mirror of
https://github.com/0xMarcio/cve.git
synced 2026-02-12 18:42:46 +00:00
Update CVE sources 2025-09-29 16:08
This commit is contained in:
34
2024/CVE-2024-0001.md
Normal file
34
2024/CVE-2024-0001.md
Normal file
@@ -0,0 +1,34 @@
|
||||
### [CVE-2024-0001](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0001)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A condition exists in FlashArray Purity whereby a local account intended for initial array configuration remains active potentially allowing a malicious actor to gain elevated privileges.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/ADA-XiaoYao/ADA-XiaoYao-ADA-ZeroDay-Framework-CLI
|
||||
- https://github.com/GerriaLeSure/cybersecurity-risk-assessment-platform
|
||||
- https://github.com/Harrywang12/lockdown
|
||||
- https://github.com/Mahdi-Assadi/Text_Clustering
|
||||
- https://github.com/ProjectZeroDays/AI-Driven-Zero-Click-Exploit-Deployment-Framework
|
||||
- https://github.com/RobloxSecurityResearcher/RobloxVulnerabilityCVE-2024-0001
|
||||
- https://github.com/SV-ZeroOne/cyber-ai-info
|
||||
- https://github.com/Victorkib/vulnscope
|
||||
- https://github.com/allensuvorov/vuln-scan-query
|
||||
- https://github.com/arshiyaazizi/Unique-Vulnerability-Identification-API-
|
||||
- https://github.com/bendrorr/vulnerability-management
|
||||
- https://github.com/jiupta/CVE-2024-0001-EXP
|
||||
- https://github.com/mauvehed/kevvy
|
||||
- https://github.com/miketigerblue/chroma-curator
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/pgdn-network/pgdn-cve
|
||||
- https://github.com/shashwat12304/cyber-graph-viz
|
||||
- https://github.com/zefparis/zero-click-benji
|
||||
|
||||
19
2024/CVE-2024-0002.md
Normal file
19
2024/CVE-2024-0002.md
Normal file
@@ -0,0 +1,19 @@
|
||||
### [CVE-2024-0002](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0002)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A condition exists in FlashArray Purity whereby an attacker can employ a privileged account allowing remote access to the array.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/ProjectZeroDays/AI-Driven-Zero-Click-Exploit-Deployment-Framework
|
||||
- https://github.com/Victorkib/vulnscope
|
||||
- https://github.com/zefparis/zero-click-benji
|
||||
|
||||
19
2024/CVE-2024-0003.md
Normal file
19
2024/CVE-2024-0003.md
Normal file
@@ -0,0 +1,19 @@
|
||||
### [CVE-2024-0003](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0003)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A condition exists in FlashArray Purity whereby a malicious user could use a remote administrative service to create an account on the array allowing privileged access.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/ProjectZeroDays/AI-Driven-Zero-Click-Exploit-Deployment-Framework
|
||||
- https://github.com/Victorkib/vulnscope
|
||||
- https://github.com/zefparis/zero-click-benji
|
||||
|
||||
18
2024/CVE-2024-0004.md
Normal file
18
2024/CVE-2024-0004.md
Normal file
@@ -0,0 +1,18 @@
|
||||
### [CVE-2024-0004](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0004)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
A condition exists in FlashArray Purity whereby an user with array admin role can execute arbitrary commands remotely to escalate privilege on the array.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/ProjectZeroDays/AI-Driven-Zero-Click-Exploit-Deployment-Framework
|
||||
- https://github.com/zefparis/zero-click-benji
|
||||
|
||||
20
2024/CVE-2024-0005.md
Normal file
20
2024/CVE-2024-0005.md
Normal file
@@ -0,0 +1,20 @@
|
||||
### [CVE-2024-0005](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0005)
|
||||

|
||||

|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
A condition exists in FlashArray and FlashBlade Purity whereby a malicious user could execute arbitrary commands remotely through a specifically crafted SNMP configuration.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/ProjectZeroDays/AI-Driven-Zero-Click-Exploit-Deployment-Framework
|
||||
- https://github.com/zefparis/zero-click-benji
|
||||
|
||||
@@ -15,5 +15,6 @@ A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect portal
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/Manisha-03/XSS_Vulnerability
|
||||
- https://github.com/afine-com/research
|
||||
|
||||
|
||||
42
2024/CVE-2024-0012.md
Normal file
42
2024/CVE-2024-0012.md
Normal file
@@ -0,0 +1,42 @@
|
||||
### [CVE-2024-0012](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0012)
|
||||

