "https:\/\/github.com\/zhw-01"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ench4nt3r\/cve-2014-9707",
|
||||
"html_url": "https:\/\/github.com\/zhw-01\/cve-2014-9707",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-07-07T12:27:56Z",
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-16T19:44:04Z",
|
||||
"updated_at": "2020-04-23T16:37:04Z",
|
||||
"updated_at": "2020-04-26T11:17:12Z",
|
||||
"pushed_at": "2019-07-23T19:24:01Z",
|
||||
"stargazers_count": 258,
|
||||
"watchers_count": 258,
|
||||
"stargazers_count": 259,
|
||||
"watchers_count": 259,
|
||||
"forks_count": 102,
|
||||
"forks": 102,
|
||||
"watchers": 258,
|
||||
"watchers": 259,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-11-12T07:14:25Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2017-12149 jboss反序列化 可回显",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-28T02:52:47Z",
|
||||
"updated_at": "2020-04-23T09:18:35Z",
|
||||
"updated_at": "2020-04-26T13:01:27Z",
|
||||
"pushed_at": "2019-03-13T08:57:50Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 90,
|
||||
"watchers": 91,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2017-9506 - SSRF",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-25T11:25:18Z",
|
||||
"updated_at": "2020-04-26T08:20:38Z",
|
||||
"updated_at": "2020-04-26T14:53:20Z",
|
||||
"pushed_at": "2018-04-26T12:47:54Z",
|
||||
"stargazers_count": 140,
|
||||
"watchers_count": 140,
|
||||
"stargazers_count": 142,
|
||||
"watchers_count": 142,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 140,
|
||||
"watchers": 142,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -220,13 +220,13 @@
|
|||
"description": "Struts 2.5 - 2.5.12 REST Plugin XStream RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-05T16:00:48Z",
|
||||
"updated_at": "2020-04-05T16:01:42Z",
|
||||
"updated_at": "2020-04-26T14:09:41Z",
|
||||
"pushed_at": "2020-04-05T16:01:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "POC CVE-2018-14714",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-25T03:43:44Z",
|
||||
"updated_at": "2020-04-25T03:44:21Z",
|
||||
"pushed_at": "2020-04-25T03:44:19Z",
|
||||
"updated_at": "2020-04-26T09:57:36Z",
|
||||
"pushed_at": "2020-04-26T09:57:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-17T23:48:15Z",
|
||||
"updated_at": "2020-04-06T11:36:21Z",
|
||||
"updated_at": "2020-04-26T12:26:28Z",
|
||||
"pushed_at": "2019-11-15T08:12:32Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 103,
|
||||
"watchers": 104,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-21T00:09:56Z",
|
||||
"updated_at": "2020-04-22T18:09:50Z",
|
||||
"updated_at": "2020-04-26T12:10:22Z",
|
||||
"pushed_at": "2020-03-06T10:52:19Z",
|
||||
"stargazers_count": 394,
|
||||
"watchers_count": 394,
|
||||
"stargazers_count": 395,
|
||||
"watchers_count": 395,
|
||||
"forks_count": 120,
|
||||
"forks": 120,
|
||||
"watchers": 394,
|
||||
"watchers": 395,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2018-10-11T16:54:31Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 64,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1140,13 +1140,13 @@
|
|||
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-22T00:08:44Z",
|
||||
"updated_at": "2020-04-14T13:18:19Z",
|
||||
"updated_at": "2020-04-26T09:15:25Z",
|
||||
"pushed_at": "2019-10-01T12:23:59Z",
|
||||
"stargazers_count": 1098,
|
||||
"watchers_count": 1098,
|
||||
"stargazers_count": 1099,
|
||||
"watchers_count": 1099,
|
||||
"forks_count": 370,
|
||||
"forks": 370,
|
||||
"watchers": 1098,
|
||||
"watchers": 1099,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Jenkins RCE Proof-of-Concept: SECURITY-1266 \/ CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-15T05:59:24Z",
|
||||
"updated_at": "2020-04-25T09:32:26Z",
|
||||
"updated_at": "2020-04-26T09:46:40Z",
|
||||
"pushed_at": "2019-04-01T13:19:49Z",
|
||||
"stargazers_count": 252,
|
||||
