from the HTML source code.", "poc": ["https://www.exploit-db.com/docs/48175"]}, {"cve": "CVE-2020-8744", "desc": "Improper initialization in subsystem for Intel(R) CSME versions before12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions before 4.0.30 Intel(R) SPS versions before E3_05.01.04.200 may allow a privileged user to potentially enable escalation of privilege via local access.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-8744"]}, {"cve": "CVE-2020-11775", "desc": "Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56, R7500v2 before 1.0.3.46, R7800 before 1.0.2.68, R8900 before 1.0.4.28, R9000 before 1.0.4.28, RAX120 before 1.0.0.78, RBR20 before 2.3.5.26, RBS20 before 2.3.5.26, RBK20 before 2.3.5.26, RBR40 before 2.3.5.30, RBS40 before 2.3.5.30, RBK40 before 2.3.5.30, RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, RBK50 before 2.3.5.30, XR500 before 2.3.2.56, and XR700 before 1.0.1.10.", "poc": ["https://kb.netgear.com/000061755/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-Gateways-and-WiFi-Systems-PSV-2018-0523"]}, {"cve": "CVE-2020-11777", "desc": "Certain NETGEAR devices are affected by Stored XSS. This affects D7800 before 1.0.1.56, R7500v2 before 1.0.3.46, R7800 before 1.0.2.68, R8900 before 1.0.4.28, R9000 before 1.0.4.28, RAX120 before 1.0.0.78, XR500 before 2.3.2.56, and XR700 before 1.0.1.10.", "poc": ["https://kb.netgear.com/000061753/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateway-PSV-2018-0525"]}, {"cve": "CVE-2020-26907", "desc": "Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.", "poc": ["https://kb.netgear.com/000062347/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0264"]}, {"cve": "CVE-2020-22453", "desc": "Untis WebUntis before 2020.9.6 allows XSS in multiple functions that store information.", "poc": ["https://robin.meis.space/2020/03/11/notenmanipulation-in-elektronischen-klassenbuchern/"]}, {"cve": "CVE-2020-7693", "desc": "Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20.", "poc": ["https://github.com/andsnw/sockjs-dos-py", "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575448", "https://snyk.io/vuln/SNYK-JS-SOCKJS-575261", "https://github.com/0xT11/CVE-POC", "https://github.com/ARPSyndicate/cvemon", "https://github.com/andsnw/sockjs-dos-py", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/soosmile/POC"]}, {"cve": "CVE-2020-6064", "desc": "An exploitable out-of-bounds write vulnerability exists in the uncompress_scan_line function of the igcore19d.dll library of Accusoft ImageGear, version 19.5.0. A specially crafted PCX file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-0987"]}, {"cve": "CVE-2020-29322", "desc": "The D-Link router DIR-880L 1.07 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data.", "poc": ["https://cybersecurityworks.com/zerodays/cve-2020-29322-telnet-hardcoded-credentials.html", "https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-2581", "desc": "Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: LLVM Interpreter). The supported version that is affected is 19.3.0.2. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle GraalVM Enterprise Edition executes to compromise Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle GraalVM Enterprise Edition. CVSS 3.0 Base Score 4.0 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "poc": ["https://www.oracle.com/security-alerts/cpujan2020.html"]}, {"cve": "CVE-2020-26570", "desc": "The Oberthur smart card software driver in OpenSC before 0.21.0-rc1 has a heap-based buffer overflow in sc_oberthur_read_file.", "poc": ["https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-25708", "desc": "A divide by zero issue was found to occur in libvncserver-0.9.12. A malicious client could use this flaw to send a specially crafted message that, when processed by the VNC server, would lead to a floating point exception, resulting in a denial of service.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-25708"]}, {"cve": "CVE-2020-15392", "desc": "A user enumeration vulnerability flaw was found in Venki Supravizio BPM 10.1.2. This issue occurs during password recovery, where a difference in error messages could allow an attacker to determine if a username is valid or not, enabling a brute-force attack with valid usernames.", "poc": ["https://github.com/inflixim4be/CVE-2020-15392", "https://github.com/0xT11/CVE-POC", "https://github.com/ARPSyndicate/cvemon", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/inflixim4be/CVE-2020-15367", "https://github.com/inflixim4be/CVE-2020-15392", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/soosmile/POC"]}, {"cve": "CVE-2020-13953", "desc": "In Apache Tapestry from 5.4.0 to 5.5.0, crafting specific URLs, an attacker can download files inside the WEB-INF folder of the WAR being run.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2021-30638"]}, {"cve": "CVE-2020-25144", "desc": "An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to directory traversal and local file inclusion due to the fact that there is an unrestricted possibility of loading any file with an inc.php extension. Inclusion of other files (even though limited to the mentioned extension) can lead to Remote Code Execution. This can occur via /apps/?app=../ URIs.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/afine-com/research", "https://github.com/afinepl/research"]}, {"cve": "CVE-2020-15706", "desc": "GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions.", "poc": ["https://github.com/DNTYO/F5_Vulnerability", "https://github.com/Jurij-Ivastsuk/WAXAR-shim-review", "https://github.com/Live-Hack-CVE/CVE-2020-15706", "https://github.com/NaverCloudPlatform/shim-review", "https://github.com/Rodrigo-NR/shim-review", "https://github.com/ctrliq/ciq-shim-build", "https://github.com/rhboot/shim-review", "https://github.com/synackcyber/BootHole_Fix", "https://github.com/vathpela/shim-review"]}, {"cve": "CVE-2020-5934", "desc": "On BIG-IP APM 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, and 13.1.0-13.1.3.3, when multiple HTTP requests from the same client to configured SAML Single Logout (SLO) URL are passing through a TCP Keep-Alive connection, traffic to TMM can be disrupted.", "poc": ["https://github.com/org-metaeffekt/metaeffekt-universal-cvss-calculator"]}, {"cve": "CVE-2020-5723", "desc": "The UCM6200 series 1.0.20.22 and below stores unencrypted user passwords in an SQLite database. This could allow an attacker to retrieve all passwords and possibly gain elevated privileges.", "poc": ["https://www.tenable.com/security/research/tra-2020-17", "https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-28841", "desc": "MyDrivers64.sys in DriverGenius 9.61.3708.3054 allows attackers to cause a system crash via the ioctl command 0x9c402000 to \\\\.\\MyDrivers0_0_1.", "poc": ["https://github.com/datadancer/WinSysVuln/blob/main/DriverGenius-MyDrivers64.md"]}, {"cve": "CVE-2020-22985", "desc": "Cross-Site Scripting (XSS) vulnerability in MicroStrategy Web SDK 10.11 and earlier, allows remote unauthenticated attackers to execute arbitrary code via the key parameter to the getESRIExtraConfig task.", "poc": ["https://medium.com/@win3zz/simple-story-of-some-complicated-xss-on-facebook-8a9c0d80969d"]}, {"cve": "CVE-2020-11581", "desc": "An issue was discovered in Pulse Secure Pulse Connect Secure (PCS) through 2020-04-06. The applet in tncc.jar, executed on macOS, Linux, and Solaris clients when a Host Checker policy is enforced, allows a man-in-the-middle attacker to perform OS command injection attacks (against a client) via shell metacharacters to the doCustomRemediateInstructions method, because Runtime.getRuntime().exec() is used.", "poc": ["https://github.com/d4n-sec/d4n-sec.github.io"]}, {"cve": "CVE-2020-25115", "desc": "The Admin CP in vBulletin 5.6.3 allows XSS via an Occupation Title or Description to User Profile Field Manager.", "poc": ["https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-5774", "desc": "Nessus versions 8.11.0 and earlier were found to maintain sessions longer than the permitted period in certain scenarios. The lack of proper session expiration could allow attackers with local access to login into an existing browser session.", "poc": ["https://www.tenable.com/security/tns-2020-06", "https://github.com/ARPSyndicate/cvemon", "https://github.com/nyxgeek/exploits"]}, {"cve": "CVE-2020-8512", "desc": "In IceWarp Webmail Server through 11.4.4.1, there is XSS in the /webmail/ color parameter.", "poc": ["http://packetstormsecurity.com/files/156103/IceWarp-WebMail-11.4.4.1-Cross-Site-Scripting.html", "https://cxsecurity.com/issue/WLB-2020010205", "https://packetstormsecurity.com/files/156103/IceWarp-WebMail-11.4.4.1-Cross-Site-Scripting.html", "https://github.com/ARPSyndicate/cvemon", "https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/Elsfa7-110/kenzer-templates", "https://github.com/d4n-sec/d4n-sec.github.io", "https://github.com/lutfumertceylan/mywebsite", "https://github.com/merlinepedra/nuclei-templates", "https://github.com/merlinepedra25/nuclei-templates", "https://github.com/sobinge/nuclei-templates", "https://github.com/trhacknon/CVE-2020-8512"]}, {"cve": "CVE-2020-9327", "desc": "In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.", "poc": ["https://www.oracle.com/security-alerts/cpuApr2021.html", "https://www.oracle.com/security-alerts/cpujan2021.html", "https://www.oracle.com/security-alerts/cpujul2020.html", "https://www.oracle.com/security-alerts/cpuoct2020.html", "https://www.sqlite.org/cgi/src/info/4374860b29383380", "https://github.com/garethr/snykout"]}, {"cve": "CVE-2020-24917", "desc": "osTicket before 1.14.3 allows XSS via a crafted filename to DraftAjaxAPI::_uploadInlineImage() in include/ajax.draft.php.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/Legoclones/pentesting-osTicket"]}, {"cve": "CVE-2020-8911", "desc": "A padding oracle vulnerability exists in the AWS S3 Crypto SDK for GoLang versions prior to V2. The SDK allows users to encrypt files with AES-CBC without computing a Message Authentication Code (MAC), which then allows an attacker who has write access to the target's S3 bucket and can observe whether or not an endpoint with access to the key can decrypt a file, they can reconstruct the plaintext with (on average) 128*length (plaintext) queries to the endpoint, by exploiting CBC's ability to manipulate the bytes of the next block and PKCS5 padding errors. It is recommended to update your SDK to V2 or later, and re-encrypt your files.", "poc": ["https://github.com/google/security-research/security/advisories/GHSA-f5pg-7wfw-84q9", "https://github.com/ARPSyndicate/cvemon", "https://github.com/JtMotoX/docker-trivy", "https://github.com/SummitRoute/csp_security_mistakes", "https://github.com/atesemre/awesome-aws-security", "https://github.com/blaise442/awesome-aws-security", "https://github.com/jassics/awesome-aws-security", "https://github.com/thomasps7356/awesome-aws-security"]}, {"cve": "CVE-2020-8150", "desc": "A cryptographic issue in Nextcloud Server 19.0.1 allowed an attacker to downgrade the encryption scheme and break the integrity of encrypted files.", "poc": ["https://hackerone.com/reports/742588", "https://github.com/0xT11/CVE-POC", "https://github.com/geffner/CVE-2020-8289", "https://github.com/xbl2022/awesome-hacking-lists"]}, {"cve": "CVE-2020-28351", "desc": "The conferencing component on Mitel ShoreTel 19.46.1802.0 devices could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack (via the PATH_INFO to index.php) due to insufficient validation for the time_zone object in the HOME_MEETING& page.", "poc": ["http://packetstormsecurity.com/files/159987/ShoreTel-Conferencing-19.46.1802.0-Cross-Site-Scripting.html", "https://github.com/ARPSyndicate/cvemon", "https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/dievus/CVE-2020-28351", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/nomi-sec/PoC-in-GitHub"]}, {"cve": "CVE-2020-0879", "desc": "An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-0774, CVE-2020-0874, CVE-2020-0880, CVE-2020-0882.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/DanielEbert/winafl", "https://github.com/Team-BT5/WinAFL-RDP", "https://github.com/bacon-tomato-spaghetti/WinAFL-RDP", "https://github.com/googleprojectzero/winafl", "https://github.com/hardik05/winafl-powermopt", "https://github.com/pranav0408/WinAFL", "https://github.com/ssumachai/CS182-Project", "https://github.com/xinali/articles", "https://github.com/yrime/WinAflCustomMutate"]}, {"cve": "CVE-2020-35416", "desc": "Multiple cross-site scripting (XSS) vulnerabilities exist in PHPJabbers Appointment Scheduler 2.3, in the index.php admin login webpage (with different request parameters), allows remote attackers to inject arbitrary web script or HTML.", "poc": ["http://packetstormsecurity.com/files/160502/PHPJabbers-Appointment-Scheduler-2.3-Cross-Site-Scripting.html", "http://packetstormsecurity.com/files/160600/PHPJabbers-Appointment-Scheduler-2.3-Cross-Site-Scripting.html", "https://www.exploit-db.com/exploits/49281", "https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-24721", "desc": "An issue was discovered in the GAEN (aka Google/Apple Exposure Notifications) protocol through 2020-09-29, as used in COVID-19 applications on Android and iOS. It allows a user to be put in a position where he or she can be coerced into proving or disproving an exposure notification, because of the persistent state of a private framework.", "poc": ["http://packetstormsecurity.com/files/159419/Corona-Exposure-Notifications-API-Data-Leakage.html"]}, {"cve": "CVE-2020-9471", "desc": "Umbraco Cloud 8.5.3 allows an authenticated file upload (and consequently Remote Code Execution) via the Install Packages functionality.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/lnick2023/nicenice", "https://github.com/qazbnm456/awesome-cve-poc", "https://github.com/xbl3/awesome-cve-poc_qazbnm456"]}, {"cve": "CVE-2020-20344", "desc": "WTCMS 1.0 contains a reflective cross-site scripting (XSS) vulnerability in the keyword search function under the background articles module.", "poc": ["https://github.com/taosir/wtcms/issues/9"]}, {"cve": "CVE-2020-13799", "desc": "Western Digital has identified a security vulnerability in the Replay Protected Memory Block (RPMB) protocol as specified in multiple standards for storage device interfaces, including all versions of eMMC, UFS, and NVMe. The RPMB protocol is specified by industry standards bodies and is implemented by storage devices from multiple vendors to assist host systems in securing trusted firmware. Several scenarios have been identified in which the RPMB state may be affected by an attacker without the knowledge of the trusted component that uses the RPMB feature.", "poc": ["https://www.westerndigital.com/support/productsecurity/wdc-20008-replay-attack-vulnerabilities-rpmb-protocol-applications"]}, {"cve": "CVE-2020-27840", "desc": "A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to system availability.", "poc": ["https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-10942", "desc": "In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.", "poc": ["https://usn.ubuntu.com/4342-1/", "https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-2872", "desc": "Vulnerability in the Oracle iSupport product of Oracle E-Business Suite (component: Profile). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iSupport. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iSupport, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iSupport accessible data as well as unauthorized update, insert or delete access to some of Oracle iSupport accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpuapr2020.html", "https://github.com/ARPSyndicate/cvemon", "https://github.com/MrTuxracer/advisories"]}, {"cve": "CVE-2020-7601", "desc": "gulp-scss-lint through 1.0.0 allows execution of arbitrary commands. It is possible to inject arbitrary commands to the \"exec\" function located in \"src/command.js\" via the provided options.", "poc": ["https://snyk.io/vuln/SNYK-JS-GULPSCSSLINT-560114"]}, {"cve": "CVE-2020-6203", "desc": "SAP NetWeaver UDDI Server (Services Registry), versions- 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50; allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing 'traverse to parent directory' are passed through to the file APIs, leading to Path Traversal.", "poc": ["https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305"]}, {"cve": "CVE-2020-29285", "desc": "SQL injection vulnerability was discovered in Point of Sales in PHP/PDO 1.0, which can be exploited via the id parameter to edit_category.php.", "poc": ["https://github.com/BigTiger2020/Point-of-Sales/blob/main/README.md"]}, {"cve": "CVE-2020-24750", "desc": "FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.", "poc": ["https://www.oracle.com//security-alerts/cpujul2021.html", "https://www.oracle.com/security-alerts/cpuApr2021.html", "https://www.oracle.com/security-alerts/cpuapr2022.html", "https://www.oracle.com/security-alerts/cpujan2021.html", "https://www.oracle.com/security-alerts/cpujan2022.html", "https://www.oracle.com/security-alerts/cpuoct2021.html", "https://github.com/ARPSyndicate/cvemon", "https://github.com/Al1ex/Al1ex", "https://github.com/Al1ex/CVE-2020-24750", "https://github.com/IkerSaint/VULNAPP-vulnerable-app", "https://github.com/SexyBeast233/SecBooks", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/pctF/vulnerable-app", "https://github.com/seal-community/patches", "https://github.com/yahoo/cubed"]}, {"cve": "CVE-2020-11720", "desc": "An issue was discovered in Programi Bilanc build 007 release 014 31.01.2020 and possibly below. During the installation, it sets up administrative access by default with the account admin and password 0000. After the installation, users/admins are not prompted to change this password.", "poc": ["http://packetstormsecurity.com/files/160623/Programi-Bilanc-Build-007-Release-014-31.01.2020-Weak-Default-Password.html", "http://seclists.org/fulldisclosure/2020/Dec/34"]}, {"cve": "CVE-2020-14529", "desc": "Vulnerability in the Primavera Portfolio Management product of Oracle Construction and Engineering (component: Investor Module). Supported versions that are affected are 16.1.0.0-16.1.5.1, 18.0.0.0-18.0.2.0 and 19.0.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Primavera Portfolio Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera Portfolio Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera Portfolio Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpujul2020.html"]}, {"cve": "CVE-2020-4044", "desc": "The xrdp-sesman service before version 0.9.13.1 can be crashed by connecting over port 3350 and supplying a malicious payload. Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350. This will allow them to capture any user credentials that are submitted to XRDP and approve or reject arbitrary login credentials. For xorgxrdp sessions in particular, this allows an unauthorized user to hijack an existing session. This is a buffer overflow attack, so there may be a risk of arbitrary code execution as well.", "poc": ["https://github.com/neutrinolabs/xrdp/commit/0c791d073d0eb344ee7aaafd221513dc9226762c"]}, {"cve": "CVE-2020-9731", "desc": "A memory corruption vulnerability exists in InDesign 15.1.1 (and earlier versions). Insecure handling of a malicious indd file could be abused to cause an out-of-bounds memory access, potentially resulting in code execution in the context of the current user.", "poc": ["https://github.com/404notf0und/CVE-Flow", "https://github.com/Cheroxx/Patch-Tuesday-Updates"]}, {"cve": "CVE-2020-20584", "desc": "A cross site scripting vulnerability in baigo CMS v4.0-beta-1 allows attackers to execute arbitrary web scripts or HTML via the form parameter post to /public/console/profile/info-submit/.", "poc": ["https://github.com/baigoStudio/baigoSSO", "https://github.com/baigoStudio/baigoSSO/", "https://github.com/baigoStudio/baigoSSO/issues/13"]}, {"cve": "CVE-2020-18839", "desc": "Buffer Overflow vulnerability in HtmlOutputDev::page in poppler 0.75.0 allows attackers to cause a denial of service.", "poc": ["https://gitlab.freedesktop.org/poppler/poppler/issues/742"]}, {"cve": "CVE-2020-15163", "desc": "Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed in version 0.12 and newer.", "poc": ["https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-35125", "desc": "A cross-site scripting (XSS) vulnerability in the forms component of Mautic before 3.2.4 allows remote attackers to inject executable JavaScript via mautic[return] (a different attack method than CVE-2020-35124, but also related to the Referer concept).", "poc": ["https://www.horizon3.ai/disclosures/mautic-unauth-xss-to-rce", "https://github.com/nvn1729/advisories"]}, {"cve": "CVE-2020-25491", "desc": "6Kare Emakin 5.0.341.0 is affected by Cross Site Scripting (XSS) via the /rpc/membership/setProfile DisplayName field, which is mishandled when rendering the Activity Stream page.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-25491"]}, {"cve": "CVE-2020-16040", "desc": "Insufficient data validation in V8 in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "poc": ["http://packetstormsecurity.com/files/162087/Google-Chrome-86.0.4240-V8-Remote-Code-Execution.html", "http://packetstormsecurity.com/files/162106/Google-Chrome-86.0.4240-V8-Remote-Code-Execution.html", "http://packetstormsecurity.com/files/162144/Google-Chrome-SimplfiedLowering-Integer-Overflow.html", "https://github.com/ARPSyndicate/cvemon", "https://github.com/SexyBeast233/SecBooks", "https://github.com/Wi1L-Y/News", "https://github.com/anvbis/chrome_v8_ndays", "https://github.com/anvbis/trivialize", "https://github.com/dongAxis/to_be_a_v8_master", "https://github.com/hktalent/bug-bounty", "https://github.com/joydo/CVE-Writeups", "https://github.com/maldev866/ChExp_CVE_2020_16040", "https://github.com/oneoy/exploits1", "https://github.com/r4j0x00/exploits", "https://github.com/ret2eax/exploits", "https://github.com/ret2eax/ret2eax", "https://github.com/singularseclab/Browser_Exploits", "https://github.com/yuvaly0/exploits"]}, {"cve": "CVE-2020-28424", "desc": "This affects all versions of package s3-kilatstorage.", "poc": ["https://security.snyk.io/vuln/SNYK-JS-S3KILATSTORAGE-1050396"]}, {"cve": "CVE-2020-8163", "desc": "The is a code injection vulnerability in versions of Rails prior to 5.0.1 that wouldallow an attacker who controlled the `locals` argument of a `render` call to perform a RCE.", "poc": ["http://packetstormsecurity.com/files/158604/Ruby-On-Rails-5.0.1-Remote-Code-Execution.html", "https://github.com/0xT11/CVE-POC", "https://github.com/ARPSyndicate/cvemon", "https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/CLincat/vulcat", "https://github.com/CnHack3r/Penetration_PoC", "https://github.com/EchoGin404/-", "https://github.com/EchoGin404/gongkaishouji", "https://github.com/Elsfa7-110/kenzer-templates", "https://github.com/Mr-xn/Penetration_Testing_POC", "https://github.com/TK-Elliot/CVE-2020-8163", "https://github.com/TKLinux966/CVE-2020-8163", "https://github.com/YIXINSHUWU/Penetration_Testing_POC", "https://github.com/ZTK-009/Penetration_PoC", "https://github.com/aalexpereira/pipelines-tricks", "https://github.com/d4n-sec/d4n-sec.github.io", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/h4ms1k/CVE-2020-8163", "https://github.com/hasee2018/Penetration_Testing_POC", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/huike007/penetration_poc", "https://github.com/lions2012/Penetration_Testing_POC", "https://github.com/lucasallan/CVE-2020-8163", "https://github.com/merlinepedra/nuclei-templates", "https://github.com/merlinepedra25/nuclei-templates", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/novanazizr/Rails-5.0.1---RCE", "https://github.com/password520/Penetration_PoC", "https://github.com/sobinge/nuclei-templates", "https://github.com/soosmile/POC", "https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-", "https://github.com/xuetusummer/Penetration_Testing_POC", "https://github.com/yedada-wei/-", "https://github.com/yedada-wei/gongkaishouji"]}, {"cve": "CVE-2020-7761", "desc": "This affects the package @absolunet/kafe before 3.2.10. It allows cause a denial of service when validating crafted invalid emails.", "poc": ["https://github.com/engn33r/awesome-redos-security", "https://github.com/yetingli/PoCs"]}, {"cve": "CVE-2020-28055", "desc": "A vulnerability in the TCL Android Smart TV series V8-R851T02-LF1 V295 and below and V8-T658T01-LF1 V373 and below by TCL Technology Group Corporation allows a local unprivileged attacker, such as a malicious App, to read & write to the /data/vendor/tcl, /data/vendor/upgrade, and /var/TerminalManager directories within the TV file system. An attacker, such as a malicious APK or local unprivileged user could perform fake system upgrades by writing to the /data/vendor/upgrage folder.", "poc": ["https://sick.codes/extraordinary-vulnerabilities-discovered-in-tcl-android-tvs-now-worlds-3rd-largest-tv-manufacturer/", "https://sick.codes/sick-2020-012"]}, {"cve": "CVE-2020-1707", "desc": "A vulnerability was found in all openshift/postgresql-apb 4.x.x versions prior to 4.3.0, where an insecure modification vulnerability in the /etc/passwd file was found in the container openshift/postgresql-apb. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/Live-Hack-CVE/CVE-2020-1707"]}, {"cve": "CVE-2020-19490", "desc": "tinyexr 0.9.5 has a integer overflow over-write in tinyexr::DecodePixelData in tinyexr.h, related to OpenEXR code.", "poc": ["https://github.com/syoyo/tinyexr/issues/124"]}, {"cve": "CVE-2020-10532", "desc": "The AD Helper component in WatchGuard Fireware before 5.8.5.10317 allows remote attackers to discover cleartext passwords via the /domains/list URI.", "poc": ["https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-001/-credential-disclosure-in-watchguard-fireware-ad-helper-component"]}, {"cve": "CVE-2020-8821", "desc": "An Improper Data Validation Vulnerability exists in Webmin 1.941 and earlier affecting the Command Shell Endpoint. A user may enter HTML code into the Command field and submit it. Then, after visiting the Action Logs Menu and displaying logs, the HTML code will be rendered (however, JavaScript is not executed). Changes are kept across users.", "poc": ["https://github.com/MauroEldritch/mauroeldritch"]}, {"cve": "CVE-2020-28054", "desc": "JamoDat TSMManager Collector version up to 6.5.0.21 is vulnerable to an Authorization Bypass because the Collector component is not properly validating an authenticated session with the Viewer. If the Viewer has been modified (binary patched) and the Bypass Login functionality is being used, an attacker can request every Collector's functionality as if they were a properly logged-in user: administrating connected instances, reviewing logs, editing configurations, accessing the instances' consoles, accessing hardware configurations, etc.Exploiting this vulnerability won't grant an attacker access nor control on remote ISP servers as no credentials is sent with the request.", "poc": ["https://voidsec.com", "https://voidsec.com/tivoli-madness/", "https://github.com/ARPSyndicate/cvemon", "https://github.com/VoidSec/Tivoli-Madness", "https://github.com/alphaSeclab/sec-daily-2020", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/nomi-sec/PoC-in-GitHub"]}, {"cve": "CVE-2020-11464", "desc": "An issue was discovered in Deskpro before 2019.8.0. The /api/people endpoint failed to properly validate a user's privilege, allowing an attacker to retrieve sensitive information about all users registered on the system. This includes their full name, privilege, email address, phone number, etc.", "poc": ["https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro/"]}, {"cve": "CVE-2020-1296", "desc": "A vulnerability exists in the way the Windows Diagnostics & feedback settings app handles objects in memory, aka 'Windows Diagnostics & feedback Information Disclosure Vulnerability'.", "poc": ["https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-15717", "desc": "RosarioSIS 6.7.2 is vulnerable to XSS, caused by improper validation of user-supplied input by the Search.inc.php script. A remote attacker could exploit this vulnerability using the advanced parameter in a crafted URL.", "poc": ["https://gitlab.com/francoisjacquet/rosariosis/-/issues/291"]}, {"cve": "CVE-2020-5969", "desc": "NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which it validates a shared resource before using it, creating a race condition which may lead to denial of service or information disclosure. This affects vGPU version 8.x (prior to 8.4), version 9.x (prior to 9.4) and version 10.x (prior to 10.3).", "poc": ["https://nvidia.custhelp.com/app/answers/detail/a_id/5031"]}, {"cve": "CVE-2020-14556", "desc": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpujul2020.html", "https://github.com/ARPSyndicate/cvemon", "https://github.com/Live-Hack-CVE/CVE-2020-14556"]}, {"cve": "CVE-2020-36605", "desc": "Incorrect Default Permissions vulnerability in Hitachi Infrastructure Analytics Advisor on Linux (Analytics probe component), Hitachi Ops Center Analyzer on Linux (Analyzer probe component), Hitachi Ops Center Viewpoint on Linux (Viewpoint RAID Agent component) allows local users to read and write specific files. This issue affects Hitachi Infrastructure Analytics Advisor: from 2.0.0-00 through 4.4.0-00; Hitachi Ops Center Analyzer: from 10.0.0-00 before 10.9.0-00; Hitachi Ops Center Viewpoint: from 10.8.0-00 before 10.9.0-00.