Skip to content

Commit

Permalink
Update Sun Feb 27 08:01:23 UTC 2022
Browse files Browse the repository at this point in the history
  • Loading branch information
trickest-workflows committed Feb 27, 2022
1 parent dad269f commit 9a13ced
Show file tree
Hide file tree
Showing 292 changed files with 3,336 additions and 45 deletions.
1 change: 1 addition & 0 deletions 2012/CVE-2012-2098.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@ Algorithmic complexity vulnerability in the sorting algorithms in bzip2 compress

#### Reference
- http://packetstormsecurity.org/files/113014/Apache-Commons-Compress-Apache-Ant-Denial-Of-Service.html
- https://www.oracle.com/security-alerts/cpujan2021.html

#### Github
- https://github.com/BrunoBonacci/lein-binplus
Expand Down
1 change: 1 addition & 0 deletions 2015/CVE-2015-4000.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@ The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a
#### Reference
- https://weakdh.org/
- https://weakdh.org/imperfect-forward-secrecy.pdf
- https://www.oracle.com/security-alerts/cpujan2021.html

#### Github
- https://github.com/84KaliPleXon3/a2sv
Expand Down
17 changes: 17 additions & 0 deletions 2015/CVE-2015-8965.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2015-8965](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8965)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description

Rogue Wave JViews before 8.8 patch 21 and 8.9 before patch 1 allows remote attackers to execute arbitrary Java code that exists in the classpath, such as test code or administration code. The issue exists because the ilog.views.faces.IlvFacesController servlet in jviews-framework-all.jar does not require explicit configuration of servlets that can be called.

### POC

#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html

#### Github
No PoCs found on GitHub currently.

1 change: 1 addition & 0 deletions 2016/CVE-2016-1000031.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Cod
### POC

#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/research/tra-2016-23
- https://www.tenable.com/security/research/tra-2016-30
Expand Down
17 changes: 17 additions & 0 deletions 2016/CVE-2016-4560.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2016-4560](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4560)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description

Untrusted search path vulnerability in Flexera InstallAnywhere allows local users to gain privileges via a Trojan horse DLL in the current working directory of a setup-launcher executable file.

### POC

#### Reference
- http://www-01.ibm.com/support/docview.wss?uid=swg21985483

#### Github
No PoCs found on GitHub currently.

1 change: 1 addition & 0 deletions 2016/CVE-2016-5725.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,7 @@ Directory traversal vulnerability in JCraft JSch before 0.1.54 on Windows, when
- http://seclists.org/fulldisclosure/2016/Sep/53
- https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-5725
- https://www.exploit-db.com/exploits/40411/
- https://www.oracle.com/security-alerts/cpujan2021.html

#### Github
- https://github.com/mergebase/csv-compare
Expand Down
1 change: 1 addition & 0 deletions 2017/CVE-2017-12626.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service
### POC

#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html

#### Github
Expand Down
17 changes: 17 additions & 0 deletions 2017/CVE-2017-5611.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2017-5611](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description

SQL injection vulnerability in wp-includes/class-wp-query.php in WP_Query in WordPress before 4.7.2 allows remote attackers to execute arbitrary SQL commands by leveraging the presence of an affected plugin or theme that mishandles a crafted post type name.

### POC

#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html

#### Github
No PoCs found on GitHub currently.

1 change: 1 addition & 0 deletions 2017/CVE-2017-5645.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket
### POC

#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html

#### Github
Expand Down
17 changes: 17 additions & 0 deletions 2017/CVE-2017-8028.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2017-8028](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8028)
![](https://img.shields.io/static/v1?label=Product&message=Spring-LDAP%20Spring-LDAP%20versions%201.3.0%202.3.1&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=authentication%20with%20arbitrary%20password&color=brighgreen)

### Description

In Pivotal Spring-LDAP versions 1.3.0 - 2.3.1, when connected to some LDAP servers, when no additional attributes are bound, and when using LDAP BindAuthenticator with org.springframework.ldap.core.support.DefaultTlsDirContextAuthenticationStrategy as the authentication strategy, and setting userSearch, authentication is allowed with an arbitrary password when the username is correct. This occurs because some LDAP vendors require an explicit operation for the LDAP bind to take effect.