"watchers_count": 252,
|
||||
"stargazers_count": 253,
|
||||
"watchers_count": 253,
|
||||
"forks_count": 73,
|
||||
"forks": 73,
|
||||
"watchers": 252,
|
||||
"watchers": 253,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-1040 with Exchange",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-14T11:16:03Z",
|
||||
"updated_at": "2020-04-26T07:40:57Z",
|
||||
"updated_at": "2020-04-26T10:13:29Z",
|
||||
"pushed_at": "2020-03-20T09:11:20Z",
|
||||
"stargazers_count": 161,
|
||||
"watchers_count": 161,
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"forks_count": 57,
|
||||
"forks": 57,
|
||||
"watchers": 161,
|
||||
"watchers": 162,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-17T07:54:38Z",
|
||||
"updated_at": "2020-04-13T07:52:26Z",
|
||||
"updated_at": "2020-04-26T12:46:32Z",
|
||||
"pushed_at": "2019-07-18T10:03:28Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 76,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-03-21T16:21:58Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-30T16:32:13Z",
|
||||
"updated_at": "2020-04-23T10:34:25Z",
|
||||
"updated_at": "2020-04-26T14:14:34Z",
|
||||
"pushed_at": "2020-01-12T02:34:45Z",
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 119,
|
||||
"watchers": 118,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2020-04-26T08:32:03Z",
|
||||
"pushed_at": "2020-04-26T09:03:43Z",
|
||||
"stargazers_count": 527,
|
||||
"watchers_count": 527,
|
||||
"forks_count": 115,
|
||||
"forks": 115,
|
||||
"watchers": 527,
|
||||
"updated_at": "2020-04-26T10:23:55Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 529,
|
||||
"watchers_count": 529,
|
||||
"forks_count": 116,
|
||||
"forks": 116,
|
||||
"watchers": 529,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2020-04-17T11:11:18Z",
|
||||
"stargazers_count": 606,
|
||||
"watchers_count": 606,
|
||||
"forks_count": 121,
|
||||
"forks": 121,
|
||||
"forks_count": 122,
|
||||
"forks": 122,
|
||||
"watchers": 606,
|
||||
"score": 0
|
||||
}
|
||||
|
|
25
2019/CVE-2019-8936.json
Normal file
25
2019/CVE-2019-8936.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 259009327,
|
||||
"name": "CVE-2019-8936",
|
||||
"full_name": "snappyJack\/CVE-2019-8936",
|
||||
"owner": {
|
||||
"login": "snappyJack",
|
||||
"id": 16055573,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16055573?v=4",
|
||||
"html_url": "https:\/\/github.com\/snappyJack"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/snappyJack\/CVE-2019-8936",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-04-26T11:07:19Z",
|
||||
"updated_at": "2020-04-26T11:21:31Z",
|
||||
"pushed_at": "2020-04-26T11:21:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,8 +59,8 @@
|
|||
"description": "This is a recurrence of cve-2019-9787 on Wordpress and a hash-based defense.",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-23T09:20:54Z",
|
||||
"updated_at": "2020-04-26T02:53:22Z",
|
||||
"pushed_at": "2020-04-26T02:53:21Z",
|
||||
"updated_at": "2020-04-26T12:29:49Z",
|
||||
"pushed_at": "2020-04-26T12:29:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-02-26T09:24:45Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-02-27T02:54:58Z",
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"forks_count": 65,
|
||||
"forks": 65,
|
||||
"forks_count": 66,
|
||||
"forks": 66,
|
||||
"watchers": 171,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -960,8 +960,8 @@
|
|||
"pushed_at": "2020-04-08T19:27:07Z",
|
||||
"stargazers_count": 844,
|
||||
"watchers_count": 844,
|
||||
"forks_count": 240,
|
||||
"forks": 240,
|
||||
"forks_count": 241,
|
||||
"forks": 241,
|
||||
"watchers": 844,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-04-17T11:11:18Z",
|
||||
"stargazers_count": 606,
|
||||
"watchers_count": 606,
|
||||
"forks_count": 121,
|
||||
"forks": 121,
|
||||
"forks_count": 122,
|
||||
"forks": 122,
|
||||