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-36605"]}, {"cve": "CVE-2020-2561", "desc": "Vulnerability in the PeopleSoft Enterprise HCM Human Resources product of Oracle PeopleSoft (component: Company Dir / Org Chart Viewer). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Human Resources. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise HCM Human Resources accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpujan2020.html"]}, {"cve": "CVE-2020-35470", "desc": "Envoy before 1.16.1 logs an incorrect downstream address because it considers only the directly connected peer, not the information in the proxy protocol header. This affects situations with tcp-proxy as the network filter (not HTTP filters).", "poc": ["https://github.com/envoyproxy/envoy/issues/14087", "https://github.com/envoyproxy/envoy/pull/14131"]}, {"cve": "CVE-2020-8950", "desc": "The AUEPLauncher service in Radeon AMD User Experience Program Launcher through 1.0.0.1 on Windows allows elevation of privilege by placing a crafted file in %PROGRAMDATA%\\AMD\\PPC\\upload and then creating a symbolic link in %PROGRAMDATA%\\AMD\\PPC\\temp that points to an arbitrary folder with an arbitrary file name.", "poc": ["https://heynowyouseeme.blogspot.com/2020/02/another-privilege-escalation-filewrite.html", "https://heynowyouseeme.blogspot.com/2020/02/privilege-escalation-filewrite-eop-in.html", "https://github.com/0xT11/CVE-POC", "https://github.com/ARPSyndicate/cvemon", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/sailay1996/amd_eop_poc", "https://github.com/soosmile/POC"]}, {"cve": "CVE-2020-9547", "desc": "FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap).", "poc": ["https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062", "https://www.oracle.com/security-alerts/cpujan2021.html", "https://www.oracle.com/security-alerts/cpujul2020.html", "https://www.oracle.com/security-alerts/cpuoct2020.html", "https://www.oracle.com/security-alerts/cpuoct2021.html", "https://github.com/0xT11/CVE-POC", "https://github.com/20142995/sectool", "https://github.com/ARPSyndicate/cvemon", "https://github.com/CnHack3r/Penetration_PoC", "https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh", "https://github.com/EchoGin404/-", "https://github.com/EchoGin404/gongkaishouji", "https://github.com/Mr-xn/Penetration_Testing_POC", "https://github.com/NetW0rK1le3r/awesome-hacking-lists", "https://github.com/OWASP/www-project-ide-vulscanner", "https://github.com/PalindromeLabs/Java-Deserialization-CVEs", "https://github.com/YIXINSHUWU/Penetration_Testing_POC", "https://github.com/ZTK-009/Penetration_PoC", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/fairyming/CVE-2020-9547", "https://github.com/hasee2018/Penetration_Testing_POC", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/huike007/penetration_poc", "https://github.com/huike007/poc", "https://github.com/lions2012/Penetration_Testing_POC", "https://github.com/lnick2023/nicenice", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/password520/Penetration_PoC", "https://github.com/qazbnm456/awesome-cve-poc", "https://github.com/readloud/Awesome-Stars", "https://github.com/seal-community/patches", "https://github.com/soosmile/POC", "https://github.com/taielab/awesome-hacking-lists", "https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-", "https://github.com/xbl2022/awesome-hacking-lists", "https://github.com/xbl3/awesome-cve-poc_qazbnm456", "https://github.com/xuetusummer/Penetration_Testing_POC", "https://github.com/yahoo/cubed", "https://github.com/yedada-wei/-", "https://github.com/yedada-wei/gongkaishouji"]}, {"cve": "CVE-2020-8017", "desc": "A Race Condition Enabling Link Following vulnerability in the cron job shipped with texlive-filesystem of SUSE Linux Enterprise Module for Desktop Applications 15-SP1, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows local users in group mktex to delete arbitrary files on the system This issue affects: SUSE Linux Enterprise Module for Desktop Applications 15-SP1 texlive-filesystem versions prior to 2017.135-9.5.1. SUSE Linux Enterprise Software Development Kit 12-SP4 texlive-filesystem versions prior to 2013.74-16.5.1. SUSE Linux Enterprise Software Development Kit 12-SP5 texlive-filesystem versions prior to 2013.74-16.5.1. openSUSE Leap 15.1 texlive-filesystem versions prior to 2017.135-lp151.8.3.1.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-8017"]}, {"cve": "CVE-2020-0972", "desc": "A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft SharePoint Spoofing Vulnerability'. This CVE ID is unique from CVE-2020-0975, CVE-2020-0976, CVE-2020-0977.", "poc": ["https://github.com/0xT11/CVE-POC", "https://github.com/ARPSyndicate/cvemon", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/soosmile/POC"]}, {"cve": "CVE-2020-7251", "desc": "Improper access control vulnerability in Configuration Tool in McAfee Mcafee Endpoint Security (ENS) Prior to 10.6.1 February 2020 Update allows local users to disable security features via unauthorised use of the configuration tool from older versions of ENS.", "poc": ["https://kc.mcafee.com/corporate/index?page=content&id=SB10299"]}, {"cve": "CVE-2020-4208", "desc": "IBM Spectrum Protect Plus 10.1.0 through 10.1.5 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 174975.", "poc": ["https://www.ibm.com/support/pages/node/6114130"]}, {"cve": "CVE-2020-2974", "desc": "Vulnerability in the Oracle Application Express component of Oracle Database Server. Supported versions that are affected are 5.1-19.2. Easily exploitable vulnerability allows low privileged attacker having SQL Workshop privilege with network access via HTTP to compromise Oracle Application Express. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Express accessible data as well as unauthorized read access to a subset of Oracle Application Express accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpujul2020.html"]}, {"cve": "CVE-2020-27207", "desc": "Zetetic SQLCipher 4.x before 4.4.1 has a use-after-free, related to sqlcipher_codec_pragma and sqlite3Strlen30 in sqlite3.c. A remote denial of service attack can be performed. For example, a SQL injection can be used to execute the crafted SQL command sequence. After that, some unexpected RAM data is read.", "poc": ["https://www.telekom.com/en/corporate-responsibility/data-protection-data-security/security/details/advisories-504842"]}, {"cve": "CVE-2020-13592", "desc": "An exploitable SQL injection vulnerability exists in \"global_lists/choices\" page of the Rukovoditel Project Management App 2.7.2. A specially crafted HTTP request can lead to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability, this can be done either with administrator credentials or through cross-site request forgery.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-1201", "https://github.com/Live-Hack-CVE/CVE-2020-13592"]}, {"cve": "CVE-2020-35901", "desc": "An issue was discovered in the actix-http crate before 2.0.0-alpha.1 for Rust. There is a use-after-free in BodyStream.", "poc": ["https://github.com/Artisan-Lab/Rust-memory-safety-bugs"]}, {"cve": "CVE-2020-12751", "desc": "An issue was discovered on Samsung mobile devices with O(8.X), P(9.0), and Q(10.0) software. The Quram image codec library allows attackers to overwrite memory and execute arbitrary code via crafted JPEG data that is mishandled during decoding. The Samsung ID is SVE-2020-16943 (May 2020).", "poc": ["https://security.samsungmobile.com/securityUpdate.smsb"]}, {"cve": "CVE-2020-2036", "desc": "A reflected cross-site scripting (XSS) vulnerability exists in the PAN-OS management web interface. A remote attacker able to convince an administrator with an active authenticated session on the firewall management interface to click on a crafted link to that management web interface could potentially execute arbitrary JavaScript code in the administrator's browser and perform administrative actions. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9.", "poc": ["https://security.paloaltonetworks.com/CVE-2020-2036", "https://github.com/404notf0und/CVE-Flow", "https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/Elsfa7-110/kenzer-templates"]}, {"cve": "CVE-2020-12496", "desc": "Endress+Hauser Ecograph T (Neutral/Private Label) (RSG35, ORSG35) and Memograph M (Neutral/Private Label) (RSG45, ORSG45) with Firmware version V2.0.0 and above is prone to exposure of sensitive information to an unauthorized actor. The firmware release has a dynamic token for each request submitted to the server, which makes repeating requests and analysis complex enough. Nevertheless, it's possible and during the analysis it was discovered that it also has an issue with the access-control matrix on the server-side. It was found that a user with low rights can get information from endpoints that should not be available to this user.", "poc": ["https://cert.vde.com/en-us/advisories/vde-2020-022"]}, {"cve": "CVE-2020-18976", "desc": "Buffer Overflow in Tcpreplay v4.3.2 allows attackers to cause a Denial of Service via the 'do_checksum' function in 'checksum.c'. It can be triggered by sending a crafted pcap file to the 'tcpreplay-edit' binary. This issue is different than CVE-2019-8381.", "poc": ["https://github.com/appneta/tcpreplay/issues/556"]}, {"cve": "CVE-2020-8831", "desc": "Apport creates a world writable lock file with root ownership in the world writable /var/lock/apport directory. If the apport/ directory does not exist (this is not uncommon as /var/lock is a tmpfs), it will create the directory, otherwise it will simply continue execution using the existing directory. This allows for a symlink attack if an attacker were to create a symlink at /var/lock/apport, changing apport's lock file location. This file could then be used to escalate privileges, for example. Fixed in versions 2.20.1-0ubuntu2.23, 2.20.9-0ubuntu7.14, 2.20.11-0ubuntu8.8 and 2.20.11-0ubuntu22.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-8831"]}, {"cve": "CVE-2020-11213", "desc": "Out of bound reads might occur in while processing Service descriptor due to improper validation of length of fields in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking", "poc": ["https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin", "https://github.com/TinyNiko/android_bulletin_notes"]}, {"cve": "CVE-2020-26006", "desc": "Project Worlds Online Examination System 1.0 is affected by Cross Site Scripting (XSS) via account.php.", "poc": ["https://nikhilkumar01.medium.com/cve-2020-26006-31f847e16019", "https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-10825", "desc": "A stack-based buffer overflow in /cgi-bin/activate.cgi while base64 decoding ticket parameter on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve code execution via a remote HTTP request (issue 3 of 3).", "poc": ["https://slashd.ga/2020/03/draytek-vulnerabilities/"]}, {"cve": "CVE-2020-12781", "desc": "Combodo iTop contains a cross-site request forgery (CSRF) vulnerability, attackers can execute specific commands via malicious site request forgery.", "poc": ["https://github.com/0xUhaw/CVE-Bins", "https://github.com/Live-Hack-CVE/CVE-2020-12781"]}, {"cve": "CVE-2020-14473", "desc": "Stack-based buffer overflow vulnerability in Vigor3900, Vigor2960, and Vigor300B with firmware before 1.5.1.1.", "poc": ["https://github.com/Cossack9989/Vulns/blob/master/IoT/CVE-2020-14473.md"]}, {"cve": "CVE-2020-11274", "desc": "Denial of service in MODEM due to assert to the invalid configuration in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile", "poc": ["https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin"]}, {"cve": "CVE-2020-7292", "desc": "Inappropriate Encoding for output context vulnerability in McAfee Web Gateway (MWG) prior to 9.2.1 allows a remote attacker to cause MWG to return an ambiguous redirect response via getting a user to click on a malicious URL.", "poc": ["https://kc.mcafee.com/corporate/index?page=content&id=SB10323"]}, {"cve": "CVE-2020-29071", "desc": "An XSS issue was found in the Shares feature of LiquidFiles before 3.3.19. The issue arises from the insecure rendering of HTML files uploaded to the platform as attachments, when the -htmlview URL is directly accessed. The impact ranges from executing commands as root on the server to retrieving sensitive information about encrypted e-mails, depending on the permissions of the target user.", "poc": ["https://lean0x2f.github.io/liquidfiles_advisory", "https://github.com/lean0x2F/lean0x2f.github.io"]}, {"cve": "CVE-2020-10378", "desc": "In libImaging/PcxDecode.c in Pillow before 7.1.0, an out-of-bounds read can occur when reading PCX files where state->shuffle is instructed to read beyond state->buffer.", "poc": ["https://github.com/risicle/cpytraceafl"]}, {"cve": "CVE-2020-16884", "desc": "
A remote code execution vulnerability exists in the way that the IEToEdge Browser Helper Object (BHO) plugin on Internet Explorer handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.
In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit this vulnerability and then convince a user to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to the attacker's website, or by opening an attachment sent through email. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
The security update addresses the vulnerability by modifying how the IEToEdge BHO plug-in handles objects in memory.
", "poc": ["https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-13553", "desc": "An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In webvrpcs Run Key Privilege Escalation in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169"]}, {"cve": "CVE-2020-36130", "desc": "AOM v2.0.1 was discovered to contain a NULL pointer dereference via the component av1/av1_dx_iface.c.", "poc": ["https://github.com/zodf0055980/Yuan-fuzz"]}, {"cve": "CVE-2020-10773", "desc": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u2019s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "poc": ["https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b8e51a6a9db94bc1fb18ae831b3dab106b5a4b5f", "https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-35608", "desc": "A code execution vulnerability exists in the normal world\u2019s signed code execution functionality of Microsoft Azure Sphere 20.07. A specially crafted AF_PACKET socket can cause a process to create an executable memory mapping with controllable content. An attacker can execute a shellcode that uses the PACKET_MMAP functionality to trigger this vulnerability.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-1134", "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1134"]}, {"cve": "CVE-2020-15228", "desc": "In the `@actions/core` npm module before version 1.2.6,`addPath` and `exportVariable` functions communicate with the Actions Runner over stdout by generating a string in a specific format. Workflows that log untrusted data to stdout may invoke these commands, resulting in the path or environment variables being modified without the intention of the workflow or action author. The runner will release an update that disables the `set-env` and `add-path` workflow commands in the near future. For now, users should upgrade to `@actions/core v1.2.6` or later, and replace any instance of the `set-env` or `add-path` commands in their workflows with the new Environment File Syntax. Workflows and actions using the old commands or older versions of the toolkit will start to warn, then error out during workflow execution.", "poc": ["http://packetstormsecurity.com/files/159794/GitHub-Widespread-Injection.html", "https://github.com/ARPSyndicate/cvemon", "https://github.com/actions-marketplace-validations/peter-murray_terragrunt-github-action", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/guettli/fix-CVE-2020-15228", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/k1LoW/oshka", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/soosmile/POC"]}, {"cve": "CVE-2020-2678", "desc": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.36, prior to 6.0.16 and prior to 6.1.2. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpujan2020.html"]}, {"cve": "CVE-2020-27226", "desc": "An exploitable SQL injection vulnerability exists in \u2018quickFile.jsp\u2019 page of OpenClinic GA 5.173.3. A specially crafted HTTP request can lead to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-1202"]}, {"cve": "CVE-2020-10442", "desc": "The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-article-popular.php by adding a question mark (?) followed by the payload.", "poc": ["https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456", "https://github.com/Live-Hack-CVE/CVE-2020-10442"]}, {"cve": "CVE-2020-29582", "desc": "In JetBrains Kotlin before 1.4.21, a vulnerable Java API was used for temporary file and folder creation. An attacker was able to read data from such files and list directories due to insecure permissions.", "poc": ["https://www.oracle.com//security-alerts/cpujul2021.html", "https://www.oracle.com/security-alerts/cpuapr2022.html", "https://www.oracle.com/security-alerts/cpujan2022.html", "https://github.com/ARPSyndicate/cvemon", "https://github.com/ChamalBandara/CVEs", "https://github.com/hinat0y/Dataset1", "https://github.com/hinat0y/Dataset10", "https://github.com/hinat0y/Dataset11", "https://github.com/hinat0y/Dataset12", "https://github.com/hinat0y/Dataset2", "https://github.com/hinat0y/Dataset3", "https://github.com/hinat0y/Dataset4", "https://github.com/hinat0y/Dataset5", "https://github.com/hinat0y/Dataset6", "https://github.com/hinat0y/Dataset7", "https://github.com/hinat0y/Dataset8", "https://github.com/hinat0y/Dataset9"]}, {"cve": "CVE-2020-10457", "desc": "Path Traversal in admin/imagepaster/image-renaming.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to rename any file on the webserver using a dot-dot-slash sequence (../) via the POST parameter imgName (for the new name) and imgUrl (for the current file to be renamed).", "poc": ["https://antoniocannito.it/phpkb1#arbitrary-file-renaming-cve-2020-10457", "https://github.com/Live-Hack-CVE/CVE-2020-10457"]}, {"cve": "CVE-2020-15871", "desc": "Sonatype Nexus Repository Manager OSS/Pro version before 3.25.1 allows Remote Code Execution.", "poc": ["https://hackerone.com/reports/917843", "https://support.sonatype.com", "https://support.sonatype.com/hc/en-us/articles/360052192693"]}, {"cve": "CVE-2020-22844", "desc": "A buffer overflow in Mikrotik RouterOS 6.47 allows unauthenticated attackers to cause a denial of service (DOS) via crafted SMB requests.", "poc": ["https://github.com/colorlight/mikrotik_poc/blob/master/two_vulns.md"]}, {"cve": "CVE-2020-11493", "desc": "In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can obtain sensitive information about an uninitialized object because of direct transformation from PDF Object to Stream without concern for a crafted XObject.", "poc": ["https://github.com/0xT11/CVE-POC", "https://github.com/404notf0und/CVE-Flow", "https://github.com/ARPSyndicate/cvemon", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/fengjixuchui/CVE-2020-11493", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/soosmile/POC"]}, {"cve": "CVE-2020-15209", "desc": "In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one. The runtime assumes that these buffers are written to before a possible read, hence they are initialized with `nullptr`. However, by changing the buffer index for a tensor and implicitly converting that tensor to be a read-write one, as there is nothing in the model that writes to it, we get a null pointer dereference. The issue is patched in commit 0b5662bc, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.", "poc": ["https://github.com/tensorflow/tensorflow/commit/0b5662bc2be13a8c8f044d925d87fb6e56247cd8"]}, {"cve": "CVE-2020-18392", "desc": "Stack overflow vulnerability in parse_array Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/Live-Hack-CVE/CVE-2020-18392", "https://github.com/fuzz-evaluator/MemLock-Fuzz-eval", "https://github.com/wcventure/MemLock-Fuzz"]}, {"cve": "CVE-2020-2543", "desc": "Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).", "poc": ["https://www.oracle.com/security-alerts/cpujan2020.html"]}, {"cve": "CVE-2020-12673", "desc": "In Dovecot before 2.3.11.3, sending a specially formatted NTLM request will crash the auth service because of an out-of-bounds read.", "poc": ["https://hackerone.com/reports/866597", "https://github.com/RClueX/Hackerone-Reports", "https://github.com/imhunterand/hackerone-publicy-disclosed"]}, {"cve": "CVE-2020-2533", "desc": "Vulnerability in the Oracle Reports Developer product of Oracle Fusion Middleware (component: Security and Authentication). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Reports Developer. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Reports Developer, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Reports Developer accessible data as well as unauthorized read access to a subset of Oracle Reports Developer accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpujan2020.html"]}, {"cve": "CVE-2020-15650", "desc": "Given an installed malicious file picker application, an attacker was able to overwrite local files and thus overwrite Firefox settings (but not access the previous profile). *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 68.11.", "poc": ["https://bugzilla.mozilla.org/show_bug.cgi?id=1652360"]}, {"cve": "CVE-2020-22019", "desc": "Buffer Overflow vulnerability in FFmpeg 4.2 at convolution_y_10bit in libavfilter/vf_vmafmotion.c, which could let a remote malicious user cause a Denial of Service.", "poc": ["https://trac.ffmpeg.org/ticket/8241"]}, {"cve": "CVE-2020-7603", "desc": "closure-compiler-stream through 0.1.15 allows execution of arbitrary commands. The argument \"options\" of the exports function in \"index.js\" can be controlled by users without any sanitization.", "poc": ["https://snyk.io/vuln/SNYK-JS-CLOSURECOMPILERSTREAM-560123"]}, {"cve": "CVE-2020-7954", "desc": "An issue was discovered in OpServices OpMon 9.3.2. Starting from the apache user account, it is possible to perform privilege escalation through the lack of correct configuration in the server's sudoers file, which by default allows the execution of programs (e.g. nmap) without the need for a password with sudo.", "poc": ["https://medium.com/@ph0rensic/three-cves-on-opmon-3ca775a262f5"]}, {"cve": "CVE-2020-13942", "desc": "It is possible to inject malicious OGNL or MVEL scripts into the /context.json public endpoint. This was partially fixed in 1.5.1 but a new attack vector was found. In Apache Unomi version 1.5.2 scripts are now completely filtered from the input. It is highly recommended to upgrade to the latest available version of the 1.5.x release to fix this problem.", "poc": ["https://github.com/1135/unomi_exploit", "https://github.com/ARPSyndicate/cvemon", "https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/EdgeSecurityTeam/Vulnerability", "https://github.com/Elsfa7-110/kenzer-templates", "https://github.com/HimmelAward/Goby_POC", "https://github.com/Janalytics94/anomaly-detection-software", "https://github.com/Prodrious/CVE-2020-13942", "https://github.com/SexyBeast233/SecBooks", "https://github.com/SouthWind0/southwind0.github.io", "https://github.com/Threekiii/Awesome-POC", "https://github.com/Threekiii/Vulhub-Reproduce", "https://github.com/Z0fhack/Goby_POC", "https://github.com/alphaSeclab/sec-daily-2020", "https://github.com/apachecn-archive/Middleware-Vulnerability-detection", "https://github.com/bakery312/Vulhub-Reproduce", "https://github.com/blackmarketer/CVE-2020-13942", "https://github.com/d4n-sec/d4n-sec.github.io", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/eugenebmx/CVE-2020-13942", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/hoanx4/apche_unomi_rce", "https://github.com/litt1eb0yy/One-Liner-Scripts", "https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection", "https://github.com/lp008/CVE-2020-13942", "https://github.com/merlinepedra/nuclei-templates", "https://github.com/merlinepedra25/nuclei-templates", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/qeeqbox/falcon", "https://github.com/shifa123/CVE-2020-13942-POC-", "https://github.com/sobinge/nuclei-templates", "https://github.com/soosmile/POC", "https://github.com/trganda/dockerv", "https://github.com/tzwlhack/Vulnerability", "https://github.com/yaunsky/Unomi-CVE-2020-13942", "https://github.com/zhzyker/vulmap"]}, {"cve": "CVE-2020-15801", "desc": "In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The
._pth file (e.g., the python._pth file) is not affected.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/CoolerVoid/master_librarian"]}, {"cve": "CVE-2020-7384", "desc": "Rapid7's Metasploit msfvenom framework handles APK files in a way that allows for a malicious user to craft and publish a file that would execute arbitrary commands on a victim's machine.", "poc": ["http://packetstormsecurity.com/files/160004/Rapid7-Metasploit-Framework-msfvenom-APK-Template-Command-Injection.html", "http://packetstormsecurity.com/files/161200/Metasploit-Framework-6.0.11-Command-Injection.html", "https://github.com/0xCarsonS/CVE-2020-7384", "https://github.com/ARPSyndicate/cvemon", "https://github.com/cocomelonc/vulnexipy", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/justinsteven/advisories", "https://github.com/mrinalprakash45/Hack-The-Box_Script-Kiddie", "https://github.com/nikhil1232/CVE-2020-7384", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/soosmile/POC"]}, {"cve": "CVE-2020-8417", "desc": "The Code Snippets plugin before 2.14.0 for WordPress allows CSRF because of the lack of a Referer check on the import menu.", "poc": ["https://wpvulndb.com/vulnerabilities/10050", "https://github.com/0xT11/CVE-POC", "https://github.com/0xZipp0/BIBLE", "https://github.com/ARPSyndicate/cvemon", "https://github.com/Ashadowkhan/PENTESTINGBIBLE", "https://github.com/Mathankumar2701/ALL-PENTESTING-BIBLE", "https://github.com/MedoX71T/PENTESTING-BIBLE", "https://github.com/Micle5858/PENTESTING-BIBLE", "https://github.com/NetW0rK1le3r/PENTESTING-BIBLE", "https://github.com/OCEANOFANYTHING/PENTESTING-BIBLE", "https://github.com/Rapidsafeguard/codesnippets_CVE-2020-8417", "https://github.com/Rayyan-appsec/ALL-PENTESTING-BIBLE", "https://github.com/Saidul-M-Khan/PENTESTING-BIBLE", "https://github.com/Vulnmachines/WordPress_CVE-2020-8417", "https://github.com/bjknbrrr/PENTESTING-BIBLE", "https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE", "https://github.com/codereveryday/Programming-Hacking-Resources", "https://github.com/cwannett/Docs-resources", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/dli408097/pentesting-bible", "https://github.com/erSubhashThapa/pentest-bible", "https://github.com/gacontuyenchien1/Security", "https://github.com/guzzisec/PENTESTING-BIBLE", "https://github.com/hacker-insider/Hacking", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/iamrajivd/pentest", "https://github.com/imNani4/PENTESTING-BIBLE", "https://github.com/mynameiskaleb/Coder-Everyday-Resource-Pack-", "https://github.com/neonoatmeal/Coder-Everyday-Resource-Pack-", "https://github.com/nitishbadole/PENTESTING-BIBLE", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/phant0n/PENTESTING-BIBLE", "https://github.com/readloud/Pentesting-Bible", "https://github.com/soosmile/POC", "https://github.com/t31m0/PENTESTING-BIBLE", "https://github.com/vulncrate/wp-codesnippets-cve-2020-8417", "https://github.com/waleweewe12/CVE-2020-8417", "https://github.com/whoami-chmod777/Pentesting-Bible", "https://github.com/yusufazizmustofa/BIBLE"]}, {"cve": "CVE-2020-25084", "desc": "QEMU 5.0.0 has a use-after-free in hw/usb/hcd-xhci.c because the usb_packet_map return value is not checked.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-25084"]}, {"cve": "CVE-2020-23558", "desc": "IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!ShowPlugInSaveOptions_W+0x0000000000007f4b.