### POC

#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html

#### Github
No PoCs found on GitHub currently.

1 change: 1 addition & 0 deletions 2018/CVE-2018-0732.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ During key agreement in a TLS handshake using a DH(E) based ciphersuite a malici
### POC

#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.tenable.com/security/tns-2018-17

#### Github
Expand Down
1 change: 1 addition & 0 deletions 2018/CVE-2018-10237.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allo
### POC

#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html

#### Github
Expand Down
17 changes: 17 additions & 0 deletions 2018/CVE-2018-11775.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2018-11775](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11775)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20ActiveMQ&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Missing%20TLS%20Hostname%20Verification&color=brighgreen)

### Description

TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default.

### POC

#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html

#### Github
No PoCs found on GitHub currently.

1 change: 1 addition & 0 deletions 2018/CVE-2018-1258.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ Spring Framework version 5.0.5 when used in combination with any versions of Spr
### POC

#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html

#### Github
Expand Down
2 changes: 1 addition & 1 deletion 2018/CVE-2018-1285.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ Apache log4net versions before 2.0.10 do not disable XML external entities when
### POC

#### Reference
No PoCs from references.
- https://www.oracle.com/security-alerts/cpujan2021.html

#### Github
- https://github.com/p1ay8y3ar/cve_monitor
Expand Down
1 change: 1 addition & 0 deletions 2018/CVE-2018-15756.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x pr
### POC

#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html

#### Github
Expand Down
2 changes: 1 addition & 1 deletion 2018/CVE-2018-20781.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is k
### POC

#### Reference
No PoCs from references.
- https://www.oracle.com/security-alerts/cpujan2021.html

#### Github
- https://github.com/huntergregal/mimipenguin
Expand Down
19 changes: 19 additions & 0 deletions 2018/CVE-2018-2587.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
### [CVE-2018-2587](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2587)
![](https://img.shields.io/static/v1?label=Product&message=Access%20Manager&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Adaptive%20Access%20Manager&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%2010.1.4.3.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3D%2011.1.2.3.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Access%20Manager.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Access%20Manager%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Access%20Manager%20accessible%20data.&color=brighgreen)

### Description

Vulnerability in the Oracle Access Manager component of Oracle Fusion Middleware (subcomponent: Web Server Plugin). Supported versions that are affected are 10.1.4.3.0, 11.1.2.3.0 and 12.2.1.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Access Manager accessible data as well as unauthorized read access to a subset of Oracle Access Manager accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N).

### POC

#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html

#### Github
No PoCs found on GitHub currently.

1 change: 1 addition & 0 deletions 2018/CVE-2018-7318.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@ SQL Injection exists in the CheckList 1.1.1 component for Joomla! via the title_

#### Reference
- https://exploit-db.com/exploits/44163
- https://www.oracle.com/security-alerts/cpujan2021.html

#### Github
No PoCs found on GitHub currently.
Expand Down
1 change: 1 addition & 0 deletions 2018/CVE-2018-8032.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ Apache Axis 1.x up to and including 1.4 is vulnerable to a cross-site scripting
### POC

#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html

#### Github
Expand Down
17 changes: 17 additions & 0 deletions 2018/CVE-2018-9019.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2018-9019](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9019)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description

SQL Injection vulnerability in Dolibarr before version 7.0.2 allows remote attackers to execute arbitrary SQL commands via the sortfield parameter to /accountancy/admin/accountmodel.php, /accountancy/admin/categories_list.php, /accountancy/admin/journals_list.php, /admin/dict.php, /admin/mails_templates.php, or /admin/website.php.

### POC

#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html

#### Github
No PoCs found on GitHub currently.

1 change: 1 addition & 0 deletions 2019/CVE-2019-0188.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ Apache Camel prior to 2.24.0 contains an XML external entity injection (XXE) vul
### POC

#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html

#### Github
Expand Down
1 change: 1 addition & 0 deletions 2019/CVE-2019-0227.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@ A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4

#### Reference
- https://rhinosecuritylabs.com/application-security/cve-2019-0227-expired-domain-rce-apache-axis/
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html

#### Github
Expand Down
1 change: 1 addition & 0 deletions 2019/CVE-2019-0230.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@ Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on r
#### Reference
- http://packetstormsecurity.com/files/160108/Apache-Struts-2.5.20-Double-OGNL-Evaluation.html
- http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html
- https://www.oracle.com/security-alerts/cpujan2021.html

#### Github
- https://github.com/0day666/Vulnerability-verification
Expand Down
17 changes: 17 additions & 0 deletions 2019/CVE-2019-0233.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2019-0233](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0233)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20Struts&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Denial%20of%20Service&color=brighgreen)

### Description

An access permission override in Apache Struts 2.0.0 to 2.5.20 may cause a Denial of Service when performing a file upload.