|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474 https://security.paloaltonetworks.com/CVE-2024-9474 .The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software.Cloud NGFW and Prisma Access are not impacted by this vulnerability.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/0xjessie21/CVE-2024-0012
|
||||
- https://github.com/Mattb709/HELLCAT-Practical-Initial-Access-Guide-for-Red-Teams
|
||||
- https://github.com/Ostorlab/KEV
|
||||
- https://github.com/Regent8SH/PanOsExploitMultitool
|
||||
- https://github.com/Sachinart/CVE-2024-0012-POC
|
||||
- https://github.com/TalatumLabs/CVE-2024-0012_CVE-2024-9474_PoC
|
||||
- https://github.com/Threekiii/CVE
|
||||
- https://github.com/XiaomingX/awesome-cve-exp-poc
|
||||
- https://github.com/XiaomingX/cve-2024-0012-poc
|
||||
- https://github.com/aratane/CVE-2024-9474
|
||||
- https://github.com/crosswk/paloalto-cve-parser
|
||||
- https://github.com/dcollaoa/cve-2024-0012-gui-poc
|
||||
- https://github.com/greaselovely/CVE-2024-0012
|
||||
- https://github.com/iSee857/CVE-2024-0012-poc
|
||||
- https://github.com/k4nfr3/CVE-2024-9474
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/packetinside/CISA_BOT
|
||||
- https://github.com/plzheheplztrying/cve_monitor
|
||||
- https://github.com/punitdarji/Paloalto-CVE-2024-0012
|
||||
- https://github.com/rxerium/stars
|
||||
- https://github.com/tylzars/awesome-vrre-writeups
|
||||
- https://github.com/watchtowrlabs/palo-alto-panos-cve-2024-0012
|
||||
- https://github.com/zentrybox/worker-orchestator
|
||||
- https://github.com/zero16sec/panos-security-advisor
|
||||
|
||||
@@ -13,5 +13,6 @@ In ConvertRGBToPlanarYUV of Codec2BufferUtils.cpp, there is a possible out of bo
|
||||
- https://android.googlesource.com/platform/frameworks/av/+/30b1b34cfd5abfcfee759e7d13167d368ac6c268
|
||||
|
||||
#### Github
|
||||
- https://github.com/AbrarKhan/G3_Frameworks_av_CVE-2024-0023
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
||||
|
||||
@@ -15,4 +15,5 @@ No PoCs from references.
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/uthrasri/system_bt_CVE-2024-0030
|
||||
|
||||
|
||||
@@ -14,5 +14,6 @@ No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/41yn14/CVE-2024-0039-Exploit
|
||||
- https://github.com/MssGmz99/fix-02-failure-CVE-2024-31319-CVE-2024-0039
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
||||
|
||||
@@ -15,4 +15,5 @@ No PoCs from references.
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/uthrasri/frameworks_av_CVE-2024-0040
|
||||
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
### [CVE-2024-0044](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0044)
|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
@@ -14,10 +14,30 @@ In createSessionInternal of PackageInstallerService.java, there is a possible ru
|
||||
- https://rtx.meta.security/exploitation/2024/03/04/Android-run-as-forgery.html
|
||||
|
||||
#### Github
|
||||
- https://github.com/007CRIPTOGRAFIA/c-CVE-2024-0044
|
||||
- https://github.com/0xMarcio/cve
|
||||
- https://github.com/0xbinder/CVE-2024-0044
|
||||
- https://github.com/Andromeda254/cve
|
||||
- https://github.com/Ankitkushwaha90/trysanityapp
|
||||
- https://github.com/BlackTom900131/awesome-game-security
|
||||
- https://github.com/Dit-Developers/CVE-2024-0044-
|
||||
- https://github.com/GhostTroops/TOP
|
||||
- https://github.com/JackBlack818/Evil-Droid
|
||||
- https://github.com/Kai2er/CVE-2024-0044-EXP
|
||||
- https://github.com/MrW0l05zyn/cve-2024-0044
|
||||
- https://github.com/Re13orn/CVE-2024-0044-EXP
|
||||
- https://github.com/a-roshbaik/cve_2024_0044
|
||||
- https://github.com/canyie/CVE-2024-0044
|
||||
- https://github.com/canyie/canyie
|
||||
- https://github.com/fboaventura/awesome-starts
|
||||
- https://github.com/gmh5225/awesome-game-security
|
||||
- https://github.com/hunter24x24/cve_2024_0044
|
||||
- https://github.com/l1ackernishan/CVE-2024-0044
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/pl4int3xt/cve_2024_0044
|
||||
- https://github.com/scs-labrat/android_autorooter
|
||||
- https://github.com/sridhar-sec/EvilDroid
|
||||
- https://github.com/tanjiti/sec_profile
|
||||
- https://github.com/trevor0106/game-security
|
||||
- https://github.com/xdavidhu/awesome-google-vrp-writeups
|
||||
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
### [CVE-2024-0054](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0054)
|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
### [CVE-2024-0055](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0055)
|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
|
||||
@@ -44,6 +44,7 @@ Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Fe
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/EDemerzel/NuGetInspector
|
||||
- https://github.com/NaInSec/CVE-LIST
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
||||
|
||||
@@ -55,4 +55,5 @@ No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/NaInSec/CVE-LIST
|
||||
- https://github.com/leoambrus/artefactswithoutCVEonGitHubAdvisoryDatabase
|
||||
|
||||
|
||||
26
2024/CVE-2024-0132.md
Normal file
26
2024/CVE-2024-0132.md
Normal file
@@ -0,0 +1,26 @@
|
||||
### [CVE-2024-0132](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0132)
|
||||

|
||||

|
||||

|
||||

|
||||
%20Race%20Condition&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
NVIDIA Container Toolkit 1.16.1 or earlier contains a Time-of-check Time-of-Use (TOCTOU) vulnerability when used with default configuration where a specifically crafted container image may gain access to the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/EGI-Federation/SVG-advisories
|
||||
- https://github.com/ctrsploit/ctrsploit
|
||||
- https://github.com/lgturatti/techdrops
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/r0binak/CVE-2024-0132
|
||||
- https://github.com/ssst0n3/docker_archive
|
||||
- https://github.com/ssst0n3/poc-cve-2024-0132
|
||||
- https://github.com/zhanpengliu-tencent/medium-cve
|
||||
|
||||
19
2024/CVE-2024-0135.md
Normal file
19
2024/CVE-2024-0135.md
Normal file
@@ -0,0 +1,19 @@
|
||||
### [CVE-2024-0135](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0135)
|
||||

|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
NVIDIA Container Toolkit contains an improper isolation vulnerability where a specially crafted container image could lead to modification of a host binary. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/EGI-Federation/SVG-advisories
|
||||
|
||||
@@ -13,10 +13,31 @@ A vulnerability, which was classified as critical, was found in spider-flow 0.4.
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/0day404/HV-2024-POC
|
||||
- https://github.com/12442RF/POC
|
||||
- https://github.com/AboSteam/POPC
|
||||
- https://github.com/Cappricio-Securities/CVE-2024-0195
|
||||
- https://github.com/DMW11525708/wiki
|
||||
- https://github.com/Lern0n/Lernon-POC
|
||||
- https://github.com/Linxloop/fork_POC
|
||||
- https://github.com/Marco-zcl/POC
|
||||
- https://github.com/Michael-Meade/Links-Repository
|
||||
- https://github.com/Tropinene/Yscanner
|
||||
- https://github.com/WhosGa/MyWiki
|
||||
- https://github.com/Yuan08o/pocs
|
||||
- https://github.com/admin772/POC
|
||||
- https://github.com/adminlove520/pocWiki
|
||||
- https://github.com/adysec/POC
|
||||
- https://github.com/cisp-pte/POC-20241008-sec-fork
|
||||
- https://github.com/d4n-sec/d4n-sec.github.io
|
||||
- https://github.com/eeeeeeeeee-code/POC
|
||||
- https://github.com/gh-ost00/CVE-2024-0195-SpiderFlow
|
||||
- https://github.com/greenberglinken/2023hvv_1
|
||||
- https://github.com/hack-with-rohit/CVE-2024-0195-SpiderFlow
|
||||
- https://github.com/iemotion/POC
|
||||
- https://github.com/laoa1573/wy876
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/oLy0/Vulnerability
|
||||
- https://github.com/tanjiti/sec_profile
|
||||
- https://github.com/wjlin0/poc-doc
|
||||
- https://github.com/wy876/POC
|
||||
|
||||
19
2024/CVE-2024-0200.md
Normal file
19
2024/CVE-2024-0200.md
Normal file
@@ -0,0 +1,19 @@
|
||||
### [CVE-2024-0200](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0200)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
An unsafe reflection vulnerability was identified in GitHub Enterprise Server that could lead to reflection injection. This vulnerability could lead to the execution of user-controlled methods and remote code execution. To exploit this bug, an actor would need to be logged into an account on the GHES instance with the organization owner role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.8.13, 3.9.8, 3.10.5, and 3.11.3. This vulnerability was reported via the GitHub Bug Bounty program.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/convisolabs/CVE-2024-0507_CVE-2024-0200-github
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/tylzars/awesome-vrre-writeups
|
||||
|
||||
@@ -14,15 +14,31 @@ Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauth
|
||||
- http://packetstormsecurity.com/files/176974/Fortra-GoAnywhere-MFT-Unauthenticated-Remote-Code-Execution.html
|
||||
|
||||
#### Github
|
||||
- https://github.com/Acurtos01/PPS-Unidad2Actividad1-AdrianCurtoSanchez
|
||||
- https://github.com/Clealg01/PPS-Unidad2Actividad1-Cristian
|
||||
- https://github.com/EfstratiosLontzetidis/blogs_advisories_reports_papers
|
||||
- https://github.com/Mr-xn/Penetration_Testing_POC
|
||||
- https://github.com/Ospalus/PPS-Unidad2-Actividad1
|
||||
- https://github.com/Ostorlab/KEV
|
||||
- https://github.com/SergioMP04/PPS-Unidad2Actividad1-SergioMorato
|
||||
- https://github.com/Threekiii/CVE
|
||||
- https://github.com/adminlove520/CVE-2024-0204
|
||||
- https://github.com/cbeek-r7/CVE-2024-0204
|
||||
- https://github.com/gobysec/Goby
|
||||
- https://github.com/horizon3ai/CVE-2024-0204
|
||||
- https://github.com/ibrahmsql/CVE-2024-0204
|
||||
- https://github.com/ibrahmsql/CyberSecurity101-Roadmap
|
||||
- https://github.com/jmtatop01/PPS-Unidad2Actividad1-JulioManuel
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/m-cetin/CVE-2024-0204
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/plzheheplztrying/cve_monitor
|
||||
- https://github.com/toxyl/lscve
|
||||
- https://github.com/vjp-albertoVG/PPS-Unidad2Actividad1-albertoVG
|
||||
- https://github.com/vjp-angelPB/PPS-Unidad2Actividad1-Angel
|
||||
- https://github.com/vjp-davidLC/vjp-davidLC-PPS-Unidad2Actividad1-David
|
||||
- https://github.com/vjp-ignacioBM/PPS-Unidad2Actividad1-Ignacio
|
||||
- https://github.com/vjp-mansurSY/PPS-Unidad2Actividad1-MansurSY
|
||||
- https://github.com/vjp-pabloGG/PPS-Unidad2Actividad1-PabloGilGalapero
|
||||
- https://github.com/vjp-raulAP/PPS-Unidad2Actividad1-Raul_Albalat_Perez
|
||||
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
### [CVE-2024-0208](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0208)
|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
|
||||
@@ -3,9 +3,8 @@
|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
@@ -14,7 +14,7 @@
|
||||

|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
|
||||
@@ -13,10 +13,15 @@ A session management issue was addressed with improved checks. This issue is fix
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/0xor0ne/awesome-list
|
||||
- https://github.com/CerberusMrX/Advanced-Bluetooth-Penetration-Testing-Tool
|
||||
- https://github.com/H4lo/awesome-IoT-security-article
|
||||
- https://github.com/Jalexander798/JA_Tools-Cybersecurity-Resource-2
|
||||
- https://github.com/bachkhoasoft/awesome-list-ks
|
||||
- https://github.com/gato001k1/helt
|
||||
- https://github.com/keldnorman/cve-2024-0230-blue
|
||||
- https://github.com/marcnewlin/hi_my_name_is_keyboard
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/shirin-ehtiram/hi_my_name_is_keyboard
|
||||
- https://github.com/xG3nesis/RustyInjector
|
||||
|
||||
|
||||
@@ -14,6 +14,7 @@ The EventON WordPress plugin before 4.5.5, EventON WordPress plugin before 2.2.7
|
||||
|
||||
#### Github
|
||||
- https://github.com/Cappricio-Securities/CVE-2024-0235
|
||||
- https://github.com/Nxploited/CVE-2024-0235-PoC
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
||||
|
||||
17
2024/CVE-2024-0241.md
Normal file
17
2024/CVE-2024-0241.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2024-0241](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0241)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
encoded_id-rails versions before 1.0.0.beta2 are affected by an uncontrolled resource consumption vulnerability. A remote and unauthenticated attacker might cause a denial of service condition by sending an HTTP request with an extremely long "id" parameter.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/leoambrus/artefactswithoutCVEonGitHubAdvisoryDatabase
|
||||
|
||||
@@ -10,7 +10,7 @@ A vulnerability classified as critical was found in CodeAstro Online Food Orderi
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://vuldb.com/?id.249778
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
||||
17
2024/CVE-2024-0249.md
Normal file
17
2024/CVE-2024-0249.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2024-0249](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0249)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Advanced Schedule Posts WordPress plugin through 2.1.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admins.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/e7ee3e73-1086-421f-b586-d415a45a6c8e/
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
@@ -14,4 +14,5 @@ No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
- https://github.com/minhgalaxy/CVE
|
||||
|
||||
|
||||
@@ -15,5 +15,6 @@ A vulnerability has been found in Sentex FTPDMIN 0.96 and classified as problema
|
||||
- https://www.youtube.com/watch?v=q-CVJfYdd-g
|
||||
|
||||
#### Github
|
||||
- https://github.com/cnetsec/south-america-cve-hall
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
||||
|
||||
@@ -14,5 +14,6 @@ A vulnerability was found in ACME Ultra Mini HTTPd 1.21. It has been classified
|
||||
- https://packetstormsecurity.com/files/176333/Ultra-Mini-HTTPd-1.21-Denial-Of-Service.html
|
||||
|
||||
#### Github
|
||||
- https://github.com/cnetsec/south-america-cve-hall
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
||||
|
||||
@@ -14,4 +14,5 @@ No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
- https://github.com/minhgalaxy/CVE
|
||||
|
||||
|
||||
@@ -13,13 +13,30 @@ A vulnerability was found in Guangzhou Yingke Electronic Technology Ncast up to
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/0day404/HV-2024-POC
|
||||
- https://github.com/12442RF/POC
|
||||
- https://github.com/20142995/pocsuite3
|
||||
- https://github.com/AboSteam/POPC
|
||||
- https://github.com/DMW11525708/wiki
|
||||
- https://github.com/Lern0n/Lernon-POC
|
||||
- https://github.com/Linxloop/fork_POC
|
||||
- https://github.com/Marco-zcl/POC
|
||||
- https://github.com/Tropinene/Yscanner
|
||||
- https://github.com/WhosGa/MyWiki
|
||||
- https://github.com/Yuan08o/pocs
|
||||
- https://github.com/admin772/POC
|
||||
- https://github.com/adminlove520/pocWiki
|
||||
- https://github.com/adysec/POC
|
||||
- https://github.com/cisp-pte/POC-20241008-sec-fork
|
||||
- https://github.com/d4n-sec/d4n-sec.github.io
|
||||
- https://github.com/dddinmx/POC-Pocsuite3
|
||||
- https://github.com/eeeeeeeeee-code/POC
|
||||
- https://github.com/greenberglinken/2023hvv_1
|
||||
- https://github.com/iemotion/POC
|
||||
- https://github.com/jidle123/cve-2024-0305exp
|
||||
- https://github.com/laoa1573/wy876
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/oLy0/Vulnerability
|
||||
- https://github.com/tanjiti/sec_profile
|
||||
- https://github.com/wjlin0/poc-doc
|
||||
- https://github.com/wy876/POC
|
||||
|
||||
@@ -13,5 +13,6 @@ A malicious insider can bypass the existing policy of Skyhigh Client Proxy witho
|
||||
- https://kcm.trellix.com/corporate/index?page=content&id=SB10418
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
- https://github.com/calligraf0/CVE-2024-0311
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
### [CVE-2024-0323](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0323)
|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
|
||||
18
2024/CVE-2024-0324.md
Normal file
18
2024/CVE-2024-0324.md
Normal file
@@ -0,0 +1,18 @@
|
||||
### [CVE-2024-0324](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0324)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
The User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wppb_two_factor_authentication_settings_update' function in all versions up to, and including, 3.10.8. This makes it possible for unauthenticated attackers to enable or disable the 2FA functionality present in the Premium version of the plugin for arbitrary user roles.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/kodaichodai/CVE-2024-0324
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
||||
@@ -13,6 +13,7 @@ A vulnerability classified as critical was found in Likeshop up to 2.5.7.2021031
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/Cappricio-Securities/CVE-2024-0352
|
||||
- https://github.com/Tropinene/Yscanner
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/tanjiti/sec_profile
|
||||
|
||||
17
2024/CVE-2024-0360.md
Normal file
17
2024/CVE-2024-0360.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2024-0360](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0360)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A vulnerability was found in PHPGurukul Hospital Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file admin/edit-doctor-specialization.php. The manipulation of the argument doctorspecilization leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250127.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/KadinFisher/CVE_LLM_Testing
|
||||
|
||||
@@ -14,4 +14,5 @@ The Fancy Product Designer WordPress plugin before 6.1.5 does not properly sanit
|
||||
|
||||
#### Github
|
||||
- https://github.com/NaInSec/CVE-LIST
|
||||
- https://github.com/xbz0n/xbz0n
|
||||
|
||||
|
||||
18
2024/CVE-2024-0368.md
Normal file
18
2024/CVE-2024-0368.md
Normal file
@@ -0,0 +1,18 @@
|
||||
### [CVE-2024-0368](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0368)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.8.3 via hardcoded API Keys. This makes it possible for unauthenticated attackers to extract sensitive data including PII.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://developers.hubspot.com/docs/api/webhooks#manage-settings-via-api
|
||||
- https://developers.hubspot.com/docs/api/webhooks#scopes
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
18
2024/CVE-2024-0379.md
Normal file
18
2024/CVE-2024-0379.md
Normal file
@@ -0,0 +1,18 @@
|
||||
### [CVE-2024-0379](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0379)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Custom Twitter Feeds – A Tweets Widget or X Feed Widget plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.2.1. This is due to missing or incorrect nonce validation on the ctf_auto_save_tokens function. This makes it possible for unauthenticated attackers to update the site's twitter API token and secret via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/kodaichodai/CVE-2024-0379
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
||||
@@ -15,4 +15,5 @@ The WooCommerce Customers Manager WordPress plugin before 29.7 does not properly
|
||||
#### Github
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/xbz0n/CVE-2024-0399
|
||||
- https://github.com/xbz0n/xbz0n
|
||||
|
||||
|
||||
@@ -15,6 +15,8 @@ No PoCs from references.
|
||||
#### Github
|
||||
- https://github.com/0xfschott/CVE-search
|
||||
- https://github.com/ch4nui/CVE-2024-0402-RCE
|
||||
- https://github.com/doyensec/malicious-devfile-registry
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/plzheheplztrying/cve_monitor
|
||||
- https://github.com/tanjiti/sec_profile
|
||||
|
||||
|
||||
17
2024/CVE-2024-0405.md
Normal file
17
2024/CVE-2024-0405.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2024-0405](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0405)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Burst Statistics – Privacy-Friendly Analytics for WordPress plugin, version 1.5.3, is vulnerable to Post-Authenticated SQL Injection via multiple JSON parameters in the /wp-json/burst/v1/data/compare endpoint. Affected parameters include 'browser', 'device', 'page_id', 'page_url', 'platform', and 'referrer'. This vulnerability arises due to insufficient escaping of user-supplied parameters and the lack of adequate preparation in SQL queries. As a result, authenticated attackers with editor access or higher can append additional SQL queries into existing ones, potentially leading to unauthorized access to sensitive information from the database.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/xbz0n/xbz0n
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
### [CVE-2024-0406](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0406)
|
||||