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/Live-Hack-CVE/CVE-2020-23558", "https://github.com/nhiephon/Research"]}, {"cve": "CVE-2020-8119", "desc": "Improper authorization in Nextcloud server 17.0.0 causes leaking of previews and files when a file-drop share link is opened via the gallery app.", "poc": ["https://hackerone.com/reports/719426"]}, {"cve": "CVE-2020-16846", "desc": "An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.", "poc": ["http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html", "https://github.com/saltstack/salt/releases", "https://github.com/0day404/vulnerability-poc", "https://github.com/0ps/pocassistdb", "https://github.com/20142995/Goby", "https://github.com/ARPSyndicate/cvemon", "https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/ArrestX/--POC", "https://github.com/EdgeSecurityTeam/Vulnerability", "https://github.com/Elsfa7-110/kenzer-templates", "https://github.com/HimmelAward/Goby_POC", "https://github.com/KayCHENvip/vulnerability-poc", "https://github.com/Miraitowa70/POC-Notes", "https://github.com/Ostorlab/KEV", "https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors", "https://github.com/SexyBeast233/SecBooks", "https://github.com/Threekiii/Awesome-POC", "https://github.com/Threekiii/Vulhub-Reproduce", "https://github.com/Z0fhack/Goby_POC", "https://github.com/bakery312/Vulhub-Reproduce", "https://github.com/d4n-sec/d4n-sec.github.io", "https://github.com/hamza-boudouche/projet-secu", "https://github.com/huimzjty/vulwiki", "https://github.com/jweny/pocassistdb", "https://github.com/merlinepedra/nuclei-templates", "https://github.com/merlinepedra25/nuclei-templates", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/sobinge/nuclei-templates", "https://github.com/soosmile/POC", "https://github.com/tzwlhack/Vulnerability", "https://github.com/vlrhsgody/CVE_Docker", "https://github.com/zomy22/CVE-2020-16846-Saltstack-Salt-API"]}, {"cve": "CVE-2020-8776", "desc": "Alfresco Enterprise before 5.2.7 and Alfresco Community before 6.2.0 (rb65251d6-b368) has XSS via the URL property of a file.", "poc": ["http://packetstormsecurity.com/files/156599/Alfresco-5.2.4-Cross-Site-Scripting.html", "https://github.com/ARPSyndicate/cvemon", "https://github.com/Orange-Cyberdefense/CVE-repository", "https://github.com/Transmetal/CVE-repository-master"]}, {"cve": "CVE-2020-25759", "desc": "An issue was discovered on D-Link DSR-250 3.17 devices. Certain functionality in the Unified Services Router web interface could allow an authenticated attacker to execute arbitrary commands, due to a lack of validation of inputs provided in multipart HTTP POST requests.", "poc": ["https://www.digitaldefense.com/news/zero-day-vuln-d-link-vpn-routers/"]}, {"cve": "CVE-2020-24572", "desc": "An issue was discovered in includes/webconsole.php in RaspAP 2.5. With authenticated access, an attacker can use a misconfigured (and virtually unrestricted) web console to attack the underlying OS (Raspberry Pi) running this software, and execute commands on the system (including ones for uploading of files and execution of code).", "poc": ["https://github.com/0xT11/CVE-POC", "https://github.com/ARPSyndicate/cvemon", "https://github.com/SexyBeast233/SecBooks", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/gerbsec/CVE-2020-24572-POC", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/lb0x/cve-2020-24572", "https://github.com/nomi-sec/PoC-in-GitHub"]}, {"cve": "CVE-2020-10283", "desc": "The Micro Air Vehicle Link (MAVLink) protocol presents authentication mechanisms on its version 2.0 however according to its documentation, in order to maintain backwards compatibility, GCS and autopilot negotiate the version via the AUTOPILOT_VERSION message. Since this negotiation depends on the answer, an attacker may craft packages in a way that hints the autopilot to adopt version 1.0 of MAVLink for the communication. Given the lack of authentication capabilities in such version of MAVLink (refer to CVE-2020-10282), attackers may use this method to bypass authentication capabilities and interact with the autopilot directly.", "poc": ["https://github.com/aliasrobotics/RVD/issues/3316", "https://github.com/Live-Hack-CVE/CVE-2020-10283"]}, {"cve": "CVE-2020-26905", "desc": "Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11.", "poc": ["https://kb.netgear.com/000062349/Security-Advisory-for-Admin-Credential-Disclosure-on-Some-WiFi-Systems-PSV-2020-0047"]}, {"cve": "CVE-2020-0451", "desc": "In sbrDecoder_AssignQmfChannels2SbrChannels of sbrdecoder.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9 Android-8.0 Android-8.1Android ID: A-158762825", "poc": ["https://github.com/TinyNiko/android_bulletin_notes", "https://github.com/nanopathi/external_aac_AOSP10_r33_CVE-2020-0451", "https://github.com/nomi-sec/PoC-in-GitHub"]}, {"cve": "CVE-2020-25758", "desc": "An issue was discovered on D-Link DSR-250 3.17 devices. Insufficient validation of configuration file checksums could allow a remote, authenticated attacker to inject arbitrary crontab entries into saved configurations before uploading. These entries are executed as root.", "poc": ["https://www.digitaldefense.com/news/zero-day-vuln-d-link-vpn-routers/"]}, {"cve": "CVE-2020-16138", "desc": "** UNSUPPORTED WHEN ASSIGNED ** A denial-of-service issue in Cisco Unified IP Conference Station 7937G 1-4-4-0 through 1-4-5-7 allows attackers to remotely disable the device until it is power cycled. Note: We cannot prove this vulnerability exists. Out of an abundance of caution, this CVE is being assigned to better serve our customers and ensure all who are still running this product understand that the product is end of life and should be removed or upgraded. For more information on this, and how to upgrade, refer to the CVE\u2019s reference information.", "poc": ["https://packetstormsecurity.com/files/158819/Cisco-7937G-Denial-Of-Service.html", "https://github.com/ARPSyndicate/cvemon", "https://github.com/Fans0n-Fan/Cisco-7937G-All-In-One-Exploiter", "https://github.com/blacklanternsecurity/Cisco-7937G-PoCs"]}, {"cve": "CVE-2020-4561", "desc": "IBM Cognos Analytics 11.0 and 11.1 DQM API allows submitting of all control requests in unauthenticated sessions. This allows a remote attacker who can access a valid CA endpoint to read and write files to the Cognos Analytics system. IBM X-Force ID: 183903.", "poc": ["https://www.ibm.com/support/pages/node/6451705"]}, {"cve": "CVE-2020-3686", "desc": "Possible memory out of bound issue during music playback when an incorrect bit stream content is copied into array without checking the length of array in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking", "poc": ["https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin", "https://github.com/TinyNiko/android_bulletin_notes"]}, {"cve": "CVE-2020-19886", "desc": "DBHcms v1.2.0 has no CSRF protection mechanism,as demonstrated by CSRF for an /index.php?dbhcms_pid=-80&deletemenu=9 can delete any menu.", "poc": ["https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#12", "https://github.com/fragrant10/cve"]}, {"cve": "CVE-2020-9803", "desc": "A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.", "poc": ["https://github.com/sslab-gatech/freedom"]}, {"cve": "CVE-2020-28483", "desc": "This affects all versions of package github.com/gin-gonic/gin. When gin is exposed directly to the internet, a client's IP can be spoofed by setting the X-Forwarded-For header.", "poc": ["https://github.com/fdl66/Golang_SCA"]}, {"cve": "CVE-2020-21547", "desc": "Libsixel 1.8.2 contains a heap-based buffer overflow in the dither_func_fs function in tosixel.c.", "poc": ["https://github.com/saitoha/libsixel/issues/114"]}, {"cve": "CVE-2020-20808", "desc": "Cross Site Scripting vulnerability in Qibosoft qibosoft v.7 and before allows a remote attacker to execute arbitrary code via the eindtijd and starttijd parameters of do/search.php.", "poc": ["https://github.com/alorfm/vuln/blob/master/qibosoft_cross_Site_Scripting.md"]}, {"cve": "CVE-2020-13571", "desc": "An out-of-bounds write vulnerability exists in the SGI RLE decompression functionality of Accusoft ImageGear 19.8. A specially crafted malformed file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-1182"]}, {"cve": "CVE-2020-25268", "desc": "Remote Code Execution can occur via the external news feed in ILIAS 6.4 because of incorrect parameter sanitization for Magpie RSS data.", "poc": ["https://medium.com/bugbountywriteup/exploiting-ilias-learning-management-system-4eda9e120620", "https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-14826", "desc": "Vulnerability in the Oracle Applications Manager product of Oracle E-Business Suite (component: SQL Extensions). Supported versions that are affected are 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Manager. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Applications Manager accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpuoct2020.html"]}, {"cve": "CVE-2020-17405", "desc": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Senstar Symphony 7.3.2.2. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SSOAuth process. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-10980.", "poc": ["https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-28185", "desc": "User Enumeration vulnerability in TerraMaster TOS <= 4.2.06 allows remote unauthenticated attackers to identify valid users within the system via the username parameter to wizard/initialise.php.", "poc": ["https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/", "https://github.com/0day404/vulnerability-poc", "https://github.com/ARPSyndicate/cvemon", "https://github.com/ArrestX/--POC", "https://github.com/HimmelAward/Goby_POC", "https://github.com/KayCHENvip/vulnerability-poc", "https://github.com/Miraitowa70/POC-Notes", "https://github.com/SexyBeast233/SecBooks", "https://github.com/Threekiii/Awesome-POC", "https://github.com/Z0fhack/Goby_POC", "https://github.com/d4n-sec/d4n-sec.github.io"]}, {"cve": "CVE-2020-7059", "desc": "When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.", "poc": ["https://hackerone.com/reports/778834", "https://www.oracle.com/security-alerts/cpuApr2021.html", "https://www.oracle.com/security-alerts/cpujul2020.html"]}, {"cve": "CVE-2020-16263", "desc": "Winston 1.5.4 devices have a CORS configuration that trusts arbitrary origins. This allows requests to be made and viewed by arbitrary origins.", "poc": ["https://labs.bishopfox.com/advisories/winston-privacy-version-1.5.4"]}, {"cve": "CVE-2020-2901", "desc": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "poc": ["https://www.oracle.com/security-alerts/cpuapr2020.html"]}, {"cve": "CVE-2020-21016", "desc": "D-Link DIR-846 devices with firmware 100A35 allow remote attackers to execute arbitrary code as root via HNAP1/control/SetGuestWLanSettings.php.", "poc": ["https://github.com/dahua966/Routers-vuls/blob/master/DIR-846/GuestWLanSetting_RCE.md", "https://www.dlink.com/en/security-bulletin/", "https://github.com/Live-Hack-CVE/CVE-2020-21016"]}, {"cve": "CVE-2020-13410", "desc": "An issue was discovered in MoscaJS Aedes 0.42.0. lib/write.js does not properly consider exceptions during the writing of an invalid packet to a stream.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-13410", "https://github.com/arunmagesh/dumb-nfuzz"]}, {"cve": "CVE-2020-25515", "desc": "Sourcecodester Simple Library Management System 1.0 is affected by Insecure Permissions via Books > New Book , http:///lms/index.php?page=books.", "poc": ["https://github.com/0xT11/CVE-POC", "https://github.com/Ko-kn3t/CVE-2020-25515", "https://github.com/Live-Hack-CVE/CVE-2020-2551", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/nomi-sec/PoC-in-GitHub"]}, {"cve": "CVE-2020-15790", "desc": "A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP8). If configured in an insecure manner, the web server might be susceptible to a directory listing attack.", "poc": ["https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-13906", "desc": "IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000038eb7.", "poc": ["https://github.com/nhiephon/Research"]}, {"cve": "CVE-2020-22427", "desc": "** DISPUTED ** NagiosXI 5.6.11 is affected by a remote code execution (RCE) vulnerability. An authenticated nagiosadmin user can inject additional commands into a request. NOTE: the vendor disputes whether the CVE and its references are actionable because all technical details are omitted, and the only option is to pay for a subscription service where technical details may be disclosed at an unspecified later time.", "poc": ["https://code610.blogspot.com/2020/03/postauth-rce-bugs-in-nagiosxi-5611.html"]}, {"cve": "CVE-2020-13265", "desc": "User email verification bypass in GitLab CE/EE 12.5 and later through 13.0.1 allows user to bypass email verification", "poc": ["https://gitlab.com/gitlab-org/gitlab/-/issues/121664"]}, {"cve": "CVE-2020-36619", "desc": "A vulnerability was found in multimon-ng. It has been rated as critical. This issue affects the function add_ch of the file demod_flex.c. The manipulation of the argument ch leads to format string. Upgrading to version 1.2.0 is able to address this issue. The name of the patch is e5a51c508ef952e81a6da25b43034dd1ed023c07. It is recommended to upgrade the affected component. The identifier VDB-216269 was assigned to this vulnerability.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-36619"]}, {"cve": "CVE-2020-10627", "desc": "Insulet Omnipod Insulin Management System insulin pump product ID 19191 and 40160 is designed to communicate using a wireless RF with an Insulet manufactured Personal Diabetes Manager device. This wireless RF communication protocol does not properly implement authentication or authorization. An attacker with access to one of the affected insulin pump models may be able to modify and/or intercept data. This vulnerability could also allow attackers to change pump settings and control insulin delivery.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-10627"]}, {"cve": "CVE-2020-5772", "desc": "Improper Input Validation in Teltonika firmware TRB2_R_00.02.04.01 allows a remote, authenticated attacker to gain root privileges by uploading a malicious package file.", "poc": ["https://www.tenable.com/security/research/tra-2020-48"]}, {"cve": "CVE-2020-36161", "desc": "An issue was discovered in Veritas APTARE 10.4 before 10.4P9 and 10.5 before 10.5P3. By default, on Windows systems, users can create directories under C:\\. A low privileged user can create a directory at the configuration file locations. When the Windows system restarts, a malicious OpenSSL engine could exploit arbitrary code execution as SYSTEM. This gives the attacker administrator access on the system, allowing the attacker (by default) to access all data, access all installed applications, etc.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/chnzzh/OpenSSL-CVE-lib"]}, {"cve": "CVE-2020-1593", "desc": "A remote code execution vulnerability exists when Windows Media Audio Decoder improperly handles objects. An attacker who successfully exploited the vulnerability could take control of an affected system.
There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage.
The security update addresses the vulnerability by correcting how Windows Media Audio Decoder handles objects.
", "poc": ["https://github.com/404notf0und/CVE-Flow", "https://github.com/Cheroxx/Patch-Tuesday-Updates"]}, {"cve": "CVE-2020-0751", "desc": "A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate specific malicious data from a user on a guest operating system.To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application.The security update addresses the vulnerability by resolving the conditions where Hyper-V would fail to handle these requests., aka 'Windows Hyper-V Denial of Service Vulnerability'. This CVE ID is unique from CVE-2020-0661.", "poc": ["https://github.com/alphaSeclab/sec-daily-2020", "https://github.com/ergot86/hyperv_stuff"]}, {"cve": "CVE-2020-24740", "desc": "An issue was discovered in Pluck 4.7.10-dev2. There is a CSRF vulnerability that can editpage via a /admin.php?action=editpage", "poc": ["https://github.com/pluck-cms/pluck/issues/81"]}, {"cve": "CVE-2020-36379", "desc": "An issue was discovered in the remove function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.", "poc": ["https://github.com/shenzhim/aaptjs/issues/2"]}, {"cve": "CVE-2020-24036", "desc": "PHP object injection in the Ajax endpoint of the backend in ForkCMS below version 5.8.3 allows an authenticated remote user to execute malicious code.", "poc": ["http://seclists.org/fulldisclosure/2021/Mar/31", "https://tech.feedyourhead.at/content/ForkCMS-PHP-Object-Injection-CVE-2020-24036", "https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-04"]}, {"cve": "CVE-2020-9597", "desc": "Adobe Acrobat and Reader versions 2020.006.20042 and earlier, 2017.011.30166 and earlier, 2017.011.30166 and earlier, and 2015.006.30518 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .", "poc": ["https://github.com/20142995/Goby", "https://github.com/ARPSyndicate/cvemon", "https://github.com/HimmelAward/Goby_POC", "https://github.com/Z0fhack/Goby_POC"]}, {"cve": "CVE-2020-7200", "desc": "A potential security vulnerability has been identified in HPE Systems Insight Manager (SIM) version 7.6. The vulnerability could be exploited to allow remote code execution.", "poc": ["http://packetstormsecurity.com/files/161721/HPE-Systems-Insight-Manager-AMF-Deserialization-Remote-Code-Execution.html", "https://github.com/ARPSyndicate/cvemon", "https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet", "https://github.com/BrittanyKuhn/javascript-tutorial", "https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet", "https://github.com/SexyBeast233/SecBooks", "https://github.com/alexfrancow/CVE-2020-7200", "https://github.com/anquanscan/sec-tools", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/soosmile/POC", "https://github.com/testanull/ProjectSIM"]}, {"cve": "CVE-2020-29030", "desc": "Cross-Site Request Forgery (CSRF) vulnerability in web GUI of Secomea GateManager allows an attacker to execute malicious code. This issue affects: Secomea GateManager All versions prior to 9.4.", "poc": ["https://www.secomea.com/support/cybersecurity-advisory/"]}, {"cve": "CVE-2020-6122", "desc": "SQL injection vulnerability exists in the CheckDuplicateStudent.php page of OS4Ed openSIS 7.3. The mn parameter in the page CheckDuplicateStudent.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-1072", "https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-17035", "desc": "Windows Kernel Elevation of Privilege Vulnerability", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/flamelu/CVE-2020-17035-patch-analysis", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/soosmile/POC"]}, {"cve": "CVE-2020-3661", "desc": "Buffer overflow will happen while parsing mp4 clip with corrupted sample atoms values which exceeds MAX_UINT32 range due to lack of validation checks in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, Kamorta, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, QCA6574AU, QCS405, QCS605, QM215, Rennell, Saipan, SDA660, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130", "poc": ["https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin"]}, {"cve": "CVE-2020-36202", "desc": "An issue was discovered in the async-h1 crate before 2.3.0 for Rust. Request smuggling can occur when used behind a reverse proxy.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/Artisan-Lab/Rust-memory-safety-bugs"]}, {"cve": "CVE-2020-11509", "desc": "An XSS vulnerability in the WP Lead Plus X plugin through 0.98 for WordPress allows remote attackers to upload page templates containing arbitrary JavaScript via the c37_wpl_import_template admin-post action (which will execute in an administrator's browser if the template is used to create a page).", "poc": ["https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-5965", "desc": "NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the DirectX 11 user mode driver (nvwgf2um/x.dll), in which a specially crafted shader can cause an out of bounds access, leading to denial of service.", "poc": ["https://nvidia.custhelp.com/app/answers/detail/a_id/5031"]}, {"cve": "CVE-2020-12509", "desc": "In s::can moni::tools in versions below 4.2 an unauthenticated attacker could get any file from the device by path traversal in the camera-file module.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-12509"]}, {"cve": "CVE-2020-28130", "desc": "An Arbitrary File Upload in the Upload Image component in SourceCodester Online Library Management System 1.0 allows the user to conduct remote code execution via admin/borrower/index.php?view=add because .php files can be uploaded to admin/borrower/photos (under the web root).", "poc": ["https://www.exploit-db.com/exploits/48928"]}, {"cve": "CVE-2020-0022", "desc": "In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bounds write due to an incorrect bounds calculation. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-143894715", "poc": ["http://packetstormsecurity.com/files/156891/Android-Bluetooth-Remote-Denial-Of-Service.html", "http://seclists.org/fulldisclosure/2020/Feb/10", "https://github.com/0xT11/CVE-POC", "https://github.com/2lambda123/CVE-mitre", "https://github.com/5k1l/cve-2020-0022", "https://github.com/ARPSyndicate/cvemon", "https://github.com/JeffroMF/awesome-bluetooth-security321", "https://github.com/NaInSec/CVE-PoC-in-GitHub", "https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame", "https://github.com/Polo35/CVE-2020-0022", "https://github.com/Roo4L/BlueFrag_PoC", "https://github.com/SYRTI/POC_to_review", "https://github.com/WhooAmii/POC_to_review", "https://github.com/WinMin/Protocol-Vul", "https://github.com/alwentiu/CVE-2020-14292", "https://github.com/devdanqtuan/poc-for-cve-2020-0022", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/engn33r/awesome-bluetooth-security", "https://github.com/he1m4n6a/cve-db", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/k3vinlusec/Bluefrag_CVE-2020-0022", "https://github.com/leommxj/cve-2020-0022", "https://github.com/lsw29475/CVE-2020-0022", "https://github.com/marcinguy/CVE-2020-0022", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/nu11secur1ty/CVE-mitre", "https://github.com/seemoo-lab/frankenstein", "https://github.com/soosmile/POC", "https://github.com/themmokhtar/CVE-2020-0022", "https://github.com/trhacknon/Pocingit", "https://github.com/wrlu/Vulnerabilities", "https://github.com/zecool/cve"]}, {"cve": "CVE-2020-12117", "desc": "Moxa Service in Moxa NPort 5150A firmware version 1.5 and earlier allows attackers to obtain sensitive configuration values via a crafted packet to UDP port 4800. NOTE: Moxa Service is an unauthenticated service that runs upon a first-time installation but can be disabled without ill effect.", "poc": ["https://blog.scadafence.com/technical-blog-cve-2020-12117-industrial-iot-insecure-default-configurations"]}, {"cve": "CVE-2020-36224", "desc": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service.", "poc": ["http://seclists.org/fulldisclosure/2021/May/64", "http://seclists.org/fulldisclosure/2021/May/65"]}, {"cve": "CVE-2020-28332", "desc": "Barco wePresent WiPG-1600W devices download code without an Integrity Check. Affected Version(s): 2.5.1.8, 2.5.0.25, 2.5.0.24, 2.4.1.19. The Barco wePresent WiPG-1600W firmware does not perform verification of digitally signed firmware updates and is susceptible to processing and installing modified/malicious images.", "poc": ["http://packetstormsecurity.com/files/160164/Barco-wePresent-Insecure-Firmware-Image.html", "https://korelogic.com/Resources/Advisories/KL-001-2020-009.txt"]}, {"cve": "CVE-2020-10726", "desc": "A vulnerability was found in DPDK versions 19.11 and above. A malicious container that has direct access to the vhost-user socket can keep sending VHOST_USER_GET_INFLIGHT_FD messages, causing a resource leak (file descriptors and virtual memory), which may result in a denial of service.", "poc": ["https://www.oracle.com/security-alerts/cpujan2021.html", "https://github.com/Live-Hack-CVE/CVE-2020-10726"]}, {"cve": "CVE-2020-24901", "desc": "The default installation of Krpano Panorama Viewer version <=1.20.8 is vulnerable to Reflected XSS due to insecure remote js load in file viewer/krpano.html, parameter plugin[test].url.", "poc": ["https://packetstormsecurity.com/files/159477/Krpano-Panorama-Viewer-1.20.8-Cross-Site-Scripting.html"]}, {"cve": "CVE-2020-2109", "desc": "Sandbox protection in Jenkins Pipeline: Groovy Plugin 2.78 and earlier can be circumvented through default parameter expressions in CPS-transformed methods.", "poc": ["https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-6310", "desc": "Improper access control in SOA Configuration Trace component in SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 702, 730, 731, 740, 750, allows any authenticated user to enumerate all SAP users, leading to Information Disclosure.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-6310"]}, {"cve": "CVE-2020-27211", "desc": "Nordic Semiconductor nRF52840 devices through 2020-10-19 have improper protection against physical side channels. The flash read-out protection (APPROTECT) can be bypassed by injecting a fault during the boot phase.", "poc": ["https://eprint.iacr.org/2021/640", "https://limitedresults.com/2020/06/nrf52-debug-resurrection-approtect-bypass/", "https://www.aisec.fraunhofer.de/en/FirmwareProtection.html"]}, {"cve": "CVE-2020-36648", "desc": "A vulnerability, which was classified as critical, was found in pouetnet pouet 2.0. This affects an unknown part. The manipulation of the argument howmany leads to sql injection. The identifier of the patch is 11d615931352066fb2f6dcb07428277c2cd99baf. It is recommended to apply a patch to fix this issue. The identifier VDB-217641 was assigned to this vulnerability.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-36648"]}, {"cve": "CVE-2020-2820", "desc": "Vulnerability in the Oracle Common Applications Calendar product of Oracle E-Business Suite (component: Notes). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Common Applications Calendar. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Common Applications Calendar, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Common Applications Calendar accessible data as well as unauthorized update, insert or delete access to some of Oracle Common Applications Calendar accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpuapr2020.html"]}, {"cve": "CVE-2020-10233", "desc": "In version 4.8.0 and earlier of The Sleuth Kit (TSK), there is a heap-based buffer over-read in ntfs_dinode_lookup in fs/ntfs.c.", "poc": ["https://github.com/sleuthkit/sleuthkit/issues/1829"]}, {"cve": "CVE-2020-10410", "desc": "The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/edit-user.php by adding a question mark (?) followed by the payload.", "poc": ["https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456", "https://github.com/Live-Hack-CVE/CVE-2020-10410"]}, {"cve": "CVE-2020-0814", "desc": "An elevation of privilege vulnerability exists in Windows Installer because of the way Windows Installer handles certain filesystem operations.To exploit the vulnerability, an attacker would require unprivileged execution on the victim system, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0779, CVE-2020-0798, CVE-2020-0842, CVE-2020-0843.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/Ascotbe/Kernelhub", "https://github.com/Cruxer8Mech/Idk", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/klinix5/CVE-2020-0814", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/soosmile/POC", "https://github.com/ycdxsb/WindowsPrivilegeEscalation"]}, {"cve": "CVE-2020-6627", "desc": "The web-management application on Seagate Central NAS STCG2000300, STCG3000300, and STCG4000300 devices allows OS command injection via mv_backend_launch in cirrus/application/helpers/mv_backend_helper.php by leveraging the \"start\" state and sending a check_device_name request.", "poc": ["http://packetstormsecurity.com/files/172590/Seagate-Central-Storage-2015.0916-User-Creation-Command-Execution.html", "https://pentest.blog/advisory-seagate-central-storage-remote-code-execution/", "https://github.com/Live-Hack-CVE/CVE-2020-6627"]}, {"cve": "CVE-2020-13566", "desc": "SQL injection vulnerabilities exist in phpGACL 3.3.7. A specially crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability In admin/edit_group.php, when the POST parameter action is \u201cDelete\u201d, the POST parameter delete_group leads to a SQL injection.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-1179"]}, {"cve": "CVE-2020-6611", "desc": "GNU LibreDWG 0.9.3.2564 has a NULL pointer dereference in get_next_owned_entity in dwg.c.", "poc": ["https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447190", "https://github.com/Live-Hack-CVE/CVE-2020-6611"]}, {"cve": "CVE-2020-19951", "desc": "A cross-site request forgery (CSRF) in /controller/pay.class.php of YzmCMS v5.5 allows attackers to access sensitive components of the application.", "poc": ["https://github.com/yzmcms/yzmcms/issues/43"]}, {"cve": "CVE-2020-5801", "desc": "An attacker can craft and send an OpenNamespace message to port 4241 with valid session-id that triggers an unhandled exception in CFTLDManager::HandleRequest function in RnaDaSvr.dll, resulting in process termination. Observed in FactoryTalk Linx 6.11. All versions of FactoryTalk Linx are affected.", "poc": ["https://www.tenable.com/security/research/tra-2020-71"]}, {"cve": "CVE-2020-3864", "desc": "A logic issue was addressed with improved validation. This issue is fixed in iCloud for Windows 7.17, iTunes 12.10.4 for Windows, iCloud for Windows 10.9.2, tvOS 13.3.1, Safari 13.0.5, iOS 13.3.1 and iPadOS 13.3.1. A DOM object context may not have had a unique security origin.", "poc": ["https://github.com/houjingyi233/macOS-iOS-system-security"]}, {"cve": "CVE-2020-24391", "desc": "mongo-express before 1.0.0 offers support for certain advanced syntax but implements this in an unsafe way. NOTE: this may overlap CVE-2019-10769.", "poc": ["https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/xinyisleep/pocscan"]}, {"cve": "CVE-2020-27575", "desc": "Maxum Rumpus 8.2.13 and 8.2.14 is affected by a command injection vulnerability. The web administration contains functionality in which administrators are able to manage users. The edit users form contains a parameter vulnerable to command injection due to insufficient validation.", "poc": ["https://tvrbk.github.io/cve/2021/03/07/rumpus.html", "https://github.com/EdgeSecurityTeam/Vulnerability", "https://github.com/tzwlhack/Vulnerability"]}, {"cve": "CVE-2020-6827", "desc": "When following a link that opened an intent://-schemed URL, causing a custom tab to be opened, Firefox for Android could be tricked into displaying the incorrect URI.