### POC

#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html

#### Github
No PoCs found on GitHub currently.

1 change: 1 addition & 0 deletions 2019/CVE-2019-10086.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added wh
### POC

#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html

#### Github
Expand Down
2 changes: 1 addition & 1 deletion 2019/CVE-2019-10173.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ It was found that xstream API version 1.4.10 before 1.4.11 introduced a regressi
### POC

#### Reference
No PoCs from references.
- https://www.oracle.com/security-alerts/cpujan2021.html

#### Github
- https://github.com/CnHack3r/Penetration_PoC
Expand Down
1 change: 1 addition & 0 deletions 2019/CVE-2019-10246.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ In Eclipse Jetty version 9.2.27, 9.3.26, and 9.4.16, the server running on Windo
### POC

#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html

#### Github
Expand Down
1 change: 1 addition & 0 deletions 2019/CVE-2019-10247.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.1
### POC

#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html

#### Github
Expand Down
1 change: 1 addition & 0 deletions 2019/CVE-2019-10744.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@ Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The

#### Reference
- https://snyk.io/vuln/SNYK-JS-LODASH-450202
- https://www.oracle.com/security-alerts/cpujan2021.html

#### Github
- https://github.com/A2u13/JS-Security
Expand Down
1 change: 1 addition & 0 deletions 2019/CVE-2019-11135.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@ TSX Asynchronous Abort condition on some CPUs utilizing speculative execution ma
#### Reference
- http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html
- https://www.oracle.com/security-alerts/cpujan2021.html

#### Github
- https://github.com/codexlynx/hardware-attacks-state-of-the-art
Expand Down
1 change: 1 addition & 0 deletions 2019/CVE-2019-11269.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@ Spring Security OAuth versions 2.3 prior to 2.3.6, 2.2 prior to 2.2.5, 2.1 prior

#### Reference
- http://packetstormsecurity.com/files/153299/Spring-Security-OAuth-2.3-Open-Redirection.html
- https://www.oracle.com/security-alerts/cpujan2021.html

#### Github
- https://github.com/BBB-man/CVE-2019-3778-Spring-Security-OAuth-2.3-Open-Redirection
Expand Down
2 changes: 2 additions & 0 deletions 2019/CVE-2019-11358.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan
- http://seclists.org/fulldisclosure/2019/May/13
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601
- https://seclists.org/bugtraq/2019/May/18
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2019-08
- https://www.tenable.com/security/tns-2020-02
Expand Down Expand Up @@ -814,6 +815,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan
- https://github.com/ashwinj/FTC_camp
- https://github.com/ashwinj/Taus2021-2
- https://github.com/ashwinj/UltimateGoal2020
- https://github.com/ashwinj/UltimateGoalState
- https://github.com/atkindc/IL_FTC_Minibots
- https://github.com/atlee-circuitree/ULTIMATEGOAL
- https://github.com/atoneyd/FtcRobotController-6.0
Expand Down
17 changes: 17 additions & 0 deletions 2019/CVE-2019-12399.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2019-12399](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12399)
![](https://img.shields.io/static/v1?label=Product&message=Kafka&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Disclosure&color=brighgreen)

### Description

When Connect workers in Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, or 2.3.0 are configured with one or more config providers, and a connector is created/updated on that Connect cluster to use an externalized secret variable in a substring of a connector configuration property value, then any client can issue a request to the same Connect cluster to obtain the connector's task configuration and the response will contain the plaintext secret rather than the externalized secrets variables.

### POC

#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html

#### Github
No PoCs found on GitHub currently.

1 change: 1 addition & 0 deletions 2019/CVE-2019-12402.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ The file name encoding algorithm used internally in Apache Commons Compress 1.15
### POC

#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html

#### Github
Expand Down
1 change: 1 addition & 0 deletions 2019/CVE-2019-12415.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-p
### POC

#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html

#### Github
Expand Down
1 change: 1 addition & 0 deletions 2019/CVE-2019-13990.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz S
### POC

#### Reference
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html

#### Github
Expand Down
Loading

0 comments on commit 9a13ced

Please sign in to comment.