mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/05/29 06:07:44
This commit is contained in:
parent
9c687f4b60
commit
9b3336c61b
20 changed files with 80 additions and 113 deletions
|
@ -13,13 +13,13 @@
|
||||||
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
|
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2013-09-22T21:20:31Z",
|
"created_at": "2013-09-22T21:20:31Z",
|
||||||
"updated_at": "2020-05-25T14:26:12Z",
|
"updated_at": "2020-05-28T17:46:31Z",
|
||||||
"pushed_at": "2017-04-24T14:16:56Z",
|
"pushed_at": "2017-04-24T14:16:56Z",
|
||||||
"stargazers_count": 259,
|
"stargazers_count": 260,
|
||||||
"watchers_count": 259,
|
"watchers_count": 260,
|
||||||
"forks_count": 83,
|
"forks_count": 83,
|
||||||
"forks": 83,
|
"forks": 83,
|
||||||
"watchers": 259,
|
"watchers": 260,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "An implementation of CVE-2009-0689 for the Nintendo Wii.",
|
"description": "An implementation of CVE-2009-0689 for the Nintendo Wii.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2018-12-18T04:24:43Z",
|
"created_at": "2018-12-18T04:24:43Z",
|
||||||
"updated_at": "2020-05-25T15:29:31Z",
|
"updated_at": "2020-05-28T17:11:00Z",
|
||||||
"pushed_at": "2019-09-30T23:38:11Z",
|
"pushed_at": "2019-09-30T23:38:11Z",
|
||||||
"stargazers_count": 24,
|
"stargazers_count": 25,
|
||||||
"watchers_count": 24,
|
"watchers_count": 25,
|
||||||
"forks_count": 4,
|
"forks_count": 4,
|
||||||
"forks": 4,
|
"forks": 4,
|
||||||
"watchers": 24,
|
"watchers": 25,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -1,25 +0,0 @@
|
||||||
[
|
|
||||||
{
|
|
||||||
"id": 240369244,
|
|
||||||
"name": "CVE-2013-6987",
|
|
||||||
"full_name": "stoicboomer\/CVE-2013-6987",
|
|
||||||
"owner": {
|
|
||||||
"login": "stoicboomer",
|
|
||||||
"id": 45523448,
|
|
||||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/45523448?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/stoicboomer"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/stoicboomer\/CVE-2013-6987",
|
|
||||||
"description": "exploit for DNS 4.3",
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2020-02-13T21:42:24Z",
|
|
||||||
"updated_at": "2020-05-26T16:51:50Z",
|
|
||||||
"pushed_at": "2020-02-13T21:51:46Z",
|
|
||||||
"stargazers_count": 0,
|
|
||||||
"watchers_count": 0,
|
|
||||||
"forks_count": 0,
|
|
||||||
"forks": 0,
|
|
||||||
"watchers": 0,
|
|
||||||
"score": 0
|
|
||||||
}
|
|
||||||
]
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "An implementation of CVE-2016-0974 for the Nintendo Wii.",
|
"description": "An implementation of CVE-2016-0974 for the Nintendo Wii.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2018-04-01T00:39:28Z",
|
"created_at": "2018-04-01T00:39:28Z",
|
||||||
"updated_at": "2020-05-11T00:47:46Z",
|
"updated_at": "2020-05-28T20:33:17Z",
|
||||||
"pushed_at": "2019-09-30T23:40:01Z",
|
"pushed_at": "2019-09-30T23:40:01Z",
|
||||||
"stargazers_count": 18,
|
"stargazers_count": 19,
|
||||||
"watchers_count": 18,
|
"watchers_count": 19,
|
||||||
"forks_count": 4,
|
"forks_count": 4,
|
||||||
"forks": 4,
|
"forks": 4,
|
||||||
"watchers": 18,
|
"watchers": 19,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -63,8 +63,8 @@
|
||||||
"pushed_at": "2017-11-19T11:01:16Z",
|
"pushed_at": "2017-11-19T11:01:16Z",
|
||||||
"stargazers_count": 624,
|
"stargazers_count": 624,
|
||||||
"watchers_count": 624,
|
"watchers_count": 624,
|
||||||
"forks_count": 278,
|
"forks_count": 277,
|
||||||
"forks": 278,
|
"forks": 277,
|
||||||
"watchers": 624,
|
"watchers": 624,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -174,13 +174,13 @@
|
||||||
"description": "iis6 exploit 2017 CVE-2017-7269",
|
"description": "iis6 exploit 2017 CVE-2017-7269",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2017-04-05T23:21:12Z",
|
"created_at": "2017-04-05T23:21:12Z",
|