"watchers": 606,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-2546,CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3, power by 【劦久信安】",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-02T15:54:46Z",
|
||||
"updated_at": "2020-04-26T08:28:03Z",
|
||||
"updated_at": "2020-04-26T12:46:04Z",
|
||||
"pushed_at": "2020-04-17T14:24:31Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 50,
|
||||
"watchers": 52,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,8 +59,8 @@
|
|||
"description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-19T13:01:32Z",
|
||||
"updated_at": "2020-04-26T01:41:13Z",
|
||||
"pushed_at": "2020-04-25T12:55:25Z",
|
||||
"updated_at": "2020-04-26T11:55:26Z",
|
||||
"pushed_at": "2020-04-26T11:54:57Z",
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"forks_count": 29,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-03-26T01:34:38Z",
|
||||
"updated_at": "2020-04-26T04:14:10Z",
|
||||
"updated_at": "2020-04-26T10:47:28Z",
|
||||
"pushed_at": "2020-04-14T12:31:19Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 80,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
27
README.md
27
README.md
|
@ -3793,6 +3793,14 @@ A memory corruption issue was addressed with improved state management. This iss
|
|||
- [A2nkF/macOS-Kernel-Exploit](https://github.com/A2nkF/macOS-Kernel-Exploit)
|
||||
- [TrungNguyen1909/CVE-2019-8781-macOS](https://github.com/TrungNguyen1909/CVE-2019-8781-macOS)
|
||||
|
||||
### CVE-2019-8936
|
||||
|
||||
<code>
|
||||
NTP through 4.2.8p12 has a NULL Pointer Dereference.
|
||||
</code>
|
||||
|
||||
- [snappyJack/CVE-2019-8936](https://github.com/snappyJack/CVE-2019-8936)
|
||||
|
||||
### CVE-2019-8942
|
||||
|
||||
<code>
|
||||
|
@ -11782,7 +11790,7 @@ Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4,
|
|||
EmbedThis GoAhead 3.0.0 through 3.4.1 does not properly handle path segments starting with a . (dot), which allows remote attackers to conduct directory traversal attacks, cause a denial of service (heap-based buffer overflow and crash), or possibly execute arbitrary code via a crafted URI.
|
||||
</code>
|
||||
|
||||
- [ench4nt3r/cve-2014-9707](https://github.com/ench4nt3r/cve-2014-9707)
|
||||
- [zhw-01/cve-2014-9707](https://github.com/zhw-01/cve-2014-9707)
|
||||
|
||||
|
||||
## 2013
|
||||
|
@ -12543,6 +12551,7 @@ mpack 1.6 has information disclosure via eavesdropping on mails sent by other us
|
|||
sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory.
|
||||
</code>
|
||||
|
||||
- [t0kx/privesc-CVE-2010-0426](https://github.com/t0kx/privesc-CVE-2010-0426)
|
||||
- [cved-sources/cve-2010-0426](https://github.com/cved-sources/cve-2010-0426)
|
||||
|
||||
### CVE-2010-0738
|
||||
|
@ -12594,6 +12603,22 @@ Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office
|
|||
|
||||
- [whiteHat001/cve-2010-3333](https://github.com/whiteHat001/cve-2010-3333)
|
||||
|
||||
### CVE-2010-3437
|
||||
|
||||
<code>
|
||||
Integer signedness error in the pkt_find_dev_from_minor function in drivers/block/pktcdvd.c in the Linux kernel before 2.6.36-rc6 allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and system crash) via a crafted index value in a PKT_CTRL_CMD_STATUS ioctl call.
|
||||
</code>
|
||||
|
||||
- [huang-emily/CVE-2010-3437](https://github.com/huang-emily/CVE-2010-3437)
|
||||
|
||||
### CVE-2010-3490
|
||||
|
||||
<code>
|
||||
Directory traversal vulnerability in page.recordings.php in the System Recordings component in the configuration interface in FreePBX 2.8.0 and earlier allows remote authenticated administrators to create arbitrary files via a .. (dot dot) in the usersnum parameter to admin/config.php, as demonstrated by creating a .php file under the web root.
|
||||
</code>
|
||||
|
||||
- [moayadalmalat/CVE-2010-3490](https://github.com/moayadalmalat/CVE-2010-3490)
|
||||
|
||||
### CVE-2010-3600
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue