Skip to content

Commit

Permalink
Update Sun Feb 26 05:55:28 UTC 2023
Browse files Browse the repository at this point in the history
  • Loading branch information
trickest-workflows committed Feb 26, 2023
1 parent 48e27f5 commit a487d40
Show file tree
Hide file tree
Showing 7 changed files with 62 additions and 1 deletion.
1 change: 1 addition & 0 deletions 2013/CVE-2013-20002.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@ Elemin allows remote attackers to upload and execute arbitrary PHP code via the
#### Reference
- https://en.0day.today/exploit/22090
- https://packetstormsecurity.com/files/124149/WordPress-Elemin-Shell-Upload.html
- https://themify.me/blog/urgent-vulnerability-found-in-themify-framework-please-read

#### Github
No PoCs found on GitHub currently.
Expand Down
17 changes: 17 additions & 0 deletions 2017/CVE-2017-6197.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2017-6197](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6197)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description

The r_read_* functions in libr/include/r_endian.h in radare2 1.2.1 allow remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted binary file, as demonstrated by the r_read_le32 function.

### POC

#### Reference
- https://github.com/radare/radare2/issues/6816

#### Github
No PoCs found on GitHub currently.

17 changes: 17 additions & 0 deletions 2019/CVE-2019-20751.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2019-20751](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20751)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description

Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.60, DM200 before 1.0.0.61, EX2700 before 1.0.1.48, EX6100v2 before 1.0.1.76, EX6150v2 before 1.0.1.76, EX6200v2 before 1.0.1.72, EX8000 before 1.0.1.180, R7800 before 1.0.2.52, R8900 before 1.0.4.26, R9000 before 1.0.4.26, WN2000RPTv3 before 1.0.1.32, WN3000RPv2 before 1.0.0.68, WN3000RPv3 before 1.0.2.70, WN3100RPv2 before 1.0.0.66, WNDR4300v2 before 1.0.0.58, WNDR4500v3 before 1.0.0.58, and WNR2000v5 before 1.0.0.68.

### POC

#### Reference
- https://kb.netgear.com/000060964/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Extenders-Gateways-and-Routers-PSV-2018-0171

#### Github
No PoCs found on GitHub currently.

17 changes: 17 additions & 0 deletions 2021/CVE-2021-45576.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2021-45576](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45576)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.

### POC

#### Reference
- https://kb.netgear.com/000064098/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0084

#### Github
No PoCs found on GitHub currently.

1 change: 1 addition & 0 deletions 2022/CVE-2022-24900.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@ Piano LED Visualizer is software that allows LED lights to light up as a person

#### Reference
- https://github.com/onlaj/Piano-LED-Visualizer/issues/350
- https://github.com/onlaj/Piano-LED-Visualizer/pull/351
- https://github.com/onlaj/Piano-LED-Visualizer/security/advisories/GHSA-g78x-q3x8-r6m4

#### Github
Expand Down
3 changes: 2 additions & 1 deletion 2022/CVE-2022-46440.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,8 @@ ttftool v0.9.2 was discovered to contain a segmentation violation via the readU1
### POC

#### Reference
No PoCs from references.
- https://github.com/keepinggg/poc
- https://github.com/matthiaskramm/swftools/issues/194

