forked from trickest/cve
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
56f58fd
commit c72a7ee
Showing
108 changed files
with
1,240 additions
and
5 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2019-0367](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0367) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20NetWeaver%20Process%20Integration%20(B2B%20Toolkit)&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3C1.0%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Missing%20Authorization%20Check&color=brighgreen) | ||
|
||
### Description | ||
|
||
SAP NetWeaver Process Integration (B2B Toolkit), before versions 1.0 and 2.0, does not perform necessary authorization checks for an authenticated user, allowing the import of B2B table content that leads to Missing Authorization Check. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
### [CVE-2019-0368](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0368) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20Customer%20Relationship%20Management%20(Email%20Management%20-%20BBPCRM)&color=blue) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20Customer%20Relationship%20Management%20(Email%20Management%20-%20S4CRM)&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3C1.0%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3C7.0%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-Site%20Scripting&color=brighgreen) | ||
|
||
### Description | ||
|
||
SAP Customer Relationship Management (Email Management), versions: S4CRM before 1.0 and 2.0, BBPCRM before 7.0, 7.01, 7.02, 7.12, 7.13 and 7.14, does not sufficiently encode user-controlled inputs within the mail client resulting in Cross-Site Scripting vulnerability. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2019-0369](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0369) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20Financial%20Consolidation&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3C10.0%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-Site%20Scripting&color=brighgreen) | ||
|
||
### Description | ||
|
||
SAP Financial Consolidation, before versions 10.0 and 10.1, does not sufficiently encode user-controlled inputs, which allows an attacker to execute scripts by uploading files containing malicious scripts, leading to reflected cross site scripting vulnerability. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2019-0370](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0370) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20Financial%20Consolidation&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3C10.0%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Others&color=brighgreen) | ||
|
||
### Description | ||
|
||
Due to missing input validation, SAP Financial Consolidation, before versions 10.0 and 10.1, enables an attacker to use crafted input to interfere with the structure of the surrounding query leading to XPath Injection. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2019-0374](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0374) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20BusinessObjects%20Business%20Intelligence%20Platform%20(Web%20Intelligence%20HTML%20interface)&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3C4.2%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-Site%20Scripting&color=brighgreen) | ||
|
||
### Description | ||
|
||
SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface), before versions 4.2 and 4.3, does not sufficiently encode user-controlled inputs and allows execution of scripts in the chart title resulting in reflected Cross-Site Scripting | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2019-0375](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0375) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20BusinessObjects%20Business%20Intelligence%20Platform%20(Web%20Intelligence%20HTML%20interface)&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3C4.2%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-Site%20Scripting&color=brighgreen) | ||
|
||
### Description | ||
|
||
SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface), before versions 4.2 and 4.3, does not sufficiently encode user-controlled inputs and allows execution of scripts in the export dialog box of the report name resulting in reflected Cross-Site Scripting. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2019-0376](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0376) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20BusinessObjects%20Business%20Intelligence%20Platform%20(Web%20Intelligence%20HTML%20interface)&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3C4.2%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-Site%20Scripting&color=brighgreen) | ||
|
||
### Description | ||
|
||
SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface), before versions 4.2 and 4.3, does not sufficiently encode user-controlled inputs and allows an attacker to save malicious scripts in the publication name, which can be executed later by the victim, resulting in Stored Cross-Site Scripting. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2019-0377](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0377) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20BusinessObjects%20Business%20Intelligence%20Platform%20(Web%20Intelligence%20HTML%20interface)&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3C4.2%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-Site%20Scripting&color=brighgreen) | ||
|
||
### Description | ||
|
||
SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface), before versions 4.2, does not sufficiently encode user-controlled inputs and allows an attacker to store malicious scripts in the input controls, resulting in Stored Cross-Site Scripting. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2019-0378](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0378) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20BusinessObjects%20Business%20Intelligence%20Platform%20(Web%20Intelligence%20HTML%20interface)&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3C4.2%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-Site%20Scripting&color=brighgreen) | ||
|
||
### Description | ||
|
||
SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface), before version 4.2, does not sufficiently encode user-controlled inputs and allows an attacker to store malicious scripts in the file name of the background image resulting in Stored Cross-Site Scripting. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2019-0380](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0380) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20Landscape%20Management%20enterprise%20edition&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3C3.0%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=%20Information%20Disclosure&color=brighgreen) | ||
|
||
### Description | ||
|
||
Under certain conditions, SAP Landscape Management enterprise edition, before version 3.0, allows custom secure parameters’ default values to be part of the application logs leading to Information Disclosure. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2020-15416](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15416) | ||
![](https://img.shields.io/static/v1?label=Product&message=R6700&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-121%3A%20Stack-based%20Buffer%20Overflow&color=brighgreen) | ||
|
||
### Description | ||
|
||
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9703. | ||
|
||
### POC | ||
|
||
#### Reference | ||
No PoCs from references. | ||
|
||
#### Github | ||
- https://github.com/k3vinlusec/R7000_httpd_BOF_CVE-2020-15416 | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.