*Note: This issue only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 68.7.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/seungminaaa/seungminaaa.github.io"]}, {"cve": "CVE-2020-21517", "desc": "Cross Site Scripting (XSS) vulnerability in MetInfo 7.0.0 via the gourl parameter in login.php.", "poc": ["https://github.com/lvyyevd/cms/blob/master/metinfo/metinfo7.0.0.md"]}, {"cve": "CVE-2020-4271", "desc": "IBM QRadar 7.3.0 to 7.3.3 Patch 2 could allow an authenticated user to send a specially crafted command which would be executed as a lower privileged user. IBM X-ForceID: 175897.", "poc": ["http://packetstormsecurity.com/files/157336/QRadar-Community-Edition-7.3.1.6-PHP-Object-Injection.html"]}, {"cve": "CVE-2020-25248", "desc": "An issue was discovered in Hyland OnBase through 16.0.2.83 and below, 17.0.2.109 and below, 18.0.0.37 and below, 19.8.16.1000 and below and 20.3.10.1000 and below. Directory traversal exists for reading files, as demonstrated by the FileName parameter.", "poc": ["http://seclists.org/fulldisclosure/2020/Oct/9", "https://seclists.org/fulldisclosure/2020/Oct/9", "https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-0464", "desc": "In resolv_cache_lookup of res_cache.cpp, there is a possible side channel information disclosure. This could lead to local information disclosure of accessed web resources with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-150371903", "poc": ["https://github.com/TinyNiko/android_bulletin_notes"]}, {"cve": "CVE-2020-15920", "desc": "There is an OS Command Injection in Mida eFramework through 2.9.0 that allows an attacker to achieve Remote Code Execution (RCE) with administrative (root) privileges. No authentication is required.", "poc": ["http://packetstormsecurity.com/files/158991/Mida-eFramework-2.9.0-Remote-Code-Execution.html", "http://packetstormsecurity.com/files/159194/Mida-Solutions-eFramework-ajaxreq.php-Command-Injection.html", "https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html", "https://github.com/20142995/Goby", "https://github.com/ARPSyndicate/cvemon", "https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/Elsfa7-110/kenzer-templates", "https://github.com/HimmelAward/Goby_POC", "https://github.com/Live-Hack-CVE/CVE-2020-15920", "https://github.com/Z0fhack/Goby_POC", "https://github.com/d4n-sec/d4n-sec.github.io", "https://github.com/merlinepedra/nuclei-templates", "https://github.com/merlinepedra25/nuclei-templates", "https://github.com/sobinge/nuclei-templates"]}, {"cve": "CVE-2020-22029", "desc": "A heap-based Buffer Overflow vulnerability exists in FFmpeg 4.2 at libavfilter/vf_colorconstancy.c: in slice_get_derivative, which crossfade_samples_fltp, which might lead to memory corruption and other potential consequences.", "poc": ["https://trac.ffmpeg.org/ticket/8250"]}, {"cve": "CVE-2020-36485", "desc": "Portable Ltd Playable v9.18 was discovered to contain an arbitrary file upload vulnerability in the filename parameter of the upload module. This vulnerability allows attackers to execute arbitrary code via a crafted JPEG file.", "poc": ["https://www.vulnerability-lab.com/get_content.php?id=2198"]}, {"cve": "CVE-2020-8335", "desc": "The BIOS tamper detection mechanism was not triggered in Lenovo ThinkPad A285, BIOS versions up to r0xuj70w; A485, BIOS versions up to r0wuj65w; T495 BIOS versions up to r12uj55w; T495s/X395, BIOS versions up to r13uj47w, while the emergency-reset button is pressed which may allow for unauthorized access.", "poc": ["https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-14810", "desc": "Vulnerability in the Oracle Hospitality Suite8 product of Oracle Hospitality Applications (component: WebConnect). Supported versions that are affected are 8.10.2 and 8.11-8.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Suite8. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Hospitality Suite8 accessible data as well as unauthorized read access to a subset of Oracle Hospitality Suite8 accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpuoct2020.html"]}, {"cve": "CVE-2020-21236", "desc": "A vulnerability in /damicms-master/admin.php?s=/Article/doedit of DamiCMS v6.0 allows attackers to compromise and impersonate user accounts via obtaining a user's session cookie.", "poc": ["https://github.com/wind-cyber/DamiCMS-v6.0.0-have-csrf-and-xss-Vulnerabilities-/blob/master/README.md"]}, {"cve": "CVE-2020-14603", "desc": "Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 8.0.6-8.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Financial Services Analytical Applications Infrastructure accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpujul2020.html"]}, {"cve": "CVE-2020-21815", "desc": "A null pointer deference issue exists in GNU LibreDWG 0.10.2641 via output_TEXT ../../programs/dwg2SVG.c:114, which causes a denial of service (application crash).", "poc": ["https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890932"]}, {"cve": "CVE-2020-10190", "desc": "An issue was discovered in MunkiReport before 5.3.0. An authenticated user could achieve SQL Injection in app/models/tablequery.php by crafting a special payload on the /datatables/data endpoint.", "poc": ["https://github.com/munkireport/munkireport-php/releases"]}, {"cve": "CVE-2020-7770", "desc": "This affects the package json8 before 1.0.3. The function adds in the target object the property specified in the path, however it does not properly check the key being set, leading to a prototype pollution.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-7770", "https://github.com/dellalibera/dellalibera"]}, {"cve": "CVE-2020-7760", "desc": "This affects the package codemirror before 5.58.2; the package org.apache.marmotta.webjars:codemirror before 5.58.2. The vulnerable regular expression is located in https://github.com/codemirror/CodeMirror/blob/cdb228ac736369c685865b122b736cd0d397836c/mode/javascript/javascript.jsL129. The ReDOS vulnerability of the regex is mainly due to the sub-pattern (s|/*.*?*/)*", "poc": ["https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEMARMOTTAWEBJARS-1024450", "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1024449", "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1024445", "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCODEMIRROR-1024448", "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCOMPONENTS-1024446", "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1024447", "https://snyk.io/vuln/SNYK-JS-CODEMIRROR-1016937", "https://www.oracle.com//security-alerts/cpujul2021.html", "https://www.oracle.com/security-alerts/cpuApr2021.html", "https://www.oracle.com/security-alerts/cpuapr2022.html", "https://github.com/deepakdba/cve_checklist", "https://github.com/engn33r/awesome-redos-security", "https://github.com/radtek/cve_checklist", "https://github.com/yetingli/PoCs"]}, {"cve": "CVE-2020-14892", "desc": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).", "poc": ["https://www.oracle.com/security-alerts/cpuoct2020.html"]}, {"cve": "CVE-2020-35893", "desc": "An issue was discovered in the simple-slab crate before 0.3.3 for Rust. remove() has an off-by-one error, causing memory leakage and a drop of uninitialized memory.", "poc": ["https://github.com/Artisan-Lab/Rust-memory-safety-bugs"]}, {"cve": "CVE-2020-11203", "desc": "Stack overflow may occur if GSM/WCDMA broadcast config size received from user is larger than variable length array in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables", "poc": ["https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin"]}, {"cve": "CVE-2020-24295", "desc": "Buffer Overflow vulnerability in PSDParser.cpp::ReadImageLine() in FreeImage 3.19.0 [r1859] allows remote attackers to ru narbitrary code via use of crafted psd file.", "poc": ["https://github.com/fkie-cad/nvd-json-data-feeds"]}, {"cve": "CVE-2020-13523", "desc": "An exploitable information disclosure vulnerability exists in SoftPerfect\u2019s RAM Disk 4.1 spvve.sys driver. A specially crafted I/O request packet (IRP) can cause the disclosure of sensitive information. An attacker can send a malicious IRP to trigger this vulnerability.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-1122"]}, {"cve": "CVE-2020-7069", "desc": "In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-CCM mode is used with openssl_encrypt() function with 12 bytes IV, only first 7 bytes of the IV is actually used. This can lead to both decreased security and incorrect encryption data.", "poc": ["https://usn.ubuntu.com/4583-1/", "https://www.oracle.com/security-alerts/cpuApr2021.html", "https://www.oracle.com/security-alerts/cpuoct2021.html", "https://github.com/ARPSyndicate/cvemon", "https://github.com/chnzzh/OpenSSL-CVE-lib"]}, {"cve": "CVE-2020-23706", "desc": "A heap-based buffer overflow vulnerability in the function ok_jpg_decode_block_subsequent_scan() ok_jpg.c:1102 of ok-file-formats through 2020-06-26 allows attackers to cause a Denial of Service (DOS) via a crafted jpeg file.", "poc": ["https://github.com/brackeen/ok-file-formats/issues/7"]}, {"cve": "CVE-2020-23873", "desc": "pdf2xml v2.0 was discovered to contain a heap-buffer overflow in the function TextPage::dump.", "poc": ["https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml", "https://github.com/kermitt2/pdf2xml/issues/11", "https://github.com/Live-Hack-CVE/CVE-2020-23873"]}, {"cve": "CVE-2020-1954", "desc": "Apache CXF has the ability to integrate with JMX by registering an InstrumentationManager extension with the CXF bus. If the \u2018createMBServerConnectorFactory\u2018 property of the default InstrumentationManagerImpl is not disabled, then it is vulnerable to a man-in-the-middle (MITM) style attack. An attacker on the same host can connect to the registry and rebind the entry to another server, thus acting as a proxy to the original. They are then able to gain access to all of the information that is sent and received over JMX.", "poc": ["https://www.oracle.com/security-alerts/cpuoct2020.html"]}, {"cve": "CVE-2020-1256", "desc": "An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user\u2019s system.
There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage.
The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
", "poc": ["https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-11447", "desc": "An issue was discovered on Bell HomeHub 3000 SG48222070 devices. Remote authenticated users can retrieve the serial number via cgi/json-req - this is an information leak because the serial number is intended to prove an actor's physical access to the device.", "poc": ["https://github.com/fkie-cad/nvd-json-data-feeds"]}, {"cve": "CVE-2020-2636", "desc": "Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Application Service Level Mgmt). Supported versions that are affected are 12.1.0.5, 13.2.0.0 and 13.3.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Enterprise Manager Base Platform accessible data as well as unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Enterprise Manager Base Platform. CVSS 3.0 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L).", "poc": ["https://www.oracle.com/security-alerts/cpujan2020.html"]}, {"cve": "CVE-2020-3630", "desc": "Possibility of out of bound access while processing the responses from video firmware in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8053, APQ8096AU, APQ8098, Kamorta, MDM9150, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8917, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS405, QCS605, QM215, Rennell, SA415M, SA6155P, Saipan, SC8180X, SDA660, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130", "poc": ["https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin"]}, {"cve": "CVE-2020-15936", "desc": "A improper input validation in Fortinet FortiGate version 6.4.3 and below, version 6.2.5 and below, version 6.0.11 and below, version 5.6.13 and below allows attacker to disclose sensitive information via SNI Client Hello TLS packets.", "poc": ["https://fortiguard.com/advisory/FG-IR-20-091"]}, {"cve": "CVE-2020-21883", "desc": "Unibox U-50 2.4 and UniBox Enterprise Series 2.4 and UniBox Campus Series 2.4 contain a OS command injection vulnerability in /tools/ping, which can leads to complete device takeover.", "poc": ["https://s3curityb3ast.github.io/KSA-Dev-009.txt", "https://www.mail-archive.com/fulldisclosure@seclists.org/msg07140.html", "https://github.com/s3curityb3ast/s3curityb3ast.github.io"]}, {"cve": "CVE-2020-7327", "desc": "Improperly implemented security check in McAfee MVISION Endpoint Detection and Response Client (MVEDR) prior to 3.2.0 may allow local administrators to execute malicious code via stopping a core Windows service leaving McAfee core trust component in an inconsistent state resulting in MVEDR failing open rather than closed", "poc": ["https://kc.mcafee.com/corporate/index?page=content&id=SB10331"]}, {"cve": "CVE-2020-14630", "desc": "Vulnerability in the Oracle Enterprise Session Border Controller product of Oracle Communications Applications (component: File Upload). Supported versions that are affected are 8.1.0, 8.2.0 and 8.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Enterprise Session Border Controller. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Enterprise Session Border Controller, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Enterprise Session Border Controller as well as unauthorized update, insert or delete access to some of Oracle Enterprise Session Border Controller accessible data and unauthorized read access to a subset of Oracle Enterprise Session Border Controller accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:H).", "poc": ["https://www.oracle.com/security-alerts/cpujul2020.html"]}, {"cve": "CVE-2020-2642", "desc": "Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Connector Framework). Supported versions that are affected are 12.1.0.5, 13.2.0.0 and 13.3.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Enterprise Manager Base Platform accessible data as well as unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Enterprise Manager Base Platform. CVSS 3.0 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L).", "poc": ["https://www.oracle.com/security-alerts/cpujan2020.html", "https://github.com/Live-Hack-CVE/CVE-2020-2642"]}, {"cve": "CVE-2020-22875", "desc": "Integer overflow vulnerability in function Jsi_ObjSetLength in jsish before 3.0.6, allows remote attackers to execute arbitrary code.", "poc": ["https://github.com/pcmacdon/jsish/issues/10"]}, {"cve": "CVE-2020-25117", "desc": "The Admin CP in vBulletin 5.6.3 allows XSS via a Junior Member Title to User Title Manager.", "poc": ["https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-0469", "desc": "In addEscrowToken of LockSettingsService.java, there is a possible loss of the synthetic password due to logic error. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-168692734", "poc": ["https://github.com/TinyNiko/android_bulletin_notes"]}, {"cve": "CVE-2020-11536", "desc": "An issue was discovered in ONLYOFFICE Document Server 5.5.0. An attacker can craft a malicious .docx file, and exploit the unzip function to rewrite a binary and remotely execute code on a victim's server.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/nettitude/pwnlyoffice"]}, {"cve": "CVE-2020-9714", "desc": "Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have a security bypass vulnerability. Successful exploitation could lead to privilege escalation .", "poc": ["https://github.com/V0lk3n/OSMR-CheatSheet"]}, {"cve": "CVE-2020-6299", "desc": "SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 740, 750, 751, 752, 753, 754, 755, allows a business user to access the list of users in the given system using value help, leading to Information Disclosure.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-6299"]}, {"cve": "CVE-2020-6069", "desc": "An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll JPEG jpegread precision parser of the Accusoft ImageGear 19.5.0 library. A specially crafted JPEG file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-0993", "https://github.com/Live-Hack-CVE/CVE-2020-6069"]}, {"cve": "CVE-2020-9743", "desc": "AEM versions 6.5.5.0 (and below), 6.4.8.1 (and below), 6.3.3.8 (and below) and 6.2 SP1-CFP20 (and below) are affected by an HTML injection vulnerability in the content editor component that allows unauthenticated users to craft an HTTP request that includes arbitrary HTML code in a parameter value. An attacker could then use the malicious GET request to lure victims to perform unsafe actions in the page (ex. phishing).", "poc": ["https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-14564", "desc": "Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Environment Mgmt Console). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpujul2020.html"]}, {"cve": "CVE-2020-25135", "desc": "An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to Cross-Site Scripting (XSS) due to the fact that it is possible to inject and store malicious JavaScript code within it. This can occur via the graph_title parameter to the graphs/ URI.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/afine-com/research", "https://github.com/afinepl/research"]}, {"cve": "CVE-2020-28480", "desc": "The package jointjs before 3.3.0 are vulnerable to Prototype Pollution via util.setByPath (https://resources.jointjs.com/docs/jointjs/v3.2/joint.htmlutil.setByPath). The path used the access the object's key and set the value is not properly sanitized, leading to a Prototype Pollution.", "poc": ["https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062037", "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062036", "https://snyk.io/vuln/SNYK-JS-JOINTJS-1024444", "https://github.com/dellalibera/dellalibera"]}, {"cve": "CVE-2020-2832", "desc": "Vulnerability in the Oracle One-to-One Fulfillment product of Oracle E-Business Suite (component: Print Server). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data as well as unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpuapr2020.html"]}, {"cve": "CVE-2020-6917", "desc": "Potential security vulnerabilities including compromise of integrity, and allowed communication with untrusted clients has been identified in HP Support Assistant software.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-6917"]}, {"cve": "CVE-2020-13830", "desc": "An issue was discovered on Samsung mobile devices with P(9.0) software. One UI HOME logging can leak information. The Samsung ID is SVE-2019-16382 (June 2020).", "poc": ["https://security.samsungmobile.com/securityUpdate.smsb"]}, {"cve": "CVE-2020-11271", "desc": "Possible out of bounds while accessing global control elements due to race condition in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking", "poc": ["https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin", "https://github.com/TinyNiko/android_bulletin_notes"]}, {"cve": "CVE-2020-26712", "desc": "REDCap 10.3.4 contains a SQL injection vulnerability in the ToDoList function via sort parameter. The application uses the addition of a string of information from the submitted user that is not validated well in the database query, resulting in an SQL injection vulnerability where an attacker can exploit and compromise all databases.", "poc": ["https://github.com/vuongdq54/RedCap"]}, {"cve": "CVE-2020-36197", "desc": "An improper access control vulnerability has been reported to affect earlier versions of Music Station. If exploited, this vulnerability allows attackers to compromise the security of the software by gaining privileges, reading sensitive information, executing commands, evading detection, etc. This issue affects: QNAP Systems Inc. Music Station versions prior to 5.3.16 on QTS 4.5.2; versions prior to 5.2.10 on QTS 4.3.6; versions prior to 5.1.14 on QTS 4.3.3; versions prior to 5.3.16 on QuTS hero h4.5.2; versions prior to 5.3.16 on QuTScloud c4.5.4.", "poc": ["http://packetstormsecurity.com/files/162849/QNAP-MusicStation-MalwareRemover-File-Upload-Command-Injection.html", "https://github.com/ShielderSec/poc", "https://github.com/r0eXpeR/supplier"]}, {"cve": "CVE-2020-19822", "desc": "A remote code execution (RCE) vulnerability in template_user.php of ZZCMS version 2018 allows attackers to execute arbitrary PHP code via the \"ml\" and \"title\" parameters.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-19822"]}, {"cve": "CVE-2020-0466", "desc": "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/TinyNiko/android_bulletin_notes"]}, {"cve": "CVE-2020-11651", "desc": "An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions.", "poc": ["http://packetstormsecurity.com/files/157560/Saltstack-3000.1-Remote-Code-Execution.html", "http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html", "https://github.com/0day404/vulnerability-poc", "https://github.com/0xT11/CVE-POC", "https://github.com/0xc0d/CVE-2020-11651", "https://github.com/20142995/Goby", "https://github.com/20142995/pocsuite3", "https://github.com/20142995/sectool", "https://github.com/5l1v3r1/SaltStack-Exp-1", "https://github.com/ARPSyndicate/cvemon", "https://github.com/Al1ex/CVE-2020-11652", "https://github.com/ArrestX/--POC", "https://github.com/CVEDB/PoC-List", "https://github.com/CVEDB/awesome-cve-repo", "https://github.com/CVEDB/top", "https://github.com/CnHack3r/Penetration_PoC", "https://github.com/EchoGin404/-", "https://github.com/EchoGin404/gongkaishouji", "https://github.com/FDlucifer/firece-fish", "https://github.com/GhostTroops/TOP", "https://github.com/HimmelAward/Goby_POC", "https://github.com/Imanfeng/SaltStack-Exp", "https://github.com/JERRY123S/all-poc", "https://github.com/KayCHENvip/vulnerability-poc", "https://github.com/MelanyRoob/Goby", "https://github.com/Miraitowa70/POC-Notes", "https://github.com/Mr-xn/Penetration_Testing_POC", "https://github.com/Ostorlab/KEV", "https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors", "https://github.com/RakhithJK/CVE-2020-11651", "https://github.com/SexyBeast233/SecBooks", "https://github.com/TesterCC/exp_poc_library", "https://github.com/Threekiii/Awesome-Exploit", "https://github.com/Threekiii/Awesome-POC", "https://github.com/Threekiii/Vulhub-Reproduce", "https://github.com/YIXINSHUWU/Penetration_Testing_POC", "https://github.com/Z0fhack/Goby_POC", "https://github.com/ZTK-009/Penetration_PoC", "https://github.com/apachecn-archive/Middleware-Vulnerability-detection", "https://github.com/appcheck-ng/salt-rce-scanner-CVE-2020-11651-CVE-2020-11652", "https://github.com/bakery312/Vulhub-Reproduce", "https://github.com/bravery9/SaltStack-Exp", "https://github.com/chef-cft/salt-vulnerabilities", "https://github.com/cyberanand1337x/bug-bounty-2022", "https://github.com/d4n-sec/d4n-sec.github.io", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/dozernz/cve-2020-11651", "https://github.com/dwoz/salt-rekey", "https://github.com/fanjq99/CVE-2020-11652", "https://github.com/fofapro/vulfocus", "https://github.com/gobysec/Goby", "https://github.com/hardsoftsecurity/CVE-2020-11651-PoC", "https://github.com/hasee2018/Penetration_Testing_POC", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/heikanet/CVE-2020-11651-CVE-2020-11652-EXP", "https://github.com/hktalent/TOP", "https://github.com/hktalent/bug-bounty", "https://github.com/huike007/penetration_poc", "https://github.com/huike007/poc", "https://github.com/jasperla/CVE-2020-11651-poc", "https://github.com/jbmihoub/all-poc", "https://github.com/kasini3000/kasini3000", "https://github.com/kevthehermit/CVE-2020-11651", "https://github.com/limon768/CVE-2020-11652-CVE-2020-11652-POC", "https://github.com/limon768/CVE-2020-11652-POC", "https://github.com/lions2012/Penetration_Testing_POC", "https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection", "https://github.com/lovelyjuice/cve-2020-11651-exp-plus", "https://github.com/merlinxcy/ToolBox", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/password520/Penetration_PoC", "https://github.com/puckiestyle/cve-2020-11651", "https://github.com/rapyuta-robotics/clean-script", "https://github.com/retr0-13/Goby", "https://github.com/rossengeorgiev/salt-security-backports", "https://github.com/soosmile/POC", "https://github.com/ssrsec/CVE-2020-11651-CVE-2020-11652-EXP", "https://github.com/tdtc7/qps", "https://github.com/trganda/dockerv", "https://github.com/trganda/starrlist", "https://github.com/weeka10/-hktalent-TOP", "https://github.com/whoadmin/pocs", "https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-", "https://github.com/xuetusummer/Penetration_Testing_POC", "https://github.com/yedada-wei/-", "https://github.com/yedada-wei/gongkaishouji", "https://github.com/zhangchi991022/Comprehensive-experiment-of-infomation-security"]}, {"cve": "CVE-2020-1036", "desc": "A remote code execution vulnerability exists when Hyper-V RemoteFX vGPU on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1032, CVE-2020-1040, CVE-2020-1041, CVE-2020-1042, CVE-2020-1043.", "poc": ["https://nvidia.custhelp.com/app/answers/detail/a_id/5044"]}, {"cve": "CVE-2020-9455", "desc": "The RegistrationMagic plugin through 4.6.0.3 for WordPress allows remote authenticated users (with minimal privileges) to send arbitrary emails on behalf of the site via class_rm_user_services.php send_email_user_view.", "poc": ["https://wpvulndb.com/vulnerabilities/10116"]}, {"cve": "CVE-2020-6509", "desc": "Use after free in extensions in Google Chrome prior to 83.0.4103.116 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-6509"]}, {"cve": "CVE-2020-19960", "desc": "A SQL injection vulnerability has been discovered in zz cms version 2019 which allows attackers to retrieve sensitive data via the dlid parameter in the /dl/dl_sendsms.php page cookie.", "poc": ["https://github.com/superlink996/chunqiuyunjingbachang"]}, {"cve": "CVE-2020-11287", "desc": "Allowing RTT frames to be linked with non randomized MAC address by comparing the sequence numbers can lead to information disclosure. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking", "poc": ["https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin", "https://github.com/TinyNiko/android_bulletin_notes"]}, {"cve": "CVE-2020-19283", "desc": "A reflected cross-site scripting (XSS) vulnerability in the /newVersion component of Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML.", "poc": ["https://www.seebug.org/vuldb/ssvid-97939", "https://github.com/ARPSyndicate/kenzer-templates"]}, {"cve": "CVE-2020-2616", "desc": "Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Enterprise Manager Repository). Supported versions that are affected are 12.1.0.5, 13.2.0.0 and 13.3.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Enterprise Manager Base Platform accessible data as well as unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Enterprise Manager Base Platform. CVSS 3.0 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L).", "poc": ["https://www.oracle.com/security-alerts/cpujan2020.html"]}, {"cve": "CVE-2020-13536", "desc": "An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa MXView series 3.1.8 installation. Depending on the vector chosen, an attacker can either add code to a script or replace a binary. By default MXViewService, which starts as a NT SYSTEM authority user executes a series of Node.Js scripts to start additional application functionality.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-1148"]}, {"cve": "CVE-2020-12655", "desc": "An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.", "poc": ["https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-20219", "desc": "Mikrotik RouterOs 6.44.6 (long-term tree) suffers from a memory corruption vulnerability in the /nova/bin/igmp-proxy process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).", "poc": ["https://seclists.org/fulldisclosure/2021/May/2"]}, {"cve": "CVE-2020-28190", "desc": "TerraMaster TOS <= 4.2.06 was found to check for updates (of both system and applications) via an insecure channel (HTTP). Man-in-the-middle attackers are able to intercept these requests and serve a weaponized/infected version of applications or updates.", "poc": ["https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/"]}, {"cve": "CVE-2020-19190", "desc": "Buffer Overflow vulnerability in _nc_find_entry in tinfo/comp_hash.c:70 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "poc": ["https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc6.md"]}, {"cve": "CVE-2020-6819", "desc": "Under certain conditions, when running the nsDocShell destructor, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird < 68.7.0, Firefox < 74.0.1, and Firefox ESR < 68.6.1.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/Ostorlab/KEV", "https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors"]}, {"cve": "CVE-2020-11227", "desc": "Out of bound write while parsing RTT/TTY packet parsing due to lack of check of buffer size before copying into buffer in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables", "poc": ["https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin", "https://github.com/TinyNiko/android_bulletin_notes"]}, {"cve": "CVE-2020-13249", "desc": "libmariadb/mariadb_lib.c in MariaDB Connector/C before 3.1.8 does not properly validate the content of an OK packet received from a server. NOTE: although mariadb_lib.c was originally based on code shipped for MySQL, this issue does not affect any MySQL components supported by Oracle.