diff --git a/2006/CVE-2006-2937.md b/2006/CVE-2006-2937.md index 2e7e8b47b2..2644f06f01 100644 --- a/2006/CVE-2006-2937.md +++ b/2006/CVE-2006-2937.md @@ -10,6 +10,7 @@ OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to c ### POC #### Reference +- http://www.ubuntu.com/usn/usn-353-1 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html - http://www.vmware.com/support/player/doc/releasenotes_player.html diff --git a/2006/CVE-2006-2940.md b/2006/CVE-2006-2940.md index 41deb2658f..3ae65495e6 100644 --- a/2006/CVE-2006-2940.md +++ b/2006/CVE-2006-2940.md @@ -10,6 +10,7 @@ OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows at ### POC #### Reference +- http://www.ubuntu.com/usn/usn-353-1 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html - http://www.vmware.com/support/player/doc/releasenotes_player.html diff --git a/2006/CVE-2006-3738.md b/2006/CVE-2006-3738.md index e4200e7230..a66fc0ed9b 100644 --- a/2006/CVE-2006-3738.md +++ b/2006/CVE-2006-3738.md @@ -10,6 +10,7 @@ Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0 ### POC #### Reference +- http://www.ubuntu.com/usn/usn-353-1 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9370 diff --git a/2006/CVE-2006-4343.md b/2006/CVE-2006-4343.md index 082958d478..a0d62001bd 100644 --- a/2006/CVE-2006-4343.md +++ b/2006/CVE-2006-4343.md @@ -10,6 +10,7 @@ The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0 ### POC #### Reference +- http://www.ubuntu.com/usn/usn-353-1 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html - http://www.vmware.com/support/player/doc/releasenotes_player.html diff --git a/2007/CVE-2007-0695.md b/2007/CVE-2007-0695.md new file mode 100644 index 0000000000..4e39e29ab4 --- /dev/null +++ b/2007/CVE-2007-0695.md @@ -0,0 +1,17 @@ +### [CVE-2007-0695](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0695) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Multiple SQL injection vulnerabilities in Free LAN In(tra|ter)net Portal (FLIP) before 1.0-RC3 allow remote attackers to execute arbitrary SQL commands via unspecified vectors. NOTE: some sources mention the escape_sqlData, implode_sql, and implode_sqlIn functions, but these are protection schemes, not the vulnerable functions. + +### POC + +#### Reference +- http://sourceforge.net/project/shownotes.php?release_id=481131&group_id=98260 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2007/CVE-2007-0696.md b/2007/CVE-2007-0696.md new file mode 100644 index 0000000000..bd20b447a3 --- /dev/null +++ b/2007/CVE-2007-0696.md @@ -0,0 +1,17 @@ +### [CVE-2007-0696](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0696) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Cross-site scripting (XSS) vulnerability in error messages in Free LAN In(tra|ter)net Portal (FLIP) before 1.0-RC3 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, different vectors than CVE-2007-0611. + +### POC + +#### Reference +- http://sourceforge.net/project/shownotes.php?release_id=481131&group_id=98260 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2010/CVE-2010-4091.md b/2010/CVE-2010-4091.md index cd501cc41d..096b7e5813 100644 --- a/2010/CVE-2010-4091.md +++ b/2010/CVE-2010-4091.md @@ -10,7 +10,7 @@ The EScript.api plugin in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x befor ### POC #### Reference -No PoCs from references. +- http://extraexploit.blogspot.com/2010/11/full-disclosure-xplpdf-adober-reader-94.html #### Github - https://github.com/0xCyberY/CVE-T4PDF diff --git a/2012/CVE-2012-6150.md b/2012/CVE-2012-6150.md index b0c0c6b456..55ee2a4070 100644 --- a/2012/CVE-2012-6150.md +++ b/2012/CVE-2012-6150.md @@ -10,7 +10,7 @@ The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in S ### POC #### Reference -No PoCs from references. +- http://www.ubuntu.com/usn/USN-2054-1 #### Github - https://github.com/Live-Hack-CVE/CVE-2012-6150 diff --git a/2013/CVE-2013-0228.md b/2013/CVE-2013-0228.md index 5da98eb467..ebcf029d00 100644 --- a/2013/CVE-2013-0228.md +++ b/2013/CVE-2013-0228.md @@ -12,6 +12,7 @@ The xen_iret function in arch/x86/xen/xen-asm_32.S in the Linux kernel before 3. #### Reference - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +- http://www.ubuntu.com/usn/USN-1797-1 - http://www.ubuntu.com/usn/USN-1808-1 - http://www.ubuntu.com/usn/USN-1808-1 diff --git a/2013/CVE-2013-0914.md b/2013/CVE-2013-0914.md index 5fcda31f45..1509f1db40 100644 --- a/2013/CVE-2013-0914.md +++ b/2013/CVE-2013-0914.md @@ -14,6 +14,7 @@ The flush_signal_handlers function in kernel/signal.c in the Linux kernel before - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 - http://www.ubuntu.com/usn/USN-1788-1 - http://www.ubuntu.com/usn/USN-1788-1 +- http://www.ubuntu.com/usn/USN-1797-1 #### Github No PoCs found on GitHub currently. diff --git a/2013/CVE-2013-1767.md b/2013/CVE-2013-1767.md index 1f8e63db38..bd4975bc26 100644 --- a/2013/CVE-2013-1767.md +++ b/2013/CVE-2013-1767.md @@ -14,6 +14,7 @@ Use-after-free vulnerability in the shmem_remount_fs function in mm/shmem.c in t - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 - http://www.ubuntu.com/usn/USN-1788-1 - http://www.ubuntu.com/usn/USN-1788-1 +- http://www.ubuntu.com/usn/USN-1797-1 #### Github No PoCs found on GitHub currently. diff --git a/2013/CVE-2013-1792.md b/2013/CVE-2013-1792.md index 8ebb207f30..11e7f56629 100644 --- a/2013/CVE-2013-1792.md +++ b/2013/CVE-2013-1792.md @@ -14,6 +14,7 @@ Race condition in the install_user_keyrings function in security/keys/process_ke - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 - http://www.ubuntu.com/usn/USN-1788-1 - http://www.ubuntu.com/usn/USN-1788-1 +- http://www.ubuntu.com/usn/USN-1797-1 #### Github - https://github.com/wcventure/PERIOD diff --git a/2013/CVE-2013-2546.md b/2013/CVE-2013-2546.md index 07a00cf348..1a39bc6bfb 100644 --- a/2013/CVE-2013-2546.md +++ b/2013/CVE-2013-2546.md @@ -12,6 +12,7 @@ The report API in the crypto user configuration API in the Linux kernel through #### Reference - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +- http://www.ubuntu.com/usn/USN-1797-1 #### Github No PoCs found on GitHub currently. diff --git a/2013/CVE-2013-2547.md b/2013/CVE-2013-2547.md index f1066e5571..be86836dc8 100644 --- a/2013/CVE-2013-2547.md +++ b/2013/CVE-2013-2547.md @@ -12,6 +12,7 @@ The crypto_report_one function in crypto/crypto_user.c in the report API in the #### Reference - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +- http://www.ubuntu.com/usn/USN-1797-1 #### Github No PoCs found on GitHub currently. diff --git a/2013/CVE-2013-2548.md b/2013/CVE-2013-2548.md index a2316f695d..6e23ecad0c 100644 --- a/2013/CVE-2013-2548.md +++ b/2013/CVE-2013-2548.md @@ -12,6 +12,7 @@ The crypto_report_one function in crypto/crypto_user.c in the report API in the #### Reference - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +- http://www.ubuntu.com/usn/USN-1797-1 #### Github No PoCs found on GitHub currently. diff --git a/2013/CVE-2013-4408.md b/2013/CVE-2013-4408.md new file mode 100644 index 0000000000..354c689710 --- /dev/null +++ b/2013/CVE-2013-4408.md @@ -0,0 +1,17 @@ +### [CVE-2013-4408](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet. + +### POC + +#### Reference +- http://www.ubuntu.com/usn/USN-2054-1 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2013/CVE-2013-4475.md b/2013/CVE-2013-4475.md index a8a5195692..8c8432b25b 100644 --- a/2013/CVE-2013-4475.md +++ b/2013/CVE-2013-4475.md @@ -10,7 +10,7 @@ Samba 3.2.x through 3.6.x before 3.6.20, 4.0.x before 4.0.11, and 4.1.x before 4 ### POC #### Reference -No PoCs from references. +- http://www.ubuntu.com/usn/USN-2054-1 #### Github - https://github.com/Live-Hack-CVE/CVE-2013-4475 diff --git a/2014/CVE-2014-3181.md b/2014/CVE-2014-3181.md new file mode 100644 index 0000000000..396d5e2019 --- /dev/null +++ b/2014/CVE-2014-3181.md @@ -0,0 +1,17 @@ +### [CVE-2014-3181](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3181) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Multiple stack-based buffer overflows in the magicmouse_raw_event function in drivers/hid/hid-magicmouse.c in the Magic Mouse HID driver in the Linux kernel through 3.16.3 allow physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with an event. + +### POC + +#### Reference +- http://www.ubuntu.com/usn/USN-2376-1 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2014/CVE-2014-3184.md b/2014/CVE-2014-3184.md new file mode 100644 index 0000000000..b43dbfdcfc --- /dev/null +++ b/2014/CVE-2014-3184.md @@ -0,0 +1,17 @@ +### [CVE-2014-3184](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3184) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +The report_fixup functions in the HID subsystem in the Linux kernel before 3.16.2 might allow physically proximate attackers to cause a denial of service (out-of-bounds write) via a crafted device that provides a small report descriptor, related to (1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3) drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5) drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c. + +### POC + +#### Reference +- http://www.ubuntu.com/usn/USN-2376-1 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2014/CVE-2014-3185.md b/2014/CVE-2014-3185.md new file mode 100644 index 0000000000..86d7c7b2a7 --- /dev/null +++ b/2014/CVE-2014-3185.md @@ -0,0 +1,17 @@ +### [CVE-2014-3185](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3185) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Multiple buffer overflows in the command_port_read_callback function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in the Linux kernel before 3.16.2 allow physically proximate attackers to execute arbitrary code or cause a denial of service (memory corruption and system crash) via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with a bulk response. + +### POC + +#### Reference +- http://www.ubuntu.com/usn/USN-2376-1 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2014/CVE-2014-3186.md b/2014/CVE-2014-3186.md new file mode 100644 index 0000000000..0d6b189818 --- /dev/null +++ b/2014/CVE-2014-3186.md @@ -0,0 +1,17 @@ +### [CVE-2014-3186](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3186) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Buffer overflow in the picolcd_raw_event function in devices/hid/hid-picolcd_core.c in the PicoLCD HID device driver in the Linux kernel through 3.16.3, as used in Android on Nexus 7 devices, allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that sends a large report. + +### POC + +#### Reference +- http://www.ubuntu.com/usn/USN-2376-1 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2014/CVE-2014-6271.md b/2014/CVE-2014-6271.md index 2e2090db7b..5b7f754a1b 100644 --- a/2014/CVE-2014-6271.md +++ b/2014/CVE-2014-6271.md @@ -179,6 +179,7 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th - https://github.com/Jsmoreira02/Jsmoreira02 - https://github.com/Juan921030/awesome-hacking - https://github.com/K3ysTr0K3R/CVE-2014-6271-EXPLOIT +- https://github.com/K3ysTr0K3R/K3ysTr0K3R - https://github.com/KJOONHWAN/CVE-Exploit-Demonstration - https://github.com/Kaizhe/attacker - https://github.com/KateFayra/auto_vulnerability_tester diff --git a/2014/CVE-2014-6410.md b/2014/CVE-2014-6410.md new file mode 100644 index 0000000000..ccf4126eac --- /dev/null +++ b/2014/CVE-2014-6410.md @@ -0,0 +1,17 @@ +### [CVE-2014-6410](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +The __udf_read_inode function in fs/udf/inode.c in the Linux kernel through 3.16.3 does not restrict the amount of ICB indirection, which allows physically proximate attackers to cause a denial of service (infinite loop or stack consumption) via a UDF filesystem with a crafted inode. + +### POC + +#### Reference +- http://www.ubuntu.com/usn/USN-2376-1 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2014/CVE-2014-6416.md b/2014/CVE-2014-6416.md index eafa3c4b47..797d60a5ef 100644 --- a/2014/CVE-2014-6416.md +++ b/2014/CVE-2014-6416.md @@ -10,7 +10,7 @@ Buffer overflow in net/ceph/auth_x.c in Ceph, as used in the Linux kernel before ### POC #### Reference -No PoCs from references. +- http://www.ubuntu.com/usn/USN-2376-1 #### Github - https://github.com/Live-Hack-CVE/CVE-2014-6416 diff --git a/2014/CVE-2014-6417.md b/2014/CVE-2014-6417.md index f0de81d014..e03a4d60f9 100644 --- a/2014/CVE-2014-6417.md +++ b/2014/CVE-2014-6417.md @@ -10,7 +10,7 @@ net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, does not p ### POC #### Reference -No PoCs from references. +- http://www.ubuntu.com/usn/USN-2376-1 #### Github - https://github.com/Live-Hack-CVE/CVE-2014-6417 diff --git a/2014/CVE-2014-6418.md b/2014/CVE-2014-6418.md new file mode 100644 index 0000000000..7ec4578bc6 --- /dev/null +++ b/2014/CVE-2014-6418.md @@ -0,0 +1,17 @@ +### [CVE-2014-6418](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6418) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, does not properly validate auth replies, which allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via crafted data from the IP address of a Ceph Monitor. + +### POC + +#### Reference +- http://www.ubuntu.com/usn/USN-2376-1 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2016/CVE-2016-7146.md b/2016/CVE-2016-7146.md index 0524ff3724..41ec0952b3 100644 --- a/2016/CVE-2016-7146.md +++ b/2016/CVE-2016-7146.md @@ -10,6 +10,7 @@ MoinMoin 1.9.8 allows remote attackers to conduct "JavaScript injection" attacks ### POC #### Reference +- http://www.ubuntu.com/usn/USN-3137-1 - https://www.curesec.com/blog/article/blog/MoinMoin-198-XSS-175.html - https://www.curesec.com/blog/article/blog/MoinMoin-198-XSS-175.html diff --git a/2016/CVE-2016-7148.md b/2016/CVE-2016-7148.md index a8bbcac263..fe9170a1e6 100644 --- a/2016/CVE-2016-7148.md +++ b/2016/CVE-2016-7148.md @@ -10,6 +10,7 @@ MoinMoin 1.9.8 allows remote attackers to conduct "JavaScript injection" attacks ### POC #### Reference +- http://www.ubuntu.com/usn/USN-3137-1 - https://www.curesec.com/blog/article/blog/MoinMoin-198-XSS-175.html - https://www.curesec.com/blog/article/blog/MoinMoin-198-XSS-175.html diff --git a/2016/CVE-2016-9119.md b/2016/CVE-2016-9119.md new file mode 100644 index 0000000000..6f49b77b80 --- /dev/null +++ b/2016/CVE-2016-9119.md @@ -0,0 +1,17 @@ +### [CVE-2016-9119](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9119) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. + +### POC + +#### Reference +- http://www.ubuntu.com/usn/USN-3137-1 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2017/CVE-2017-0781.md b/2017/CVE-2017-0781.md index 2b597e26e4..28573ab9be 100644 --- a/2017/CVE-2017-0781.md +++ b/2017/CVE-2017-0781.md @@ -33,6 +33,7 @@ A remote code execution vulnerability in the Android system (bluetooth). Product - https://github.com/Miracle963/bluetooth-cve - https://github.com/RavSS/Bluetooth-Crash-CVE-2017-0785 - https://github.com/WinMin/Protocol-Vul +- https://github.com/X3eRo0/android712-blueborne - https://github.com/XsafeAdmin/BlueBorne - https://github.com/chankruze/blueborne - https://github.com/coh7eiqu8thaBu/BookMark diff --git a/2017/CVE-2017-0785.md b/2017/CVE-2017-0785.md index f7e3ee998e..5773d8776e 100644 --- a/2017/CVE-2017-0785.md +++ b/2017/CVE-2017-0785.md @@ -42,6 +42,7 @@ A information disclosure vulnerability in the Android system (bluetooth). Produc - https://github.com/RavSS/Bluetooth-Crash-CVE-2017-0785 - https://github.com/S3cur3Th1sSh1t/Pentest-Tools - https://github.com/Waseem27-art/ART-TOOLKIT +- https://github.com/X3eRo0/android712-blueborne - https://github.com/XsafeAdmin/BlueBorne - https://github.com/YellowVeN0m/Pentesters-toolbox - https://github.com/aymankhalfatni/CVE-2017-0785 diff --git a/2019/CVE-2019-10126.md b/2019/CVE-2019-10126.md index d33f3e0630..f65658fc16 100644 --- a/2019/CVE-2019-10126.md +++ b/2019/CVE-2019-10126.md @@ -18,6 +18,7 @@ A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_ua - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html - https://seclists.org/bugtraq/2019/Jun/26 - https://seclists.org/bugtraq/2019/Jun/26 +- https://usn.ubuntu.com/4117-1/ - https://usn.ubuntu.com/4118-1/ - https://usn.ubuntu.com/4118-1/ diff --git a/2019/CVE-2019-10638.md b/2019/CVE-2019-10638.md index 8de0527d43..1e8f9b6981 100644 --- a/2019/CVE-2019-10638.md +++ b/2019/CVE-2019-10638.md @@ -16,6 +16,7 @@ In the Linux kernel before 5.1.7, a device can be tracked by an attacker using t - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.7 - https://usn.ubuntu.com/4115-1/ - https://usn.ubuntu.com/4115-1/ +- https://usn.ubuntu.com/4117-1/ - https://usn.ubuntu.com/4118-1/ - https://usn.ubuntu.com/4118-1/ - https://www.oracle.com/security-alerts/cpuApr2021.html diff --git a/2019/CVE-2019-12984.md b/2019/CVE-2019-12984.md index 1fbbfd5c59..730ce15a6d 100644 --- a/2019/CVE-2019-12984.md +++ b/2019/CVE-2019-12984.md @@ -14,6 +14,7 @@ A NULL pointer dereference vulnerability in the function nfc_genl_deactivate_tar - http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.13 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.13 +- https://usn.ubuntu.com/4117-1/ - https://usn.ubuntu.com/4118-1/ - https://usn.ubuntu.com/4118-1/ diff --git a/2019/CVE-2019-13233.md b/2019/CVE-2019-13233.md index b000c0fc2e..67de4bf9a3 100644 --- a/2019/CVE-2019-13233.md +++ b/2019/CVE-2019-13233.md @@ -14,6 +14,7 @@ In arch/x86/lib/insn-eval.c in the Linux kernel before 5.1.9, there is a use-aft - http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.9 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.9 +- https://usn.ubuntu.com/4117-1/ - https://usn.ubuntu.com/4118-1/ - https://usn.ubuntu.com/4118-1/ diff --git a/2019/CVE-2019-13272.md b/2019/CVE-2019-13272.md index 1e5cba6c87..16e1c6ccc2 100644 --- a/2019/CVE-2019-13272.md +++ b/2019/CVE-2019-13272.md @@ -24,6 +24,7 @@ In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the - http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17 +- https://usn.ubuntu.com/4117-1/ - https://usn.ubuntu.com/4118-1/ - https://usn.ubuntu.com/4118-1/ diff --git a/2019/CVE-2019-14283.md b/2019/CVE-2019-14283.md index 192b966891..c47fb48545 100644 --- a/2019/CVE-2019-14283.md +++ b/2019/CVE-2019-14283.md @@ -20,6 +20,7 @@ In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does no - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 - https://usn.ubuntu.com/4115-1/ - https://usn.ubuntu.com/4115-1/ +- https://usn.ubuntu.com/4117-1/ - https://usn.ubuntu.com/4118-1/ - https://usn.ubuntu.com/4118-1/ diff --git a/2019/CVE-2019-14284.md b/2019/CVE-2019-14284.md index b052210e0c..f970cbc8d6 100644 --- a/2019/CVE-2019-14284.md +++ b/2019/CVE-2019-14284.md @@ -20,6 +20,7 @@ In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of serv - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 - https://usn.ubuntu.com/4115-1/ - https://usn.ubuntu.com/4115-1/ +- https://usn.ubuntu.com/4117-1/ - https://usn.ubuntu.com/4118-1/ - https://usn.ubuntu.com/4118-1/ diff --git a/2019/CVE-2019-3846.md b/2019/CVE-2019-3846.md index fff17003df..94154889fa 100644 --- a/2019/CVE-2019-3846.md +++ b/2019/CVE-2019-3846.md @@ -18,6 +18,7 @@ A flaw that allowed an attacker to corrupt memory and possibly escalate privileg - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html - https://seclists.org/bugtraq/2019/Jun/26 - https://seclists.org/bugtraq/2019/Jun/26 +- https://usn.ubuntu.com/4117-1/ - https://usn.ubuntu.com/4118-1/ - https://usn.ubuntu.com/4118-1/ diff --git a/2019/CVE-2019-3900.md b/2019/CVE-2019-3900.md index 05615faabd..b1fa44be88 100644 --- a/2019/CVE-2019-3900.md +++ b/2019/CVE-2019-3900.md @@ -14,6 +14,7 @@ An infinite loop issue was found in the vhost_net kernel module in Linux Kernel - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html - https://usn.ubuntu.com/4115-1/ - https://usn.ubuntu.com/4115-1/ +- https://usn.ubuntu.com/4117-1/ - https://usn.ubuntu.com/4118-1/ - https://usn.ubuntu.com/4118-1/ - https://www.oracle.com/security-alerts/cpuApr2021.html diff --git a/2020/CVE-2020-0688.md b/2020/CVE-2020-0688.md index be40cea03f..08c51c08fc 100644 --- a/2020/CVE-2020-0688.md +++ b/2020/CVE-2020-0688.md @@ -22,6 +22,7 @@ A remote code execution vulnerability exists in Microsoft Exchange software when #### Github - https://github.com/0x783kb/Security-operation-book +- https://github.com/0xMarcio/cve - https://github.com/0xMrNiko/Awesome-Red-Teaming - https://github.com/0xT11/CVE-POC - https://github.com/1337-llama/CVE-2020-0688-Python3 diff --git a/2020/CVE-2020-0796.md b/2020/CVE-2020-0796.md index 63c75bbbe3..068919a81a 100644 --- a/2020/CVE-2020-0796.md +++ b/2020/CVE-2020-0796.md @@ -32,6 +32,7 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve #### Github - https://github.com/0day404/vulnerability-poc +- https://github.com/0xMarcio/cve - https://github.com/0xT11/CVE-POC - https://github.com/0xcyberpj/windows-exploitation - https://github.com/0xeb-bp/cve-2020-0796 diff --git a/2020/CVE-2020-1472.md b/2020/CVE-2020-1472.md index 3e77ff1cc1..d58fc6a7e9 100644 --- a/2020/CVE-2020-1472.md +++ b/2020/CVE-2020-1472.md @@ -43,6 +43,7 @@ An elevation of privilege vulnerability exists when an attacker establishes a vu - https://github.com/0x783kb/Security-operation-book - https://github.com/0xHunterr/OSCP-Study-Notes - https://github.com/0xHunterr/OSCP-Studying-Notes +- https://github.com/0xMarcio/cve - https://github.com/0xStrygwyr/OSCP-Guide - https://github.com/0xT11/CVE-POC - https://github.com/0xZipp0/BIBLE diff --git a/2020/CVE-2020-18657.md b/2020/CVE-2020-18657.md new file mode 100644 index 0000000000..274456ad4a --- /dev/null +++ b/2020/CVE-2020-18657.md @@ -0,0 +1,17 @@ +### [CVE-2020-18657](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18657) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Cross Site Scripting (XSS) vulnerability in GetSimpleCMS <= 3.3.15 in admin/changedata.php via the redirect_url parameter and the headers_sent function. + +### POC + +#### Reference +- https://www.seebug.org/vuldb/ssvid-97929 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2020/CVE-2020-18658.md b/2020/CVE-2020-18658.md new file mode 100644 index 0000000000..dbfa63eed9 --- /dev/null +++ b/2020/CVE-2020-18658.md @@ -0,0 +1,17 @@ +### [CVE-2020-18658](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18658) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Cross Site Scriptiong (XSS) vulnerability in GetSimpleCMS <=3.3.15 via the timezone parameter to settings.php. + +### POC + +#### Reference +- https://www.seebug.org/vuldb/ssvid-97930 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2020/CVE-2020-18659.md b/2020/CVE-2020-18659.md new file mode 100644 index 0000000000..a0ba438a34 --- /dev/null +++ b/2020/CVE-2020-18659.md @@ -0,0 +1,17 @@ +### [CVE-2020-18659](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18659) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Cross Site Scripting vulnerability in GetSimpleCMS <=3.3.15 via the (1) sitename, (2) username, and (3) email parameters to /admin/setup.php + +### POC + +#### Reference +- https://www.seebug.org/vuldb/ssvid-97931 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2020/CVE-2020-18661.md b/2020/CVE-2020-18661.md new file mode 100644 index 0000000000..21d9002920 --- /dev/null +++ b/2020/CVE-2020-18661.md @@ -0,0 +1,17 @@ +### [CVE-2020-18661](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18661) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Cross Site Scripting (XSS) vulnerability in gnuboard5 <=v5.3.2.8 via the url parameter to bbs/login.php. + +### POC + +#### Reference +- https://www.seebug.org/vuldb/ssvid-97925 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2020/CVE-2020-18716.md b/2020/CVE-2020-18716.md new file mode 100644 index 0000000000..16fd914655 --- /dev/null +++ b/2020/CVE-2020-18716.md @@ -0,0 +1,17 @@ +### [CVE-2020-18716](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18716) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +SQL Injection in Rockoa v1.8.7 allows remote attackers to gain privileges due to loose filtering of parameters in wordAction.php. + +### POC + +#### Reference +- https://www.seebug.org/vuldb/ssvid-97867 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2020/CVE-2020-2551.md b/2020/CVE-2020-2551.md index 878354f8a0..3115dc8349 100644 --- a/2020/CVE-2020-2551.md +++ b/2020/CVE-2020-2551.md @@ -16,6 +16,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware #### Github - https://github.com/0x727/JNDIExploit - https://github.com/0xAbbarhSF/CVE-Exploit +- https://github.com/0xMarcio/cve - https://github.com/0xMrNiko/Awesome-Red-Teaming - https://github.com/0xT11/CVE-POC - https://github.com/0xlane/CVE-2020-2551 diff --git a/2020/CVE-2020-5902.md b/2020/CVE-2020-5902.md index b8be8c8ca2..e858df678c 100644 --- a/2020/CVE-2020-5902.md +++ b/2020/CVE-2020-5902.md @@ -35,6 +35,7 @@ In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12. - https://github.com/0day404/vulnerability-poc - https://github.com/0x783kb/Security-operation-book - https://github.com/0xAbdullah/CVE-2020-5902 +- https://github.com/0xMarcio/cve - https://github.com/0xMrNiko/Awesome-Red-Teaming - https://github.com/0xPugal/One-Liners - https://github.com/0xPugazh/One-Liners diff --git a/2021/CVE-2021-1675.md b/2021/CVE-2021-1675.md index 286cdfd69f..8a672089c3 100644 --- a/2021/CVE-2021-1675.md +++ b/2021/CVE-2021-1675.md @@ -56,6 +56,7 @@ Windows Print Spooler Remote Code Execution Vulnerability - https://github.com/0x727/usefull-elevation-of-privilege - https://github.com/0xHunterr/OSCP-Study-Notes - https://github.com/0xHunterr/OSCP-Studying-Notes +- https://github.com/0xMarcio/cve - https://github.com/0xStrygwyr/OSCP-Guide - https://github.com/0xZipp0/OSCP - https://github.com/0xaniketB/HackTheBox-Driver diff --git a/2021/CVE-2021-21972.md b/2021/CVE-2021-21972.md index 0f313503e2..e14ddd4227 100644 --- a/2021/CVE-2021-21972.md +++ b/2021/CVE-2021-21972.md @@ -22,6 +22,7 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability in a v - https://github.com/0day404/vulnerability-poc - https://github.com/0ps/pocassistdb - https://github.com/0x783kb/Security-operation-book +- https://github.com/0xMarcio/cve - https://github.com/0xStrygwyr/OSCP-Guide - https://github.com/0xZipp0/OSCP - https://github.com/0xsyr0/OSCP diff --git a/2021/CVE-2021-31166.md b/2021/CVE-2021-31166.md index ac99ef243a..2bbd63a8b3 100644 --- a/2021/CVE-2021-31166.md +++ b/2021/CVE-2021-31166.md @@ -20,6 +20,7 @@ HTTP Protocol Stack Remote Code Execution Vulnerability #### Github - https://github.com/0vercl0k/0vercl0k - https://github.com/0vercl0k/CVE-2021-31166 +- https://github.com/0xMarcio/cve - https://github.com/0xmaximus/Home-Demolisher - https://github.com/20142995/sectool - https://github.com/ARPSyndicate/cvemon diff --git a/2021/CVE-2021-3156.md b/2021/CVE-2021-3156.md index e7bf8de9a2..e3ea2f23ac 100644 --- a/2021/CVE-2021-3156.md +++ b/2021/CVE-2021-3156.md @@ -37,6 +37,7 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based - https://github.com/0day404/vulnerability-poc - https://github.com/0x4ndy/clif - https://github.com/0x7183/CVE-2021-3156 +- https://github.com/0xMarcio/cve - https://github.com/0xStrygwyr/OSCP-Guide - https://github.com/0xZipp0/OSCP - https://github.com/0xdevil/CVE-2021-3156 diff --git a/2021/CVE-2021-4034.md b/2021/CVE-2021-4034.md index f686672209..8a259c9e11 100644 --- a/2021/CVE-2021-4034.md +++ b/2021/CVE-2021-4034.md @@ -22,6 +22,7 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility. - https://github.com/0x01-sec/CVE-2021-4034- - https://github.com/0x05a/my-cve-2021-4034-poc - https://github.com/0x4ndy/CVE-2021-4034-PoC +- https://github.com/0xMarcio/cve - https://github.com/0xNix/CVE-2021-4034 - https://github.com/0xStrygwyr/OSCP-Guide - https://github.com/0xZipp0/OSCP diff --git a/2021/CVE-2021-44228.md b/2021/CVE-2021-44228.md index 03c4b1d279..10c50de3a0 100644 --- a/2021/CVE-2021-44228.md +++ b/2021/CVE-2021-44228.md @@ -66,6 +66,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - https://github.com/0xCyberY/CVE-T4PDF - https://github.com/0xDexter0us/Log4J-Scanner - https://github.com/0xInfection/LogMePwn +- https://github.com/0xMarcio/cve - https://github.com/0xPugal/One-Liners - https://github.com/0xPugazh/One-Liners - https://github.com/0xRyan/log4j-nullroute diff --git a/2022/CVE-2022-0185.md b/2022/CVE-2022-0185.md index fe99f3ce4d..2ac761e8fd 100644 --- a/2022/CVE-2022-0185.md +++ b/2022/CVE-2022-0185.md @@ -16,6 +16,7 @@ A heap-based buffer overflow flaw was found in the way the legacy_parse_param fu - https://www.willsroot.io/2022/01/cve-2022-0185.html #### Github +- https://github.com/0xMarcio/cve - https://github.com/0xTen/pwn-gym - https://github.com/20142995/sectool - https://github.com/ARPSyndicate/cvemon diff --git a/2022/CVE-2022-0847.md b/2022/CVE-2022-0847.md index eeae312004..a318f8078e 100644 --- a/2022/CVE-2022-0847.md +++ b/2022/CVE-2022-0847.md @@ -24,6 +24,7 @@ A flaw was found in the way the "flags" member of the new pipe buffer structure #### Github - https://github.com/0day404/vulnerability-poc - https://github.com/0xIronGoat/dirty-pipe +- https://github.com/0xMarcio/cve - https://github.com/0xStrygwyr/OSCP-Guide - https://github.com/0xTen/pwn-gym - https://github.com/0xZipp0/OSCP diff --git a/2022/CVE-2022-0995.md b/2022/CVE-2022-0995.md index 45b27d225a..1e1f78edf5 100644 --- a/2022/CVE-2022-0995.md +++ b/2022/CVE-2022-0995.md @@ -18,6 +18,7 @@ An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93ce93587d36493f2f86921fa79921b3cba63fbb #### Github +- https://github.com/0xMarcio/cve - https://github.com/1nzag/CVE-2022-0995 - https://github.com/ARPSyndicate/cvemon - https://github.com/Al1ex/LinuxEelvation diff --git a/2022/CVE-2022-23222.md b/2022/CVE-2022-23222.md index 485119d038..5a6e4d79b2 100644 --- a/2022/CVE-2022-23222.md +++ b/2022/CVE-2022-23222.md @@ -14,6 +14,7 @@ No PoCs from references. #### Github - https://github.com/0day404/vulnerability-poc +- https://github.com/0xMarcio/cve - https://github.com/0xsmirk/vehicle-kernel-exploit - https://github.com/ARPSyndicate/cvemon - https://github.com/Al1ex/LinuxEelvation diff --git a/2022/CVE-2022-25636.md b/2022/CVE-2022-25636.md index 49296334e0..7aaaf6dff1 100644 --- a/2022/CVE-2022-25636.md +++ b/2022/CVE-2022-25636.md @@ -20,6 +20,7 @@ net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows loca - https://www.oracle.com/security-alerts/cpujul2022.html #### Github +- https://github.com/0xMarcio/cve - https://github.com/20142995/sectool - https://github.com/ARPSyndicate/cvemon - https://github.com/B0nfee/CVE-2022-25636 diff --git a/2022/CVE-2022-2588.md b/2022/CVE-2022-2588.md index f88e8746fd..cc4f291959 100644 --- a/2022/CVE-2022-2588.md +++ b/2022/CVE-2022-2588.md @@ -25,6 +25,7 @@ It was discovered that the cls_route filter implementation in the Linux kernel w - https://www.openwall.com/lists/oss-security/2022/08/09/6 #### Github +- https://github.com/0xMarcio/cve - https://github.com/20142995/sectool - https://github.com/ARGOeu-Metrics/secmon-probes - https://github.com/ARPSyndicate/cvemon diff --git a/2022/CVE-2022-30190.md b/2022/CVE-2022-30190.md index 121b94624b..e40813c028 100644 --- a/2022/CVE-2022-30190.md +++ b/2022/CVE-2022-30190.md @@ -47,6 +47,7 @@ A remote code execution vulnerability exists when MSDT is called using the URL p #### Github - https://github.com/0xAbbarhSF/FollinaXploit +- https://github.com/0xMarcio/cve - https://github.com/0xStarFord/FollinaXploit - https://github.com/0xStrygwyr/OSCP-Guide - https://github.com/0xZipp0/OSCP diff --git a/2022/CVE-2022-33679.md b/2022/CVE-2022-33679.md index 8c7e61d4cf..a694cca2e7 100644 --- a/2022/CVE-2022-33679.md +++ b/2022/CVE-2022-33679.md @@ -33,6 +33,7 @@ Windows Kerberos Elevation of Privilege Vulnerability No PoCs from references. #### Github +- https://github.com/0xMarcio/cve - https://github.com/ARPSyndicate/cvemon - https://github.com/Amulab/CVE-2022-33679 - https://github.com/Ascotbe/Kernelhub diff --git a/2022/CVE-2022-39197.md b/2022/CVE-2022-39197.md index b66d81ec24..0ffa0cac11 100644 --- a/2022/CVE-2022-39197.md +++ b/2022/CVE-2022-39197.md @@ -16,6 +16,7 @@ An XSS (Cross Site Scripting) vulnerability was found in HelpSystems Cobalt Stri - https://www.cobaltstrike.com/blog/tag/release/ #### Github +- https://github.com/0xMarcio/cve - https://github.com/20142995/sectool - https://github.com/4nth0ny1130/CVE-2022-39197-fix_patch - https://github.com/ARPSyndicate/cvemon diff --git a/2023/CVE-2023-0386.md b/2023/CVE-2023-0386.md index b246174017..c497bcc039 100644 --- a/2023/CVE-2023-0386.md +++ b/2023/CVE-2023-0386.md @@ -16,6 +16,7 @@ A flaw was found in the Linux kernel, where unauthorized access to the execution - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a #### Github +- https://github.com/0xMarcio/cve - https://github.com/20142995/sectool - https://github.com/3yujw7njai/CVE-2023-0386 - https://github.com/AabyssZG/AWD-Guide diff --git a/2023/CVE-2023-20887.md b/2023/CVE-2023-20887.md index d06dd46dd2..5a3e3d83f4 100644 --- a/2023/CVE-2023-20887.md +++ b/2023/CVE-2023-20887.md @@ -14,6 +14,7 @@ Aria Operations for Networks contains a command injection vulnerability. A malic - http://packetstormsecurity.com/files/173761/VMWare-Aria-Operations-For-Networks-Remote-Command-Execution.html #### Github +- https://github.com/0xMarcio/cve - https://github.com/ARPSyndicate/cvemon - https://github.com/Awrrays/FrameVul - https://github.com/CVEDB/awesome-cve-repo diff --git a/2023/CVE-2023-21608.md b/2023/CVE-2023-21608.md index a2412835b8..ecf2687dcd 100644 --- a/2023/CVE-2023-21608.md +++ b/2023/CVE-2023-21608.md @@ -13,6 +13,7 @@ Adobe Acrobat Reader versions 22.003.20282 (and earlier), 22.003.20281 (and earl No PoCs from references. #### Github +- https://github.com/0xMarcio/cve - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo diff --git a/2023/CVE-2023-21768.md b/2023/CVE-2023-21768.md index d33c2a1427..e55c093a6b 100644 --- a/2023/CVE-2023-21768.md +++ b/2023/CVE-2023-21768.md @@ -18,6 +18,7 @@ Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerabili - http://packetstormsecurity.com/files/171606/Ancillary-Function-Driver-AFD-For-Winsock-Privilege-Escalation.html #### Github +- https://github.com/0xMarcio/cve - https://github.com/0xsyr0/OSCP - https://github.com/2lambda123/diaphora - https://github.com/3yujw7njai/CVE-2023-21768-POC diff --git a/2023/CVE-2023-23397.md b/2023/CVE-2023-23397.md index 476eb665ce..68d2164891 100644 --- a/2023/CVE-2023-23397.md +++ b/2023/CVE-2023-23397.md @@ -20,6 +20,7 @@ Microsoft Outlook Elevation of Privilege Vulnerability No PoCs from references. #### Github +- https://github.com/0xMarcio/cve - https://github.com/0xsyr0/OSCP - https://github.com/20142995/sectool - https://github.com/3yujw7njai/CVE-2023-23397-POC diff --git a/2023/CVE-2023-29060.md b/2023/CVE-2023-29060.md new file mode 100644 index 0000000000..cdb207b6fc --- /dev/null +++ b/2023/CVE-2023-29060.md @@ -0,0 +1,17 @@ +### [CVE-2023-29060](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29060) +![](https://img.shields.io/static/v1?label=Product&message=FACSChorus&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=5.0%3C%3D%205.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1299%20Missing%20Protection%20Mechanism%20for%20Alternate%20Hardware%20Interface&color=brighgreen) + +### Description + +The FACSChorus workstation operating system does not restrict what devices can interact with its USB ports. If exploited, a threat actor with physical access to the workstation could gain access to system information and potentially exfiltrate data. + +### POC + +#### Reference +- https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software + +#### Github +No PoCs found on GitHub currently. + diff --git a/2023/CVE-2023-29061.md b/2023/CVE-2023-29061.md new file mode 100644 index 0000000000..8e21a01200 --- /dev/null +++ b/2023/CVE-2023-29061.md @@ -0,0 +1,17 @@ +### [CVE-2023-29061](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29061) +![](https://img.shields.io/static/v1?label=Product&message=FACSChorus&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=5.0%3C%3D%205.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-306%20Missing%20Authentication%20for%20Critical%20Function&color=brighgreen) + +### Description + +There is no BIOS password on the FACSChorus workstation. A threat actor with physical access to the workstation can potentially exploit this vulnerability to access the BIOS configuration and modify the drive boot order and BIOS pre-boot authentication. + +### POC + +#### Reference +- https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software + +#### Github +No PoCs found on GitHub currently. + diff --git a/2023/CVE-2023-29062.md b/2023/CVE-2023-29062.md new file mode 100644 index 0000000000..b16addbe93 --- /dev/null +++ b/2023/CVE-2023-29062.md @@ -0,0 +1,17 @@ +### [CVE-2023-29062](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29062) +![](https://img.shields.io/static/v1?label=Product&message=FACSChorus&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=5.0%3C%3D%205.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-287%20Improper%20Authentication&color=brighgreen) + +### Description + +The Operating System hosting the FACSChorus application is configured to allow transmission of hashed user credentials upon user action without adequately validating the identity of the requested resource. This is possible through the use of LLMNR, MBT-NS, or MDNS and will result in NTLMv2 hashes being sent to a malicious entity position on the local network. These hashes can subsequently be attacked through brute force and cracked if a weak password is used. This attack would only apply to domain joined systems. + +### POC + +#### Reference +- https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software + +#### Github +No PoCs found on GitHub currently. + diff --git a/2023/CVE-2023-29063.md b/2023/CVE-2023-29063.md new file mode 100644 index 0000000000..d24d8aec94 --- /dev/null +++ b/2023/CVE-2023-29063.md @@ -0,0 +1,17 @@ +### [CVE-2023-29063](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29063) +![](https://img.shields.io/static/v1?label=Product&message=FACSChorus&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=5.0%3C%3D%205.