||||||
"updated_at": "2020-04-23T09:10:38Z",
|
"updated_at": "2020-05-28T16:34:27Z",
|
||||||
"pushed_at": "2017-04-05T23:29:03Z",
|
"pushed_at": "2017-04-05T23:29:03Z",
|
||||||
"stargazers_count": 11,
|
"stargazers_count": 12,
|
||||||
"watchers_count": 11,
|
"watchers_count": 12,
|
||||||
"forks_count": 21,
|
"forks_count": 21,
|
||||||
"forks": 21,
|
"forks": 21,
|
||||||
"watchers": 11,
|
"watchers": 12,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "CVE-2018-8440 standalone exploit",
|
"description": "CVE-2018-8440 standalone exploit",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2018-10-31T17:00:43Z",
|
"created_at": "2018-10-31T17:00:43Z",
|
||||||
"updated_at": "2020-05-06T19:14:55Z",
|
"updated_at": "2020-05-28T19:55:44Z",
|
||||||
"pushed_at": "2018-10-31T19:05:17Z",
|
"pushed_at": "2018-10-31T19:05:17Z",
|
||||||
"stargazers_count": 66,
|
"stargazers_count": 67,
|
||||||
"watchers_count": 66,
|
"watchers_count": 67,
|
||||||
"forks_count": 21,
|
"forks_count": 21,
|
||||||
"forks": 21,
|
"forks": 21,
|
||||||
"watchers": 66,
|
"watchers": 67,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -1347,13 +1347,13 @@
|
||||||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-05-23T22:50:12Z",
|
"created_at": "2019-05-23T22:50:12Z",
|
||||||
"updated_at": "2020-05-27T04:08:58Z",
|
"updated_at": "2020-05-28T16:27:41Z",
|
||||||
"pushed_at": "2019-06-22T21:48:45Z",
|
"pushed_at": "2019-06-22T21:48:45Z",
|
||||||
"stargazers_count": 733,
|
"stargazers_count": 734,
|
||||||
"watchers_count": 733,
|
"watchers_count": 734,
|
||||||
"forks_count": 173,
|
"forks_count": 173,
|
||||||
"forks": 173,
|
"forks": 173,
|
||||||
"watchers": 733,
|
"watchers": 734,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -40,8 +40,8 @@
|
||||||
"pushed_at": "2019-04-01T13:19:49Z",
|
"pushed_at": "2019-04-01T13:19:49Z",
|
||||||
"stargazers_count": 256,
|
"stargazers_count": 256,
|
||||||
"watchers_count": 256,
|
"watchers_count": 256,
|
||||||
"forks_count": 73,
|
"forks_count": 74,
|
||||||
"forks": 73,
|
"forks": 74,
|
||||||
"watchers": 256,
|
"watchers": 256,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Developed proof-of-concept exploits for various types of vulnerabilities and mitigation bypasses with user-mode Windows applications, New CVE's produced via this repo: CVE-2019-16724, CVE-2019-17181",
|
"description": "Developed proof-of-concept exploits for various types of vulnerabilities and mitigation bypasses with user-mode Windows applications, New CVE's produced via this repo: CVE-2019-16724, CVE-2019-17181",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-08-31T20:28:12Z",
|
"created_at": "2019-08-31T20:28:12Z",
|
||||||
"updated_at": "2020-05-26T15:41:21Z",
|
"updated_at": "2020-05-28T18:19:31Z",
|
||||||
"pushed_at": "2020-05-09T16:01:14Z",
|
"pushed_at": "2020-05-09T16:01:14Z",
|
||||||
"stargazers_count": 82,
|
"stargazers_count": 83,
|
||||||
"watchers_count": 82,
|
"watchers_count": 83,
|
||||||
"forks_count": 19,
|
"forks_count": 19,
|
||||||
"forks": 19,
|
"forks": 19,
|
||||||
"watchers": 82,
|
"watchers": 83,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
|
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-01T09:33:35Z",
|
"created_at": "2020-04-01T09:33:35Z",
|
||||||
"updated_at": "2020-05-28T14:43:49Z",
|
"updated_at": "2020-05-28T19:01:58Z",
|
||||||
"pushed_at": "2020-05-27T10:27:11Z",
|
"pushed_at": "2020-05-27T10:27:11Z",
|
||||||
"stargazers_count": 800,
|
"stargazers_count": 803,
|
||||||
"watchers_count": 800,
|
"watchers_count": 803,
|
||||||
"forks_count": 181,
|
"forks_count": 181,
|
||||||
"forks": 181,
|
"forks": 181,
|
||||||
"watchers": 800,
|
"watchers": 803,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -17,8 +17,8 @@
|
||||||
"pushed_at": "2020-02-19T03:47:33Z",
|
"pushed_at": "2020-02-19T03:47:33Z",
|
||||||
"stargazers_count": 41,