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-13249"]}, {"cve": "CVE-2020-16610", "desc": "Hoosk Codeigniter CMS before 1.7.2 is affected by a Cross Site Request Forgery (CSRF). When an attacker induces authenticated admin user to a malicious web page, any accounts can be deleted without admin user's intention.", "poc": ["https://github.com/3072L/3072L"]}, {"cve": "CVE-2020-3437", "desc": "A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to read arbitrary files on the underlying filesystem of the device. The vulnerability is due to insufficient file scope limiting. An attacker could exploit this vulnerability by creating a specific file reference on the filesystem and then accessing it through the web-based management interface. A successful exploit could allow the attacker to read arbitrary files from the filesystem of the underlying operating system.", "poc": ["http://packetstormsecurity.com/files/162958/Cisco-SD-WAN-vManage-19.2.2-Remote-Root.html"]}, {"cve": "CVE-2020-29535", "desc": "Archer before 6.8 P4 (6.8.0.4) contains a stored XSS vulnerability. A remote authenticated malicious Archer user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When application users access the corrupted data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application.", "poc": ["https://www.rsa.com/en-us/company/vulnerability-response-policy"]}, {"cve": "CVE-2020-29550", "desc": "An issue was discovered in URVE Build 24.03.2020. The password of an integration user account (used for the connection of the MS Office 365 Integration Service) is stored in cleartext in configuration files as well as in the database. The following files contain the password in cleartext: Profiles/urve/files/sql_db.backup, Server/data/pg_wal/000000010000000A000000DD, Server/data/base/16384/18617, and Server/data/base/17202/8708746. This causes the password to be displayed as cleartext in the HTML code as roomsreservationimport_password in /urve/roomsreservationimport/roomsreservationimport/update-HTML5.", "poc": ["http://packetstormsecurity.com/files/160726/URVE-Software-Build-24.03.2020-Information-Disclosure.html", "http://seclists.org/fulldisclosure/2020/Dec/49", "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-042.txt", "https://github.com/Live-Hack-CVE/CVE-2020-29550"]}, {"cve": "CVE-2020-14100", "desc": "In Xiaomi router R3600 ROM version<1.0.66, filters in the set_WAN6 interface can be bypassed, causing remote code execution. The router administrator can gain root access from this vulnerability.", "poc": ["https://github.com/404notf0und/CVE-Flow", "https://github.com/H4lo/awesome-IoT-security-article"]}, {"cve": "CVE-2020-0019", "desc": "In the Broadcom Nexus firmware, there is an insecure default password. This could lead to local information disclosure in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-171413798", "poc": ["https://github.com/TinyNiko/android_bulletin_notes"]}, {"cve": "CVE-2020-6466", "desc": "Use after free in media in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-6466", "https://github.com/allpaca/chrome-sbx-db"]}, {"cve": "CVE-2020-19625", "desc": "Remote Code Execution Vulnerability in tests/support/stores/test_grid_filter.php in oria gridx 1.3, allows remote attackers to execute arbitrary code, via crafted value to the $query parameter.", "poc": ["https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/Elsfa7-110/kenzer-templates", "https://github.com/StarCrossPortal/scalpel", "https://github.com/anonymous364872/Rapier_Tool", "https://github.com/apif-review/APIF_tool_2024", "https://github.com/d4n-sec/d4n-sec.github.io", "https://github.com/youcans896768/APIV_Tool"]}, {"cve": "CVE-2020-36602", "desc": "There is an out-of-bounds read and write vulnerability in some headset products. An unauthenticated attacker gets the device physically and crafts malformed message with specific parameter and sends the message to the affected products. Due to insufficient validation of message, which may be exploited to cause out-of-bounds read and write.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-36602"]}, {"cve": "CVE-2020-15921", "desc": "Mida eFramework through 2.9.0 has a back door that permits a change of the administrative password and access to restricted functionalities, such as Code Execution.", "poc": ["http://packetstormsecurity.com/files/159239/Mida-eFramework-2.9.0-Backdoor-Access.html", "https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html"]}, {"cve": "CVE-2020-6121", "desc": "SQL injection vulnerabilities exist in the CheckDuplicateStudent.php page of OS4Ed openSIS 7.3. The ln parameter in the page CheckDuplicateStudent.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-1072", "https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-14549", "desc": "Vulnerability in the Primavera Portfolio Management product of Oracle Construction and Engineering (component: Web Server). Supported versions that are affected are 16.1.0.0-16.1.5.1, 18.0.0.0-18.0.2.0 and 19.0.0.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Primavera Portfolio Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Primavera Portfolio Management accessible data as well as unauthorized update, insert or delete access to some of Primavera Portfolio Management accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpujul2020.html"]}, {"cve": "CVE-2020-14882", "desc": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "poc": ["http://packetstormsecurity.com/files/159769/Oracle-WebLogic-Server-Remote-Code-Execution.html", "http://packetstormsecurity.com/files/160143/Oracle-WebLogic-Server-Administration-Console-Handle-Remote-Code-Execution.html", "http://packetstormsecurity.com/files/161128/Oracle-WebLogic-Server-12.2.1.0-Remote-Code-Execution.html", "https://www.oracle.com/security-alerts/cpuoct2020.html", "https://github.com/0day666/Vulnerability-verification", "https://github.com/0thm4n3/cve-2020-14882", "https://github.com/0x783kb/Security-operation-book", "https://github.com/0xMrNiko/Awesome-Red-Teaming", "https://github.com/0xn0ne/weblogicScanner", "https://github.com/1n7erface/PocList", "https://github.com/20142995/pocsuite3", "https://github.com/20142995/sectool", "https://github.com/ARPSyndicate/cvemon", "https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/Ares-X/VulWiki", "https://github.com/Astrogeorgeonethree/Starred", "https://github.com/Atem1988/Starred", "https://github.com/Awrrays/FrameVul", "https://github.com/CLincat/vulcat", "https://github.com/CVEDB/PoC-List", "https://github.com/CVEDB/awesome-cve-repo", "https://github.com/CVEDB/top", "https://github.com/CYJoe-Cyclone/Awesome-CobaltStrike", "https://github.com/DSO-Lab/pocscan", "https://github.com/Danny-LLi/CVE-2020-14882", "https://github.com/EdgeSecurityTeam/Vulnerability", "https://github.com/Elsfa7-110/kenzer-templates", "https://github.com/ExpLangcn/HVVExploitApply_POC", "https://github.com/FDlucifer/firece-fish", "https://github.com/GGyao/CVE-2020-14882_ALL", "https://github.com/GGyao/CVE-2020-14882_POC", "https://github.com/GhostTroops/TOP", "https://github.com/Hatcat123/my_stars", "https://github.com/HimmelAward/Goby_POC", "https://github.com/JERRY123S/all-poc", "https://github.com/Jean-Francois-C/Windows-Penetration-Testing", "https://github.com/KatherineHuangg/metasploit-POC", "https://github.com/KimJun1010/WeblogicTool", "https://github.com/LucasPDiniz/CVE-2020-14882", "https://github.com/LucasPDiniz/StudyRoom", "https://github.com/MacAsure/WL_Scan_GO", "https://github.com/Manor99/CVE-2020-14882-", "https://github.com/MicahFleming/Risk-Assessment-Cap-Stone-", "https://github.com/Mr-xn/Penetration_Testing_POC", "https://github.com/N0Coriander/CVE-2020-14882-14883", "https://github.com/NS-Sp4ce/CVE-2020-14882", "https://github.com/NetW0rK1le3r/awesome-hacking-lists", "https://github.com/Ormicron/CVE-2020-14882-GUI-Test", "https://github.com/Ostorlab/KEV", "https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors", "https://github.com/QmF0c3UK/CVE-2020-14882", "https://github.com/Serendipity-Lucky/CVE-2020-14882_ALL", "https://github.com/SexyBeast233/SecBooks", "https://github.com/Singhsanjeev617/A-Red-Teamer-diaries", "https://github.com/SouthWind0/southwind0.github.io", "https://github.com/Threekiii/Awesome-Exploit", "https://github.com/Threekiii/Awesome-POC", "https://github.com/Threekiii/Vulhub-Reproduce", "https://github.com/Umarovm/-Patched-McMaster-University-Blind-Command-Injection", "https://github.com/Weik1/Artillery", "https://github.com/XTeam-Wing/CVE-2020-14882", "https://github.com/Yang0615777/PocList", "https://github.com/Z0fhack/Goby_POC", "https://github.com/Zero094/Vulnerability-verification", "https://github.com/adm1in/CodeTest", "https://github.com/aiici/weblogicAllinone", "https://github.com/alexfrancow/CVE-2020-14882", "https://github.com/alphaSeclab/sec-daily-2020", "https://github.com/amcai/myscan", "https://github.com/apachecn-archive/Middleware-Vulnerability-detection", "https://github.com/awake1t/Awesome-hacking-tools", "https://github.com/aymankhder/Windows-Penetration-Testing", "https://github.com/bakery312/Vulhub-Reproduce", "https://github.com/bhassani/Recent-CVE", "https://github.com/bhdresh/SnortRules", "https://github.com/bigblackhat/oFx", "https://github.com/blackend/Diario-RedTem", "https://github.com/bonjourmalware/melody", "https://github.com/c04tl/WebLogic-Handle-RCE-Scanner", "https://github.com/co-devs/cve-otx-lookup", "https://github.com/corelight/CVE-2020-14882-weblogicRCE", "https://github.com/cri1wa/MemShell", "https://github.com/cvebase/cvebase-wiki", "https://github.com/cyberanand1337x/bug-bounty-2022", "https://github.com/d4n-sec/d4n-sec.github.io", "https://github.com/daehee/nvd", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/djytmdj/Tool_Summary", "https://github.com/exploitblizzard/CVE-2020-14882-WebLogic", "https://github.com/fei9747/Awesome-CobaltStrike", "https://github.com/ferreirasc/redteam-arsenal", "https://github.com/forhub2021/weblogicScanner", "https://github.com/hanc00l/some_pocsuite", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/hktalent/TOP", "https://github.com/hktalent/bug-bounty", "https://github.com/huike007/penetration_poc", "https://github.com/iceberg-N/WL_Scan_GO", "https://github.com/ihebski/A-Red-Teamer-diaries", "https://github.com/jas502n/CVE-2020-14882", "https://github.com/jbmihoub/all-poc", "https://github.com/jcabrale/Melody", "https://github.com/jeansgit/Pentest", "https://github.com/john-automates/Bsides_2023_Resources", "https://github.com/kalikaneko/unvd", "https://github.com/kk98kk0/CVE-2020-14882", "https://github.com/koala2099/GitHub-Chinese-Top-Charts", "https://github.com/koutto/jok3r-pocs", "https://github.com/langu-xyz/JavaVulnMap", "https://github.com/leoambrus/CheckersNomisec", "https://github.com/lions2012/Penetration_Testing_POC", "https://github.com/lolminerxmrig/CVE-2020-14882_ALL", "https://github.com/lolminerxmrig/Capricornus", "https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection", "https://github.com/ludy-dev/Weblogic_Unauthorized-bypass-RCE", "https://github.com/merlinepedra/nuclei-templates", "https://github.com/merlinepedra25/nuclei-templates", "https://github.com/milo2012/CVE-2020-14882", "https://github.com/mmioimm/cve-2020-14882", "https://github.com/murataydemir/CVE-2020-14882", "https://github.com/murataydemir/CVE-2020-14883", "https://github.com/neilzhang1/Chinese-Charts", "https://github.com/netveil/Awesome-List", "https://github.com/nice0e3/CVE-2020-14882_Exploit_Gui", "https://github.com/nik0nz7/CVE-2020-14882", "https://github.com/niudaii/go-crack", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/openx-org/BLEN", "https://github.com/ovProphet/CVE-2020-14882-checker", "https://github.com/pen4uin/awesome-vulnerability-research", "https://github.com/pen4uin/vulnerability-research", "https://github.com/pen4uin/vulnerability-research-list", "https://github.com/pit-lock/hacking", "https://github.com/pprietosanchez/CVE-2020-14750", "https://github.com/puckiestyle/A-Red-Teamer-diaries", "https://github.com/pwn3z/CVE-2020-14882-WebLogic", "https://github.com/qeeqbox/falcon", "https://github.com/qi4L/WeblogicScan.go", "https://github.com/qianniaoge/CVE-2020-14882_Exploit_Gui", "https://github.com/qingyuanfeiniao/Chinese-Top-Charts", "https://github.com/r0eXpeR/redteam_vul", "https://github.com/readloud/Awesome-Stars", "https://github.com/reph0r/poc-exp", "https://github.com/reph0r/poc-exp-tools", "https://github.com/s1kr10s/CVE-2020-14882", "https://github.com/sobinge/nuclei-templates", "https://github.com/soosmile/POC", "https://github.com/sp4zcmd/WeblogicExploit-GUI", "https://github.com/superfish9/pt", "https://github.com/trganda/starrlist", "https://github.com/tufanturhan/Red-Teamer-Diaries", "https://github.com/tzwlhack/Vulnerability", "https://github.com/veo/vscan", "https://github.com/weeka10/-hktalent-TOP", "https://github.com/whoadmin/pocs", "https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-", "https://github.com/wr0x00/Lizard", "https://github.com/wr0x00/Lsploit", "https://github.com/wsfengfan/cve-2020-14882", "https://github.com/wuzuowei/nice-scripts", "https://github.com/xMr110/CVE-2020-14882", "https://github.com/xfiftyone/CVE-2020-14882", "https://github.com/xiaoyaovo/2021SecWinterTask", "https://github.com/xinyisleep/pocscan", "https://github.com/xuetusummer/Penetration_Testing_POC", "https://github.com/yaklang/vulinone", "https://github.com/yichensec/Bug_writer", "https://github.com/yyzsec/2021SecWinterTask", "https://github.com/zer0yu/Awesome-CobaltStrike", "https://github.com/zhzyker/exphub", "https://github.com/zhzyker/vulmap", "https://github.com/zoroqi/my-awesome"]}, {"cve": "CVE-2020-8956", "desc": "Pulse Secure Desktop Client 9.0Rx before 9.0R5 and 9.1Rx before 9.1R4 on Windows reveals users' passwords if Save Settings is enabled.", "poc": ["https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601", "https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-2836", "desc": "Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpuapr2020.html"]}, {"cve": "CVE-2020-36521", "desc": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in iCloud for Windows 11.4, iOS 14.0 and iPadOS 14.0, watchOS 7.0, tvOS 14.0, iCloud for Windows 7.21, iTunes for Windows 12.10.9. Processing a maliciously crafted tiff file may lead to a denial-of-service or potentially disclose memory contents.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-36521"]}, {"cve": "CVE-2020-14667", "desc": "Vulnerability in the Oracle CRM Technical Foundation product of Oracle E-Business Suite (component: Preferences). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle CRM Technical Foundation, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle CRM Technical Foundation accessible data as well as unauthorized update, insert or delete access to some of Oracle CRM Technical Foundation accessible data. CVSS 3.1 Base Score 7.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpujul2020.html"]}, {"cve": "CVE-2020-25926", "desc": "The DNS client in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Insufficient entropy in the DNS transaction id. The impact is: DNS cache poisoning (remote). The component is: dns_query_type(). The attack vector is: a specific DNS response packet.", "poc": ["https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/", "https://www.kb.cert.org/vuls/id/608209"]}, {"cve": "CVE-2020-9388", "desc": "CSRF protection was not present in SquaredUp before version 4.6.0. A CSRF attack could have been possible by an administrator executing arbitrary code in a HTML dashboard tile via a crafted HTML page, or by uploading a malicious SVG payload into a dashboard.", "poc": ["https://support.squaredup.com/hc/en-us/articles/360017568238", "https://support.squaredup.com/hc/en-us/articles/360019427218-CVE-2020-9388-API-Endpoints-are-not-protected-against-CSRF"]}, {"cve": "CVE-2020-36120", "desc": "Buffer Overflow in the \"sixel_encoder_encode_bytes\" function of Libsixel v1.8.6 allows attackers to cause a Denial of Service (DoS).", "poc": ["https://github.com/saitoha/libsixel/issues/143"]}, {"cve": "CVE-2020-2199", "desc": "Jenkins Subversion Partial Release Manager Plugin 1.0.1 and earlier does not escape the error message for the repository URL field form validation, resulting in a reflected cross-site scripting vulnerability.", "poc": ["https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/Elsfa7-110/kenzer-templates", "https://github.com/d4n-sec/d4n-sec.github.io"]}, {"cve": "CVE-2020-12880", "desc": "An issue was discovered in Pulse Policy Secure (PPS) and Pulse Connect Secure (PCS) Virtual Appliance before 9.1R8. By manipulating a certain kernel boot parameter, it can be tricked into dropping into a root shell in a pre-install phase where the entire source code of the appliance is available and can be retrieved. (The source code is otherwise inaccessible because the appliance has its hard disks encrypted, and no root shell is available during normal operation.)", "poc": ["https://kb.pulsesecure.net/?atype=sa", "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516"]}, {"cve": "CVE-2020-14561", "desc": "Vulnerability in the Oracle Hospitality Reporting and Analytics product of Oracle Food and Beverage Applications (component: Installation). The supported version that is affected is 9.1.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Hospitality Reporting and Analytics executes to compromise Oracle Hospitality Reporting and Analytics. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Hospitality Reporting and Analytics. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).", "poc": ["https://www.oracle.com/security-alerts/cpujul2020.html"]}, {"cve": "CVE-2020-15275", "desc": "MoinMoin is a wiki engine. In MoinMoin before version 1.9.11, an attacker with write permissions can upload an SVG file that contains malicious javascript. This javascript will be executed in a user's browser when the user is viewing that SVG file on the wiki. Users are strongly advised to upgrade to a patched version. MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-15275", "https://github.com/dricottone/docker-moin"]}, {"cve": "CVE-2020-35628", "desc": "A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sloop() slh->incident_sface. An attacker can provide malicious input to trigger this vulnerability.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225", "https://github.com/Live-Hack-CVE/CVE-2020-35628"]}, {"cve": "CVE-2020-11981", "desc": "An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attacker can connect to the broker (Redis, RabbitMQ) directly, it is possible to inject commands, resulting in the celery worker running arbitrary commands.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/Threekiii/Awesome-Exploit", "https://github.com/Threekiii/Awesome-POC", "https://github.com/Threekiii/Vulhub-Reproduce", "https://github.com/bakery312/Vulhub-Reproduce", "https://github.com/navyaks55/Vulnerability_Exploitation", "https://github.com/t0m4too/t0m4to"]}, {"cve": "CVE-2020-6129", "desc": "SQL injection vulnerabilities exist in the course_period_id parameters used in OS4Ed openSIS 7.3 pages. The course_period_id parameter in the page CpSessionSet.php is vulnerable to SQL injection.An attacker can make an authenticated HTTP request to trigger these vulnerabilities.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-1076", "https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-4463", "desc": "IBM Maximo Asset Management 7.6.0.1 and 7.6.0.2 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 181484.", "poc": ["https://github.com/0xT11/CVE-POC", "https://github.com/ARPSyndicate/cvemon", "https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/EdgeSecurityTeam/Vulnerability", "https://github.com/Elsfa7-110/kenzer-templates", "https://github.com/Ibonok/CVE-2020-4463", "https://github.com/SexyBeast233/SecBooks", "https://github.com/d4n-sec/d4n-sec.github.io", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/merlinepedra/nuclei-templates", "https://github.com/merlinepedra25/nuclei-templates", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/sobinge/nuclei-templates", "https://github.com/soosmile/POC", "https://github.com/tzwlhack/Vulnerability"]}, {"cve": "CVE-2020-13593", "desc": "The Bluetooth Low Energy Secure Manager Protocol (SMP) implementation in Texas Instruments SimpleLink SIMPLELINK-CC2640R2-SDK through 2.2.3 allows the Diffie-Hellman check during the Secure Connection pairing to be skipped if the Link Layer encryption setup is performed earlier. An attacker in radio range can achieve arbitrary read/write access to protected GATT service data, cause a denial of service, or possibly control a device's function by establishing an encrypted session with an unauthenticated Long Term Key (LTK).", "poc": ["https://github.com/JeffroMF/awesome-bluetooth-security321", "https://github.com/Matheus-Garbelini/sweyntooth_bluetooth_low_energy_attacks", "https://github.com/engn33r/awesome-bluetooth-security"]}, {"cve": "CVE-2020-2592", "desc": "Vulnerability in the Oracle AutoVue product of Oracle Supply Chain (component: Security). The supported version that is affected is 21.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle AutoVue. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle AutoVue accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpujan2020.html", "https://github.com/Live-Hack-CVE/CVE-2020-2592"]}, {"cve": "CVE-2020-20349", "desc": "WTCMS 1.0 contains a stored cross-site scripting (XSS) vulnerability in the link address field under the background links module.", "poc": ["https://github.com/taosir/wtcms/issues/11"]}, {"cve": "CVE-2020-24755", "desc": "In Ubiquiti UniFi Video v3.10.13, when the executable starts, its first library validation is in the current directory. This allows the impersonation and modification of the library to execute code on the system. This was tested in (Windows 7 x64/Windows 10 x64).", "poc": ["https://www.youtube.com/watch?v=T41h4yeh9dk"]}, {"cve": "CVE-2020-14938", "desc": "An issue was discovered in map.c in FreedroidRPG 1.0rc2. It assumes lengths of data sets read from saved game files. It copies data from a file into a fixed-size heap-allocated buffer without size verification, leading to a heap-based buffer overflow.", "poc": ["https://bugs.freedroid.org/b/issue951"]}, {"cve": "CVE-2020-14629", "desc": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpujul2020.html"]}, {"cve": "CVE-2020-3111", "desc": "A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to the targeted IP phone. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).", "poc": ["http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html", "https://github.com/epi052/CiscoNotes"]}, {"cve": "CVE-2020-13500", "desc": "SQL injection vulnerability exists in the CHaD.asmx web service functionality of eDNA Enterprise Data Historian 3.0.1.2/7.5.4989.33053. Specially crafted SOAP web requests can cause SQL injections resulting in data compromise. Parameter ClassName in CHaD.asmx is vulnerable to unauthenticated SQL injection attacks.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-1106"]}, {"cve": "CVE-2020-26159", "desc": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Further investigation showed that it was not a security issue. Notes: none.", "poc": ["https://github.com/101pippi/oniguruma", "https://github.com/ARPSyndicate/cvemon", "https://github.com/DoctorZht/oniguruma", "https://github.com/balabit-deps/balabit-os-9-libonig", "https://github.com/deepin-community/libonig", "https://github.com/kkos/oniguruma", "https://github.com/pippi101/oniguruma", "https://github.com/vin01/bogus-cves", "https://github.com/winlibs/oniguruma", "https://github.com/zhagnyongfdsfsdfsdfsdf/oniguruma"]}, {"cve": "CVE-2020-2567", "desc": "Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Security). The supported version that is affected is 18.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Retail Customer Management and Segmentation Foundation. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Retail Customer Management and Segmentation Foundation, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Retail Customer Management and Segmentation Foundation accessible data as well as unauthorized read access to a subset of Oracle Retail Customer Management and Segmentation Foundation accessible data. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpujan2020.html"]}, {"cve": "CVE-2020-29624", "desc": "A memory corruption issue existed in the processing of font files. This issue was addressed with improved input validation. This issue is fixed in watchOS 7.2, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. Processing a maliciously crafted font file may lead to arbitrary code execution.", "poc": ["https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-14736", "desc": "Vulnerability in the Database Vault component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2 and 12.2.0.1. Easily exploitable vulnerability allows high privileged attacker having Create Public Synonym privilege with network access via Oracle Net to compromise Database Vault. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Database Vault accessible data as well as unauthorized read access to a subset of Database Vault accessible data. CVSS 3.1 Base Score 3.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpuoct2020.html"]}, {"cve": "CVE-2020-25686", "desc": "A flaw was found in dnsmasq before version 2.83. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/AZ-X/pique", "https://github.com/CVEDB/PoC-List", "https://github.com/CVEDB/awesome-cve-repo", "https://github.com/CVEDB/top", "https://github.com/DNTYO/F5_Vulnerability", "https://github.com/EdgeSecurityTeam/Vulnerability", "https://github.com/GhostTroops/TOP", "https://github.com/JERRY123S/all-poc", "https://github.com/SexyBeast233/SecBooks", "https://github.com/criminalip/CIP-NSE-Script", "https://github.com/cyberanand1337x/bug-bounty-2022", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/hktalent/TOP", "https://github.com/jbmihoub/all-poc", "https://github.com/kaosagnt/ansible-everyday", "https://github.com/klcheung99/CSCM28CW2", "https://github.com/knqyf263/dnspooq", "https://github.com/mboukhalfa/multironic", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/tzwlhack/Vulnerability", "https://github.com/weeka10/-hktalent-TOP"]}, {"cve": "CVE-2020-3652", "desc": "Possible buffer over-read issue in windows x86 wlan driver function while processing beacon or request frame due to lack of check of length of variable received. in Snapdragon Compute, Snapdragon Connectivity in MSM8998, QCA6390, SC7180, SC8180X, SDM850", "poc": ["https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin"]}, {"cve": "CVE-2020-7042", "desc": "An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because the hostname check operates on uninitialized memory. The outcome is that a valid certificate is never accepted (only a malformed certificate may be accepted).", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/chnzzh/OpenSSL-CVE-lib", "https://github.com/pilvikala/snyk-c-test-api"]}, {"cve": "CVE-2020-0283", "desc": "There is a possible out of bounds write due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-163008257", "poc": ["https://github.com/TinyNiko/android_bulletin_notes"]}, {"cve": "CVE-2020-4041", "desc": "In Bolt CMS before version 3.7.1, the filename of uploaded files was vulnerable to stored XSS. It is not possible to inject javascript code in the file name when creating/uploading the file. But, once created/uploaded, it can be renamed to inject the payload in it. Additionally, the measures to prevent renaming the file to disallowed filename extensions could be circumvented. This is fixed in Bolt 3.7.1.", "poc": ["http://packetstormsecurity.com/files/158299/Bolt-CMS-3.7.0-XSS-CSRF-Shell-Upload.html", "https://github.com/Live-Hack-CVE/CVE-2020-4041"]}, {"cve": "CVE-2020-5770", "desc": "Cross-site request forgery in Teltonika firmware TRB2_R_00.02.04.01 allows a remote attacker to perform sensitive application actions by tricking legitimate users into clicking a crafted link.", "poc": ["https://www.tenable.com/security/research/tra-2020-48"]}, {"cve": "CVE-2020-11138", "desc": "Uninitialized pointers accessed during music play back with incorrect bit stream due to an uninitialized heap memory result in instability in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking", "poc": ["https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin", "https://github.com/TinyNiko/android_bulletin_notes"]}, {"cve": "CVE-2020-5736", "desc": "Amcrest cameras and NVR are vulnerable to a null pointer dereference over port 37777. An authenticated remote attacker can abuse this issue to crash the device.", "poc": ["https://www.tenable.com/security/research/tra-2020-20"]}, {"cve": "CVE-2020-27838", "desc": "A flaw was found in keycloak in versions prior to 13.0.0. The client registration endpoint allows fetching information about PUBLIC clients (like client secret) without authentication which could be an issue if the same PUBLIC client changed to CONFIDENTIAL later. The highest threat from this vulnerability is to data confidentiality.", "poc": ["https://github.com/Cappricio-Securities/CVE-2020-27838", "https://github.com/j4k0m/godkiller", "https://github.com/muneebaashiq/MBProjects"]}, {"cve": "CVE-2020-2703", "desc": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.36 and prior to 6.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).", "poc": ["https://www.oracle.com/security-alerts/cpujan2020.html"]}, {"cve": "CVE-2020-11683", "desc": "A timing side channel was discovered in AT91bootstrap before 3.9.2. It can be exploited by attackers with physical access to forge CMAC values and subsequently boot arbitrary code on an affected system.", "poc": ["https://github.com/f-secure-foundry/advisories"]}, {"cve": "CVE-2020-10776", "desc": "A flaw was found in Keycloak before version 12.0.0, where it is possible to add unsafe schemes for the redirect_uri parameter. This flaw allows an attacker to perform a Cross-site scripting attack.", "poc": ["https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-25444", "desc": "Cross Site Scripting (XSS) vulnerability in Booking Core - Ultimate Booking System Booking Core 1.7.0 via the (1) \"About Yourself\u201d section under the \u201cMy Profile\u201d page, \" (2) \u201cHotel Policy\u201d field under the \u201cHotel Details\u201d page, (3) \u201cPricing code\u201d and \u201cname\u201d fields under the \u201cManage Tour\u201d page, and (4) all the labels under the \u201cMenu\u201d section.", "poc": ["https://medium.com/@singh.satyam158/vulnerabilities-in-booking-core-1-7-d85d1dfae44e"]}, {"cve": "CVE-2020-11761", "desc": "An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds read during Huffman uncompression, as demonstrated by FastHufDecoder::refill in ImfFastHuf.cpp.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-11761"]}, {"cve": "CVE-2020-25011", "desc": "A sensitive information disclosure vulnerability in Kyland KPS2204 6 Port Managed Din-Rail Programmable Serial Device Servers Software Version:R0002.P05 allows remote attackers to get username and password by request /cgi-bin/webadminget.cgi script via the browser.", "poc": ["https://github.com/AnfieldQi/CVE_list/blob/master/CVE-2020-25011.md"]}, {"cve": "CVE-2020-26117", "desc": "In rfb/CSecurityTLS.cxx and rfb/CSecurityTLS.java in TigerVNC before 1.11.0, viewers mishandle TLS certificate exceptions. They store the certificates as authorities, meaning that the owner of a certificate could impersonate any server after a client had added an exception.