|
||||

|
||||

|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
@@ -16,4 +16,8 @@ No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/plzheheplztrying/cve_monitor
|
||||
- https://github.com/veissa/Desires
|
||||
- https://github.com/walidpyh/CVE-2024-0406-POC
|
||||
|
||||
|
||||
@@ -13,5 +13,6 @@ A vulnerability has been found in iSharer and upRedSun File Sharing Wizard up to
|
||||
- https://cxsecurity.com/issue/WLB-2024010023
|
||||
|
||||
#### Github
|
||||
- https://github.com/cnetsec/south-america-cve-hall
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
||||
|
||||
@@ -14,5 +14,5 @@ A vulnerability was found in Jasper httpdx up to 1.5.4 and classified as problem
|
||||
- https://www.youtube.com/watch?v=6dAWGH0-6TY
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
- https://github.com/cnetsec/south-america-cve-hall
|
||||
|
||||
|
||||
21
2024/CVE-2024-0443.md
Normal file
21
2024/CVE-2024-0443.md
Normal file
@@ -0,0 +1,21 @@
|
||||
### [CVE-2024-0443](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0443)
|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
A flaw was found in the blkgs destruction path in block/blk-cgroup.c in the Linux kernel, leading to a cgroup blkio memory leakage problem. When a cgroup is being destroyed, cgroup_rstat_flush() is only called at css_release_work_fn(), which is called when the blkcg reference count reaches 0. This circular dependency will prevent blkcg and some blkgs from being freed after they are made offline. This issue may allow an attacker with a local access to cause system instability, such as an out of memory error.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cve-scores
|
||||
|
||||
@@ -1,11 +1,19 @@
|
||||
### [CVE-2024-0446](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0446)
|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A maliciously crafted STP, CATPART or MODEL file when parsed in ASMKERN228A.dll and ASMdatax229A.dll through Autodesk applications can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
|
||||
A maliciously crafted STP, CATPART or MODEL file, when parsed in ASMKERN228A.dll and ASMdatax229A.dll through Autodesk AutoCAD, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
|
||||
|
||||
### POC
|
||||
|
||||
|
||||
17
2024/CVE-2024-0448.md
Normal file
17
2024/CVE-2024-0448.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2024-0448](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0448)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widget URL parameters in all versions up to, and including, 8.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor access or higher to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/CyberSecAI/cve_dedup
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
### [CVE-2024-0456](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0456)
|
||||

|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
|
||||
19
2024/CVE-2024-0507.md
Normal file
19
2024/CVE-2024-0507.md
Normal file
@@ -0,0 +1,19 @@
|
||||
### [CVE-2024-0507](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0507)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
An attacker with access to a Management Console user account with the editor role could escalate privileges through a command injection vulnerability in the Management Console. This vulnerability affected all versions of GitHub Enterprise Server and was fixed in versions 3.11.3, 3.10.5, 3.9.8, and 3.8.13 This vulnerability was reported via the GitHub Bug Bounty program.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/convisolabs/CVE-2024-0507_CVE-2024-0200-github
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/tylzars/awesome-vrre-writeups
|
||||
|
||||
18
2024/CVE-2024-0509.md
Normal file
18
2024/CVE-2024-0509.md
Normal file
@@ -0,0 +1,18 @@
|
||||
### [CVE-2024-0509](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0509)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The WP 404 Auto Redirect to Similar Post plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘request’ parameter in all versions up to, and including, 1.0.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/kodaichodai/CVE-2024-0509
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
||||
@@ -13,9 +13,18 @@ Out of bounds write in V8 in Google Chrome prior to 120.0.6099.224 allowed a rem
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/0xor0ne/awesome-list
|
||||
- https://github.com/Jalexander798/JA_Tools-Cybersecurity-Resource-2
|
||||
- https://github.com/Uniguri/CVE-1day
|
||||
- https://github.com/Uniguri/CVE-nday
|
||||
- https://github.com/bachkhoasoft/awesome-list-ks
|
||||
- https://github.com/gmh5225/vulnjs
|
||||
- https://github.com/mwlik/v8-resources
|
||||
- https://github.com/ret2eax/exploits
|
||||
- https://github.com/rycbar77/V8Exploits
|
||||
- https://github.com/sploitem/v8-writeups
|
||||
- https://github.com/sploitem/v8pwn
|
||||
- https://github.com/wh1ant/vulnjs
|
||||
- https://github.com/worthdoingbadly/chrome-118-tools
|
||||
- https://github.com/xv0nfers/V8-sbx-bypass-collection
|
||||
|
||||
|
||||
@@ -13,9 +13,12 @@ Out of bounds memory access in V8 in Google Chrome prior to 120.0.6099.224 allow
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/DEORE1001/Task-3
|
||||
- https://github.com/JohnHormond/CVE-2024-0519-Chrome-exploit
|
||||
- https://github.com/Ostorlab/KEV
|
||||
- https://github.com/Oxdestiny/CVE-2024-0519-Chrome-exploit
|
||||
- https://github.com/Threekiii/CVE
|
||||
- https://github.com/gmh5225/vulnjs
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/wh1ant/vulnjs
|
||||
|
||||
|
||||
18
2024/CVE-2024-0520.md
Normal file
18
2024/CVE-2024-0520.md
Normal file
@@ -0,0 +1,18 @@
|
||||
### [CVE-2024-0520](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0520)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A vulnerability in mlflow/mlflow version 8.2.1 allows for remote code execution due to improper neutralization of special elements used in an OS command ('Command Injection') within the `mlflow.data.http_dataset_source.py` module. Specifically, when loading a dataset from a source URL with an HTTP scheme, the filename extracted from the `Content-Disposition` header or the URL path is used to generate the final file path without proper sanitization. This flaw enables an attacker to control the file path fully by utilizing path traversal or absolute path techniques, such as '../../tmp/poc.txt' or '/tmp/poc.txt', leading to arbitrary file write. Exploiting this vulnerability could allow a malicious user to execute commands on the vulnerable machine, potentially gaining access to data and model information. The issue is fixed in version 2.9.0.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/chan-068/CVE-2024-0520_try
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
||||
@@ -13,5 +13,6 @@ A vulnerability was found in Allegro RomPager 4.01. It has been classified as pr
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/cnetsec/south-america-cve-hall
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
||||
|
||||
@@ -1,11 +1,12 @@
|
||||
### [CVE-2024-0532](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0532)
|
||||

|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects unknown code of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250702 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
||||
A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects the function set_repeat5 of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g/wpapsk_crypto5g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
||||
|
||||
### POC
|
||||
|
||||
|
||||
17
2024/CVE-2024-0535.md
Normal file
17
2024/CVE-2024-0535.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2024-0535](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0535)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A vulnerability classified as critical was found in Tenda PA6 1.0.1.21. Affected by this vulnerability is the function cgiPortMapAdd of the file /portmap of the component httpd. The manipulation of the argument groupName leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250705 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/attilaszia/linux-iot-cves
|
||||
|
||||
@@ -13,5 +13,5 @@ A vulnerability, which was classified as problematic, has been found in EasyFTP
|
||||
- https://packetstormsecurity.com/files/94905/EasyFTP-1.7.0.x-Denial-Of-Service.html
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
- https://github.com/cnetsec/south-america-cve-hall
|
||||
|
||||
|
||||
@@ -13,5 +13,5 @@ A vulnerability has been found in Ability FTP Server 2.34 and classified as prob
|
||||
- https://packetstormsecurity.com/files/163079/Ability-FTP-Server-2.34-Denial-Of-Service.html
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
- https://github.com/cnetsec/south-america-cve-hall
|
||||
|
||||
|
||||
@@ -13,5 +13,5 @@ A vulnerability was found in FreeFloat FTP Server 1.0 and classified as problema
|
||||
- https://packetstormsecurity.com/files/163038/FreeFloat-FTP-Server-1.0-Denial-Of-Service.html
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
- https://github.com/cnetsec/south-america-cve-hall
|
||||
|
||||
|
||||
@@ -4,7 +4,7 @@
|
||||

|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
@@ -13,7 +13,7 @@ A flaw was found in the Linux kernel's memory deduplication mechanism. The max p
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://wisa.or.kr/accepted
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
||||
@@ -16,4 +16,5 @@ The Smart Manager WordPress plugin before 8.28.0 does not properly sanitise and
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/xbz0n/CVE-2024-0566
|
||||
- https://github.com/xbz0n/xbz0n
|
||||
|
||||
|
||||
@@ -17,17 +17,33 @@ No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/0ptyx/cve-2024-0582
|
||||
- https://github.com/0xAtharv/kernel-POCs
|
||||
- https://github.com/0xor0ne/awesome-list
|
||||
- https://github.com/0xsyr0/OSCP
|
||||
- https://github.com/101010zyl/CVE-2024-0582-dataonly
|
||||
- https://github.com/AMatheusFeitosaM/OSCP-Cheat
|
||||
- https://github.com/Faizan-Khanx/OSCP
|
||||
- https://github.com/Forsaken0129/CVE-2024-0582
|
||||
- https://github.com/Forsaken0129/UltimateLinuxPrivilage
|
||||
- https://github.com/FoxyProxys/CVE-2024-0582
|
||||
- https://github.com/GhostTroops/TOP
|
||||
- https://github.com/PsychoH4x0r/Unknown1337-Auto-Root-
|
||||
- https://github.com/ReflectedThanatos/OSCP-cheatsheet
|
||||
- https://github.com/SantoriuHen/NotesHck
|
||||
- https://github.com/VishuGahlyan/OSCP
|
||||
- https://github.com/aneasystone/github-trending
|
||||
- https://github.com/arttnba3/D3CTF2025_d3kshrm
|
||||
- https://github.com/exfilt/CheatSheet
|
||||
- https://github.com/fazilbaig1/oscp
|
||||
- https://github.com/fireinrain/github-trending
|
||||
- https://github.com/geniuszly/CVE-2024-0582
|
||||
- https://github.com/jafshare/GithubTrending
|
||||
- https://github.com/johe123qwe/github-trending
|
||||
- https://github.com/kuzeyardabulut/CVE-2024-0582
|
||||
- https://github.com/mowenroot/Kernel
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/plzheheplztrying/cve_monitor
|
||||
- https://github.com/pwnmonk/io_uring-n-day
|
||||
- https://github.com/xairy/linux-kernel-exploitation
|
||||
- https://github.com/ysanatomic/io_uring_LPE-CVE-2024-0582
|
||||
|
||||
|
||||
18
2024/CVE-2024-0588.md
Normal file
18
2024/CVE-2024-0588.md
Normal file
@@ -0,0 +1,18 @@
|
||||
### [CVE-2024-0588](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0588)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Paid Memberships Pro – Content Restriction, User Registration, & Paid Subscriptions plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.12.10. This is due to missing nonce validation on the pmpro_lifter_save_streamline_option() function. This makes it possible for unauthenticated attackers to enable the streamline setting with Lifter LMS via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/kodaichodai/CVE-2024-0588
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
||||
@@ -10,7 +10,7 @@ Cross-site scripting (XSS) vulnerability in the entry overview tab in Devolution
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://devolutions.net/security/advisories/DEVO-2024-0001/
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
||||
18
2024/CVE-2024-0590.md
Normal file
18
2024/CVE-2024-0590.md
Normal file
@@ -0,0 +1,18 @@
|
||||
### [CVE-2024-0590](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0590)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Microsoft Clarity plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.9.3. This is due to missing nonce validation on the edit_clarity_project_id() function. This makes it possible for unauthenticated attackers to change the project id and add malicious JavaScript via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/kodaichodai/CVE-2024-0590
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
||||
17
2024/CVE-2024-0605.md
Normal file
17
2024/CVE-2024-0605.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2024-0605](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0605)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Using a javascript: URI with a setTimeout race condition, an attacker can execute unauthorized scripts on top origin sites in urlbar. This bypasses security measures, potentially leading to arbitrary code execution or unauthorized actions within the user's loaded webpage. This vulnerability affects Focus for iOS < 122.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://bugzilla.mozilla.org/show_bug.cgi?id=1855575
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2024/CVE-2024-0606.md
Normal file
17
2024/CVE-2024-0606.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2024-0606](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0606)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
An attacker could execute unauthorized script on a legitimate site through UXSS using window.open() by opening a javascript URI leading to unauthorized actions within the user's loaded webpage. This vulnerability affects Focus for iOS < 122.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://bugzilla.mozilla.org/show_bug.cgi?id=1855030
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
@@ -14,4 +14,6 @@ No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
- https://github.com/kodaichodai/CVE-2024-0623
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
||||
|
||||
@@ -14,4 +14,6 @@ No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
- https://github.com/kodaichodai/CVE-2024-0624
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
||||
|
||||
@@ -16,7 +16,7 @@
|
||||