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1299%20Missing%20Protection%20Mechanism%20for%20Alternate%20Hardware%20Interface&color=brighgreen) + +### Description + +The FACSChorus workstation does not prevent physical access to its PCI express (PCIe) slots, which could allow a threat actor to insert a PCI card designed for memory capture. A threat actor can then isolate sensitive information such as a BitLocker encryption key from a dump of the workstation RAM during startup. + +### POC + +#### Reference +- https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software + +#### Github +No PoCs found on GitHub currently. + diff --git a/2023/CVE-2023-29064.md b/2023/CVE-2023-29064.md new file mode 100644 index 0000000000..5d03702980 --- /dev/null +++ b/2023/CVE-2023-29064.md @@ -0,0 +1,17 @@ +### [CVE-2023-29064](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29064) +![](https://img.shields.io/static/v1?label=Product&message=FACSChorus&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=5.0%3C%3D%205.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-798%20Use%20of%20Hard-coded%20Credentials&color=brighgreen) + +### Description + +The FACSChorus software contains sensitive information stored in plaintext. A threat actor could gain hardcoded secrets used by the application, which include tokens and passwords for administrative accounts. + +### POC + +#### Reference +- https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software + +#### Github +No PoCs found on GitHub currently. + diff --git a/2023/CVE-2023-29065.md b/2023/CVE-2023-29065.md new file mode 100644 index 0000000000..c9604004eb --- /dev/null +++ b/2023/CVE-2023-29065.md @@ -0,0 +1,17 @@ +### [CVE-2023-29065](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29065) +![](https://img.shields.io/static/v1?label=Product&message=FACSChorus&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=5.0%3C%3D%205.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-277%20Insecure%20Inherited%20Permissions&color=brighgreen) + +### Description + +The FACSChorus software database can be accessed directly with the privileges of the currently logged-in user. A threat actor with physical access could potentially gain credentials, which could be used to alter or destroy data stored in the database. + +### POC + +#### Reference +- https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software + +#### Github +No PoCs found on GitHub currently. + diff --git a/2023/CVE-2023-29066.md b/2023/CVE-2023-29066.md new file mode 100644 index 0000000000..2a6f5538eb --- /dev/null +++ b/2023/CVE-2023-29066.md @@ -0,0 +1,17 @@ +### [CVE-2023-29066](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29066) +![](https://img.shields.io/static/v1?label=Product&message=FACSChorus&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=5.0%3C%3D%205.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-266%20Incorrect%20Privilege%20Assignment&color=brighgreen) + +### Description + +The FACSChorus software does not properly assign data access privileges for operating system user accounts. A non-administrative OS account can modify information stored in the local application data folders. + +### POC + +#### Reference +- https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software + +#### Github +No PoCs found on GitHub currently. + diff --git a/2023/CVE-2023-32233.md b/2023/CVE-2023-32233.md index d42a56bbc3..3879966c64 100644 --- a/2023/CVE-2023-32233.md +++ b/2023/CVE-2023-32233.md @@ -16,6 +16,7 @@ In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when - https://news.ycombinator.com/item?id=35879660 #### Github +- https://github.com/0xMarcio/cve - https://github.com/0xsyr0/OSCP - https://github.com/ARGOeu-Metrics/secmon-probes - https://github.com/CVEDB/awesome-cve-repo diff --git a/2023/CVE-2023-3623.md b/2023/CVE-2023-3623.md new file mode 100644 index 0000000000..a8db241196 --- /dev/null +++ b/2023/CVE-2023-3623.md @@ -0,0 +1,17 @@ +### [CVE-2023-3623](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3623) +![](https://img.shields.io/static/v1?label=Product&message=Mountain%20Flood%20Disaster%20Prevention%20Monitoring%20and%20Early%20Warning%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2020230704%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%20Unrestricted%20Upload&color=brighgreen) + +### Description + +A vulnerability was found in Suncreate Mountain Flood Disaster Prevention Monitoring and Early Warning System up to 20230704. It has been rated as critical. Affected by this issue is some unknown functionality of the file /Duty/AjaxHandle/UploadHandler.ashx of the component Duty Module. The manipulation of the argument Filedata leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-233576. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +- https://github.com/luoshaokai/cve/blob/main/one.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2023/CVE-2023-38831.md b/2023/CVE-2023-38831.md index 074421fcd8..2ccb1b391c 100644 --- a/2023/CVE-2023-38831.md +++ b/2023/CVE-2023-38831.md @@ -16,6 +16,7 @@ RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user - https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/ #### Github +- https://github.com/0xMarcio/cve - https://github.com/80r1ng/CVE-2023-38831-EXP - https://github.com/Ahmed1Al/CVE-2023-38831-winrar-exploit - https://github.com/AskarKasimov/1337Rpwn4 diff --git a/2023/CVE-2023-4771.md b/2023/CVE-2023-4771.md new file mode 100644 index 0000000000..0df1ddc61d --- /dev/null +++ b/2023/CVE-2023-4771.md @@ -0,0 +1,17 @@ +### [CVE-2023-4771](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4771) +![](https://img.shields.io/static/v1?label=Product&message=CKEditor&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%3D%204.15.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) + +### Description + +A Cross-Site scripting vulnerability has been found in CKSource CKEditor affecting versions 4.15.1 and earlier. An attacker could send malicious javascript code through the /ckeditor/samples/old/ajax.html file and retrieve an authorized user's information. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2023/CVE-2023-4863.md b/2023/CVE-2023-4863.md index 72358b7ea9..cce48aaee5 100644 --- a/2023/CVE-2023-4863.md +++ b/2023/CVE-2023-4863.md @@ -22,6 +22,7 @@ Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and lib - https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/ #### Github +- https://github.com/0xMarcio/cve - https://github.com/Blaukovitch/GOOGLE_CHROME_Windows_7_CRACK - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top diff --git a/2023/CVE-2023-4911.md b/2023/CVE-2023-4911.md index efa9d0594f..e790cf4ac4 100644 --- a/2023/CVE-2023-4911.md +++ b/2023/CVE-2023-4911.md @@ -28,6 +28,7 @@ A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so whi - https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt #### Github +- https://github.com/0xMarcio/cve - https://github.com/0xsyr0/OSCP - https://github.com/20142995/sectool - https://github.com/BlessedRebuS/OSCP-Pentesting-Cheatsheet diff --git a/2023/CVE-2023-7025.md b/2023/CVE-2023-7025.md new file mode 100644 index 0000000000..834b89c98c --- /dev/null +++ b/2023/CVE-2023-7025.md @@ -0,0 +1,17 @@ +### [CVE-2023-7025](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7025) +![](https://img.shields.io/static/v1?label=Product&message=hedron-domain-hook&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%203.8.0.12-0k0.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-284%20Improper%20Access%20Controls&color=brighgreen) + +### Description + +A vulnerability was found in KylinSoft hedron-domain-hook up to 3.8.0.12-0k0.5. It has been declared as critical. This vulnerability affects the function init_kcm of the component DBus Handler. The manipulation leads to improper access controls. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. VDB-248578 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +- https://vuldb.com/?id.248578 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2023/CVE-2023-7028.md b/2023/CVE-2023-7028.md index 6bb4366f73..8f5f792584 100644 --- a/2023/CVE-2023-7028.md +++ b/2023/CVE-2023-7028.md @@ -13,6 +13,7 @@ An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 pr No PoCs from references. #### Github +- https://github.com/0xMarcio/cve - https://github.com/0xsyr0/OSCP - https://github.com/Azathothas/Stars - https://github.com/CVE-Reversing/CVE-Reversing diff --git a/2023/CVE-2023-7108.md b/2023/CVE-2023-7108.md index 366ebd66f6..8fc0259bdc 100644 --- a/2023/CVE-2023-7108.md +++ b/2023/CVE-2023-7108.md @@ -12,6 +12,7 @@ A vulnerability classified as problematic has been found in code-projects E-Comm #### Reference - https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20Stored%20Cross-site%20Scripting.md - https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20Stored%20Cross-site%20Scripting.md +- https://vuldb.com/?id.249003 #### Github - https://github.com/h4md153v63n/CVEs diff --git a/2024/CVE-2024-1086.md b/2024/CVE-2024-1086.md index be54a1dee4..0558b8d86e 100644 --- a/2024/CVE-2024-1086.md +++ b/2024/CVE-2024-1086.md @@ -18,6 +18,7 @@ A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables compon - https://pwning.tech/nftables/ #### Github +- https://github.com/0xMarcio/cve - https://github.com/0xsyr0/OSCP - https://github.com/Alicey0719/docker-POC_CVE-2024-1086 - https://github.com/BachoSeven/stellestelline diff --git a/2024/CVE-2024-21338.md b/2024/CVE-2024-21338.md index 50a6f1e221..a80e4abca0 100644 --- a/2024/CVE-2024-21338.md +++ b/2024/CVE-2024-21338.md @@ -31,6 +31,7 @@ Windows Kernel Elevation of Privilege Vulnerability - https://decoded.avast.io/janvojtesek/lazarus-and-the-fudmodule-rootkit-beyond-byovd-with-an-admin-to-kernel-zero-day/ #### Github +- https://github.com/0xMarcio/cve - https://github.com/GhostTroops/TOP - https://github.com/UMU618/CVE-2024-21338 - https://github.com/Zombie-Kaiser/CVE-2024-21338-x64-build- diff --git a/2024/CVE-2024-21413.md b/2024/CVE-2024-21413.md index 27829206a0..5036603ab7 100644 --- a/2024/CVE-2024-21413.md +++ b/2024/CVE-2024-21413.md @@ -19,6 +19,7 @@ Microsoft Outlook Remote Code Execution Vulnerability - https://research.checkpoint.com/2024/the-risks-of-the-monikerlink-bug-in-microsoft-outlook-and-the-big-picture/ #### Github +- https://github.com/0xMarcio/cve - https://github.com/CMNatic/CVE-2024-21413 - https://github.com/DevAkabari/CVE-2024-21413 - https://github.com/GhostTroops/TOP diff --git a/2024/CVE-2024-21683.md b/2024/CVE-2024-21683.md index f6f70fb45b..d01ef1d9eb 100644 --- a/2024/CVE-2024-21683.md +++ b/2024/CVE-2024-21683.md @@ -13,6 +13,7 @@ This High severity RCE (Remote Code Execution) vulnerability was introduced in v No PoCs from references. #### Github +- https://github.com/0xMarcio/cve - https://github.com/Arbeys/CVE-2024-21683-PoC - https://github.com/GhostTroops/TOP - https://github.com/Threekiii/CVE diff --git a/2024/CVE-2024-21762.md b/2024/CVE-2024-21762.md index 042c03b7bf..4427374c63 100644 --- a/2024/CVE-2024-21762.md +++ b/2024/CVE-2024-21762.md @@ -14,6 +14,7 @@ A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 th No PoCs from references. #### Github +- https://github.com/0xMarcio/cve - https://github.com/AlexLondan/CVE-2024-21762-Fortinet-RCE-ALLWORK - https://github.com/BetterCzz/CVE-2024-20291-POC - https://github.com/BishopFox/cve-2024-21762-check diff --git a/2024/CVE-2024-22120.md b/2024/CVE-2024-22120.md index 05a8420f7b..df0ecc79cc 100644 --- a/2024/CVE-2024-22120.md +++ b/2024/CVE-2024-22120.md @@ -14,6 +14,7 @@ Zabbix server can perform command execution for configured scripts. After comman - https://support.zabbix.com/browse/ZBX-24505 #### Github +- https://github.com/0xMarcio/cve - https://github.com/GhostTroops/TOP - https://github.com/Threekiii/CVE - https://github.com/W01fh4cker/CVE-2024-22120-RCE diff --git a/2024/CVE-2024-22549.md b/2024/CVE-2024-22549.md index c5335d5e10..958544da22 100644 --- a/2024/CVE-2024-22549.md +++ b/2024/CVE-2024-22549.md @@ -10,6 +10,7 @@ FlyCms 1.0 is vulnerable to Cross Site Scripting (XSS) in the email settings of ### POC #### Reference +- https://github.com/cccbbbttt/cms/blob/main/1.md - https://github.com/cccbbbttt/cms/blob/main/1.md #### Github diff --git a/2024/CVE-2024-23897.md b/2024/CVE-2024-23897.md index c3819f3171..6aa94206b1 100644 --- a/2024/CVE-2024-23897.md +++ b/2024/CVE-2024-23897.md @@ -16,6 +16,7 @@ Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of - http://packetstormsecurity.com/files/176840/Jenkins-2.441-LTS-2.426.3-Arbitrary-File-Read.html #### Github +- https://github.com/0xMarcio/cve - https://github.com/10T4/PoC-Fix-jenkins-rce_CVE-2024-23897 - https://github.com/20142995/sectool - https://github.com/3yujw7njai/CVE-2024-23897 diff --git a/2024/CVE-2024-2408.md b/2024/CVE-2024-2408.md new file mode 100644 index 0000000000..804914b072 --- /dev/null +++ b/2024/CVE-2024-2408.md @@ -0,0 +1,18 @@ +### [CVE-2024-2408](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2408) +![](https://img.shields.io/static/v1?label=Product&message=PHP&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +The openssl_private_decrypt function in PHP, when using PKCS1 padding (OPENSSL_PKCS1_PADDING, which is the default), is vulnerable to the Marvin Attack unless it is used with an OpenSSL version that includes the changes from this pull request: https://github.com/openssl/openssl/pull/13817 (rsa_pkcs1_implicit_rejection). These changes are part of OpenSSL 3.2 and have also been backported to stable versions of various Linux distributions, as well as to the PHP builds provided for Windows since the previous release. All distributors and builders should ensure that this version is used to prevent PHP from being vulnerable.PHP Windows builds for the versions 8.1.29, 8.2.20 and 8.3.8 and above include OpenSSL patches that fix the vulnerability. + +### POC + +#### Reference +- https://github.com/php/php-src/security/advisories/GHSA-hh26-4ppw-5864 + +#### Github +- https://github.com/chnzzh/OpenSSL-CVE-lib +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-24919.md b/2024/CVE-2024-24919.md index 8b78f5ad18..c8476995be 100644 --- a/2024/CVE-2024-24919.md +++ b/2024/CVE-2024-24919.md @@ -25,6 +25,7 @@ No PoCs from references. - https://github.com/GoatSecurity/CVE-2024-24919 - https://github.com/GuayoyoCyber/CVE-2024-24919 - https://github.com/J4F9S5D2Q7/CVE-2024-24919 +- https://github.com/J4F9S5D2Q7/CVE-2024-24919-CHECKPOINT - https://github.com/LucasKatashi/CVE-2024-24919 - https://github.com/MohamedWagdy7/CVE-2024-24919 - https://github.com/Ostorlab/KEV @@ -52,6 +53,7 @@ No PoCs from references. - https://github.com/nullcult/CVE-2024-24919-Exploit - https://github.com/numencyber/Vulnerability_PoC - https://github.com/pewc0/CVE-2024-24919 +- https://github.com/protonnegativo/CVE-2024-24919 - https://github.com/r4p3c4/CVE-2024-24919-Checkpoint-Firewall-VPN-Check - https://github.com/r4p3c4/CVE-2024-24919-Exploit-PoC-Checkpoint-Firewall-VPN - https://github.com/satchhacker/cve-2024-24919 diff --git a/2024/CVE-2024-25600.md b/2024/CVE-2024-25600.md index c84829b5dc..e83b4b97bc 100644 --- a/2024/CVE-2024-25600.md +++ b/2024/CVE-2024-25600.md @@ -17,6 +17,7 @@ Improper Control of Generation of Code ('Code Injection') vulnerability in Codee #### Github - https://github.com/0bl1v10nf0rg0773n/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress +- https://github.com/0xMarcio/cve - https://github.com/Chocapikk/CVE-2024-25600 - https://github.com/Christbowel/CVE-2024-25600_Nuclei-Template - https://github.com/GhostTroops/TOP diff --git a/2024/CVE-2024-27198.md b/2024/CVE-2024-27198.md index eb2377cd25..806de85bce 100644 --- a/2024/CVE-2024-27198.md +++ b/2024/CVE-2024-27198.md @@ -13,6 +13,7 @@ In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform No PoCs from references. #### Github +- https://github.com/0xMarcio/cve - https://github.com/CharonDefalt/CVE-2024-27198-RCE - https://github.com/Chocapikk/CVE-2024-27198 - https://github.com/Donata64/tc_test01 diff --git a/2024/CVE-2024-27199.md b/2024/CVE-2024-27199.md index b5d89d5ef2..47450414f8 100644 --- a/2024/CVE-2024-27199.md +++ b/2024/CVE-2024-27199.md @@ -13,6 +13,7 @@ In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limite No PoCs from references. #### Github +- https://github.com/0xMarcio/cve - https://github.com/CharonDefalt/CVE-2024-27198-RCE - https://github.com/Donata64/tc_test01 - https://github.com/GhostTroops/TOP diff --git a/2024/CVE-2024-27936.md b/2024/CVE-2024-27936.md index fdfbcc7a9e..4c7f435f94 100644 --- a/2024/CVE-2024-27936.md +++ b/2024/CVE-2024-27936.md @@ -14,5 +14,5 @@ Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. - https://github.com/denoland/deno/security/advisories/GHSA-m4pq-fv2w-6hrw #### Github -No PoCs found on GitHub currently. +- https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-29849.md b/2024/CVE-2024-29849.md new file mode 100644 index 0000000000..b7b14e1edd --- /dev/null +++ b/2024/CVE-2024-29849.md @@ -0,0 +1,18 @@ +### [CVE-2024-29849](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29849) +![](https://img.shields.io/static/v1?label=Product&message=Backup%20%26%20Replication&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=12.1.2.172%3C%2012.1.2.172%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Veeam Backup Enterprise Manager allows unauthenticated users to log in as any user to enterprise manager web interface. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/sinsinology/CVE-2024-29849 + diff --git a/2024/CVE-2024-35720.md b/2024/CVE-2024-35720.md new file mode 100644 index 0000000000..621025f63a --- /dev/null +++ b/2024/CVE-2024-35720.md @@ -0,0 +1,17 @@ +### [CVE-2024-35720](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35720) +![](https://img.shields.io/static/v1?label=Product&message=Album%20Gallery%20%E2%80%93%20WordPress%20Gallery&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in A WP Life Album Gallery – WordPress Gallery.This issue affects Album Gallery – WordPress Gallery: from n/a through 1.5.7. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-35721.md b/2024/CVE-2024-35721.md new file mode 100644 index 0000000000..146d0c6d9b --- /dev/null +++ b/2024/CVE-2024-35721.md @@ -0,0 +1,17 @@ +### [CVE-2024-35721](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35721) +![](https://img.shields.io/static/v1?label=Product&message=Image%20Gallery%20%E2%80%93%20Lightbox%20Gallery%2C%20Responsive%20Photo%20Gallery%2C%20Masonry%20Gallery&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in A WP Life Image Gallery – Lightbox Gallery, Responsive Photo Gallery, Masonry Gallery.This issue affects Image Gallery – Lightbox Gallery, Responsive Photo Gallery, Masonry Gallery: from n/a through 1.4.5. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-35722.md b/2024/CVE-2024-35722.md new file mode 100644 index 0000000000..8e6a54ea50 --- /dev/null +++ b/2024/CVE-2024-35722.md @@ -0,0 +1,17 @@ +### [CVE-2024-35722](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35722) +![](https://img.shields.io/static/v1?label=Product&message=Slider%20Responsive%20Slideshow%20%E2%80%93%20Image%20slider%2C%20Gallery%20slideshow&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in A WP Life Slider Responsive Slideshow – Image slider, Gallery slideshow.This issue affects Slider Responsive Slideshow – Image slider, Gallery slideshow: from n/a through 1.4.0. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-35723.md b/2024/CVE-2024-35723.md new file mode 100644 index 0000000000..7d22c8e134 --- /dev/null +++ b/2024/CVE-2024-35723.md @@ -0,0 +1,17 @@ +### [CVE-2024-35723](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35723) +![](https://img.shields.io/static/v1?label=Product&message=Dashboard%20To-Do%20List&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in Andrew Rapps Dashboard To-Do List.This issue affects Dashboard To-Do List: from n/a through 1.2.0. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-35724.md b/2024/CVE-2024-35724.md new file mode 100644 index 0000000000..28a7b00177 --- /dev/null +++ b/2024/CVE-2024-35724.md @@ -0,0 +1,17 @@ +### [CVE-2024-35724](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35724) +![](https://img.shields.io/static/v1?label=Product&message=Bosa%20Elementor%20Addons%20and%20Templates%20for%20WooCommerce&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in Bosa Themes Bosa Elementor Addons and Templates for WooCommerce.This issue affects Bosa Elementor Addons and Templates for WooCommerce: from n/a through 1.0.12. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-35725.md b/2024/CVE-2024-35725.md new file mode 100644 index 0000000000..d76fdee288 --- /dev/null +++ b/2024/CVE-2024-35725.md @@ -0,0 +1,17 @@ +### [CVE-2024-35725](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35725) +![](https://img.shields.io/static/v1?label=Product&message=LA-Studio%20Element%20Kit%20for%20Elementor&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in LA-Studio LA-Studio Element Kit for Elementor.This issue affects LA-Studio Element Kit for Elementor: from n/a through 1.3.6. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-35726.md b/2024/CVE-2024-35726.md new file mode 100644 index 0000000000..4a70369ee6 --- /dev/null +++ b/2024/CVE-2024-35726.md @@ -0,0 +1,17 @@ +### [CVE-2024-35726](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35726) +![](https://img.shields.io/static/v1?label=Product&message=WooBuddy&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in ThemeKraft WooBuddy.This issue affects WooBuddy: from n/a through 3.4.19. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-35727.md b/2024/CVE-2024-35727.md new file mode 100644 index 0000000000..5a1c57e204 --- /dev/null +++ b/2024/CVE-2024-35727.md @@ -0,0 +1,17 @@ +### [CVE-2024-35727](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35727) +![](https://img.shields.io/static/v1?label=Product&message=Extra%20Product%20Options%20for%20WooCommerce&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in actpro Extra Product Options for WooCommerce.This issue affects Extra Product Options for WooCommerce: from n/a through 3.0.6. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-35729.md b/2024/CVE-2024-35729.md new file mode 100644 index 0000000000..b47dbc06d6 --- /dev/null +++ b/2024/CVE-2024-35729.md @@ -0,0 +1,17 @@ +### [CVE-2024-35729](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35729) +![](https://img.shields.io/static/v1?label=Product&message=Tickera&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in Tickera.This issue affects Tickera: from n/a through 3.5.2.6. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-35735.md b/2024/CVE-2024-35735.md new file mode 100644 index 0000000000..0c28d2ac0a --- /dev/null +++ b/2024/CVE-2024-35735.md @@ -0,0 +1,17 @@ +### [CVE-2024-35735](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35735) +![](https://img.shields.io/static/v1?label=Product&message=WP%20Time%20Slots%20Booking%20Form&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in CodePeople WP Time Slots Booking Form.This issue affects WP Time Slots Booking Form: from n/a through 1.2.11. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-35741.md b/2024/CVE-2024-35741.md new file mode 100644 index 0000000000..8e5360cd07 --- /dev/null +++ b/2024/CVE-2024-35741.md @@ -0,0 +1,17 @@ +### [CVE-2024-35741](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35741) +![](https://img.shields.io/static/v1?label=Product&message=Awesome%20Support&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in Awesome Support Team Awesome Support.This issue affects Awesome Support: from n/a through 6.1.7. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-35742.md b/2024/CVE-2024-35742.md new file mode 100644 index 0000000000..b4290b695a --- /dev/null +++ b/2024/CVE-2024-35742.md @@ -0,0 +1,17 @@ +### [CVE-2024-35742](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35742) +![](https://img.shields.io/static/v1?label=Product&message=Easy%20Forms%20for%20Mailchimp&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%206.9.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in Code Parrots Easy Forms for Mailchimp.This issue affects Easy Forms for Mailchimp: from n/a through 6.9.0. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-37568.md b/2024/CVE-2024-37568.md new file mode 100644 index 0000000000..5457a2cb42 --- /dev/null +++ b/2024/CVE-2024-37568.md @@ -0,0 +1,17 @@ +### [CVE-2024-37568](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37568) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +lepture Authlib before 1.3.1 has algorithm confusion with asymmetric public keys. Unless an algorithm is specified in a jwt.decode call, HMAC verification is allowed with any asymmetric public key. (This is similar to CVE-2022-29217 and CVE-2024-33663.) + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-37569.md b/2024/CVE-2024-37569.md new file mode 100644 index 0000000000..348ddea894 --- /dev/null +++ b/2024/CVE-2024-37569.md @@ -0,0 +1,17 @@ +### [CVE-2024-37569](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37569) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue was discovered on Mitel 6869i through 4.5.0.41 and 5.x through 5.0.0.1018 devices. A command injection vulnerability exists in the hostname parameter taken in by the provis.html endpoint. The provis.html endpoint performs no sanitization on the hostname parameter (sent by an authenticated user), which is subsequently written to disk. During boot, the hostname parameter is executed as part of a series of shell commands. Attackers can achieve remote code execution in the root context by placing shell metacharacters in the hostname parameter. + +### POC + +#### Reference +- https://www.youtube.com/watch?v=I9TQqfP5qzM + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-37570.md b/2024/CVE-2024-37570.md new file mode 100644 index 0000000000..eb8c9e34f6 --- /dev/null +++ b/2024/CVE-2024-37570.md @@ -0,0 +1,17 @@ +### [CVE-2024-37570](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37570) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +On Mitel 6869i 4.5.0.41 devices, the Manual Firmware Update (upgrade.html) page does not perform sanitization on the username and path parameters (sent by an authenticated user) before appending flags to the busybox ftpget command. This leads to $() command execution. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-37880.md b/2024/CVE-2024-37880.md new file mode 100644 index 0000000000..e8e137b590 --- /dev/null +++ b/2024/CVE-2024-37880.md @@ -0,0 +1,18 @@ +### [CVE-2024-37880](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37880) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +The Kyber reference implementation before 9b8d306, when compiled by LLVM Clang through 18.x with some common optimization options, has a timing side channel that allows attackers to recover an ML-KEM 512 secret key in minutes. This occurs because poly_frommsg in poly.c does not prevent Clang from emitting a vulnerable secret-dependent branch. + +### POC + +#### Reference +- https://github.com/antoonpurnal/clangover +- https://pqshield.com/pqshield-plugs-timing-leaks-in-kyber-ml-kem-to-improve-pqc-implementation-maturity/ + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-4146.md b/2024/CVE-2024-4146.md new file mode 100644 index 0000000000..a916c91c72 --- /dev/null +++ b/2024/CVE-2024-4146.md @@ -0,0 +1,17 @@ +### [CVE-2024-4146](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4146) +![](https://img.shields.io/static/v1?label=Product&message=lunary-ai%2Flunary&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%201.2.26%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-285%20Improper%20Authorization&color=brighgreen) + +### Description + +In lunary-ai/lunary version v1.2.13, an improper authorization vulnerability exists that allows unauthorized users to access and manipulate projects within an organization they should not have access to. Specifically, the vulnerability is located in the `checkProjectAccess` method within the authorization middleware, which fails to adequately verify if a user has the correct permissions to access a specific project. Instead, it only checks if the user is part of the organization owning the project, overlooking the necessary check against the `account_project` table for explicit project access rights. This flaw enables attackers to gain complete control over all resources within a project, including the ability to create, update, read, and delete any resource, compromising the privacy and security of sensitive information. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-4328.md b/2024/CVE-2024-4328.md new file mode 100644 index 0000000000..7dc7fad81d --- /dev/null +++ b/2024/CVE-2024-4328.md @@ -0,0 +1,17 @@ +### [CVE-2024-4328](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4328) +![](https://img.shields.io/static/v1?label=Product&message=parisneo%2Flollms-webui&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%3D%20latest%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +A Cross-Site Request Forgery (CSRF) vulnerability exists in the clear_personality_files_list function of the parisneo/lollms-webui v9.6. The vulnerability arises from the use of a GET request to clear personality files list, which lacks proper CSRF protection. This flaw allows attackers to trick users into performing actions without their consent, such as deleting important files on the system. The issue is present in the application's handling of requests, making it susceptible to CSRF attacks that could lead to unauthorized actions being performed on behalf of the user. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-4468.md b/2024/CVE-2024-4468.md new file mode 100644 index 0000000000..d9d86dfb40 --- /dev/null +++ b/2024/CVE-2024-4468.md @@ -0,0 +1,17 @@ +### [CVE-2024-4468](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4468) +![](https://img.shields.io/static/v1?label=Product&message=Salon%20Booking%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%209.9%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-280%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges&color=brighgreen) + +### Description + +The Salon booking system plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on several functions hooked into admin_init in all versions up to, and including, 9.9. This makes it possible for authenticated attackers with subscriber access or higher to modify plugin settings and view discount codes intended for other users. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-4512.md b/2024/CVE-2024-4512.md index d3c1dc9fd0..af9bd316e7 100644 --- a/2024/CVE-2024-4512.md +++ b/2024/CVE-2024-4512.md @@ -12,6 +12,7 @@ A vulnerability classified as problematic was found in SourceCodester Prison Man #### Reference - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss.md - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss.md +- https://vuldb.com/?id.263116 #### Github - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-4577.md b/2024/CVE-2024-4577.md new file mode 100644 index 0000000000..516de04972 --- /dev/null +++ b/2024/CVE-2024-4577.md @@ -0,0 +1,50 @@ +### [CVE-2024-4577](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4577) +![](https://img.shields.io/static/v1?label=Product&message=PHP&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brighgreen) + +### Description + +In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. + +### POC + +#### Reference +- https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ +- https://github.com/11whoami99/CVE-2024-4577 +- https://github.com/watchtowrlabs/CVE-2024-4577 +- https://github.com/xcanwin/CVE-2024-4577-PHP-RCE +- https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ + +#### Github +- https://github.com/0x20c/CVE-2024-4577-nuclei +- https://github.com/0xsyr0/OSCP +- https://github.com/11whoami99/CVE-2024-4577 +- https://github.com/Chocapikk/CVE-2024-4577 +- https://github.com/GhostTroops/TOP +- https://github.com/Junp0/CVE-2024-4577 +- https://github.com/K3ysTr0K3R/CVE-2024-4577-EXPLOIT +- https://github.com/K3ysTr0K3R/K3ysTr0K3R +- https://github.com/Sysc4ll3r/CVE-2024-4577 +- https://github.com/TAM-K592/CVE-2024-4577 +- https://github.com/WanLiChangChengWanLiChang/CVE-2024-4577-RCE-EXP +- https://github.com/Wh02m1/CVE-2024-4577 +- https://github.com/Yukiioz/CVE-2024-4577 +- https://github.com/ZephrFish/CVE-2024-4577-PHP-RCE +- https://github.com/dbyMelina/CVE-2024-4577 +- https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/huseyinstif/CVE-2024-4577-Nuclei-Template +- https://github.com/it-t4mpan/check_cve_2024_4577.sh +- https://github.com/manuelinfosec/CVE-2024-4577 +- https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/ohhhh693/CVE-2024-4577 +- https://github.com/princew88/CVE-2024-4577 +- https://github.com/taida957789/CVE-2024-4577 +- https://github.com/tanjiti/sec_profile +- https://github.com/vwilzz/PHP-RCE-4577 +- https://github.com/watchtowrlabs/CVE-2024-4577 +- https://github.com/wy876/POC +- https://github.com/wy876/wiki +- https://github.com/xcanwin/CVE-2024-4577-PHP-RCE +- https://github.com/zomasec/CVE-2024-4577 + diff --git a/2024/CVE-2024-4661.md b/2024/CVE-2024-4661.md new file mode 100644 index 0000000000..91d4f7a3f8 --- /dev/null +++ b/2024/CVE-2024-4661.md @@ -0,0 +1,17 @@ +### [CVE-2024-4661](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4661) +![](https://img.shields.io/static/v1?label=Product&message=WP%20Reset%20%E2%80%93%20Most%20Advanced%20WordPress%20Reset%20Tool&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%202.01%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +The WP Reset plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_ajax function in all versions up to, and including, 2.02. This makes it possible for authenticated attackers, with subscriber-level access and above, to modify the value fo the 'License Key' field for the 'Activate Pro License' setting. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-4680.md b/2024/CVE-2024-4680.md index d4bf8dd82f..e953fdf0d6 100644 --- a/2024/CVE-2024-4680.md +++ b/2024/CVE-2024-4680.md @@ -13,5 +13,6 @@ A vulnerability in zenml-io/zenml version 0.56.3 allows attackers to reuse old s No PoCs from references. #### Github +- https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/sev-hack/sev-hack diff --git a/2024/CVE-2024-4808.md b/2024/CVE-2024-4808.md index cbb8e7dcb5..2fe0855fff 100644 --- a/2024/CVE-2024-4808.md +++ b/2024/CVE-2024-4808.md @@ -10,7 +10,7 @@ A vulnerability, which was classified as critical, was found in Kashipara Colleg ### POC #### Reference -No PoCs from references. +- https://vuldb.com/?id.263928 #### Github - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-4911.md b/2024/CVE-2024-4911.md new file mode 100644 index 0000000000..a261e440db --- /dev/null +++ b/2024/CVE-2024-4911.md @@ -0,0 +1,17 @@ +### [CVE-2024-4911](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4911) +![](https://img.shields.io/static/v1?label=Product&message=Complete%20Web-Based%20School%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /view/student_exam_mark_update_form.php. The manipulation of the argument exam leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-264446 is the identifier assigned to this vulnerability. + +### POC + +#### Reference +- https://vuldb.com/?id.264446 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4956.md b/2024/CVE-2024-4956.md index 9e1b0c5705..79534f46a1 100644 --- a/2024/CVE-2024-4956.md +++ b/2024/CVE-2024-4956.md @@ -23,6 +23,7 @@ No PoCs from references. - https://github.com/X1r0z/JettyFuzz - https://github.com/banditzCyber0x/CVE-2024-4956 - https://github.com/codeb0ss/CVE-2024-4956-PoC +- https://github.com/erickfernandox/CVE-2024-4956 - https://github.com/fin3ss3g0d/CVE-2024-4956 - https://github.com/fin3ss3g0d/Shiro1Extractor - https://github.com/fin3ss3g0d/Shiro1Tools diff --git a/2024/CVE-2024-4968.md b/2024/CVE-2024-4968.md index 83a9cd26f0..68d7fad61e 100644 --- a/2024/CVE-2024-4968.md +++ b/2024/CVE-2024-4968.md @@ -11,6 +11,7 @@ A vulnerability was found in SourceCodester Interactive Map with Marker 1.0. It #### Reference - https://github.com/BurakSevben/CVEs/blob/main/Interactive%20Map%20App/Interactive%20Map%20App%20-%20Cross-Site-Scripting.md +- https://vuldb.com/?id.264536 #### Github No PoCs found on GitHub currently. diff --git a/2024/CVE-2024-5087.md b/2024/CVE-2024-5087.md new file mode 100644 index 0000000000..bb4b6873ab --- /dev/null +++ b/2024/CVE-2024-5087.md @@ -0,0 +1,17 @@ +### [CVE-2024-5087](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5087) +![](https://img.shields.io/static/v1?label=Product&message=Minimal%20Coming%20Soon%20%E2%80%93%20Coming%20Soon%20Page&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%202.38%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +The Minimal Coming Soon – Coming Soon Page plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the validate_ajax, deactivate_ajax, and save_ajax functions in all versions up to, and including, 2.38. This makes it possible for authenticated attackers, with Subscriber-level access and above, to edit the license key, which could disable features of the plugin. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-5091.md b/2024/CVE-2024-5091.md new file mode 100644 index 0000000000..22671bfd71 --- /dev/null +++ b/2024/CVE-2024-5091.md @@ -0,0 +1,17 @@ +### [CVE-2024-5091](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5091) +![](https://img.shields.io/static/v1?label=Product&message=SKT%20Addons%20for%20Elementor&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%202.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) + +### Description + +The SKT Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Age Gate and Creative Slider widgets in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-5389.md b/2024/CVE-2024-5389.md new file mode 100644 index 0000000000..1ff2c6f835 --- /dev/null +++ b/2024/CVE-2024-5389.md @@ -0,0 +1,17 @@ +### [CVE-2024-5389](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5389) +![](https://img.shields.io/static/v1?label=Product&message=lunary-ai%2Flunary&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%3D%20latest%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1220%20Insufficient%20Granularity%20of%20Access%20Control&color=brighgreen) + +### Description + +In lunary-ai/lunary version 1.2.13, an insufficient granularity of access control vulnerability allows users to create, update, get, and delete prompt variations for datasets not owned by their organization. This issue arises due to the application not properly validating the ownership of dataset prompts and their variations against the organization or project of the requesting user. As a result, unauthorized modifications to dataset prompts can occur, leading to altered or removed dataset prompts without proper authorization. This vulnerability impacts the integrity and consistency of dataset information, potentially affecting the results of experiments. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-5458.md b/2024/CVE-2024-5458.md new file mode 100644 index 0000000000..a30279ac11 --- /dev/null +++ b/2024/CVE-2024-5458.md @@ -0,0 +1,17 @@ +### [CVE-2024-5458](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5458) +![](https://img.shields.io/static/v1?label=Product&message=PHP&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly. + +### POC + +#### Reference +- https://github.com/php/php-src/security/advisories/GHSA-w8qr-v226-r27w + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-5585.md b/2024/CVE-2024-5585.md new file mode 100644 index 0000000000..38f3f3c764 --- /dev/null +++ b/2024/CVE-2024-5585.md @@ -0,0 +1,18 @@ +### [CVE-2024-5585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5585) +![](https://img.shields.io/static/v1?label=Product&message=PHP&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brighgreen) + +### Description + +In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, the fix for CVE-2024-1874 does not work if the command name includes trailing spaces. Original issue: when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell. + +### POC + +#### Reference +- https://github.com/php/php-src/security/advisories/GHSA-9fcc-425m-g385 + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-5613.md b/2024/CVE-2024-5613.md new file mode 100644 index 0000000000..b3f85801dc --- /dev/null +++ b/2024/CVE-2024-5613.md @@ -0,0 +1,17 @@ +### [CVE-2024-5613](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5613) +![](https://img.shields.io/static/v1?label=Product&message=Formula&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%200.5.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) + +### Description + +The Formula theme for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘id’ parameter in the 'quality_customizer_notify_dismiss_action' AJAX action in all versions up to, and including, 0.5.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-5638.md b/2024/CVE-2024-5638.md new file mode 100644 index 0000000000..8b4e5ff3e8 --- /dev/null +++ b/2024/CVE-2024-5638.md @@ -0,0 +1,17 @@ +### [CVE-2024-5638](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5638) +![](https://img.shields.io/static/v1?label=Product&message=Formula&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%200.5.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) + +### Description + +The Formula theme for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘id’ parameter in the 'ti_customizer_notify_dismiss_recommended_plugins' AJAX action in all versions up to, and including, 0.5.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-5654.md b/2024/CVE-2024-5654.md new file mode 100644 index 0000000000..c9bcc9ebf3 --- /dev/null +++ b/2024/CVE-2024-5654.md @@ -0,0 +1,17 @@ +### [CVE-2024-5654](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5654) +![](https://img.shields.io/static/v1?label=Product&message=CF7%20Google%20Sheets%20Connector&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%205.0.9%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +The CF7 Google Sheets Connector plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'execute_post_data_cg7_free' function in all versions up to, and including, 5.0.9. This makes it possible for unauthenticated attackers to toggle site configuration settings, including WP_DEBUG, WP_DEBUG_LOG, SCRIPT_DEBUG, and SAVEQUERIES. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-5663.md b/2024/CVE-2024-5663.md new file mode 100644 index 0000000000..5c3855ddd7 --- /dev/null +++ b/2024/CVE-2024-5663.md @@ -0,0 +1,17 @@ +### [CVE-2024-5663](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5663) +![](https://img.shields.io/static/v1?label=Product&message=Cards%20for%20Beaver%20Builder&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%201.1.3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) + +### Description + +The Cards for Beaver Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Cards widget in all versions up to, and including, 1.1.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-5758.md b/2024/CVE-2024-5758.md index 19c332c726..9c974b3dce 100644 --- a/2024/CVE-2024-5758.md +++ b/2024/CVE-2024-5758.md @@ -16,5 +16,5 @@ The Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX plugin for Wo - https://wpscan.com/vulnerability/635be98d-4c17-4e75-871f-9794d85a2eb1/ #### Github -No PoCs found on GitHub currently. +- https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-5771.md b/2024/CVE-2024-5771.md new file mode 100644 index 0000000000..d1d1ad8d94 --- /dev/null +++ b/2024/CVE-2024-5771.md @@ -0,0 +1,17 @@ +### [CVE-2024-5771](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5771) +![](https://img.shields.io/static/v1?label=Product&message=LIMS&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202017%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability classified as critical was found in LabVantage LIMS 2017. This vulnerability affects unknown code of the file /labvantage/rc?command=page&page=SampleList&_iframename=list of the component POST Request Handler. The manipulation of the argument param1 leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-267454 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-5772.md b/2024/CVE-2024-5772.md new file mode 100644 index 0000000000..f48e275f1b --- /dev/null +++ b/2024/CVE-2024-5772.md @@ -0,0 +1,17 @@ +### [CVE-2024-5772](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5772) +![](https://img.shields.io/static/v1?label=Product&message=NS-ASG%20Application%20Security%20Gateway&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206.3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability, which was classified as critical, has been found in Netentsec NS-ASG Application Security Gateway 6.3. This issue affects some unknown processing of the file /protocol/iscuser/deleteiscuser.php. The manipulation of the argument messagecontent leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-267455. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-5773.md b/2024/CVE-2024-5773.md new file mode 100644 index 0000000000..766635476a --- /dev/null +++ b/2024/CVE-2024-5773.md @@ -0,0 +1,17 @@ +### [CVE-2024-5773](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5773) +![](https://img.shields.io/static/v1?label=Product&message=NS-ASG%20Application%20Security%20Gateway&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206.3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability, which was classified as critical, was found in Netentsec NS-ASG Application Security Gateway 6.3. Affected is an unknown function of the file /protocol/firewall/deletemacbind.php. The manipulation of the argument messagecontent leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-267456. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +- https://github.com/L1OudFd8cl09/CVE/issues/3 + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-5774.md b/2024/CVE-2024-5774.md index 77e3acee40..0dd23ca4d6 100644 --- a/2024/CVE-2024-5774.md +++ b/2024/CVE-2024-5774.md @@ -13,5 +13,5 @@ A vulnerability has been found in SourceCodester Stock Management System 1.0 and - https://github.com/CveSecLook/cve/issues/43 #### Github -No PoCs found on GitHub currently. +- https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-5775.md b/2024/CVE-2024-5775.md index faa3298617..098ceed57f 100644 --- a/2024/CVE-2024-5775.md +++ b/2024/CVE-2024-5775.md @@ -13,5 +13,5 @@ A vulnerability was found in SourceCodester Vehicle Management System 1.0 and cl - https://github.com/CveSecLook/cve/issues/44 #### Github -No PoCs found on GitHub currently. +- https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/github.txt b/github.txt index 52ca683f10..8ffa4bbefa 100644 --- a/github.txt +++ b/github.txt @@ -5,6 +5,7 @@ CVE-0000-0000 - https://github.com/Simonpe1/xray-custom-integration-demo CVE-0000-0000 - https://github.com/dimondevceo/reverse_shell_javascript CVE-0000-0000 - https://github.com/readloud/CVE-in-Ruby CVE-0123-4567 - https://github.com/splunk-soar-connectors/dataminrpulse +CVE-1234-1234 - https://github.com/jfrog/jfrog-client-go CVE-1234-5678 - https://github.com/openvex/vexctl CVE-1990-0000 - https://github.com/tecnobabble/vulnfeed_2_tenb CVE-1999-0001 - https://github.com/MarcusGutierrez/complex-vulnerabilities @@ -13773,6 +13774,7 @@ CVE-2014-6271 - https://github.com/Jsmoreira02/CVE-2014-6271 CVE-2014-6271 - https://github.com/Jsmoreira02/Jsmoreira02 CVE-2014-6271 - https://github.com/Juan921030/awesome-hacking CVE-2014-6271 - https://github.com/K3ysTr0K3R/CVE-2014-6271-EXPLOIT +CVE-2014-6271 - https://github.com/K3ysTr0K3R/K3ysTr0K3R CVE-2014-6271 - https://github.com/KJOONHWAN/CVE-Exploit-Demonstration CVE-2014-6271 - https://github.com/Kaizhe/attacker CVE-2014-6271 - https://github.com/KateFayra/auto_vulnerability_tester @@ -30691,6 +30693,7 @@ CVE-2017-0781 - https://github.com/Lexus89/blueborne CVE-2017-0781 - https://github.com/Miracle963/bluetooth-cve CVE-2017-0781 - https://github.com/RavSS/Bluetooth-Crash-CVE-2017-0785 CVE-2017-0781 - https://github.com/WinMin/Protocol-Vul +CVE-2017-0781 - https://github.com/X3eRo0/android712-blueborne CVE-2017-0781 - https://github.com/XsafeAdmin/BlueBorne CVE-2017-0781 - https://github.com/chankruze/blueborne CVE-2017-0781 - https://github.com/coh7eiqu8thaBu/BookMark @@ -30762,6 +30765,7 @@ CVE-2017-0785 - https://github.com/Miracle963/bluetooth-cve CVE-2017-0785 - https://github.com/RavSS/Bluetooth-Crash-CVE-2017-0785 CVE-2017-0785 - https://github.com/S3cur3Th1sSh1t/Pentest-Tools CVE-2017-0785 - https://github.com/Waseem27-art/ART-TOOLKIT +CVE-2017-0785 - https://github.com/X3eRo0/android712-blueborne CVE-2017-0785 - https://github.com/XsafeAdmin/BlueBorne CVE-2017-0785 - https://github.com/YellowVeN0m/Pentesters-toolbox CVE-2017-0785 - https://github.com/aymankhalfatni/CVE-2017-0785 @@ -76159,6 +76163,7 @@ CVE-2020-0687 - https://github.com/pranav0408/WinAFL CVE-2020-0687 - https://github.com/ssumachai/CS182-Project CVE-2020-0687 - https://github.com/yrime/WinAflCustomMutate CVE-2020-0688 - https://github.com/0x783kb/Security-operation-book +CVE-2020-0688 - https://github.com/0xMarcio/cve CVE-2020-0688 - https://github.com/0xMrNiko/Awesome-Red-Teaming CVE-2020-0688 - https://github.com/0xT11/CVE-POC CVE-2020-0688 - https://github.com/1337-llama/CVE-2020-0688-Python3 @@ -76556,6 +76561,7 @@ CVE-2020-0787 - https://github.com/yisan1/hh CVE-2020-0790 - https://github.com/404notf0und/CVE-Flow CVE-2020-0791 - https://github.com/ARPSyndicate/cvemon CVE-2020-0796 - https://github.com/0day404/vulnerability-poc +CVE-2020-0796 - https://github.com/0xMarcio/cve CVE-2020-0796 - https://github.com/0xT11/CVE-POC CVE-2020-0796 - https://github.com/0xcyberpj/windows-exploitation CVE-2020-0796 - https://github.com/0xeb-bp/cve-2020-0796 @@ -82084,6 +82090,7 @@ CVE-2020-1472 - https://github.com/0x727/usefull-elevation-of-privilege CVE-2020-1472 - https://github.com/0x783kb/Security-operation-book CVE-2020-1472 - https://github.com/0xHunterr/OSCP-Study-Notes CVE-2020-1472 - https://github.com/0xHunterr/OSCP-Studying-Notes +CVE-2020-1472 - https://github.com/0xMarcio/cve CVE-2020-1472 - https://github.com/0xStrygwyr/OSCP-Guide CVE-2020-1472 - https://github.com/0xT11/CVE-POC CVE-2020-1472 - https://github.com/0xZipp0/BIBLE @@ -86984,6 +86991,7 @@ CVE-2020-25506 - https://github.com/Ostorlab/known_exploited_vulnerbilities_dete CVE-2020-25506 - https://github.com/tzwlhack/Vulnerability CVE-2020-2551 - https://github.com/0x727/JNDIExploit CVE-2020-2551 - https://github.com/0xAbbarhSF/CVE-Exploit +CVE-2020-2551 - https://github.com/0xMarcio/cve CVE-2020-2551 - https://github.com/0xMrNiko/Awesome-Red-Teaming CVE-2020-2551 - https://github.com/0xT11/CVE-POC CVE-2020-2551 - https://github.com/0xlane/CVE-2020-2551 @@ -91793,6 +91801,7 @@ CVE-2020-5849 - https://github.com/tnpitsecurity/CVEs CVE-2020-5902 - https://github.com/0day404/vulnerability-poc CVE-2020-5902 - https://github.com/0x783kb/Security-operation-book CVE-2020-5902 - https://github.com/0xAbdullah/CVE-2020-5902 +CVE-2020-5902 - https://github.com/0xMarcio/cve CVE-2020-5902 - https://github.com/0xMrNiko/Awesome-Red-Teaming CVE-2020-5902 - https://github.com/0xPugal/One-Liners CVE-2020-5902 - https://github.com/0xPugazh/One-Liners @@ -96688,6 +96697,7 @@ CVE-2021-1665 - https://github.com/yrime/WinAflCustomMutate CVE-2021-1675 - https://github.com/0x727/usefull-elevation-of-privilege CVE-2021-1675 - https://github.com/0xHunterr/OSCP-Study-Notes CVE-2021-1675 - https://github.com/0xHunterr/OSCP-Studying-Notes +CVE-2021-1675 - https://github.com/0xMarcio/cve CVE-2021-1675 - https://github.com/0xStrygwyr/OSCP-Guide CVE-2021-1675 - https://github.com/0xZipp0/OSCP CVE-2021-1675 - https://github.com/0xaniketB/HackTheBox-Driver @@ -98786,6 +98796,7 @@ CVE-2021-2197 - https://github.com/ExpLangcn/FuYao-Go CVE-2021-21972 - https://github.com/0day404/vulnerability-poc CVE-2021-21972 - https://github.com/0ps/pocassistdb CVE-2021-21972 - https://github.com/0x783kb/Security-operation-book +CVE-2021-21972 - https://github.com/0xMarcio/cve CVE-2021-21972 - https://github.com/0xStrygwyr/OSCP-Guide CVE-2021-21972 - https://github.com/0xZipp0/OSCP CVE-2021-21972 - https://github.com/0xsyr0/OSCP @@ -105564,6 +105575,7 @@ CVE-2021-31159 - https://github.com/zecool/cve CVE-2021-31162 - https://github.com/Qwaz/rust-cve CVE-2021-31166 - https://github.com/0vercl0k/0vercl0k CVE-2021-31166 - https://github.com/0vercl0k/CVE-2021-31166 +CVE-2021-31166 - https://github.com/0xMarcio/cve CVE-2021-31166 - https://github.com/0xmaximus/Home-Demolisher CVE-2021-31166 - https://github.com/20142995/sectool CVE-2021-31166 - https://github.com/ARPSyndicate/cvemon @@ -106037,6 +106049,7 @@ CVE-2021-3155 - https://github.com/ARPSyndicate/cvemon CVE-2021-3156 - https://github.com/0day404/vulnerability-poc CVE-2021-3156 - https://github.com/0x4ndy/clif CVE-2021-3156 - https://github.com/0x7183/CVE-2021-3156 +CVE-2021-3156 - https://github.com/0xMarcio/cve CVE-2021-3156 - https://github.com/0xStrygwyr/OSCP-Guide CVE-2021-3156 - https://github.com/0xZipp0/OSCP CVE-2021-3156 - https://github.com/0xdevil/CVE-2021-3156 @@ -111283,6 +111296,7 @@ CVE-2021-4034 - https://github.com/0day404/vulnerability-poc CVE-2021-4034 - https://github.com/0x01-sec/CVE-2021-4034- CVE-2021-4034 - https://github.com/0x05a/my-cve-2021-4034-poc CVE-2021-4034 - https://github.com/0x4ndy/CVE-2021-4034-PoC +CVE-2021-4034 - https://github.com/0xMarcio/cve CVE-2021-4034 - https://github.com/0xNix/CVE-2021-4034 CVE-2021-4034 - https://github.com/0xStrygwyr/OSCP-Guide CVE-2021-4034 - https://github.com/0xZipp0/OSCP @@ -115547,6 +115561,7 @@ CVE-2021-44228 - https://github.com/0x49b/jndisearch CVE-2021-44228 - https://github.com/0xCyberY/CVE-T4PDF CVE-2021-44228 - https://github.com/0xDexter0us/Log4J-Scanner CVE-2021-44228 - https://github.com/0xInfection/LogMePwn +CVE-2021-44228 - https://github.com/0xMarcio/cve CVE-2021-44228 - https://github.com/0xPugal/One-Liners CVE-2021-44228 - https://github.com/0xPugazh/One-Liners CVE-2021-44228 - https://github.com/0xRyan/log4j-nullroute @@ -118946,6 +118961,7 @@ CVE-2022-0177 - https://github.com/ARPSyndicate/cvemon CVE-2022-0179 - https://github.com/ARPSyndicate/cvemon CVE-2022-0179 - https://github.com/Haxatron/Haxatron CVE-2022-0182 - https://github.com/karimhabush/cyberowl +CVE-2022-0185 - https://github.com/0xMarcio/cve CVE-2022-0185 - https://github.com/0xTen/pwn-gym CVE-2022-0185 - https://github.com/20142995/sectool CVE-2022-0185 - https://github.com/ARPSyndicate/cvemon @@ -119957,6 +119973,7 @@ CVE-2022-0846 - https://github.com/DharmaDoll/Search-Poc-from-CVE CVE-2022-0846 - https://github.com/cyllective/CVEs CVE-2022-0847 - https://github.com/0day404/vulnerability-poc CVE-2022-0847 - https://github.com/0xIronGoat/dirty-pipe +CVE-2022-0847 - https://github.com/0xMarcio/cve CVE-2022-0847 - https://github.com/0xStrygwyr/OSCP-Guide CVE-2022-0847 - https://github.com/0xTen/pwn-gym CVE-2022-0847 - https://github.com/0xZipp0/OSCP @@ -120418,6 +120435,7 @@ CVE-2022-0987 - https://github.com/ARPSyndicate/cvemon CVE-2022-0987 - https://github.com/yo-yo-yo-jbo/yo-yo-yo-jbo.github.io CVE-2022-0989 - https://github.com/ARPSyndicate/cvemon CVE-2022-0993 - https://github.com/ARPSyndicate/cvemon +CVE-2022-0995 - https://github.com/0xMarcio/cve CVE-2022-0995 - https://github.com/1nzag/CVE-2022-0995 CVE-2022-0995 - https://github.com/ARPSyndicate/cvemon CVE-2022-0995 - https://github.com/Al1ex/LinuxEelvation @@ -125369,6 +125387,7 @@ CVE-2022-23221 - https://github.com/nscuro/dtapac CVE-2022-23221 - https://github.com/tanjiti/sec_profile CVE-2022-23221 - https://github.com/zhaoolee/garss CVE-2022-23222 - https://github.com/0day404/vulnerability-poc +CVE-2022-23222 - https://github.com/0xMarcio/cve CVE-2022-23222 - https://github.com/0xsmirk/vehicle-kernel-exploit CVE-2022-23222 - https://github.com/ARPSyndicate/cvemon CVE-2022-23222 - https://github.com/Al1ex/LinuxEelvation @@ -127878,6 +127897,7 @@ CVE-2022-25625 - https://github.com/karimhabush/cyberowl CVE-2022-25635 - https://github.com/ARPSyndicate/cvemon CVE-2022-25635 - https://github.com/karimhabush/cyberowl CVE-2022-25635 - https://github.com/pokerfacett/MY_CVE_CREDIT +CVE-2022-25636 - https://github.com/0xMarcio/cve CVE-2022-25636 - https://github.com/20142995/sectool CVE-2022-25636 - https://github.com/ARPSyndicate/cvemon CVE-2022-25636 - https://github.com/B0nfee/CVE-2022-25636 @@ -128127,6 +128147,7 @@ CVE-2022-25878 - https://github.com/ARPSyndicate/cvemon CVE-2022-25878 - https://github.com/MaySoMusician/geidai-ikoi CVE-2022-25878 - https://github.com/dellalibera/dellalibera CVE-2022-25878 - https://github.com/seal-community/patches +CVE-2022-2588 - https://github.com/0xMarcio/cve CVE-2022-2588 - https://github.com/20142995/sectool CVE-2022-2588 - https://github.com/ARGOeu-Metrics/secmon-probes CVE-2022-2588 - https://github.com/ARPSyndicate/cvemon @@ -131947,6 +131968,7 @@ CVE-2022-30187 - https://github.com/shannonmullins/hopp CVE-2022-3019 - https://github.com/20142995/sectool CVE-2022-3019 - https://github.com/ProbiusOfficial/Awsome-Sec.CTF-Videomaker CVE-2022-30190 - https://github.com/0xAbbarhSF/FollinaXploit +CVE-2022-30190 - https://github.com/0xMarcio/cve CVE-2022-30190 - https://github.com/0xStarFord/FollinaXploit CVE-2022-30190 - https://github.com/0xStrygwyr/OSCP-Guide CVE-2022-30190 - https://github.com/0xZipp0/OSCP @@ -134168,6 +134190,7 @@ CVE-2022-33650 - https://github.com/ARPSyndicate/cvemon CVE-2022-33655 - https://github.com/tnishiox/kernelcare-playground CVE-2022-33675 - https://github.com/ARPSyndicate/cvemon CVE-2022-33675 - https://github.com/Awrrays/Pentest-Tips +CVE-2022-33679 - https://github.com/0xMarcio/cve CVE-2022-33679 - https://github.com/ARPSyndicate/cvemon CVE-2022-33679 - https://github.com/Amulab/CVE-2022-33679 CVE-2022-33679 - https://github.com/Ascotbe/Kernelhub @@ -136945,6 +136968,7 @@ CVE-2022-39196 - https://github.com/trhacknon/Pocingit CVE-2022-39196 - https://github.com/whoforget/CVE-POC CVE-2022-39196 - https://github.com/youwizard/CVE-POC CVE-2022-39196 - https://github.com/zecool/cve +CVE-2022-39197 - https://github.com/0xMarcio/cve CVE-2022-39197 - https://github.com/20142995/sectool CVE-2022-39197 - https://github.com/4nth0ny1130/CVE-2022-39197-fix_patch CVE-2022-39197 - https://github.com/ARPSyndicate/cvemon @@ -140719,6 +140743,7 @@ CVE-2023-0316 - https://github.com/kos0ng/CVEs CVE-2023-0361 - https://github.com/ARPSyndicate/cvemon CVE-2023-0361 - https://github.com/GitHubForSnap/ssmtp-gael CVE-2023-0361 - https://github.com/alexcowperthwaite/PasskeyScanner +CVE-2023-0386 - https://github.com/0xMarcio/cve CVE-2023-0386 - https://github.com/20142995/sectool CVE-2023-0386 - https://github.com/3yujw7njai/CVE-2023-0386 CVE-2023-0386 - https://github.com/AabyssZG/AWD-Guide @@ -141809,6 +141834,7 @@ CVE-2023-20883 - https://github.com/hinat0y/Dataset8 CVE-2023-20883 - https://github.com/hinat0y/Dataset9 CVE-2023-20883 - https://github.com/scordero1234/java_sec_demo-main CVE-2023-20886 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-20887 - https://github.com/0xMarcio/cve CVE-2023-20887 - https://github.com/ARPSyndicate/cvemon CVE-2023-20887 - https://github.com/Awrrays/FrameVul CVE-2023-20887 - https://github.com/CVEDB/awesome-cve-repo @@ -142085,6 +142111,7 @@ CVE-2023-21567 - https://github.com/ARPSyndicate/cvemon CVE-2023-21567 - https://github.com/ycdxsb/ycdxsb CVE-2023-21584 - https://github.com/ARPSyndicate/cvemon CVE-2023-2160 - https://github.com/ahmedvienna/CVEs-and-Vulnerabilities +CVE-2023-21608 - https://github.com/0xMarcio/cve CVE-2023-21608 - https://github.com/ARPSyndicate/cvemon CVE-2023-21608 - https://github.com/CVEDB/PoC-List CVE-2023-21608 - https://github.com/CVEDB/awesome-cve-repo @@ -142221,6 +142248,7 @@ CVE-2023-21755 - https://github.com/ARPSyndicate/cvemon CVE-2023-2176 - https://github.com/shakyaraj9569/Documentation CVE-2023-21766 - https://github.com/Y3A/cve-2023-21766 CVE-2023-21766 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2023-21768 - https://github.com/0xMarcio/cve CVE-2023-21768 - https://github.com/0xsyr0/OSCP CVE-2023-21768 - https://github.com/2lambda123/diaphora CVE-2023-21768 - https://github.com/3yujw7njai/CVE-2023-21768-POC @@ -142902,6 +142930,7 @@ CVE-2023-23391 - https://github.com/Ch0pin/related_work CVE-2023-23392 - https://github.com/karimhabush/cyberowl CVE-2023-23396 - https://github.com/LucaBarile/CVE-2023-23396 CVE-2023-23396 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2023-23397 - https://github.com/0xMarcio/cve CVE-2023-23397 - https://github.com/0xsyr0/OSCP CVE-2023-23397 - https://github.com/20142995/sectool CVE-2023-23397 - https://github.com/3yujw7njai/CVE-2023-23397-POC @@ -146117,6 +146146,7 @@ CVE-2023-32219 - https://github.com/VulnTotal-Team/Vehicle-Security CVE-2023-32219 - https://github.com/VulnTotal-Team/vehicle_cves CVE-2023-3222 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-3223 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-32233 - https://github.com/0xMarcio/cve CVE-2023-32233 - https://github.com/0xsyr0/OSCP CVE-2023-32233 - https://github.com/ARGOeu-Metrics/secmon-probes CVE-2023-32233 - https://github.com/CVEDB/awesome-cve-repo @@ -148723,6 +148753,7 @@ CVE-2023-38829 - https://github.com/Luwak-IoT-Security/CVEs CVE-2023-38829 - https://github.com/adhikara13/CVE-2023-38829-NETIS-WF2409E CVE-2023-38829 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-3883 - https://github.com/MorDavid/CVE-2023-38831-Winrar-Exploit-Generator-POC +CVE-2023-38831 - https://github.com/0xMarcio/cve CVE-2023-38831 - https://github.com/80r1ng/CVE-2023-38831-EXP CVE-2023-38831 - https://github.com/Ahmed1Al/CVE-2023-38831-winrar-exploit CVE-2023-38831 - https://github.com/AskarKasimov/1337Rpwn4 @@ -151789,6 +151820,7 @@ CVE-2023-47704 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-47705 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-47706 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-47707 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-4771 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-47715 - https://github.com/NaInSec/CVE-LIST CVE-2023-47715 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-47716 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -151935,6 +151967,7 @@ CVE-2023-48621 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-48622 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-48623 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-48624 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-4863 - https://github.com/0xMarcio/cve CVE-2023-4863 - https://github.com/Blaukovitch/GOOGLE_CHROME_Windows_7_CRACK CVE-2023-4863 - https://github.com/CVEDB/awesome-cve-repo CVE-2023-4863 - https://github.com/CVEDB/top @@ -152136,6 +152169,7 @@ CVE-2023-49105 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-49109 - https://github.com/Drun1baby/JavaSecurityLearning CVE-2023-49109 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-49109 - https://github.com/tanjiti/sec_profile +CVE-2023-4911 - https://github.com/0xMarcio/cve CVE-2023-4911 - https://github.com/0xsyr0/OSCP CVE-2023-4911 - https://github.com/20142995/sectool CVE-2023-4911 - https://github.com/BlessedRebuS/OSCP-Pentesting-Cheatsheet @@ -154024,6 +154058,7 @@ CVE-2023-7017 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-7024 - https://github.com/Ostorlab/KEV CVE-2023-7024 - https://github.com/RENANZG/My-Forensics CVE-2023-7027 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-7028 - https://github.com/0xMarcio/cve CVE-2023-7028 - https://github.com/0xsyr0/OSCP CVE-2023-7028 - https://github.com/Azathothas/Stars CVE-2023-7028 - https://github.com/CVE-Reversing/CVE-Reversing @@ -159392,6 +159427,7 @@ CVE-2024-1077 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1078 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1079 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1085 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-1086 - https://github.com/0xMarcio/cve CVE-2024-1086 - https://github.com/0xsyr0/OSCP CVE-2024-1086 - https://github.com/Alicey0719/docker-POC_CVE-2024-1086 CVE-2024-1086 - https://github.com/BachoSeven/stellestelline @@ -159514,6 +159550,7 @@ CVE-2024-1224 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1225 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1226 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1227 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-1228 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1231 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-12312 - https://github.com/runwuf/clickhouse-test CVE-2024-1232 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -160410,6 +160447,7 @@ CVE-2024-21334 - https://github.com/bigbozzez/CVE-2024-21334-POC CVE-2024-21334 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-21336 - https://github.com/NaInSec/CVE-LIST CVE-2024-21337 - https://github.com/NaInSec/CVE-LIST +CVE-2024-21338 - https://github.com/0xMarcio/cve CVE-2024-21338 - https://github.com/GhostTroops/TOP CVE-2024-21338 - https://github.com/UMU618/CVE-2024-21338 CVE-2024-21338 - https://github.com/Zombie-Kaiser/CVE-2024-21338-x64-build- @@ -160498,6 +160536,7 @@ CVE-2024-21412 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-21412 - https://github.com/lsr00ter/CVE-2024-21412_Water-Hydra CVE-2024-21412 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-21412 - https://github.com/wr00t/CVE-2024-21412_Water-Hydra +CVE-2024-21413 - https://github.com/0xMarcio/cve CVE-2024-21413 - https://github.com/CMNatic/CVE-2024-21413 CVE-2024-21413 - https://github.com/DevAkabari/CVE-2024-21413 CVE-2024-21413 - https://github.com/GhostTroops/TOP @@ -160696,6 +160735,7 @@ CVE-2024-21674 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-21677 - https://github.com/NaInSec/CVE-LIST CVE-2024-21677 - https://github.com/netlas-io/netlas-dorks CVE-2024-21677 - https://github.com/tanjiti/sec_profile +CVE-2024-21683 - https://github.com/0xMarcio/cve CVE-2024-21683 - https://github.com/Arbeys/CVE-2024-21683-PoC CVE-2024-21683 - https://github.com/GhostTroops/TOP CVE-2024-21683 - https://github.com/Threekiii/CVE @@ -160739,12 +160779,14 @@ CVE-2024-21747 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-21748 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-21749 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-21750 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-21751 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-21755 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-21756 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-2176 - https://github.com/NaInSec/CVE-LIST CVE-2024-2176 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-21761 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-21761 - https://github.com/vulsio/go-cve-dictionary +CVE-2024-21762 - https://github.com/0xMarcio/cve CVE-2024-21762 - https://github.com/AlexLondan/CVE-2024-21762-Fortinet-RCE-ALLWORK CVE-2024-21762 - https://github.com/BetterCzz/CVE-2024-20291-POC CVE-2024-21762 - https://github.com/BishopFox/cve-2024-21762-check @@ -160968,6 +161010,7 @@ CVE-2024-22119 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-2212 - https://github.com/0xdea/advisories CVE-2024-2212 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-2212 - https://github.com/hnsecurity/vulns +CVE-2024-22120 - https://github.com/0xMarcio/cve CVE-2024-22120 - https://github.com/GhostTroops/TOP CVE-2024-22120 - https://github.com/Threekiii/CVE CVE-2024-22120 - https://github.com/W01fh4cker/CVE-2024-22120-RCE @@ -161115,6 +161158,8 @@ CVE-2024-2229 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-22290 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-22291 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-22294 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-22296 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-22298 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-22301 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-22304 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-22305 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -161556,6 +161601,7 @@ CVE-2024-23517 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-2352 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-23523 - https://github.com/NaInSec/CVE-LIST CVE-2024-23523 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-23524 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-23525 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-2353 - https://github.com/OraclePi/repo CVE-2024-2353 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -161774,6 +161820,7 @@ CVE-2024-23893 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-23894 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-23895 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-23896 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-23897 - https://github.com/0xMarcio/cve CVE-2024-23897 - https://github.com/10T4/PoC-Fix-jenkins-rce_CVE-2024-23897 CVE-2024-23897 - https://github.com/20142995/sectool CVE-2024-23897 - https://github.com/3yujw7njai/CVE-2024-23897 @@ -162275,6 +162322,7 @@ CVE-2024-24919 - https://github.com/GlobalsecureAcademy/CVE-2024-24919 CVE-2024-24919 - https://github.com/GoatSecurity/CVE-2024-24919 CVE-2024-24919 - https://github.com/GuayoyoCyber/CVE-2024-24919 CVE-2024-24919 - https://github.com/J4F9S5D2Q7/CVE-2024-24919 +CVE-2024-24919 - https://github.com/J4F9S5D2Q7/CVE-2024-24919-CHECKPOINT CVE-2024-24919 - https://github.com/LucasKatashi/CVE-2024-24919 CVE-2024-24919 - https://github.com/MohamedWagdy7/CVE-2024-24919 CVE-2024-24919 - https://github.com/Ostorlab/KEV @@ -162302,6 +162350,7 @@ CVE-2024-24919 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-24919 - https://github.com/nullcult/CVE-2024-24919-Exploit CVE-2024-24919 - https://github.com/numencyber/Vulnerability_PoC CVE-2024-24919 - https://github.com/pewc0/CVE-2024-24919 +CVE-2024-24919 - https://github.com/protonnegativo/CVE-2024-24919 CVE-2024-24919 - https://github.com/r4p3c4/CVE-2024-24919-Checkpoint-Firewall-VPN-Check CVE-2024-24919 - https://github.com/r4p3c4/CVE-2024-24919-Exploit-PoC-Checkpoint-Firewall-VPN CVE-2024-24919 - https://github.com/satchhacker/cve-2024-24919 @@ -162674,6 +162723,7 @@ CVE-2024-25598 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-2560 - https://github.com/NaInSec/CVE-LIST CVE-2024-2560 - https://github.com/helloyhrr/IoT_vulnerability CVE-2024-25600 - https://github.com/0bl1v10nf0rg0773n/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress +CVE-2024-25600 - https://github.com/0xMarcio/cve CVE-2024-25600 - https://github.com/Chocapikk/CVE-2024-25600 CVE-2024-25600 - https://github.com/Christbowel/CVE-2024-25600_Nuclei-Template CVE-2024-25600 - https://github.com/GhostTroops/TOP @@ -163476,6 +163526,7 @@ CVE-2024-27195 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-27196 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-27197 - https://github.com/NaInSec/CVE-LIST CVE-2024-27197 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-27198 - https://github.com/0xMarcio/cve CVE-2024-27198 - https://github.com/CharonDefalt/CVE-2024-27198-RCE CVE-2024-27198 - https://github.com/Chocapikk/CVE-2024-27198 CVE-2024-27198 - https://github.com/Donata64/tc_test01 @@ -163511,6 +163562,7 @@ CVE-2024-27198 - https://github.com/wy876/POC CVE-2024-27198 - https://github.com/wy876/wiki CVE-2024-27198 - https://github.com/yoryio/CVE-2024-27198 CVE-2024-27198 - https://github.com/zhaoxiaoha/github-trending +CVE-2024-27199 - https://github.com/0xMarcio/cve CVE-2024-27199 - https://github.com/CharonDefalt/CVE-2024-27198-RCE CVE-2024-27199 - https://github.com/Donata64/tc_test01 CVE-2024-27199 - https://github.com/GhostTroops/TOP @@ -163827,6 +163879,7 @@ CVE-2024-27921 - https://github.com/NaInSec/CVE-LIST CVE-2024-27930 - https://github.com/NaInSec/CVE-LIST CVE-2024-27930 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-27931 - https://github.com/KTH-LangSec/server-side-prototype-pollution +CVE-2024-27936 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-27937 - https://github.com/NaInSec/CVE-LIST CVE-2024-27937 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-27938 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -164333,6 +164386,7 @@ CVE-2024-28816 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-28823 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-28824 - https://github.com/NaInSec/CVE-LIST CVE-2024-2883 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-28833 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-28834 - https://github.com/GitHubForSnap/ssmtp-gael CVE-2024-28834 - https://github.com/GrigGM/05-virt-04-docker-hw CVE-2024-28834 - https://github.com/NaInSec/CVE-LIST @@ -164766,6 +164820,8 @@ CVE-2024-29832 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-29833 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-2984 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-29844 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-29849 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-29849 - https://github.com/sinsinology/CVE-2024-29849 CVE-2024-29857 - https://github.com/cdupuis/aspnetapp CVE-2024-29858 - https://github.com/NaInSec/CVE-LIST CVE-2024-29859 - https://github.com/NaInSec/CVE-LIST @@ -166317,17 +166373,30 @@ CVE-2024-35678 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3568 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3569 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3570 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-35717 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-35720 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-35721 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-35722 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-35723 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-35724 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-35725 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-35726 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-35727 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-35729 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-35730 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-35731 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-35732 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-35733 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-35734 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-35735 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-35736 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-35736 - https://github.com/truonghuuphuc/CVE CVE-2024-35737 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-35738 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-35739 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-35740 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-35741 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-35742 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-35750 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-35751 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-35752 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -166382,6 +166451,7 @@ CVE-2024-3620 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3628 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3634 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3640 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-36405 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-36426 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-36428 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-36428 - https://github.com/tanjiti/sec_profile @@ -166422,7 +166492,10 @@ CVE-2024-36968 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-36969 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3697 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-36970 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-36971 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3698 