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/Live-Hack-CVE/CVE-2020-26117"]}, {"cve": "CVE-2020-8102", "desc": "Improper Input Validation vulnerability in the Safepay browser component of Bitdefender Total Security 2020 allows an external, specially crafted web page to run remote commands inside the Safepay Utility process. This issue affects Bitdefender Total Security 2020 versions prior to 24.0.20.116.", "poc": ["https://github.com/alphaSeclab/sec-daily-2020"]}, {"cve": "CVE-2020-18382", "desc": "Heap-buffer-overflow in /src/wasm/wasm-binary.cpp in wasm::WasmBinaryBuilder::visitBlock(wasm::Block*) in Binaryen 1.38.26. A crafted wasm input can cause a segmentation fault, leading to denial-of-service, as demonstrated by wasm-opt.", "poc": ["https://github.com/WebAssembly/binaryen/issues/1900"]}, {"cve": "CVE-2020-11819", "desc": "In Rukovoditel 2.5.2, an attacker may inject an arbitrary .php file location instead of a language file and thus achieve command execution.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/danyx07/PoC-RCE-Rukovoditel", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/soosmile/POC"]}, {"cve": "CVE-2020-25193", "desc": "By having access to the hard-coded cryptographic key for GE Reason RT430, RT431 & RT434 GNSS clocks in firmware versions prior to version 08A06, attackers would be able to intercept and decrypt encrypted traffic through an HTTPS connection.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-25193"]}, {"cve": "CVE-2020-20335", "desc": "Buffer Overflow vulnerability in Antirez Kilo before commit 7709a04ae8520c5b04d261616098cebf742f5a23 allows a remote attacker to cause a denial of service via the editorUpdateRow function in kilo.c.", "poc": ["https://github.com/antirez/kilo/issues/60"]}, {"cve": "CVE-2020-9045", "desc": "During installation or upgrade to Software House C\u2022CURE 9000 v2.70 and American Dynamics victor Video Management System v5.2, the credentials of the user used to perform the installation or upgrade are logged in a file. The install log file persists after the installation.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-9045"]}, {"cve": "CVE-2020-11773", "desc": "Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56, R7500v2 before 1.0.3.46, R7800 before 1.0.2.68, R8900 before 1.0.4.28, R9000 before 1.0.4.28, RAX120 before 1.0.0.78, XR500 before 2.3.2.56, and XR700 before 1.0.1.10.", "poc": ["https://kb.netgear.com/000061757/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0521"]}, {"cve": "CVE-2020-7725", "desc": "All versions of package worksmith are vulnerable to Prototype Pollution via the setValue function.", "poc": ["https://snyk.io/vuln/SNYK-JS-WORKSMITH-598798", "https://github.com/404notf0und/CVE-Flow", "https://github.com/Live-Hack-CVE/CVE-2020-7725"]}, {"cve": "CVE-2020-7270", "desc": "Exposure of Sensitive Information in the web interface in McAfee Advanced Threat Defense (ATD) prior to 4.12.2 allows remote authenticated users to view sensitive unencrypted information via a carefully crafted HTTP request parameter. The risk is partially mitigated if your ATD instances are deployed as recommended with no direct access from the Internet to them.", "poc": ["https://kc.mcafee.com/corporate/index?page=content&id=SB10336"]}, {"cve": "CVE-2020-13517", "desc": "An information disclosure vulnerability exists in the WinRing0x64 Driver IRP 0x9c406104 functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause the disclosure of sensitive information. An attacker can send a malicious IRP to trigger this vulnerability.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-1114", "https://github.com/Live-Hack-CVE/CVE-2020-13517"]}, {"cve": "CVE-2020-10124", "desc": "NCR SelfServ ATMs running APTRA XFS 05.01.00 do not encrypt, authenticate, or verify the integrity of messages between the BNA and the host computer, which could allow an attacker with physical access to the internal components of the ATM to execute arbitrary code, including code that enables the attacker to commit deposit forgery.", "poc": ["https://github.com/d4n-sec/d4n-sec.github.io"]}, {"cve": "CVE-2020-14572", "desc": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpujul2020.html"]}, {"cve": "CVE-2020-3657", "desc": "u'Remote code execution can happen by sending a carefully crafted POST query when Device configuration is accessed from a tethered client through webserver due to lack of array bound check.' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, IPQ4019, IPQ6018, IPQ8064, IPQ8074, MDM9150, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909W, MSM8953, MSM8996AU, QCA6574AU, QCS405, QCS610, QRB5165, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM630, SDM632, SDM636, SDM660, SDM845, SDX20, SDX24, SDX55, SM8250", "poc": ["https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin", "https://github.com/TinyNiko/android_bulletin_notes"]}, {"cve": "CVE-2020-6148", "desc": "A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. An instance exists in USDC file format FIELDSETS section decompression heap overflow.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094"]}, {"cve": "CVE-2020-24074", "desc": "The decode program in silk-v3-decoder Version:20160922 Build By kn007 does not strictly check data, resulting in a buffer overflow.", "poc": ["https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-22819", "desc": "MKCMS V6.2 has SQL injection via the /ucenter/active.php verify parameter.", "poc": ["https://unc1e.blogspot.com/2020/04/mkcms-v62-has-mutilple-vulnerabilities.html", "https://github.com/Live-Hack-CVE/CVE-2020-22819"]}, {"cve": "CVE-2020-26837", "desc": "SAP Solution Manager 7.2 (User Experience Monitoring), version - 7.2, allows an authenticated user to upload a malicious script that can exploit an existing path traversal vulnerability to compromise confidentiality exposing elements of the file system, partially compromise integrity allowing the modification of some configurations and partially compromise availability by making certain services unavailable.", "poc": ["http://packetstormsecurity.com/files/163160/SAP-Solution-Manager-7.2-File-Disclosure-Denial-Of-Service.html", "https://github.com/Onapsis/vulnerability_advisories", "https://github.com/lmkalg/my_cves"]}, {"cve": "CVE-2020-7378", "desc": "CRIXP OpenCRX version 4.30 and 5.0-20200717 and prior suffers from an unverified password change vulnerability. An attacker who is able to connect to the affected OpenCRX instance can change the password of any user, including admin-Standard, to any chosen value. This issue was resolved in version 5.0-20200904, released September 4, 2020.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/ruthvikvegunta/openCRX-CVE-2020-7378", "https://github.com/shreyaschavhan/oswe-awae-pre-preperation-plan-and-notes", "https://github.com/soosmile/POC"]}, {"cve": "CVE-2020-26818", "desc": "SAP NetWeaver AS ABAP (Web Dynpro), versions - 731, 740, 750, 751, 752, 753, 754, 755, 782, allows an authenticated user to access Web Dynpro components, which reveals sensitive system information that would otherwise be restricted to highly privileged users because of missing authorization, resulting in Information Disclosure.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-26818"]}, {"cve": "CVE-2020-6097", "desc": "An exploitable denial of service vulnerability exists in the atftpd daemon functionality of atftp 0.7.git20120829-3.1+b1. A specially crafted sequence of RRQ-Multicast requests trigger an assert() call resulting in denial-of-service. An attacker can send a sequence of malicious packets to trigger this vulnerability.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-1029", "https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-2840", "desc": "Vulnerability in the Oracle E-Business Intelligence product of Oracle E-Business Suite (component: DBI Setups). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle E-Business Intelligence. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle E-Business Intelligence, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle E-Business Intelligence accessible data as well as unauthorized update, insert or delete access to some of Oracle E-Business Intelligence accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpuapr2020.html"]}, {"cve": "CVE-2020-2859", "desc": "Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: nVision). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of PeopleSoft Enterprise PeopleTools. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "poc": ["https://www.oracle.com/security-alerts/cpuapr2020.html"]}, {"cve": "CVE-2020-27665", "desc": "In Strapi before 3.2.5, there is no admin::hasPermissions restriction for CTB (aka content-type-builder) routes.", "poc": ["https://github.com/strapi/strapi/pull/8439", "https://github.com/strapi/strapi/releases/tag/v3.2.5"]}, {"cve": "CVE-2020-1729", "desc": "A flaw was found in SmallRye's API through version 1.6.1. The API can allow other code running within the application server to potentially obtain the ClassLoader, bypassing any permissions checks that should have been applied. The largest threat from this vulnerability is a threat to data confidentiality. This is fixed in SmallRye 1.6.2", "poc": ["https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-10422", "desc": "The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/manage-drafts.php by adding a question mark (?) followed by the payload.", "poc": ["https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456", "https://github.com/Live-Hack-CVE/CVE-2020-10422"]}, {"cve": "CVE-2020-3294", "desc": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.", "poc": ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz"]}, {"cve": "CVE-2020-26052", "desc": "Online Marriage Registration System 1.0 is affected by stored cross-site scripting (XSS) vulnerabilities in multiple parameters.", "poc": ["https://www.exploit-db.com/exploits/48522"]}, {"cve": "CVE-2020-6843", "desc": "Zoho ManageEngine ServiceDesk Plus 11.0 Build 11007 allows XSS. This issue was fixed in version 11.0 Build 11010, SD-83959.", "poc": ["http://packetstormsecurity.com/files/156050/ZOHO-ManageEngine-ServiceDeskPlus-11.0-Build-11007-Cross-Site-Scripting.html", "http://seclists.org/fulldisclosure/2020/Jan/32", "https://seclists.org/bugtraq/2020/Jan/34"]}, {"cve": "CVE-2020-9015", "desc": "** DISPUTED ** Arista DCS-7050QX-32S-R 4.20.9M, DCS-7050CX3-32S-R 4.20.11M, and DCS-7280SRAM-48C6-R 4.22.0.1F devices (and possibly other products) allow attackers to bypass intended TACACS+ shell restrictions via a | character. NOTE: the vendor reports that this is a configuration issue relating to an overly permissive regular expression in the TACACS+ server permitted commands.", "poc": ["http://packetstormsecurity.com/files/158119/Arista-Restricted-Shell-Escape-Privilege-Escalation.html", "https://securitybytes.me", "https://securitybytes.me/posts/cve-2020-9015/", "https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-1020", "desc": "A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Adobe Font Manager Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0938.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/CrackerCat/CVE-2020-1020-Exploit", "https://github.com/ExpLangcn/FuYao-Go", "https://github.com/KaLendsi/CVE-2020-1020", "https://github.com/Ostorlab/KEV", "https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/soosmile/POC", "https://github.com/xaitax/cisa-catalog-known-vulnerabilities"]}, {"cve": "CVE-2020-14945", "desc": "A privilege escalation vulnerability exists within Global RADAR BSA Radar 1.6.7234.24750 and earlier that allows an authenticated, low-privileged user to escalate their privileges to administrator rights (i.e., the BankAdmin role) via modified SaveUser data.", "poc": ["https://github.com/wsummerhill/BSA-Radar_CVE-Vulnerabilities/blob/master/CVE-2020-14945%20-%20Privilege%20Escalation.md", "https://www.exploit-db.com/exploits/48649", "https://github.com/ARPSyndicate/cvemon", "https://github.com/wsummerhill/BSA-Radar_CVE-Vulnerabilities"]}, {"cve": "CVE-2020-25073", "desc": "FreedomBox through 20.13 allows remote attackers to obtain sensitive information from the /server-status page of the Apache HTTP Server, because a connection from the Tor onion service (or from PageKite) is considered a local connection. This affects both the freedombox and plinth packages of some Linux distributions, but only if the Apache mod_status module is enabled.", "poc": ["https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-9726", "desc": "Adobe FrameMaker version 2019.0.6 (and earlier versions) has an out-of-bounds read vulnerability that could be exploited to read past the end of an allocated buffer, possibly resulting in a crash or disclosure of sensitive information from other memory locations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious FrameMaker file.", "poc": ["https://github.com/404notf0und/CVE-Flow", "https://github.com/Cheroxx/Patch-Tuesday-Updates"]}, {"cve": "CVE-2020-13380", "desc": "openSIS before 7.4 allows SQL Injection.", "poc": ["https://packetstormsecurity.com/files/158257/openSIS-7.4-SQL-Injection.html"]}, {"cve": "CVE-2020-21125", "desc": "An arbitrary file creation vulnerability in UReport 2.2.9 allows attackers to execute arbitrary code.", "poc": ["https://github.com/p1ay8y3ar/cve_monitor"]}, {"cve": "CVE-2020-35553", "desc": "An issue was discovered on Samsung mobile devices with Q(10.0) and R(11.0) (Qualcomm SM8250 chipsets) software. They allows attackers to cause a denial of service (unlock failure) by triggering a power-shortage incident that causes a false-positive attack detection. The Samsung ID is SVE-2020-19678 (December 2020).", "poc": ["https://security.samsungmobile.com/securityUpdate.smsb"]}, {"cve": "CVE-2020-8679", "desc": "Out-of-bounds write in Kernel Mode Driver for some Intel(R) Graphics Drivers before version 26.20.100.7755 may allow an authenticated user to potentially enable denial of service via local access.", "poc": ["https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html"]}, {"cve": "CVE-2020-2813", "desc": "Vulnerability in the Oracle Email Center product of Oracle E-Business Suite (component: KB Search). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Email Center. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Email Center, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Email Center accessible data as well as unauthorized update, insert or delete access to some of Oracle Email Center accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpuapr2020.html"]}, {"cve": "CVE-2020-23595", "desc": "Cross Site Request Forgery (CSRF) vulnerability in yzmcms version 5.6, allows remote attackers to escalate privileges and gain sensitive information sitemodel/add.html endpoint.", "poc": ["https://github.com/yzmcms/yzmcms/issues/47"]}, {"cve": "CVE-2020-8838", "desc": "An issue was discovered in Zoho ManageEngine AssetExplorer 6.5. During an upgrade of the Windows agent, it does not validate the source and binary downloaded. This allows an attacker on an adjacent network to execute code with NT AUTHORITY/SYSTEM privileges on the agent machines by providing an arbitrary executable via a man-in-the-middle attack.", "poc": ["http://packetstormsecurity.com/files/157612/ManageEngine-Asset-Explorer-Windows-Agent-Remote-Code-Execution.html", "http://seclists.org/fulldisclosure/2020/May/29", "https://github.com/Live-Hack-CVE/CVE-2020-8838"]}, {"cve": "CVE-2020-10826", "desc": "/cgi-bin/activate.cgi on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve command injection via a remote HTTP request in DEBUG mode.", "poc": ["https://slashd.ga/2020/03/draytek-vulnerabilities/"]}, {"cve": "CVE-2020-9952", "desc": "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21. Processing maliciously crafted web content may lead to a cross site scripting attack.", "poc": ["http://seclists.org/fulldisclosure/2020/Nov/18", "http://seclists.org/fulldisclosure/2020/Nov/19"]}, {"cve": "CVE-2020-26895", "desc": "Prior to 0.10.0-beta, LND (Lightning Network Daemon) would have accepted a counterparty high-S signature and broadcast tx-relay invalid local commitment/HTLC transactions. This can be exploited by any peer with an open channel regardless of the victim situation (e.g., routing node, payment-receiver, or payment-sender). The impact is a loss of funds in certain situations.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/uvhw/conchimgiangnang"]}, {"cve": "CVE-2020-25044", "desc": "Kaspersky Virus Removal Tool (KVRT) prior to 15.0.23.0 was vulnerable to arbitrary file corruption that could provide an attacker with the opportunity to eliminate content of any file in the system.", "poc": ["https://support.kaspersky.com/general/vulnerability.aspx?el=12430#290720", "https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-1753", "desc": "A security flaw was found in Ansible Engine, all Ansible 2.7.x versions prior to 2.7.17, all Ansible 2.8.x versions prior to 2.8.11 and all Ansible 2.9.x versions prior to 2.9.7, when managing kubernetes using the k8s module. Sensitive parameters such as passwords and tokens are passed to kubectl from the command line, not using an environment variable or an input configuration file. This will disclose passwords and tokens from process list and no_log directive from debug module would not have any effect making these secrets being disclosed on stdout and log files.", "poc": ["https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1753", "https://github.com/20142995/pocsuite3", "https://github.com/Live-Hack-CVE/CVE-2020-1753"]}, {"cve": "CVE-2020-8637", "desc": "A SQL injection vulnerability in TestLink 1.9.20 allows attackers to execute arbitrary SQL commands in dragdroptreenodes.php via the node_id parameter.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/DXY0411/CVE-2020-8637", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/soosmile/POC"]}, {"cve": "CVE-2020-11303", "desc": "Accepting AMSDU frames with mismatched destination and source address can lead to information disclosure in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking", "poc": ["https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin"]}, {"cve": "CVE-2020-23915", "desc": "An issue was discovered in cpp-peglib through v0.1.12. peg::resolve_escape_sequence() in peglib.h has a heap-based buffer over-read.", "poc": ["https://github.com/yhirose/cpp-peglib/issues/122", "https://github.com/Live-Hack-CVE/CVE-2020-23915"]}, {"cve": "CVE-2020-11665", "desc": "CA API Developer Portal 4.3.1 and earlier handles loginRedirect page redirects in an insecure manner, which allows attackers to perform open redirect attacks.", "poc": ["http://packetstormsecurity.com/files/157244/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html", "http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html"]}, {"cve": "CVE-2020-35164", "desc": "Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.6, contain an Observable Timing Discrepancy Vulnerability.", "poc": ["https://www.oracle.com/security-alerts/cpujul2022.html", "https://github.com/Live-Hack-CVE/CVE-2020-35164"]}, {"cve": "CVE-2020-21606", "desc": "libde265 v1.0.4 contains a heap buffer overflow fault in the put_epel_16_fallback function, which can be exploited via a crafted a file.", "poc": ["https://github.com/strukturag/libde265/issues/232", "https://github.com/Live-Hack-CVE/CVE-2020-21606"]}, {"cve": "CVE-2020-13558", "desc": "A code execution vulnerability exists in the AudioSourceProviderGStreamer functionality of Webkit WebKitGTK 2.30.1. A specially crafted web page can lead to a use after free.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-1172"]}, {"cve": "CVE-2020-8190", "desc": "Incorrect file permissions in Citrix ADC and Citrix Gateway before versions 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 allows privilege escalation.", "poc": ["https://github.com/stratosphereips/nist-cve-search-tool"]}, {"cve": "CVE-2020-23983", "desc": "Michael-design iChat Realtime PHP Live Support System 1.6 has persistent Cross-site Scripting via chat,text-filed tags.", "poc": ["https://packetstormsecurity.com/files/157594/iChat-1.6-Cross-Site-Scripting.html"]}, {"cve": "CVE-2020-14579", "desc": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "poc": ["https://kc.mcafee.com/corporate/index?page=content&id=SB10332", "https://www.oracle.com/security-alerts/cpujul2020.html", "https://github.com/Live-Hack-CVE/CVE-2020-14579"]}, {"cve": "CVE-2020-26912", "desc": "Certain NETGEAR devices are affected by CSRF. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, JR6150 before 1.0.1.24, R6020 before 1.0.0.42, R6050 before 1.0.1.24, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, and WNR2020 before 1.1.0.62.", "poc": ["https://kb.netgear.com/000062341/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Routers-PSV-2019-0018"]}, {"cve": "CVE-2020-21996", "desc": "AVE DOMINAplus <=1.10.x suffers from an unauthenticated reboot command execution. Attackers can exploit this issue to cause a denial of service scenario.", "poc": ["https://www.exploit-db.com/exploits/47820", "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5548.php", "https://github.com/Live-Hack-CVE/CVE-2020-21996"]}, {"cve": "CVE-2020-28042", "desc": "ServiceStack before 5.9.2 mishandles JWT signature verification unless an application has a custom ValidateToken function that establishes a valid minimum length for a signature.", "poc": ["https://www.shielder.it/advisories/servicestack-jwt-signature-verification-bypass/", "https://github.com/ARPSyndicate/cvemon", "https://github.com/The-Cracker-Technology/jwt_tool", "https://github.com/crpytoscooby/resourses_web", "https://github.com/mishmashclone/ticarpi-jwt_tool", "https://github.com/phramz/tc2022-jwt101", "https://github.com/puckiestyle/jwt_tool", "https://github.com/ticarpi/jwt_tool", "https://github.com/zhangziyang301/jwt_tool"]}, {"cve": "CVE-2020-27980", "desc": "Genexis Platinum-4410 P4410-V2-1.28 devices allow stored XSS in the WLAN SSID parameter. This could allow an attacker to perform malicious actions in which the XSS popup will affect all privileged users.", "poc": ["https://www.exploit-db.com/exploits/48948"]}, {"cve": "CVE-2020-25757", "desc": "A lack of input validation and access controls in Lua CGIs on D-Link DSR VPN routers may result in arbitrary input being passed to system command APIs, resulting in arbitrary command execution with root privileges. This affects DSR-150, DSR-250, DSR-500, and DSR-1000AC with firmware 3.14 and 3.17.", "poc": ["https://www.digitaldefense.com/news/zero-day-vuln-d-link-vpn-routers/"]}, {"cve": "CVE-2020-7995", "desc": "The htdocs/index.php?mainmenu=home login page in Dolibarr 10.0.6 allows an unlimited rate of failed authentication attempts.", "poc": ["http://packetstormsecurity.com/files/163541/Dolibarr-ERP-CRM-10.0.6-Login-Brute-Forcer.html", "https://github.com/Creamy-Chicken-Soup/Exploit", "https://github.com/Live-Hack-CVE/CVE-2020-7995"]}, {"cve": "CVE-2020-22054", "desc": "A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the av_dict_set function in dict.c.", "poc": ["https://trac.ffmpeg.org/ticket/8315"]}, {"cve": "CVE-2020-10409", "desc": "The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/edit-template.php by adding a question mark (?) followed by the payload.", "poc": ["https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456", "https://github.com/Live-Hack-CVE/CVE-2020-10409"]}, {"cve": "CVE-2020-2246", "desc": "Jenkins Valgrind Plugin 0.28 and earlier does not escape content in Valgrind XML reports, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control Valgrind XML report contents.", "poc": ["https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-9329", "desc": "Gogs through 0.11.91 allows attackers to violate the admin-specified repo-creation policy due to an internal/db/repo.go race condition.", "poc": ["https://github.com/gogs/gogs/issues/5926"]}, {"cve": "CVE-2020-35856", "desc": "SolarWinds Orion Platform before 2020.2.5 allows stored XSS attacks by an administrator on the Customize View page.", "poc": ["https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-24293", "desc": "Buffer Overflow vulnerability in psdThumbnail::Read in PSDParser.cpp in FreeImage 3.19.0 [r1859] allows remote attackers to run arbitrary code via opening of crafted psd file.", "poc": ["https://github.com/fkie-cad/nvd-json-data-feeds"]}, {"cve": "CVE-2020-5418", "desc": "Cloud Foundry CAPI (Cloud Controller) versions prior to 1.98.0 allow authenticated users having only the \"cloud_controller.read\" scope, but no roles in any spaces, to list all droplets in all spaces (whereas they should see none).", "poc": ["https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-25133", "desc": "An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to directory traversal and local file inclusion due to the fact that there is an unrestricted possibility of loading any file with an inc.php extension. Inclusion of other files (even though limited to the mentioned extension) can lead to Remote Code Execution. This can occur via /ports/?format=../ URIs to pages/ports.inc.php.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/afine-com/research", "https://github.com/afinepl/research"]}, {"cve": "CVE-2020-0408", "desc": "In remove of String16.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-156999009", "poc": ["https://github.com/TinyNiko/android_bulletin_notes"]}, {"cve": "CVE-2020-10812", "desc": "An issue was discovered in HDF5 through 1.12.0. A NULL pointer dereference exists in the function H5F_get_nrefs() located in H5Fquery.c. It allows an attacker to cause Denial of Service.", "poc": ["https://github.com/Loginsoft-Research/hdf5-reports/tree/master/Vuln_4", "https://research.loginsoft.com/bugs/null-pointer-dereference-in-h5fquery-c-hdf5-1-13-0/"]}, {"cve": "CVE-2020-10407", "desc": "The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/edit-news.php by adding a question mark (?) followed by the payload.", "poc": ["https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456", "https://github.com/Live-Hack-CVE/CVE-2020-10407"]}, {"cve": "CVE-2020-14720", "desc": "Vulnerability in the Oracle Internet Expenses product of Oracle E-Business Suite (component: Mobile Expenses Admin Utilities). Supported versions that are affected are 12.2.4-12.2.9. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Internet Expenses. While the vulnerability is in Oracle Internet Expenses, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Internet Expenses accessible data. CVSS 3.1 Base Score 7.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpujul2020.html"]}, {"cve": "CVE-2020-8133", "desc": "A wrong generation of the passphrase for the encrypted block in Nextcloud Server 19.0.1 allowed an attacker to overwrite blocks in a file.", "poc": ["https://hackerone.com/reports/661051"]}, {"cve": "CVE-2020-10112", "desc": "** DISPUTED ** Citrix Gateway 11.1, 12.0, and 12.1 allows Cache Poisoning. NOTE: Citrix disputes this as not a vulnerability. By default, Citrix ADC only caches static content served under certain URL paths for Citrix Gateway usage. No dynamic content is served under these paths, which implies that those cached pages would not change based on parameter values. All other data traffic going through Citrix Gateway are NOT cached by default.", "poc": ["http://packetstormsecurity.com/files/156660/Citrix-Gateway-11.1-12.0-12.1-Cache-Poisoning.html", "http://seclists.org/fulldisclosure/2020/Mar/8", "https://github.com/ARPSyndicate/cvemon", "https://github.com/stratosphereips/nist-cve-search-tool"]}, {"cve": "CVE-2020-12648", "desc": "A cross-site scripting (XSS) vulnerability in TinyMCE 5.2.1 and earlier allows remote attackers to inject arbitrary web script when configured in classic editing mode.", "poc": ["https://labs.bishopfox.com/advisories/tinymce-version-5.2.1"]}, {"cve": "CVE-2020-0424", "desc": "In send_vc of res_send.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-161362564", "poc": ["https://github.com/TinyNiko/android_bulletin_notes"]}, {"cve": "CVE-2020-35211", "desc": "An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to become the lead node in a target cluster via manipulation of the variable terms in RaftContext.", "poc": ["https://docs.google.com/presentation/d/1C_IpRfSU-9FMezcHCFZ-qg-15JO-W36yvqcnzI8sQs8/edit?usp=sharing"]}, {"cve": "CVE-2020-16218", "desc": "In Patient Information Center iX (PICiX) Versions B.02, C.02, C.03, the software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is then used as a webpage and served to other users. Successful exploitation could lead to unauthorized access to patient data via a read-only web application.", "poc": ["https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-7776", "desc": "This affects the package phpoffice/phpspreadsheet from 0.0.0. The library is vulnerable to XSS when creating an html output from an excel file by adding a comment on any cell. The root cause of this issue is within the HTML writer where user comments are concatenated as part of link and this is returned as HTML. A fix for this issue is available on commit 0ed5b800be2136bcb8fa9c1bdf59abc957a98845/master branch.", "poc": ["https://snyk.io/vuln/SNYK-PHP-PHPOFFICEPHPSPREADSHEET-1048856"]}, {"cve": "CVE-2020-15926", "desc": "Rocket.Chat through 3.4.2 allows XSS where an attacker can send a specially crafted message to a channel or in a direct message to the client which results in remote code execution on the client side.", "poc": ["https://github.com/alphaSeclab/sec-daily-2020", "https://github.com/doyensec/awesome-electronjs-hacking"]}, {"cve": "CVE-2020-13911", "desc": "Your Online Shop 1.8.0 allows authenticated users to trigger XSS via a Change Name or Change Surname operation.", "poc": ["https://gist.github.com/kdrypr/5dac91c2d27c4dc82b1225dffa38f7a8"]}, {"cve": "CVE-2020-4949", "desc": "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 192025.", "poc": ["https://www.ibm.com/support/pages/node/6408244", "https://github.com/r00t4dm/r00t4dm", "https://github.com/superfish9/pt"]}, {"cve": "CVE-2020-15849", "desc": "Re:Desk 2.3 has a blind authenticated SQL injection vulnerability in the SettingsController class, in the actionEmailTemplates() method. A malicious actor with access to an administrative account could abuse this vulnerability to recover sensitive data from the application's database, allowing for authorization bypass and taking over additional accounts by means of modifying password-reset tokens stored in the database. Remote command execution is also possible by leveraging this to abuse the Yii framework's bizRule functionality, allowing for arbitrary PHP code to be executed by the application. Remote command execution is also possible by using this together with a separate insecure file upload vulnerability (CVE-2020-15488).", "poc": ["https://labs.f-secure.com/advisories/redesk-v2-3-multiple-issues/"]}, {"cve": "CVE-2020-8249", "desc": "A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to perform buffer overflow.", "poc": ["https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601", "https://github.com/mbadanoiu/CVE-2020-8249"]}, {"cve": "CVE-2020-35455", "desc": "The Taidii Diibear Android application 2.4.0 and all its derivatives allow attackers to obtain user credentials from Shared Preferences and the SQLite database because of insecure data storage.", "poc": ["https://github.com/galapogos/Taidii-Diibear-Vulnerabilities"]}, {"cve": "CVE-2020-11836", "desc": "OPPO Android Phone with MTK chipset and Android 8.1/9/10/11 versions have an information leak vulnerability. The \u201cadb shell getprop ro.vendor.aee.enforcing\u201d or \u201cadb shell getprop ro.vendor.aee.enforcing\u201d return no.