#### Github
- https://github.com/keepinggg/poc
Expand Down
7 changes: 7 additions & 0 deletions references.txt
Original file line number Diff line number Diff line change
Expand Up @@ -19132,6 +19132,7 @@ CVE-2013-1979 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176
CVE-2013-1979 - http://www.openwall.com/lists/oss-security/2013/04/29/1
CVE-2013-20002 - https://en.0day.today/exploit/22090
CVE-2013-20002 - https://packetstormsecurity.com/files/124149/WordPress-Elemin-Shell-Upload.html
CVE-2013-20002 - https://themify.me/blog/urgent-vulnerability-found-in-themify-framework-please-read
CVE-2013-20003 - https://orangecyberdefense.com/global/blog/sensepost/blackhat-conference-z-wave-security/
CVE-2013-20003 - https://sensepost.com/cms/resources/conferences/2013/bh_zwave/Security%20Evaluation%20of%20Z-Wave_WP.pdf
CVE-2013-2006 - https://bugs.launchpad.net/ossn/+bug/1168252
Expand Down Expand Up @@ -38773,6 +38774,7 @@ CVE-2017-6193 - https://www.exploit-db.com/exploits/41669/
CVE-2017-6194 - https://github.com/radare/radare2/issues/6829
CVE-2017-6195 - https://www.siberas.de/assets/papers/ssa-1705_IPSWITCH_SQLinjection.txt
CVE-2017-6196 - https://bugs.ghostscript.com/show_bug.cgi?id=697596
CVE-2017-6197 - https://github.com/radare/radare2/issues/6816
CVE-2017-6199 - https://sandstorm.io/news/2017-03-02-security-review
CVE-2017-6200 - https://sandstorm.io/news/2017-03-02-security-review
CVE-2017-6201 - https://sandstorm.io/news/2017-03-02-security-review
Expand Down Expand Up @@ -50980,6 +50982,7 @@ CVE-2019-20737 - https://kb.netgear.com/000061188/Security-Advisory-for-Pre-Auth
CVE-2019-20739 - https://kb.netgear.com/000061179/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-R8500-PSV-2017-0636
CVE-2019-20740 - https://kb.netgear.com/000060976/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2018-0258
CVE-2019-20746 - https://kb.netgear.com/000060973/Security-Advisory-for-Reflected-Cross-Site-Scripting-on-Some-Routers-Gateways-and-WiFi-Systems-PSV-2018-0252
CVE-2019-20751 - https://kb.netgear.com/000060964/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Extenders-Gateways-and-Routers-PSV-2018-0171
CVE-2019-20752 - https://kb.netgear.com/000060967/Security-Advisory-for-Site-Stored-Cross-Scripting-on-Some-Gateways-Routers-and-WiFi-Systems-PSV-2018-0250
CVE-2019-20760 - https://kb.netgear.com/000060639/Security-Advisory-for-Authentication-Bypass-on-R9000-PSV-2018-0615
CVE-2019-20761 - https://kb.netgear.com/000060638/Security-Advisory-for-Post-Authentication-Command-Injection-on-R7800-PSV-2018-0383
Expand Down Expand Up @@ -65296,6 +65299,7 @@ CVE-2021-45515 - https://kb.netgear.com/000064484/Security-Advisory-for-Denial-o
CVE-2021-45536 - https://kb.netgear.com/000064080/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0056
CVE-2021-45542 - https://kb.netgear.com/000064143/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0540
CVE-2021-45543 - https://kb.netgear.com/000064517/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0541
CVE-2021-45576 - https://kb.netgear.com/000064098/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0084
CVE-2021-45587 - https://kb.netgear.com/000064109/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0095
CVE-2021-45607 - https://kb.netgear.com/000064531/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-PSV-2021-0128
CVE-2021-45608 - https://www.sentinelone.com/labs/cve-2021-45608-netusb-rce-flaw-in-millions-of-end-user-routers/
Expand Down Expand Up @@ -67199,6 +67203,7 @@ CVE-2022-2488 - https://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink
CVE-2022-2489 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-E-Learning-System.md
CVE-2022-2490 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-E-Learning-System.md#search.php
CVE-2022-24900 - https://github.com/onlaj/Piano-LED-Visualizer/issues/350
CVE-2022-24900 - https://github.com/onlaj/Piano-LED-Visualizer/pull/351
CVE-2022-24900 - https://github.com/onlaj/Piano-LED-Visualizer/security/advisories/GHSA-g78x-q3x8-r6m4
CVE-2022-2491 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Library-Management-System-with-QR-code-Attendance-and-Auto-Generate-Library-Card.md
CVE-2022-2491 - https://vuldb.com/?id.204574
Expand Down Expand Up @@ -71082,6 +71087,8 @@ CVE-2022-46432 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/B1Vgv1uwo
CVE-2022-46434 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/rJl69Icws
CVE-2022-46435 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/SyvnlO9Pi
CVE-2022-4644 - https://huntr.dev/bounties/77e5f425-c764-4cb0-936a-7a76bfcf19b0
CVE-2022-46440 - https://github.com/keepinggg/poc
CVE-2022-46440 - https://github.com/matthiaskramm/swftools/issues/194
CVE-2022-46443 - https://www.youtube.com/watch?v=Dmjk6uOU8vY
CVE-2022-46443 - https://yuyudhn.github.io/CVE-2022-46443/
CVE-2022-4646 - https://huntr.dev/bounties/17bc1b0f-1f5c-432f-88e4-c9866ccf6e10
Expand Down

0 comments on commit a487d40

Please sign in to comment.