|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
@@ -30,4 +30,5 @@ An out-of-bounds memory write flaw was found in the Linux kernel’s Transport L
|
||||
#### Github
|
||||
- https://github.com/NaInSec/CVE-LIST
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
- https://github.com/ndouglas-cloudsmith/exploit-check
|
||||
|
||||
|
||||
@@ -13,6 +13,7 @@ A vulnerability, which was classified as problematic, was found in DeepFaceLab p
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/TrustAI-laboratory/TrustAI-laboratory
|
||||
- https://github.com/bayuncao/bayuncao
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
||||
|
||||
18
2024/CVE-2024-0683.md
Normal file
18
2024/CVE-2024-0683.md
Normal file
@@ -0,0 +1,18 @@
|
||||
### [CVE-2024-0683](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0683)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
The Bulgarisation for WooCommerce plugin for WordPress is vulnerable to unauthorized access due to missing capability checks on several functions in all versions up to, and including, 3.0.14. This makes it possible for unauthenticated and authenticated attackers, with subscriber-level access and above, to generate and delete labels.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/3474458191/CVE-2024-0683
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
||||
@@ -13,6 +13,7 @@ The SolarWinds Security Event Manager was susceptible to Remote Code Execution V
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/1diot9/MyJavaSecStudy
|
||||
- https://github.com/Ostorlab/KEV
|
||||
- https://github.com/f0ur0four/Insecure-Deserialization
|
||||
|
||||
|
||||
@@ -15,5 +15,5 @@ A vulnerability classified as problematic was found in EFS Easy File Sharing FTP
|
||||
- https://www.youtube.com/watch?v=Rcl6VWg_bPY
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
- https://github.com/cnetsec/south-america-cve-hall
|
||||
|
||||
|
||||
@@ -16,5 +16,5 @@ A vulnerability, which was classified as problematic, has been found in EFS Easy
|
||||
- https://www.youtube.com/watch?v=nGyS2Rp5aEo
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
- https://github.com/cnetsec/south-america-cve-hall
|
||||
|
||||
|
||||
17
2024/CVE-2024-0708.md
Normal file
17
2024/CVE-2024-0708.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2024-0708](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0708)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
The Landing Page Cat – Coming Soon Page, Maintenance Page & Squeeze Pages plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.7.2. This makes it possible for unauthenticated attackers to access landing pages that may not be public.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/calysteon/calysteon
|
||||
|
||||
@@ -13,5 +13,5 @@ A vulnerability was found in freeSSHd 1.0.9 on Windows. It has been classified a
|
||||
- https://packetstormsecurity.com/files/176545/freeSSHd-1.0.9-Denial-Of-Service.html
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
- https://github.com/cnetsec/south-america-cve-hall
|
||||
|
||||
|
||||
@@ -13,5 +13,5 @@ A vulnerability was found in ProSSHD 1.2 on Windows. It has been declared as pro
|
||||
- https://packetstormsecurity.com/files/176544/ProSSHD-1.2-20090726-Denial-Of-Service.html
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
- https://github.com/cnetsec/south-america-cve-hall
|
||||
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
### [CVE-2024-0727](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0727)
|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
@@ -14,8 +14,12 @@ No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/GrigGM/05-virt-04-docker-hw
|
||||
- https://github.com/akaganeite/CVE4PP
|
||||
- https://github.com/chnzzh/OpenSSL-CVE-lib
|
||||
- https://github.com/denoslab/ensf400-lab10-ssc
|
||||
- https://github.com/fokypoky/places-list
|
||||
- https://github.com/jtgorny/cve-scanning
|
||||
- https://github.com/mmbazm/secure_license_server
|
||||
- https://github.com/runlilong/tigergraph_openssl
|
||||
- https://github.com/seal-community/patches
|
||||
|
||||
|
||||
@@ -13,5 +13,5 @@ A vulnerability has been found in PCMan FTP Server 2.0.7 and classified as probl
|
||||
- https://fitoxs.com/vuldb/01-PCMan%20v2.0.7-exploit.txt
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
- https://github.com/cnetsec/south-america-cve-hall
|
||||
|
||||
|
||||
@@ -13,5 +13,5 @@ A vulnerability was found in PCMan FTP Server 2.0.7 and classified as problemati
|
||||
- https://fitoxs.com/vuldb/02-PCMan%20v2.0.7-exploit.txt
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
- https://github.com/cnetsec/south-america-cve-hall
|
||||
|
||||
|
||||
@@ -13,5 +13,5 @@ A vulnerability classified as problematic has been found in EFS Easy File Sharin
|
||||
- https://0day.today/exploit/39249
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
- https://github.com/cnetsec/south-america-cve-hall
|
||||
|
||||
|
||||
@@ -13,5 +13,6 @@ A vulnerability classified as problematic was found in Xlightftpd Xlight FTP Ser
|
||||
- https://packetstormsecurity.com/files/176553/LightFTP-1.1-Denial-Of-Service.html
|
||||
|
||||
#### Github
|
||||
- https://github.com/cnetsec/south-america-cve-hall
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
||||
|
||||
@@ -16,6 +16,7 @@ An out of bounds write in ANGLE could have allowed an attacker to corrupt memory
|
||||
- https://bugzilla.mozilla.org/show_bug.cgi?id=1864587
|
||||
|
||||
#### Github
|
||||
- https://github.com/HyHy100/Firefox-ANGLE-CVE-2024-0741
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
||||
|
||||
@@ -13,6 +13,8 @@ In some circumstances, JIT compiled code could have dereferenced a wild pointer
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/5211-yx/javascript_fuzzer
|
||||
- https://github.com/TimerIzaya/izayailli
|
||||
- https://github.com/googleprojectzero/fuzzilli
|
||||
- https://github.com/zhangjiahui-buaa/MasterThesis
|
||||
|
||||
|
||||
17
2024/CVE-2024-0748.md
Normal file
17
2024/CVE-2024-0748.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2024-0748](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0748)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A compromised content process could have updated the document URI. This could have allowed an attacker to set an arbitrary URI in the address bar or history. This vulnerability affects Firefox < 122.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://bugzilla.mozilla.org/show_bug.cgi?id=1783504
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
19
2024/CVE-2024-0760.md
Normal file
19
2024/CVE-2024-0760.md
Normal file
@@ -0,0 +1,19 @@
|
||||
### [CVE-2024-0760](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0760)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A malicious client can send many DNS messages over TCP, potentially causing the server to become unstable while the attack is in progress. The server may recover after the attack ceases. Use of ACLs will not mitigate the attack. This issue affects BIND 9 versions 9.18.1 through 9.18.27, 9.19.0 through 9.19.24, and 9.18.11-S1 through 9.18.27-S1.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/SpiralBL0CK/CVE-2024-0760
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/plzheheplztrying/cve_monitor
|
||||
|
||||
35
2024/CVE-2024-0762.md
Normal file
35
2024/CVE-2024-0762.md
Normal file
@@ -0,0 +1,35 @@
|
||||
### [CVE-2024-0762](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0762)
|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Potential buffer overflow in unsafe UEFI variable handling in Phoenix SecureCore™ for select Intel platformsThis issue affects:Phoenix SecureCore™ for Intel Kaby Lake: from 4.0.1.1 before 4.0.1.998;Phoenix SecureCore™ for Intel Coffee Lake: from 4.1.0.1 before 4.1.0.562;Phoenix SecureCore™ for Intel Ice Lake: from 4.2.0.1 before 4.2.0.323;Phoenix SecureCore™ for Intel Comet Lake: from 4.2.1.1 before 4.2.1.287;Phoenix SecureCore™ for Intel Tiger Lake: from 4.3.0.1 before 4.3.0.236;Phoenix SecureCore™ for Intel Jasper Lake: from 4.3.1.1 before 4.3.1.184;Phoenix SecureCore™ for Intel Alder Lake: from 4.4.0.1 before 4.4.0.269;Phoenix SecureCore™ for Intel Raptor Lake: from 4.5.0.1 before 4.5.0.218;Phoenix SecureCore™ for Intel Meteor Lake: from 4.5.1.1 before 4.5.1.15.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/abandon1337/CVE-2024-0762
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/tadash10/Detect-CVE-2024-0762
|
||||
|
||||
@@ -13,5 +13,5 @@ Any user can delete an arbitrary folder (recursively) on a remote server due to
|
||||
- https://huntr.com/bounties/25a2f487-5a9c-4c7f-a2d3-b0527db73ea5
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
- https://github.com/raltheo/raltheo
|
||||
|
||||
|
||||
@@ -15,4 +15,5 @@
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
- https://github.com/packetinside/CISA_BOT
|
||||
|
||||
|
||||
17
2024/CVE-2024-0771.md
Normal file
17
2024/CVE-2024-0771.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2024-0771](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0771)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A vulnerability has been found in Nsasoft Product Key Explorer 4.0.9 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Registration Handler. The manipulation of the argument Name/Key leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251671. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/cnetsec/south-america-cve-hall
|
||||
|
||||
@@ -13,5 +13,6 @@ A vulnerability was found in Nsasoft ShareAlarmPro 2.1.4 and classified as probl
|
||||
- https://youtu.be/WIeWeuXbkiY
|
||||
|
||||
#### Github
|
||||
- https://github.com/cnetsec/south-america-cve-hall
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
||||
|
||||
@@ -13,5 +13,6 @@ A vulnerability was found in Any-Capture Any Sound Recorder 2.93. It has been de
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/cnetsec/south-america-cve-hall
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
||||
|
||||
@@ -16,4 +16,5 @@ A vulnerability was found in Project Worlds Online Admission System 1.0 and clas
|
||||
#### Github
|
||||
- https://github.com/keru6k/Online-Admission-System-RCE-PoC
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/pwnpwnpur1n/Online-Admission-System-RCE-PoC
|
||||
|
||||
|
||||
@@ -13,5 +13,5 @@ If an attacked was given access to an instance with the admin or manager role th
|
||||
- https://huntr.com/bounties/f69e3307-7b44-4776-ac60-2990990723ec
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
- https://github.com/raltheo/raltheo
|
||||
|
||||
|
||||
@@ -14,4 +14,5 @@ Command injection in paddle.utils.download._wget_download (bypass filter) in pad
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
- https://github.com/kagesensei/SimpleSpacy
|
||||
|
||||
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user