|
"stargazers_count": 41,
|
||||||
"watchers_count": 41,
|
"watchers_count": 41,
|
||||||
"forks_count": 13,
|
"forks_count": 14,
|
||||||
"forks": 13,
|
"forks": 14,
|
||||||
"watchers": 41,
|
"watchers": 41,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -381,13 +381,13 @@
|
||||||
"description": "Detect and log CVE-2019-19781 scan and exploitation attempts.",
|
"description": "Detect and log CVE-2019-19781 scan and exploitation attempts.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-13T10:09:31Z",
|
"created_at": "2020-01-13T10:09:31Z",
|
||||||
"updated_at": "2020-05-28T08:32:18Z",
|
"updated_at": "2020-05-28T16:47:32Z",
|
||||||
"pushed_at": "2020-01-15T13:58:22Z",
|
"pushed_at": "2020-01-15T13:58:22Z",
|
||||||
"stargazers_count": 93,
|
"stargazers_count": 94,
|
||||||
"watchers_count": 93,
|
"watchers_count": 94,
|
||||||
"forks_count": 24,
|
"forks_count": 24,
|
||||||
"forks": 24,
|
"forks": 24,
|
||||||
"watchers": 93,
|
"watchers": 94,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -772,13 +772,13 @@
|
||||||
"description": "Citrix ADC (NetScaler) Honeypot. Supports detection for CVE-2019-19781 and login attempts",
|
"description": "Citrix ADC (NetScaler) Honeypot. Supports detection for CVE-2019-19781 and login attempts",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-22T13:00:18Z",
|
"created_at": "2020-01-22T13:00:18Z",
|
||||||
"updated_at": "2020-05-18T19:29:43Z",
|
"updated_at": "2020-05-28T16:48:49Z",
|
||||||
"pushed_at": "2020-01-23T09:10:06Z",
|
"pushed_at": "2020-01-23T09:10:06Z",
|
||||||
"stargazers_count": 15,
|
"stargazers_count": 16,
|
||||||
"watchers_count": 15,
|
"watchers_count": 16,
|
||||||
"forks_count": 4,
|
"forks_count": 4,
|
||||||
"forks": 4,
|
"forks": 4,
|
||||||
"watchers": 15,
|
"watchers": 16,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -174,13 +174,13 @@
|
||||||
"description": "CVE-2019-2725 命令回显",
|
"description": "CVE-2019-2725 命令回显",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-05-29T01:57:05Z",
|
"created_at": "2019-05-29T01:57:05Z",
|
||||||
"updated_at": "2020-05-28T12:26:02Z",
|
"updated_at": "2020-05-28T17:10:37Z",
|
||||||
"pushed_at": "2019-08-08T09:48:20Z",
|
"pushed_at": "2019-08-08T09:48:20Z",
|
||||||
"stargazers_count": 339,
|
"stargazers_count": 340,
|
||||||
"watchers_count": 339,
|
"watchers_count": 340,
|
||||||
"forks_count": 148,
|
"forks_count": 148,
|
||||||
"forks": 148,
|
"forks": 148,
|
||||||
"watchers": 339,
|
"watchers": 340,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
|
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-01T09:33:35Z",
|
"created_at": "2020-04-01T09:33:35Z",
|
||||||
"updated_at": "2020-05-28T14:43:49Z",
|
"updated_at": "2020-05-28T19:01:58Z",
|
||||||
"pushed_at": "2020-05-27T10:27:11Z",
|
"pushed_at": "2020-05-27T10:27:11Z",
|
||||||
"stargazers_count": 800,
|
"stargazers_count": 803,
|
||||||
"watchers_count": 800,
|
"watchers_count": 803,
|
||||||
"forks_count": 181,
|
"forks_count": 181,
|
||||||
"forks": 181,
|
"forks": 181,
|
||||||
"watchers": 800,
|
"watchers": 803,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -1,25 +1,25 @@
|
||||||
[
|
[
|
||||||
{
|
{
|
||||||
"id": 267392741,
|
"id": 267493495,
|
||||||
"name": "CVE-2020-11492",
|
"name": "CVE-2020-11492",
|
||||||
"full_name": "joshfinley\/CVE-2020-11492",
|
"full_name": "CrackerCat\/CVE-2020-11492",
|
||||||
"owner": {
|
"owner": {
|
||||||
"login": "joshfinley",
|
"login": "CrackerCat",
|
||||||
"id": 13423441,
|
"id": 17995064,
|
||||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/13423441?v=4",
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/17995064?v=4",
|
||||||
"html_url": "https:\/\/github.com\/joshfinley"
|
"html_url": "https:\/\/github.com\/CrackerCat"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/joshfinley\/CVE-2020-11492",
|