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-3699 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-3700 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3704 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3705 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3706 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -166437,6 +166510,7 @@ CVE-2024-3745 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3748 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3749 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3750 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-37568 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-37569 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3757 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-37570 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -166463,6 +166537,7 @@ CVE-2024-3783 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3784 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3785 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3786 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-37880 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3797 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3806 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-3806 - https://github.com/tanjiti/sec_profile @@ -166580,6 +166655,7 @@ CVE-2024-4138 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4139 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-41426 - https://github.com/JohnnyBradvo/CVE-2024-21426-SharePoint-RCE CVE-2024-4144 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-4146 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4156 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4162 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4163 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -166623,6 +166699,7 @@ CVE-2024-4323 - https://github.com/skilfoy/CVE-2024-4323-Exploit-POC CVE-2024-4323 - https://github.com/yuansec/CVE-2024-4323-dos_poc CVE-2024-4323 - https://github.com/zgimszhd61/openai-sec-test-cve-quickstart CVE-2024-4324 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-4328 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4331 - https://github.com/angelov-1080/CVE_Checker CVE-2024-4331 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4333 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -166685,6 +166762,7 @@ CVE-2024-4444 - https://github.com/JohnnyBradvo/CVE-2024-4444 CVE-2024-4444 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-4445 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4451 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-4468 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4473 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4488 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4489 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -166725,6 +166803,8 @@ CVE-2024-4577 - https://github.com/11whoami99/CVE-2024-4577 CVE-2024-4577 - https://github.com/Chocapikk/CVE-2024-4577 CVE-2024-4577 - https://github.com/GhostTroops/TOP CVE-2024-4577 - https://github.com/Junp0/CVE-2024-4577 +CVE-2024-4577 - https://github.com/K3ysTr0K3R/CVE-2024-4577-EXPLOIT +CVE-2024-4577 - https://github.com/K3ysTr0K3R/K3ysTr0K3R CVE-2024-4577 - https://github.com/Sysc4ll3r/CVE-2024-4577 CVE-2024-4577 - https://github.com/TAM-K592/CVE-2024-4577 CVE-2024-4577 - https://github.com/WanLiChangChengWanLiChang/CVE-2024-4577-RCE-EXP @@ -166734,6 +166814,7 @@ CVE-2024-4577 - https://github.com/ZephrFish/CVE-2024-4577-PHP-RCE CVE-2024-4577 - https://github.com/dbyMelina/CVE-2024-4577 CVE-2024-4577 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4577 - https://github.com/huseyinstif/CVE-2024-4577-Nuclei-Template +CVE-2024-4577 - https://github.com/it-t4mpan/check_cve_2024_4577.sh CVE-2024-4577 - https://github.com/manuelinfosec/CVE-2024-4577 CVE-2024-4577 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-4577 - https://github.com/ohhhh693/CVE-2024-4577 @@ -166788,16 +166869,21 @@ CVE-2024-4652 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4653 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4654 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4656 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-4661 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4666 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4670 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4671 - https://github.com/apiverve/news-API CVE-2024-4671 - https://github.com/tanjiti/sec_profile +CVE-2024-4680 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4680 - https://github.com/sev-hack/sev-hack CVE-2024-4701 - https://github.com/JoeBeeton/CVE-2024-4701-POC CVE-2024-4701 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-4702 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4718 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4734 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-4744 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-4745 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-4746 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4756 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4760 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4761 - https://github.com/dan-mba/python-selenium-news @@ -166871,6 +166957,7 @@ CVE-2024-4956 - https://github.com/TypicalModMaker/CVE-2024-4956 CVE-2024-4956 - https://github.com/X1r0z/JettyFuzz CVE-2024-4956 - https://github.com/banditzCyber0x/CVE-2024-4956 CVE-2024-4956 - https://github.com/codeb0ss/CVE-2024-4956-PoC +CVE-2024-4956 - https://github.com/erickfernandox/CVE-2024-4956 CVE-2024-4956 - https://github.com/fin3ss3g0d/CVE-2024-4956 CVE-2024-4956 - https://github.com/fin3ss3g0d/Shiro1Extractor CVE-2024-4956 - https://github.com/fin3ss3g0d/Shiro1Tools @@ -166910,7 +166997,9 @@ CVE-2024-5084 - https://github.com/KTN1990/CVE-2024-5084 CVE-2024-5084 - https://github.com/k3lpi3b4nsh33/CVE-2024-5084 CVE-2024-5084 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-5084 - https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main +CVE-2024-5087 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5088 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-5091 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5095 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5096 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5097 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -166944,20 +167033,34 @@ CVE-2024-5390 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5391 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-54321 - https://github.com/runwuf/clickhouse-test CVE-2024-5438 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-5458 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5522 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-5522 - https://github.com/truonghuuphuc/CVE-2024-5522-Poc CVE-2024-5542 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5555 - https://github.com/JohnnyBradvo/CVE-2024-5555 CVE-2024-5555 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-5585 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5599 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-5613 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5637 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-5638 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-5654 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-5663 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5678 - https://github.com/Dashrath158/CVE-Management-App-using-Flask CVE-2024-5678 - https://github.com/bergel07/FinalProject CVE-2024-5733 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5734 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5745 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-5758 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5766 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5770 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-5771 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-5772 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-5773 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-5774 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-5775 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-5785 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-5786 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6271 - https://github.com/Jokergazaa/zero-click-exploits CVE-2024-65230 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-6666 - https://github.com/JohnnyBradvo/CVE-2024-6666 diff --git a/references.txt b/references.txt index 2ae7e3d8c9..1824e36954 100644 --- a/references.txt +++ b/references.txt @@ -7379,6 +7379,7 @@ CVE-2006-2929 - https://www.exploit-db.com/exploits/1886 CVE-2006-2929 - https://www.exploit-db.com/exploits/1886 CVE-2006-2936 - http://www.novell.com/linux/security/advisories/2007_30_kernel.html CVE-2006-2936 - http://www.novell.com/linux/security/advisories/2007_30_kernel.html +CVE-2006-2937 - http://www.ubuntu.com/usn/usn-353-1 CVE-2006-2937 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html CVE-2006-2937 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html CVE-2006-2937 - http://www.vmware.com/support/player/doc/releasenotes_player.html @@ -7391,6 +7392,7 @@ CVE-2006-2937 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html CVE-2006-2937 - http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html CVE-2006-2937 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html CVE-2006-2937 - http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html +CVE-2006-2940 - http://www.ubuntu.com/usn/usn-353-1 CVE-2006-2940 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html CVE-2006-2940 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html CVE-2006-2940 - http://www.vmware.com/support/player/doc/releasenotes_player.html @@ -7879,6 +7881,7 @@ CVE-2006-3735 - https://www.exploit-db.com/exploits/2019 CVE-2006-3735 - https://www.exploit-db.com/exploits/2019 CVE-2006-3736 - https://www.exploit-db.com/exploits/2020 CVE-2006-3736 - https://www.exploit-db.com/exploits/2020 +CVE-2006-3738 - http://www.ubuntu.com/usn/usn-353-1 CVE-2006-3738 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html CVE-2006-3738 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html CVE-2006-3738 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9370 @@ -8685,6 +8688,7 @@ CVE-2006-4340 - http://www.ubuntu.com/usn/usn-361-1 CVE-2006-4340 - http://www.ubuntu.com/usn/usn-361-1 CVE-2006-4342 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9649 CVE-2006-4342 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9649 +CVE-2006-4343 - http://www.ubuntu.com/usn/usn-353-1 CVE-2006-4343 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html CVE-2006-4343 - http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html CVE-2006-4343 - http://www.vmware.com/support/player/doc/releasenotes_player.html @@ -12188,6 +12192,8 @@ CVE-2007-0693 - http://securityreason.com/securityalert/2740 CVE-2007-0693 - http://securityreason.com/securityalert/2740 CVE-2007-0694 - http://securityreason.com/securityalert/2739 CVE-2007-0694 - http://securityreason.com/securityalert/2739 +CVE-2007-0695 - http://sourceforge.net/project/shownotes.php?release_id=481131&group_id=98260 +CVE-2007-0696 - http://sourceforge.net/project/shownotes.php?release_id=481131&group_id=98260 CVE-2007-0697 - https://www.exploit-db.com/exploits/3208 CVE-2007-0697 - https://www.exploit-db.com/exploits/3208 CVE-2007-0699 - http://securityreason.com/securityalert/2223 @@ -36986,6 +36992,7 @@ CVE-2010-4083 - http://www.redhat.com/support/errata/RHSA-2011-0007.html CVE-2010-4083 - http://www.redhat.com/support/errata/RHSA-2011-0007.html CVE-2010-4083 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html CVE-2010-4083 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html +CVE-2010-4091 - http://extraexploit.blogspot.com/2010/11/full-disclosure-xplpdf-adober-reader-94.html CVE-2010-4093 - http://www.kb.cert.org/vuls/id/189929 CVE-2010-4093 - http://www.kb.cert.org/vuls/id/189929 CVE-2010-4099 - http://www.exploit-db.com/exploits/15318 @@ -44695,6 +44702,7 @@ CVE-2012-6119 - https://github.com/candlepin/candlepin/commit/f4d93230e58b969c50 CVE-2012-6119 - https://github.com/candlepin/candlepin/commit/f4d93230e58b969c506b4c9778e04482a059b08c CVE-2012-6134 - https://github.com/intridea/omniauth-oauth2/pull/25 CVE-2012-6134 - https://github.com/intridea/omniauth-oauth2/pull/25 +CVE-2012-6150 - http://www.ubuntu.com/usn/USN-2054-1 CVE-2012-6153 - http://www.ubuntu.com/usn/USN-2769-1 CVE-2012-6153 - http://www.ubuntu.com/usn/USN-2769-1 CVE-2012-6270 - http://www.kb.cert.org/vuls/id/546769 @@ -45028,6 +45036,7 @@ CVE-2013-0217 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 CVE-2013-0217 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 CVE-2013-0228 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 CVE-2013-0228 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-0228 - http://www.ubuntu.com/usn/USN-1797-1 CVE-2013-0228 - http://www.ubuntu.com/usn/USN-1808-1 CVE-2013-0228 - http://www.ubuntu.com/usn/USN-1808-1 CVE-2013-0230 - https://www.exploit-db.com/exploits/36839/ @@ -45317,6 +45326,7 @@ CVE-2013-0914 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 CVE-2013-0914 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 CVE-2013-0914 - http://www.ubuntu.com/usn/USN-1788-1 CVE-2013-0914 - http://www.ubuntu.com/usn/USN-1788-1 +CVE-2013-0914 - http://www.ubuntu.com/usn/USN-1797-1 CVE-2013-0946 - https://www.exploit-db.com/exploits/42719/ CVE-2013-0946 - https://www.exploit-db.com/exploits/42719/ CVE-2013-10001 - https://vuldb.com/?id.8900 @@ -45921,6 +45931,7 @@ CVE-2013-1767 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 CVE-2013-1767 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 CVE-2013-1767 - http://www.ubuntu.com/usn/USN-1788-1 CVE-2013-1767 - http://www.ubuntu.com/usn/USN-1788-1 +CVE-2013-1767 - http://www.ubuntu.com/usn/USN-1797-1 CVE-2013-1768 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 CVE-2013-1768 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 CVE-2013-1773 - http://www.exploit-db.com/exploits/23248/ @@ -45939,6 +45950,7 @@ CVE-2013-1792 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 CVE-2013-1792 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 CVE-2013-1792 - http://www.ubuntu.com/usn/USN-1788-1 CVE-2013-1792 - http://www.ubuntu.com/usn/USN-1788-1 +CVE-2013-1792 - http://www.ubuntu.com/usn/USN-1797-1 CVE-2013-1796 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 CVE-2013-1796 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 CVE-2013-1796 - http://www.ubuntu.com/usn/USN-1808-1 @@ -46573,10 +46585,13 @@ CVE-2013-2516 - http://www.vapidlabs.com/advisory.php?v=36 CVE-2013-2516 - http://www.vapidlabs.com/advisory.php?v=36 CVE-2013-2546 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 CVE-2013-2546 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-2546 - http://www.ubuntu.com/usn/USN-1797-1 CVE-2013-2547 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 CVE-2013-2547 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-2547 - http://www.ubuntu.com/usn/USN-1797-1 CVE-2013-2548 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 CVE-2013-2548 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 +CVE-2013-2548 - http://www.ubuntu.com/usn/USN-1797-1 CVE-2013-2558 - http://immunityproducts.blogspot.com/2013/03/infiltrate-preview-truetype-font.html CVE-2013-2558 - http://immunityproducts.blogspot.com/2013/03/infiltrate-preview-truetype-font.html CVE-2013-2561 - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html @@ -47640,6 +47655,7 @@ CVE-2013-4353 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 CVE-2013-4353 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 CVE-2013-4378 - http://seclists.org/oss-sec/2013/q3/679 CVE-2013-4378 - http://seclists.org/oss-sec/2013/q3/679 +CVE-2013-4408 - http://www.ubuntu.com/usn/USN-2054-1 CVE-2013-4444 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html CVE-2013-4444 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html CVE-2013-4447 - http://packetstormsecurity.com/files/123660/Drupal-Simplenews-6.x-7.x-Cross-Site-Scripting.html @@ -47657,6 +47673,7 @@ CVE-2013-4473 - http://www.openwall.com/lists/oss-security/2013/10/29/1 CVE-2013-4473 - http://www.openwall.com/lists/oss-security/2013/10/29/1 CVE-2013-4474 - http://www.openwall.com/lists/oss-security/2013/10/29/1 CVE-2013-4474 - http://www.openwall.com/lists/oss-security/2013/10/29/1 +CVE-2013-4475 - http://www.ubuntu.com/usn/USN-2054-1 CVE-2013-4497 - https://bugs.launchpad.net/nova/+bug/1202266 CVE-2013-4497 - https://bugs.launchpad.net/nova/+bug/1202266 CVE-2013-4511 - http://www.ubuntu.com/usn/USN-2076-1 @@ -51901,8 +51918,12 @@ CVE-2014-3149 - http://www.christian-schneider.net/advisories/CVE-2014-3149.txt CVE-2014-3149 - http://www.christian-schneider.net/advisories/CVE-2014-3149.txt CVE-2014-3158 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html CVE-2014-3158 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html +CVE-2014-3181 - http://www.ubuntu.com/usn/USN-2376-1 CVE-2014-3182 - https://code.google.com/p/google-security-research/issues/detail?id=89 CVE-2014-3182 - https://code.google.com/p/google-security-research/issues/detail?id=89 +CVE-2014-3184 - http://www.ubuntu.com/usn/USN-2376-1 +CVE-2014-3185 - http://www.ubuntu.com/usn/USN-2376-1 +CVE-2014-3186 - http://www.ubuntu.com/usn/USN-2376-1 CVE-2014-3187 - https://medium.com/section-9-lab/abusing-ios-url-handlers-on-messages-96979e8b12f5 CVE-2014-3187 - https://medium.com/section-9-lab/abusing-ios-url-handlers-on-messages-96979e8b12f5 CVE-2014-3205 - https://www.exploit-db.com/exploits/33159/ @@ -56481,6 +56502,7 @@ CVE-2014-6409 - http://seclists.org/fulldisclosure/2014/Sep/71 CVE-2014-6409 - http://seclists.org/fulldisclosure/2014/Sep/71 CVE-2014-6409 - http://www.exploit-db.com/exploits/34718 CVE-2014-6409 - http://www.exploit-db.com/exploits/34718 +CVE-2014-6410 - http://www.ubuntu.com/usn/USN-2376-1 CVE-2014-6412 - http://packetstormsecurity.com/files/130380/WordPress-Failed-Randomness.html CVE-2014-6412 - http://packetstormsecurity.com/files/130380/WordPress-Failed-Randomness.html CVE-2014-6412 - http://seclists.org/fulldisclosure/2015/Feb/42 @@ -56489,6 +56511,9 @@ CVE-2014-6413 - http://seclists.org/fulldisclosure/2014/Sep/70 CVE-2014-6413 - http://seclists.org/fulldisclosure/2014/Sep/70 CVE-2014-6413 - https://packetstormsecurity.com/files/128310 CVE-2014-6413 - https://packetstormsecurity.com/files/128310 +CVE-2014-6416 - http://www.ubuntu.com/usn/USN-2376-1 +CVE-2014-6417 - http://www.ubuntu.com/usn/USN-2376-1 +CVE-2014-6418 - http://www.ubuntu.com/usn/USN-2376-1 CVE-2014-6420 - http://packetstormsecurity.com/files/128293/Livefyre-LiveComments-3.0-Cross-Site-Scripting.html CVE-2014-6420 - http://packetstormsecurity.com/files/128293/Livefyre-LiveComments-3.0-Cross-Site-Scripting.html CVE-2014-6427 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10381 @@ -80771,10 +80796,12 @@ CVE-2016-7140 - http://seclists.org/fulldisclosure/2016/Oct/80 CVE-2016-7140 - http://seclists.org/fulldisclosure/2016/Oct/80 CVE-2016-7141 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html CVE-2016-7141 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html +CVE-2016-7146 - http://www.ubuntu.com/usn/USN-3137-1 CVE-2016-7146 - https://www.curesec.com/blog/article/blog/MoinMoin-198-XSS-175.html CVE-2016-7146 - https://www.curesec.com/blog/article/blog/MoinMoin-198-XSS-175.html CVE-2016-7147 - https://www.curesec.com/blog/article/blog/Plone-XSS-186.html CVE-2016-7147 - https://www.curesec.com/blog/article/blog/Plone-XSS-186.html +CVE-2016-7148 - http://www.ubuntu.com/usn/USN-3137-1 CVE-2016-7148 - https://www.curesec.com/blog/article/blog/MoinMoin-198-XSS-175.html CVE-2016-7148 - https://www.curesec.com/blog/article/blog/MoinMoin-198-XSS-175.html CVE-2016-7154 - http://www.c7zero.info/stuff/csw2017_ExploringYourSystemDeeper_updated.pdf @@ -81732,6 +81759,7 @@ CVE-2016-9117 - https://github.com/uclouvain/openjpeg/issues/860 CVE-2016-9117 - https://github.com/uclouvain/openjpeg/issues/860 CVE-2016-9118 - https://github.com/uclouvain/openjpeg/issues/861 CVE-2016-9118 - https://github.com/uclouvain/openjpeg/issues/861 +CVE-2016-9119 - http://www.ubuntu.com/usn/USN-3137-1 CVE-2016-9136 - http://bugs.ghostscript.com/show_bug.cgi?id=697244 CVE-2016-9136 - http://bugs.ghostscript.com/show_bug.cgi?id=697244 CVE-2016-9137 - https://bugs.php.net/bug.php?id=73147 @@ -111136,6 +111164,7 @@ CVE-2019-10126 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-S CVE-2019-10126 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html CVE-2019-10126 - https://seclists.org/bugtraq/2019/Jun/26 CVE-2019-10126 - https://seclists.org/bugtraq/2019/Jun/26 +CVE-2019-10126 - https://usn.ubuntu.com/4117-1/ CVE-2019-10126 - https://usn.ubuntu.com/4118-1/ CVE-2019-10126 - https://usn.ubuntu.com/4118-1/ CVE-2019-10131 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10131 @@ -111528,6 +111557,7 @@ CVE-2019-10638 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.7 CVE-2019-10638 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.7 CVE-2019-10638 - https://usn.ubuntu.com/4115-1/ CVE-2019-10638 - https://usn.ubuntu.com/4115-1/ +CVE-2019-10638 - https://usn.ubuntu.com/4117-1/ CVE-2019-10638 - https://usn.ubuntu.com/4118-1/ CVE-2019-10638 - https://usn.ubuntu.com/4118-1/ CVE-2019-10638 - https://www.oracle.com/security-alerts/cpuApr2021.html @@ -113710,6 +113740,7 @@ CVE-2019-12984 - http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-S CVE-2019-12984 - http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html CVE-2019-12984 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.13 CVE-2019-12984 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.13 +CVE-2019-12984 - https://usn.ubuntu.com/4117-1/ CVE-2019-12984 - https://usn.ubuntu.com/4118-1/ CVE-2019-12984 - https://usn.ubuntu.com/4118-1/ CVE-2019-12985 - https://www.tenable.com/security/research/tra-2019-31 @@ -113878,6 +113909,7 @@ CVE-2019-13233 - http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-S CVE-2019-13233 - http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html CVE-2019-13233 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.9 CVE-2019-13233 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.9 +CVE-2019-13233 - https://usn.ubuntu.com/4117-1/ CVE-2019-13233 - https://usn.ubuntu.com/4118-1/ CVE-2019-13233 - https://usn.ubuntu.com/4118-1/ CVE-2019-13234 - http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html @@ -113906,6 +113938,7 @@ CVE-2019-13272 - http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x- CVE-2019-13272 - http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html CVE-2019-13272 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17 CVE-2019-13272 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17 +CVE-2019-13272 - https://usn.ubuntu.com/4117-1/ CVE-2019-13272 - https://usn.ubuntu.com/4118-1/ CVE-2019-13272 - https://usn.ubuntu.com/4118-1/ CVE-2019-13275 - https://wpvulndb.com/vulnerabilities/9412 @@ -114666,6 +114699,7 @@ CVE-2019-14283 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 CVE-2019-14283 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 CVE-2019-14283 - https://usn.ubuntu.com/4115-1/ CVE-2019-14283 - https://usn.ubuntu.com/4115-1/ +CVE-2019-14283 - https://usn.ubuntu.com/4117-1/ CVE-2019-14283 - https://usn.ubuntu.com/4118-1/ CVE-2019-14283 - https://usn.ubuntu.com/4118-1/ CVE-2019-14284 - http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html @@ -114678,6 +114712,7 @@ CVE-2019-14284 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 CVE-2019-14284 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 CVE-2019-14284 - https://usn.ubuntu.com/4115-1/ CVE-2019-14284 - https://usn.ubuntu.com/4115-1/ +CVE-2019-14284 - https://usn.ubuntu.com/4117-1/ CVE-2019-14284 - https://usn.ubuntu.com/4118-1/ CVE-2019-14284 - https://usn.ubuntu.com/4118-1/ CVE-2019-14287 - http://packetstormsecurity.com/files/154853/Slackware-Security-Advisory-sudo-Updates.html @@ -121826,6 +121861,7 @@ CVE-2019-3846 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Se CVE-2019-3846 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html CVE-2019-3846 - https://seclists.org/bugtraq/2019/Jun/26 CVE-2019-3846 - https://seclists.org/bugtraq/2019/Jun/26 +CVE-2019-3846 - https://usn.ubuntu.com/4117-1/ CVE-2019-3846 - https://usn.ubuntu.com/4118-1/ CVE-2019-3846 - https://usn.ubuntu.com/4118-1/ CVE-2019-3855 - http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html @@ -121868,6 +121904,7 @@ CVE-2019-3900 - http://packetstormsecurity.com/files/155212/Slackware-Security-A CVE-2019-3900 - http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html CVE-2019-3900 - https://usn.ubuntu.com/4115-1/ CVE-2019-3900 - https://usn.ubuntu.com/4115-1/ +CVE-2019-3900 - https://usn.ubuntu.com/4117-1/ CVE-2019-3900 - https://usn.ubuntu.com/4118-1/ CVE-2019-3900 - https://usn.ubuntu.com/4118-1/ CVE-2019-3900 - https://www.oracle.com/security-alerts/cpuApr2021.html @@ -131082,12 +131119,17 @@ CVE-2020-18652 - https://gitlab.freedesktop.org/libopenraw/exempi/issues/12 CVE-2020-18652 - https://gitlab.freedesktop.org/libopenraw/exempi/issues/12 CVE-2020-18654 - https://github.com/wuzhicms/wuzhicms/issues/174 CVE-2020-18654 - https://github.com/wuzhicms/wuzhicms/issues/174 +CVE-2020-18657 - https://www.seebug.org/vuldb/ssvid-97929 +CVE-2020-18658 - https://www.seebug.org/vuldb/ssvid-97930 +CVE-2020-18659 - https://www.seebug.org/vuldb/ssvid-97931 +CVE-2020-18661 - https://www.seebug.org/vuldb/ssvid-97925 CVE-2020-18662 - https://www.seebug.org/vuldb/ssvid-97927 CVE-2020-18668 - https://www.seebug.org/vuldb/ssvid-97996 CVE-2020-18668 - https://www.seebug.org/vuldb/ssvid-97996 CVE-2020-18694 - https://github.com/ignitedcms/ignitedcms/issues/5 CVE-2020-18694 - https://github.com/ignitedcms/ignitedcms/issues/5 CVE-2020-18713 - https://www.seebug.org/vuldb/ssvid-97859 +CVE-2020-18716 - https://www.seebug.org/vuldb/ssvid-97867 CVE-2020-18723 - http://packetstormsecurity.com/files/161332/Alt-N-MDaemon-Webmail-20.0.0-Cross-Site-Scripting.html CVE-2020-18723 - http://packetstormsecurity.com/files/161332/Alt-N-MDaemon-Webmail-20.0.0-Cross-Site-Scripting.html CVE-2020-18724 - http://packetstormsecurity.com/files/161332/Alt-N-MDaemon-Webmail-20.0.0-Cross-Site-Scripting.html @@ -180730,6 +180772,13 @@ CVE-2023-2906 - https://gitlab.com/wireshark/wireshark/-/issues/19229 CVE-2023-2906 - https://gitlab.com/wireshark/wireshark/-/issues/19229 CVE-2023-2906 - https://takeonme.org/cves/CVE-2023-2906.html CVE-2023-2906 - https://takeonme.org/cves/CVE-2023-2906.html +CVE-2023-29060 - https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software +CVE-2023-29061 - https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software +CVE-2023-29062 - https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software +CVE-2023-29063 - https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software +CVE-2023-29064 - https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software +CVE-2023-29065 - https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software +CVE-2023-29066 - https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software CVE-2023-2908 - https://gitlab.com/libtiff/libtiff/-/merge_requests/479 CVE-2023-2908 - https://gitlab.com/libtiff/libtiff/-/merge_requests/479 CVE-2023-29084 - http://packetstormsecurity.com/files/172755/ManageEngine-ADManager-Plus-Command-Injection.html @@ -183344,6 +183393,7 @@ CVE-2023-36217 - https://www.exploit-db.com/exploits/51520 CVE-2023-36217 - https://www.exploit-db.com/exploits/51520 CVE-2023-36220 - https://packetstormsecurity.com/files/172967/Textpattern-CMS-4.8.8-Command-Injection.html CVE-2023-36220 - https://packetstormsecurity.com/files/172967/Textpattern-CMS-4.8.8-Command-Injection.html +CVE-2023-3623 - https://github.com/luoshaokai/cve/blob/main/one.md CVE-2023-36239 - https://github.com/libming/libming/issues/273 CVE-2023-36239 - https://github.com/libming/libming/issues/273 CVE-2023-36243 - https://github.com/noirotm/flvmeta/issues/19 @@ -188970,6 +189020,7 @@ CVE-2023-7018 - https://huntr.com/bounties/e1a3e548-e53a-48df-b708-9ee62140963c CVE-2023-7018 - https://huntr.com/bounties/e1a3e548-e53a-48df-b708-9ee62140963c CVE-2023-7020 - https://github.com/zte12321/cve/blob/main/sql.md CVE-2023-7021 - https://github.com/qq956801985/cve/blob/main/sql.md +CVE-2023-7025 - https://vuldb.com/?id.248578 CVE-2023-7026 - https://github.com/willchen0011/cve/blob/main/upload2.md CVE-2023-7026 - https://github.com/willchen0011/cve/blob/main/upload2.md CVE-2023-7027 - http://packetstormsecurity.com/files/176525/WordPress-POST-SMTP-Mailer-2.8.7-Authorization-Bypass-Cross-Site-Scripting.html @@ -189021,6 +189072,7 @@ CVE-2023-7107 - https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website CVE-2023-7107 - https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%203.md CVE-2023-7108 - https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20Stored%20Cross-site%20Scripting.md CVE-2023-7108 - https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20Stored%20Cross-site%20Scripting.md +CVE-2023-7108 - https://vuldb.com/?id.249003 CVE-2023-7109 - https://github.com/h4md153v63n/CVEs/blob/main/Library-Management-System/Library-Management-System_SQL_Injection-1.md CVE-2023-7109 - https://github.com/h4md153v63n/CVEs/blob/main/Library-Management-System/Library-Management-System_SQL_Injection-1.md CVE-2023-7109 - https://vuldb.com/?id.249004 @@ -190459,6 +190511,7 @@ CVE-2024-22529 - https://github.com/unpWn4bL3/iot-security/blob/main/29.md CVE-2024-22529 - https://github.com/unpWn4bL3/iot-security/blob/main/29.md CVE-2024-22532 - https://github.com/pwndorei/CVE-2024-22532 CVE-2024-22532 - https://github.com/pwndorei/CVE-2024-22532 +CVE-2024-22549 - https://github.com/cccbbbttt/cms/blob/main/1.md CVE-2024-22549 - https://github.com/cccbbbttt/cms/blob/main/1.md CVE-2024-22550 - https://packetstormsecurity.com/files/176312/ShopSite-14.0-Cross-Site-Scripting.html CVE-2024-22550 - https://packetstormsecurity.com/files/176312/ShopSite-14.0-Cross-Site-Scripting.html @@ -190898,6 +190951,7 @@ CVE-2024-24060 - https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/ CVE-2024-24061 - https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/springboot-manager.md#13-stored-cross-site-scripting-syscontentadd CVE-2024-24062 - https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/springboot-manager.md#12-stored-cross-site-scripting-sysrole CVE-2024-24062 - https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/springboot-manager.md#12-stored-cross-site-scripting-sysrole +CVE-2024-2408 - https://github.com/php/php-src/security/advisories/GHSA-hh26-4ppw-5864 CVE-2024-24115 - https://mechaneus.github.io/CVE-2024-24115.html CVE-2024-24115 - https://mechaneus.github.io/CVE-2024-24115.html CVE-2024-24115 - https://mechaneus.github.io/CVE-PENDING-COTONTI.html @@ -194114,6 +194168,7 @@ CVE-2024-3755 - https://wpscan.com/vulnerability/d34caeaf-2ecf-44a2-b308-e940baf CVE-2024-3755 - https://wpscan.com/vulnerability/d34caeaf-2ecf-44a2-b308-e940bafd402c/ CVE-2024-3756 - https://wpscan.com/vulnerability/b28d0dca-2df1-4925-be81-dd9c46859c38/ CVE-2024-3756 - https://wpscan.com/vulnerability/b28d0dca-2df1-4925-be81-dd9c46859c38/ +CVE-2024-37569 - https://www.youtube.com/watch?v=I9TQqfP5qzM CVE-2024-3765 - https://github.com/netsecfish/xiongmai_incorrect_access_control CVE-2024-3765 - https://github.com/netsecfish/xiongmai_incorrect_access_control CVE-2024-3765 - https://github.com/netsecfish/xiongmai_incorrect_access_control/blob/main/pocCheck3-en.py @@ -194128,6 +194183,8 @@ CVE-2024-3770 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%2 CVE-2024-3770 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20SQL%20Injection%20-%203.md CVE-2024-3771 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20SQL%20Injection%20-%204.md CVE-2024-3771 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20SQL%20Injection%20-%204.md +CVE-2024-37880 - https://github.com/antoonpurnal/clangover +CVE-2024-37880 - https://pqshield.com/pqshield-plugs-timing-leaks-in-kyber-ml-kem-to-improve-pqc-implementation-maturity/ CVE-2024-3797 - https://github.com/BurakSevben/CVEs/blob/main/QR%20Code%20Bookmark%20System/QR%20Code%20Bookmark%20System%20-%20SQL%20Injection.md CVE-2024-3797 - https://github.com/BurakSevben/CVEs/blob/main/QR%20Code%20Bookmark%20System/QR%20Code%20Bookmark%20System%20-%20SQL%20Injection.md CVE-2024-3822 - https://wpscan.com/vulnerability/ff5411b1-9e04-4e72-a502-e431d774642a/ @@ -194361,6 +194418,7 @@ CVE-2024-4497 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/ CVE-2024-4497 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formexeCommand.md CVE-2024-4512 - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss.md CVE-2024-4512 - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss.md +CVE-2024-4512 - https://vuldb.com/?id.263116 CVE-2024-4528 - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss2.md CVE-2024-4528 - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss2.md CVE-2024-4529 - https://wpscan.com/vulnerability/082ff0b8-2ecd-4292-832d-0a79e1ba8cb3/ @@ -194389,6 +194447,11 @@ CVE-2024-4548 - https://www.tenable.com/security/research/tra-2024-13 CVE-2024-4548 - https://www.tenable.com/security/research/tra-2024-13 CVE-2024-4549 - https://www.tenable.com/security/research/tra-2024-13 CVE-2024-4549 - https://www.tenable.com/security/research/tra-2024-13 +CVE-2024-4577 - https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ +CVE-2024-4577 - https://github.com/11whoami99/CVE-2024-4577 +CVE-2024-4577 - https://github.com/watchtowrlabs/CVE-2024-4577 +CVE-2024-4577 - https://github.com/xcanwin/CVE-2024-4577-PHP-RCE +CVE-2024-4577 - https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ CVE-2024-4585 - https://github.com/Hckwzh/cms/blob/main/16.md CVE-2024-4585 - https://github.com/Hckwzh/cms/blob/main/16.md CVE-2024-4586 - https://github.com/Hckwzh/cms/blob/main/17.md @@ -194469,6 +194532,7 @@ CVE-2024-4797 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Manage CVE-2024-4797 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/xss_action.md CVE-2024-4798 - https://github.com/Hefei-Coffee/cve/blob/main/sql5.md CVE-2024-4798 - https://github.com/Hefei-Coffee/cve/blob/main/sql5.md +CVE-2024-4808 - https://vuldb.com/?id.263928 CVE-2024-4809 - https://github.com/CveSecLook/cve/issues/26 CVE-2024-4817 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/IDOR_manage_user.md CVE-2024-4817 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/IDOR_manage_user.md @@ -194497,6 +194561,7 @@ CVE-2024-4886 - https://wpscan.com/vulnerability/76e8591f-120c-4cd7-b9a2-79f8d4d CVE-2024-4903 - https://github.com/Hefei-Coffee/cve/blob/main/sql3.md CVE-2024-4904 - https://github.com/Hefei-Coffee/cve/blob/main/upload.md CVE-2024-4904 - https://github.com/Hefei-Coffee/cve/blob/main/upload.md +CVE-2024-4911 - https://vuldb.com/?id.264446 CVE-2024-4912 - https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_addExamExe.md CVE-2024-4912 - https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_addExamExe.md CVE-2024-4913 - https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_exam.md @@ -194530,6 +194595,7 @@ CVE-2024-4966 - https://github.com/CveSecLook/cve/issues/30 CVE-2024-4967 - https://github.com/BurakSevben/CVEs/blob/main/Interactive%20Map%20App/Interactive%20Map%20App%20-%20SQL%20Injection.md CVE-2024-4967 - https://github.com/BurakSevben/CVEs/blob/main/Interactive%20Map%20App/Interactive%20Map%20App%20-%20SQL%20Injection.md CVE-2024-4968 - https://github.com/BurakSevben/CVEs/blob/main/Interactive%20Map%20App/Interactive%20Map%20App%20-%20Cross-Site-Scripting.md +CVE-2024-4968 - https://vuldb.com/?id.264536 CVE-2024-4972 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%201.md CVE-2024-4973 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%202.md CVE-2024-4973 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%202.md @@ -194667,6 +194733,7 @@ CVE-2024-5428 - https://github.com/kaikai145154/CVE-CSRF/blob/main/SourceCodeste CVE-2024-5428 - https://github.com/kaikai145154/CVE-CSRF/blob/main/SourceCodester%20Simple%20Online%20Bidding%20System%20CSRF.md CVE-2024-5437 - https://github.com/pijiawei/CVE/blob/pijiawei-photo/SourceCodester%20Simple%20Online%20Bidding%20System%20XSS.md CVE-2024-5437 - https://github.com/pijiawei/CVE/blob/pijiawei-photo/SourceCodester%20Simple%20Online%20Bidding%20System%20XSS.md +CVE-2024-5458 - https://github.com/php/php-src/security/advisories/GHSA-w8qr-v226-r27w CVE-2024-5515 - https://github.com/HaojianWang/cve/issues/1 CVE-2024-5516 - https://github.com/ppp-src/ha/issues/3 CVE-2024-5516 - https://github.com/ppp-src/ha/issues/3 @@ -194678,6 +194745,7 @@ CVE-2024-5519 - https://github.com/L1OudFd8cl09/CVE/issues/2 CVE-2024-5519 - https://github.com/L1OudFd8cl09/CVE/issues/2 CVE-2024-5565 - https://research.jfrog.com/vulnerabilities/vanna-prompt-injection-rce-jfsa-2024-001034449/ CVE-2024-5565 - https://research.jfrog.com/vulnerabilities/vanna-prompt-injection-rce-jfsa-2024-001034449/ +CVE-2024-5585 - https://github.com/php/php-src/security/advisories/GHSA-9fcc-425m-g385 CVE-2024-5588 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/12 CVE-2024-5588 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/12 CVE-2024-5590 - https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-uploadiscuser.md @@ -194699,5 +194767,6 @@ CVE-2024-5758 - https://research.cleantalk.org/cve-2024-4305/ CVE-2024-5758 - https://research.cleantalk.org/cve-2024-4305/ CVE-2024-5758 - https://wpscan.com/vulnerability/635be98d-4c17-4e75-871f-9794d85a2eb1/ CVE-2024-5758 - https://wpscan.com/vulnerability/635be98d-4c17-4e75-871f-9794d85a2eb1/ +CVE-2024-5773 - https://github.com/L1OudFd8cl09/CVE/issues/3 CVE-2024-5774 - https://github.com/CveSecLook/cve/issues/43 CVE-2024-5775 - https://github.com/CveSecLook/cve/issues/44