Skip to content

V1n1v131r4/My-CVEs

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

15 Commits
 
 

Repository files navigation

My CVEs

List of my CVE published

  • CVE-2019-19589 The Lever PDF Embedder plugin 4.4 for WordPress does not block the distribution of polyglot PDF documents that are valid JAR archives. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19589

  • CVE-2019-19889 An issue was discovered on Humax Wireless Voice Gateway HGB10R-2 20160817_1855 devices. The attacker can discover admin credentials in the backup file, aka backupsettings.conf. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19889

  • CVE-2019-19890 An issue was discovered on Humax Wireless Voice Gateway HGB10R-2 20160817_1855 devices. Admin credentials are sent over cleartext HTTP. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19890

  • CVE-2019-19916 In Midori Browser 0.5.11 (on Windows 10), Content Security Policy (CSP) is not applied correctly to all parts of multipart content sent with the multipart/x-mixed-replace MIME type. This could result in script running where CSP should have blocked it, allowing for cross-site scripting (XSS) and other attacks when the product renders the content as HTML. Remediating this would also need to consider the polyglot case, e.g., a file that is a valid GIF image and also valid JavaScript. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19916

  • CVE-2019-20203 The Authorized Addresses feature in the Postie plugin 1.9.40 for WordPress allows remote attackers to publish posts by spoofing the From information of an email message. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20203

  • CVE-2019-20204 The Postie plugin 1.9.40 for WordPress allows XSS, as demonstrated by a certain payload with jaVasCript:/* at the beginning and a crafted SVG element. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20204

  • CVE-2020-7241 The WP Database Backup plugin through 5.5 for WordPress stores downloads by default locally in the directory wp-content/uploads/db-backup/. This might allow attackers to read ZIP archives by guessing random ID numbers, guessing date strings with a 2020_{0..1}{0..2}_{0..3}{0..9} format, guessing UNIX timestamps, and making HTTPS requests with the complete guessed URL. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7241

  • CVE-2020-8658 The BestWebSoft Htaccess plugin through 1.8.1 for WordPress allows wp-admin/admin.php?page=htaccess.php&action=htaccess_editor CSRF. The flag htccss_nonce_name passes the nonce to WordPress but the plugin does not validate it correctly, resulting in a wrong implementation of anti-CSRF protection. In this way, an attacker is able to direct the victim to a malicious web page that modifies the .htaccess file, and takes control of the website. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8658

  • CVE-2021-45268 Backdrop CMS suffers from an Cross-site Request Forgery Vulnerability allowing Remote Attackers to gain Remote Code Execution (RCE) on the Hosting Webserver via uploading a maliciously add-on with crafted PHP file or create. This issue can be exploited creating an Admin user too. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45268

  • In Internet Explorer 11, Content Security Policy (CSP) is not applied correctly to all parts of multipart content sent with the multipart/x-mixed-replace MIME type. This could result in script running where CSP should have blocked it, allowing for cross-site scripting (XSS) and other attacks when the product renders the content as HTML. Remediating this would also need to consider the polyglot case, e.g., a file that is a valid GIF image and also valid JavaScript. [awaiting]

  • Bypass the Wordpress 5.3.1 Upload restrictions by using polymorphic files. [awaiting]

  • CVE-2020-23824 ArGo Soft Mail Server 1.8.8.9 is affected by Cross Site Request Forgery (CSRF) for perform remote arbitrary code execution. The component is the Administration dashboard. When using admin/user credentials, if the admin/user admin opens a website with the malicious page that will run the CSRF. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23824

  • 2021-3558 On Moodle 3.9.2 to 3.10.4 (core) When creating a course, you can upload HTML files as a resource. When uploading an HTML file containing an tag that has an XSS polyglot payload as "value" it is possible to perform a Cross-Site Scripting. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3558

About

List of my CVE published

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published