"html_url": "https:\/\/github.com\/CrackerCat\/CVE-2020-11492",
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-05-27T18:11:18Z",
|
"created_at": "2020-05-28T04:32:01Z",
|
||||||
"updated_at": "2020-05-28T13:48:55Z",
|
"updated_at": "2020-05-28T16:20:20Z",
|
||||||
"pushed_at": "2020-05-28T13:11:33Z",
|
"pushed_at": "2020-05-27T21:22:04Z",
|
||||||
"stargazers_count": 13,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 13,
|
"watchers_count": 0,
|
||||||
"forks_count": 4,
|
"forks_count": 3,
|
||||||
"forks": 4,
|
"forks": 3,
|
||||||
"watchers": 13,
|
"watchers": 0,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,8 +13,8 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-05-27T18:48:10Z",
|
"created_at": "2020-05-27T18:48:10Z",
|
||||||
"updated_at": "2020-05-27T18:49:08Z",
|
"updated_at": "2020-05-28T15:17:18Z",
|
||||||
"pushed_at": "2020-05-27T18:49:05Z",
|
"pushed_at": "2020-05-28T15:17:16Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
|
|
|
@ -59,13 +59,13 @@
|
||||||
"description": "Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal",
|
"description": "Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-05-19T18:59:26Z",
|
"created_at": "2020-05-19T18:59:26Z",
|
||||||
"updated_at": "2020-05-26T12:31:44Z",
|
"updated_at": "2020-05-28T16:24:44Z",
|
||||||
"pushed_at": "2020-05-25T08:33:24Z",
|
"pushed_at": "2020-05-25T08:33:24Z",
|
||||||
"stargazers_count": 70,
|
"stargazers_count": 71,
|
||||||
"watchers_count": 70,
|
"watchers_count": 71,
|
||||||
"forks_count": 13,
|
"forks_count": 13,
|
||||||
"forks": 13,
|
"forks": 13,
|
||||||
"watchers": 70,
|
"watchers": 71,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -36,13 +36,13 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-05-21T00:41:06Z",
|
"created_at": "2020-05-21T00:41:06Z",
|
||||||
"updated_at": "2020-05-26T13:44:01Z",
|
"updated_at": "2020-05-28T18:59:01Z",
|
||||||
"pushed_at": "2020-05-21T10:15:35Z",
|
"pushed_at": "2020-05-21T10:15:35Z",
|
||||||
"stargazers_count": 13,
|
"stargazers_count": 14,
|
||||||
"watchers_count": 13,
|
"watchers_count": 14,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 13,
|
"watchers": 14,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
10
README.md
10
README.md
|
@ -438,7 +438,7 @@ Sonatype Nexus Repository Manager 3.x up to and including 3.21.2 has Incorrect A
|
||||||
- [zhzyker/CVE-2020-11444](https://github.com/zhzyker/CVE-2020-11444)
|
- [zhzyker/CVE-2020-11444](https://github.com/zhzyker/CVE-2020-11444)
|
||||||
|
|
||||||
### CVE-2020-11492
|
### CVE-2020-11492
|
||||||
- [joshfinley/CVE-2020-11492](https://github.com/joshfinley/CVE-2020-11492)
|
- [CrackerCat/CVE-2020-11492](https://github.com/CrackerCat/CVE-2020-11492)
|
||||||
|
|
||||||
### CVE-2020-11539
|
### CVE-2020-11539
|
||||||
|
|
||||||
|
@ -12610,14 +12610,6 @@ Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in
|
||||||
|
|
||||||
- [sdneon/CveTest](https://github.com/sdneon/CveTest)
|
- [sdneon/CveTest](https://github.com/sdneon/CveTest)
|
||||||
|
|
||||||
### CVE-2013-6987
|
|
||||||
|
|
||||||
<code>
|
|
||||||
Multiple directory traversal vulnerabilities in the FileBrowser components in Synology DiskStation Manager (DSM) before 4.3-3810 Update 3 allow remote attackers to read, write, and delete arbitrary files via a .. (dot dot) in the (1) path parameter to file_delete.cgi or (2) folder_path parameter to file_share.cgi in webapi/FileStation/; (3) dlink parameter to fbdownload/; or unspecified parameters to (4) html5_upload.cgi, (5) file_download.cgi, (6) file_sharing.cgi, (7) file_MVCP.cgi, or (8) file_rename.cgi in webapi/FileStation/.
|
|
||||||
</code>
|
|
||||||
|
|
||||||
- [stoicboomer/CVE-2013-6987](https://github.com/stoicboomer/CVE-2013-6987)
|
|
||||||
|
|
||||||
|
|
||||||
## 2012
|
## 2012
|
||||||
### CVE-2012-0003
|
### CVE-2012-0003
|
||||||
|
|
Loading…
Reference in a new issue