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/pokerfacett/MY_CVE_CREDIT"]}, {"cve": "CVE-2020-2772", "desc": "Vulnerability in the Oracle Human Resources product of Oracle E-Business Suite (component: Absence Recording, Maintenance). Supported versions that are affected are 12.2.6-12.2.9. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Human Resources. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Human Resources, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Human Resources accessible data. CVSS 3.0 Base Score 4.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpuapr2020.html"]}, {"cve": "CVE-2020-29573", "desc": "sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \\x00\\x04\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x04 value to sprintf. NOTE: the issue does not affect glibc by default in 2016 or later (i.e., 2.23 or later) because of commits made in 2015 for inlining of C99 math functions through use of GCC built-ins. In other words, the reference to 2.23 is intentional despite the mention of \"Fixed for glibc 2.33\" in the 26649 reference.", "poc": ["https://github.com/vincent-deng/veracode-container-security-finding-parser"]}, {"cve": "CVE-2020-13247", "desc": "BooleBox Secure File Sharing Utility before 4.2.3.0 allows CSV injection via a crafted user name that is mishandled during export from the activity logs in the Audit Area.", "poc": ["https://members.backbox.org/boolebox-secure-sharing-multiple-vulnerabilities/"]}, {"cve": "CVE-2020-18735", "desc": "A heap buffer overflow in /src/dds_stream.c of Eclipse IOT Cyclone DDS Project v0.1.0 causes the DDS subscriber server to crash.", "poc": ["https://github.com/eclipse-cyclonedds/cyclonedds", "https://github.com/eclipse-cyclonedds/cyclonedds/issues/501"]}, {"cve": "CVE-2020-11602", "desc": "An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) software. Google Assistant leaks clipboard contents on a locked device. The Samsung ID is SVE-2019-16558 (April 2020).", "poc": ["https://security.samsungmobile.com/securityUpdate.smsb"]}, {"cve": "CVE-2020-3960", "desc": "VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in NVMe functionality. A malicious actor with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to read privileged information contained in physical memory.", "poc": ["https://github.com/p1ay8y3ar/cve_monitor"]}, {"cve": "CVE-2020-35578", "desc": "An issue was discovered in the Manage Plugins page in Nagios XI before 5.8.0. Because the line-ending conversion feature is mishandled during a plugin upload, a remote, authenticated admin user can execute operating-system commands.", "poc": ["http://packetstormsecurity.com/files/160948/Nagios-XI-5.7.x-Remote-Code-Execution.html", "http://packetstormsecurity.com/files/162207/Nagios-XI-Remote-Code-Execution.html", "https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-12109", "desc": "Certain TP-Link devices allow Command Injection. This affects NC200 2.1.9 build 200225, NC210 1.0.9 build 200304, NC220 1.3.0 build 200304, NC230 1.3.0 build 200304, NC250 1.3.0 build 200304, NC260 1.5.2 build 200304, and NC450 1.5.3 build 200304.", "poc": ["http://packetstormsecurity.com/files/157531/TP-LINK-Cloud-Cameras-NCXXX-Bonjour-Command-Injection.html", "http://packetstormsecurity.com/files/159222/TP-Link-Cloud-Cameras-NCXXX-Bonjour-Command-Injection.html", "https://github.com/ARPSyndicate/cvemon", "https://github.com/HimmelAward/Goby_POC", "https://github.com/Live-Hack-CVE/CVE-2020-12109", "https://github.com/Z0fhack/Goby_POC"]}, {"cve": "CVE-2020-35561", "desc": "An issue was discovered MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. There is an SSRF in the HA module allowing an unauthenticated attacker to scan for open ports.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-35561"]}, {"cve": "CVE-2020-15149", "desc": "NodeBB before version 1.14.3 has a bug introduced in version 1.12.2 in the validation logic that makes it possible to change the password of any user on a running NodeBB forum by sending a specially crafted socket.io call to the server. This could lead to a privilege escalation event due via an account takeover. As a workaround you may cherry-pick the following commit from the project's repository to your running instance of NodeBB: 16cee1b03ba3eee177834a1fdac4aa8a12b39d2a. This is fixed in version 1.14.3.", "poc": ["http://packetstormsecurity.com/files/159560/NodeBB-Forum-1.14.2-Account-Takeover.html", "https://zeroauth.ltd/blog/2020/08/20/proof-of-concept-exploit-for-cve-2020-15149-nodebb-arbitrary-user-password-change/", "https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-7722", "desc": "All versions of package nodee-utils are vulnerable to Prototype Pollution via the deepSet function.", "poc": ["https://snyk.io/vuln/SNYK-JS-NODEEUTILS-598679", "https://github.com/404notf0und/CVE-Flow", "https://github.com/Live-Hack-CVE/CVE-2020-7722"]}, {"cve": "CVE-2020-24982", "desc": "An issue was discovered in Quadbase ExpressDashboard (EDAB) 7 Update 9. It allows CSRF. An attacker may be able to trick an authenticated user into changing the email address associated with their account.", "poc": ["https://c41nc.co.uk/cve-2020-24982/"]}, {"cve": "CVE-2020-12621", "desc": "The Teamwire application 5.3.0 for Android allows physically proximate attackers to exploit a flaw related to the pass-code component.", "poc": ["https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-11681", "desc": "Castel NextGen DVR v1.0.0 stores and displays credentials for the associated SMTP server in cleartext. Low privileged users can exploit this to create an administrator user and obtain the SMTP credentials.", "poc": ["http://packetstormsecurity.com/files/157954/Castel-NextGen-DVR-1.0.0-Bypass-CSRF-Disclosure.html", "https://github.com/irbishop/CVEs"]}, {"cve": "CVE-2020-29557", "desc": "An issue was discovered on D-Link DIR-825 R1 devices through 3.0.1 before 2020-11-20. A buffer overflow in the web interface allows attackers to achieve pre-authentication remote code execution.", "poc": ["https://github.com/Ostorlab/KEV", "https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors"]}, {"cve": "CVE-2020-6322", "desc": "SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated 3DM file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.", "poc": ["https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-28049", "desc": "An issue was discovered in SDDM before 0.19.0. It incorrectly starts the X server in a way that - for a short time period - allows local unprivileged users to create a connection to the X server without providing proper authentication. A local attacker can thus access X server display contents and, for example, intercept keystrokes or access the clipboard. This is caused by a race condition during Xauthority file creation.", "poc": ["https://github.com/sddm/sddm/releases"]}, {"cve": "CVE-2020-18378", "desc": "A NULL pointer dereference was discovered in SExpressionWasmBuilder::makeBlock in wasm/wasm-s-parser.c in Binaryen 1.38.26. A crafted wasm input can cause a segmentation fault, leading to denial-of-service, as demonstrated by wasm-as.", "poc": ["https://github.com/WebAssembly/binaryen/issues/1900"]}, {"cve": "CVE-2020-13343", "desc": "An issue has been discovered in GitLab affecting all versions starting from 11.2. Unauthorized Users Can View Custom Project Template", "poc": ["https://hackerone.com/reports/689314"]}, {"cve": "CVE-2020-26542", "desc": "An issue was discovered in the MongoDB Simple LDAP plugin through 2020-10-02 for Percona Server when using the SimpleLDAP authentication in conjunction with Microsoft\u2019s Active Directory, Percona has discovered a flaw that would allow authentication to complete when passing a blank value for the account password, leading to access against the service integrated with which Active Directory is deployed at the level granted to the authenticating account.", "poc": ["https://www.percona.com/blog/2020/10/13/percona-distribution-for-mysql-pxc-variant-8-0-20-fixes-for-security-vulnerability-release-roundup-october-13-2020/"]}, {"cve": "CVE-2020-2798", "desc": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: WLS Web Services). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).", "poc": ["https://www.oracle.com/security-alerts/cpuapr2020.html", "https://github.com/ARPSyndicate/cvemon", "https://github.com/CVEDB/PoC-List", "https://github.com/CVEDB/awesome-cve-repo", "https://github.com/CVEDB/top", "https://github.com/CnHack3r/Penetration_PoC", "https://github.com/EchoGin404/-", "https://github.com/EchoGin404/gongkaishouji", "https://github.com/ExpLangcn/FuYao-Go", "https://github.com/GhostTroops/TOP", "https://github.com/JERRY123S/all-poc", "https://github.com/Live-Hack-CVE/CVE-2020-2798", "https://github.com/Mr-xn/Penetration_Testing_POC", "https://github.com/YIXINSHUWU/Penetration_Testing_POC", "https://github.com/ZTK-009/Penetration_PoC", "https://github.com/cyberanand1337x/bug-bounty-2022", "https://github.com/hasee2018/Penetration_Testing_POC", "https://github.com/hktalent/CVE_2020_2546", "https://github.com/hktalent/TOP", "https://github.com/huike007/penetration_poc", "https://github.com/huike007/poc", "https://github.com/jbmihoub/all-poc", "https://github.com/lions2012/Penetration_Testing_POC", "https://github.com/password520/Penetration_PoC", "https://github.com/r00t4dm/r00t4dm", "https://github.com/weeka10/-hktalent-TOP", "https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-", "https://github.com/xuetusummer/Penetration_Testing_POC", "https://github.com/yedada-wei/-", "https://github.com/yedada-wei/gongkaishouji"]}, {"cve": "CVE-2020-25367", "desc": "A command injection vulnerability was discovered in the HNAP1 protocol in D-Link DIR-823G devices with firmware V1.0.2B05. An attacker is able to execute arbitrary web scripts via shell metacharacters in the Captcha field to Login.", "poc": ["https://www.dlink.com/en/security-bulletin/"]}, {"cve": "CVE-2020-3217", "desc": "A vulnerability in the Topology Discovery Service of Cisco One Platform Kit (onePK) in Cisco IOS Software, Cisco IOS XE Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient length restrictions when the onePK Topology Discovery Service parses Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol message to an affected device. An exploit could allow the attacker to cause a stack overflow, which could allow the attacker to execute arbitrary code with administrative privileges, or to cause a process crash, which could result in a reload of the device and cause a DoS condition.", "poc": ["https://github.com/p1ay8y3ar/cve_monitor"]}, {"cve": "CVE-2020-10551", "desc": "QQBrowser before 10.5.3870.400 installs a Windows service TsService.exe. This file is writable by anyone belonging to the NT AUTHORITY\\Authenticated Users group, which includes all local and remote users. This can be abused by local attackers to escalate privileges to NT AUTHORITY\\SYSTEM by writing a malicious executable to the location of TsService.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/mbiel92/Hugo-MB", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/seqred-s-a/CVE-2020-10551", "https://github.com/soosmile/POC"]}, {"cve": "CVE-2020-11099", "desc": "In FreeRDP before version 2.1.2, there is an out of bounds read in license_read_new_or_upgrade_license_packet. A manipulated license packet can lead to out of bound reads to an internal buffer. This is fixed in version 2.1.2.", "poc": ["https://usn.ubuntu.com/4481-1/", "https://github.com/Live-Hack-CVE/CVE-2020-11099"]}, {"cve": "CVE-2020-15600", "desc": "An issue was discovered in CMSUno before 1.6.1. uno.php allows CSRF to change the admin password.", "poc": ["http://packetstormsecurity.com/files/158455/CMSUno-1.6-Cross-Site-Request-Forgery.html", "https://github.com/boiteasite/cmsuno/issues/15"]}, {"cve": "CVE-2020-12265", "desc": "The decompress package before 4.2.1 for Node.js is vulnerable to Arbitrary File Write via ../ in an archive member, when a symlink is used, because of Directory Traversal.", "poc": ["https://github.com/kevva/decompress/issues/71", "https://github.com/kevva/decompress/pull/73", "https://github.com/ossf-cve-benchmark/CVE-2020-12265"]}, {"cve": "CVE-2020-17478", "desc": "ECDSA/EC/Point.pm in Crypt::Perl before 0.33 does not properly consider timing attacks against the EC point multiplication algorithm.", "poc": ["https://github.com/FGasper/p5-Crypt-Perl"]}, {"cve": "CVE-2020-8128", "desc": "An unintended require and server-side request forgery vulnerabilities in jsreport version 2.5.0 and earlier allow attackers to execute arbitrary code.", "poc": ["https://hackerone.com/reports/660565"]}, {"cve": "CVE-2020-2819", "desc": "Vulnerability in the Oracle Universal Work Queue product of Oracle E-Business Suite (component: Work Provider Administration). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Universal Work Queue. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Universal Work Queue, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Universal Work Queue accessible data as well as unauthorized update, insert or delete access to some of Oracle Universal Work Queue accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpuapr2020.html"]}, {"cve": "CVE-2020-21060", "desc": "SQL injection vulnerability found in PHPMyWind v.5.6 allows a remote attacker to gain privileges via the delete function of the administrator management page.", "poc": ["https://github.com/gaozhifeng/PHPMyWind/issues/10"]}, {"cve": "CVE-2020-25579", "desc": "In FreeBSD 12.2-STABLE before r368969, 11.4-STABLE before r369047, 12.2-RELEASE before p3, 12.1-RELEASE before p13 and 11.4-RELEASE before p7 msdosfs(5) was failing to zero-fill a pair of padding fields in the dirent structure, resulting in a leak of three uninitialized bytes.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/elttam/publications", "https://github.com/farazsth98/freebsd-dirent-info-leak-bugs"]}, {"cve": "CVE-2020-8181", "desc": "A missing file type check in Nextcloud Contacts 3.2.0 allowed a malicious user to upload any file as avatars.", "poc": ["https://hackerone.com/reports/808287"]}, {"cve": "CVE-2020-27234", "desc": "An exploitable SQL injection vulnerability exists in \u2018getAssets.jsp\u2019 page of OpenClinic GA 5.173.3 in the serviceUID parameter. An attacker can make an authenticated HTTP request to trigger this vulnerability.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207"]}, {"cve": "CVE-2020-27976", "desc": "osCommerce Phoenix CE before 1.0.5.4 allows OS command injection remotely. Within admin/mail.php, a from POST parameter can be passed to the application. This affects the PHP mail function, and the sendmail -f option.", "poc": ["https://herolab.usd.de/security-advisories/usd-2020-0026/", "https://github.com/ARPSyndicate/cvemon", "https://github.com/anquanscan/sec-tools", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/k0rnh0li0/CVE-2020-27976", "https://github.com/nomi-sec/PoC-in-GitHub"]}, {"cve": "CVE-2020-14852", "desc": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Charsets). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "poc": ["https://www.oracle.com/security-alerts/cpuoct2020.html", "https://github.com/ARPSyndicate/cvemon", "https://github.com/lukaspustina/cve-scorer"]}, {"cve": "CVE-2020-17510", "desc": "Apache Shiro before 1.7.0, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/HackJava/HackShiro", "https://github.com/HackJava/Shiro", "https://github.com/chibd2000/Burp-Extender-Study-Develop", "https://github.com/pen4uin/awesome-vulnerability-research", "https://github.com/pen4uin/vulnerability-research", "https://github.com/pen4uin/vulnerability-research-list", "https://github.com/xhycccc/Shiro-Vuln-Demo"]}, {"cve": "CVE-2020-8865", "desc": "This vulnerability allows remote attackers to execute local PHP files on affected installations of Horde Groupware Webmail Edition 5.2.22. Authentication is required to exploit this vulnerability. The specific flaw exists within edit.php. When parsing the params[template] parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the www-data user. Was ZDI-CAN-10469.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/Live-Hack-CVE/CVE-2020-8865"]}, {"cve": "CVE-2020-8799", "desc": "A Stored XSS vulnerability has been found in the administration page of the WTI Like Post plugin through 1.4.5 for WordPress. Once the administrator has submitted the data, the script stored is executed for all the users visiting the website.", "poc": ["https://wpvulndb.com/vulnerabilities/10210"]}, {"cve": "CVE-2020-16220", "desc": "In Patient Information Center iX (PICiX) Versions C.02, C.03, PerformanceBridge Focal Point Version A.01, the product receives input that is expected to be well-formed (i.e., to comply with a certain syntax) but it does not validate or incorrectly validates that the input complies with the syntax, causing the certificate enrollment service to crash. It does not impact monitoring but prevents new devices from enrolling.", "poc": ["https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-25803", "desc": "Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via FreeMarker template exposed objects. This issue affects: Crafter Software Crafter CMS 3.0 versions prior to 3.0.27; 3.1 versions prior to 3.1.7.", "poc": ["https://github.com/mbadanoiu/CVE-2022-40634"]}, {"cve": "CVE-2020-11866", "desc": "libEMF (aka ECMA-234 Metafile Library) through 1.0.11 allows a use-after-free.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-11866"]}, {"cve": "CVE-2020-29607", "desc": "A file upload restriction bypass vulnerability in Pluck CMS before 4.7.13 allows an admin privileged user to gain access in the host through the \"manage files\" functionality, which may result in remote code execution.", "poc": ["http://packetstormsecurity.com/files/162785/Pluck-CMS-4.7.13-Remote-Shell-Upload.html", "https://github.com/0xAbbarhSF/CVE-2020-29607", "https://github.com/0xN7y/CVE-2020-29607", "https://github.com/ARPSyndicate/cvemon", "https://github.com/Hacker5preme/Exploits", "https://github.com/QuanPham247/THM-Dreaming"]}, {"cve": "CVE-2020-10498", "desc": "CSRF in admin/edit-category.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to edit a category, given the id, via a crafted request.", "poc": ["https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-editing-a-category-cve-2020-10498", "https://github.com/Live-Hack-CVE/CVE-2020-10498"]}, {"cve": "CVE-2020-11151", "desc": "Race condition occurs while calling user space ioctl from two different threads can results to use after free issue in video in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables", "poc": ["https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin"]}, {"cve": "CVE-2020-14627", "desc": "Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Query). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpujul2020.html"]}, {"cve": "CVE-2020-12112", "desc": "BigBlueButton before 2.2.5 allows remote attackers to obtain sensitive files via Local File Inclusion.", "poc": ["https://github.com/tchenu/CVE-2020-12112", "https://github.com/0xT11/CVE-POC", "https://github.com/ARPSyndicate/cvemon", "https://github.com/Live-Hack-CVE/CVE-2020-12112", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/soosmile/POC", "https://github.com/tchenu/CVE-2020-12112"]}, {"cve": "CVE-2020-2791", "desc": "Vulnerability in the Oracle Knowledge product of Oracle Knowledge (component: Information Manager Console). Supported versions that are affected are 8.6.0-8.6.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Knowledge. Successful attacks of this vulnerability can result in takeover of Oracle Knowledge. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "poc": ["https://www.oracle.com/security-alerts/cpuapr2020.html"]}, {"cve": "CVE-2020-2753", "desc": "Vulnerability in the Oracle Workflow product of Oracle E-Business Suite (component: Workflow Notification Mailer). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Workflow. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Workflow accessible data. CVSS 3.0 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpuapr2020.html"]}, {"cve": "CVE-2020-11264", "desc": "Improper authentication of Non-EAPOL/WAPI plaintext frames during four-way handshake can lead to arbitrary network packet injection in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music", "poc": ["https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin"]}, {"cve": "CVE-2020-28074", "desc": "SourceCodester Online Health Care System 1.0 is affected by SQL Injection which allows a potential attacker to bypass the authentication system and become an admin.", "poc": ["http://packetstormsecurity.com/files/160599/Online-Health-Card-System-1.0-SQL-Injection.html", "https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-10939", "desc": "Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.", "poc": ["https://cert.vde.com/en-us/advisories/vde-2020-012"]}, {"cve": "CVE-2020-9405", "desc": "IBL Online Weather before 4.3.5a allows unauthenticated reflected XSS via the redirect page.", "poc": ["https://github.com/dawid-czarnecki/public-vulnerabilities"]}, {"cve": "CVE-2020-0931", "desc": "A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0920, CVE-2020-0929, CVE-2020-0932, CVE-2020-0971, CVE-2020-0974.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/Live-Hack-CVE/CVE-2020-0971", "https://github.com/lnick2023/nicenice", "https://github.com/qazbnm456/awesome-cve-poc", "https://github.com/xbl3/awesome-cve-poc_qazbnm456"]}, {"cve": "CVE-2020-11550", "desc": "An issue was discovered on NETGEAR Orbi Tri-Band Business WiFi Add-on Satellite (SRS60) AC3000 V2.5.1.106, Outdoor Satellite (RBS50Y) V2.5.1.106, and Pro Tri-Band Business WiFi Router (SRR60) AC3000 V2.5.1.106. The administrative SOAP interface allows an unauthenticated remote leak of sensitive/arbitrary Wi-Fi information, such as SSIDs and Pre-Shared-Keys (PSK).", "poc": ["https://github.com/modzero/MZ-20-02-NETGEAR-Orbi-Security", "https://www.modzero.com/advisories/MZ-20-02-Netgear-Orbi-Pro-Security.txt", "https://github.com/modzero/MZ-20-02-NETGEAR-Orbi-Security"]}, {"cve": "CVE-2020-27835", "desc": "A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.", "poc": ["https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-8448", "desc": "In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a denial of service (NULL pointer dereference) via crafted messages written directly to the analysisd UNIX domain socket by a local user.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-8448"]}, {"cve": "CVE-2020-29361", "desc": "An issue was discovered in p11-kit 0.21.1 through 0.23.21. Multiple integer overflows have been discovered in the array allocations in the p11-kit library and the p11-kit list command, where overflow checks are missing before calling realloc or calloc.", "poc": ["https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-15917", "desc": "common/session.c in Claws Mail before 3.17.6 has a protocol violation because suffix data after STARTTLS is mishandled.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-15917"]}, {"cve": "CVE-2020-35270", "desc": "Student Result Management System In PHP With Source Code is affected by SQL injection. An attacker can able to access of Admin Panel and manage every account of Result.", "poc": ["https://www.exploit-db.com/exploits/49152", "https://github.com/ARPSyndicate/cvemon", "https://github.com/L4stPL4Y3R/My_CVE_References", "https://github.com/riteshgohil/My_CVE_References"]}, {"cve": "CVE-2020-35896", "desc": "An issue was discovered in the ws crate through 2020-09-25 for Rust. The outgoing buffer is not properly limited, leading to a remote memory-consumption attack.", "poc": ["https://github.com/Artisan-Lab/Rust-memory-safety-bugs", "https://github.com/Live-Hack-CVE/CVE-2020-35896"]}, {"cve": "CVE-2020-5351", "desc": "Dell EMC Data Protection Advisor versions 6.4, 6.5 and 18.1 contain an undocumented account with limited privileges that is protected with a hard-coded password. A remote unauthenticated malicious user with the knowledge of the hard-coded password may login to the system and gain read-only privileges.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-5351"]}, {"cve": "CVE-2020-10987", "desc": "The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.", "poc": ["https://www.ise.io/research/", "https://github.com/20142995/Goby", "https://github.com/ARPSyndicate/cvemon", "https://github.com/HimmelAward/Goby_POC", "https://github.com/Ostorlab/KEV", "https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors", "https://github.com/Z0fhack/Goby_POC", "https://github.com/ker2x/DearDiary"]}, {"cve": "CVE-2020-14648", "desc": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpujul2020.html"]}, {"cve": "CVE-2020-8287", "desc": "Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.", "poc": ["https://www.oracle.com/security-alerts/cpujan2021.html", "https://github.com/ARPSyndicate/cvemon", "https://github.com/Live-Hack-CVE/CVE-2020-8287", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/progfay/nodejs-http-transfer-encoding-smuggling-poc", "https://github.com/soosmile/POC"]}, {"cve": "CVE-2020-27792", "desc": "A heap-based buffer overwrite vulnerability was found in GhostScript's lp8000_print_page() function in the gdevlp8k.c file. This flaw allows an attacker to trick a user into opening a crafted PDF file, triggering the heap buffer overflow that could lead to memory corruption or a denial of service.", "poc": ["https://bugs.ghostscript.com/show_bug.cgi?id=701844", "https://github.com/ARPSyndicate/cvemon", "https://github.com/Live-Hack-CVE/CVE-2020-27792", "https://github.com/fkie-cad/nvd-json-data-feeds"]}, {"cve": "CVE-2020-12495", "desc": "Endress+Hauser Ecograph T (Neutral/Private Label) (RSG35, ORSG35) with Firmware version prior to V2.0.0 is prone to improper privilege management. The affected device has a web-based user interface with a role-based access system. Users with different roles have different write and read privileges. The access system is based on dynamic \"tokens\". The vulnerability is that user sessions are not closed correctly and a user with fewer rights is assigned the higher rights when he logs on.", "poc": ["https://cert.vde.com/en-us/advisories/vde-2020-021"]}, {"cve": "CVE-2020-24501", "desc": "Buffer overflow in the firmware for Intel(R) E810 Ethernet Controllers before version 1.4.1.13 may allow an unauthenticated user to potentially enable denial of service via adjacent access.", "poc": ["https://github.com/DNTYO/F5_Vulnerability"]}, {"cve": "CVE-2020-0419", "desc": "In generateInfo of PackageInstallerSession.java, there is a possible leak of cross-profile URI data during app installation due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-142125338", "poc": ["https://github.com/TinyNiko/android_bulletin_notes"]}, {"cve": "CVE-2020-1509", "desc": "An elevation of privilege vulnerability exists in the Local Security Authority Subsystem Service (LSASS) when an authenticated attacker sends a specially crafted authentication request. A remote attacker who successfully exploited this vulnerability could cause an elevation of privilege on the target system's LSASS service.The security update addresses the vulnerability by changing the way that LSASS handles specially crafted authentication requests.", "poc": ["https://github.com/punishell/WindowsLegacyCVE"]}, {"cve": "CVE-2020-16025", "desc": "Heap buffer overflow in clipboard in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.", "poc": ["http://packetstormsecurity.com/files/161354/Chrome-ClipboardWin-WriteBitmap-Heap-Buffer-Overflow.html"]}, {"cve": "CVE-2020-5411", "desc": "When configured to enable default typing, Jackson contained a deserialization vulnerability that could lead to arbitrary code execution. Jackson fixed this vulnerability by blacklisting known \"deserialization gadgets\". Spring Batch configures Jackson with global default typing enabled which means that through the previous exploit, arbitrary code could be executed if all of the following is true: * Spring Batch's Jackson support is being leveraged to serialize a job's ExecutionContext. * A malicious user gains write access to the data store used by the JobRepository (where the data to be deserialized is stored). In order to protect against this type of attack, Jackson prevents a set of untrusted gadget classes from being deserialized. Spring Batch should be proactive against blocking unknown \"deserialization gadgets\" when enabling default typing.", "poc": ["https://github.com/PalindromeLabs/Java-Deserialization-CVEs"]}, {"cve": "CVE-2020-14534", "desc": "Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Popups). The supported version that is affected is 12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Applications Framework accessible data as well as unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpujul2020.html"]}, {"cve": "CVE-2020-14461", "desc": "Zyxel Armor X1 WAP6806 1.00(ABAL.6)C0 devices allow Directory Traversal via the images/eaZy/ URI.", "poc": ["http://packetstormsecurity.com/files/158428/Zyxel-Armor-X1-WAP6806-Directory-Traversal.html", "https://github.com/Live-Hack-CVE/CVE-2020-14461"]}, {"cve": "CVE-2020-6813", "desc": "When protecting CSS blocks with the nonce feature of Content Security Policy, the @import statement in the CSS block could allow an attacker to inject arbitrary styles, bypassing the intent of the Content Security Policy. This vulnerability affects Firefox < 74.", "poc": ["https://bugzilla.mozilla.org/show_bug.cgi?id=1605814"]}, {"cve": "CVE-2020-16002", "desc": "Use after free in PDFium in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.", "poc": ["https://github.com/0xCyberY/CVE-T4PDF", "https://github.com/ARPSyndicate/cvemon", "https://github.com/BOB-Jour/Chromium-Bug-Hunting-Project"]}, {"cve": "CVE-2020-14980", "desc": "The Sophos Secure Email application through 3.9.4 for Android has Missing SSL Certificate Validation.", "poc": ["http://packetstormsecurity.com/files/158322/Sophos-Secure-Email-Android-Application-3.9.4-Man-In-The-Middle.html", "https://github.com/Live-Hack-CVE/CVE-2020-14980"]}, {"cve": "CVE-2020-9275", "desc": "An issue was discovered on D-Link DSL-2640B B2 EU_4.01B devices. A cfm UDP service listening on port 65002 allows remote, unauthenticated exfiltration of administrative credentials.", "poc": ["https://raelize.com/advisories/CVE-2020-9275_D-Link-DSL-2640B_Remote-Credentials-Exfiltration_v1.0.txt"]}, {"cve": "CVE-2020-26178", "desc": "In tangro Business Workflow before 1.18.1, knowing an attachment ID, it is possible to download workitem attachments without being authenticated.", "poc": ["https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/"]}, {"cve": "CVE-2020-26559", "desc": "Bluetooth Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device (participating in the provisioning protocol) to identify the AuthValue used given the Provisioner\u2019s public key, and the confirmation number and nonce provided by the provisioning device. This could permit a device without the AuthValue to complete provisioning without brute-forcing the AuthValue.", "poc": ["https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/", "https://github.com/JeffroMF/awesome-bluetooth-security321", "https://github.com/engn33r/awesome-bluetooth-security"]}, {"cve": "CVE-2020-20990", "desc": "A cross site scripting (XSS) vulnerability in the /segments/edit.php component of Domainmod 4.13 allows attackers to execute arbitrary web scripts or HTML via the Segment Name parameter.", "poc": ["https://mycvee.blogspot.com/p/xss1.html"]}, {"cve": "CVE-2020-11253", "desc": "Arbitrary memory write issue in video driver while setting the internal buffers in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile", "poc": ["https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin", "https://github.com/TinyNiko/android_bulletin_notes"]}, {"cve": "CVE-2020-16024", "desc": "Heap buffer overflow in UI in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.", "poc": ["http://packetstormsecurity.com/files/161353/Chrome-SkBitmapOperations-UnPreMultiply-Heap-Buffer-Overflow.html"]}, {"cve": "CVE-2020-22403", "desc": "Cross Site Request Forgery (CSRF) vulnerability in Express cart v1.1.16 allows attackers to add an administrator account, add discount code or other unspecified impacts.", "poc": ["https://github.com/mrvautin/expressCart/issues/120"]}, {"cve": "CVE-2020-7296", "desc": "Privilege Escalation vulnerability in McAfee Web Gateway (MWG) prior to 9.2.1 allows authenticated user interface user to access protected configuration files via improper access control in the user interface.", "poc": ["https://kc.mcafee.com/corporate/index?page=content&id=SB10323"]}, {"cve": "CVE-2020-7763", "desc": "This affects the package phantom-html-to-pdf before 0.6.1.", "poc": ["https://snyk.io/vuln/SNYK-JS-PHANTOMHTMLTOPDF-1023598", "https://github.com/ARPSyndicate/cvemon", "https://github.com/ossf-cve-benchmark/CVE-2020-7763"]}, {"cve": "CVE-2020-15945", "desc": "Lua through 5.4.0 has a segmentation fault in changedline in ldebug.c (e.g., when called by luaG_traceexec) because it incorrectly expects that an oldpc value is always updated upon a return of the flow of control to a function.", "poc": ["http://lua-users.org/lists/lua-l/2020-07/msg00123.html"]}, {"cve": "CVE-2020-1143", "desc": "An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1054.", "poc": ["https://github.com/0xT11/CVE-POC", "https://github.com/ARPSyndicate/cvemon", "https://github.com/Cruxer8Mech/Idk", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/soosmile/POC", "https://github.com/ycdxsb/WindowsPrivilegeEscalation"]}, {"cve": "CVE-2020-23042", "desc": "Dropouts Technologies LLP Super Backup v2.0.5 was discovered to contain a cross-site scripting (XSS) vulnerability in the path parameter of the `list` and `download` module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted GET request.", "poc": ["https://www.vulnerability-lab.com/get_content.php?id=2201"]}, {"cve": "CVE-2020-7690", "desc": "All affected versions <2.0.0 of package jspdf are vulnerable to Cross-site Scripting (XSS). It is possible to inject JavaScript code via the html method.", "poc": ["https://snyk.io/vuln/SNYK-JS-JSPDF-575256"]}, {"cve": "CVE-2020-35532", "desc": "In LibRaw, an out-of-bounds read vulnerability exists within the \"simple_decode_row()\" function (libraw\\src\\x3f\\x3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field.", "poc": ["https://github.com/LibRaw/LibRaw/issues/271", "https://github.com/Live-Hack-CVE/CVE-2020-35532"]}, {"cve": "CVE-2020-6059", "desc": "An exploitable out of bounds read vulnerability exists in the way MiniSNMPD version 1.4 parses incoming SNMP packets. A specially crafted SNMP request can trigger an out of bounds memory read which can result in sensitive information disclosure and Denial Of Service. In order to trigger this vulnerability, an attacker needs to send a specially crafted packet to the vulnerable server.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2019-0976"]}, {"cve": "CVE-2020-1147", "desc": "A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input, aka '.NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability'.", "poc": ["http://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html", "http://packetstormsecurity.com/files/158876/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html", "http://packetstormsecurity.com/files/163644/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html", "https://github.com/ARPSyndicate/cvemon", "https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/Elsfa7-110/kenzer-templates", "https://github.com/H0j3n/EzpzSharepoint", "https://github.com/Ostorlab/KEV", "https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors", "https://github.com/SohelParashar/.Net-Deserialization-Cheat-Sheet", "https://github.com/amcai/myscan", "https://github.com/d4n-sec/d4n-sec.github.io", "https://github.com/hktalent/ysoserial.net", "https://github.com/merlinepedra/nuclei-templates", "https://github.com/merlinepedra25/nuclei-templates", "https://github.com/michael101096/cs2020_msels", "https://github.com/puckiestyle/ysoserial.net", "https://github.com/pwntester/ysoserial.net", "https://github.com/sobinge/nuclei-templates"]}, {"cve": "CVE-2020-2566", "desc": "Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Attachments / File Upload). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpujan2020.html"]}, {"cve": "CVE-2020-27240", "desc": "An exploitable SQL injection vulnerability exists in \u2018getAssets.jsp\u2019 page of OpenClinic GA 5.173.3. The componentStatus parameter in the getAssets.jsp page is vulnerable to unauthenticated SQL injection An attacker can make an authenticated HTTP request to trigger this vulnerability.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207", "https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-6542", "desc": "Use after free in ANGLE in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "poc": ["https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1127", "https://github.com/StarCrossPortal/bug-hunting-101"]}, {"cve": "CVE-2020-7757", "desc": "This affects all versions of package droppy. It is possible to traverse directories to fetch configuration files from a droopy server.", "poc": ["https://snyk.io/vuln/SNYK-JS-DROPPY-1023656"]}, {"cve": "CVE-2020-12593", "desc": "Symantec Endpoint Detection & Response, prior to 4.5, may be susceptible to an information disclosure issue, which is a type of vulnerability that could potentially allow unauthorized access to data.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/nasbench/CVE-2020-12593", "https://github.com/nasbench/nasbench", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/soosmile/POC"]}, {"cve": "CVE-2020-8105", "desc": "OS Command Injection vulnerability in the wirelessConnect handler of Abode iota All-In-One Security Kit allows an attacker to inject commands and gain root access. This issue affects: Abode iota All-In-One Security Kit versions prior to 1.0.2.23_6.9V_dev_t2_homekit_RF_2.0.19_s2_kvsABODE oz.", "poc": ["https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-theabode-iota-security-system-fake-image-injectioninto-timeline"]}, {"cve": "CVE-2020-27236", "desc": "An exploitable SQL injection vulnerability exists in \u2018getAssets.jsp\u2019 page of OpenClinic GA 5.173.3 in the compnomenclature parameter. An attacker can make an authenticated HTTP request to trigger this vulnerability.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207"]}, {"cve": "CVE-2020-9451", "desc": "An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe keeps a log in a folder where unprivileged users have write permissions. The logs are generated in a predictable pattern, allowing an unprivileged user to create a hardlink from a (not yet created) log file to anti_ransomware_service.exe. On reboot, this forces the anti_ransomware_service to try to write its log into its own process, crashing in a SHARING VIOLATION. This crash occurs on every reboot.", "poc": ["https://www.acronis.com"]}, {"cve": "CVE-2020-14834", "desc": "Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1 - 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Trade Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Trade Management accessible data as well as unauthorized update, insert or delete access to some of Oracle Trade Management accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpuoct2020.html"]}, {"cve": "CVE-2020-7661", "desc": "all versions of url-regex are vulnerable to Regular Expression Denial of Service. An attacker providing a very long string in String.test can cause a Denial of Service.", "poc": ["https://snyk.io/vuln/SNYK-JS-URLREGEX-569472", "https://github.com/0xT11/CVE-POC", "https://github.com/ARPSyndicate/cvemon", "https://github.com/NoodleOfDeath/social-bio-bot", "https://github.com/Pietruszka69/dddd", "https://github.com/beehunt9r/instagram-private-api", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/dilame/instagram-private-api", "https://github.com/engn33r/awesome-redos-security", "https://github.com/haxzie/streamon-instagram-private-api", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/ocavue/url-regex-unsafe", "https://github.com/remygin/ipa", "https://github.com/soosmile/POC", "https://github.com/spamscanner/url-regex-safe", "https://github.com/wdwdwd01/ipa"]}, {"cve": "CVE-2020-2650", "desc": "Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Promotions). The supported version that is affected is 16.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Customer Management and Segmentation Foundation. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Retail Customer Management and Segmentation Foundation accessible data as well as unauthorized read access to a subset of Oracle Retail Customer Management and Segmentation Foundation accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpujan2020.html"]}, {"cve": "CVE-2020-14788", "desc": "Vulnerability in the Oracle Communications Diameter Signaling Router (DSR) product of Oracle Communications (component: User Interface). Supported versions that are affected are 8.0.0.0-8.4.0.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Diameter Signaling Router (DSR). Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Diameter Signaling Router (DSR), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Diameter Signaling Router (DSR) accessible data as well as unauthorized read access to a subset of Oracle Communications Diameter Signaling Router (DSR) accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpuoct2020.html"]}, {"cve": "CVE-2020-3635", "desc": "Stack based overflow If the maximum number of arguments allowed per request in perflock exceeds in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8053, APQ8096AU, APQ8098, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QM215, Rennell, Saipan, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130", "poc": ["https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin"]}, {"cve": "CVE-2020-14157", "desc": "The wireless-communication feature of the ABUS Secvest FUBE50001 device does not encrypt sensitive data such as PIN codes or IDs of used proximity chip keys (RFID tokens). This makes it easier for an attacker to disarm the wireless alarm system.", "poc": ["http://packetstormsecurity.com/files/158204/ABUS-Secvest-Wireless-Control-Device-Missing-Encryption.html", "http://seclists.org/fulldisclosure/2020/Jun/26", "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-014.txt", "https://www.youtube.com/watch?v=kCqAVYyahLc", "https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-19144", "desc": "Buffer Overflow in LibTiff v4.0.10 allows attackers to cause a denial of service via the 'in _TIFFmemcpy' funtion in the component 'tif_unix.c'.", "poc": ["https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-35912", "desc": "An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedRwLockWriteGuard unsoundness.", "poc": ["https://github.com/Artisan-Lab/Rust-memory-safety-bugs"]}, {"cve": "CVE-2020-10193", "desc": "ESET Archive Support Module before 1294 allows virus-detection bypass via crafted RAR Compression Information in an archive. This affects versions before 1294 of Smart Security Premium, Internet Security, NOD32 Antivirus, Cyber Security Pro (macOS), Cyber Security (macOS), Mobile Security for Android, Smart TV Security, and NOD32 Antivirus 4 for Linux Desktop.", "poc": ["https://blog.zoller.lu/p/from-low-hanging-fruit-department_13.html"]}, {"cve": "CVE-2020-8134", "desc": "Server-side request forgery (SSRF) vulnerability in Ghost CMS < 3.10.0 allows an attacker to scan local or external network or otherwise interact with internal systems.", "poc": ["https://hackerone.com/reports/793704", "https://hackerone.com/reports/815084"]}, {"cve": "CVE-2020-15331", "desc": "Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a hardcoded OAUTH_SECRET_KEY in /opt/axess/etc/default/axess.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-15331"]}, {"cve": "CVE-2020-20589", "desc": "Cross Site Scripting (XSS) vulnerability in FeehiCMS 2.0.8 allows remote attackers to run arbitrary code via tha lang attribute of an html tag.", "poc": ["https://github.com/liufee/cms/issues/45", "https://github.com/Live-Hack-CVE/CVE-2020-20589"]}, {"cve": "CVE-2020-19877", "desc": "DBHcms v1.2.0 has a directory traversal vulnerability as there is no directory control function in directory /dbhcms/. A remote unauthenticated attacker can exploit this vulnerability to obtain server-sensitive information.", "poc": ["https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#1", "https://github.com/fragrant10/cve"]}, {"cve": "CVE-2020-7588", "desc": "A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions < V3.3), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC IT LMS (All versions < V2.6), SIMATIC IT Production Suite (All versions < V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). Sending a specially crafted packet to the affected service could cause a partial remote denial-of-service, that would cause the service to restart itself.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-7588"]}, {"cve": "CVE-2020-25950", "desc": "Advanced Webhost Billing System 3.7.0 is affected by Cross Site Request Forgery (CSRF) attacks that can delete a contact from the My Additional Contact page.", "poc": ["https://www.exploit-db.com/exploits/49369"]}, {"cve": "CVE-2020-3633", "desc": "Array out of bound may occur while playing mp3 file as no check is there on offset if it is greater than the buffer allocated or not in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8053, APQ8096AU, APQ8098, Kamorta, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909W, MSM8917, MSM8953, MSM8996AU, MSM8998, QCS405, QCS605, QM215, Rennell, Saipan, SDA660, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR2130", "poc": ["https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin"]}, {"cve": "CVE-2020-25139", "desc": "An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to Cross-Site Scripting (XSS) due to the fact that it is possible to inject and store malicious JavaScript code within it. This can occur via la_id to the /syslog_rules URI for delete_syslog_rule, because of syslog_rules.inc.php.", "poc": ["https://github.com/ARPSyndicate/cvemon", "https://github.com/afine-com/research", "https://github.com/afinepl/research"]}, {"cve": "CVE-2020-11258", "desc": "Memory corruption due to lack of validation of pointer arguments passed to Trustzone BSP in Snapdragon Wired Infrastructure and Networking", "poc": ["https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin"]}, {"cve": "CVE-2020-6314", "desc": "SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated HPGL file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.", "poc": ["https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-2770", "desc": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Logging). Supported versions that are affected are 8.0.18 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "poc": ["https://www.oracle.com/security-alerts/cpuapr2020.html"]}, {"cve": "CVE-2020-11449", "desc": "An issue was discovered on Technicolor TC7337 8.89.17 devices. An attacker can discover admin credentials in the backup file, aka backupsettings.conf.", "poc": ["https://github.com/RioIsDown/TC7337"]}, {"cve": "CVE-2020-25119", "desc": "The Admin CP in vBulletin 5.6.3 allows XSS via a Title of a Child Help Item in the Login/Logoff part of the User Manual.", "poc": ["https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-12604", "desc": "Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier is susceptible to increased memory usage in the case where an HTTP/2 client requests a large payload but does not send enough window updates to consume the entire stream and does not reset the stream.", "poc": ["https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-25820", "desc": "BigBlueButton before 2.2.7 allows remote authenticated users to read local files and conduct SSRF attacks via an uploaded Office document that has a crafted URL in an ODF xlink field.", "poc": ["http://packetstormsecurity.com/files/159667/BigBlueButton-2.2.25-File-Disclosure-Server-Side-Request-Forgery.html", "https://www.redteam-pentesting.de/advisories/rt-sa-2020-005"]}, {"cve": "CVE-2020-3530", "desc": "A vulnerability in task group assignment for a specific CLI command in Cisco IOS XR Software could allow an authenticated, local attacker to execute that command, even though administrative privileges should be required. The attacker must have valid credentials on the affected device. The vulnerability is due to incorrect mapping in the source code of task group assignments for a specific command. An attacker could exploit this vulnerability by issuing the command, which they should not be authorized to issue, on an affected device. A successful exploit could allow the attacker to invalidate the integrity of the disk and cause the device to restart. This vulnerability could allow a user with read permissions to issue a specific command that should require Administrator privileges.", "poc": ["https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-36333", "desc": "themegrill-demo-importer before 1.6.2 does not require authentication for wiping the database, because of a reset_wizard_actions hook.", "poc": ["https://www.openwall.com/lists/oss-security/2020/02/19/1"]}, {"cve": "CVE-2020-26420", "desc": "Memory leak in RTPS protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.", "poc": ["https://www.oracle.com/security-alerts/cpuApr2021.html", "https://github.com/Live-Hack-CVE/CVE-2020-26420"]}, {"cve": "CVE-2020-4702", "desc": "IBM InfoSphere Information Server 11.7 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 187187.", "poc": ["https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-24396", "desc": "homee Brain Cube v2 (2.28.2 and 2.28.4) devices have sensitive SSH keys within downloadable and unencrypted firmware images. This allows remote attackers to use the support server as a SOCKS proxy.", "poc": ["https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-027.txt", "https://www.syss.de/pentest-blog/", "https://github.com/Live-Hack-CVE/CVE-2020-24396"]}, {"cve": "CVE-2020-36230", "desc": "A flaw was discovered in OpenLDAP before 2.4.57 leading in an assertion failure in slapd in the X.509 DN parsing in decode.c ber_next_element, resulting in denial of service.", "poc": ["http://seclists.org/fulldisclosure/2021/May/64", "http://seclists.org/fulldisclosure/2021/May/65"]}, {"cve": "CVE-2020-1171", "desc": "A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads configuration files after opening a project, aka 'Visual Studio Code Python Extension Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1192.", "poc": ["https://github.com/ExpLangcn/FuYao-Go"]}, {"cve": "CVE-2020-10463", "desc": "Reflected XSS in admin/edit-template.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to inject arbitrary web script or HTML via the GET parameter p.", "poc": ["https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-template-cve-2020-10463", "https://github.com/Live-Hack-CVE/CVE-2020-10463"]}, {"cve": "CVE-2020-14712", "desc": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.0 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpujul2020.html"]}, {"cve": "CVE-2020-26153", "desc": "A cross-site scripting (XSS) vulnerability in wp-content/plugins/event-espresso-core-reg/admin_pages/messages/templates/ee_msg_admin_overview.template.php in the Event Espresso Core plugin before 4.10.7.p for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter.", "poc": ["https://labs.nettitude.com/blog/cve-2020-26153-event-espresso-core-cross-site-scripting/", "https://github.com/ARPSyndicate/cvemon", "https://github.com/ARPSyndicate/kenzer-templates"]}, {"cve": "CVE-2020-13790", "desc": "libjpeg-turbo 2.0.4, and mozjpeg 4.0.0, has a heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file.", "poc": ["https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-10427", "desc": "The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/manage-languages.php by adding a question mark (?) followed by the payload.", "poc": ["https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456", "https://github.com/Live-Hack-CVE/CVE-2020-10427"]}, {"cve": "CVE-2020-6369", "desc": "SAP Solution Manager and SAP Focused Run (update provided in WILY_INTRO_ENTERPRISE 9.7, 10.1, 10.5, 10.7), allows an unauthenticated attackers to bypass the authentication if the default passwords for Admin and Guest have not been changed by the administrator.This may impact the confidentiality of the service.", "poc": ["http://packetstormsecurity.com/files/163159/SAP-Wily-Introscope-Enterprise-Default-Hard-Coded-Credentials.html", "https://github.com/ARPSyndicate/cvemon", "https://github.com/Onapsis/vulnerability_advisories"]}, {"cve": "CVE-2020-14152", "desc": "In IJG JPEG (aka libjpeg) before 9d, jpeg_mem_available() in jmemnobs.c in djpeg does not honor the max_memory_to_use setting, possibly causing excessive memory consumption.", "poc": ["http://www.ijg.org/files/jpegsrc.v9d.tar.gz", "https://github.com/ARPSyndicate/cvemon"]}, {"cve": "CVE-2020-19717", "desc": "An unhandled memory allocation failure in Core/Ap48bdlAtom.cpp of Bento 1.5.1-628 causes a NULL pointer dereference, leading to a denial of service (DOS).", "poc": ["https://github.com/axiomatic-systems/Bento4/issues/416"]}, {"cve": "CVE-2020-13450", "desc": "A directory traversal vulnerability in file upload function of Gotenberg through 6.2.1 allows an attacker to upload and overwrite any writable files outside the intended folder. This can lead to DoS, a change to program behavior, or code execution.", "poc": ["http://packetstormsecurity.com/files/160744/Gotenberg-6.2.0-Traversal-Code-Execution-Insecure-Permissions.html", "https://github.com/br0xpl/gotenberg_hack"]}, {"cve": "CVE-2020-2091", "desc": "A missing permission check in Jenkins Amazon EC2 Plugin 1.47 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-2091"]}, {"cve": "CVE-2020-14096", "desc": "Memory overflow in Xiaomi AI speaker Rom version <1.59.6 can happen when the speaker verifying a malicious firmware during OTA process.", "poc": ["https://github.com/404notf0und/CVE-Flow", "https://github.com/f1tao/awesome-iot-security-resource"]}, {"cve": "CVE-2020-35313", "desc": "A server-side request forgery (SSRF) vulnerability in the addCustomThemePluginRepository function in index.php in WonderCMS 3.1.3 allows remote attackers to execute arbitrary code via a crafted URL to the theme/plugin installer.", "poc": ["https://packetstormsecurity.com/files/160310/WonderCMS-3.1.3-Code-Execution-Server-Side-Request-Forgery.html", "https://github.com/ARPSyndicate/cvemon", "https://github.com/fardeen-ahmed/Bug-bounty-Writeups"]}, {"cve": "CVE-2020-14655", "desc": "Vulnerability in the Oracle Security Service product of Oracle Fusion Middleware (component: SSL API). Supported versions that are affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Security Service. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Security Service accessible data as well as unauthorized update, insert or delete access to some of Oracle Security Service accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N).", "poc": ["https://www.oracle.com/security-alerts/cpujul2020.html"]}, {"cve": "CVE-2020-9390", "desc": "SquaredUp allowed Stored XSS before version 4.6.0. A user was able to create a dashboard that executed malicious content in iframe or by uploading an SVG that contained a script.", "poc": ["https://support.squaredup.com/hc/en-us/articles/360017568258", "https://support.squaredup.com/hc/en-us/articles/360019427258-CVE-2020-9390-Stored-cross-site-scripting"]}, {"cve": "CVE-2020-6445", "desc": "Insufficient policy enforcement in trusted types in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass content security policy via a crafted HTML page.", "poc": ["https://github.com/Live-Hack-CVE/CVE-2020-6445"]}, {"cve": "CVE-2020-6132", "desc": "SQL injection vulnerability exists in the ID parameters of OS4Ed openSIS 7.3 pages. The id parameter in the page ChooseCP.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-1077", "https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-24578", "desc": "An issue was discovered on D-Link DSL-2888A devices with firmware prior to AU_2.31_V1.1.47ae55. It has a misconfigured FTP service that allows a malicious network user to access system folders and download sensitive files (such as the password hash file).", "poc": ["https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabilities-leading-to-rce/", "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/", "https://github.com/0day404/vulnerability-poc", "https://github.com/ARPSyndicate/cvemon", "https://github.com/ArrestX/--POC", "https://github.com/KayCHENvip/vulnerability-poc", "https://github.com/Miraitowa70/POC-Notes", "https://github.com/SexyBeast233/SecBooks", "https://github.com/Threekiii/Awesome-POC", "https://github.com/d4n-sec/d4n-sec.github.io"]}, {"cve": "CVE-2020-23830", "desc": "A Cross-Site Request Forgery (CSRF) vulnerability in changeUsername.php in SourceCodester Stock Management System v1.0 allows remote attackers to deny future logins by changing an authenticated victim's username when they visit a third-party site.", "poc": ["https://www.exploit-db.com/exploits/48783", "https://github.com/404notf0und/CVE-Flow"]}, {"cve": "CVE-2020-13886", "desc": "Intelbras TIP 200 60.61.75.15, TIP 200 LITE 60.61.75.15, and TIP 300 65.61.75.22 devices allow cgi-bin/cgiServer.exx?page=../ Directory Traversal.", "poc": ["https://github.com/lucxssouza/CVE-2020-13886", "https://github.com/0xT11/CVE-POC", "https://github.com/ARPSyndicate/cvemon", "https://github.com/Ls4ss/CVE-2020-13886", "https://github.com/developer3000S/PoC-in-GitHub", "https://github.com/hectorgie/PoC-in-GitHub", "https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/soosmile/POC"]}, {"cve": "CVE-2020-15889", "desc": "Lua 5.4.0 has a getobjname heap-based buffer over-read because youngcollection in lgc.c uses markold for an insufficient number of list members.", "poc": ["http://lua-users.org/lists/lua-l/2020-07/msg00078.html"]}, {"cve": "CVE-2020-28592", "desc": "A heap-based buffer overflow vulnerability exists in the configuration server functionality of the Cosori Smart 5.8-Quart Air Fryer CS158-AF 1.1.0. A specially crafted JSON object can lead to remote code execution. An attacker can send a malicious packet to trigger this vulnerability.", "poc": ["https://talosintelligence.com/vulnerability_reports/TALOS-2020-1216", "https://github.com/Live-Hack-CVE/CVE-2020-28592"]}, {"cve": "CVE-2020-7676", "desc": "angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping \"