diff --git a/2000/CVE-2000-0114.md b/2000/CVE-2000-0114.md index 5f256bf28b..ee2b6adcae 100644 --- a/2000/CVE-2000-0114.md +++ b/2000/CVE-2000-0114.md @@ -16,6 +16,7 @@ No PoCs from references. - https://github.com/0xPugal/One-Liners - https://github.com/0xPugazh/One-Liners - https://github.com/ARPSyndicate/kenzer-templates +- https://github.com/CVEDB/awesome-cve-repo - https://github.com/Cappricio-Securities/CVE-2000-0114 - https://github.com/Live-Hack-CVE/CVE-2000-0114 - https://github.com/POORVAJA-195/Nuclei-Analysis-main diff --git a/2000/CVE-2000-0170.md b/2000/CVE-2000-0170.md index 6203530d04..c4386d5e82 100644 --- a/2000/CVE-2000-0170.md +++ b/2000/CVE-2000-0170.md @@ -15,5 +15,6 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo - https://github.com/mike182/exploit diff --git a/2000/CVE-2000-0649.md b/2000/CVE-2000-0649.md index f7f2c8291a..ca6e7b6f16 100644 --- a/2000/CVE-2000-0649.md +++ b/2000/CVE-2000-0649.md @@ -16,6 +16,8 @@ No PoCs from references. - https://github.com/0xNVAN/win-iisadmin - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo +- https://github.com/Downgraderz/PoC-CVE-2000-0649 - https://github.com/JimboJimbabwe/HackGPTV2 - https://github.com/amtzespinosa/lord-of-the-root-walkthrough - https://github.com/hanmin0512/Web-hacking-LAB diff --git a/2000/CVE-2000-0979.md b/2000/CVE-2000-0979.md index 9132d1a5c3..424d482e18 100644 --- a/2000/CVE-2000-0979.md +++ b/2000/CVE-2000-0979.md @@ -16,6 +16,7 @@ File and Print Sharing service in Windows 95, Windows 98, and Windows Me does no - https://github.com/ARPSyndicate/cvemon - https://github.com/Ascotbe/Kernelhub - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo - https://github.com/Cruxer8Mech/Idk - https://github.com/Z6543/CVE-2000-0979 - https://github.com/ycdxsb/WindowsPrivilegeEscalation diff --git a/2001/CVE-2001-0550.md b/2001/CVE-2001-0550.md index 5a07f8fbac..70968945c8 100644 --- a/2001/CVE-2001-0550.md +++ b/2001/CVE-2001-0550.md @@ -18,6 +18,7 @@ wu-ftpd 2.6.1 allows remote attackers to execute arbitrary commands via a "~{" a - https://github.com/Badbug6/EQGRP - https://github.com/CKmaenn/EQGRP - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo - https://github.com/CybernetiX-S3C/EQGRP_Linux - https://github.com/Drift-Security/Shadow_Brokers-Vs-NSA - https://github.com/IHA114/EQGRP diff --git a/2001/CVE-2001-0680.md b/2001/CVE-2001-0680.md index 858fe2306d..de65db22c3 100644 --- a/2001/CVE-2001-0680.md +++ b/2001/CVE-2001-0680.md @@ -15,4 +15,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo diff --git a/2001/CVE-2001-0758.md b/2001/CVE-2001-0758.md index 44cfbbae10..d27403f17b 100644 --- a/2001/CVE-2001-0758.md +++ b/2001/CVE-2001-0758.md @@ -15,4 +15,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo diff --git a/2001/CVE-2001-0931.md b/2001/CVE-2001-0931.md index 7ba8fd0339..56b0da601d 100644 --- a/2001/CVE-2001-0931.md +++ b/2001/CVE-2001-0931.md @@ -15,4 +15,5 @@ Directory traversal vulnerability in Cooolsoft PowerFTP Server 2.03 allows attac #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo diff --git a/2001/CVE-2001-0932.md b/2001/CVE-2001-0932.md index 3b998b11f4..b5934dce99 100644 --- a/2001/CVE-2001-0932.md +++ b/2001/CVE-2001-0932.md @@ -15,4 +15,5 @@ Buffer overflow in Cooolsoft PowerFTP Server 2.03 allows remote attackers to cau #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo diff --git a/2001/CVE-2001-0933.md b/2001/CVE-2001-0933.md index a93f3b2a27..1e2e425c12 100644 --- a/2001/CVE-2001-0933.md +++ b/2001/CVE-2001-0933.md @@ -15,4 +15,5 @@ Cooolsoft PowerFTP Server 2.03 allows remote attackers to list the contents of a #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo diff --git a/2001/CVE-2001-0934.md b/2001/CVE-2001-0934.md index bc6f8c439a..d8726b8205 100644 --- a/2001/CVE-2001-0934.md +++ b/2001/CVE-2001-0934.md @@ -15,4 +15,5 @@ Cooolsoft PowerFTP Server 2.03 allows remote attackers to obtain the physical pa #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo diff --git a/2001/CVE-2001-1442.md b/2001/CVE-2001-1442.md index c252c6d91c..5815561354 100644 --- a/2001/CVE-2001-1442.md +++ b/2001/CVE-2001-1442.md @@ -15,4 +15,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo diff --git a/2001/CVE-2001-1473.md b/2001/CVE-2001-1473.md index 5786b2e1ed..a49aec0ac4 100644 --- a/2001/CVE-2001-1473.md +++ b/2001/CVE-2001-1473.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/0xget/cve-2001-1473 - https://github.com/ARPSyndicate/kenzer-templates +- https://github.com/CVEDB/awesome-cve-repo - https://github.com/codine7/Hacking_Automated - https://github.com/codine7/fox - https://github.com/codine7/jungle diff --git a/2002/CVE-2002-0200.md b/2002/CVE-2002-0200.md index c157d0a1eb..a754868332 100644 --- a/2002/CVE-2002-0200.md +++ b/2002/CVE-2002-0200.md @@ -15,4 +15,5 @@ Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial o #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo diff --git a/2002/CVE-2002-0201.md b/2002/CVE-2002-0201.md index f425ed3800..10b9c49705 100644 --- a/2002/CVE-2002-0201.md +++ b/2002/CVE-2002-0201.md @@ -15,4 +15,5 @@ Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial o #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo diff --git a/2002/CVE-2002-0288.md b/2002/CVE-2002-0288.md index cfaa3e6b92..d6a4812631 100644 --- a/2002/CVE-2002-0288.md +++ b/2002/CVE-2002-0288.md @@ -15,4 +15,5 @@ Directory traversal vulnerability in Phusion web server 1.0 allows remote attack #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo diff --git a/2002/CVE-2002-0289.md b/2002/CVE-2002-0289.md index fcaa1c0262..8b82f6e2bc 100644 --- a/2002/CVE-2002-0289.md +++ b/2002/CVE-2002-0289.md @@ -15,4 +15,5 @@ Buffer overflow in Phusion web server 1.0 allows remote attackers to cause a den #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo diff --git a/2002/CVE-2002-0346.md b/2002/CVE-2002-0346.md index 1ce007022b..c78f1a727e 100644 --- a/2002/CVE-2002-0346.md +++ b/2002/CVE-2002-0346.md @@ -15,4 +15,5 @@ Cross-site scripting vulnerability in Cobalt RAQ 4 allows remote attackers to ex #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo diff --git a/2002/CVE-2002-0347.md b/2002/CVE-2002-0347.md index 5816e02433..6db66d4079 100644 --- a/2002/CVE-2002-0347.md +++ b/2002/CVE-2002-0347.md @@ -15,4 +15,5 @@ Directory traversal vulnerability in Cobalt RAQ 4 allows remote attackers to rea #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo diff --git a/2002/CVE-2002-0348.md b/2002/CVE-2002-0348.md index c5c6141933..d01c7085f4 100644 --- a/2002/CVE-2002-0348.md +++ b/2002/CVE-2002-0348.md @@ -15,4 +15,5 @@ service.cgi in Cobalt RAQ 4 allows remote attackers to cause a denial of service #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo diff --git a/2002/CVE-2002-0448.md b/2002/CVE-2002-0448.md index 47f01b5153..63f2bdfb57 100644 --- a/2002/CVE-2002-0448.md +++ b/2002/CVE-2002-0448.md @@ -15,4 +15,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo diff --git a/2002/CVE-2002-0740.md b/2002/CVE-2002-0740.md index ef627d9da4..312edb7aa8 100644 --- a/2002/CVE-2002-0740.md +++ b/2002/CVE-2002-0740.md @@ -15,4 +15,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo diff --git a/2002/CVE-2002-0748.md b/2002/CVE-2002-0748.md index 7557e9795a..e10ab15e34 100644 --- a/2002/CVE-2002-0748.md +++ b/2002/CVE-2002-0748.md @@ -13,5 +13,6 @@ LabVIEW Web Server 5.1.1 through 6.1 allows remote attackers to cause a denial o No PoCs from references. #### Github +- https://github.com/CVEDB/awesome-cve-repo - https://github.com/fauzanwijaya/CVE-2002-0748 diff --git a/2002/CVE-2002-0991.md b/2002/CVE-2002-0991.md index 8feb3a816c..9136323470 100644 --- a/2002/CVE-2002-0991.md +++ b/2002/CVE-2002-0991.md @@ -15,4 +15,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo diff --git a/2002/CVE-2002-1614.md b/2002/CVE-2002-1614.md index eedbe65db7..6f53cb05bd 100644 --- a/2002/CVE-2002-1614.md +++ b/2002/CVE-2002-1614.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo - https://github.com/DrewSC13/Linpeas - https://github.com/cedelasen/htb-laboratory - https://github.com/chorankates/Irked diff --git a/2002/CVE-2002-20001.md b/2002/CVE-2002-20001.md index 24b08dcacc..e23972df4a 100644 --- a/2002/CVE-2002-20001.md +++ b/2002/CVE-2002-20001.md @@ -20,7 +20,9 @@ The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the clie #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/Balasys/dheater - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo - https://github.com/Live-Hack-CVE/CVE-2002-20001 - https://github.com/Live-Hack-CVE/CVE-2022-40735 - https://github.com/anquanscan/sec-tools diff --git a/2002/CVE-2002-2420.md b/2002/CVE-2002-2420.md index ddd33b5d65..4d7895c6d3 100644 --- a/2002/CVE-2002-2420.md +++ b/2002/CVE-2002-2420.md @@ -15,5 +15,6 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo - https://github.com/krdsploit/CVE-2002-2420 diff --git a/2004/CVE-2004-0077.md b/2004/CVE-2004-0077.md index b6606c4695..8a9bd15421 100644 --- a/2004/CVE-2004-0077.md +++ b/2004/CVE-2004-0077.md @@ -21,6 +21,7 @@ The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to - https://github.com/C0dak/local-root-exploit- - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits - https://github.com/QChiLan/linux-exp @@ -59,6 +60,7 @@ The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to - https://github.com/rakjong/LinuxElevation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xfinest/linux-kernel-exploits - https://github.com/xssfile/linux-kernel-exploits diff --git a/2004/CVE-2004-0558.md b/2004/CVE-2004-0558.md index 6009400e79..c5a64c2689 100644 --- a/2004/CVE-2004-0558.md +++ b/2004/CVE-2004-0558.md @@ -16,4 +16,5 @@ The Internet Printing Protocol (IPP) implementation in CUPS before 1.1.21 allows - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo +- https://github.com/fibonascii/CVE-2004-0558 diff --git a/2004/CVE-2004-1235.md b/2004/CVE-2004-1235.md index 5e8ef449cd..063e6081e3 100644 --- a/2004/CVE-2004-1235.md +++ b/2004/CVE-2004-1235.md @@ -20,6 +20,7 @@ Race condition in the (1) load_elf_library and (2) binfmt_aout function calls fo - https://github.com/C0dak/local-root-exploit- - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits - https://github.com/QChiLan/linux-exp diff --git a/2005/CVE-2005-0736.md b/2005/CVE-2005-0736.md index c4fb0ea4ed..fafe3b146a 100644 --- a/2005/CVE-2005-0736.md +++ b/2005/CVE-2005-0736.md @@ -20,6 +20,7 @@ Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 - https://github.com/C0dak/local-root-exploit- - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits - https://github.com/QChiLan/linux-exp diff --git a/2005/CVE-2005-1263.md b/2005/CVE-2005-1263.md index 8d64010742..f8c5c2fd28 100644 --- a/2005/CVE-2005-1263.md +++ b/2005/CVE-2005-1263.md @@ -19,6 +19,7 @@ The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2, - https://github.com/C0dak/local-root-exploit- - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits - https://github.com/QChiLan/linux-exp diff --git a/2005/CVE-2005-1794.md b/2005/CVE-2005-1794.md index cecb0feeac..f8b18f0e42 100644 --- a/2005/CVE-2005-1794.md +++ b/2005/CVE-2005-1794.md @@ -18,4 +18,5 @@ No PoCs from references. - https://github.com/CVEDB/awesome-cve-repo - https://github.com/InitRoot/CVE-2005-1794Scanner - https://github.com/Ressurect0/fluffyLogic +- https://github.com/anvithalolla/Tesla_PenTest diff --git a/2005/CVE-2005-2428.md b/2005/CVE-2005-2428.md index 9b19dcdc9d..d1a3ea10bb 100644 --- a/2005/CVE-2005-2428.md +++ b/2005/CVE-2005-2428.md @@ -22,6 +22,7 @@ Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, sto - https://github.com/POORVAJA-195/Nuclei-Analysis-main - https://github.com/d4n-sec/d4n-sec.github.io - https://github.com/gojhonny/Pentesting-Scripts +- https://github.com/jobroche/Pentesting-Scripts - https://github.com/merlinepedra/nuclei-templates - https://github.com/merlinepedra25/nuclei-templates - https://github.com/schwankner/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit diff --git a/2006/CVE-2006-0001.md b/2006/CVE-2006-0001.md index 0b596d0d69..91cdcc6308 100644 --- a/2006/CVE-2006-0001.md +++ b/2006/CVE-2006-0001.md @@ -10,6 +10,7 @@ Stack-based buffer overflow in Microsoft Publisher 2000 through 2003 allows user ### POC #### Reference +- http://www.computerterrorism.com/research/ct12-09-2006-2.htm - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-054 #### Github diff --git a/2006/CVE-2006-20001.md b/2006/CVE-2006-20001.md index 080cb3e96d..50bf6ddc37 100644 --- a/2006/CVE-2006-20001.md +++ b/2006/CVE-2006-20001.md @@ -18,6 +18,7 @@ No PoCs from references. - https://github.com/ByteXenon/IP-Security-Database - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo +- https://github.com/EzeTauil/Maquina-Upload - https://github.com/Live-Hack-CVE/CVE-2006-20001 - https://github.com/Saksham2002/CVE-2006-20001 - https://github.com/bioly230/THM_Skynet diff --git a/2006/CVE-2006-2451.md b/2006/CVE-2006-2451.md index f2f6b00308..20a26eeda2 100644 --- a/2006/CVE-2006-2451.md +++ b/2006/CVE-2006-2451.md @@ -20,6 +20,7 @@ No PoCs from references. - https://github.com/C0dak/local-root-exploit- - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/Jasut1n/CVE - https://github.com/Jasut1n/c-exploits - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits diff --git a/2006/CVE-2006-3311.md b/2006/CVE-2006-3311.md index f273b34e63..5b357b573f 100644 --- a/2006/CVE-2006-3311.md +++ b/2006/CVE-2006-3311.md @@ -11,6 +11,7 @@ Buffer overflow in Adobe Flash Player 8.0.24.0 and earlier, Flash Professional 8 #### Reference - http://securityreason.com/securityalert/1546 +- http://www.computerterrorism.com/research/ct12-09-2006.htm #### Github No PoCs found on GitHub currently. diff --git a/2006/CVE-2006-3626.md b/2006/CVE-2006-3626.md index 710560d6df..67a857a9cc 100644 --- a/2006/CVE-2006-3626.md +++ b/2006/CVE-2006-3626.md @@ -19,6 +19,7 @@ Race condition in Linux kernel 2.6.17.4 and earlier allows local users to gain r - https://github.com/C0dak/local-root-exploit- - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits - https://github.com/QChiLan/linux-exp diff --git a/2007/CVE-2007-0034.md b/2007/CVE-2007-0034.md index 857bb7362c..0aa51963e7 100644 --- a/2007/CVE-2007-0034.md +++ b/2007/CVE-2007-0034.md @@ -10,6 +10,7 @@ Buffer overflow in the Advanced Search (Finder.exe) feature of Microsoft Outlook ### POC #### Reference +- http://www.computerterrorism.com/research/ct09-01-2007.htm - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-003 #### Github diff --git a/2007/CVE-2007-4573.md b/2007/CVE-2007-4573.md index de0a00c2e4..99ec0ebbc2 100644 --- a/2007/CVE-2007-4573.md +++ b/2007/CVE-2007-4573.md @@ -27,5 +27,6 @@ The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x bef - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2008/CVE-2008-0009.md b/2008/CVE-2008-0009.md index 985613ad2b..73cd36890b 100644 --- a/2008/CVE-2008-0009.md +++ b/2008/CVE-2008-0009.md @@ -27,5 +27,6 @@ No PoCs from references. - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2008/CVE-2008-0010.md b/2008/CVE-2008-0010.md index af201cc75a..03209d04dd 100644 --- a/2008/CVE-2008-0010.md +++ b/2008/CVE-2008-0010.md @@ -27,5 +27,6 @@ The copy_from_user_mmap_sem function in fs/splice.c in the Linux kernel 2.6.22 t - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2008/CVE-2008-0600.md b/2008/CVE-2008-0600.md index 4bb03bf801..ee01001d17 100644 --- a/2008/CVE-2008-0600.md +++ b/2008/CVE-2008-0600.md @@ -19,6 +19,7 @@ The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not v - https://github.com/C0dak/local-root-exploit- - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits - https://github.com/QChiLan/linux-exp @@ -57,6 +58,7 @@ The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not v - https://github.com/rakjong/LinuxElevation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xfinest/linux-kernel-exploits - https://github.com/xssfile/linux-kernel-exploits diff --git a/2008/CVE-2008-0900.md b/2008/CVE-2008-0900.md index 74d5edb49b..9048e00e24 100644 --- a/2008/CVE-2008-0900.md +++ b/2008/CVE-2008-0900.md @@ -14,6 +14,7 @@ No PoCs from references. #### Github - https://github.com/Al1ex/LinuxEelvation +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/fei9747/LinuxEelvation diff --git a/2008/CVE-2008-4210.md b/2008/CVE-2008-4210.md index 81cd373652..a1d766c76b 100644 --- a/2008/CVE-2008-4210.md +++ b/2008/CVE-2008-4210.md @@ -19,6 +19,7 @@ fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and s - https://github.com/C0dak/local-root-exploit- - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits - https://github.com/QChiLan/linux-exp diff --git a/2009/CVE-2009-0065.md b/2009/CVE-2009-0065.md index fd6a287e39..9a559a0412 100644 --- a/2009/CVE-2009-0065.md +++ b/2009/CVE-2009-0065.md @@ -27,5 +27,6 @@ No PoCs from references. - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2009/CVE-2009-1046.md b/2009/CVE-2009-1046.md index d708c75c88..1a0ed31091 100644 --- a/2009/CVE-2009-1046.md +++ b/2009/CVE-2009-1046.md @@ -27,5 +27,6 @@ No PoCs from references. - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2009/CVE-2009-1185.md b/2009/CVE-2009-1185.md index c18b341e26..6084daaea4 100644 --- a/2009/CVE-2009-1185.md +++ b/2009/CVE-2009-1185.md @@ -20,6 +20,7 @@ udev before 1.4.1 does not verify whether a NETLINK message originates from kern - https://github.com/C0dak/local-root-exploit- - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits diff --git a/2009/CVE-2009-1337.md b/2009/CVE-2009-1337.md index 18464ea3e5..72eb333c9e 100644 --- a/2009/CVE-2009-1337.md +++ b/2009/CVE-2009-1337.md @@ -20,6 +20,7 @@ The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 - https://github.com/C0dak/local-root-exploit- - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits - https://github.com/QChiLan/linux-exp diff --git a/2009/CVE-2009-2692.md b/2009/CVE-2009-2692.md index 7e9784b8a0..16f6ab08f0 100644 --- a/2009/CVE-2009-2692.md +++ b/2009/CVE-2009-2692.md @@ -21,6 +21,7 @@ The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not in - https://github.com/CVEDB/awesome-cve-repo - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits @@ -71,6 +72,7 @@ The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not in - https://github.com/talent-x90c/cve_list - https://github.com/tangsilian/android-vuln - https://github.com/taviso/iknowthis +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/x90hack/vulnerabilty_lab - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xfinest/linux-kernel-exploits diff --git a/2009/CVE-2009-2698.md b/2009/CVE-2009-2698.md index 165a7d2106..c69dbede6d 100644 --- a/2009/CVE-2009-2698.md +++ b/2009/CVE-2009-2698.md @@ -23,6 +23,7 @@ The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) - https://github.com/CVEDB/awesome-cve-repo - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits - https://github.com/QChiLan/linux-exp diff --git a/2009/CVE-2009-2910.md b/2009/CVE-2009-2910.md index a5975e9087..d906789da9 100644 --- a/2009/CVE-2009-2910.md +++ b/2009/CVE-2009-2910.md @@ -27,5 +27,6 @@ No PoCs from references. - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2009/CVE-2009-3001.md b/2009/CVE-2009-3001.md index 0471bca33b..c7ccd655d9 100644 --- a/2009/CVE-2009-3001.md +++ b/2009/CVE-2009-3001.md @@ -27,5 +27,6 @@ No PoCs from references. - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2009/CVE-2009-3547.md b/2009/CVE-2009-3547.md index 16e0308bde..6fd82fa74f 100644 --- a/2009/CVE-2009-3547.md +++ b/2009/CVE-2009-3547.md @@ -19,6 +19,7 @@ Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allo - https://github.com/C0dak/local-root-exploit- - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits diff --git a/2009/CVE-2009-3895.md b/2009/CVE-2009-3895.md new file mode 100644 index 0000000000..8127b16c41 --- /dev/null +++ b/2009/CVE-2009-3895.md @@ -0,0 +1,17 @@ +### [CVE-2009-3895](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3895) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Heap-based buffer overflow in the exif_entry_fix function (aka the tag fixup routine) in libexif/exif-entry.c in libexif 0.6.18 allows remote attackers to cause a denial of service or possibly execute arbitrary code via an invalid EXIF image. NOTE: some of these details are obtained from third party information. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/ch1hyun/fuzzing-class + diff --git a/2010/CVE-2010-1146.md b/2010/CVE-2010-1146.md index 4ba78f838f..ef1afd8ed1 100644 --- a/2010/CVE-2010-1146.md +++ b/2010/CVE-2010-1146.md @@ -19,6 +19,7 @@ No PoCs from references. - https://github.com/C0dak/local-root-exploit- - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits diff --git a/2010/CVE-2010-2240.md b/2010/CVE-2010-2240.md index 28b63bbe09..3b31aba152 100644 --- a/2010/CVE-2010-2240.md +++ b/2010/CVE-2010-2240.md @@ -26,5 +26,6 @@ The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2010/CVE-2010-2568.md b/2010/CVE-2010-2568.md index 56ad17217e..3b5e339434 100644 --- a/2010/CVE-2010-2568.md +++ b/2010/CVE-2010-2568.md @@ -16,6 +16,7 @@ Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, S #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Kuromesi/Py4CSKG +- https://github.com/MN439/bingduziyuan - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/jisosomppi/pentesting diff --git a/2010/CVE-2010-2883.md b/2010/CVE-2010-2883.md index ffdd65eeee..152500fdec 100644 --- a/2010/CVE-2010-2883.md +++ b/2010/CVE-2010-2883.md @@ -18,6 +18,7 @@ No PoCs from references. - https://github.com/ThunderJie/CVE - https://github.com/Zhouyi827/myblog - https://github.com/amliaW4/amliaW4.github.io +- https://github.com/fangdada/ctf - https://github.com/int0/pdfexplorer - https://github.com/season-lab/rop-collection - https://github.com/xinali/articles diff --git a/2010/CVE-2010-2959.md b/2010/CVE-2010-2959.md index c50fae370e..f616f78eeb 100644 --- a/2010/CVE-2010-2959.md +++ b/2010/CVE-2010-2959.md @@ -27,6 +27,7 @@ No PoCs from references. - https://github.com/DhivaKD/OSCP-Notes - https://github.com/Elinpf/OSCP-survival-guide - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/MLGBSec/os-survival @@ -102,6 +103,7 @@ No PoCs from references. - https://github.com/spencerdodd/kernelpop - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/whackmanic/OSCP_Found +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xfinest/linux-kernel-exploits - https://github.com/xssfile/linux-kernel-exploits diff --git a/2010/CVE-2010-2963.md b/2010/CVE-2010-2963.md index 5c9dccfcae..896cf0bc27 100644 --- a/2010/CVE-2010-2963.md +++ b/2010/CVE-2010-2963.md @@ -27,5 +27,6 @@ No PoCs from references. - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2010/CVE-2010-3081.md b/2010/CVE-2010-3081.md index a9cbeefc72..aab71e7a5e 100644 --- a/2010/CVE-2010-3081.md +++ b/2010/CVE-2010-3081.md @@ -20,6 +20,7 @@ The compat_alloc_user_space functions in include/asm/compat.h files in the Linux - https://github.com/C0dak/local-root-exploit- - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits @@ -63,6 +64,7 @@ The compat_alloc_user_space functions in include/asm/compat.h files in the Linux - https://github.com/ram4u/Linux_Exploit_Suggester - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xfinest/linux-kernel-exploits - https://github.com/xssfile/linux-kernel-exploits diff --git a/2010/CVE-2010-3301.md b/2010/CVE-2010-3301.md index 47137ab777..9f8858b164 100644 --- a/2010/CVE-2010-3301.md +++ b/2010/CVE-2010-3301.md @@ -20,6 +20,7 @@ The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the - https://github.com/C0dak/local-root-exploit- - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits @@ -62,6 +63,7 @@ The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the - https://github.com/ram4u/Linux_Exploit_Suggester - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xfinest/linux-kernel-exploits - https://github.com/xssfile/linux-kernel-exploits diff --git a/2010/CVE-2010-3333.md b/2010/CVE-2010-3333.md index c6e8179108..22cebecf43 100644 --- a/2010/CVE-2010-3333.md +++ b/2010/CVE-2010-3333.md @@ -30,6 +30,7 @@ No PoCs from references. - https://github.com/doshyt/cve-monitor - https://github.com/enthought/cve-search - https://github.com/extremenetworks/cve-search-src +- https://github.com/fangdada/ctf - https://github.com/jerfinj/cve-search - https://github.com/miradam/cve-search - https://github.com/pandazheng/Threat-Intelligence-Analyst diff --git a/2010/CVE-2010-3437.md b/2010/CVE-2010-3437.md index 24b2ae6b81..20f0dad8b6 100644 --- a/2010/CVE-2010-3437.md +++ b/2010/CVE-2010-3437.md @@ -62,6 +62,7 @@ No PoCs from references. - https://github.com/ram4u/Linux_Exploit_Suggester - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xfinest/linux-kernel-exploits - https://github.com/xssfile/linux-kernel-exploits diff --git a/2010/CVE-2010-3904.md b/2010/CVE-2010-3904.md index 9b570191cc..ac18c67162 100644 --- a/2010/CVE-2010-3904.md +++ b/2010/CVE-2010-3904.md @@ -35,6 +35,7 @@ The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Socke - https://github.com/Elinpf/OSCP-survival-guide - https://github.com/Feng4/linux-kernel-exploits - https://github.com/Gajasurve/The-Security-Handbook +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/MLGBSec/os-survival - https://github.com/Micr067/linux-kernel-exploits diff --git a/2010/CVE-2010-4073.md b/2010/CVE-2010-4073.md index 354264b0b6..ff6bc75a36 100644 --- a/2010/CVE-2010-4073.md +++ b/2010/CVE-2010-4073.md @@ -21,6 +21,7 @@ The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize cert - https://github.com/C0dak/local-root-exploit- - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits diff --git a/2010/CVE-2010-4258.md b/2010/CVE-2010-4258.md index 398dd6e36f..eaae0c5ae0 100644 --- a/2010/CVE-2010-4258.md +++ b/2010/CVE-2010-4258.md @@ -21,6 +21,7 @@ The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does n - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits - https://github.com/HUSTSeclab/Kernel-Exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits - https://github.com/QChiLan/linux-exp @@ -65,6 +66,7 @@ The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does n - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/tranquac/Linux-Privilege-Escalation - https://github.com/usamaelshazly/Linux-Privilege-Escalation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xfinest/linux-kernel-exploits - https://github.com/xssfile/linux-kernel-exploits diff --git a/2010/CVE-2010-4347.md b/2010/CVE-2010-4347.md index bea1962a54..3271367891 100644 --- a/2010/CVE-2010-4347.md +++ b/2010/CVE-2010-4347.md @@ -19,6 +19,7 @@ No PoCs from references. - https://github.com/C0dak/local-root-exploit- - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits diff --git a/2010/CVE-2010-5137.md b/2010/CVE-2010-5137.md index 66af5af16f..8c94db487a 100644 --- a/2010/CVE-2010-5137.md +++ b/2010/CVE-2010-5137.md @@ -14,6 +14,7 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/cryptoquick/ossification - https://github.com/uvhw/conchimgiangnang - https://github.com/uvhw/wallet.cpp diff --git a/2011/CVE-2011-0923.md b/2011/CVE-2011-0923.md index c59c21a540..ca32378a03 100644 --- a/2011/CVE-2011-0923.md +++ b/2011/CVE-2011-0923.md @@ -15,5 +15,5 @@ The client in HP Data Protector does not properly validate EXEC_CMD arguments, w - http://securityreason.com/securityalert/8329 #### Github -No PoCs found on GitHub currently. +- https://github.com/marcocarolasec/CVE-2016-2004-Exploit diff --git a/2011/CVE-2011-1493.md b/2011/CVE-2011-1493.md index 175516cdd1..2182877888 100644 --- a/2011/CVE-2011-1493.md +++ b/2011/CVE-2011-1493.md @@ -27,5 +27,6 @@ No PoCs from references. - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2011/CVE-2011-2523.md b/2011/CVE-2011-2523.md index 39e933db17..38b9da29b8 100644 --- a/2011/CVE-2011-2523.md +++ b/2011/CVE-2011-2523.md @@ -71,6 +71,7 @@ vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which - https://github.com/shamsulchowdhury/Unit-16-Homework-Penetration-Testing1 - https://github.com/slxwzk/slxwzkBotnet - https://github.com/sponkmonk/Ladon_english_update +- https://github.com/sug4r-wr41th/CVE-2011-2523 - https://github.com/sunzu94/vsftpd_2.3.4_Exploit - https://github.com/tarikemal/exploit-ftp-samba - https://github.com/thanawut2903/Port-21-tcp-vsftpd-2.3.4-exploit diff --git a/2011/CVE-2011-3374.md b/2011/CVE-2011-3374.md index ad0ac59fac..8179848253 100644 --- a/2011/CVE-2011-3374.md +++ b/2011/CVE-2011-3374.md @@ -36,6 +36,7 @@ No PoCs from references. - https://github.com/garethr/snykout - https://github.com/goharbor/pluggable-scanner-spec - https://github.com/jnsgruk/trivy-cvss-tools +- https://github.com/m-pasima/CI-CD-Security-image-scan - https://github.com/mauraneh/WIK-DPS-TP02 - https://github.com/sharmapravin1001/Kubernetes-cks - https://github.com/siddharthraopotukuchi/trivy diff --git a/2011/CVE-2011-3389.md b/2011/CVE-2011-3389.md index d4105dc7ab..1eaff481c8 100644 --- a/2011/CVE-2011-3389.md +++ b/2011/CVE-2011-3389.md @@ -40,6 +40,7 @@ The SSL protocol, as used in certain configurations in Microsoft Windows and Mic - https://github.com/alexandrburyakov/Rep2 - https://github.com/alexgro1982/devops-netology - https://github.com/bysart/devops-netology +- https://github.com/catsploit/catsploit - https://github.com/cdupuis/image-api - https://github.com/daniel1302/litecoin - https://github.com/dmitrii1312/03-sysadmin-09 diff --git a/2011/CVE-2011-3556.md b/2011/CVE-2011-3556.md index bfaeaf4269..2b080eaae7 100644 --- a/2011/CVE-2011-3556.md +++ b/2011/CVE-2011-3556.md @@ -16,6 +16,7 @@ Unspecified vulnerability in the Java Runtime Environment component in Oracle Ja #### Github - https://github.com/20142995/Goby - https://github.com/ARPSyndicate/cvemon +- https://github.com/CVEDB/awesome-cve-repo - https://github.com/HimmelAward/Goby_POC - https://github.com/MelanyRoob/Goby - https://github.com/Z0fhack/Goby_POC diff --git a/2011/CVE-2011-3730.md b/2011/CVE-2011-3730.md new file mode 100644 index 0000000000..3c89ba8e47 --- /dev/null +++ b/2011/CVE-2011-3730.md @@ -0,0 +1,17 @@ +### [CVE-2011-3730](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3730) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Drupal 7.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by modules/simpletest/tests/upgrade/drupal-6.upload.database.php and certain other files. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/catsploit/catsploit + diff --git a/2011/CVE-2011-4461.md b/2011/CVE-2011-4461.md index bc7e5d5562..2be6c9c2e0 100644 --- a/2011/CVE-2011-4461.md +++ b/2011/CVE-2011-4461.md @@ -18,5 +18,6 @@ Jetty 8.1.0.RC2 and earlier computes hash values for form parameters without res #### Github - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/javirodriguezzz/Shodan-Browser diff --git a/2011/CVE-2011-4969.md b/2011/CVE-2011-4969.md index c220c5c464..951d796e9c 100644 --- a/2011/CVE-2011-4969.md +++ b/2011/CVE-2011-4969.md @@ -14,6 +14,7 @@ Cross-site scripting (XSS) vulnerability in jQuery before 1.6.3, when using loca #### Github - https://github.com/FallibleInc/retirejslib +- https://github.com/catsploit/catsploit - https://github.com/ctcpip/jquery-security - https://github.com/eliasgranderubio/4depcheck diff --git a/2012/CVE-2012-0056.md b/2012/CVE-2012-0056.md index 15aa65faa3..e80131bdd7 100644 --- a/2012/CVE-2012-0056.md +++ b/2012/CVE-2012-0056.md @@ -35,6 +35,7 @@ No PoCs from references. - https://github.com/Elinpf/OSCP-survival-guide - https://github.com/Feng4/linux-kernel-exploits - https://github.com/Gajasurve/The-Security-Handbook +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/MLGBSec/os-survival @@ -141,6 +142,7 @@ No PoCs from references. - https://github.com/tranquac/Linux-Privilege-Escalation - https://github.com/usamaelshazly/Linux-Privilege-Escalation - https://github.com/whackmanic/OSCP_Found +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xcsrf/OSCP-PWK-Notes-Public - https://github.com/xfinest/linux-kernel-exploits diff --git a/2012/CVE-2012-0158.md b/2012/CVE-2012-0158.md index d109c3ab52..d1688a387c 100644 --- a/2012/CVE-2012-0158.md +++ b/2012/CVE-2012-0158.md @@ -28,6 +28,7 @@ The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX control - https://github.com/amliaW4/amliaW4.github.io - https://github.com/cnhouzi/APTNotes - https://github.com/czq945659538/-study +- https://github.com/fangdada/ctf - https://github.com/havocykp/Vulnerability-analysis - https://github.com/helloandrewpaul/Mandiant---APT - https://github.com/houjingyi233/office-exploit-case-study diff --git a/2012/CVE-2012-1823.md b/2012/CVE-2012-1823.md index 3da90be41e..5f6228956f 100644 --- a/2012/CVE-2012-1823.md +++ b/2012/CVE-2012-1823.md @@ -38,9 +38,11 @@ No PoCs from references. - https://github.com/Soundaryakambhampati/test-6 - https://github.com/Unix13/metasploitable2 - https://github.com/Vibragence/Dockersploit +- https://github.com/XiangDongCJC/CVE-2024-4577-PHP-CGI-RCE - https://github.com/ajread4/cve_pull - https://github.com/alex14324/Eagel - https://github.com/beched/libpywebhack +- https://github.com/bl4cksku11/CVE-2024-4577 - https://github.com/cyberdeception/deepdig - https://github.com/cyberharsh/PHP_CVE-2012-1823 - https://github.com/daai1/CVE-2012-1823 diff --git a/2012/CVE-2012-2098.md b/2012/CVE-2012-2098.md index cdb8783c3a..6cf3595eb6 100644 --- a/2012/CVE-2012-2098.md +++ b/2012/CVE-2012-2098.md @@ -18,5 +18,6 @@ Algorithmic complexity vulnerability in the sorting algorithms in bzip2 compress - https://github.com/Anonymous-Phunter/PHunter - https://github.com/BrunoBonacci/lein-binplus - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/markus-wa/clj-bin diff --git a/2012/CVE-2012-2836.md b/2012/CVE-2012-2836.md index 0781168672..7bb8bcff51 100644 --- a/2012/CVE-2012-2836.md +++ b/2012/CVE-2012-2836.md @@ -15,5 +15,6 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/asur4s/fuzzing +- https://github.com/ch1hyun/fuzzing-class - https://github.com/chiehw/fuzzing diff --git a/2012/CVE-2012-2982.md b/2012/CVE-2012-2982.md index 2cd7ea1de5..9b190bb1ed 100644 --- a/2012/CVE-2012-2982.md +++ b/2012/CVE-2012-2982.md @@ -28,6 +28,7 @@ file/show.cgi in Webmin 1.590 and earlier allows remote authenticated users to e - https://github.com/Mithlonde/Mithlonde - https://github.com/OstojaOfficial/CVE-2012-2982 - https://github.com/R00tendo/CVE-2012-2982 +- https://github.com/Shadow-Spinner/CVE-2012-2982_python - https://github.com/SlizBinksman/CVE_2012-2982 - https://github.com/Will-Banksy/My-Exploits - https://github.com/alien-keric/webmin-v1.580-exploit diff --git a/2012/CVE-2012-3174.md b/2012/CVE-2012-3174.md index acb8f726cd..4171ef8bdf 100644 --- a/2012/CVE-2012-3174.md +++ b/2012/CVE-2012-3174.md @@ -15,4 +15,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/ferdinandmudjialim/metasploit-cve-search +- https://github.com/tunnelcat/metasploit-cve-search diff --git a/2012/CVE-2012-4929.md b/2012/CVE-2012-4929.md index 4cd92716a0..e33033a766 100644 --- a/2012/CVE-2012-4929.md +++ b/2012/CVE-2012-4929.md @@ -62,6 +62,7 @@ The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, - https://github.com/ilya-starchikov/devops-netology - https://github.com/jselvi/docker-crime - https://github.com/mohitrex7/Wap-Recon +- https://github.com/mpgn/CRIME-poc - https://github.com/nikolay480/devops-netology - https://github.com/nkiselyov/devops-netology - https://github.com/paroteen/SecurEagle diff --git a/2012/CVE-2012-5321.md b/2012/CVE-2012-5321.md index 70d40948e8..d70c5b246e 100644 --- a/2012/CVE-2012-5321.md +++ b/2012/CVE-2012-5321.md @@ -13,5 +13,5 @@ tiki-featured_link.php in TikiWiki CMS/Groupware 8.3 allows remote attackers to - http://st2tea.blogspot.com/2012/02/tiki-wiki-cms-groupware-frame-injection.html #### Github -No PoCs found on GitHub currently. +- https://github.com/Cappricio-Securities/CVE-2012-5321 diff --git a/2012/CVE-2012-6664.md b/2012/CVE-2012-6664.md new file mode 100644 index 0000000000..46f362ab2b --- /dev/null +++ b/2012/CVE-2012-6664.md @@ -0,0 +1,17 @@ +### [CVE-2012-6664](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6664) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Multiple directory traversal vulnerabilities in the TFTP Server in Distinct Intranet Servers 3.10 and earlier allow remote attackers to read or write arbitrary files via a .. (dot dot) in the (1) get or (2) put commands. + +### POC + +#### Reference +- https://www.exploit-db.com/exploits/41714 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2012/CVE-2012-6708.md b/2012/CVE-2012-6708.md index 71a718a7ca..e0c4844b61 100644 --- a/2012/CVE-2012-6708.md +++ b/2012/CVE-2012-6708.md @@ -17,6 +17,7 @@ jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQu #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/catdever/watchdog +- https://github.com/catsploit/catsploit - https://github.com/ctcpip/jquery-security - https://github.com/flipkart-incubator/watchdog - https://github.com/rohankumardubey/watchdog diff --git a/2013/CVE-2013-0268.md b/2013/CVE-2013-0268.md index ab2e2a7667..b02aa84dd4 100644 --- a/2013/CVE-2013-0268.md +++ b/2013/CVE-2013-0268.md @@ -19,6 +19,7 @@ No PoCs from references. - https://github.com/C0dak/local-root-exploit- - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits - https://github.com/QChiLan/linux-exp diff --git a/2013/CVE-2013-1763.md b/2013/CVE-2013-1763.md index 7fef43b91f..8a87080401 100644 --- a/2013/CVE-2013-1763.md +++ b/2013/CVE-2013-1763.md @@ -21,6 +21,7 @@ Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in - https://github.com/C0dak/local-root-exploit- - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits - https://github.com/QChiLan/linux-exp @@ -61,6 +62,7 @@ Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in - https://github.com/rakjong/LinuxElevation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xfinest/linux-kernel-exploits - https://github.com/xssfile/linux-kernel-exploits diff --git a/2013/CVE-2013-1768.md b/2013/CVE-2013-1768.md index 0cf2a61629..68a8b312b7 100644 --- a/2013/CVE-2013-1768.md +++ b/2013/CVE-2013-1768.md @@ -18,6 +18,7 @@ The BrokerFactory functionality in Apache OpenJPA 1.x before 1.2.3 and 2.x befor - https://github.com/BrittanyKuhn/javascript-tutorial - https://github.com/CGCL-codes/PHunter - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet +- https://github.com/LibHunter/LibHunter - https://github.com/PalindromeLabs/Java-Deserialization-CVEs - https://github.com/klausware/Java-Deserialization-Cheat-Sheet - https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet diff --git a/2013/CVE-2013-1858.md b/2013/CVE-2013-1858.md index 205197b7b2..8f423f5ff1 100644 --- a/2013/CVE-2013-1858.md +++ b/2013/CVE-2013-1858.md @@ -19,6 +19,7 @@ The clone system-call implementation in the Linux kernel before 3.8.3 does not p - https://github.com/C0dak/local-root-exploit- - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits - https://github.com/QChiLan/linux-exp diff --git a/2013/CVE-2013-1959.md b/2013/CVE-2013-1959.md index fbb27de16c..5d29fc0c2d 100644 --- a/2013/CVE-2013-1959.md +++ b/2013/CVE-2013-1959.md @@ -13,5 +13,6 @@ kernel/user_namespace.c in the Linux kernel before 3.8.9 does not have appropria - http://www.openwall.com/lists/oss-security/2013/04/29/1 #### Github +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits diff --git a/2013/CVE-2013-2094.md b/2013/CVE-2013-2094.md index f894a6a492..4918877257 100644 --- a/2013/CVE-2013-2094.md +++ b/2013/CVE-2013-2094.md @@ -25,6 +25,7 @@ The perf_swevent_init function in kernel/events/core.c in the Linux kernel befor - https://github.com/CVEDB/awesome-cve-repo - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/I-Prashanth-S/CybersecurityTIFAC - https://github.com/IMCG/awesome-c - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester @@ -96,6 +97,7 @@ The perf_swevent_init function in kernel/events/core.c in the Linux kernel befor - https://github.com/timhsutw/cve-2013-2094 - https://github.com/vnik5287/CVE-2013-2094 - https://github.com/weeka10/-hktalent-TOP +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xfinest/linux-kernel-exploits - https://github.com/xssfile/linux-kernel-exploits diff --git a/2013/CVE-2013-6805.md b/2013/CVE-2013-6805.md index 9b3ade0e4f..9a92fe18ae 100644 --- a/2013/CVE-2013-6805.md +++ b/2013/CVE-2013-6805.md @@ -13,4 +13,5 @@ OpenText Exceed OnDemand (EoD) 8 uses weak encryption for passwords, which makes - https://github.com/koto/exceed-mitm #### Github +- https://github.com/koto/exceed-mitm diff --git a/2013/CVE-2013-6806.md b/2013/CVE-2013-6806.md index b82c1bfa69..7eb13a4000 100644 --- a/2013/CVE-2013-6806.md +++ b/2013/CVE-2013-6806.md @@ -13,4 +13,5 @@ OpenText Exceed OnDemand (EoD) 8 allows man-in-the-middle attackers to disable b - https://github.com/koto/exceed-mitm #### Github +- https://github.com/koto/exceed-mitm diff --git a/2013/CVE-2013-6807.md b/2013/CVE-2013-6807.md index d0430969a8..c992aa9450 100644 --- a/2013/CVE-2013-6807.md +++ b/2013/CVE-2013-6807.md @@ -13,4 +13,5 @@ The client in OpenText Exceed OnDemand (EoD) 8 supports anonymous ciphers by def - https://github.com/koto/exceed-mitm #### Github +- https://github.com/koto/exceed-mitm diff --git a/2013/CVE-2013-7285.md b/2013/CVE-2013-7285.md index bf85bfa308..b88fa7bf0e 100644 --- a/2013/CVE-2013-7285.md +++ b/2013/CVE-2013-7285.md @@ -17,6 +17,7 @@ Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework h - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/Live-Hack-CVE/CVE-2019-10173 - https://github.com/OWASP/www-project-ide-vulscanner - https://github.com/Whoopsunix/PPPVULNS diff --git a/2014/CVE-2014-0038.md b/2014/CVE-2014-0038.md index 31a7ee8017..37ba9b5ac0 100644 --- a/2014/CVE-2014-0038.md +++ b/2014/CVE-2014-0038.md @@ -24,6 +24,7 @@ The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits - https://github.com/GhostTroops/TOP +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/IMCG/awesome-c - https://github.com/JERRY123S/all-poc - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits @@ -77,6 +78,7 @@ The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13 - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/sujayadkesar/Linux-Privilege-Escalation - https://github.com/weeka10/-hktalent-TOP +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xfinest/linux-kernel-exploits - https://github.com/xssfile/linux-kernel-exploits diff --git a/2014/CVE-2014-0193.md b/2014/CVE-2014-0193.md index d1940a3848..3964756fec 100644 --- a/2014/CVE-2014-0193.md +++ b/2014/CVE-2014-0193.md @@ -15,5 +15,6 @@ No PoCs from references. #### Github - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/ian4hu/super-pom diff --git a/2014/CVE-2014-0196.md b/2014/CVE-2014-0196.md index e9335fc62f..adc2cf9650 100644 --- a/2014/CVE-2014-0196.md +++ b/2014/CVE-2014-0196.md @@ -22,6 +22,7 @@ The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14 - https://github.com/C0dak/local-root-exploit- - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits - https://github.com/Ostorlab/KEV @@ -70,6 +71,7 @@ The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14 - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/tangsilian/android-vuln - https://github.com/tempbottle/CVE-2014-0196 +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xfinest/linux-kernel-exploits - https://github.com/xssfile/linux-kernel-exploits diff --git a/2014/CVE-2014-125093.md b/2014/CVE-2014-125093.md new file mode 100644 index 0000000000..251e7b30c0 --- /dev/null +++ b/2014/CVE-2014-125093.md @@ -0,0 +1,17 @@ +### [CVE-2014-125093](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-125093) +![](https://img.shields.io/static/v1?label=Product&message=Ad%20Blocking%20Detector%20Plugin&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.2.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Information%20Disclosure&color=brighgreen) + +### Description + +A vulnerability has been found in Ad Blocking Detector Plugin up to 1.2.1 on WordPress and classified as problematic. This vulnerability affects unknown code of the file ad-blocking-detector.php. The manipulation leads to information disclosure. The attack can be initiated remotely. Upgrading to version 1.2.2 is able to address this issue. The patch is identified as 3312b9cd79e5710d1e282fc9216a4e5ab31b3d94. It is recommended to upgrade the affected component. VDB-222610 is the identifier assigned to this vulnerability. + +### POC + +#### Reference +- https://vuldb.com/?id.222610 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2014/CVE-2014-2851.md b/2014/CVE-2014-2851.md index 15cbc6bffb..f580008426 100644 --- a/2014/CVE-2014-2851.md +++ b/2014/CVE-2014-2851.md @@ -30,5 +30,6 @@ No PoCs from references. - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/thomaxxl/group_info +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2014/CVE-2014-3153.md b/2014/CVE-2014-3153.md index 035a31fb56..230df76172 100644 --- a/2014/CVE-2014-3153.md +++ b/2014/CVE-2014-3153.md @@ -23,6 +23,7 @@ No PoCs from references. - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits - https://github.com/GhostTroops/TOP +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/I-Prashanth-S/CybersecurityTIFAC - https://github.com/IMCG/awesome-c - https://github.com/JERRY123S/all-poc @@ -94,6 +95,7 @@ No PoCs from references. - https://github.com/timwr/CVE-2014-3153 - https://github.com/tymat/android_futex_root - https://github.com/weeka10/-hktalent-TOP +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xfinest/linux-kernel-exploits - https://github.com/xssfile/linux-kernel-exploits diff --git a/2014/CVE-2014-3488.md b/2014/CVE-2014-3488.md index 212c9fb016..9ba94960c1 100644 --- a/2014/CVE-2014-3488.md +++ b/2014/CVE-2014-3488.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/cezapata/appconfiguration-sample - https://github.com/ian4hu/super-pom diff --git a/2014/CVE-2014-3566.md b/2014/CVE-2014-3566.md index 29ca847531..c5993f7dfc 100644 --- a/2014/CVE-2014-3566.md +++ b/2014/CVE-2014-3566.md @@ -95,6 +95,7 @@ The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses - https://github.com/mawinkler/c1-ws-ansible - https://github.com/mikemackintosh/ruby-qualys - https://github.com/mikesplain/CVE-2014-3566-poodle-cookbook +- https://github.com/mpgn/poodle-PoC - https://github.com/n13l/measurements - https://github.com/neominds/ric13351 - https://github.com/nikolay480/devops-netology diff --git a/2014/CVE-2014-3577.md b/2014/CVE-2014-3577.md index 2c9c678766..a1408bcbeb 100644 --- a/2014/CVE-2014-3577.md +++ b/2014/CVE-2014-3577.md @@ -18,6 +18,7 @@ org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient be - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/albfernandez/commons-httpclient-3 - https://github.com/argon-gh-demo/clojure-sample - https://github.com/rm-hull/nvd-clojure diff --git a/2014/CVE-2014-3704.md b/2014/CVE-2014-3704.md index becd811933..1e205068b1 100644 --- a/2014/CVE-2014-3704.md +++ b/2014/CVE-2014-3704.md @@ -39,6 +39,7 @@ The expandArguments function in the database abstraction API in Drupal core 7.x - https://github.com/Threekiii/Vulhub-Reproduce - https://github.com/Z0fhack/Goby_POC - https://github.com/bakery312/Vulhub-Reproduce +- https://github.com/catsploit/catsploit - https://github.com/enomothem/PenTestNote - https://github.com/happynote3966/CVE-2014-3704 - https://github.com/hxysaury/saury-vulnhub diff --git a/2014/CVE-2014-3791.md b/2014/CVE-2014-3791.md index d137d1b1e9..a4275a7d04 100644 --- a/2014/CVE-2014-3791.md +++ b/2014/CVE-2014-3791.md @@ -16,5 +16,6 @@ Stack-based buffer overflow in Easy File Sharing (EFS) Web Server 6.8 allows rem #### Github - https://github.com/0xT11/CVE-POC - https://github.com/Parist0nH1ll/Vulnerabilities-Write-Ups +- https://github.com/fangdada/ctf - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2014/CVE-2014-4014.md b/2014/CVE-2014-4014.md index 6c6322f49f..518daa452c 100644 --- a/2014/CVE-2014-4014.md +++ b/2014/CVE-2014-4014.md @@ -19,6 +19,7 @@ The capabilities implementation in the Linux kernel before 3.14.8 does not prope - https://github.com/C0dak/local-root-exploit- - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits - https://github.com/QChiLan/linux-exp @@ -60,6 +61,7 @@ The capabilities implementation in the Linux kernel before 3.14.8 does not prope - https://github.com/spencerdodd/kernelpop - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/vnik5287/cve-2014-4014-privesc +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xfinest/linux-kernel-exploits - https://github.com/xssfile/linux-kernel-exploits diff --git a/2014/CVE-2014-4322.md b/2014/CVE-2014-4322.md index 937d5edd2c..d29ae43ea5 100644 --- a/2014/CVE-2014-4322.md +++ b/2014/CVE-2014-4322.md @@ -47,5 +47,6 @@ No PoCs from references. - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/tangsilian/android-vuln - https://github.com/weeka10/-hktalent-TOP +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2014/CVE-2014-4699.md b/2014/CVE-2014-4699.md index fe65e04541..38716a4e91 100644 --- a/2014/CVE-2014-4699.md +++ b/2014/CVE-2014-4699.md @@ -23,6 +23,7 @@ The Linux kernel before 3.15.4 on Intel processors does not properly restrict us - https://github.com/C0dak/local-root-exploit- - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits - https://github.com/QChiLan/linux-exp @@ -66,6 +67,7 @@ The Linux kernel before 3.15.4 on Intel processors does not properly restrict us - https://github.com/spencerdodd/kernelpop - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/vnik5287/cve-2014-4699-ptrace +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xfinest/linux-kernel-exploits - https://github.com/xssfile/linux-kernel-exploits diff --git a/2014/CVE-2014-4943.md b/2014/CVE-2014-4943.md index ed339b3bda..255a09cee2 100644 --- a/2014/CVE-2014-4943.md +++ b/2014/CVE-2014-4943.md @@ -28,5 +28,6 @@ The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 a - https://github.com/redes-2015/l2tp-socket-bug - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2014/CVE-2014-5329.md b/2014/CVE-2014-5329.md index 83fd10d46b..8cd6f352db 100644 --- a/2014/CVE-2014-5329.md +++ b/2014/CVE-2014-5329.md @@ -8,8 +8,7 @@ ### Description -GIGAPOD file servers (Appliance model and Software model) provide two web interfaces, 80/tcp and 443/tcp for user operation, and 8001/tcp for administrative operation. -8001/tcp is served by a version of Apache HTTP server containing a flaw in handling HTTP requests (CVE-2011-3192), which may lead to a denial-of-service (DoS) condition. +GIGAPOD file servers (Appliance model and Software model) provide two web interfaces, 80/tcp and 443/tcp for user operation, and 8001/tcp for administrative operation. 8001/tcp is served by a version of Apache HTTP server containing a flaw in handling HTTP requests (CVE-2011-3192), which may lead to a denial-of-service (DoS) condition. ### POC diff --git a/2014/CVE-2014-5470.md b/2014/CVE-2014-5470.md new file mode 100644 index 0000000000..ca33617d48 --- /dev/null +++ b/2014/CVE-2014-5470.md @@ -0,0 +1,17 @@ +### [CVE-2014-5470](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5470) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Actual Analyzer through 2014-08-29 allows code execution via shell metacharacters because untrusted input is used for part of the input data passed to an eval operation. + +### POC + +#### Reference +- https://www.exploit-db.com/exploits/35549 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2014/CVE-2014-9322.md b/2014/CVE-2014-9322.md index c3635414f1..a9c406db97 100644 --- a/2014/CVE-2014-9322.md +++ b/2014/CVE-2014-9322.md @@ -15,6 +15,7 @@ arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly h #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Flerov/WindowsExploitDev +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/R0B1NL1N/linux-kernel-exploitation - https://github.com/RKX1209/CVE-2014-9322 @@ -34,5 +35,6 @@ arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly h - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/tangsilian/android-vuln +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2014/CVE-2014-9418.md b/2014/CVE-2014-9418.md index a4e61ab8a8..441f844b28 100644 --- a/2014/CVE-2014-9418.md +++ b/2014/CVE-2014-9418.md @@ -13,5 +13,6 @@ The eSpace Meeting ActiveX control (eSpaceStatusCtrl.dll) in Huawei eSpace Deskt - http://packetstormsecurity.com/files/152968/Huawei-eSpace-1.1.11.103-Meeting-Heap-Overflow.html #### Github +- https://github.com/javierparadadev/python-value-objects - https://github.com/jparadadev/python-value-objects diff --git a/2015/CVE-2015-0204.md b/2015/CVE-2015-0204.md index 64555a8d1d..68ffab3848 100644 --- a/2015/CVE-2015-0204.md +++ b/2015/CVE-2015-0204.md @@ -49,6 +49,7 @@ The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 - https://github.com/anthophilee/A2SV--SSL-VUL-Scan - https://github.com/bysart/devops-netology - https://github.com/camel-clarkson/non-controlflow-hijacking-datasets +- https://github.com/catsploit/catsploit - https://github.com/chnzzh/OpenSSL-CVE-lib - https://github.com/clic-kbait/A2SV--SSL-VUL-Scan - https://github.com/clino-mania/A2SV--SSL-VUL-Scan diff --git a/2015/CVE-2015-0568.md b/2015/CVE-2015-0568.md index 02332843af..d918dbe9ef 100644 --- a/2015/CVE-2015-0568.md +++ b/2015/CVE-2015-0568.md @@ -25,5 +25,6 @@ No PoCs from references. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2015/CVE-2015-0570.md b/2015/CVE-2015-0570.md index 99007b01b5..fc4add9736 100644 --- a/2015/CVE-2015-0570.md +++ b/2015/CVE-2015-0570.md @@ -27,5 +27,6 @@ No PoCs from references. - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2015/CVE-2015-1328.md b/2015/CVE-2015-1328.md index a7f1abaab4..6bb25624da 100644 --- a/2015/CVE-2015-1328.md +++ b/2015/CVE-2015-1328.md @@ -23,6 +23,7 @@ The overlayfs implementation in the linux (aka Linux kernel) package before 3.19 - https://github.com/DarkenCode/PoC - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits diff --git a/2015/CVE-2015-1805.md b/2015/CVE-2015-1805.md index fa170ebbfc..bec7f458f7 100644 --- a/2015/CVE-2015-1805.md +++ b/2015/CVE-2015-1805.md @@ -48,5 +48,6 @@ The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux k - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/tangsilian/android-vuln - https://github.com/weeka10/-hktalent-TOP +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2015/CVE-2015-1833.md b/2015/CVE-2015-1833.md index 2caabd9d8e..e52f5bda93 100644 --- a/2015/CVE-2015-1833.md +++ b/2015/CVE-2015-1833.md @@ -18,6 +18,7 @@ XML external entity (XXE) vulnerability in Apache Jackrabbit before 2.0.6, 2.2.x - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/Raz0r/aemscan - https://github.com/TheRipperJhon/AEMVS - https://github.com/amarnathadapa-sec/aem diff --git a/2015/CVE-2015-2080.md b/2015/CVE-2015-2080.md index 85360f0fb7..9e1056b4b7 100644 --- a/2015/CVE-2015-2080.md +++ b/2015/CVE-2015-2080.md @@ -22,6 +22,7 @@ The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remot - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter - https://github.com/Elsfa7-110/kenzer-templates +- https://github.com/LibHunter/LibHunter - https://github.com/albinowax/ActiveScanPlusPlus - https://github.com/cranelab/webapp-tech - https://github.com/ilmila/J2EEScan diff --git a/2015/CVE-2015-2156.md b/2015/CVE-2015-2156.md index 6db1dd3da9..9d9db23f9b 100644 --- a/2015/CVE-2015-2156.md +++ b/2015/CVE-2015-2156.md @@ -16,5 +16,6 @@ Netty before 3.9.8.Final, 3.10.x before 3.10.3.Final, 4.0.x before 4.0.28.Final, - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/cezapata/appconfiguration-sample diff --git a/2015/CVE-2015-3253.md b/2015/CVE-2015-3253.md index a95f99d13f..bce7f1a336 100644 --- a/2015/CVE-2015-3253.md +++ b/2015/CVE-2015-3253.md @@ -29,6 +29,7 @@ The MethodClosure class in runtime/MethodClosure.java in Apache Groovy 1.7.0 thr - https://github.com/CodeIntelligenceTesting/java-demo - https://github.com/CodeIntelligenceTesting/java-demo-old - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet +- https://github.com/LibHunter/LibHunter - https://github.com/PalindromeLabs/Java-Deserialization-CVEs - https://github.com/TheGrinch/elastic - https://github.com/angelwhu/XStream_unserialization diff --git a/2015/CVE-2015-3636.md b/2015/CVE-2015-3636.md index a7342aa598..5e36db49d7 100644 --- a/2015/CVE-2015-3636.md +++ b/2015/CVE-2015-3636.md @@ -49,5 +49,6 @@ The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 doe - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/tangsilian/android-vuln - https://github.com/weeka10/-hktalent-TOP +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2015/CVE-2015-5256.md b/2015/CVE-2015-5256.md index 01863d3075..039d9778b4 100644 --- a/2015/CVE-2015-5256.md +++ b/2015/CVE-2015-5256.md @@ -15,4 +15,5 @@ Apache Cordova-Android before 4.1.0, when an application relies on a remote serv #### Github - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter diff --git a/2015/CVE-2015-5262.md b/2015/CVE-2015-5262.md index 3a529b358f..ef7e9de0cf 100644 --- a/2015/CVE-2015-5262.md +++ b/2015/CVE-2015-5262.md @@ -17,6 +17,7 @@ http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents HttpClien - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/albfernandez/commons-httpclient-3 - https://github.com/argon-gh-demo/clojure-sample - https://github.com/dotanuki-labs/android-oss-cves-research diff --git a/2015/CVE-2015-6644.md b/2015/CVE-2015-6644.md index 80b7071b1b..8d88e05278 100644 --- a/2015/CVE-2015-6644.md +++ b/2015/CVE-2015-6644.md @@ -17,6 +17,7 @@ No PoCs from references. - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter - https://github.com/IkerSaint/VULNAPP-vulnerable-app +- https://github.com/LibHunter/LibHunter - https://github.com/brianhigh/us-cert-bulletins - https://github.com/pctF/vulnerable-app diff --git a/2015/CVE-2015-6748.md b/2015/CVE-2015-6748.md index 9dcab375f5..ee08bb745b 100644 --- a/2015/CVE-2015-6748.md +++ b/2015/CVE-2015-6748.md @@ -16,5 +16,6 @@ Cross-site scripting (XSS) vulnerability in jsoup before 1.8.3. - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/epicosy/VUL4J-59 diff --git a/2015/CVE-2015-6925.md b/2015/CVE-2015-6925.md index af378dc3e6..8b79788f50 100644 --- a/2015/CVE-2015-6925.md +++ b/2015/CVE-2015-6925.md @@ -14,6 +14,7 @@ wolfSSL (formerly CyaSSL) before 3.6.8 allows remote attackers to cause a denial #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/IAIK/wolfSSL-DoS - https://github.com/MrE-Fog/wolfSSL-DoS - https://github.com/MrE-Fog/wolfSSL-DoS3 diff --git a/2015/CVE-2015-8320.md b/2015/CVE-2015-8320.md index 0b58a08a08..be3a116571 100644 --- a/2015/CVE-2015-8320.md +++ b/2015/CVE-2015-8320.md @@ -15,4 +15,5 @@ Apache Cordova-Android before 3.7.0 improperly generates random values for Bridg #### Github - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter diff --git a/2015/CVE-2015-8399.md b/2015/CVE-2015-8399.md index 60f663b635..b97a0240aa 100644 --- a/2015/CVE-2015-8399.md +++ b/2015/CVE-2015-8399.md @@ -20,5 +20,6 @@ Atlassian Confluence before 5.8.17 allows remote authenticated users to read con - https://github.com/Elsfa7-110/kenzer-templates - https://github.com/HimmelAward/Goby_POC - https://github.com/Z0fhack/Goby_POC +- https://github.com/enomothem/PenTestNote - https://github.com/jweny/pocassistdb diff --git a/2015/CVE-2015-8550.md b/2015/CVE-2015-8550.md index c62292059e..84c1fae437 100644 --- a/2015/CVE-2015-8550.md +++ b/2015/CVE-2015-8550.md @@ -14,6 +14,7 @@ Xen, when used on a system providing PV backends, allows local guest OS administ #### Github - https://github.com/Al1ex/LinuxEelvation +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/bsauce/kernel-exploit-factory - https://github.com/jfbastien/no-sane-compiler diff --git a/2015/CVE-2015-8660.md b/2015/CVE-2015-8660.md index 73f6d07f09..ad62a57abb 100644 --- a/2015/CVE-2015-8660.md +++ b/2015/CVE-2015-8660.md @@ -19,6 +19,7 @@ The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3 #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Live-Hack-CVE/CVE-2015-8660 - https://github.com/chorankates/Irked diff --git a/2016/CVE-2016-0701.md b/2016/CVE-2016-0701.md index ba759d5017..0885c8d338 100644 --- a/2016/CVE-2016-0701.md +++ b/2016/CVE-2016-0701.md @@ -25,6 +25,7 @@ The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1. - https://github.com/RClueX/Hackerone-Reports - https://github.com/chnzzh/OpenSSL-CVE-lib - https://github.com/erwinchang/utility-library +- https://github.com/forget-eve/NSP - https://github.com/imhunterand/hackerone-publicy-disclosed - https://github.com/luanjampa/cve-2016-0701 diff --git a/2016/CVE-2016-0728.md b/2016/CVE-2016-0728.md index 75f37effe7..763ae5cdd1 100644 --- a/2016/CVE-2016-0728.md +++ b/2016/CVE-2016-0728.md @@ -25,6 +25,7 @@ The join_session_keyring function in security/keys/process_keys.c in the Linux k - https://github.com/De30/zabbix_community-templates - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Michael-Git-Web/templateszbx - https://github.com/Micr067/linux-kernel-exploits @@ -95,6 +96,7 @@ The join_session_keyring function in security/keys/process_keys.c in the Linux k - https://github.com/th30d00r/Linux-Vulnerability-CVE-2016-0728-and-Exploit - https://github.com/tndud042713/cve - https://github.com/whiteHat001/Kernel-Security +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xbl3/awesome-cve-poc_qazbnm456 - https://github.com/xfinest/linux-kernel-exploits diff --git a/2016/CVE-2016-0819.md b/2016/CVE-2016-0819.md index 840ddea35b..2cc6978b26 100644 --- a/2016/CVE-2016-0819.md +++ b/2016/CVE-2016-0819.md @@ -27,5 +27,6 @@ No PoCs from references. - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2016/CVE-2016-0820.md b/2016/CVE-2016-0820.md index ac0475b273..8436b1a820 100644 --- a/2016/CVE-2016-0820.md +++ b/2016/CVE-2016-0820.md @@ -27,5 +27,6 @@ No PoCs from references. - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2016/CVE-2016-1000339.md b/2016/CVE-2016-1000339.md index 8effbb012d..2f60bb2749 100644 --- a/2016/CVE-2016-1000339.md +++ b/2016/CVE-2016-1000339.md @@ -17,6 +17,7 @@ In the Bouncy Castle JCE Provider version 1.55 and earlier the primary engine cl - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter - https://github.com/IkerSaint/VULNAPP-vulnerable-app +- https://github.com/LibHunter/LibHunter - https://github.com/pctF/vulnerable-app - https://github.com/wolpert/crypto diff --git a/2016/CVE-2016-1000341.md b/2016/CVE-2016-1000341.md index 5760804bb3..e618c8203d 100644 --- a/2016/CVE-2016-1000341.md +++ b/2016/CVE-2016-1000341.md @@ -17,5 +17,6 @@ In the Bouncy Castle JCE Provider version 1.55 and earlier DSA signature generat - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter - https://github.com/IkerSaint/VULNAPP-vulnerable-app +- https://github.com/LibHunter/LibHunter - https://github.com/pctF/vulnerable-app diff --git a/2016/CVE-2016-1000342.md b/2016/CVE-2016-1000342.md index 2a8ee86954..1bbf0c7139 100644 --- a/2016/CVE-2016-1000342.md +++ b/2016/CVE-2016-1000342.md @@ -17,5 +17,6 @@ In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter - https://github.com/IkerSaint/VULNAPP-vulnerable-app +- https://github.com/LibHunter/LibHunter - https://github.com/pctF/vulnerable-app diff --git a/2016/CVE-2016-1000343.md b/2016/CVE-2016-1000343.md index 4bd44a5b8a..15132cf377 100644 --- a/2016/CVE-2016-1000343.md +++ b/2016/CVE-2016-1000343.md @@ -18,5 +18,6 @@ In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair gene - https://github.com/CGCL-codes/PHunter - https://github.com/CyberSource/cybersource-sdk-java - https://github.com/IkerSaint/VULNAPP-vulnerable-app +- https://github.com/LibHunter/LibHunter - https://github.com/pctF/vulnerable-app diff --git a/2016/CVE-2016-1000344.md b/2016/CVE-2016-1000344.md index 327838134d..fc483ae6bf 100644 --- a/2016/CVE-2016-1000344.md +++ b/2016/CVE-2016-1000344.md @@ -18,5 +18,6 @@ In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES implementat - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter - https://github.com/IkerSaint/VULNAPP-vulnerable-app +- https://github.com/LibHunter/LibHunter - https://github.com/pctF/vulnerable-app diff --git a/2016/CVE-2016-1000345.md b/2016/CVE-2016-1000345.md index 5a256786c1..34c967f096 100644 --- a/2016/CVE-2016-1000345.md +++ b/2016/CVE-2016-1000345.md @@ -17,5 +17,6 @@ In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC m - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter - https://github.com/IkerSaint/VULNAPP-vulnerable-app +- https://github.com/LibHunter/LibHunter - https://github.com/pctF/vulnerable-app diff --git a/2016/CVE-2016-1000346.md b/2016/CVE-2016-1000346.md index 2cea80f66c..4f85881df9 100644 --- a/2016/CVE-2016-1000346.md +++ b/2016/CVE-2016-1000346.md @@ -17,5 +17,6 @@ In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH pu - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter - https://github.com/IkerSaint/VULNAPP-vulnerable-app +- https://github.com/LibHunter/LibHunter - https://github.com/pctF/vulnerable-app diff --git a/2016/CVE-2016-1000352.md b/2016/CVE-2016-1000352.md index f8840f9f4f..4c64d1301f 100644 --- a/2016/CVE-2016-1000352.md +++ b/2016/CVE-2016-1000352.md @@ -18,5 +18,6 @@ In the Bouncy Castle JCE Provider version 1.55 and earlier the ECIES implementat - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter - https://github.com/IkerSaint/VULNAPP-vulnerable-app +- https://github.com/LibHunter/LibHunter - https://github.com/pctF/vulnerable-app diff --git a/2016/CVE-2016-10027.md b/2016/CVE-2016-10027.md index 2b3244fc8c..6b0d045ed4 100644 --- a/2016/CVE-2016-10027.md +++ b/2016/CVE-2016-10027.md @@ -15,5 +15,6 @@ Race condition in the XMPP library in Smack before 4.1.9, when the SecurityMode. #### Github - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/tintinweb/striptls diff --git a/2016/CVE-2016-10033.md b/2016/CVE-2016-10033.md index f5fa3a4bb1..0bda1481c6 100644 --- a/2016/CVE-2016-10033.md +++ b/2016/CVE-2016-10033.md @@ -201,6 +201,7 @@ The mailSend function in the isMail transport in PHPMailer before 5.2.18 might a - https://github.com/sliani/PHPMailer-File-Attachments-FTP-to-Mail - https://github.com/superfish9/pt - https://github.com/supreethsk/rental +- https://github.com/sweta-web/Online-Registration-System - https://github.com/trganda/dockerv - https://github.com/tvirus-01/PHP_mail - https://github.com/vaartjesd/test diff --git a/2016/CVE-2016-10045.md b/2016/CVE-2016-10045.md index 4791c48db0..7d7ecd6677 100644 --- a/2016/CVE-2016-10045.md +++ b/2016/CVE-2016-10045.md @@ -144,6 +144,7 @@ The isMail transport in PHPMailer before 5.2.20 might allow remote attackers to - https://github.com/sccontroltotal/phpmailer - https://github.com/sliani/PHPMailer-File-Attachments-FTP-to-Mail - https://github.com/supreethsk/rental +- https://github.com/sweta-web/Online-Registration-System - https://github.com/tvirus-01/PHP_mail - https://github.com/vaartjesd/test - https://github.com/vatann07/BloodConnect diff --git a/2016/CVE-2016-10134.md b/2016/CVE-2016-10134.md index 8934286885..15b3f1a14d 100644 --- a/2016/CVE-2016-10134.md +++ b/2016/CVE-2016-10134.md @@ -21,6 +21,7 @@ SQL injection vulnerability in Zabbix before 2.2.14 and 3.0 before 3.0.4 allows - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/Awrrays/FrameVul +- https://github.com/CLincat/vulcat - https://github.com/HimmelAward/Goby_POC - https://github.com/SexyBeast233/SecBooks - https://github.com/TesterCC/exp_poc_library diff --git a/2016/CVE-2016-10277.md b/2016/CVE-2016-10277.md index 28ab4a49fd..df4e68623d 100644 --- a/2016/CVE-2016-10277.md +++ b/2016/CVE-2016-10277.md @@ -32,6 +32,7 @@ An elevation of privilege vulnerability in the Motorola bootloader could enable - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xbl3/awesome-cve-poc_qazbnm456 diff --git a/2016/CVE-2016-10728.md b/2016/CVE-2016-10728.md index f157598d98..0506c79466 100644 --- a/2016/CVE-2016-10728.md +++ b/2016/CVE-2016-10728.md @@ -13,4 +13,5 @@ An issue was discovered in Suricata before 3.1.2. If an ICMPv4 error packet is r - https://github.com/kirillwow/ids_bypass #### Github +- https://github.com/kirillwow/ids_bypass diff --git a/2016/CVE-2016-1247.md b/2016/CVE-2016-1247.md index 3fb266ba64..39ec32810d 100644 --- a/2016/CVE-2016-1247.md +++ b/2016/CVE-2016-1247.md @@ -27,6 +27,7 @@ The nginx package before 1.6.2-5+deb8u3 on Debian jessie, the nginx packages bef - https://github.com/hungslab/awd-tools - https://github.com/lukeber4/usn-search - https://github.com/notnue/Linux-Privilege-Escalation +- https://github.com/redcountryroad/OSCP-shortsheet - https://github.com/superfish9/pt - https://github.com/txuswashere/Pentesting-Linux - https://github.com/woods-sega/woodswiki diff --git a/2016/CVE-2016-1583.md b/2016/CVE-2016-1583.md index 06613b7447..4047807cfe 100644 --- a/2016/CVE-2016-1583.md +++ b/2016/CVE-2016-1583.md @@ -32,5 +32,6 @@ The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kern - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2016/CVE-2016-2004.md b/2016/CVE-2016-2004.md index 3856cbe83b..489cb14ac5 100644 --- a/2016/CVE-2016-2004.md +++ b/2016/CVE-2016-2004.md @@ -20,4 +20,6 @@ HPE Data Protector before 7.03_108, 8.x before 8.15, and 9.x before 9.06 allow r #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates +- https://github.com/CVEDB/awesome-cve-repo +- https://github.com/marcocarolasec/CVE-2016-2004-Exploit diff --git a/2016/CVE-2016-2059.md b/2016/CVE-2016-2059.md index 1e53246635..3aae104e91 100644 --- a/2016/CVE-2016-2059.md +++ b/2016/CVE-2016-2059.md @@ -24,5 +24,6 @@ No PoCs from references. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2016/CVE-2016-2175.md b/2016/CVE-2016-2175.md index 1dd2f03cdb..c01762375c 100644 --- a/2016/CVE-2016-2175.md +++ b/2016/CVE-2016-2175.md @@ -17,4 +17,5 @@ Apache PDFBox before 1.8.12 and 2.x before 2.0.1 does not properly initialize th - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter diff --git a/2016/CVE-2016-2183.md b/2016/CVE-2016-2183.md index 97b04ef86b..e6b1c1de83 100644 --- a/2016/CVE-2016-2183.md +++ b/2016/CVE-2016-2183.md @@ -51,6 +51,7 @@ The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and - https://github.com/aous-al-salek/crypto - https://github.com/biswajitde/dsm_ips - https://github.com/bysart/devops-netology +- https://github.com/catsploit/catsploit - https://github.com/dmitrii1312/03-sysadmin-09 - https://github.com/gabrieljcs/ips-assessment-reports - https://github.com/geon071/netolofy_12 diff --git a/2016/CVE-2016-2334.md b/2016/CVE-2016-2334.md index 7ce0df8914..39366e29a8 100644 --- a/2016/CVE-2016-2334.md +++ b/2016/CVE-2016-2334.md @@ -13,6 +13,7 @@ Heap-based buffer overflow in the NArchive::NHfs::CHandler::ExtractZlibFile meth - http://blog.talosintelligence.com/2017/11/exploiting-cve-2016-2334.html #### Github +- https://github.com/ch1hyun/fuzzing-class - https://github.com/icewall/CVE-2016-2334 - https://github.com/integeruser/on-pwning - https://github.com/litneet64/containerized-bomb-disposal diff --git a/2016/CVE-2016-2384.md b/2016/CVE-2016-2384.md index 989c90f5ca..ff3a231f43 100644 --- a/2016/CVE-2016-2384.md +++ b/2016/CVE-2016-2384.md @@ -24,6 +24,7 @@ Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits - https://github.com/HackOvert/awesome-bugs +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits - https://github.com/QChiLan/linux-exp @@ -66,6 +67,7 @@ Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/spencerdodd/kernelpop - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/kernel-exploits - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xbl3/awesome-cve-poc_qazbnm456 diff --git a/2016/CVE-2016-2386.md b/2016/CVE-2016-2386.md index 56025225ac..492fead789 100644 --- a/2016/CVE-2016-2386.md +++ b/2016/CVE-2016-2386.md @@ -24,5 +24,6 @@ SQL injection vulnerability in the UDDI server in SAP NetWeaver J2EE Engine 7.40 - https://github.com/lnick2023/nicenice - https://github.com/murataydemir/CVE-2016-2386 - https://github.com/qazbnm456/awesome-cve-poc +- https://github.com/vah13/SAP_exploit - https://github.com/xbl3/awesome-cve-poc_qazbnm456 diff --git a/2016/CVE-2016-2411.md b/2016/CVE-2016-2411.md index 268c53b261..56ca2c7925 100644 --- a/2016/CVE-2016-2411.md +++ b/2016/CVE-2016-2411.md @@ -28,5 +28,6 @@ No PoCs from references. - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2016/CVE-2016-2434.md b/2016/CVE-2016-2434.md index c36b6d2442..0255cd10f6 100644 --- a/2016/CVE-2016-2434.md +++ b/2016/CVE-2016-2434.md @@ -42,5 +42,6 @@ No PoCs from references. - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/tangsilian/android-vuln - https://github.com/weeka10/-hktalent-TOP +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2016/CVE-2016-2435.md b/2016/CVE-2016-2435.md index f9993abfde..639f7a7a2b 100644 --- a/2016/CVE-2016-2435.md +++ b/2016/CVE-2016-2435.md @@ -28,5 +28,6 @@ No PoCs from references. - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2016/CVE-2016-2475.md b/2016/CVE-2016-2475.md index ea67af0ccd..3f1a9e3621 100644 --- a/2016/CVE-2016-2475.md +++ b/2016/CVE-2016-2475.md @@ -27,5 +27,6 @@ No PoCs from references. - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2016/CVE-2016-2503.md b/2016/CVE-2016-2503.md index f5b3c6a71d..af34151228 100644 --- a/2016/CVE-2016-2503.md +++ b/2016/CVE-2016-2503.md @@ -24,5 +24,6 @@ No PoCs from references. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2016/CVE-2016-2781.md b/2016/CVE-2016-2781.md index 725c1ae681..08d9c60523 100644 --- a/2016/CVE-2016-2781.md +++ b/2016/CVE-2016-2781.md @@ -44,6 +44,7 @@ No PoCs from references. - https://github.com/hartwork/antijack - https://github.com/khulnasoft-lab/vulnlist - https://github.com/khulnasoft-labs/griffon +- https://github.com/m-pasima/CI-CD-Security-image-scan - https://github.com/metapull/attackfinder - https://github.com/nedenwalker/spring-boot-app-using-gradle - https://github.com/nedenwalker/spring-boot-app-with-log4j-vuln diff --git a/2016/CVE-2016-3720.md b/2016/CVE-2016-3720.md index 3a1d70cf41..fefd7b1d55 100644 --- a/2016/CVE-2016-3720.md +++ b/2016/CVE-2016-3720.md @@ -17,6 +17,7 @@ No PoCs from references. - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/argon-gh-demo/clojure-sample - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/gitrobtest/Java-Security diff --git a/2016/CVE-2016-3857.md b/2016/CVE-2016-3857.md index 25f2869948..950de59338 100644 --- a/2016/CVE-2016-3857.md +++ b/2016/CVE-2016-3857.md @@ -28,5 +28,6 @@ No PoCs from references. - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2016/CVE-2016-3873.md b/2016/CVE-2016-3873.md index 83bc7c9a61..9acac13c84 100644 --- a/2016/CVE-2016-3873.md +++ b/2016/CVE-2016-3873.md @@ -27,5 +27,6 @@ No PoCs from references. - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2016/CVE-2016-4557.md b/2016/CVE-2016-4557.md index 4a4dead1bc..a50a32cc58 100644 --- a/2016/CVE-2016-4557.md +++ b/2016/CVE-2016-4557.md @@ -14,6 +14,7 @@ The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux k #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/chreniuc/CTF - https://github.com/dylandreimerink/gobpfld diff --git a/2016/CVE-2016-4800.md b/2016/CVE-2016-4800.md index 912fa273df..b475e74f2a 100644 --- a/2016/CVE-2016-4800.md +++ b/2016/CVE-2016-4800.md @@ -16,5 +16,6 @@ The path normalization mechanism in PathResource class in Eclipse Jetty 9.3.x be - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/saidramirezh/Elvis-DAM diff --git a/2016/CVE-2016-4970.md b/2016/CVE-2016-4970.md index 5dee748480..4e049fe980 100644 --- a/2016/CVE-2016-4970.md +++ b/2016/CVE-2016-4970.md @@ -16,6 +16,7 @@ No PoCs from references. - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/chnzzh/OpenSSL-CVE-lib - https://github.com/eliasgranderubio/4depcheck diff --git a/2016/CVE-2016-4994.md b/2016/CVE-2016-4994.md new file mode 100644 index 0000000000..9961e81e8d --- /dev/null +++ b/2016/CVE-2016-4994.md @@ -0,0 +1,17 @@ +### [CVE-2016-4994](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4994) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Use-after-free vulnerability in the xcf_load_image function in app/xcf/xcf-load.c in GIMP allows remote attackers to cause a denial of service (program crash) or possibly execute arbitrary code via a crafted XCF file. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/ch1hyun/fuzzing-class + diff --git a/2016/CVE-2016-4997.md b/2016/CVE-2016-4997.md index 24476f62c0..3649b3fc9c 100644 --- a/2016/CVE-2016-4997.md +++ b/2016/CVE-2016-4997.md @@ -16,5 +16,6 @@ The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations - https://www.exploit-db.com/exploits/40489/ #### Github +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits diff --git a/2016/CVE-2016-5195.md b/2016/CVE-2016-5195.md index a5c3e530a8..b4b4b0aa1a 100644 --- a/2016/CVE-2016-5195.md +++ b/2016/CVE-2016-5195.md @@ -29,6 +29,7 @@ Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allo - https://www.exploit-db.com/exploits/40847/ #### Github +- https://github.com/0xMarcio/cve - https://github.com/0xS3rgI0/OSCP - https://github.com/0xStrygwyr/OSCP-Guide - https://github.com/0xZipp0/OSCP @@ -89,6 +90,7 @@ Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allo - https://github.com/GhostTroops/TOP - https://github.com/GiorgosXou/Our-Xiaomi-Redmi-5A-riva-debloating-list - https://github.com/Greetdawn/CVE-2022-0847-DirtyPipe +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/Hellnino18/ansible-dirty-cow - https://github.com/Hellnino18/ansible-dirty-cow-2 - https://github.com/Hetti/PoC-Exploitchain-GS-VBox-DirtyCow- @@ -404,6 +406,7 @@ Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allo - https://github.com/whackmanic/OSCP_Found - https://github.com/whitephone/farm-root - https://github.com/whu-enjoy/CVE-2016-5195 +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/www-glasswall-nl/UT-DirtyCow - https://github.com/x90hack/vulnerabilty_lab - https://github.com/xXxhagenxXx/OSCP_Cheat_sheet diff --git a/2016/CVE-2016-5340.md b/2016/CVE-2016-5340.md index a203ee1fdb..db399209f3 100644 --- a/2016/CVE-2016-5340.md +++ b/2016/CVE-2016-5340.md @@ -24,5 +24,6 @@ No PoCs from references. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2016/CVE-2016-5425.md b/2016/CVE-2016-5425.md index de0a114690..df67eedf92 100644 --- a/2016/CVE-2016-5425.md +++ b/2016/CVE-2016-5425.md @@ -19,4 +19,5 @@ The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/starnightcyber/vul-info-collect +- https://github.com/versio-io/product-lifecycle-security-api diff --git a/2016/CVE-2016-5696.md b/2016/CVE-2016-5696.md index f02ff38e28..acc880935a 100644 --- a/2016/CVE-2016-5696.md +++ b/2016/CVE-2016-5696.md @@ -19,6 +19,7 @@ net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top - https://github.com/GhostTroops/TOP +- https://github.com/Gnoxter/mountain_goat - https://github.com/Subbuleo23/Cyberphantom - https://github.com/ambynotcoder/C-libraries - https://github.com/bplinux/chackd diff --git a/2016/CVE-2016-6187.md b/2016/CVE-2016-6187.md index 8f69c8fe4c..6c1462a199 100644 --- a/2016/CVE-2016-6187.md +++ b/2016/CVE-2016-6187.md @@ -34,5 +34,6 @@ No PoCs from references. - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/vnik5287/cve-2016-6187-poc - https://github.com/whiteHat001/Kernel-Security +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2016/CVE-2016-6195.md b/2016/CVE-2016-6195.md index e47e12c82a..69b65c8bae 100644 --- a/2016/CVE-2016-6195.md +++ b/2016/CVE-2016-6195.md @@ -16,4 +16,5 @@ SQL injection vulnerability in forumrunner/includes/moderation.php in vBulletin #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/TooLaidBack/vbchecker +- https://github.com/drewlong/vbully diff --git a/2016/CVE-2016-6271.md b/2016/CVE-2016-6271.md index 264e2eb717..bc89a514bf 100644 --- a/2016/CVE-2016-6271.md +++ b/2016/CVE-2016-6271.md @@ -14,4 +14,5 @@ The Bzrtp library (aka libbzrtp) 1.0.x before 1.0.4 allows man-in-the-middle att #### Github - https://github.com/Parist0nH1ll/Vulnerabilities-Write-Ups +- https://github.com/gteissier/CVE-2016-6271 diff --git a/2016/CVE-2016-6325.md b/2016/CVE-2016-6325.md index b818bac4bb..c755eb26e7 100644 --- a/2016/CVE-2016-6325.md +++ b/2016/CVE-2016-6325.md @@ -14,4 +14,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/versio-io/product-lifecycle-security-api diff --git a/2016/CVE-2016-6329.md b/2016/CVE-2016-6329.md index 903d0d175a..87b2485e5d 100644 --- a/2016/CVE-2016-6329.md +++ b/2016/CVE-2016-6329.md @@ -25,6 +25,7 @@ OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers - https://github.com/alexandrburyakov/Rep2 - https://github.com/alexgro1982/devops-netology - https://github.com/bysart/devops-netology +- https://github.com/catsploit/catsploit - https://github.com/dmitrii1312/03-sysadmin-09 - https://github.com/geon071/netolofy_12 - https://github.com/ilya-starchikov/devops-netology diff --git a/2016/CVE-2016-6787.md b/2016/CVE-2016-6787.md index b4eece4d26..e757393107 100644 --- a/2016/CVE-2016-6787.md +++ b/2016/CVE-2016-6787.md @@ -29,6 +29,7 @@ No PoCs from references. - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/whiteHat001/Kernel-Security +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xbl3/awesome-cve-poc_qazbnm456 diff --git a/2016/CVE-2016-6801.md b/2016/CVE-2016-6801.md index dd2bc07cfb..4d483ad7e4 100644 --- a/2016/CVE-2016-6801.md +++ b/2016/CVE-2016-6801.md @@ -15,5 +15,6 @@ No PoCs from references. #### Github - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/TSNGL21/CVE-2016-6801 diff --git a/2016/CVE-2016-6814.md b/2016/CVE-2016-6814.md index a4bde3647c..49dac33105 100644 --- a/2016/CVE-2016-6814.md +++ b/2016/CVE-2016-6814.md @@ -21,6 +21,7 @@ When an application with unsupported Codehaus versions of Groovy from 1.7.0 to 2 - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/OWASP/www-project-ide-vulscanner - https://github.com/PalindromeLabs/Java-Deserialization-CVEs - https://github.com/ilmari666/cybsec diff --git a/2016/CVE-2016-7117.md b/2016/CVE-2016-7117.md index 214483cf4e..22b626e558 100644 --- a/2016/CVE-2016-7117.md +++ b/2016/CVE-2016-7117.md @@ -27,5 +27,6 @@ No PoCs from references. - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2016/CVE-2016-7200.md b/2016/CVE-2016-7200.md index 5e370cef50..a865284243 100644 --- a/2016/CVE-2016-7200.md +++ b/2016/CVE-2016-7200.md @@ -33,6 +33,7 @@ The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers - https://github.com/lnick2023/nicenice - https://github.com/nyerkym/sectools - https://github.com/qazbnm456/awesome-cve-poc +- https://github.com/theori-io/chakra-2016-11 - https://github.com/trhacknon/chakra-2016-11 - https://github.com/tunz/js-vuln-db - https://github.com/weeka10/-hktalent-TOP diff --git a/2016/CVE-2016-7201.md b/2016/CVE-2016-7201.md index 601297f91d..8dbf9730a5 100644 --- a/2016/CVE-2016-7201.md +++ b/2016/CVE-2016-7201.md @@ -32,6 +32,7 @@ The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers - https://github.com/lnick2023/nicenice - https://github.com/nyerkym/sectools - https://github.com/qazbnm456/awesome-cve-poc +- https://github.com/theori-io/chakra-2016-11 - https://github.com/trhacknon/chakra-2016-11 - https://github.com/tunz/js-vuln-db - https://github.com/weeka10/-hktalent-TOP diff --git a/2016/CVE-2016-8453.md b/2016/CVE-2016-8453.md index c5af9a648a..379f4812cf 100644 --- a/2016/CVE-2016-8453.md +++ b/2016/CVE-2016-8453.md @@ -27,5 +27,6 @@ No PoCs from references. - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2016/CVE-2016-8462.md b/2016/CVE-2016-8462.md index 72376c975a..a0e0673556 100644 --- a/2016/CVE-2016-8462.md +++ b/2016/CVE-2016-8462.md @@ -14,4 +14,5 @@ An information disclosure vulnerability in the bootloader could enable a local a - https://securityresear.ch/2017/01/04/fastboot-oem-sha1sum/ #### Github +- https://github.com/CunningLogic/PixelDump_CVE-2016-8462 diff --git a/2016/CVE-2016-8633.md b/2016/CVE-2016-8633.md index 921aeea25b..175b6a900b 100644 --- a/2016/CVE-2016-8633.md +++ b/2016/CVE-2016-8633.md @@ -27,5 +27,6 @@ No PoCs from references. - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2016/CVE-2016-8655.md b/2016/CVE-2016-8655.md index 1f5142e430..757c4c92a2 100644 --- a/2016/CVE-2016-8655.md +++ b/2016/CVE-2016-8655.md @@ -20,6 +20,7 @@ Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allo - https://github.com/ARPSyndicate/cvemon - https://github.com/AabyssZG/AWD-Guide - https://github.com/Aneesh-Satla/Linux-Kernel-Exploitation-Suggester +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/KosukeShimofuji/CVE-2016-8655 - https://github.com/LakshmiDesai/CVE-2016-8655 @@ -67,6 +68,7 @@ Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allo - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/stefanocutelle/linux-exploit-suggester +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xyongcn/exploit diff --git a/2016/CVE-2016-9192.md b/2016/CVE-2016-9192.md index 4bd17cda13..de120df9bb 100644 --- a/2016/CVE-2016-9192.md +++ b/2016/CVE-2016-9192.md @@ -14,4 +14,5 @@ A vulnerability in Cisco AnyConnect Secure Mobility Client for Windows could all - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-anyconnect1 #### Github +- https://github.com/serializingme/cve-2016-9192 diff --git a/2016/CVE-2016-9296.md b/2016/CVE-2016-9296.md index dff946fda4..b04e07988c 100644 --- a/2016/CVE-2016-9296.md +++ b/2016/CVE-2016-9296.md @@ -15,4 +15,5 @@ A null pointer dereference bug affects the 16.02 and many old versions of p7zip. #### Github - https://github.com/andir/nixos-issue-db-example +- https://github.com/yangke/7zip-null-pointer-dereference diff --git a/2016/CVE-2016-9297.md b/2016/CVE-2016-9297.md index 93d531f5f5..5118186174 100644 --- a/2016/CVE-2016-9297.md +++ b/2016/CVE-2016-9297.md @@ -14,6 +14,7 @@ The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to caus #### Github - https://github.com/RClueX/Hackerone-Reports +- https://github.com/ch1hyun/fuzzing-class - https://github.com/geeknik/cve-fuzzing-poc - https://github.com/imhunterand/hackerone-publicy-disclosed diff --git a/2016/CVE-2016-9793.md b/2016/CVE-2016-9793.md index 36d1e867b2..4b23acc387 100644 --- a/2016/CVE-2016-9793.md +++ b/2016/CVE-2016-9793.md @@ -20,6 +20,7 @@ The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.1 - https://github.com/CKmaenn/kernel-exploits - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits - https://github.com/QChiLan/linux-exp diff --git a/2016/CVE-2016-9949.md b/2016/CVE-2016-9949.md index 289705bfe9..9e038147a1 100644 --- a/2016/CVE-2016-9949.md +++ b/2016/CVE-2016-9949.md @@ -15,4 +15,5 @@ An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads t - https://www.exploit-db.com/exploits/40937/ #### Github +- https://github.com/DonnchaC/ubuntu-apport-exploitation diff --git a/2016/CVE-2016-9950.md b/2016/CVE-2016-9950.md index 35e39fa6e9..de325e7397 100644 --- a/2016/CVE-2016-9950.md +++ b/2016/CVE-2016-9950.md @@ -15,4 +15,5 @@ An issue was discovered in Apport before 2.20.4. There is a path traversal issue - https://www.exploit-db.com/exploits/40937/ #### Github +- https://github.com/DonnchaC/ubuntu-apport-exploitation diff --git a/2016/CVE-2016-9951.md b/2016/CVE-2016-9951.md index 6315944fb9..073619b347 100644 --- a/2016/CVE-2016-9951.md +++ b/2016/CVE-2016-9951.md @@ -16,4 +16,5 @@ An issue was discovered in Apport before 2.20.4. A malicious Apport crash file c #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/DonnchaC/ubuntu-apport-exploitation diff --git a/2017/CVE-2017-0038.md b/2017/CVE-2017-0038.md index 0b427d1f99..68f798250a 100644 --- a/2017/CVE-2017-0038.md +++ b/2017/CVE-2017-0038.md @@ -21,6 +21,7 @@ gdi32.dll in Graphics Device Interface (GDI) in Microsoft Windows Vista SP2, Win - https://github.com/ExpLife0011/awesome-windows-kernel-security-development - https://github.com/Ondrik8/exploit - https://github.com/howknows/awesome-windows-security-development +- https://github.com/k0keoyo/CVE-2017-0038-EXP-C-JS - https://github.com/liuhe3647/Windows - https://github.com/pr0code/https-github.com-ExpLife0011-awesome-windows-kernel-security-development - https://github.com/pravinsrc/NOTES-windows-kernel-links diff --git a/2017/CVE-2017-0146.md b/2017/CVE-2017-0146.md index 188abf50e0..67aafd1a66 100644 --- a/2017/CVE-2017-0146.md +++ b/2017/CVE-2017-0146.md @@ -45,6 +45,7 @@ The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 - https://github.com/cb4cb4/EternalBlue-EK-Manual-Mode - https://github.com/ceskillets/DCV-Predefined-Log-Filter-of-Specific-CVE-of-EternalBlue-and-BlueKeep-with-Auto-Tag- - https://github.com/chaao195/EBEKv2.0 +- https://github.com/enomothem/PenTestNote - https://github.com/ericjiang97/SecScripts - https://github.com/geeksniper/active-directory-pentest - https://github.com/ginapalomo/ScanAll diff --git a/2017/CVE-2017-0403.md b/2017/CVE-2017-0403.md index a85a125125..75837d94e8 100644 --- a/2017/CVE-2017-0403.md +++ b/2017/CVE-2017-0403.md @@ -26,5 +26,6 @@ No PoCs from references. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2017/CVE-2017-0437.md b/2017/CVE-2017-0437.md index 3f725d4569..039cb861a5 100644 --- a/2017/CVE-2017-0437.md +++ b/2017/CVE-2017-0437.md @@ -25,5 +25,6 @@ No PoCs from references. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2017/CVE-2017-0478.md b/2017/CVE-2017-0478.md index 9e82bc62f1..f7f5830acd 100644 --- a/2017/CVE-2017-0478.md +++ b/2017/CVE-2017-0478.md @@ -13,6 +13,7 @@ A remote code execution vulnerability in the Framesequence library could enable - https://github.com/JiounDai/CVE-2017-0478 #### Github +- https://github.com/JiounDai/CVE-2017-0478 - https://github.com/bingghost/CVE-2017-0478 - https://github.com/likescam/CVE-2017-0478 - https://github.com/vnik5287/CVE-2017-16995 diff --git a/2017/CVE-2017-0541.md b/2017/CVE-2017-0541.md index 4b6ef3b12a..0875cadaff 100644 --- a/2017/CVE-2017-0541.md +++ b/2017/CVE-2017-0541.md @@ -15,6 +15,7 @@ A remote code execution vulnerability in sonivox in Mediaserver could enable an #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/C0dak/CVE-2017-0541 +- https://github.com/JiounDai/CVE-2017-0541 - https://github.com/likescam/CVE-2017-0541 - https://github.com/lnick2023/nicenice - https://github.com/qazbnm456/awesome-cve-poc diff --git a/2017/CVE-2017-0569.md b/2017/CVE-2017-0569.md index b667d0c229..957b32ea37 100644 --- a/2017/CVE-2017-0569.md +++ b/2017/CVE-2017-0569.md @@ -24,5 +24,6 @@ An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enabl - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2017/CVE-2017-1000112.md b/2017/CVE-2017-1000112.md index 0202baee89..bd9562d168 100644 --- a/2017/CVE-2017-1000112.md +++ b/2017/CVE-2017-1000112.md @@ -100,6 +100,7 @@ Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. W - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/stefanocutelle/linux-exploit-suggester - https://github.com/teamssix/container-escape-check +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/kernel-exploits - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xbl3/awesome-cve-poc_qazbnm456 diff --git a/2017/CVE-2017-1000209.md b/2017/CVE-2017-1000209.md index 6dca4b5b4c..e125a83aa3 100644 --- a/2017/CVE-2017-1000209.md +++ b/2017/CVE-2017-1000209.md @@ -15,4 +15,5 @@ No PoCs from references. #### Github - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter diff --git a/2017/CVE-2017-1000251.md b/2017/CVE-2017-1000251.md index a9dd5736e6..70e99303dc 100644 --- a/2017/CVE-2017-1000251.md +++ b/2017/CVE-2017-1000251.md @@ -50,6 +50,7 @@ The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux ke - https://github.com/sgxgsx/BlueToolkit - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/tlatkdgus1/blueborne-CVE-2017-1000251 +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xbl3/awesome-cve-poc_qazbnm456 diff --git a/2017/CVE-2017-1000253.md b/2017/CVE-2017-1000253.md index 3ee0857a39..8e21e1e66f 100644 --- a/2017/CVE-2017-1000253.md +++ b/2017/CVE-2017-1000253.md @@ -14,6 +14,7 @@ Linux distributions that have not patched their long-term kernels with https://g #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/RicterZ/PIE-Stack-Clash-CVE-2017-1000253 - https://github.com/kaosagnt/ansible-everyday diff --git a/2017/CVE-2017-1000363.md b/2017/CVE-2017-1000363.md index 3c1716a5fc..62378552d4 100644 --- a/2017/CVE-2017-1000363.md +++ b/2017/CVE-2017-1000363.md @@ -26,5 +26,6 @@ No PoCs from references. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2017/CVE-2017-1000380.md b/2017/CVE-2017-1000380.md index c52392c3ed..6bca32790b 100644 --- a/2017/CVE-2017-1000380.md +++ b/2017/CVE-2017-1000380.md @@ -27,5 +27,6 @@ sound/core/timer.c in the Linux kernel before 4.11.5 is vulnerable to a data rac - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2017/CVE-2017-1000498.md b/2017/CVE-2017-1000498.md index 21316c5c50..9a8d9e5231 100644 --- a/2017/CVE-2017-1000498.md +++ b/2017/CVE-2017-1000498.md @@ -15,4 +15,5 @@ No PoCs from references. #### Github - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter diff --git a/2017/CVE-2017-10661.md b/2017/CVE-2017-10661.md index 7c2db4a82e..f8a5b7a936 100644 --- a/2017/CVE-2017-10661.md +++ b/2017/CVE-2017-10661.md @@ -29,6 +29,7 @@ Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local u - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/tangsilian/android-vuln +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xbl3/awesome-cve-poc_qazbnm456 diff --git a/2017/CVE-2017-11176.md b/2017/CVE-2017-11176.md index d076991f94..5f494ed155 100644 --- a/2017/CVE-2017-11176.md +++ b/2017/CVE-2017-11176.md @@ -20,6 +20,7 @@ The mq_notify function in the Linux kernel through 4.11.9 does not set the sock - https://github.com/DoubleMice/cve-2017-11176 - https://github.com/Flerov/WindowsExploitDev - https://github.com/Gobinath-B/Exploit-Developement +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/HckEX/CVE-2017-11176 - https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits @@ -52,5 +53,6 @@ The mq_notify function in the Linux kernel through 4.11.9 does not set the sock - https://github.com/pjlantz/optee-qemu - https://github.com/prince-stark/Exploit-Developement - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2017/CVE-2017-11611.md b/2017/CVE-2017-11611.md index 5a5a80ebad..3689920fcd 100644 --- a/2017/CVE-2017-11611.md +++ b/2017/CVE-2017-11611.md @@ -13,4 +13,5 @@ Wolf CMS 0.8.3.1 allows Cross-Site Scripting (XSS) attacks. The vulnerability ex - https://github.com/faizzaidi/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc #### Github +- https://github.com/faizzaidi/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc diff --git a/2017/CVE-2017-11882.md b/2017/CVE-2017-11882.md index ec90e2ceec..f8323e0b34 100644 --- a/2017/CVE-2017-11882.md +++ b/2017/CVE-2017-11882.md @@ -22,6 +22,7 @@ Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Micr #### Github - https://github.com/00xtrace/Red-Team-Ops-Toolbox +- https://github.com/0x09AL/CVE-2017-11882-metasploit - https://github.com/0xT11/CVE-POC - https://github.com/0xdeadgeek/Red-Teaming-Toolkit - https://github.com/0xh4di/Red-Teaming-Toolkit @@ -117,6 +118,7 @@ Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Micr - https://github.com/edeca/rtfraptor - https://github.com/ekgg/Overflow-Demo-CVE-2017-11882 - https://github.com/emaan122/Note2 +- https://github.com/embedi/CVE-2017-11882 - https://github.com/emtee40/APT_CyberCriminal_Campagin_Collections - https://github.com/eric-erki/APT_CyberCriminal_Campagin_Collections - https://github.com/fengjixuchui/RedTeamer diff --git a/2017/CVE-2017-12615.md b/2017/CVE-2017-12615.md index bc20ac3eea..d569134811 100644 --- a/2017/CVE-2017-12615.md +++ b/2017/CVE-2017-12615.md @@ -56,6 +56,7 @@ When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e. - https://github.com/Zero094/Vulnerability-verification - https://github.com/amcai/myscan - https://github.com/bakery312/Vulhub-Reproduce +- https://github.com/breaktoprotect/CVE-2017-12615 - https://github.com/cved-sources/cve-2017-12615 - https://github.com/cyberharsh/Tomcat-CVE-2017-12615 - https://github.com/d4n-sec/d4n-sec.github.io diff --git a/2017/CVE-2017-13028.md b/2017/CVE-2017-13028.md index 34aa264781..c7c1bc85a9 100644 --- a/2017/CVE-2017-13028.md +++ b/2017/CVE-2017-13028.md @@ -13,5 +13,6 @@ The BOOTP parser in tcpdump before 4.9.2 has a buffer over-read in print-bootp.c No PoCs from references. #### Github +- https://github.com/ch1hyun/fuzzing-class - https://github.com/paras98/AFL_Fuzzing diff --git a/2017/CVE-2017-13089.md b/2017/CVE-2017-13089.md index 9836e1f015..1eae5f8fb9 100644 --- a/2017/CVE-2017-13089.md +++ b/2017/CVE-2017-13089.md @@ -18,6 +18,7 @@ The http.c:skip_short_body() function is called in some circumstances, such as w - https://github.com/lnick2023/nicenice - https://github.com/mzeyong/CVE-2017-13089 - https://github.com/qazbnm456/awesome-cve-poc +- https://github.com/r1b/CVE-2017-13089 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 - https://github.com/yfoelling/yair diff --git a/2017/CVE-2017-13098.md b/2017/CVE-2017-13098.md index 9cffbb69d2..cb43a50836 100644 --- a/2017/CVE-2017-13098.md +++ b/2017/CVE-2017-13098.md @@ -19,6 +19,7 @@ BouncyCastle TLS prior to version 1.0.3, when configured to use the JCE (Java Cr - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter - https://github.com/IkerSaint/VULNAPP-vulnerable-app +- https://github.com/LibHunter/LibHunter - https://github.com/dotanuki-labs/android-oss-cves-research - https://github.com/pctF/vulnerable-app diff --git a/2017/CVE-2017-13868.md b/2017/CVE-2017-13868.md index 3b9ed8a7f6..e70c248fe4 100644 --- a/2017/CVE-2017-13868.md +++ b/2017/CVE-2017-13868.md @@ -13,5 +13,6 @@ An issue was discovered in certain Apple products. iOS before 11.2 is affected. - https://github.com/bazad/ctl_ctloutput-leak #### Github +- https://github.com/bazad/ctl_ctloutput-leak - https://github.com/houjingyi233/macOS-iOS-system-security diff --git a/2017/CVE-2017-14105.md b/2017/CVE-2017-14105.md index 833484232f..1e394b5d08 100644 --- a/2017/CVE-2017-14105.md +++ b/2017/CVE-2017-14105.md @@ -13,5 +13,6 @@ HiveManager Classic through 8.1r1 allows arbitrary JSP code execution by modifyi - https://github.com/theguly/CVE-2017-14105 #### Github +- https://github.com/theguly/CVE-2017-14105 - https://github.com/theguly/exploits diff --git a/2017/CVE-2017-16524.md b/2017/CVE-2017-16524.md index 38a8501748..9b2d9e4be1 100644 --- a/2017/CVE-2017-16524.md +++ b/2017/CVE-2017-16524.md @@ -14,4 +14,5 @@ Web Viewer 1.0.0.193 on Samsung SRN-1670D devices suffers from an Unrestricted f - https://www.exploit-db.com/exploits/43138/ #### Github +- https://github.com/realistic-security/CVE-2017-16524 diff --git a/2017/CVE-2017-16778.md b/2017/CVE-2017-16778.md index 0f5f781857..c071ef7433 100644 --- a/2017/CVE-2017-16778.md +++ b/2017/CVE-2017-16778.md @@ -13,4 +13,5 @@ An access control weakness in the DTMF tone receiver of Fermax Outdoor Panel all - https://github.com/breaktoprotect/CVE-2017-16778-Intercom-DTMF-Injection #### Github +- https://github.com/breaktoprotect/CVE-2017-16778-Intercom-DTMF-Injection diff --git a/2017/CVE-2017-16939.md b/2017/CVE-2017-16939.md index 353f371a61..af6d0e468c 100644 --- a/2017/CVE-2017-16939.md +++ b/2017/CVE-2017-16939.md @@ -16,6 +16,7 @@ No PoCs from references. - https://github.com/ARPSyndicate/cvemon - https://github.com/Al1ex/LinuxEelvation - https://github.com/De4dCr0w/Linux-kernel-EoP-exp +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits - https://github.com/QChiLan/linux-exp diff --git a/2017/CVE-2017-16995.md b/2017/CVE-2017-16995.md index 04f8454d0f..b124792526 100644 --- a/2017/CVE-2017-16995.md +++ b/2017/CVE-2017-16995.md @@ -28,6 +28,7 @@ The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Dk0n9/linux_exploit - https://github.com/Getshell/LinuxTQ +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JMontRod/Pruebecita - https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits @@ -121,6 +122,7 @@ The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4 - https://github.com/thelostvoice/inept-us-military - https://github.com/tninh27/Lab - https://github.com/vnik5287/CVE-2017-16995 +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xbl3/awesome-cve-poc_qazbnm456 - https://github.com/xfinest/linux-kernel-exploits diff --git a/2017/CVE-2017-17485.md b/2017/CVE-2017-17485.md index 46720d4680..9c082d3d4a 100644 --- a/2017/CVE-2017-17485.md +++ b/2017/CVE-2017-17485.md @@ -25,6 +25,7 @@ FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthe - https://github.com/Drun1baby/JavaSecurityLearning - https://github.com/GhostTroops/myhktools - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet +- https://github.com/LibHunter/LibHunter - https://github.com/OWASP/www-project-ide-vulscanner - https://github.com/PalindromeLabs/Java-Deserialization-CVEs - https://github.com/Pear1y/Vuln-Env diff --git a/2017/CVE-2017-18344.md b/2017/CVE-2017-18344.md index f3a99211ca..6fc3f63236 100644 --- a/2017/CVE-2017-18344.md +++ b/2017/CVE-2017-18344.md @@ -31,6 +31,7 @@ The timer_create syscall implementation in kernel/time/posix-timers.c in the Lin - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/kernel-exploits - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xbl3/awesome-cve-poc_qazbnm456 diff --git a/2017/CVE-2017-2636.md b/2017/CVE-2017-2636.md index 818a5698af..55f98835e1 100644 --- a/2017/CVE-2017-2636.md +++ b/2017/CVE-2017-2636.md @@ -35,6 +35,7 @@ Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows - https://github.com/snorez/blog - https://github.com/snorez/exploits - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xbl3/awesome-cve-poc_qazbnm456 - https://github.com/xyongcn/exploit diff --git a/2017/CVE-2017-3506.md b/2017/CVE-2017-3506.md index 51b03cd8d9..2e814226ac 100644 --- a/2017/CVE-2017-3506.md +++ b/2017/CVE-2017-3506.md @@ -38,6 +38,7 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar - https://github.com/MacAsure/WL_Scan_GO - https://github.com/Maskhe/javasec - https://github.com/Micr067/CMS-Hunter +- https://github.com/Ostorlab/KEV - https://github.com/PalindromeLabs/Java-Deserialization-CVEs - https://github.com/ParrotSec-CN/ParrotSecCN_Community_QQbot - https://github.com/SecWiki/CMS-Hunter diff --git a/2017/CVE-2017-5005.md b/2017/CVE-2017-5005.md index cbe78e41af..7fd561c0a5 100644 --- a/2017/CVE-2017-5005.md +++ b/2017/CVE-2017-5005.md @@ -14,4 +14,5 @@ Stack-based buffer overflow in Quick Heal Internet Security 10.1.0.316 and earli #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/payatu/QuickHeal diff --git a/2017/CVE-2017-5123.md b/2017/CVE-2017-5123.md index b1aef4673a..73418bdb86 100644 --- a/2017/CVE-2017-5123.md +++ b/2017/CVE-2017-5123.md @@ -20,6 +20,7 @@ Insufficient data validation in waitid allowed an user to escape sandboxes on Li - https://github.com/Al1ex/LinuxEelvation - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/FloatingGuy/CVE-2017-5123 +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Metarget/awesome-cloud-native-security - https://github.com/Micr067/linux-kernel-exploits @@ -88,6 +89,7 @@ Insufficient data validation in waitid allowed an user to escape sandboxes on Li - https://github.com/teawater/CVE-2017-5123 - https://github.com/txuswashere/Privilege-Escalation - https://github.com/whiteHat001/Kernel-Security +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xbl3/awesome-cve-poc_qazbnm456 - https://github.com/xfinest/linux-kernel-exploits diff --git a/2017/CVE-2017-5124.md b/2017/CVE-2017-5124.md index 88eb6143c0..73e4477bf4 100644 --- a/2017/CVE-2017-5124.md +++ b/2017/CVE-2017-5124.md @@ -16,6 +16,7 @@ Incorrect application of sandboxing in Blink in Google Chrome prior to 62.0.3202 #### Github - https://github.com/0xR0/uxss-db - https://github.com/ARPSyndicate/cvemon +- https://github.com/Bo0oM/CVE-2017-5124 - https://github.com/Metnew/uxss-db - https://github.com/grandDancer/CVE-2017-5124-RCE-0-Day - https://github.com/lnick2023/nicenice diff --git a/2017/CVE-2017-5223.md b/2017/CVE-2017-5223.md index 6cc758ff99..b8532ccc95 100644 --- a/2017/CVE-2017-5223.md +++ b/2017/CVE-2017-5223.md @@ -132,6 +132,7 @@ An issue was discovered in PHPMailer before 5.2.22. PHPMailer's msgHTML method a - https://github.com/sccontroltotal/phpmailer - https://github.com/sliani/PHPMailer-File-Attachments-FTP-to-Mail - https://github.com/supreethsk/rental +- https://github.com/sweta-web/Online-Registration-System - https://github.com/tvirus-01/PHP_mail - https://github.com/vaartjesd/test - https://github.com/vatann07/BloodConnect diff --git a/2017/CVE-2017-5645.md b/2017/CVE-2017-5645.md index 9f42ceddec..d009da319e 100644 --- a/2017/CVE-2017-5645.md +++ b/2017/CVE-2017-5645.md @@ -37,6 +37,7 @@ In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket - https://github.com/HackJava/HackLog4j2 - https://github.com/HackJava/Log4j2 - https://github.com/HynekPetrak/log4shell-finder +- https://github.com/LibHunter/LibHunter - https://github.com/Marcelektro/Log4J-RCE-Implementation - https://github.com/PalindromeLabs/Java-Deserialization-CVEs - https://github.com/SexyBeast233/SecBooks diff --git a/2017/CVE-2017-5929.md b/2017/CVE-2017-5929.md index 0f76c3bddc..ab66187101 100644 --- a/2017/CVE-2017-5929.md +++ b/2017/CVE-2017-5929.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/PalindromeLabs/Java-Deserialization-CVEs - https://github.com/fergarrui/exploits - https://github.com/hinat0y/Dataset1 diff --git a/2017/CVE-2017-6074.md b/2017/CVE-2017-6074.md index b4f8f7ec26..ab4f43078a 100644 --- a/2017/CVE-2017-6074.md +++ b/2017/CVE-2017-6074.md @@ -28,6 +28,7 @@ The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel thro - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Dk0n9/linux_exploit - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Metarget/metarget - https://github.com/Micr067/linux-kernel-exploits @@ -85,6 +86,7 @@ The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel thro - https://github.com/spencerdodd/kernelpop - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/toanthang1842002/CVE-2017-6074 +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/kernel-exploits - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xbl3/awesome-cve-poc_qazbnm456 diff --git a/2017/CVE-2017-6206.md b/2017/CVE-2017-6206.md index b5e90902e9..6bce06f8eb 100644 --- a/2017/CVE-2017-6206.md +++ b/2017/CVE-2017-6206.md @@ -16,4 +16,5 @@ D-Link DGS-1510-28XMP, DGS-1510-28X, DGS-1510-52X, DGS-1510-52, DGS-1510-28P, DG #### Github - https://github.com/likescam/CVE-2017-0213 - https://github.com/rockl/cve-2017-7184-bak +- https://github.com/varangamin/CVE-2017-6206 diff --git a/2017/CVE-2017-6370.md b/2017/CVE-2017-6370.md index 53ae12f9db..71a019f759 100644 --- a/2017/CVE-2017-6370.md +++ b/2017/CVE-2017-6370.md @@ -13,4 +13,5 @@ TYPO3 7.6.15 sends an http request to an index.php?loginProvider URI in cases wi - https://github.com/faizzaidi/TYPO3-v7.6.15-Unencrypted-Login-Request #### Github +- https://github.com/faizzaidi/TYPO3-v7.6.15-Unencrypted-Login-Request diff --git a/2017/CVE-2017-6736.md b/2017/CVE-2017-6736.md index 33723eeeea..27655d612d 100644 --- a/2017/CVE-2017-6736.md +++ b/2017/CVE-2017-6736.md @@ -20,6 +20,7 @@ The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 throug - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/WinMin/Protocol-Vul +- https://github.com/artkond/cisco-snmp-rce - https://github.com/lnick2023/nicenice - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/xbl3/awesome-cve-poc_qazbnm456 diff --git a/2017/CVE-2017-6744.md b/2017/CVE-2017-6744.md index 3500a3bd93..def447d45d 100644 --- a/2017/CVE-2017-6744.md +++ b/2017/CVE-2017-6744.md @@ -7,11 +7,7 @@ ### Description -The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. - - The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload. Customers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. - - There are workarounds that address these vulnerabilities. +The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload. Customers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. There are workarounds that address these vulnerabilities. ### POC diff --git a/2017/CVE-2017-7184.md b/2017/CVE-2017-7184.md index 052f678edd..c6f1ef8544 100644 --- a/2017/CVE-2017-7184.md +++ b/2017/CVE-2017-7184.md @@ -35,6 +35,7 @@ The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel - https://github.com/snorez/blog - https://github.com/snorez/exploits - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xyongcn/exploit diff --git a/2017/CVE-2017-7188.md b/2017/CVE-2017-7188.md index 9fca77ea38..3b25f77fd3 100644 --- a/2017/CVE-2017-7188.md +++ b/2017/CVE-2017-7188.md @@ -13,4 +13,5 @@ Zurmo 3.1.1 Stable allows a Cross-Site Scripting (XSS) attack with a base64-enco - https://github.com/faizzaidi/Zurmo-Stable-3.1.1-XSS-By-Provensec-LLC #### Github +- https://github.com/faizzaidi/Zurmo-Stable-3.1.1-XSS-By-Provensec-LLC diff --git a/2017/CVE-2017-7308.md b/2017/CVE-2017-7308.md index 53df3c4dcb..c6de4c247b 100644 --- a/2017/CVE-2017-7308.md +++ b/2017/CVE-2017-7308.md @@ -21,6 +21,7 @@ The packet_set_ring function in net/packet/af_packet.c in the Linux kernel throu - https://github.com/CKmaenn/kernel-exploits - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Mecyu/googlecontainers - https://github.com/Metarget/metarget @@ -84,6 +85,7 @@ The packet_set_ring function in net/packet/af_packet.c in the Linux kernel throu - https://github.com/spencerdodd/kernelpop - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/vusec/blindside +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/kernel-exploits - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xbl3/awesome-cve-poc_qazbnm456 diff --git a/2017/CVE-2017-7616.md b/2017/CVE-2017-7616.md index d8c49ad70a..ab0fe53cba 100644 --- a/2017/CVE-2017-7616.md +++ b/2017/CVE-2017-7616.md @@ -27,5 +27,6 @@ No PoCs from references. - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/skbasava/Linux-Kernel-exploit - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2017/CVE-2017-7656.md b/2017/CVE-2017-7656.md index 572ec32dc7..e31720548b 100644 --- a/2017/CVE-2017-7656.md +++ b/2017/CVE-2017-7656.md @@ -19,4 +19,5 @@ In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4. - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter - https://github.com/DonnumS/inf226Inchat +- https://github.com/LibHunter/LibHunter diff --git a/2017/CVE-2017-7657.md b/2017/CVE-2017-7657.md index 8fedc1c41c..084f2d8596 100644 --- a/2017/CVE-2017-7657.md +++ b/2017/CVE-2017-7657.md @@ -19,5 +19,6 @@ In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4. - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter - https://github.com/DonnumS/inf226Inchat +- https://github.com/LibHunter/LibHunter - https://github.com/yahoo/cubed diff --git a/2017/CVE-2017-7957.md b/2017/CVE-2017-7957.md index 0ba61a6fd8..4ee96d5832 100644 --- a/2017/CVE-2017-7957.md +++ b/2017/CVE-2017-7957.md @@ -16,6 +16,7 @@ No PoCs from references. - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/Whoopsunix/PPPVULNS - https://github.com/dotanuki-labs/android-oss-cves-research - https://github.com/lmarso-asapp/kotlin-unsecure diff --git a/2017/CVE-2017-8382.md b/2017/CVE-2017-8382.md index b4e83f84a3..dbc6b5a5c9 100644 --- a/2017/CVE-2017-8382.md +++ b/2017/CVE-2017-8382.md @@ -16,4 +16,5 @@ admidio 3.2.8 has CSRF in adm_program/modules/members/members_function.php with - https://www.exploit-db.com/exploits/42005/ #### Github +- https://github.com/faizzaidi/Admidio-3.2.8-CSRF-POC-by-Provensec-llc diff --git a/2017/CVE-2017-8570.md b/2017/CVE-2017-8570.md index e7392e1081..27784943ff 100644 --- a/2017/CVE-2017-8570.md +++ b/2017/CVE-2017-8570.md @@ -95,6 +95,7 @@ Microsoft Office allows a remote code execution vulnerability due to the way tha - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/qiantu88/office-cve - https://github.com/r0r0x-xx/Red-Team-OPS-Modern-Adversary +- https://github.com/rxwx/CVE-2017-8570 - https://github.com/sasqwatch/CVE-2017-8570 - https://github.com/scriptsboy/Red-Teaming-Toolkit - https://github.com/shr3ddersec/Shr3dKit diff --git a/2017/CVE-2017-8625.md b/2017/CVE-2017-8625.md index 4796d20d72..9f5da92ae6 100644 --- a/2017/CVE-2017-8625.md +++ b/2017/CVE-2017-8625.md @@ -26,6 +26,7 @@ Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 - https://github.com/Digit4lBytes/RedTeam - https://github.com/DigitalQuinn/InfosecCompilation - https://github.com/Fa1c0n35/Awesome-Red-Teaming. +- https://github.com/GoVanguard/list-infosec-encyclopedia - https://github.com/H4CK3RT3CH/Awesome-Red-Teaming - https://github.com/Hemanthraju02/Red-team - https://github.com/HildeTeamTNT/Awesome-Red-Teaming diff --git a/2017/CVE-2017-8890.md b/2017/CVE-2017-8890.md index a215702387..d1d5a30599 100644 --- a/2017/CVE-2017-8890.md +++ b/2017/CVE-2017-8890.md @@ -16,6 +16,7 @@ No PoCs from references. - https://github.com/7043mcgeep/cve-2017-8890-msf - https://github.com/ARPSyndicate/cvemon - https://github.com/Al1ex/LinuxEelvation +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/beraphin/CVE-2017-8890 - https://github.com/bsauce/kernel-exploit-factory diff --git a/2017/CVE-2017-8917.md b/2017/CVE-2017-8917.md index 9213ddf530..89b7dbf29a 100644 --- a/2017/CVE-2017-8917.md +++ b/2017/CVE-2017-8917.md @@ -23,6 +23,7 @@ SQL injection vulnerability in Joomla! 3.7.x before 3.7.1 allows attackers to ex - https://github.com/Aukaii/notes - https://github.com/Awrrays/FrameVul - https://github.com/BaptisteContreras/CVE-2017-8917-Joomla +- https://github.com/CLincat/vulcat - https://github.com/Elsfa7-110/kenzer-templates - https://github.com/HattMobb/TryHackMe-Bugle-Machine-Writeup-Walkthrough - https://github.com/HimmelAward/Goby_POC diff --git a/2017/CVE-2017-9048.md b/2017/CVE-2017-9048.md index b3fcb3da18..66d5f636e5 100644 --- a/2017/CVE-2017-9048.md +++ b/2017/CVE-2017-9048.md @@ -14,4 +14,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/ch1hyun/fuzzing-class diff --git a/2017/CVE-2017-9096.md b/2017/CVE-2017-9096.md index 198af61fad..a4828f6f1f 100644 --- a/2017/CVE-2017-9096.md +++ b/2017/CVE-2017-9096.md @@ -17,6 +17,7 @@ The XML parsers in iText before 5.5.12 and 7.x before 7.0.3 do not disable exter - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/jakabakos/CVE-2017-9096 - https://github.com/jakabakos/CVE-2017-9096-iText-XXE diff --git a/2017/CVE-2017-9609.md b/2017/CVE-2017-9609.md index 01de24458d..cf8b64e3cb 100644 --- a/2017/CVE-2017-9609.md +++ b/2017/CVE-2017-9609.md @@ -15,4 +15,5 @@ Cross-site scripting (XSS) vulnerability in Blackcat CMS 1.2 allows remote authe - https://github.com/faizzaidi/Blackcat-cms-v1.2-xss-POC-by-Provensec-llc #### Github +- https://github.com/faizzaidi/Blackcat-cms-v1.2-xss-POC-by-Provensec-llc diff --git a/2017/CVE-2017-9735.md b/2017/CVE-2017-9735.md index 349226632a..4a7bed4aaf 100644 --- a/2017/CVE-2017-9735.md +++ b/2017/CVE-2017-9735.md @@ -18,5 +18,6 @@ Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/fredfeng/Themis-taint diff --git a/2017/CVE-2017-9798.md b/2017/CVE-2017-9798.md index 49236a0710..bbcfa237c7 100644 --- a/2017/CVE-2017-9798.md +++ b/2017/CVE-2017-9798.md @@ -42,6 +42,7 @@ Apache httpd allows remote attackers to read secret data from process memory if - https://github.com/cnnrshd/bbot-utils - https://github.com/firatesatoglu/shodanSearch - https://github.com/hackingyseguridad/apachebleed +- https://github.com/hannob/optionsbleed - https://github.com/imhunterand/hackerone-publicy-disclosed - https://github.com/kasem545/vulnsearch - https://github.com/l0n3rs/CVE-2017-9798 diff --git a/2018/CVE-2018-0114.md b/2018/CVE-2018-0114.md index 4e75cb6e56..e4eb0856d9 100644 --- a/2018/CVE-2018-0114.md +++ b/2018/CVE-2018-0114.md @@ -41,4 +41,5 @@ A vulnerability in the Cisco node-jose open source library before 0.11.0 could a - https://github.com/ticarpi/jwt_tool - https://github.com/xbl3/awesome-cve-poc_qazbnm456 - https://github.com/zhangziyang301/jwt_tool +- https://github.com/zi0Black/POC-CVE-2018-0114 diff --git a/2018/CVE-2018-0151.md b/2018/CVE-2018-0151.md index 160bd399cd..aa5efe3a78 100644 --- a/2018/CVE-2018-0151.md +++ b/2018/CVE-2018-0151.md @@ -17,4 +17,5 @@ No PoCs from references. - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/ferdinandmudjialim/metasploit-cve-search +- https://github.com/tunnelcat/metasploit-cve-search diff --git a/2018/CVE-2018-0171.md b/2018/CVE-2018-0171.md index f01a8d31d3..1417cfd5e5 100644 --- a/2018/CVE-2018-0171.md +++ b/2018/CVE-2018-0171.md @@ -25,5 +25,6 @@ A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/rikosintie/SmartInstall - https://github.com/tomoyamachi/gocarts +- https://github.com/tunnelcat/metasploit-cve-search - https://github.com/xbl3/awesome-cve-poc_qazbnm456 diff --git a/2018/CVE-2018-0304.md b/2018/CVE-2018-0304.md index d65948bd32..8fdc4e4721 100644 --- a/2018/CVE-2018-0304.md +++ b/2018/CVE-2018-0304.md @@ -15,4 +15,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/ferdinandmudjialim/metasploit-cve-search +- https://github.com/tunnelcat/metasploit-cve-search diff --git a/2018/CVE-2018-0743.md b/2018/CVE-2018-0743.md index a48223010d..1eef194150 100644 --- a/2018/CVE-2018-0743.md +++ b/2018/CVE-2018-0743.md @@ -33,6 +33,7 @@ Windows Subsystem for Linux in Windows 10 version 1703, Windows 10 version 1709, - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/renzu0/Windows-exp - https://github.com/root26/bug +- https://github.com/saaramar/execve_exploit - https://github.com/safesword/WindowsExp - https://github.com/valentinoJones/Windows-Kernel-Exploits - https://github.com/xbl3/awesome-cve-poc_qazbnm456 diff --git a/2018/CVE-2018-0802.md b/2018/CVE-2018-0802.md index 2122a527ae..1648b33f88 100644 --- a/2018/CVE-2018-0802.md +++ b/2018/CVE-2018-0802.md @@ -85,6 +85,7 @@ Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Offic - https://github.com/reph0r/poc-exp-tools - https://github.com/ridhopratama29/zimbohack - https://github.com/roninAPT/CVE-2018-0802 +- https://github.com/rxwx/CVE-2018-0802 - https://github.com/t31m0/PENTESTING-BIBLE - https://github.com/tib36/PhishingBook - https://github.com/vincentfer/PENTESTING-BIBLE- @@ -93,4 +94,5 @@ Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Offic - https://github.com/xaitax/cisa-catalog-known-vulnerabilities - https://github.com/xbl3/awesome-cve-poc_qazbnm456 - https://github.com/yusufazizmustofa/BIBLE +- https://github.com/zldww2011/CVE-2018-0802_POC diff --git a/2018/CVE-2018-0886.md b/2018/CVE-2018-0886.md index 1015fdd071..039132aef9 100644 --- a/2018/CVE-2018-0886.md +++ b/2018/CVE-2018-0886.md @@ -33,6 +33,7 @@ The Credential Security Support Provider protocol (CredSSP) in Microsoft Windows - https://github.com/jborean93/requests-credssp - https://github.com/lnick2023/nicenice - https://github.com/paulveillard/cybersecurity-exploit-development +- https://github.com/preempt/credssp - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/wachira90/fix-credssp - https://github.com/weeka10/-hktalent-TOP diff --git a/2018/CVE-2018-1000134.md b/2018/CVE-2018-1000134.md index e8fa161493..6dcccd2fb3 100644 --- a/2018/CVE-2018-1000134.md +++ b/2018/CVE-2018-1000134.md @@ -16,4 +16,5 @@ No PoCs from references. - https://github.com/0xT11/CVE-POC - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter diff --git a/2018/CVE-2018-1000180.md b/2018/CVE-2018-1000180.md index 280ba635d4..aa8a454a2e 100644 --- a/2018/CVE-2018-1000180.md +++ b/2018/CVE-2018-1000180.md @@ -20,4 +20,5 @@ Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1 and earlier have a flaw - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter - https://github.com/CyberSource/cybersource-sdk-java +- https://github.com/LibHunter/LibHunter diff --git a/2018/CVE-2018-1000529.md b/2018/CVE-2018-1000529.md index f7b0a486f6..541d91da3e 100644 --- a/2018/CVE-2018-1000529.md +++ b/2018/CVE-2018-1000529.md @@ -14,4 +14,5 @@ Grails Fields plugin version 2.2.7 contains a Cross Site Scripting (XSS) vulnera #### Github - https://github.com/0xT11/CVE-POC +- https://github.com/martinfrancois/CVE-2018-1000529 diff --git a/2018/CVE-2018-1000613.md b/2018/CVE-2018-1000613.md index bb927a7834..c7be06692b 100644 --- a/2018/CVE-2018-1000613.md +++ b/2018/CVE-2018-1000613.md @@ -20,6 +20,7 @@ Legion of the Bouncy Castle Legion of the Bouncy Castle Java Cryptography APIs 1 - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter - https://github.com/IkerSaint/VULNAPP-vulnerable-app +- https://github.com/LibHunter/LibHunter - https://github.com/PalindromeLabs/Java-Deserialization-CVEs - https://github.com/dotanuki-labs/android-oss-cves-research - https://github.com/pctF/vulnerable-app diff --git a/2018/CVE-2018-1000632.md b/2018/CVE-2018-1000632.md index ab704b08b6..821e097366 100644 --- a/2018/CVE-2018-1000632.md +++ b/2018/CVE-2018-1000632.md @@ -18,5 +18,6 @@ dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerabil #### Github - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/ilmari666/cybsec diff --git a/2018/CVE-2018-1000850.md b/2018/CVE-2018-1000850.md index 932cfa6f8c..4b202da17b 100644 --- a/2018/CVE-2018-1000850.md +++ b/2018/CVE-2018-1000850.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/hinat0y/Dataset1 - https://github.com/hinat0y/Dataset10 - https://github.com/hinat0y/Dataset11 diff --git a/2018/CVE-2018-1002105.md b/2018/CVE-2018-1002105.md index 0e4bc6550a..09d9a9f4b8 100644 --- a/2018/CVE-2018-1002105.md +++ b/2018/CVE-2018-1002105.md @@ -46,6 +46,7 @@ In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect ha - https://github.com/cloudpassage-community/find_k8s - https://github.com/cloudyuga/kubecon19-eu - https://github.com/cyberanand1337x/bug-bounty-2022 +- https://github.com/evict/poc_CVE-2018-1002105 - https://github.com/g3rzi/HackingKubernetes - https://github.com/gravitational/cve-2018-1002105 - https://github.com/hacking-kubernetes/hacking-kubernetes.info diff --git a/2018/CVE-2018-1002201.md b/2018/CVE-2018-1002201.md index 53986d471a..e06fde28d5 100644 --- a/2018/CVE-2018-1002201.md +++ b/2018/CVE-2018-1002201.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/jpbprakash/vuln - https://github.com/mile9299/zip-slip-vulnerability - https://github.com/snyk/zip-slip-vulnerability diff --git a/2018/CVE-2018-10054.md b/2018/CVE-2018-10054.md index 101515b673..9f7c0c4860 100644 --- a/2018/CVE-2018-10054.md +++ b/2018/CVE-2018-10054.md @@ -10,6 +10,7 @@ ### POC #### Reference +- https://github.com/h2database/h2database/issues/1225 - https://mthbernardes.github.io/rce/2018/03/14/abusing-h2-database-alias.html - https://www.exploit-db.com/exploits/44422/ diff --git a/2018/CVE-2018-10088.md b/2018/CVE-2018-10088.md index 216ba56bdd..9e0136e61a 100644 --- a/2018/CVE-2018-10088.md +++ b/2018/CVE-2018-10088.md @@ -16,4 +16,5 @@ Buffer overflow in XiongMai uc-httpd 1.0.0 has unspecified impact and attack vec #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/KostasEreksonas/Besder-6024PB-XMA501-ip-camera-security-investigation +- https://github.com/bitfu/uc-httpd-1.0.0-buffer-overflow-exploit diff --git a/2018/CVE-2018-10237.md b/2018/CVE-2018-10237.md index 03b5c61292..3fbd219ed4 100644 --- a/2018/CVE-2018-10237.md +++ b/2018/CVE-2018-10237.md @@ -20,6 +20,7 @@ Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allo - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter - https://github.com/IkerSaint/VULNAPP-vulnerable-app +- https://github.com/LibHunter/LibHunter - https://github.com/PalindromeLabs/Java-Deserialization-CVEs - https://github.com/diakogiannis/moviebook - https://github.com/dotanuki-labs/android-oss-cves-research diff --git a/2018/CVE-2018-11248.md b/2018/CVE-2018-11248.md index feecc74cd7..b3d2cc8fdd 100644 --- a/2018/CVE-2018-11248.md +++ b/2018/CVE-2018-11248.md @@ -15,4 +15,5 @@ No PoCs from references. #### Github - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter diff --git a/2018/CVE-2018-11307.md b/2018/CVE-2018-11307.md index 8994285843..0b9965e1cf 100644 --- a/2018/CVE-2018-11307.md +++ b/2018/CVE-2018-11307.md @@ -19,6 +19,7 @@ An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use o - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/OWASP/www-project-ide-vulscanner - https://github.com/ilmari666/cybsec - https://github.com/seal-community/patches diff --git a/2018/CVE-2018-11409.md b/2018/CVE-2018-11409.md index 6b2e2667f0..fefe3776c7 100644 --- a/2018/CVE-2018-11409.md +++ b/2018/CVE-2018-11409.md @@ -18,6 +18,7 @@ Splunk through 7.0.1 allows information disclosure by appending __raw/services/s - https://github.com/Elsfa7-110/kenzer-templates - https://github.com/d4n-sec/d4n-sec.github.io - https://github.com/jam620/OSIN-Splunk +- https://github.com/kofa2002/splunk - https://github.com/merlinepedra/nuclei-templates - https://github.com/merlinepedra25/nuclei-templates - https://github.com/sobinge/nuclei-templates diff --git a/2018/CVE-2018-11471.md b/2018/CVE-2018-11471.md index 7afc8d1c4d..0ef77f60b6 100644 --- a/2018/CVE-2018-11471.md +++ b/2018/CVE-2018-11471.md @@ -13,4 +13,5 @@ Cockpit 0.5.5 has XSS via a collection, form, or region. - https://github.com/nikhil1232/Cockpit-CMS-XSS-POC #### Github +- https://github.com/nikhil1232/Cockpit-CMS-XSS-POC diff --git a/2018/CVE-2018-11771.md b/2018/CVE-2018-11771.md index 7048fcdbb3..d51bff58d2 100644 --- a/2018/CVE-2018-11771.md +++ b/2018/CVE-2018-11771.md @@ -18,6 +18,7 @@ When reading a specially crafted ZIP archive, the read method of Apache Commons - https://github.com/CGCL-codes/PHunter - https://github.com/DennisFeldbusch/Fuzz - https://github.com/GCFuzzer/SP2023 +- https://github.com/LibHunter/LibHunter - https://github.com/hwen020/JQF - https://github.com/jyi/JQF - https://github.com/mfatima1/CS182 diff --git a/2018/CVE-2018-11776.md b/2018/CVE-2018-11776.md index 853558fd4a..2ce0873f07 100644 --- a/2018/CVE-2018-11776.md +++ b/2018/CVE-2018-11776.md @@ -114,6 +114,7 @@ Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remo - https://github.com/hellochunqiu/PayloadsAllTheThings - https://github.com/hktalent/TOP - https://github.com/hktalent/myhktools +- https://github.com/hook-s3c/CVE-2018-11776-Python-PoC - https://github.com/hudunkey/Red-Team-links - https://github.com/hwiwonl/dayone - https://github.com/hyeonql/WHS diff --git a/2018/CVE-2018-11797.md b/2018/CVE-2018-11797.md index 15caebdfec..6060c69367 100644 --- a/2018/CVE-2018-11797.md +++ b/2018/CVE-2018-11797.md @@ -17,4 +17,5 @@ In Apache PDFBox 1.8.0 to 1.8.15 and 2.0.0RC1 to 2.0.11, a carefully crafted PDF - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter diff --git a/2018/CVE-2018-12022.md b/2018/CVE-2018-12022.md index 63bf11a927..2dd55f10ec 100644 --- a/2018/CVE-2018-12022.md +++ b/2018/CVE-2018-12022.md @@ -18,6 +18,7 @@ An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2 - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/ilmari666/cybsec - https://github.com/seal-community/patches diff --git a/2018/CVE-2018-12034.md b/2018/CVE-2018-12034.md index 904dd6c866..5a90c5b320 100644 --- a/2018/CVE-2018-12034.md +++ b/2018/CVE-2018-12034.md @@ -16,6 +16,7 @@ In YARA 3.7.1 and prior, parsing a specially crafted compiled rule file can caus #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/bnbdr/swisscheese - https://github.com/lnick2023/nicenice - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/xbl3/awesome-cve-poc_qazbnm456 diff --git a/2018/CVE-2018-12035.md b/2018/CVE-2018-12035.md index e49091ce45..cd48a73b6f 100644 --- a/2018/CVE-2018-12035.md +++ b/2018/CVE-2018-12035.md @@ -16,6 +16,7 @@ In YARA 3.7.1 and prior, parsing a specially crafted compiled rule file can caus #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/bnbdr/swisscheese - https://github.com/lnick2023/nicenice - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/xbl3/awesome-cve-poc_qazbnm456 diff --git a/2018/CVE-2018-12418.md b/2018/CVE-2018-12418.md index 71bc9e60cd..95b5d19c95 100644 --- a/2018/CVE-2018-12418.md +++ b/2018/CVE-2018-12418.md @@ -19,6 +19,7 @@ No PoCs from references. - https://github.com/CGCL-codes/PHunter - https://github.com/DennisFeldbusch/Fuzz - https://github.com/GCFuzzer/SP2023 +- https://github.com/LibHunter/LibHunter - https://github.com/hwen020/JQF - https://github.com/jyi/JQF - https://github.com/mfatima1/CS182 diff --git a/2018/CVE-2018-12538.md b/2018/CVE-2018-12538.md index e9696c17a5..c886e2e4f3 100644 --- a/2018/CVE-2018-12538.md +++ b/2018/CVE-2018-12538.md @@ -16,4 +16,5 @@ In Eclipse Jetty versions 9.4.0 through 9.4.8, when using the optional Jetty pro #### Github - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter diff --git a/2018/CVE-2018-1260.md b/2018/CVE-2018-1260.md index fa2cac85e0..f977e6aabf 100644 --- a/2018/CVE-2018-1260.md +++ b/2018/CVE-2018-1260.md @@ -18,6 +18,7 @@ No PoCs from references. - https://github.com/Drun1baby/CVE-Reproduction-And-Analysis - https://github.com/SexyBeast233/SecBooks - https://github.com/ax1sX/SpringSecurity +- https://github.com/enomothem/PenTestNote - https://github.com/gyyyy/footprint - https://github.com/langu-xyz/JavaVulnMap diff --git a/2018/CVE-2018-1270.md b/2018/CVE-2018-1270.md index 25117b16fd..aafb4a8c84 100644 --- a/2018/CVE-2018-1270.md +++ b/2018/CVE-2018-1270.md @@ -46,6 +46,7 @@ Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 a - https://github.com/cybersecsi/docker-vuln-runner - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/do0dl3/myhktools +- https://github.com/enomothem/PenTestNote - https://github.com/genxor/CVE-2018-1270_EXP - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/hktalent/myhktools diff --git a/2018/CVE-2018-1324.md b/2018/CVE-2018-1324.md index 578aafc984..f43159e062 100644 --- a/2018/CVE-2018-1324.md +++ b/2018/CVE-2018-1324.md @@ -16,6 +16,7 @@ A specially crafted ZIP archive can be used to cause an infinite loop inside of - https://github.com/0xT11/CVE-POC - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/dotanuki-labs/android-oss-cves-research - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2018/CVE-2018-13257.md b/2018/CVE-2018-13257.md index 8d24e10047..7584457fc9 100644 --- a/2018/CVE-2018-13257.md +++ b/2018/CVE-2018-13257.md @@ -14,4 +14,5 @@ The bb-auth-provider-cas authentication module within Blackboard Learn 2018-07-0 #### Github - https://github.com/0xT11/CVE-POC +- https://github.com/gluxon/CVE-2018-13257 diff --git a/2018/CVE-2018-13379.md b/2018/CVE-2018-13379.md index 4fe29b4e1b..03743c1416 100644 --- a/2018/CVE-2018-13379.md +++ b/2018/CVE-2018-13379.md @@ -36,6 +36,7 @@ An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal" - https://github.com/MelanyRoob/Goby - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors +- https://github.com/RedcentricCyber/Fortigate - https://github.com/SexyBeast233/SecBooks - https://github.com/TebbaaX/Vault6 - https://github.com/W01fh4cker/Serein diff --git a/2018/CVE-2018-14333.md b/2018/CVE-2018-14333.md index 506f691916..bd25c8bb6a 100644 --- a/2018/CVE-2018-14333.md +++ b/2018/CVE-2018-14333.md @@ -13,4 +13,5 @@ TeamViewer through 13.1.1548 stores a password in Unicode format within TeamView - https://github.com/vah13/extractTVpasswords #### Github +- https://github.com/vah13/extractTVpasswords diff --git a/2018/CVE-2018-14568.md b/2018/CVE-2018-14568.md index 5ec5ac573b..0ef6603027 100644 --- a/2018/CVE-2018-14568.md +++ b/2018/CVE-2018-14568.md @@ -14,4 +14,5 @@ Suricata before 4.0.5 stops TCP stream inspection upon a TCP RST from a server. - https://redmine.openinfosecfoundation.org/issues/2501 #### Github +- https://github.com/kirillwow/ids_bypass diff --git a/2018/CVE-2018-14634.md b/2018/CVE-2018-14634.md index 23d6c1763c..8f95d28f6f 100644 --- a/2018/CVE-2018-14634.md +++ b/2018/CVE-2018-14634.md @@ -33,6 +33,7 @@ An integer overflow flaw was found in the Linux kernel's create_elf_tables() fun - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xbl3/awesome-cve-poc_qazbnm456 diff --git a/2018/CVE-2018-14847.md b/2018/CVE-2018-14847.md index 35b4b7164b..fdfa6568d2 100644 --- a/2018/CVE-2018-14847.md +++ b/2018/CVE-2018-14847.md @@ -22,6 +22,7 @@ MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read a - https://github.com/ARPSyndicate/cvemon - https://github.com/Acengerz/WinboxPoC - https://github.com/AsrafulDev/winboxbug +- https://github.com/BasuCert/WinboxPoC - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top diff --git a/2018/CVE-2018-15499.md b/2018/CVE-2018-15499.md index 17f56264d3..340e61a7a2 100644 --- a/2018/CVE-2018-15499.md +++ b/2018/CVE-2018-15499.md @@ -16,6 +16,7 @@ GEAR Software products that include GEARAspiWDM.sys, 2.2.5.0, allow local users - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon - https://github.com/CrackerCat/Kernel-Security-Development +- https://github.com/DownWithUp/CVE-2018-15499 - https://github.com/DownWithUp/CVE-Stockpile - https://github.com/ExpLife0011/awesome-windows-kernel-security-development - https://github.com/Ondrik8/exploit diff --git a/2018/CVE-2018-15901.md b/2018/CVE-2018-15901.md index 0bd1a2613d..79c10d1c32 100644 --- a/2018/CVE-2018-15901.md +++ b/2018/CVE-2018-15901.md @@ -14,4 +14,5 @@ e107 2.1.8 has CSRF in 'usersettings.php' with an impact of changing details suc #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/dhananjay-bajaj/e107_2.1.8_csrf diff --git a/2018/CVE-2018-16133.md b/2018/CVE-2018-16133.md index 7b4077721e..2b3111c521 100644 --- a/2018/CVE-2018-16133.md +++ b/2018/CVE-2018-16133.md @@ -15,4 +15,5 @@ Cybrotech CyBroHttpServer 1.0.3 allows Directory Traversal via a ../ in the URI. #### Github - https://github.com/ARPSyndicate/kenzer-templates +- https://github.com/EmreOvunc/CyBroHttpServer-v1.0.3-Directory-Traversal diff --git a/2018/CVE-2018-16134.md b/2018/CVE-2018-16134.md index eeb217f7f0..8c60ba0653 100644 --- a/2018/CVE-2018-16134.md +++ b/2018/CVE-2018-16134.md @@ -14,4 +14,5 @@ Cybrotech CyBroHttpServer 1.0.3 allows XSS via a URI. - https://www.exploit-db.com/exploits/45309/ #### Github +- https://github.com/EmreOvunc/CyBroHttpServer-v1.0.3-Reflected-XSS diff --git a/2018/CVE-2018-16381.md b/2018/CVE-2018-16381.md index 13659c1a35..adb02bdd59 100644 --- a/2018/CVE-2018-16381.md +++ b/2018/CVE-2018-16381.md @@ -14,4 +14,5 @@ e107 2.1.8 has XSS via the e107_admin/users.php?mode=main&action=list user_login #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/dhananjay-bajaj/E107-v2.1.8-XSS-POC diff --git a/2018/CVE-2018-16946.md b/2018/CVE-2018-16946.md index b2650b5a11..61924bb878 100644 --- a/2018/CVE-2018-16946.md +++ b/2018/CVE-2018-16946.md @@ -15,6 +15,7 @@ LG LNB*, LND*, LNU*, and LNV* smart network camera devices have broken access co #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/EgeBalci/LG-Smart-IP-Device-Backup-Download - https://github.com/lnick2023/nicenice - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/xbl3/awesome-cve-poc_qazbnm456 diff --git a/2018/CVE-2018-17081.md b/2018/CVE-2018-17081.md index 323686b0e3..ac106a8f3f 100644 --- a/2018/CVE-2018-17081.md +++ b/2018/CVE-2018-17081.md @@ -14,4 +14,5 @@ e107 2.1.9 allows CSRF via e107_admin/wmessage.php?mode=&action=inline&ajax_used #### Github - https://github.com/0xT11/CVE-POC +- https://github.com/himanshurahi/e107_2.1.9_CSRF_POC diff --git a/2018/CVE-2018-17182.md b/2018/CVE-2018-17182.md index 72aba58c1f..f52c97794b 100644 --- a/2018/CVE-2018-17182.md +++ b/2018/CVE-2018-17182.md @@ -26,6 +26,7 @@ An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_a - https://github.com/CVEDB/top - https://github.com/Echocipher/Resource-list - https://github.com/GhostTroops/TOP +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Ondrik8/RED-Team @@ -59,6 +60,7 @@ An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_a - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/svbjdbk123/- - https://github.com/twensoo/PersistentThreat +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xbl3/awesome-cve-poc_qazbnm456 - https://github.com/xiaoZ-hc/redtool diff --git a/2018/CVE-2018-17240.md b/2018/CVE-2018-17240.md index 6cd87d5d38..2b7ff94254 100644 --- a/2018/CVE-2018-17240.md +++ b/2018/CVE-2018-17240.md @@ -14,5 +14,6 @@ There is a memory dump vulnerability on Netwave IP camera devices at //proc/kcor - https://github.com/BBge/CVE-2018-17240/blob/main/exploit.py #### Github +- https://github.com/BBge/CVE-2018-17240 - https://github.com/Xewdy444/Netgrave diff --git a/2018/CVE-2018-18281.md b/2018/CVE-2018-18281.md index 7f300f8342..1175eb05d4 100644 --- a/2018/CVE-2018-18281.md +++ b/2018/CVE-2018-18281.md @@ -25,5 +25,6 @@ Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2018/CVE-2018-18955.md b/2018/CVE-2018-18955.md index 043fb1c3b1..0df86ca3b1 100644 --- a/2018/CVE-2018-18955.md +++ b/2018/CVE-2018-18955.md @@ -18,6 +18,7 @@ In the Linux kernel 4.15.x through 4.19.x before 4.19.2, map_write() in kernel/u - https://github.com/Al1ex/LinuxEelvation - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/HaleyWei/POC-available +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Metarget/metarget - https://github.com/Micr067/linux-kernel-exploits diff --git a/2018/CVE-2018-19320.md b/2018/CVE-2018-19320.md index 4359594df3..19da76cf65 100644 --- a/2018/CVE-2018-19320.md +++ b/2018/CVE-2018-19320.md @@ -25,6 +25,7 @@ The GDrv low-level driver in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRA - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/cmd-theo/RobbinHood-attack - https://github.com/cygnosic/Gigabyte_Disable_DSE +- https://github.com/gmh5225/RobbinHood-attack - https://github.com/gmh5225/awesome-game-security - https://github.com/h4rmy/KDU - https://github.com/hfiref0x/KDU diff --git a/2018/CVE-2018-19360.md b/2018/CVE-2018-19360.md index b64c539432..fbb9220b66 100644 --- a/2018/CVE-2018-19360.md +++ b/2018/CVE-2018-19360.md @@ -17,6 +17,7 @@ FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspec - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/OWASP/www-project-ide-vulscanner - https://github.com/PalindromeLabs/Java-Deserialization-CVEs - https://github.com/aaronm-sysdig/risk-accept diff --git a/2018/CVE-2018-19361.md b/2018/CVE-2018-19361.md index ac69dc847c..0933db155f 100644 --- a/2018/CVE-2018-19361.md +++ b/2018/CVE-2018-19361.md @@ -17,6 +17,7 @@ FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspec - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/OWASP/www-project-ide-vulscanner - https://github.com/PalindromeLabs/Java-Deserialization-CVEs - https://github.com/aaronm-sysdig/risk-accept diff --git a/2018/CVE-2018-19362.md b/2018/CVE-2018-19362.md index 253d0551db..aa1daed1cb 100644 --- a/2018/CVE-2018-19362.md +++ b/2018/CVE-2018-19362.md @@ -18,6 +18,7 @@ FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspec - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/OWASP/www-project-ide-vulscanner - https://github.com/PalindromeLabs/Java-Deserialization-CVEs - https://github.com/aaronm-sysdig/risk-accept diff --git a/2018/CVE-2018-19466.md b/2018/CVE-2018-19466.md index afa7d00a39..f89a2b5c5c 100644 --- a/2018/CVE-2018-19466.md +++ b/2018/CVE-2018-19466.md @@ -15,6 +15,7 @@ A vulnerability was found in Portainer before 1.20.0. Portainer stores LDAP cred #### Github - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon +- https://github.com/MauroEldritch/lempo - https://github.com/MauroEldritch/mauroeldritch - https://github.com/anquanscan/sec-tools diff --git a/2018/CVE-2018-19487.md b/2018/CVE-2018-19487.md index 0ab1bb2d3f..d474468775 100644 --- a/2018/CVE-2018-19487.md +++ b/2018/CVE-2018-19487.md @@ -16,5 +16,6 @@ The WP-jobhunt plugin before version 2.4 for WordPress does not control AJAX req #### Github - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon +- https://github.com/Antho59/wp-jobhunt-exploit - https://github.com/YOLOP0wn/wp-jobhunt-exploit diff --git a/2018/CVE-2018-19488.md b/2018/CVE-2018-19488.md index 1f992e201a..7e5d21481f 100644 --- a/2018/CVE-2018-19488.md +++ b/2018/CVE-2018-19488.md @@ -14,5 +14,6 @@ The WP-jobhunt plugin before version 2.4 for WordPress does not control AJAX req - https://wpvulndb.com/vulnerabilities/9206 #### Github +- https://github.com/Antho59/wp-jobhunt-exploit - https://github.com/YOLOP0wn/wp-jobhunt-exploit diff --git a/2018/CVE-2018-19537.md b/2018/CVE-2018-19537.md index c8e2f9fff1..3fc39e0717 100644 --- a/2018/CVE-2018-19537.md +++ b/2018/CVE-2018-19537.md @@ -14,4 +14,5 @@ TP-Link Archer C5 devices through V2_160201_US allow remote command execution vi #### Github - https://github.com/0xT11/CVE-POC +- https://github.com/JackDoan/TP-Link-ArcherC5-RCE diff --git a/2018/CVE-2018-19933.md b/2018/CVE-2018-19933.md index e5b916f5b3..b47dfd5cb6 100644 --- a/2018/CVE-2018-19933.md +++ b/2018/CVE-2018-19933.md @@ -15,4 +15,5 @@ Bolt CMS <3.6.2 allows XSS via text input click preview button as demonstrated b #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/rdincel1/Bolt-CMS-3.6.2---Cross-Site-Scripting diff --git a/2018/CVE-2018-20161.md b/2018/CVE-2018-20161.md index 2a5007cadb..50a824c8f0 100644 --- a/2018/CVE-2018-20161.md +++ b/2018/CVE-2018-20161.md @@ -13,4 +13,5 @@ A design flaw in the BlinkForHome (aka Blink For Home) Sync Module 2.10.4 and ea - https://github.com/Jacquais/BlinkVuln #### Github +- https://github.com/Jacquais/BlinkVuln diff --git a/2018/CVE-2018-20343.md b/2018/CVE-2018-20343.md index a5c61b3358..74d1e36123 100644 --- a/2018/CVE-2018-20343.md +++ b/2018/CVE-2018-20343.md @@ -15,5 +15,6 @@ Multiple buffer overflow vulnerabilities have been found in Ken Silverman Build #### Github - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon +- https://github.com/Alexandre-Bartel/CVE-2018-20343 - https://github.com/anquanscan/sec-tools diff --git a/2018/CVE-2018-20377.md b/2018/CVE-2018-20377.md index f708d2e9b1..73304852f6 100644 --- a/2018/CVE-2018-20377.md +++ b/2018/CVE-2018-20377.md @@ -18,4 +18,5 @@ Orange Livebox 00.96.320S devices allow remote attackers to discover Wi-Fi crede - https://github.com/angristan/awesome-stars - https://github.com/oski02/NSE - https://github.com/pawamoy/stars +- https://github.com/zadewg/LIVEBOX-0DAY diff --git a/2018/CVE-2018-20418.md b/2018/CVE-2018-20418.md index 104335ceab..a0986209d3 100644 --- a/2018/CVE-2018-20418.md +++ b/2018/CVE-2018-20418.md @@ -14,4 +14,5 @@ index.php?p=admin/actions/entries/save-entry in Craft CMS 3.0.25 allows XSS by s - https://www.exploit-db.com/exploits/46054/ #### Github +- https://github.com/rdincel1/Craft-CMS-3.0.25---Cross-Site-Scripting diff --git a/2018/CVE-2018-20555.md b/2018/CVE-2018-20555.md index f05acdf29e..2e045c0ce0 100644 --- a/2018/CVE-2018-20555.md +++ b/2018/CVE-2018-20555.md @@ -15,4 +15,5 @@ The Design Chemical Social Network Tabs plugin 1.7.1 for WordPress allows remote #### Github - https://github.com/0xT11/CVE-POC +- https://github.com/fs0c131y/CVE-2018-20555 diff --git a/2018/CVE-2018-20575.md b/2018/CVE-2018-20575.md index 399d8a85ed..330fddb3ba 100644 --- a/2018/CVE-2018-20575.md +++ b/2018/CVE-2018-20575.md @@ -13,4 +13,5 @@ Orange Livebox 00.96.320S devices have an undocumented /system_firmwarel.stm URI - https://github.com/zadewg/LIVEBOX-0DAY #### Github +- https://github.com/zadewg/LIVEBOX-0DAY diff --git a/2018/CVE-2018-20576.md b/2018/CVE-2018-20576.md index 5069c6f953..8da9854a06 100644 --- a/2018/CVE-2018-20576.md +++ b/2018/CVE-2018-20576.md @@ -14,4 +14,5 @@ Orange Livebox 00.96.320S devices allow cgi-bin/autodialing.exe and cgi-bin/phon - https://github.com/zadewg/LIVEBOX-0DAY #### Github +- https://github.com/zadewg/LIVEBOX-0DAY diff --git a/2018/CVE-2018-20577.md b/2018/CVE-2018-20577.md index bfdf06bbdc..d34851d9d3 100644 --- a/2018/CVE-2018-20577.md +++ b/2018/CVE-2018-20577.md @@ -13,4 +13,5 @@ Orange Livebox 00.96.320S devices allow cgi-bin/restore.exe, cgi-bin/firewall_SP - https://github.com/zadewg/LIVEBOX-0DAY #### Github +- https://github.com/zadewg/LIVEBOX-0DAY diff --git a/2018/CVE-2018-20580.md b/2018/CVE-2018-20580.md index 57d4fdb04d..cc4e34c6cd 100644 --- a/2018/CVE-2018-20580.md +++ b/2018/CVE-2018-20580.md @@ -16,4 +16,5 @@ The WSDL import functionality in SmartBear ReadyAPI 2.5.0 and 2.6.0 allows remot #### Github - https://github.com/0xT11/CVE-POC +- https://github.com/gscamelo/CVE-2018-20580 diff --git a/2018/CVE-2018-20817.md b/2018/CVE-2018-20817.md index e6329b1a55..9ceb41f9a1 100644 --- a/2018/CVE-2018-20817.md +++ b/2018/CVE-2018-20817.md @@ -14,5 +14,6 @@ SV_SteamAuthClient in various Activision Infinity Ward Call of Duty games before - https://github.com/momo5502/cod-exploits/tree/master/steam-auth #### Github +- https://github.com/RektInator/cod-steamauth-rce - https://github.com/momo5502/cod-exploits diff --git a/2018/CVE-2018-20969.md b/2018/CVE-2018-20969.md index 5b86ad0dd7..2e0b70f052 100644 --- a/2018/CVE-2018-20969.md +++ b/2018/CVE-2018-20969.md @@ -16,5 +16,6 @@ do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginnin #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/irsl/gnu-patch-vulnerabilities - https://github.com/phonito/phonito-vulnerable-container diff --git a/2018/CVE-2018-2380.md b/2018/CVE-2018-2380.md index 161f5a6576..acc7ddb57c 100644 --- a/2018/CVE-2018-2380.md +++ b/2018/CVE-2018-2380.md @@ -21,5 +21,6 @@ SAP CRM, 7.01, 7.02,7.30, 7.31, 7.33, 7.54, allows an attacker to exploit insuff - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/developer3000S/PoC-in-GitHub +- https://github.com/erpscanteam/CVE-2018-2380 - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2018/CVE-2018-2636.md b/2018/CVE-2018-2636.md index fa58007b6f..439c638754 100644 --- a/2018/CVE-2018-2636.md +++ b/2018/CVE-2018-2636.md @@ -30,6 +30,7 @@ Vulnerability in the Oracle Hospitality Simphony component of Oracle Hospitality - https://github.com/birdhan/Security_Product - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/eric-erki/awesome-honeypots +- https://github.com/erpscanteam/CVE-2018-2636 - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/investlab/Awesome-honeypots - https://github.com/paralax/awesome-honeypots diff --git a/2018/CVE-2018-3639.md b/2018/CVE-2018-3639.md index 06c13bf2be..6d28c1f955 100644 --- a/2018/CVE-2018-3639.md +++ b/2018/CVE-2018-3639.md @@ -77,6 +77,7 @@ Systems with microprocessors utilizing speculative execution and speculative exe - https://github.com/vintagesucks/awesome-stars - https://github.com/vurtne/specter---meltdown--checker - https://github.com/willyb321/willyb321-stars +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/yardenshafir/MitigationFlagsCliTool diff --git a/2018/CVE-2018-5333.md b/2018/CVE-2018-5333.md index ae81577c97..3ec3169bb1 100644 --- a/2018/CVE-2018-5333.md +++ b/2018/CVE-2018-5333.md @@ -17,6 +17,7 @@ In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdm - https://github.com/ARPSyndicate/cvemon - https://github.com/Al1ex/LinuxEelvation - https://github.com/De4dCr0w/Linux-kernel-EoP-exp +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/bcoles/kernel-exploits - https://github.com/bsauce/kernel-exploit-factory diff --git a/2018/CVE-2018-5353.md b/2018/CVE-2018-5353.md index afd5e01536..5eb7dff1d6 100644 --- a/2018/CVE-2018-5353.md +++ b/2018/CVE-2018-5353.md @@ -16,4 +16,5 @@ The custom GINA/CP module in Zoho ManageEngine ADSelfService Plus before 5.5 bui - https://github.com/0xT11/CVE-POC - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/missing0x00/CVE-2018-5353 diff --git a/2018/CVE-2018-5354.md b/2018/CVE-2018-5354.md index 2199821b45..06efab86d4 100644 --- a/2018/CVE-2018-5354.md +++ b/2018/CVE-2018-5354.md @@ -16,4 +16,5 @@ The custom GINA/CP module in ANIXIS Password Reset Client before version 3.22 al - https://github.com/0xT11/CVE-POC - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/missing0x00/CVE-2018-5354 diff --git a/2018/CVE-2018-5407.md b/2018/CVE-2018-5407.md index d600eec3a7..4eafb3d8af 100644 --- a/2018/CVE-2018-5407.md +++ b/2018/CVE-2018-5407.md @@ -20,6 +20,7 @@ Simultaneous Multi-threading (SMT) in processors can enable local users to explo #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/bbbrumley/portsmash - https://github.com/codexlynx/hardware-attacks-state-of-the-art - https://github.com/djschleen/ash - https://github.com/mrodden/vyger diff --git a/2018/CVE-2018-5782.md b/2018/CVE-2018-5782.md index a551e8bb4c..5b125b8030 100644 --- a/2018/CVE-2018-5782.md +++ b/2018/CVE-2018-5782.md @@ -14,4 +14,5 @@ A vulnerability in the conferencing component of Mitel Connect ONSITE, versions - https://www.exploit-db.com/exploits/46174/ #### Github +- https://github.com/twosevenzero/shoretel-mitel-rce diff --git a/2018/CVE-2018-5951.md b/2018/CVE-2018-5951.md index 4b4feeef8f..273d2984b9 100644 --- a/2018/CVE-2018-5951.md +++ b/2018/CVE-2018-5951.md @@ -14,6 +14,7 @@ An issue was discovered in Mikrotik RouterOS. Crafting a packet that has a size #### Github - https://github.com/0xT11/CVE-POC +- https://github.com/Nat-Lab/CVE-2018-5951 - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2018/CVE-2018-5968.md b/2018/CVE-2018-5968.md index 8b338a7cd0..eb75dfd8d9 100644 --- a/2018/CVE-2018-5968.md +++ b/2018/CVE-2018-5968.md @@ -17,6 +17,7 @@ FasterXML jackson-databind through 2.8.11 and 2.9.x through 2.9.3 allows unauthe - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter - https://github.com/FHGZS/jackson-rce-via-two-new-gadgets +- https://github.com/LibHunter/LibHunter - https://github.com/OneSourceCat/jackson-rce-via-two-new-gadgets - https://github.com/PalindromeLabs/Java-Deserialization-CVEs - https://github.com/ilmari666/cybsec diff --git a/2018/CVE-2018-6389.md b/2018/CVE-2018-6389.md index 6f296a2577..13083335f3 100644 --- a/2018/CVE-2018-6389.md +++ b/2018/CVE-2018-6389.md @@ -58,6 +58,7 @@ In WordPress through 4.9.2, unauthenticated attackers can cause a denial of serv - https://github.com/Tanvi20/Week-7-Alternative-Assignment-wp-cve - https://github.com/TheBountyBox/Awesome-Writeups - https://github.com/Tyro-Shan/gongkaishouji +- https://github.com/WazeHell/CVE-2018-6389 - https://github.com/YIXINSHUWU/Penetration_Testing_POC - https://github.com/YemiBeshe/Codepath-WP1 - https://github.com/ZTK-009/Penetration_PoC diff --git a/2018/CVE-2018-6479.md b/2018/CVE-2018-6479.md index 5c929d5fbd..da098c3b9e 100644 --- a/2018/CVE-2018-6479.md +++ b/2018/CVE-2018-6479.md @@ -16,5 +16,6 @@ An issue was discovered on Netwave IP Camera devices. An unauthenticated attacke - https://github.com/0xT11/CVE-POC - https://github.com/LeQuocKhanh2K/Tool_Camera_Exploit_Netwave_CVE-2018-6479 - https://github.com/developer3000S/PoC-in-GitHub +- https://github.com/dreadlocked/netwave-dosvulnerability - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2018/CVE-2018-6554.md b/2018/CVE-2018-6554.md index 0af440be5d..b1a606d2fb 100644 --- a/2018/CVE-2018-6554.md +++ b/2018/CVE-2018-6554.md @@ -26,5 +26,6 @@ Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2018/CVE-2018-6555.md b/2018/CVE-2018-6555.md index 9717ce97a2..851ee84f08 100644 --- a/2018/CVE-2018-6555.md +++ b/2018/CVE-2018-6555.md @@ -26,5 +26,6 @@ The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/ - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ostrichxyz7/kexps - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2018/CVE-2018-6871.md b/2018/CVE-2018-6871.md index ac196bc280..634a862ab6 100644 --- a/2018/CVE-2018-6871.md +++ b/2018/CVE-2018-6871.md @@ -16,6 +16,7 @@ LibreOffice before 5.4.5 and 6.x before 6.0.1 allows remote attackers to read ar #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/duckstroms/Web-CTF-Cheatsheet +- https://github.com/jollheef/libreoffice-remote-arbitrary-file-disclosure - https://github.com/lnick2023/nicenice - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/w181496/Web-CTF-Cheatsheet diff --git a/2018/CVE-2018-6890.md b/2018/CVE-2018-6890.md index e3e88d7fbe..31db2ab078 100644 --- a/2018/CVE-2018-6890.md +++ b/2018/CVE-2018-6890.md @@ -16,4 +16,5 @@ Cross-site scripting (XSS) vulnerability in Wolf CMS 0.8.3.1 via the page editin #### Github - https://github.com/0xT11/CVE-POC - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/pradeepjairamani/WolfCMS-XSS-POC diff --git a/2018/CVE-2018-6905.md b/2018/CVE-2018-6905.md index 865ce73b91..95fbdd5ebe 100644 --- a/2018/CVE-2018-6905.md +++ b/2018/CVE-2018-6905.md @@ -16,4 +16,5 @@ The page module in TYPO3 before 8.7.11, and 9.1.0, has XSS via $GLOBALS['TYPO3_C - https://github.com/0xT11/CVE-POC - https://github.com/dnr6419/CVE-2018-6905 - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/pradeepjairamani/TYPO3-XSS-POC diff --git a/2018/CVE-2018-7490.md b/2018/CVE-2018-7490.md index e2ced417b5..0401f25dcc 100644 --- a/2018/CVE-2018-7490.md +++ b/2018/CVE-2018-7490.md @@ -16,6 +16,7 @@ uWSGI before 2.0.17 mishandles a DOCUMENT_ROOT check during use of the --php-doc - https://github.com/0ps/pocassistdb - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates +- https://github.com/CLincat/vulcat - https://github.com/Elsfa7-110/kenzer-templates - https://github.com/H4cking2theGate/TraversalHunter - https://github.com/SexyBeast233/SecBooks diff --git a/2018/CVE-2018-7600.md b/2018/CVE-2018-7600.md index cb1d579412..5d76ba23eb 100644 --- a/2018/CVE-2018-7600.md +++ b/2018/CVE-2018-7600.md @@ -105,6 +105,7 @@ Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 - https://github.com/YgorAlberto/ygoralberto.github.io - https://github.com/Z0fhack/Goby_POC - https://github.com/ZTK-009/RedTeamer +- https://github.com/a2u/CVE-2018-7600 - https://github.com/alexfrancow/Exploits - https://github.com/amitnandi04/Common-Vulnerability-Exposure-CVE- - https://github.com/andrysec/PayloadsAllVulnerability @@ -141,6 +142,7 @@ Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 - https://github.com/fengjixuchui/RedTeamer - https://github.com/firefart/CVE-2018-7600 - https://github.com/fyraiga/CVE-2018-7600-drupalgeddon2-scanner +- https://github.com/g0rx/CVE-2018-7600-Drupal-RCE - https://github.com/gameFace22/vulnmachine-walkthrough - https://github.com/githubfoam/yara-sandbox - https://github.com/gobysec/Goby diff --git a/2018/CVE-2018-8036.md b/2018/CVE-2018-8036.md index a8949767af..3bce5b2bf4 100644 --- a/2018/CVE-2018-8036.md +++ b/2018/CVE-2018-8036.md @@ -18,6 +18,7 @@ In Apache PDFBox 1.8.0 to 1.8.14 and 2.0.0RC1 to 2.0.10, a carefully crafted (or - https://github.com/CGCL-codes/PHunter - https://github.com/DennisFeldbusch/Fuzz - https://github.com/GCFuzzer/SP2023 +- https://github.com/LibHunter/LibHunter - https://github.com/hwen020/JQF - https://github.com/jyi/JQF - https://github.com/mfatima1/CS182 diff --git a/2018/CVE-2018-8037.md b/2018/CVE-2018-8037.md index b6f5850475..3c27b16a0e 100644 --- a/2018/CVE-2018-8037.md +++ b/2018/CVE-2018-8037.md @@ -17,5 +17,6 @@ If an async request was completed by the application at the same time as the con #### Github - https://github.com/ilmari666/cybsec - https://github.com/tomoyamachi/gocarts +- https://github.com/versio-io/product-lifecycle-security-api - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough diff --git a/2018/CVE-2018-8060.md b/2018/CVE-2018-8060.md index e7a2c7582e..e945370b8e 100644 --- a/2018/CVE-2018-8060.md +++ b/2018/CVE-2018-8060.md @@ -15,4 +15,5 @@ HWiNFO AMD64 Kernel driver version 8.98 and lower allows an unprivileged user to #### Github - https://github.com/0xT11/CVE-POC - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/otavioarj/SIOCtl diff --git a/2018/CVE-2018-8108.md b/2018/CVE-2018-8108.md index 6908465210..d77daa1f4a 100644 --- a/2018/CVE-2018-8108.md +++ b/2018/CVE-2018-8108.md @@ -15,4 +15,5 @@ The select component in bui through 2018-03-13 has XSS because it performs an es #### Github - https://github.com/0xT11/CVE-POC - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/zlgxzswjy/BUI-select-xss diff --git a/2018/CVE-2018-8174.md b/2018/CVE-2018-8174.md index a65407b869..a5d584410a 100644 --- a/2018/CVE-2018-8174.md +++ b/2018/CVE-2018-8174.md @@ -44,6 +44,7 @@ A remote code execution vulnerability exists in the way that the VBScript engine - https://github.com/InQuest/yara-rules - https://github.com/JERRY123S/all-poc - https://github.com/KasperskyLab/VBscriptInternals +- https://github.com/MN439/bingduziyuan - https://github.com/MrTcsy/Exploit - https://github.com/Ondrik8/RED-Team - https://github.com/Ostorlab/KEV diff --git a/2018/CVE-2018-8781.md b/2018/CVE-2018-8781.md index 671f600d1e..d751cdece7 100644 --- a/2018/CVE-2018-8781.md +++ b/2018/CVE-2018-8781.md @@ -25,5 +25,6 @@ No PoCs from references. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2018/CVE-2018-8821.md b/2018/CVE-2018-8821.md index c2302d048e..5420b14cf9 100644 --- a/2018/CVE-2018-8821.md +++ b/2018/CVE-2018-8821.md @@ -13,4 +13,5 @@ windrvr1260.sys in Jungo DriverWizard WinDriver 12.6.0 allows attackers to cause - https://github.com/bigric3/poc #### Github +- https://github.com/bigric3/poc diff --git a/2018/CVE-2018-8941.md b/2018/CVE-2018-8941.md index b17ac1c631..8c421122f8 100644 --- a/2018/CVE-2018-8941.md +++ b/2018/CVE-2018-8941.md @@ -14,5 +14,6 @@ Diagnostics functionality on D-Link DSL-3782 devices with firmware EU v. 1.01 ha #### Github - https://github.com/0xT11/CVE-POC +- https://github.com/SECFORCE/CVE-2018-8941 - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2018/CVE-2018-9136.md b/2018/CVE-2018-9136.md index afd30a9149..8428ed91f1 100644 --- a/2018/CVE-2018-9136.md +++ b/2018/CVE-2018-9136.md @@ -13,4 +13,5 @@ windrvr1260.sys in Jungo DriverWizard WinDriver 12.6.0 allows attackers to cause - https://github.com/bigric3/poc2 #### Github +- https://github.com/bigric3/poc2 diff --git a/2018/CVE-2018-9568.md b/2018/CVE-2018-9568.md index 77aa89a2e8..7a79221cb9 100644 --- a/2018/CVE-2018-9568.md +++ b/2018/CVE-2018-9568.md @@ -26,5 +26,6 @@ No PoCs from references. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2019/CVE-2019-0228.md b/2019/CVE-2019-0228.md index d45ebf3554..48af31e1f1 100644 --- a/2019/CVE-2019-0228.md +++ b/2019/CVE-2019-0228.md @@ -18,6 +18,7 @@ Apache PDFBox 2.0.14 does not properly initialize the XML parser, which allows c #### Github - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/bluesNbrews/SkillSearchEngine - https://github.com/swilliams9671/SkillSearchEngine diff --git a/2019/CVE-2019-0708.md b/2019/CVE-2019-0708.md index c00aa02dcf..30cf712eff 100644 --- a/2019/CVE-2019-0708.md +++ b/2019/CVE-2019-0708.md @@ -326,6 +326,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly - https://github.com/password520/RedTeamer - https://github.com/pengusec/awesome-netsec-articles - https://github.com/pentest-a2p2v/pentest-a2p2v-core +- https://github.com/pg001001/deception-tech - https://github.com/phant0n/PENTESTING-BIBLE - https://github.com/pikpikcu/Pentest-Tools-Framework - https://github.com/pravinsrc/NOTES-windows-kernel-links diff --git a/2019/CVE-2019-10086.md b/2019/CVE-2019-10086.md index 44885b6a56..8cf28fbe59 100644 --- a/2019/CVE-2019-10086.md +++ b/2019/CVE-2019-10086.md @@ -27,6 +27,7 @@ In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added wh - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter - https://github.com/IkerSaint/VULNAPP-vulnerable-app +- https://github.com/LibHunter/LibHunter - https://github.com/PalindromeLabs/Java-Deserialization-CVEs - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2019/CVE-2019-10241.md b/2019/CVE-2019-10241.md index 2b9cea5160..b559ebcc61 100644 --- a/2019/CVE-2019-10241.md +++ b/2019/CVE-2019-10241.md @@ -17,4 +17,5 @@ In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and olde - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter - https://github.com/DonnumS/inf226Inchat +- https://github.com/LibHunter/LibHunter diff --git a/2019/CVE-2019-10246.md b/2019/CVE-2019-10246.md index 702a4cf4a3..219e46da5f 100644 --- a/2019/CVE-2019-10246.md +++ b/2019/CVE-2019-10246.md @@ -21,4 +21,5 @@ In Eclipse Jetty version 9.2.27, 9.3.26, and 9.4.16, the server running on Windo #### Github - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter diff --git a/2019/CVE-2019-10247.md b/2019/CVE-2019-10247.md index ab0954afde..3a0f0ee753 100644 --- a/2019/CVE-2019-10247.md +++ b/2019/CVE-2019-10247.md @@ -23,4 +23,5 @@ In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.1 - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter - https://github.com/DonnumS/inf226Inchat +- https://github.com/LibHunter/LibHunter diff --git a/2019/CVE-2019-10567.md b/2019/CVE-2019-10567.md index bafac7e7e1..566b7943f8 100644 --- a/2019/CVE-2019-10567.md +++ b/2019/CVE-2019-10567.md @@ -25,5 +25,6 @@ There is a way to deceive the GPU kernel driver into thinking there is room in t - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/secmob/TiYunZong-An-Exploit-Chain-to-Remotely-Root-Modern-Android-Devices - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2019/CVE-2019-10655.md b/2019/CVE-2019-10655.md index 15368a14da..772d16ee8b 100644 --- a/2019/CVE-2019-10655.md +++ b/2019/CVE-2019-10655.md @@ -17,4 +17,5 @@ Grandstream GAC2500 1.0.3.35, GXP2200 1.0.3.27, GVC3202 1.0.3.51, GXV3275 before #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/scarvell/grandstream_exploits diff --git a/2019/CVE-2019-10656.md b/2019/CVE-2019-10656.md index abd02a0ac4..5ba6c8a38d 100644 --- a/2019/CVE-2019-10656.md +++ b/2019/CVE-2019-10656.md @@ -14,4 +14,5 @@ Grandstream GWN7000 before 1.0.6.32 devices allow remote authenticated users to - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 #### Github +- https://github.com/scarvell/grandstream_exploits diff --git a/2019/CVE-2019-10658.md b/2019/CVE-2019-10658.md index 1444942ce0..f64e0ac465 100644 --- a/2019/CVE-2019-10658.md +++ b/2019/CVE-2019-10658.md @@ -14,4 +14,5 @@ Grandstream GWN7610 before 1.0.8.18 devices allow remote authenticated users to - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 #### Github +- https://github.com/scarvell/grandstream_exploits diff --git a/2019/CVE-2019-10659.md b/2019/CVE-2019-10659.md index 3fc2aa34fb..62cb2450d9 100644 --- a/2019/CVE-2019-10659.md +++ b/2019/CVE-2019-10659.md @@ -14,4 +14,5 @@ Grandstream GXV3370 before 1.0.1.41 and WP820 before 1.0.3.6 devices allow remot - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 #### Github +- https://github.com/scarvell/grandstream_exploits diff --git a/2019/CVE-2019-10660.md b/2019/CVE-2019-10660.md index 8f0ff55b03..2f86cd28e0 100644 --- a/2019/CVE-2019-10660.md +++ b/2019/CVE-2019-10660.md @@ -14,4 +14,5 @@ Grandstream GXV3611IR_HD before 1.0.3.23 devices allow remote authenticated user - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 #### Github +- https://github.com/scarvell/grandstream_exploits diff --git a/2019/CVE-2019-10662.md b/2019/CVE-2019-10662.md index 6afb297680..d49113b616 100644 --- a/2019/CVE-2019-10662.md +++ b/2019/CVE-2019-10662.md @@ -14,4 +14,5 @@ Grandstream UCM6204 before 1.0.19.20 devices allow remote authenticated users to - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 #### Github +- https://github.com/scarvell/grandstream_exploits diff --git a/2019/CVE-2019-10936.md b/2019/CVE-2019-10936.md index f2a101d92f..142b95a3ce 100644 --- a/2019/CVE-2019-10936.md +++ b/2019/CVE-2019-10936.md @@ -122,9 +122,7 @@ ### Description -A vulnerability has been identified in SIMATIC S7-400 CPU 414-3 PN/DP V7, SIMATIC S7-400 CPU 414F-3 PN/DP V7, SIMATIC S7-400 CPU 416-3 PN/DP V7, SIMATIC S7-400 CPU 416F-3 PN/DP V7, Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller, Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200, Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P, SIMATIC CFU PA, SIMATIC ET 200pro IM154-8 PN/DP CPU, SIMATIC ET 200pro IM154-8F PN/DP CPU, SIMATIC ET 200pro IM154-8FX PN/DP CPU, SIMATIC ET 200S IM151-8 PN/DP CPU, SIMATIC ET 200S IM151-8F PN/DP CPU, SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants), SIMATIC ET200AL, SIMATIC ET200ecoPN, 16DI, DC24V, 8xM12, SIMATIC ET200ecoPN, 16DO DC24V/1,3A, 8xM12, SIMATIC ET200ecoPN, 4AO U/I 4xM12, SIMATIC ET200ecoPN, 8 DIO, DC24V/1,3A, 8xM12, SIMATIC ET200ecoPN, 8 DO, DC24V/2A, 8xM12, SIMATIC ET200ecoPN, 8AI RTD/TC 8xM12, SIMATIC ET200ecoPN, 8AI; 4 U/I; 4 RTD/TC 8xM12, SIMATIC ET200ecoPN, 8DI, DC24V, 4xM12, SIMATIC ET200ecoPN, 8DI, DC24V, 8xM12, SIMATIC ET200ecoPN, 8DO, DC24V/0,5A, 4xM12, SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 4xM12, SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 8xM12, SIMATIC ET200ecoPN: IO-Link Master, SIMATIC ET200M (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants), SIMATIC ET200pro, SIMATIC ET200S (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants), SIMATIC HMI Comfort Outdoor Panels 7" & 15" (incl. SIPLUS variants), SIMATIC HMI Comfort Panels 4" - 22" (incl. SIPLUS variants), SIMATIC HMI KTP Mobile Panels, SIMATIC PN/PN Coupler, SIMATIC PROFINET Driver, SIMATIC S7-1200 CPU family (incl. SIPLUS variants), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-1500 Software Controller, SIMATIC S7-300 CPU 314C-2 PN/DP, SIMATIC S7-300 CPU 315-2 PN/DP, SIMATIC S7-300 CPU 315F-2 PN/DP, SIMATIC S7-300 CPU 315T-3 PN/DP, SIMATIC S7-300 CPU 317-2 PN/DP, SIMATIC S7-300 CPU 317F-2 PN/DP, SIMATIC S7-300 CPU 317T-3 PN/DP, SIMATIC S7-300 CPU 317TF-3 PN/DP, SIMATIC S7-300 CPU 319-3 PN/DP, SIMATIC S7-300 CPU 319F-3 PN/DP, SIMATIC S7-400 CPU 412-2 PN V7, SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants), SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants), SIMATIC TDC CP51M1, SIMATIC TDC CPU555, SIMATIC WinAC RTX 2010, SIMATIC WinAC RTX F 2010, SINAMICS DCM, SINAMICS DCP, SINAMICS G110M V4.7 PN Control Unit, SINAMICS G120 V4.7 PN Control Unit (incl. SIPLUS variants), SINAMICS G130 V4.7 Control Unit, SINAMICS G150 Control Unit, SINAMICS GH150 V4.7 Control Unit, SINAMICS GL150 V4.7 Control Unit, SINAMICS GM150 V4.7 Control Unit, SINAMICS S110 Control Unit, SINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants), SINAMICS S150 Control Unit, SINAMICS SL150 V4.7 Control Unit, SINAMICS SM120 V4.7 Control Unit, SINUMERIK 828D, SINUMERIK 840D sl, SIPLUS ET 200S IM151-8 PN/DP CPU, SIPLUS ET 200S IM151-8F PN/DP CPU, SIPLUS NET PN/PN Coupler, SIPLUS S7-300 CPU 314C-2 PN/DP, SIPLUS S7-300 CPU 315-2 PN/DP, SIPLUS S7-300 CPU 315F-2 PN/DP, SIPLUS S7-300 CPU 317-2 PN/DP, SIPLUS S7-300 CPU 317F-2 PN/DP, SIPLUS S7-400 CPU 414-3 PN/DP V7, SIPLUS S7-400 CPU 416-3 PN/DP V7. Affected devices improperly handle large amounts of specially crafted UDP packets. - -This could allow an unauthenticated remote attacker to trigger a denial of service condition. +A vulnerability has been identified in SIMATIC S7-400 CPU 414-3 PN/DP V7, SIMATIC S7-400 CPU 414F-3 PN/DP V7, SIMATIC S7-400 CPU 416-3 PN/DP V7, SIMATIC S7-400 CPU 416F-3 PN/DP V7, Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller, Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200, Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P, SIMATIC CFU PA, SIMATIC ET 200pro IM154-8 PN/DP CPU, SIMATIC ET 200pro IM154-8F PN/DP CPU, SIMATIC ET 200pro IM154-8FX PN/DP CPU, SIMATIC ET 200S IM151-8 PN/DP CPU, SIMATIC ET 200S IM151-8F PN/DP CPU, SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants), SIMATIC ET200AL, SIMATIC ET200ecoPN, 16DI, DC24V, 8xM12, SIMATIC ET200ecoPN, 16DO DC24V/1,3A, 8xM12, SIMATIC ET200ecoPN, 4AO U/I 4xM12, SIMATIC ET200ecoPN, 8 DIO, DC24V/1,3A, 8xM12, SIMATIC ET200ecoPN, 8 DO, DC24V/2A, 8xM12, SIMATIC ET200ecoPN, 8AI RTD/TC 8xM12, SIMATIC ET200ecoPN, 8AI; 4 U/I; 4 RTD/TC 8xM12, SIMATIC ET200ecoPN, 8DI, DC24V, 4xM12, SIMATIC ET200ecoPN, 8DI, DC24V, 8xM12, SIMATIC ET200ecoPN, 8DO, DC24V/0,5A, 4xM12, SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 4xM12, SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 8xM12, SIMATIC ET200ecoPN: IO-Link Master, SIMATIC ET200M (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants), SIMATIC ET200pro, SIMATIC ET200S (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants), SIMATIC HMI Comfort Outdoor Panels 7" & 15" (incl. SIPLUS variants), SIMATIC HMI Comfort Panels 4" - 22" (incl. SIPLUS variants), SIMATIC HMI KTP Mobile Panels, SIMATIC PN/PN Coupler, SIMATIC PROFINET Driver, SIMATIC S7-1200 CPU family (incl. SIPLUS variants), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-1500 Software Controller, SIMATIC S7-300 CPU 314C-2 PN/DP, SIMATIC S7-300 CPU 315-2 PN/DP, SIMATIC S7-300 CPU 315F-2 PN/DP, SIMATIC S7-300 CPU 315T-3 PN/DP, SIMATIC S7-300 CPU 317-2 PN/DP, SIMATIC S7-300 CPU 317F-2 PN/DP, SIMATIC S7-300 CPU 317T-3 PN/DP, SIMATIC S7-300 CPU 317TF-3 PN/DP, SIMATIC S7-300 CPU 319-3 PN/DP, SIMATIC S7-300 CPU 319F-3 PN/DP, SIMATIC S7-400 CPU 412-2 PN V7, SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants), SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants), SIMATIC TDC CP51M1, SIMATIC TDC CPU555, SIMATIC WinAC RTX 2010, SIMATIC WinAC RTX F 2010, SINAMICS DCM, SINAMICS DCP, SINAMICS G110M V4.7 PN Control Unit, SINAMICS G120 V4.7 PN Control Unit (incl. SIPLUS variants), SINAMICS G130 V4.7 Control Unit, SINAMICS G150 Control Unit, SINAMICS GH150 V4.7 Control Unit, SINAMICS GL150 V4.7 Control Unit, SINAMICS GM150 V4.7 Control Unit, SINAMICS S110 Control Unit, SINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants), SINAMICS S150 Control Unit, SINAMICS SL150 V4.7 Control Unit, SINAMICS SM120 V4.7 Control Unit, SINUMERIK 828D, SINUMERIK 840D sl, SIPLUS ET 200S IM151-8 PN/DP CPU, SIPLUS ET 200S IM151-8F PN/DP CPU, SIPLUS NET PN/PN Coupler, SIPLUS S7-300 CPU 314C-2 PN/DP, SIPLUS S7-300 CPU 315-2 PN/DP, SIPLUS S7-300 CPU 315F-2 PN/DP, SIPLUS S7-300 CPU 317-2 PN/DP, SIPLUS S7-300 CPU 317F-2 PN/DP, SIPLUS S7-400 CPU 414-3 PN/DP V7, SIPLUS S7-400 CPU 416-3 PN/DP V7. Affected devices improperly handle large amounts of specially crafted UDP packets. This could allow an unauthenticated remote attacker to trigger a denial of service condition. ### POC diff --git a/2019/CVE-2019-11076.md b/2019/CVE-2019-11076.md index b76b7c17d0..0bc28cce87 100644 --- a/2019/CVE-2019-11076.md +++ b/2019/CVE-2019-11076.md @@ -16,4 +16,5 @@ Cribl UI 1.5.0 allows remote attackers to run arbitrary commands via an unauthen - https://github.com/0xT11/CVE-POC - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/livehybrid/poc-cribl-rce diff --git a/2019/CVE-2019-11190.md b/2019/CVE-2019-11190.md index b31859da88..adc270b856 100644 --- a/2019/CVE-2019-11190.md +++ b/2019/CVE-2019-11190.md @@ -26,5 +26,6 @@ The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2019/CVE-2019-11358.md b/2019/CVE-2019-11358.md index 7069cbc32a..b9d93765c0 100644 --- a/2019/CVE-2019-11358.md +++ b/2019/CVE-2019-11358.md @@ -150,6 +150,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/6165-MSET-CuttleFish/PowerPlay - https://github.com/6165-MSET-CuttleFish/SHS_Swerve_Offseason - https://github.com/6369Designosars/Summer_Software_6.2 +- https://github.com/6427FTCRobotics/centerstage6427 - https://github.com/731WannabeeStrange/FTC-731-Powerplay - https://github.com/731WannabeeStrange/centerstage-731 - https://github.com/7390jellyfish/software @@ -1022,6 +1023,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/FTCTeam21217/AutonomousWorkshop - https://github.com/FTCTeam7610-Software/7610-Software-Version-7.1 - https://github.com/FTCTeam7610-Software/7610Software-7.1 +- https://github.com/FTCclueless/Centerstage - https://github.com/FUTURE-FTC10366/FTCFreightFrenzy-2021-22 - https://github.com/FaltechFTC/FtcRobotController2122 - https://github.com/Feyorsh/PASC-FTC-robotCode @@ -1234,6 +1236,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/Indubitably8/Bot24Update - https://github.com/Indubitably8/JakeBot - https://github.com/Indubitably8/JakeBot24 +- https://github.com/Infernal-Industries/AprilTagTesting - https://github.com/Infidge/LeagueMeetsBot - https://github.com/InfinityTechRobotics/IT_2022_Summer_Learning - https://github.com/Infinitybeond1/RobotCode @@ -1429,6 +1432,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/LenickTan/UltimateGoalCode - https://github.com/LenickTan/ultgoal - https://github.com/LeoMavri/RO109-Homosapiens +- https://github.com/LeozinDaProgramacao/TechZeusCenterstage2023-2024 - https://github.com/LiBaoJake/ftcrobotcontrol - https://github.com/LiamWalker01/CrowForce22-23 - https://github.com/LiamWalker01/CrowForce22-23-RobotController8.1.1 @@ -1721,6 +1725,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/OverlakeRobotics/Nocturnal-2020-Ultimate-Goal - https://github.com/OverlakeRobotics/OverlakeFTC-2023-7330 - https://github.com/OverripeBanana/9894_Robolions +- https://github.com/Overture-7421/Hayabusa-2024 - https://github.com/Overture-7421/HayabusaRobotCode_23619 - https://github.com/Owen-Pryga/FtcRobotController_UltamateGoal - https://github.com/Owen383/WM20 @@ -2062,6 +2067,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/Skywalker934/PowerPlay - https://github.com/Skywalker934/video-tutorial - https://github.com/Slipperee-CODE/4625---FTC---POWERPLAY +- https://github.com/Slipperee-CODE/4625-FTC-CenterStage - https://github.com/Slipperee-CODE/4625-FTC-CenterStage2023-2024 - https://github.com/Slipperee-CODE/4625-FTC-Offseason - https://github.com/Slipshodleaf74/Freight-Frenzy @@ -2216,6 +2222,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/The-Founders-Academy/2023-Test-Robot - https://github.com/The-Founders-Academy/2024-Centerstage - https://github.com/The-Founders-Academy/2024-Centerstage-Archived +- https://github.com/The-Founders-Academy/shared-code - https://github.com/The-Innovation-Story/FreightFrenzy_FTC - https://github.com/The-Knights-of-Ni/Skystone2020 - https://github.com/The-Knights-of-Ni/UltimateGoal2021_6.2 @@ -2962,6 +2969,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/frc4039/ftc2024 - https://github.com/frc5050/FTC7901-2021 - https://github.com/frc5050/FTC7902-2021 +- https://github.com/frc6606/ftc-2024 - https://github.com/frc7787/FTC-2023-Robot - https://github.com/frc7787/FTC-Centerstage - https://github.com/frc7787/FTC_AndroidStudio2023 diff --git a/2019/CVE-2019-11510.md b/2019/CVE-2019-11510.md index f1226e223e..eb0f893264 100644 --- a/2019/CVE-2019-11510.md +++ b/2019/CVE-2019-11510.md @@ -67,6 +67,7 @@ In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7 - https://github.com/dnif/content - https://github.com/es0/CVE-2019-11510_poc - https://github.com/fengjixuchui/RedTeamer +- https://github.com/fierceoj/ShonyDanza - https://github.com/gquere/PulseSecure_session_hijacking - https://github.com/hasee2018/Penetration_Testing_POC - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2019/CVE-2019-11523.md b/2019/CVE-2019-11523.md index e88f0f7f96..b34baee75e 100644 --- a/2019/CVE-2019-11523.md +++ b/2019/CVE-2019-11523.md @@ -16,4 +16,5 @@ Anviz Global M3 Outdoor RFID Access Control executes any command received from a - https://github.com/0xT11/CVE-POC - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/wizlab-it/anviz-m3-rfid-cve-2019-11523-poc diff --git a/2019/CVE-2019-11606.md b/2019/CVE-2019-11606.md index a816002f60..f37c823501 100644 --- a/2019/CVE-2019-11606.md +++ b/2019/CVE-2019-11606.md @@ -13,4 +13,5 @@ doorGets 7.0 has a sensitive information disclosure vulnerability in /fileman/ph - https://github.com/itodaro/doorGets_cve #### Github +- https://github.com/itodaro/doorGets_cve diff --git a/2019/CVE-2019-11607.md b/2019/CVE-2019-11607.md index ebfb292c44..b806892a73 100644 --- a/2019/CVE-2019-11607.md +++ b/2019/CVE-2019-11607.md @@ -13,4 +13,5 @@ doorGets 7.0 has a sensitive information disclosure vulnerability in /fileman/ph - https://github.com/itodaro/doorGets_cve #### Github +- https://github.com/itodaro/doorGets_cve diff --git a/2019/CVE-2019-11608.md b/2019/CVE-2019-11608.md index cae9f7bede..1570a20013 100644 --- a/2019/CVE-2019-11608.md +++ b/2019/CVE-2019-11608.md @@ -13,4 +13,5 @@ doorGets 7.0 has a sensitive information disclosure vulnerability in /fileman/ph - https://github.com/itodaro/doorGets_cve #### Github +- https://github.com/itodaro/doorGets_cve diff --git a/2019/CVE-2019-11609.md b/2019/CVE-2019-11609.md index 2bb3572e9c..b6c843a3eb 100644 --- a/2019/CVE-2019-11609.md +++ b/2019/CVE-2019-11609.md @@ -13,4 +13,5 @@ doorGets 7.0 has a sensitive information disclosure vulnerability in /fileman/ph - https://github.com/itodaro/doorGets_cve #### Github +- https://github.com/itodaro/doorGets_cve diff --git a/2019/CVE-2019-11610.md b/2019/CVE-2019-11610.md index 21b8602bff..ba7ec5bdff 100644 --- a/2019/CVE-2019-11610.md +++ b/2019/CVE-2019-11610.md @@ -13,4 +13,5 @@ doorGets 7.0 has a sensitive information disclosure vulnerability in /fileman/ph - https://github.com/itodaro/doorGets_cve #### Github +- https://github.com/itodaro/doorGets_cve diff --git a/2019/CVE-2019-11611.md b/2019/CVE-2019-11611.md index 5b1bbd5fa2..fc0af97159 100644 --- a/2019/CVE-2019-11611.md +++ b/2019/CVE-2019-11611.md @@ -13,4 +13,5 @@ doorGets 7.0 has a sensitive information disclosure vulnerability in /fileman/ph - https://github.com/itodaro/doorGets_cve #### Github +- https://github.com/itodaro/doorGets_cve diff --git a/2019/CVE-2019-11612.md b/2019/CVE-2019-11612.md index 455999ec41..3d191990fc 100644 --- a/2019/CVE-2019-11612.md +++ b/2019/CVE-2019-11612.md @@ -13,4 +13,5 @@ doorGets 7.0 has an arbitrary file deletion vulnerability in /fileman/php/delete - https://github.com/itodaro/doorGets_cve #### Github +- https://github.com/itodaro/doorGets_cve diff --git a/2019/CVE-2019-11613.md b/2019/CVE-2019-11613.md index bbc8ca92e2..45c69678bd 100644 --- a/2019/CVE-2019-11613.md +++ b/2019/CVE-2019-11613.md @@ -13,4 +13,5 @@ doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/views/ajax/conta - https://github.com/itodaro/doorGets_cve #### Github +- https://github.com/itodaro/doorGets_cve diff --git a/2019/CVE-2019-11614.md b/2019/CVE-2019-11614.md index a3fd05967b..fecd90b488 100644 --- a/2019/CVE-2019-11614.md +++ b/2019/CVE-2019-11614.md @@ -13,4 +13,5 @@ doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/views/ajax/comme - https://github.com/itodaro/doorGets_cve #### Github +- https://github.com/itodaro/doorGets_cve diff --git a/2019/CVE-2019-11615.md b/2019/CVE-2019-11615.md index 602277fc8b..db0cba927d 100644 --- a/2019/CVE-2019-11615.md +++ b/2019/CVE-2019-11615.md @@ -13,4 +13,5 @@ - https://github.com/itodaro/doorGets_cve #### Github +- https://github.com/itodaro/doorGets_cve diff --git a/2019/CVE-2019-11616.md b/2019/CVE-2019-11616.md index f222b4b06b..4d9147aeea 100644 --- a/2019/CVE-2019-11616.md +++ b/2019/CVE-2019-11616.md @@ -13,4 +13,5 @@ doorGets 7.0 has a sensitive information disclosure vulnerability in /setup/temp - https://github.com/itodaro/doorGets_cve #### Github +- https://github.com/itodaro/doorGets_cve diff --git a/2019/CVE-2019-11617.md b/2019/CVE-2019-11617.md index 218e035726..1c3d46361a 100644 --- a/2019/CVE-2019-11617.md +++ b/2019/CVE-2019-11617.md @@ -13,4 +13,5 @@ doorGets 7.0 has a CSRF vulnerability in /doorgets/app/requests/user/configurati - https://github.com/itodaro/doorGets_cve #### Github +- https://github.com/itodaro/doorGets_cve diff --git a/2019/CVE-2019-11618.md b/2019/CVE-2019-11618.md index 72f715a88f..d6caaf5588 100644 --- a/2019/CVE-2019-11618.md +++ b/2019/CVE-2019-11618.md @@ -13,4 +13,5 @@ doorGets 7.0 has a default administrator credential vulnerability. A remote atta - https://github.com/itodaro/doorGets_cve #### Github +- https://github.com/itodaro/doorGets_cve diff --git a/2019/CVE-2019-11619.md b/2019/CVE-2019-11619.md index 9edb812145..5f8f31bee2 100644 --- a/2019/CVE-2019-11619.md +++ b/2019/CVE-2019-11619.md @@ -13,4 +13,5 @@ doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/requests/user/co - https://github.com/itodaro/doorGets_cve #### Github +- https://github.com/itodaro/doorGets_cve diff --git a/2019/CVE-2019-11620.md b/2019/CVE-2019-11620.md index e5237ff07e..ecaa52555b 100644 --- a/2019/CVE-2019-11620.md +++ b/2019/CVE-2019-11620.md @@ -13,4 +13,5 @@ doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/requests/user/mo - https://github.com/itodaro/doorGets_cve #### Github +- https://github.com/itodaro/doorGets_cve diff --git a/2019/CVE-2019-11621.md b/2019/CVE-2019-11621.md index d54b12a3e3..dc2eee79a7 100644 --- a/2019/CVE-2019-11621.md +++ b/2019/CVE-2019-11621.md @@ -13,4 +13,5 @@ doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/requests/user/co - https://github.com/itodaro/doorGets_cve #### Github +- https://github.com/itodaro/doorGets_cve diff --git a/2019/CVE-2019-11622.md b/2019/CVE-2019-11622.md index 54f37b9b54..a7ef36af45 100644 --- a/2019/CVE-2019-11622.md +++ b/2019/CVE-2019-11622.md @@ -13,4 +13,5 @@ doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/requests/user/mo - https://github.com/itodaro/doorGets_cve #### Github +- https://github.com/itodaro/doorGets_cve diff --git a/2019/CVE-2019-11623.md b/2019/CVE-2019-11623.md index 65c6c1bbe3..b7a0de8f58 100644 --- a/2019/CVE-2019-11623.md +++ b/2019/CVE-2019-11623.md @@ -13,4 +13,5 @@ doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/requests/user/co - https://github.com/itodaro/doorGets_cve #### Github +- https://github.com/itodaro/doorGets_cve diff --git a/2019/CVE-2019-11624.md b/2019/CVE-2019-11624.md index f3a2c5374e..8759de66c5 100644 --- a/2019/CVE-2019-11624.md +++ b/2019/CVE-2019-11624.md @@ -13,4 +13,5 @@ doorGets 7.0 has an arbitrary file deletion vulnerability in /doorgets/app/reque - https://github.com/itodaro/doorGets_cve #### Github +- https://github.com/itodaro/doorGets_cve diff --git a/2019/CVE-2019-11625.md b/2019/CVE-2019-11625.md index f63b217bf2..40ce793f16 100644 --- a/2019/CVE-2019-11625.md +++ b/2019/CVE-2019-11625.md @@ -13,4 +13,5 @@ doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/requests/user/em - https://github.com/itodaro/doorGets_cve #### Github +- https://github.com/itodaro/doorGets_cve diff --git a/2019/CVE-2019-11626.md b/2019/CVE-2019-11626.md index 0cd7f4bc5d..7490e54316 100644 --- a/2019/CVE-2019-11626.md +++ b/2019/CVE-2019-11626.md @@ -13,4 +13,5 @@ routers/ajaxRouter.php in doorGets 7.0 has a web site physical path leakage vuln - https://github.com/itodaro/doorGets_cve #### Github +- https://github.com/itodaro/doorGets_cve diff --git a/2019/CVE-2019-11881.md b/2019/CVE-2019-11881.md index 96226c5b8b..340a09a02f 100644 --- a/2019/CVE-2019-11881.md +++ b/2019/CVE-2019-11881.md @@ -15,6 +15,7 @@ A vulnerability exists in Rancher 2.1.4 in the login component, where the errorM #### Github - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon +- https://github.com/MauroEldritch/VanCleef - https://github.com/MauroEldritch/mauroeldritch - https://github.com/anquanscan/sec-tools - https://github.com/developer3000S/PoC-in-GitHub diff --git a/2019/CVE-2019-12042.md b/2019/CVE-2019-12042.md index ea718d5a73..7f592c1107 100644 --- a/2019/CVE-2019-12042.md +++ b/2019/CVE-2019-12042.md @@ -13,5 +13,6 @@ Insecure permissions of the section object Global\PandaDevicesAgentSharedMemory - https://github.com/SouhailHammou/Panda-Antivirus-LPE #### Github +- https://github.com/SouhailHammou/Panda-Antivirus-LPE - https://github.com/alphaSeclab/sec-daily-2019 diff --git a/2019/CVE-2019-12086.md b/2019/CVE-2019-12086.md index 8656066948..b6f02be927 100644 --- a/2019/CVE-2019-12086.md +++ b/2019/CVE-2019-12086.md @@ -25,6 +25,7 @@ A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x befo - https://github.com/Al1ex/CVE-2019-12086 - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/SimoLin/CVE-2019-12086-jackson-databind-file-read - https://github.com/SugarP1g/LearningSecurity - https://github.com/codeplutos/CVE-2019-12086-jackson-databind-file-read diff --git a/2019/CVE-2019-12169.md b/2019/CVE-2019-12169.md index 90d6e5ba2b..04b011472e 100644 --- a/2019/CVE-2019-12169.md +++ b/2019/CVE-2019-12169.md @@ -20,6 +20,7 @@ ATutor 2.2.4 allows Arbitrary File Upload and Directory Traversal, resulting in - https://github.com/SexyBeast233/SecBooks - https://github.com/anquanscan/sec-tools - https://github.com/developer3000S/PoC-in-GitHub +- https://github.com/fuzzlove/ATutor-2.2.4-Language-Exploit - https://github.com/fuzzlove/ATutor-Instructor-Backup-Arbitrary-File - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2019/CVE-2019-12170.md b/2019/CVE-2019-12170.md index 8b6c20cc8a..4d241c45b1 100644 --- a/2019/CVE-2019-12170.md +++ b/2019/CVE-2019-12170.md @@ -19,5 +19,6 @@ ATutor through 2.2.4 is vulnerable to arbitrary file uploads via the mods/_core/ - https://github.com/anquanscan/sec-tools - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/fuzzlove/ATutor-2.2.4-Language-Exploit +- https://github.com/fuzzlove/ATutor-Instructor-Backup-Arbitrary-File - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2019/CVE-2019-12402.md b/2019/CVE-2019-12402.md index 514506e400..adcaf41eb7 100644 --- a/2019/CVE-2019-12402.md +++ b/2019/CVE-2019-12402.md @@ -22,4 +22,5 @@ The file name encoding algorithm used internally in Apache Commons Compress 1.15 #### Github - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter diff --git a/2019/CVE-2019-12418.md b/2019/CVE-2019-12418.md index 7cc2d8b7d4..4bf8bfc089 100644 --- a/2019/CVE-2019-12418.md +++ b/2019/CVE-2019-12418.md @@ -15,5 +15,6 @@ When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is conf #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/raner/projo +- https://github.com/versio-io/product-lifecycle-security-api - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough diff --git a/2019/CVE-2019-12476.md b/2019/CVE-2019-12476.md index 77a675183b..d9b6ceae22 100644 --- a/2019/CVE-2019-12476.md +++ b/2019/CVE-2019-12476.md @@ -13,6 +13,7 @@ An authentication bypass vulnerability in the password reset functionality in Zo - https://github.com/0katz/CVE-2019-12476 #### Github +- https://github.com/0katz/CVE-2019-12476 - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon - https://github.com/developer3000S/PoC-in-GitHub diff --git a/2019/CVE-2019-12586.md b/2019/CVE-2019-12586.md index 1a7634bae9..554d35a529 100644 --- a/2019/CVE-2019-12586.md +++ b/2019/CVE-2019-12586.md @@ -22,6 +22,7 @@ The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266 - https://github.com/CVEDB/top - https://github.com/GhostTroops/TOP - https://github.com/JERRY123S/all-poc +- https://github.com/Matheus-Garbelini/esp32_esp8266_attacks - https://github.com/armancs12/esp32_esp8266_attacks - https://github.com/armancswork/esp32_esp8266_attacks - https://github.com/armancwork/esp32_esp8266_attacks diff --git a/2019/CVE-2019-12587.md b/2019/CVE-2019-12587.md index 13ac6dc5eb..a71e02050c 100644 --- a/2019/CVE-2019-12587.md +++ b/2019/CVE-2019-12587.md @@ -21,6 +21,7 @@ The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266 - https://github.com/CVEDB/top - https://github.com/GhostTroops/TOP - https://github.com/JERRY123S/all-poc +- https://github.com/Matheus-Garbelini/esp32_esp8266_attacks - https://github.com/armancs12/esp32_esp8266_attacks - https://github.com/armancswork/esp32_esp8266_attacks - https://github.com/armancwork/esp32_esp8266_attacks diff --git a/2019/CVE-2019-12588.md b/2019/CVE-2019-12588.md index d7caeb221b..f3c54de76f 100644 --- a/2019/CVE-2019-12588.md +++ b/2019/CVE-2019-12588.md @@ -21,6 +21,7 @@ The client 802.11 mac implementation in Espressif ESP8266_NONOS_SDK 2.2.0 throug - https://github.com/CVEDB/top - https://github.com/GhostTroops/TOP - https://github.com/JERRY123S/all-poc +- https://github.com/Matheus-Garbelini/esp32_esp8266_attacks - https://github.com/armancs12/esp32_esp8266_attacks - https://github.com/armancswork/esp32_esp8266_attacks - https://github.com/armancwork/esp32_esp8266_attacks diff --git a/2019/CVE-2019-12813.md b/2019/CVE-2019-12813.md index c50932912b..0752796151 100644 --- a/2019/CVE-2019-12813.md +++ b/2019/CVE-2019-12813.md @@ -15,4 +15,5 @@ An issue was discovered in Digital Persona U.are.U 4500 Fingerprint Reader v24. - https://www.youtube.com/watch?v=wEXJDyEOatM #### Github +- https://github.com/sungjungk/fp-scanner-hacking diff --git a/2019/CVE-2019-12814.md b/2019/CVE-2019-12814.md index 519e9c0d94..9482db4702 100644 --- a/2019/CVE-2019-12814.md +++ b/2019/CVE-2019-12814.md @@ -21,6 +21,7 @@ A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x thro - https://github.com/Anonymous-Phunter/PHunter - https://github.com/BorderTech/java-common - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/SexyBeast233/SecBooks - https://github.com/SugarP1g/LearningSecurity - https://github.com/developer3000S/PoC-in-GitHub diff --git a/2019/CVE-2019-12949.md b/2019/CVE-2019-12949.md index bcba691133..5d8489dffd 100644 --- a/2019/CVE-2019-12949.md +++ b/2019/CVE-2019-12949.md @@ -16,4 +16,5 @@ In pfSense 2.4.4-p2 and 2.4.4-p3, if it is possible to trick an authenticated ad - https://github.com/0xT11/CVE-POC - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/tarantula-team/CVE-2019-12949 diff --git a/2019/CVE-2019-13272.md b/2019/CVE-2019-13272.md index 51986c9e3f..a594161a7a 100644 --- a/2019/CVE-2019-13272.md +++ b/2019/CVE-2019-13272.md @@ -45,6 +45,7 @@ In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the - https://github.com/H0j3n/EzpzCheatSheet - https://github.com/H1CH444MREB0RN/PenTest-free-tools - https://github.com/HaleyWei/POC-available +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/Huandtx/CVE-2019-13272 - https://github.com/ImranTheThirdEye/AD-Pentesting-Tools - https://github.com/JERRY123S/all-poc diff --git a/2019/CVE-2019-13288.md b/2019/CVE-2019-13288.md index 1ac21cb09f..f2f11892e6 100644 --- a/2019/CVE-2019-13288.md +++ b/2019/CVE-2019-13288.md @@ -18,6 +18,7 @@ No PoCs from references. - https://github.com/Fineas/CVE-2019-13288-POC - https://github.com/asur4s/blog - https://github.com/asur4s/fuzzing +- https://github.com/ch1hyun/fuzzing-class - https://github.com/chiehw/fuzzing - https://github.com/gleaming0/CVE-2019-13288 diff --git a/2019/CVE-2019-13603.md b/2019/CVE-2019-13603.md index 7673c8ec92..30e6af6e29 100644 --- a/2019/CVE-2019-13603.md +++ b/2019/CVE-2019-13603.md @@ -15,4 +15,5 @@ An issue was discovered in the HID Global DigitalPersona (formerly Crossmatch) U - https://www.youtube.com/watch?v=wEXJDyEOatM #### Github +- https://github.com/sungjungk/fp-scanner-hacking diff --git a/2019/CVE-2019-13604.md b/2019/CVE-2019-13604.md index 73c50bac2f..1390a48fe9 100644 --- a/2019/CVE-2019-13604.md +++ b/2019/CVE-2019-13604.md @@ -15,4 +15,5 @@ There is a short key vulnerability in HID Global DigitalPersona (formerly Crossm - https://www.youtube.com/watch?v=BwYK_xZlKi4 #### Github +- https://github.com/sungjungk/fp-img-key-crack diff --git a/2019/CVE-2019-13633.md b/2019/CVE-2019-13633.md index 3310da3bdb..6385b2da50 100644 --- a/2019/CVE-2019-13633.md +++ b/2019/CVE-2019-13633.md @@ -13,6 +13,7 @@ Blinger.io v.1.0.2519 is vulnerable to Blind/Persistent XSS. An attacker can sen - https://github.com/Security-AVS/CVE-2019-13633 #### Github +- https://github.com/Security-AVS/CVE-2019-13633 - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2019/CVE-2019-13636.md b/2019/CVE-2019-13636.md index 129d9e8ee9..5f2af689ca 100644 --- a/2019/CVE-2019-13636.md +++ b/2019/CVE-2019-13636.md @@ -15,4 +15,5 @@ In GNU patch through 2.7.6, the following of symlinks is mishandled in certain c - https://seclists.org/bugtraq/2019/Aug/29 #### Github +- https://github.com/irsl/gnu-patch-vulnerabilities diff --git a/2019/CVE-2019-13638.md b/2019/CVE-2019-13638.md index 175049bee7..43e6f2be49 100644 --- a/2019/CVE-2019-13638.md +++ b/2019/CVE-2019-13638.md @@ -15,4 +15,5 @@ GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be - https://seclists.org/bugtraq/2019/Aug/29 #### Github +- https://github.com/irsl/gnu-patch-vulnerabilities diff --git a/2019/CVE-2019-14040.md b/2019/CVE-2019-14040.md index 1509a1210f..8fa471c80c 100644 --- a/2019/CVE-2019-14040.md +++ b/2019/CVE-2019-14040.md @@ -28,5 +28,6 @@ Using memory after being freed in qsee due to wrong implementation can lead to u - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/tamirzb/CVE-2019-14040 +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2019/CVE-2019-14041.md b/2019/CVE-2019-14041.md index 3b87f01fec..709578ab94 100644 --- a/2019/CVE-2019-14041.md +++ b/2019/CVE-2019-14041.md @@ -28,5 +28,6 @@ During listener modified response processing, a buffer overrun occurs due to lac - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/tamirzb/CVE-2019-14041 +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2019/CVE-2019-14326.md b/2019/CVE-2019-14326.md index d2ec743aaa..4fb66282cb 100644 --- a/2019/CVE-2019-14326.md +++ b/2019/CVE-2019-14326.md @@ -18,4 +18,5 @@ An issue was discovered in AndyOS Andy versions up to 46.11.113. By default, it - https://github.com/anquanscan/sec-tools - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/seqred-s-a/cve-2019-14326 diff --git a/2019/CVE-2019-14439.md b/2019/CVE-2019-14439.md index c9524d603b..d8b523e1d4 100644 --- a/2019/CVE-2019-14439.md +++ b/2019/CVE-2019-14439.md @@ -19,6 +19,7 @@ A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x befo - https://github.com/0xT11/CVE-POC - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/diakogiannis/moviebook - https://github.com/galimba/Jackson-deserialization-PoC diff --git a/2019/CVE-2019-14537.md b/2019/CVE-2019-14537.md index 1e2eafc511..a3fd77174e 100644 --- a/2019/CVE-2019-14537.md +++ b/2019/CVE-2019-14537.md @@ -14,6 +14,7 @@ YOURLS through 1.7.3 is affected by a type juggling vulnerability in the api com #### Github - https://github.com/0xT11/CVE-POC +- https://github.com/Wocanilo/CVE-2019-14537 - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2019/CVE-2019-14751.md b/2019/CVE-2019-14751.md index 205374e5a9..5cf6953cf5 100644 --- a/2019/CVE-2019-14751.md +++ b/2019/CVE-2019-14751.md @@ -17,4 +17,5 @@ NLTK Downloader before 3.4.5 is vulnerable to a directory traversal, allowing at - https://github.com/0xT11/CVE-POC - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/mssalvatore/CVE-2019-14751_PoC diff --git a/2019/CVE-2019-14776.md b/2019/CVE-2019-14776.md new file mode 100644 index 0000000000..246027a029 --- /dev/null +++ b/2019/CVE-2019-14776.md @@ -0,0 +1,17 @@ +### [CVE-2019-14776](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A heap-based buffer over-read exists in DemuxInit() in demux/asf/asf.c in VideoLAN VLC media player 3.0.7.1 via a crafted .mkv file. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/ch1hyun/fuzzing-class + diff --git a/2019/CVE-2019-14892.md b/2019/CVE-2019-14892.md index 0bae2992a9..772754f8fa 100644 --- a/2019/CVE-2019-14892.md +++ b/2019/CVE-2019-14892.md @@ -17,6 +17,7 @@ A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 an - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/Live-Hack-CVE/CVE-2019-14892 - https://github.com/OWASP/www-project-ide-vulscanner - https://github.com/PalindromeLabs/Java-Deserialization-CVEs diff --git a/2019/CVE-2019-14893.md b/2019/CVE-2019-14893.md index faf9e745f7..e848940f34 100644 --- a/2019/CVE-2019-14893.md +++ b/2019/CVE-2019-14893.md @@ -18,6 +18,7 @@ A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.1 - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/OWASP/www-project-ide-vulscanner - https://github.com/PalindromeLabs/Java-Deserialization-CVEs - https://github.com/seal-community/patches diff --git a/2019/CVE-2019-15053.md b/2019/CVE-2019-15053.md index 118a9857b5..e0eab37574 100644 --- a/2019/CVE-2019-15053.md +++ b/2019/CVE-2019-15053.md @@ -16,4 +16,5 @@ The "HTML Include and replace macro" plugin before 1.5.0 for Confluence Server a - https://github.com/0xT11/CVE-POC - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/l0nax/CVE-2019-15053 diff --git a/2019/CVE-2019-15120.md b/2019/CVE-2019-15120.md index 67b9e6fca6..88d0ed11d9 100644 --- a/2019/CVE-2019-15120.md +++ b/2019/CVE-2019-15120.md @@ -15,5 +15,6 @@ The Kunena extension before 5.1.14 for Joomla! allows XSS via BBCode. #### Github - https://github.com/0xT11/CVE-POC - https://github.com/developer3000S/PoC-in-GitHub +- https://github.com/h3llraiser/CVE-2019-15120 - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2019/CVE-2019-15233.md b/2019/CVE-2019-15233.md index 8d72f3a1fe..3bbfa86af1 100644 --- a/2019/CVE-2019-15233.md +++ b/2019/CVE-2019-15233.md @@ -16,4 +16,5 @@ The Live:Text Box macro in the Old Street Live Input Macros app before 2.11 for - https://github.com/0xT11/CVE-POC - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/l0nax/CVE-2019-15233 diff --git a/2019/CVE-2019-15666.md b/2019/CVE-2019-15666.md index 88dff043b6..91dd88dbaf 100644 --- a/2019/CVE-2019-15666.md +++ b/2019/CVE-2019-15666.md @@ -16,6 +16,7 @@ An issue was discovered in the Linux kernel before 5.0.19. There is an out-of-bo - https://github.com/Al1ex/LinuxEelvation - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/DrewSC13/Linpeas +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/bsauce/kernel-exploit-factory - https://github.com/bsauce/kernel-security-learning diff --git a/2019/CVE-2019-15949.md b/2019/CVE-2019-15949.md index b8c86c36c6..6993ce4397 100644 --- a/2019/CVE-2019-15949.md +++ b/2019/CVE-2019-15949.md @@ -22,6 +22,7 @@ Nagios XI before 5.6.6 allows remote command execution as root. The exploit requ - https://github.com/catsecorg/CatSec-TryHackMe-WriteUps - https://github.com/dvanmosselbeen/TryHackMe_writeups - https://github.com/hadrian3689/nagiosxi_5.6.6 +- https://github.com/jakgibb/nagiosxi-root-rce-exploit - https://github.com/sunylife24/TryHackMe2 - https://github.com/testermas/tryhackme diff --git a/2019/CVE-2019-16098.md b/2019/CVE-2019-16098.md index 4037df2b2c..8f7f27ac3d 100644 --- a/2019/CVE-2019-16098.md +++ b/2019/CVE-2019-16098.md @@ -17,7 +17,11 @@ The driver in Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCor - https://github.com/0xT11/CVE-POC - https://github.com/474172261/KDU - https://github.com/ARPSyndicate/cvemon +- https://github.com/Barakat/CVE-2019-16098 +- https://github.com/CVEDB/awesome-cve-repo +- https://github.com/CVEDB/top - https://github.com/ExpLife0011/awesome-windows-kernel-security-development +- https://github.com/GhostTroops/TOP - https://github.com/JustaT3ch/Kernel-Snooping - https://github.com/Ondrik8/exploit - https://github.com/developer3000S/PoC-in-GitHub diff --git a/2019/CVE-2019-16508.md b/2019/CVE-2019-16508.md index 781e385318..c225298a96 100644 --- a/2019/CVE-2019-16508.md +++ b/2019/CVE-2019-16508.md @@ -24,5 +24,6 @@ No PoCs from references. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2019/CVE-2019-16869.md b/2019/CVE-2019-16869.md index 78c773651e..e38425df32 100644 --- a/2019/CVE-2019-16869.md +++ b/2019/CVE-2019-16869.md @@ -16,5 +16,6 @@ No PoCs from references. - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/cezapata/appconfiguration-sample diff --git a/2019/CVE-2019-16941.md b/2019/CVE-2019-16941.md index af50cff8b3..bae91d2dd4 100644 --- a/2019/CVE-2019-16941.md +++ b/2019/CVE-2019-16941.md @@ -17,4 +17,5 @@ NSA Ghidra through 9.0.4, when experimental mode is enabled, allows arbitrary co - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/geeksniper/reverse-engineering-toolkit - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/purpleracc00n/CVE-2019-16941 diff --git a/2019/CVE-2019-17124.md b/2019/CVE-2019-17124.md index 9568db07fe..e0c15d6be5 100644 --- a/2019/CVE-2019-17124.md +++ b/2019/CVE-2019-17124.md @@ -17,4 +17,5 @@ Kramer VIAware 2.5.0719.1034 has Incorrect Access Control. - https://github.com/0xT11/CVE-POC - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/hessandrew/CVE-2019-17124 diff --git a/2019/CVE-2019-17267.md b/2019/CVE-2019-17267.md index cbd6f40314..f7a65fe870 100644 --- a/2019/CVE-2019-17267.md +++ b/2019/CVE-2019-17267.md @@ -18,6 +18,7 @@ A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2 - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/OWASP/www-project-ide-vulscanner - https://github.com/ilmari666/cybsec - https://github.com/seal-community/patches diff --git a/2019/CVE-2019-17359.md b/2019/CVE-2019-17359.md index ff20f775ce..16c1cdb126 100644 --- a/2019/CVE-2019-17359.md +++ b/2019/CVE-2019-17359.md @@ -21,6 +21,7 @@ The ASN.1 parser in Bouncy Castle Crypto (aka BC Java) 1.63 can trigger a large - https://github.com/CGCL-codes/PHunter - https://github.com/DennisFeldbusch/Fuzz - https://github.com/GCFuzzer/SP2023 +- https://github.com/LibHunter/LibHunter - https://github.com/hwen020/JQF - https://github.com/mfatima1/CS182 - https://github.com/moudemans/GFuzz diff --git a/2019/CVE-2019-17427.md b/2019/CVE-2019-17427.md index b50c4e6b0d..5cf10a2968 100644 --- a/2019/CVE-2019-17427.md +++ b/2019/CVE-2019-17427.md @@ -14,6 +14,7 @@ In Redmine before 3.4.11 and 4.0.x before 4.0.4, persistent XSS exists due to te #### Github - https://github.com/0xT11/CVE-POC +- https://github.com/RealLinkers/CVE-2019-17427 - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2019/CVE-2019-17563.md b/2019/CVE-2019-17563.md index 1e0cb3bc78..a44ff3c34e 100644 --- a/2019/CVE-2019-17563.md +++ b/2019/CVE-2019-17563.md @@ -18,5 +18,6 @@ When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8 - https://github.com/Live-Hack-CVE/CVE-2019-17563 - https://github.com/raner/projo - https://github.com/rootameen/vulpine +- https://github.com/versio-io/product-lifecycle-security-api - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough diff --git a/2019/CVE-2019-17632.md b/2019/CVE-2019-17632.md index 8957fe81bc..0ec79bccd1 100644 --- a/2019/CVE-2019-17632.md +++ b/2019/CVE-2019-17632.md @@ -16,4 +16,5 @@ In Eclipse Jetty versions 9.4.21.v20190926, 9.4.22.v20191022, and 9.4.23.v201911 #### Github - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter diff --git a/2019/CVE-2019-18675.md b/2019/CVE-2019-18675.md index 73ae970320..1bb38aa40b 100644 --- a/2019/CVE-2019-18675.md +++ b/2019/CVE-2019-18675.md @@ -26,5 +26,6 @@ The Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2019/CVE-2019-18683.md b/2019/CVE-2019-18683.md index e1fdc3dfa5..278c680ca3 100644 --- a/2019/CVE-2019-18683.md +++ b/2019/CVE-2019-18683.md @@ -37,6 +37,7 @@ An issue was discovered in drivers/media/platform/vivid in the Linux kernel thro - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/sanjana123-cloud/CVE-2019-18683 - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xbl3/awesome-cve-poc_qazbnm456 diff --git a/2019/CVE-2019-18885.md b/2019/CVE-2019-18885.md index 8fa79af432..2d8c051d17 100644 --- a/2019/CVE-2019-18885.md +++ b/2019/CVE-2019-18885.md @@ -17,6 +17,7 @@ fs/btrfs/volumes.c in the Linux kernel before 5.1 allows a btrfs_verify_dev_exte #### Github - https://github.com/0xT11/CVE-POC +- https://github.com/bobfuzzer/CVE-2019-18885 - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2019/CVE-2019-18890.md b/2019/CVE-2019-18890.md index 09a1449b6f..38ab706aa8 100644 --- a/2019/CVE-2019-18890.md +++ b/2019/CVE-2019-18890.md @@ -15,6 +15,7 @@ A SQL injection vulnerability in Redmine through 3.2.9 and 3.3.x before 3.3.10 a #### Github - https://github.com/0xT11/CVE-POC - https://github.com/RealLinkers/CVE-2019-17427 +- https://github.com/RealLinkers/CVE-2019-18890 - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2019/CVE-2019-18935.md b/2019/CVE-2019-18935.md index ff98f5dc6a..ff227ca454 100644 --- a/2019/CVE-2019-18935.md +++ b/2019/CVE-2019-18935.md @@ -73,6 +73,7 @@ Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deseria - https://github.com/merlinepedra25/Pentest-Tools-1 - https://github.com/murataydemir/CVE-2019-18935 - https://github.com/nitishbadole/Pentest_Tools +- https://github.com/noperator/CVE-2019-18935 - https://github.com/pathakabhi24/Pentest-Tools - https://github.com/pjgmonteiro/Pentest-tools - https://github.com/qazbnm456/awesome-cve-poc diff --git a/2019/CVE-2019-19012.md b/2019/CVE-2019-19012.md index d99e6e8801..66e77c7632 100644 --- a/2019/CVE-2019-19012.md +++ b/2019/CVE-2019-19012.md @@ -24,5 +24,6 @@ An integer overflow in the search_in_range function in regexec.c in Oniguruma 6. - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/kkos/oniguruma - https://github.com/onivim/esy-oniguruma +- https://github.com/tarantula-team/CVE-2019-19012 - https://github.com/winlibs/oniguruma diff --git a/2019/CVE-2019-19203.md b/2019/CVE-2019-19203.md index d9193ea0c4..f6ec87a0ee 100644 --- a/2019/CVE-2019-19203.md +++ b/2019/CVE-2019-19203.md @@ -17,6 +17,7 @@ An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function gb180 #### Github - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon +- https://github.com/ManhNDd/CVE-2019-19203 - https://github.com/balabit-deps/balabit-os-8-libonig - https://github.com/balabit-deps/balabit-os-9-libonig - https://github.com/deepin-community/libonig @@ -24,5 +25,6 @@ An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function gb180 - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/kkos/oniguruma - https://github.com/onivim/esy-oniguruma +- https://github.com/tarantula-team/CVE-2019-19203 - https://github.com/winlibs/oniguruma diff --git a/2019/CVE-2019-19204.md b/2019/CVE-2019-19204.md index 7317dce31b..212b7b9a50 100644 --- a/2019/CVE-2019-19204.md +++ b/2019/CVE-2019-19204.md @@ -17,6 +17,7 @@ An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch #### Github - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon +- https://github.com/ManhNDd/CVE-2019-19204 - https://github.com/balabit-deps/balabit-os-8-libonig - https://github.com/balabit-deps/balabit-os-9-libonig - https://github.com/deepin-community/libonig @@ -24,5 +25,6 @@ An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/kkos/oniguruma - https://github.com/onivim/esy-oniguruma +- https://github.com/tarantula-team/CVE-2019-19204 - https://github.com/winlibs/oniguruma diff --git a/2019/CVE-2019-19315.md b/2019/CVE-2019-19315.md index 28d08e3379..40f3f26980 100644 --- a/2019/CVE-2019-19315.md +++ b/2019/CVE-2019-19315.md @@ -16,4 +16,5 @@ NLSSRV32.EXE in Nalpeiron Licensing Service 7.3.4.0, as used with Nitro PDF and - https://github.com/0xT11/CVE-POC - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/monoxgas/mailorder diff --git a/2019/CVE-2019-19377.md b/2019/CVE-2019-19377.md index f044e314df..13397c89e4 100644 --- a/2019/CVE-2019-19377.md +++ b/2019/CVE-2019-19377.md @@ -25,5 +25,6 @@ In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performin - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2019/CVE-2019-19393.md b/2019/CVE-2019-19393.md index ac356333c6..759799f4eb 100644 --- a/2019/CVE-2019-19393.md +++ b/2019/CVE-2019-19393.md @@ -16,4 +16,5 @@ The Web application on Rittal CMC PU III 7030.000 V3.00 V3.11.00_2 to V3.15.70_4 - https://github.com/0xT11/CVE-POC - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/miguelhamal/CVE-2019-19393 diff --git a/2019/CVE-2019-19469.md b/2019/CVE-2019-19469.md index f255529cd7..3ecef38628 100644 --- a/2019/CVE-2019-19469.md +++ b/2019/CVE-2019-19469.md @@ -13,4 +13,5 @@ In Zmanda Management Console 3.3.9, ZMC_Admin_Advanced?form=adminTasks&action=Ap - https://github.com/robertchrk/zmanda_exploit #### Github +- https://github.com/robertchrk/zmanda_exploit diff --git a/2019/CVE-2019-19576.md b/2019/CVE-2019-19576.md index 09ae088449..cafdca00b7 100644 --- a/2019/CVE-2019-19576.md +++ b/2019/CVE-2019-19576.md @@ -19,5 +19,6 @@ class.upload.php in verot.net class.upload before 1.0.3 and 2.x before 2.0.4, as - https://github.com/ARPSyndicate/cvemon - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/jra89/CVE-2019-19576 - https://github.com/jra89/CVE-2019-19634 diff --git a/2019/CVE-2019-19634.md b/2019/CVE-2019-19634.md index 2ce7541aef..cb9b831884 100644 --- a/2019/CVE-2019-19634.md +++ b/2019/CVE-2019-19634.md @@ -28,6 +28,7 @@ class.upload.php in verot.net class.upload through 1.0.3 and 2.x through 2.0.4, - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/huike007/penetration_poc - https://github.com/huike007/poc +- https://github.com/jra89/CVE-2019-19634 - https://github.com/lions2012/Penetration_Testing_POC - https://github.com/password520/Penetration_PoC - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC- diff --git a/2019/CVE-2019-19699.md b/2019/CVE-2019-19699.md index 046d265a2c..a38374888c 100644 --- a/2019/CVE-2019-19699.md +++ b/2019/CVE-2019-19699.md @@ -14,6 +14,7 @@ There is Authenticated remote code execution in Centreon Infrastructure Monitori #### Github - https://github.com/0xT11/CVE-POC +- https://github.com/SpengeSec/CVE-2019-19699 - https://github.com/SpengeSec/Centreon-Vulnerable-Images - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2019/CVE-2019-19781.md b/2019/CVE-2019-19781.md index d10922a81d..b057f1200b 100644 --- a/2019/CVE-2019-19781.md +++ b/2019/CVE-2019-19781.md @@ -120,6 +120,7 @@ An issue was discovered in Citrix Application Delivery Controller (ADC) and Gate - https://github.com/faisal6me/DFIR-Note - https://github.com/fcp999/centos - https://github.com/fengjixuchui/RedTeamer +- https://github.com/fierceoj/ShonyDanza - https://github.com/gobysec/Goby - https://github.com/hack-parthsharma/Pentest-Tools - https://github.com/hackingyseguridad/nmap diff --git a/2019/CVE-2019-19889.md b/2019/CVE-2019-19889.md index 807383bf16..4fd9e148a0 100644 --- a/2019/CVE-2019-19889.md +++ b/2019/CVE-2019-19889.md @@ -13,5 +13,6 @@ An issue was discovered on Humax Wireless Voice Gateway HGB10R-2 20160817_1855 d - https://github.com/V1n1v131r4/HGB10R-2 #### Github +- https://github.com/V1n1v131r4/HGB10R-2 - https://github.com/V1n1v131r4/My-CVEs diff --git a/2019/CVE-2019-19890.md b/2019/CVE-2019-19890.md index 6e8087641a..e0e68f361e 100644 --- a/2019/CVE-2019-19890.md +++ b/2019/CVE-2019-19890.md @@ -13,5 +13,6 @@ An issue was discovered on Humax Wireless Voice Gateway HGB10R-2 20160817_1855 d - https://github.com/V1n1v131r4/HGB10R-2 #### Github +- https://github.com/V1n1v131r4/HGB10R-2 - https://github.com/V1n1v131r4/My-CVEs diff --git a/2019/CVE-2019-19967.md b/2019/CVE-2019-19967.md index e6f491eb17..49976a37d9 100644 --- a/2019/CVE-2019-19967.md +++ b/2019/CVE-2019-19967.md @@ -13,4 +13,5 @@ The Administration page on Connect Box EuroDOCSIS 3.0 Voice Gateway CH7465LG-NCI - https://github.com/filipi86/ConnectBoxDOCSIS-3.0 #### Github +- https://github.com/filipi86/ConnectBoxDOCSIS-3.0 diff --git a/2019/CVE-2019-2000.md b/2019/CVE-2019-2000.md index d8111e7767..7adb4d7239 100644 --- a/2019/CVE-2019-2000.md +++ b/2019/CVE-2019-2000.md @@ -24,5 +24,6 @@ In several functions of binder.c, there is possible memory corruption due to a u - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2019/CVE-2019-2025.md b/2019/CVE-2019-2025.md index 892c3d236b..cdf69aa28a 100644 --- a/2019/CVE-2019-2025.md +++ b/2019/CVE-2019-2025.md @@ -26,5 +26,6 @@ No PoCs from references. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2019/CVE-2019-20326.md b/2019/CVE-2019-20326.md index 03a85b733d..75582354f9 100644 --- a/2019/CVE-2019-20326.md +++ b/2019/CVE-2019-20326.md @@ -15,6 +15,7 @@ A heap-based buffer overflow in _cairo_image_surface_create_from_jpeg() in exten #### Github - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon +- https://github.com/Fysac/CVE-2019-20326 - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2019/CVE-2019-20444.md b/2019/CVE-2019-20444.md index 122a08dc20..e0e645ddef 100644 --- a/2019/CVE-2019-20444.md +++ b/2019/CVE-2019-20444.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/cezapata/appconfiguration-sample - https://github.com/yahoo/cubed diff --git a/2019/CVE-2019-20502.md b/2019/CVE-2019-20502.md index 729f68f1b1..1837a4ded7 100644 --- a/2019/CVE-2019-20502.md +++ b/2019/CVE-2019-20502.md @@ -13,4 +13,5 @@ An issue was discovered in EFS Easy Chat Server 3.1. There is a buffer overflow - https://github.com/s1kr10s/EasyChatServer-DOS #### Github +- https://github.com/s1kr10s/EasyChatServer-DOS diff --git a/2019/CVE-2019-2107.md b/2019/CVE-2019-2107.md index 8e7c3ff132..eb201c5131 100644 --- a/2019/CVE-2019-2107.md +++ b/2019/CVE-2019-2107.md @@ -20,6 +20,7 @@ In ihevcd_parse_pps of ihevcd_parse_headers.c, there is a possible out of bounds - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top - https://github.com/CnHack3r/Penetration_PoC +- https://github.com/CrackerCat/CVE-2019-2107 - https://github.com/EchoGin404/- - https://github.com/EchoGin404/gongkaishouji - https://github.com/GhostTroops/TOP diff --git a/2019/CVE-2019-2181.md b/2019/CVE-2019-2181.md index 9171673514..bf826c223b 100644 --- a/2019/CVE-2019-2181.md +++ b/2019/CVE-2019-2181.md @@ -25,5 +25,6 @@ In binder_transaction of binder.c in the Android kernel, there is a possible out - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2019/CVE-2019-2214.md b/2019/CVE-2019-2214.md index c6c8c56e53..aaec58a7e1 100644 --- a/2019/CVE-2019-2214.md +++ b/2019/CVE-2019-2214.md @@ -24,5 +24,6 @@ In binder_transaction of binder.c, there is a possible out of bounds write due t - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2019/CVE-2019-2215.md b/2019/CVE-2019-2215.md index 99b1d61e07..81fcf04352 100644 --- a/2019/CVE-2019-2215.md +++ b/2019/CVE-2019-2215.md @@ -17,6 +17,7 @@ A use-after-free in binder.c allows an elevation of privilege from an applicatio #### Github - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon +- https://github.com/ATorNinja/CVE-2019-2215 - https://github.com/Al1ex/LinuxEelvation - https://github.com/Byte-Master-101/CVE-2019-2215 - https://github.com/CrackerCat/Rootsmart-v2.0 @@ -81,6 +82,7 @@ A use-after-free in binder.c allows an elevation of privilege from an applicatio - https://github.com/timwr/CVE-2019-2215 - https://github.com/wateroot/poc-exp - https://github.com/willboka/CVE-2019-2215-HuaweiP20Lite +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/wrlu/Vulnerabilities - https://github.com/xairy/linux-kernel-exploitation - https://github.com/yud121212/Linux_Privilege_Escalation diff --git a/2019/CVE-2019-25137.md b/2019/CVE-2019-25137.md index 8ee747f567..657af067c9 100644 --- a/2019/CVE-2019-25137.md +++ b/2019/CVE-2019-25137.md @@ -16,4 +16,5 @@ Umbraco CMS 4.11.8 through 7.15.10, and 7.12.4, allows Remote Code Execution by - https://www.exploit-db.com/exploits/46153 #### Github +- https://github.com/Ickarah/CVE-2019-25137-Version-Research diff --git a/2019/CVE-2019-25156.md b/2019/CVE-2019-25156.md new file mode 100644 index 0000000000..7166b3d877 --- /dev/null +++ b/2019/CVE-2019-25156.md @@ -0,0 +1,17 @@ +### [CVE-2019-25156](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25156) +![](https://img.shields.io/static/v1?label=Product&message=Agency&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2061%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross%20Site%20Scripting&color=brighgreen) + +### Description + +A vulnerability classified as problematic was found in dstar2018 Agency up to 61. Affected by this vulnerability is an unknown functionality of the file search.php. The manipulation of the argument QSType/QuickSearch leads to cross site scripting. The attack can be launched remotely. The patch is named 975b56953efabb434519d9feefcc53685fb8d0ab. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-244495. + +### POC + +#### Reference +- https://vuldb.com/?id.244495 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2019/CVE-2019-2618.md b/2019/CVE-2019-2618.md index 6642cb3498..c6d13362bb 100644 --- a/2019/CVE-2019-2618.md +++ b/2019/CVE-2019-2618.md @@ -46,6 +46,7 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/pyn3rd/CVE-2019-2618 - https://github.com/qazbnm456/awesome-cve-poc +- https://github.com/qtgavc/list - https://github.com/r0eXpeR/redteam_vul - https://github.com/reph0r/poc-exp - https://github.com/reph0r/poc-exp-tools diff --git a/2019/CVE-2019-2684.md b/2019/CVE-2019-2684.md index 1ae3d8ce68..221fac1183 100644 --- a/2019/CVE-2019-2684.md +++ b/2019/CVE-2019-2684.md @@ -20,4 +20,5 @@ Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subc - https://github.com/Live-Hack-CVE/CVE-2020-13946 - https://github.com/psifertex/ctf-vs-the-real-world - https://github.com/qtc-de/remote-method-guesser +- https://github.com/versio-io/product-lifecycle-security-api diff --git a/2019/CVE-2019-2729.md b/2019/CVE-2019-2729.md index 3f0a3362f9..16505af292 100644 --- a/2019/CVE-2019-2729.md +++ b/2019/CVE-2019-2729.md @@ -71,6 +71,7 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar - https://github.com/pwnagelabs/VEF - https://github.com/qi4L/WeblogicScan.go - https://github.com/qianxiao996/FrameScan +- https://github.com/qtgavc/list - https://github.com/rabbitmask/WeblogicScan - https://github.com/rabbitmask/WeblogicScanLot - https://github.com/rockmelodies/rocComExpRce diff --git a/2019/CVE-2019-5736.md b/2019/CVE-2019-5736.md index 4c8ef00d79..d3fd782ce5 100644 --- a/2019/CVE-2019-5736.md +++ b/2019/CVE-2019-5736.md @@ -42,6 +42,7 @@ runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allow - https://github.com/ChristineEdgarse/Secrets6 - https://github.com/DataDog/dirtypipe-container-breakout-poc - https://github.com/EvilAnne/2019-Read-article +- https://github.com/Frichetten/CVE-2019-5736-PoC - https://github.com/GhostTroops/TOP - https://github.com/GiverOfGifts/CVE-2019-5736-Custom-Runtime - https://github.com/H3xL00m/CVE-2019-5736 @@ -152,7 +153,9 @@ runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allow - https://github.com/phxvlabsio/core-nexus - https://github.com/psifertex/ctf-vs-the-real-world - https://github.com/pyperanger/dockerevil +- https://github.com/q3k/cve-2019-5736-poc - https://github.com/qazbnm456/awesome-cve-poc +- https://github.com/rancher/runc-cve - https://github.com/readloud/Awesome-Stars - https://github.com/reni2study/Cloud-Native-Security2 - https://github.com/revanmalang/OSCP diff --git a/2019/CVE-2019-5847.md b/2019/CVE-2019-5847.md index 2bd6265901..fa7f0988d4 100644 --- a/2019/CVE-2019-5847.md +++ b/2019/CVE-2019-5847.md @@ -14,6 +14,7 @@ No PoCs from references. #### Github - https://github.com/RUB-SysSec/JIT-Picker +- https://github.com/ch1hyun/fuzzing-class - https://github.com/googleprojectzero/fuzzilli - https://github.com/zhangjiahui-buaa/MasterThesis diff --git a/2019/CVE-2019-5893.md b/2019/CVE-2019-5893.md index 7eb943ed06..6d67fda29b 100644 --- a/2019/CVE-2019-5893.md +++ b/2019/CVE-2019-5893.md @@ -15,5 +15,6 @@ Nelson Open Source ERP v6.3.1 allows SQL Injection via the db/utils/query/data.x #### Github - https://github.com/0xT11/CVE-POC +- https://github.com/EmreOvunc/OpenSource-ERP-SQL-Injection - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2019/CVE-2019-5997.md b/2019/CVE-2019-5997.md index cc1c7be35c..febc29f7ee 100644 --- a/2019/CVE-2019-5997.md +++ b/2019/CVE-2019-5997.md @@ -5,7 +5,7 @@ ### Description -Video Insight VMS versions prior to 7.6.1 allow remote attackers to conduct code injection attacks via unspecified vectors. +Video Insight VMS versions prior to 7.6.1 allow remote attackers to conduct code injection attacks via unspecified vectors. ### POC diff --git a/2019/CVE-2019-6340.md b/2019/CVE-2019-6340.md index 861796e15e..78c517985f 100644 --- a/2019/CVE-2019-6340.md +++ b/2019/CVE-2019-6340.md @@ -72,6 +72,7 @@ Some field types do not properly sanitize data from non-form sources in Drupal 8 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/opflep/Drupalgeddon-Toolkit - https://github.com/oways/CVE-2019-6340 +- https://github.com/pg001001/deception-tech - https://github.com/pinkieli/GitHub-Chinese-Top-Charts - https://github.com/qingyuanfeiniao/Chinese-Top-Charts - https://github.com/resistezauxhackeurs/outils_audit_cms diff --git a/2019/CVE-2019-6447.md b/2019/CVE-2019-6447.md index f1ee123825..67a1c17470 100644 --- a/2019/CVE-2019-6447.md +++ b/2019/CVE-2019-6447.md @@ -41,6 +41,7 @@ The ES File Explorer File Manager application through 4.1.9.7.4 for Android allo - https://github.com/e-hakson/OSCP - https://github.com/eljosep/OSCP-Guide - https://github.com/febinrev/CVE-2019-6447-ESfile-explorer-exploit +- https://github.com/fs0c131y/ESFileExplorerOpenPortVuln - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/julio-cfa/POC-ES-File-Explorer-CVE-2019-6447 - https://github.com/k4u5h41/CVE-2019-6447 diff --git a/2019/CVE-2019-6453.md b/2019/CVE-2019-6453.md index 882ffff928..394d3b03b1 100644 --- a/2019/CVE-2019-6453.md +++ b/2019/CVE-2019-6453.md @@ -24,4 +24,5 @@ mIRC before 7.55 allows remote command execution by using argument injection thr - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/proofofcalc/cve-2019-6453-poc diff --git a/2019/CVE-2019-6973.md b/2019/CVE-2019-6973.md index 7963331e6e..d7481ab055 100644 --- a/2019/CVE-2019-6973.md +++ b/2019/CVE-2019-6973.md @@ -16,4 +16,5 @@ Sricam IP CCTV cameras are vulnerable to denial of service via multiple incomple #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/bitfu/sricam-gsoap2.8-dos-exploit diff --git a/2019/CVE-2019-7308.md b/2019/CVE-2019-7308.md index 6ffd13c3aa..0c4f3975da 100644 --- a/2019/CVE-2019-7308.md +++ b/2019/CVE-2019-7308.md @@ -27,5 +27,6 @@ No PoCs from references. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2019/CVE-2019-9213.md b/2019/CVE-2019-9213.md index 11bcf17f0b..780c154cca 100644 --- a/2019/CVE-2019-9213.md +++ b/2019/CVE-2019-9213.md @@ -33,6 +33,7 @@ In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check - https://github.com/shizhongpwn/Skr_StudyEveryday - https://github.com/soh0ro0t/HappyHackingOnLinux - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xbl3/awesome-cve-poc_qazbnm456 diff --git a/2019/CVE-2019-9500.md b/2019/CVE-2019-9500.md index 3364aaf344..675c66ed51 100644 --- a/2019/CVE-2019-9500.md +++ b/2019/CVE-2019-9500.md @@ -30,6 +30,7 @@ The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xbl3/awesome-cve-poc_qazbnm456 diff --git a/2019/CVE-2019-9503.md b/2019/CVE-2019-9503.md index 808ef79486..99b1a8ba36 100644 --- a/2019/CVE-2019-9503.md +++ b/2019/CVE-2019-9503.md @@ -31,6 +31,7 @@ The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d0403 - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xbl3/awesome-cve-poc_qazbnm456 diff --git a/2019/CVE-2019-9511.md b/2019/CVE-2019-9511.md index 3c204d368b..35c69d1dcb 100644 --- a/2019/CVE-2019-9511.md +++ b/2019/CVE-2019-9511.md @@ -11,6 +11,7 @@ Some HTTP/2 implementations are vulnerable to window size manipulation and strea #### Reference - https://kb.cert.org/vuls/id/605641/ +- https://usn.ubuntu.com/4099-1/ - https://www.oracle.com/security-alerts/cpujan2021.html - https://www.oracle.com/security-alerts/cpuoct2020.html - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html diff --git a/2019/CVE-2019-9513.md b/2019/CVE-2019-9513.md index c58a58a78f..7b44f59b26 100644 --- a/2019/CVE-2019-9513.md +++ b/2019/CVE-2019-9513.md @@ -11,6 +11,7 @@ Some HTTP/2 implementations are vulnerable to resource loops, potentially leadin #### Reference - https://kb.cert.org/vuls/id/605641/ +- https://usn.ubuntu.com/4099-1/ - https://www.oracle.com/security-alerts/cpujan2021.html - https://www.oracle.com/security-alerts/cpuoct2020.html diff --git a/2019/CVE-2019-9516.md b/2019/CVE-2019-9516.md index 18b04647af..cadff082e0 100644 --- a/2019/CVE-2019-9516.md +++ b/2019/CVE-2019-9516.md @@ -11,6 +11,7 @@ Some HTTP/2 implementations are vulnerable to a header leak, potentially leading #### Reference - https://kb.cert.org/vuls/id/605641/ +- https://usn.ubuntu.com/4099-1/ #### Github - https://github.com/ARPSyndicate/cvemon diff --git a/2020/CVE-2020-0022.md b/2020/CVE-2020-0022.md index 81ad62c7ec..592fc6bba3 100644 --- a/2020/CVE-2020-0022.md +++ b/2020/CVE-2020-0022.md @@ -16,6 +16,7 @@ In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bou #### Github - https://github.com/0xT11/CVE-POC - https://github.com/2lambda123/CVE-mitre +- https://github.com/362902755/CVE-2020-0023 - https://github.com/5k1l/cve-2020-0022 - https://github.com/ARPSyndicate/cvemon - https://github.com/JeffroMF/awesome-bluetooth-security321 diff --git a/2020/CVE-2020-0023.md b/2020/CVE-2020-0023.md new file mode 100644 index 0000000000..6c3f786058 --- /dev/null +++ b/2020/CVE-2020-0023.md @@ -0,0 +1,17 @@ +### [CVE-2020-0023](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0023) +![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen) + +### Description + +In setPhonebookAccessPermission of AdapterService.java, there is a possible disclosure of user contacts over bluetooth due to a missing permission check. This could lead to local information disclosure if a malicious app enables contacts over a bluetooth connection, with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-145130871 + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/362902755/CVE-2020-0023 + diff --git a/2020/CVE-2020-0041.md b/2020/CVE-2020-0041.md index fd46d52566..8b25ad715f 100644 --- a/2020/CVE-2020-0041.md +++ b/2020/CVE-2020-0041.md @@ -13,6 +13,7 @@ In binder_transaction of binder.c, there is a possible out of bounds write due t No PoCs from references. #### Github +- https://github.com/0xMarcio/cve - https://github.com/0xT11/CVE-POC - https://github.com/0xZipp0/BIBLE - https://github.com/ARPSyndicate/cvemon @@ -76,6 +77,7 @@ No PoCs from references. - https://github.com/trhacknon/Pocingit - https://github.com/vaginessa/CVE-2020-0041-Pixel-3a - https://github.com/weeka10/-hktalent-TOP +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/yeyintminthuhtut/Awesome-Advanced-Windows-Exploitation-References - https://github.com/yusufazizmustofa/BIBLE diff --git a/2020/CVE-2020-0423.md b/2020/CVE-2020-0423.md index 9eb5acf6c4..131c9c3571 100644 --- a/2020/CVE-2020-0423.md +++ b/2020/CVE-2020-0423.md @@ -29,5 +29,6 @@ No PoCs from references. - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/sparrow-labz/CVE-2020-0423 - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2020/CVE-2020-10135.md b/2020/CVE-2020-10135.md index db9438e612..af02aa5c59 100644 --- a/2020/CVE-2020-10135.md +++ b/2020/CVE-2020-10135.md @@ -24,6 +24,7 @@ Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/engn33r/awesome-bluetooth-security - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/m4rm0k/CVE-2020-10135-BIAS - https://github.com/marcinguy/CVE-2020-10135-BIAS - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/sgxgsx/BlueToolkit diff --git a/2020/CVE-2020-10136.md b/2020/CVE-2020-10136.md index f959518ef2..e4a38ab6ba 100644 --- a/2020/CVE-2020-10136.md +++ b/2020/CVE-2020-10136.md @@ -1,11 +1,11 @@ ### [CVE-2020-10136](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10136) ![](https://img.shields.io/static/v1?label=Product&message=RFC2003%20-%20IP%20Encapsulation%20within%20IP&color=blue) -![](https://img.shields.io/static/v1?label=Version&message=STD%201%3D%20STD%201%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-19%20Data%20Processing%20Errors&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20STD%201%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-290%20Authentication%20Bypass%20by%20Spoofing&color=brighgreen) ### Description -Multiple products that implement the IP Encapsulation within IP standard (RFC 2003, STD 1) decapsulate and route IP-in-IP traffic without any validation, which could allow an unauthenticated remote attacker to route arbitrary traffic via an exposed network interface and lead to spoofing, access control bypass, and other unexpected network behaviors. +IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing. ### POC diff --git a/2020/CVE-2020-10137.md b/2020/CVE-2020-10137.md index 681837f6eb..b041969cd9 100644 --- a/2020/CVE-2020-10137.md +++ b/2020/CVE-2020-10137.md @@ -13,4 +13,5 @@ Z-Wave devices based on Silicon Labs 700 series chipsets using S2 do not adequat - https://github.com/CNK2100/VFuzz-public #### Github +- https://github.com/CNK2100/VFuzz-public diff --git a/2020/CVE-2020-10234.md b/2020/CVE-2020-10234.md index b6c346bd81..1e7efc6248 100644 --- a/2020/CVE-2020-10234.md +++ b/2020/CVE-2020-10234.md @@ -15,4 +15,5 @@ The AscRegistryFilter.sys kernel driver in IObit Advanced SystemCare 13.2 allows #### Github - https://github.com/Arryboom/Kernel-exploits +- https://github.com/FULLSHADE/Kernel-exploits diff --git a/2020/CVE-2020-10560.md b/2020/CVE-2020-10560.md index 257406b650..0464814200 100644 --- a/2020/CVE-2020-10560.md +++ b/2020/CVE-2020-10560.md @@ -15,6 +15,7 @@ An issue was discovered in Open Source Social Network (OSSN) through 5.3. A user #### Github - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon +- https://github.com/LucidUnicorn/CVE-2020-10560-Key-Recovery - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/jandersoncampelo/InfosecBookmarks diff --git a/2020/CVE-2020-10665.md b/2020/CVE-2020-10665.md index f8af0283b7..c47a305a70 100644 --- a/2020/CVE-2020-10665.md +++ b/2020/CVE-2020-10665.md @@ -21,4 +21,5 @@ Docker Desktop allows local privilege escalation to NT AUTHORITY\SYSTEM because - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/soosmile/POC +- https://github.com/spaceraccoon/CVE-2020-10665 diff --git a/2020/CVE-2020-10683.md b/2020/CVE-2020-10683.md index 86d5cc2e8d..07e1189d65 100644 --- a/2020/CVE-2020-10683.md +++ b/2020/CVE-2020-10683.md @@ -23,5 +23,6 @@ dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Enti - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/OWASP/www-project-ide-vulscanner diff --git a/2020/CVE-2020-11108.md b/2020/CVE-2020-11108.md index c22873aa87..a1a5589e9b 100644 --- a/2020/CVE-2020-11108.md +++ b/2020/CVE-2020-11108.md @@ -20,6 +20,7 @@ The Gravity updater in Pi-hole through 4.4 allows an authenticated adversary to #### Github - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon +- https://github.com/Frichetten/CVE-2020-11108-PoC - https://github.com/Frichetten/Frichetten - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2020/CVE-2020-11179.md b/2020/CVE-2020-11179.md index 4c174dbec3..7455607f05 100644 --- a/2020/CVE-2020-11179.md +++ b/2020/CVE-2020-11179.md @@ -25,5 +25,6 @@ Arbitrary read and write to kernel addresses by temporarily overwriting ring buf - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2020/CVE-2020-11549.md b/2020/CVE-2020-11549.md index 35341e9c75..52c7cc55c9 100644 --- a/2020/CVE-2020-11549.md +++ b/2020/CVE-2020-11549.md @@ -14,4 +14,5 @@ An issue was discovered on NETGEAR Orbi Tri-Band Business WiFi Add-on Satellite - https://www.modzero.com/advisories/MZ-20-02-Netgear-Orbi-Pro-Security.txt #### Github +- https://github.com/modzero/MZ-20-02-NETGEAR-Orbi-Security diff --git a/2020/CVE-2020-11550.md b/2020/CVE-2020-11550.md index 2fc241c486..d8d70adaaf 100644 --- a/2020/CVE-2020-11550.md +++ b/2020/CVE-2020-11550.md @@ -14,4 +14,5 @@ An issue was discovered on NETGEAR Orbi Tri-Band Business WiFi Add-on Satellite - https://www.modzero.com/advisories/MZ-20-02-Netgear-Orbi-Pro-Security.txt #### Github +- https://github.com/modzero/MZ-20-02-NETGEAR-Orbi-Security diff --git a/2020/CVE-2020-11551.md b/2020/CVE-2020-11551.md index 75d1ccafd0..f6e50fd67b 100644 --- a/2020/CVE-2020-11551.md +++ b/2020/CVE-2020-11551.md @@ -14,4 +14,5 @@ An issue was discovered on NETGEAR Orbi Tri-Band Business WiFi Add-on Satellite - https://www.modzero.com/advisories/MZ-20-02-Netgear-Orbi-Pro-Security.txt #### Github +- https://github.com/modzero/MZ-20-02-NETGEAR-Orbi-Security diff --git a/2020/CVE-2020-11996.md b/2020/CVE-2020-11996.md index 90f5b6cc4f..ad9b182a75 100644 --- a/2020/CVE-2020-11996.md +++ b/2020/CVE-2020-11996.md @@ -23,5 +23,6 @@ A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/rusakovichma/tomcat-embed-core-9.0.31-CVE-2020-11996 - https://github.com/soosmile/POC +- https://github.com/versio-io/product-lifecycle-security-api - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough diff --git a/2020/CVE-2020-1208.md b/2020/CVE-2020-1208.md index 44f930896f..8d6a71ba1d 100644 --- a/2020/CVE-2020-1208.md +++ b/2020/CVE-2020-1208.md @@ -28,4 +28,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/ferdinandmudjialim/metasploit-cve-search +- https://github.com/tunnelcat/metasploit-cve-search diff --git a/2020/CVE-2020-12112.md b/2020/CVE-2020-12112.md index c9007e5406..004a79befa 100644 --- a/2020/CVE-2020-12112.md +++ b/2020/CVE-2020-12112.md @@ -20,4 +20,5 @@ BigBlueButton before 2.2.5 allows remote attackers to obtain sensitive files via - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/soosmile/POC +- https://github.com/tchenu/CVE-2020-12112 diff --git a/2020/CVE-2020-12122.md b/2020/CVE-2020-12122.md index 392a275348..77bcffb7b8 100644 --- a/2020/CVE-2020-12122.md +++ b/2020/CVE-2020-12122.md @@ -15,4 +15,5 @@ In Max Secure Max Spyware Detector 1.0.0.044, the driver file (MaxProc64.sys) al #### Github - https://github.com/Arryboom/Kernel-exploits +- https://github.com/FULLSHADE/Kernel-exploits diff --git a/2020/CVE-2020-1234.md b/2020/CVE-2020-1234.md index dac361b6ca..e2de4f12cd 100644 --- a/2020/CVE-2020-1234.md +++ b/2020/CVE-2020-1234.md @@ -34,4 +34,5 @@ No PoCs from references. - https://github.com/ivanid22/NVD-scraper - https://github.com/strobes-co/ql-documentation - https://github.com/tahtaciburak/CyAnnuaire +- https://github.com/tunnelcat/metasploit-cve-search diff --git a/2020/CVE-2020-12340.md b/2020/CVE-2020-12340.md index ca28d3df32..e38a5175ed 100644 --- a/2020/CVE-2020-12340.md +++ b/2020/CVE-2020-12340.md @@ -15,4 +15,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/ferdinandmudjialim/metasploit-cve-search +- https://github.com/tunnelcat/metasploit-cve-search diff --git a/2020/CVE-2020-12351.md b/2020/CVE-2020-12351.md index 5d8711893e..2a73cb011c 100644 --- a/2020/CVE-2020-12351.md +++ b/2020/CVE-2020-12351.md @@ -42,5 +42,6 @@ Improper input validation in BlueZ may allow an unauthenticated user to potentia - https://github.com/shannonmullins/hopp - https://github.com/soosmile/POC - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2020/CVE-2020-12352.md b/2020/CVE-2020-12352.md index de02cc6cc4..f13dba9467 100644 --- a/2020/CVE-2020-12352.md +++ b/2020/CVE-2020-12352.md @@ -38,5 +38,6 @@ Improper access control in BlueZ may allow an unauthenticated user to potentiall - https://github.com/sgxgsx/BlueToolkit - https://github.com/shannonmullins/hopp - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2020/CVE-2020-12432.md b/2020/CVE-2020-12432.md index 54cdea8a40..967b9d4f87 100644 --- a/2020/CVE-2020-12432.md +++ b/2020/CVE-2020-12432.md @@ -16,6 +16,7 @@ The WOPI API integration for Vereign Collabora CODE through 4.2.2 does not prope #### Github - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon +- https://github.com/d7x/CVE-2020-12432 - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2020/CVE-2020-12443.md b/2020/CVE-2020-12443.md index f92f1daaf6..27bebaab6c 100644 --- a/2020/CVE-2020-12443.md +++ b/2020/CVE-2020-12443.md @@ -13,4 +13,5 @@ BigBlueButton before 2.2.6 allows remote attackers to read arbitrary files becau - https://github.com/mclab-hbrs/BBB-POC #### Github +- https://github.com/mclab-hbrs/BBB-POC diff --git a/2020/CVE-2020-12695.md b/2020/CVE-2020-12695.md index 580dfc6e8a..2ecfd568fd 100644 --- a/2020/CVE-2020-12695.md +++ b/2020/CVE-2020-12695.md @@ -31,6 +31,7 @@ The Open Connectivity Foundation UPnP specification before 2020-04-17 does not f - https://github.com/ZTK-009/Penetration_PoC - https://github.com/alphaSeclab/sec-daily-2020 - https://github.com/aoeII/asuswrt-for-Tenda-AC9-Router +- https://github.com/corelight/callstranger-detector - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/gaahrdner/starred - https://github.com/hasee2018/Penetration_Testing_POC diff --git a/2020/CVE-2020-12872.md b/2020/CVE-2020-12872.md index 905c6cb9ba..3bd65e0a15 100644 --- a/2020/CVE-2020-12872.md +++ b/2020/CVE-2020-12872.md @@ -15,4 +15,5 @@ yaws_config.erl in Yaws through 2.0.2 and/or 2.0.7 loads obsolete TLS ciphers, a #### Github - https://github.com/Live-Hack-CVE/CVE-2020-12872 +- https://github.com/catsploit/catsploit diff --git a/2020/CVE-2020-1350.md b/2020/CVE-2020-1350.md index b4f6ee8ee7..99fbe81968 100644 --- a/2020/CVE-2020-1350.md +++ b/2020/CVE-2020-1350.md @@ -16,6 +16,7 @@ A remote code execution vulnerability exists in Windows Domain Name System serve - http://packetstormsecurity.com/files/158484/SIGRed-Windows-DNS-Denial-Of-Service.html #### Github +- https://github.com/0xMarcio/cve - https://github.com/0xT11/CVE-POC - https://github.com/20142995/sectool - https://github.com/2lambda123/diaphora @@ -75,6 +76,7 @@ A remote code execution vulnerability exists in Windows Domain Name System serve - https://github.com/mr-r3b00t/CVE-2020-1350 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/password520/Penetration_PoC +- https://github.com/pg001001/deception-tech - https://github.com/psc4re/NSE-scripts - https://github.com/rudraimmunefi/source-code-review - https://github.com/rudrapwn/source-code-review diff --git a/2020/CVE-2020-13757.md b/2020/CVE-2020-13757.md index d6610659aa..7355fb30e7 100644 --- a/2020/CVE-2020-13757.md +++ b/2020/CVE-2020-13757.md @@ -16,4 +16,5 @@ Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/AdiRashkes/python-tda-bug-hunt-0 +- https://github.com/seal-community/patches diff --git a/2020/CVE-2020-13934.md b/2020/CVE-2020-13934.md index 703b0a2214..c02679ae8c 100644 --- a/2020/CVE-2020-13934.md +++ b/2020/CVE-2020-13934.md @@ -17,5 +17,6 @@ An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9. - https://www.oracle.com/security-alerts/cpuoct2020.html #### Github +- https://github.com/versio-io/product-lifecycle-security-api - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough diff --git a/2020/CVE-2020-13935.md b/2020/CVE-2020-13935.md index afc092c0b7..24fb5a1e67 100644 --- a/2020/CVE-2020-13935.md +++ b/2020/CVE-2020-13935.md @@ -21,6 +21,7 @@ The payload length in a WebSocket frame was not correctly validated in Apache To #### Github - https://github.com/0day404/vulnerability-poc +- https://github.com/0xMarcio/cve - https://github.com/20142995/sectool - https://github.com/2lambda123/CVE-mitre - https://github.com/404notf0und/CVE-Flow @@ -53,6 +54,7 @@ The payload length in a WebSocket frame was not correctly validated in Apache To - https://github.com/trganda/dockerv - https://github.com/trganda/starrlist - https://github.com/tzwlhack/Vulnerability +- https://github.com/versio-io/product-lifecycle-security-api - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC- - https://github.com/xuetusummer/Penetration_Testing_POC diff --git a/2020/CVE-2020-13942.md b/2020/CVE-2020-13942.md index 9f5150383a..08b9962cde 100644 --- a/2020/CVE-2020-13942.md +++ b/2020/CVE-2020-13942.md @@ -16,6 +16,7 @@ No PoCs from references. - https://github.com/1135/unomi_exploit - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates +- https://github.com/CLincat/vulcat - https://github.com/EdgeSecurityTeam/Vulnerability - https://github.com/Elsfa7-110/kenzer-templates - https://github.com/HimmelAward/Goby_POC diff --git a/2020/CVE-2020-13943.md b/2020/CVE-2020-13943.md index 4c3db83ace..53e33e01c3 100644 --- a/2020/CVE-2020-13943.md +++ b/2020/CVE-2020-13943.md @@ -15,5 +15,6 @@ If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Live-Hack-CVE/CVE-2020-13943 +- https://github.com/versio-io/product-lifecycle-security-api - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough diff --git a/2020/CVE-2020-14356.md b/2020/CVE-2020-14356.md index 37dd2706ab..cd4100146c 100644 --- a/2020/CVE-2020-14356.md +++ b/2020/CVE-2020-14356.md @@ -28,5 +28,6 @@ A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versio - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2020/CVE-2020-14381.md b/2020/CVE-2020-14381.md index 9c2371feed..73fd2cb330 100644 --- a/2020/CVE-2020-14381.md +++ b/2020/CVE-2020-14381.md @@ -26,5 +26,6 @@ A flaw was found in the Linux kernel’s futex implementation. This flaw allows - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2020/CVE-2020-14386.md b/2020/CVE-2020-14386.md index b2b8242615..70d33f2868 100644 --- a/2020/CVE-2020-14386.md +++ b/2020/CVE-2020-14386.md @@ -50,5 +50,6 @@ A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be ex - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/taielab/awesome-hacking-lists - https://github.com/teamssix/container-escape-check +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2020/CVE-2020-14421.md b/2020/CVE-2020-14421.md index 006fe3d8d6..dbc7bf011c 100644 --- a/2020/CVE-2020-14421.md +++ b/2020/CVE-2020-14421.md @@ -18,4 +18,5 @@ aaPanel through 6.6.6 allows remote authenticated users to execute arbitrary com - https://github.com/ARPSyndicate/cvemon - https://github.com/Orange-Cyberdefense/CVE-repository - https://github.com/Transmetal/CVE-repository-master +- https://github.com/jenaye/aapanel diff --git a/2020/CVE-2020-14882.md b/2020/CVE-2020-14882.md index a38224b144..a6ab5d9907 100644 --- a/2020/CVE-2020-14882.md +++ b/2020/CVE-2020-14882.md @@ -70,6 +70,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware - https://github.com/SouthWind0/southwind0.github.io - https://github.com/Threekiii/Awesome-Exploit - https://github.com/Threekiii/Awesome-POC +- https://github.com/Threekiii/Awesome-Redteam - https://github.com/Threekiii/Vulhub-Reproduce - https://github.com/Umarovm/-Patched-McMaster-University-Blind-Command-Injection - https://github.com/Weik1/Artillery diff --git a/2020/CVE-2020-14950.md b/2020/CVE-2020-14950.md index 0b46eca6c1..1697581c5b 100644 --- a/2020/CVE-2020-14950.md +++ b/2020/CVE-2020-14950.md @@ -16,4 +16,5 @@ aaPanel through 6.6.6 allows remote authenticated users to execute arbitrary com - https://github.com/ARPSyndicate/cvemon - https://github.com/Orange-Cyberdefense/CVE-repository - https://github.com/Transmetal/CVE-repository-master +- https://github.com/jenaye/aapanel diff --git a/2020/CVE-2020-14990.md b/2020/CVE-2020-14990.md index dec2de23ff..a4e188052b 100644 --- a/2020/CVE-2020-14990.md +++ b/2020/CVE-2020-14990.md @@ -14,4 +14,5 @@ IOBit Advanced SystemCare Free 13.5.0.263 allows local users to gain privileges - https://github.com/Daniel-itsec/AdvancedSystemCare #### Github +- https://github.com/Daniel-itsec/AdvancedSystemCare diff --git a/2020/CVE-2020-15367.md b/2020/CVE-2020-15367.md index 3ad8688377..6fd95f5dfe 100644 --- a/2020/CVE-2020-15367.md +++ b/2020/CVE-2020-15367.md @@ -17,6 +17,7 @@ Venki Supravizio BPM 10.1.2 does not limit the number of authentication attempts - https://github.com/ARPSyndicate/cvemon - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/inflixim4be/CVE-2020-15367 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/soosmile/POC diff --git a/2020/CVE-2020-15392.md b/2020/CVE-2020-15392.md index 86b6728f60..55e9993a52 100644 --- a/2020/CVE-2020-15392.md +++ b/2020/CVE-2020-15392.md @@ -18,6 +18,7 @@ A user enumeration vulnerability flaw was found in Venki Supravizio BPM 10.1.2. - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/inflixim4be/CVE-2020-15367 +- https://github.com/inflixim4be/CVE-2020-15392 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/soosmile/POC diff --git a/2020/CVE-2020-15956.md b/2020/CVE-2020-15956.md index 9fa2788b41..d7ec8d173c 100644 --- a/2020/CVE-2020-15956.md +++ b/2020/CVE-2020-15956.md @@ -18,6 +18,7 @@ ActiveMediaServer.exe in ACTi NVR3 Standard Server 3.0.12.42 allows remote unaut - https://github.com/ARPSyndicate/cvemon - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/megamagnus/cve-2020-15956 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/soosmile/POC diff --git a/2020/CVE-2020-16119.md b/2020/CVE-2020-16119.md index ac6b2c8f22..0952920d75 100644 --- a/2020/CVE-2020-16119.md +++ b/2020/CVE-2020-16119.md @@ -25,5 +25,6 @@ Use-after-free vulnerability in the Linux kernel exploitable by a local attacker - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2020/CVE-2020-16270.md b/2020/CVE-2020-16270.md index 3f32476bbb..da45c076c2 100644 --- a/2020/CVE-2020-16270.md +++ b/2020/CVE-2020-16270.md @@ -16,6 +16,7 @@ OLIMPOKS under 3.3.39 allows Auth/Admin ErrorMessage XSS. Remote Attacker can us - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/Elsfa7-110/kenzer-templates +- https://github.com/Security-AVS/CVE-2020-16270 - https://github.com/d4n-sec/d4n-sec.github.io - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2020/CVE-2020-17456.md b/2020/CVE-2020-17456.md index e43594d8ec..00ea6339b0 100644 --- a/2020/CVE-2020-17456.md +++ b/2020/CVE-2020-17456.md @@ -19,6 +19,7 @@ SEOWON INTECH SLC-130 And SLR-120S devices allow Remote Code Execution via the i - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/Al1ex/CVE-2020-17456 +- https://github.com/TAPESH-TEAM/CVE-2020-17456-Seowon-SLR-120S42G-RCE-Exploit-Unauthenticated - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/maj0rmil4d/Seowon-SlC-130-And-SLR-120S-Exploit - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2020/CVE-2020-17527.md b/2020/CVE-2020-17527.md index 95212296a7..de9677863a 100644 --- a/2020/CVE-2020-17527.md +++ b/2020/CVE-2020-17527.md @@ -27,5 +27,6 @@ While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/pctF/vulnerable-app - https://github.com/scordero1234/java_sec_demo-main +- https://github.com/versio-io/product-lifecycle-security-api - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough diff --git a/2020/CVE-2020-18324.md b/2020/CVE-2020-18324.md index 33dd0775d7..b6159a0589 100644 --- a/2020/CVE-2020-18324.md +++ b/2020/CVE-2020-18324.md @@ -13,5 +13,6 @@ Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.1 via the q p - https://github.com/hamm0nz/CVE-2020-18324 #### Github +- https://github.com/hamm0nz/CVE-2020-18324 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2020/CVE-2020-18325.md b/2020/CVE-2020-18325.md index 479df05ae1..e69407c86f 100644 --- a/2020/CVE-2020-18325.md +++ b/2020/CVE-2020-18325.md @@ -13,5 +13,6 @@ Multilple Cross Site Scripting (XSS) vulnerability exists in Intelliants Subrion - https://github.com/hamm0nz/CVE-2020-18325 #### Github +- https://github.com/hamm0nz/CVE-2020-18325 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2020/CVE-2020-18326.md b/2020/CVE-2020-18326.md index 28299d8893..8f727cdfe9 100644 --- a/2020/CVE-2020-18326.md +++ b/2020/CVE-2020-18326.md @@ -13,5 +13,6 @@ Cross Site Request Forgery (CSRF) vulnerability exists in Intelliants Subrion CM - https://github.com/hamm0nz/CVE-2020-18326 #### Github +- https://github.com/hamm0nz/CVE-2020-18326 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2020/CVE-2020-1935.md b/2020/CVE-2020-1935.md index 3ac65bd4cd..f124ddd590 100644 --- a/2020/CVE-2020-1935.md +++ b/2020/CVE-2020-1935.md @@ -18,5 +18,6 @@ In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTT - https://github.com/mklmfane/betvictor - https://github.com/mo-xiaoxi/HDiff - https://github.com/raner/projo +- https://github.com/versio-io/product-lifecycle-security-api - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough diff --git a/2020/CVE-2020-19360.md b/2020/CVE-2020-19360.md index 0ace026c4f..c6941472cf 100644 --- a/2020/CVE-2020-19360.md +++ b/2020/CVE-2020-19360.md @@ -18,6 +18,7 @@ Local file inclusion in FHEM 6.0 allows in fhem/FileLog_logWrapper file paramete - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/ArrestX/--POC +- https://github.com/EmreOvunc/FHEM-6.0-Local-File-Inclusion-LFI-Vulnerability - https://github.com/KayCHENvip/vulnerability-poc - https://github.com/Miraitowa70/POC-Notes - https://github.com/Threekiii/Awesome-POC diff --git a/2020/CVE-2020-19361.md b/2020/CVE-2020-19361.md index 30de4aef74..5919203d93 100644 --- a/2020/CVE-2020-19361.md +++ b/2020/CVE-2020-19361.md @@ -13,4 +13,5 @@ Reflected XSS in Medintux v2.16.000 CCAM.php by manipulating the mot1 parameter - https://github.com/EmreOvunc/Medintux-V2.16.000-Reflected-XSS-Vulnerability #### Github +- https://github.com/EmreOvunc/Medintux-V2.16.000-Reflected-XSS-Vulnerability diff --git a/2020/CVE-2020-19364.md b/2020/CVE-2020-19364.md index 169330a6e2..b985bcb3a5 100644 --- a/2020/CVE-2020-19364.md +++ b/2020/CVE-2020-19364.md @@ -13,4 +13,5 @@ OpenEMR 5.0.1 allows an authenticated attacker to upload and execute malicious P - https://github.com/EmreOvunc/OpenEMR_Vulnerabilities #### Github +- https://github.com/EmreOvunc/OpenEMR_Vulnerabilities diff --git a/2020/CVE-2020-1938.md b/2020/CVE-2020-1938.md index 3f9add2d3a..f628a710ae 100644 --- a/2020/CVE-2020-1938.md +++ b/2020/CVE-2020-1938.md @@ -192,6 +192,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc - https://github.com/tpt11fb/AttackTomcat - https://github.com/uuuuuuuzi/BugRepairsuggestions - https://github.com/veo/vscan +- https://github.com/versio-io/product-lifecycle-security-api - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough - https://github.com/w4fz5uck5/CVE-2020-1938-Clean-Version - https://github.com/weeka10/-hktalent-TOP diff --git a/2020/CVE-2020-1967.md b/2020/CVE-2020-1967.md index ce7ca57f7b..86a24315cb 100644 --- a/2020/CVE-2020-1967.md +++ b/2020/CVE-2020-1967.md @@ -36,6 +36,7 @@ Server or client applications that call the SSL_check_chain() function during or - https://github.com/goharbor/pluggable-scanner-spec - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/hstiwana/cks +- https://github.com/irsl/CVE-2020-1967 - https://github.com/jntass/TASSL-1.1.1k - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/omnibor/bomsh diff --git a/2020/CVE-2020-20093.md b/2020/CVE-2020-20093.md index 00626a42a3..e523980824 100644 --- a/2020/CVE-2020-20093.md +++ b/2020/CVE-2020-20093.md @@ -15,4 +15,5 @@ The Facebook Messenger app for iOS 227.0 and prior and Android 228.1.0.10.116 an #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/zadewg/RIUS diff --git a/2020/CVE-2020-23160.md b/2020/CVE-2020-23160.md index 3572b22279..65124f2ff1 100644 --- a/2020/CVE-2020-23160.md +++ b/2020/CVE-2020-23160.md @@ -14,6 +14,7 @@ Remote code execution in Pyrescom Termod4 time management devices before 10.04k - https://outpost24.com/blog/multiple-vulnerabilities-discovered-in-Pyrescom-Termod4-smart-device #### Github +- https://github.com/Outpost24/Pyrescom-Termod-PoC - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2020/CVE-2020-23161.md b/2020/CVE-2020-23161.md index 02f454e553..d462f8545a 100644 --- a/2020/CVE-2020-23161.md +++ b/2020/CVE-2020-23161.md @@ -14,4 +14,5 @@ Local file inclusion in Pyrescom Termod4 time management devices before 10.04k a - https://outpost24.com/blog/multiple-vulnerabilities-discovered-in-Pyrescom-Termod4-smart-device #### Github +- https://github.com/Outpost24/Pyrescom-Termod-PoC diff --git a/2020/CVE-2020-23162.md b/2020/CVE-2020-23162.md index cd51505ed2..80d24c2791 100644 --- a/2020/CVE-2020-23162.md +++ b/2020/CVE-2020-23162.md @@ -14,4 +14,5 @@ Sensitive information disclosure and weak encryption in Pyrescom Termod4 time ma - https://outpost24.com/blog/multiple-vulnerabilities-discovered-in-Pyrescom-Termod4-smart-device #### Github +- https://github.com/Outpost24/Pyrescom-Termod-PoC diff --git a/2020/CVE-2020-23839.md b/2020/CVE-2020-23839.md index 387f3d6db0..089b3e7c1a 100644 --- a/2020/CVE-2020-23839.md +++ b/2020/CVE-2020-23839.md @@ -19,5 +19,6 @@ A Reflected Cross-Site Scripting (XSS) vulnerability in GetSimple CMS v3.3.16, i - https://github.com/ARPSyndicate/cvemon - https://github.com/Janalytics94/anomaly-detection-software - https://github.com/Live-Hack-CVE/CVE-2020-23839 +- https://github.com/boku7/CVE-2020-23839 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2020/CVE-2020-24007.md b/2020/CVE-2020-24007.md index 965e53bb4f..312a825016 100644 --- a/2020/CVE-2020-24007.md +++ b/2020/CVE-2020-24007.md @@ -13,4 +13,5 @@ Umanni RH 1.0 does not limit the number of authentication attempts. An unauthent - https://github.com/inflixim4be/Brute-Force-on-Umanni-RH #### Github +- https://github.com/inflixim4be/Brute-Force-on-Umanni-RH diff --git a/2020/CVE-2020-24008.md b/2020/CVE-2020-24008.md index fc72dbcad3..52e18dba13 100644 --- a/2020/CVE-2020-24008.md +++ b/2020/CVE-2020-24008.md @@ -13,4 +13,5 @@ Umanni RH 1.0 has a user enumeration vulnerability. This issue occurs during pas - https://github.com/inflixim4be/User-Enumeration-on-Umanni-RH #### Github +- https://github.com/inflixim4be/User-Enumeration-on-Umanni-RH diff --git a/2020/CVE-2020-24033.md b/2020/CVE-2020-24033.md index 8117aeeb36..5b19c333e2 100644 --- a/2020/CVE-2020-24033.md +++ b/2020/CVE-2020-24033.md @@ -15,6 +15,7 @@ An issue was discovered in fs.com S3900 24T4S 1.7.0 and earlier. The form does n #### Github - https://github.com/0xT11/CVE-POC +- https://github.com/M0NsTeRRR/CVE-2020-24033 - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2020/CVE-2020-24379.md b/2020/CVE-2020-24379.md index 47d3f66647..a10949e33d 100644 --- a/2020/CVE-2020-24379.md +++ b/2020/CVE-2020-24379.md @@ -17,4 +17,5 @@ WebDAV implementation in Yaws web server versions 1.81 to 2.0.7 is vulnerable to #### Github - https://github.com/404notf0und/CVE-Flow - https://github.com/Live-Hack-CVE/CVE-2020-24379 +- https://github.com/vulnbe/poc-yaws-dav-xxe diff --git a/2020/CVE-2020-24490.md b/2020/CVE-2020-24490.md index b3740ff88e..e06a1e42c7 100644 --- a/2020/CVE-2020-24490.md +++ b/2020/CVE-2020-24490.md @@ -38,5 +38,6 @@ No PoCs from references. - https://github.com/sgxgsx/BlueToolkit - https://github.com/shannonmullins/hopp - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2020/CVE-2020-24574.md b/2020/CVE-2020-24574.md index 030143e179..30e9af7e61 100644 --- a/2020/CVE-2020-24574.md +++ b/2020/CVE-2020-24574.md @@ -17,4 +17,5 @@ The client (aka GalaxyClientService.exe) in GOG GALAXY through 2.0.41 (as of 12: #### Github - https://github.com/anvilsecure/gog-galaxy-app-research +- https://github.com/jtesta/gog_galaxy_client_service_poc diff --git a/2020/CVE-2020-24765.md b/2020/CVE-2020-24765.md index 5e4edcb0a3..3563418546 100644 --- a/2020/CVE-2020-24765.md +++ b/2020/CVE-2020-24765.md @@ -21,4 +21,5 @@ InterMind iMind Server through 3.13.65 allows remote unauthenticated attackers t - https://github.com/fbkcs/CVE-2020-24765 - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/trump88/CVE-2020-24765 diff --git a/2020/CVE-2020-24916.md b/2020/CVE-2020-24916.md index fa707a6cbf..e156e9bd97 100644 --- a/2020/CVE-2020-24916.md +++ b/2020/CVE-2020-24916.md @@ -17,4 +17,5 @@ CGI implementation in Yaws web server versions 1.81 to 2.0.7 is vulnerable to OS #### Github - https://github.com/404notf0und/CVE-Flow - https://github.com/Live-Hack-CVE/CVE-2020-24916 +- https://github.com/vulnbe/poc-yaws-cgi-shell-injection diff --git a/2020/CVE-2020-25220.md b/2020/CVE-2020-25220.md index 70d82d5f0c..68e48fe03a 100644 --- a/2020/CVE-2020-25220.md +++ b/2020/CVE-2020-25220.md @@ -27,5 +27,6 @@ The Linux kernel 4.9.x before 4.9.233, 4.14.x before 4.14.194, and 4.19.x before - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2020/CVE-2020-25265.md b/2020/CVE-2020-25265.md index dff50513a9..8b7030ad4f 100644 --- a/2020/CVE-2020-25265.md +++ b/2020/CVE-2020-25265.md @@ -16,4 +16,5 @@ AppImage libappimage before 1.0.3 allows attackers to trigger an overwrite of a - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/refi64/CVE-2020-25265-25266 diff --git a/2020/CVE-2020-25266.md b/2020/CVE-2020-25266.md index 278016cb9a..ec67baa215 100644 --- a/2020/CVE-2020-25266.md +++ b/2020/CVE-2020-25266.md @@ -13,4 +13,5 @@ AppImage appimaged before 1.0.3 does not properly check whether a downloaded fil - https://github.com/refi64/CVE-2020-25265-25266 #### Github +- https://github.com/refi64/CVE-2020-25265-25266 diff --git a/2020/CVE-2020-25385.md b/2020/CVE-2020-25385.md index 19b1abb80a..dea2888603 100644 --- a/2020/CVE-2020-25385.md +++ b/2020/CVE-2020-25385.md @@ -13,4 +13,5 @@ Nagios Log Server 2.1.7 contains a cross-site scripting (XSS) vulnerability in / - https://github.com/EmreOvunc/Nagios-Log-Server-2.1.7-Persistent-Cross-Site-Scripting #### Github +- https://github.com/EmreOvunc/Nagios-Log-Server-2.1.7-Persistent-Cross-Site-Scripting diff --git a/2020/CVE-2020-25398.md b/2020/CVE-2020-25398.md index f37aa7fa20..7cd80be0f3 100644 --- a/2020/CVE-2020-25398.md +++ b/2020/CVE-2020-25398.md @@ -14,6 +14,7 @@ CSV Injection exists in InterMind iMind Server through 3.13.65 via the csv expor #### Github - https://github.com/developer3000S/PoC-in-GitHub +- https://github.com/h3llraiser/CVE-2020-25398 - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2020/CVE-2020-25399.md b/2020/CVE-2020-25399.md index c73bc736db..f8dbe83616 100644 --- a/2020/CVE-2020-25399.md +++ b/2020/CVE-2020-25399.md @@ -14,6 +14,7 @@ Stored XSS in InterMind iMind Server through 3.13.65 allows any user to hijack a #### Github - https://github.com/developer3000S/PoC-in-GitHub +- https://github.com/h3llraiser/CVE-2020-25399 - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2020/CVE-2020-25498.md b/2020/CVE-2020-25498.md index 39270b5fa9..7db5d7bfd1 100644 --- a/2020/CVE-2020-25498.md +++ b/2020/CVE-2020-25498.md @@ -18,4 +18,5 @@ Cross Site Scripting (XSS) vulnerability in Beetel router 777VR1 can be exploite - https://github.com/Live-Hack-CVE/CVE-2020-2549 - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/the-girl-who-lived/CVE-2020-25498 diff --git a/2020/CVE-2020-2555.md b/2020/CVE-2020-2555.md index 17e170f8f1..9bcc7e735f 100644 --- a/2020/CVE-2020-2555.md +++ b/2020/CVE-2020-2555.md @@ -23,6 +23,7 @@ Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (compo #### Github - https://github.com/0x727/JNDIExploit +- https://github.com/0xMarcio/cve - https://github.com/0xT11/CVE-POC - https://github.com/0xn0ne/weblogicScanner - https://github.com/20142995/Goby diff --git a/2020/CVE-2020-25658.md b/2020/CVE-2020-25658.md index b0d1ab8472..3eda6ee517 100644 --- a/2020/CVE-2020-25658.md +++ b/2020/CVE-2020-25658.md @@ -15,4 +15,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/AdiRashkes/python-tda-bug-hunt-0 +- https://github.com/seal-community/patches diff --git a/2020/CVE-2020-26061.md b/2020/CVE-2020-26061.md index 50ddecdefd..c2722be37e 100644 --- a/2020/CVE-2020-26061.md +++ b/2020/CVE-2020-26061.md @@ -16,5 +16,6 @@ ClickStudios Passwordstate Password Reset Portal prior to build 8501 is affected - https://github.com/ARPSyndicate/cvemon - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/missing0x00/CVE-2020-26061 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2020/CVE-2020-26732.md b/2020/CVE-2020-26732.md index 3cfac294f1..a89cad5274 100644 --- a/2020/CVE-2020-26732.md +++ b/2020/CVE-2020-26732.md @@ -16,4 +16,5 @@ SKYWORTH GN542VF Hardware Version 2.0 and Software Version 2.0.0.16 does not set - https://github.com/ARPSyndicate/cvemon - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/swzhouu/CVE-2020-26732 diff --git a/2020/CVE-2020-26733.md b/2020/CVE-2020-26733.md index 49086bcce0..a2b465b10f 100644 --- a/2020/CVE-2020-26733.md +++ b/2020/CVE-2020-26733.md @@ -16,4 +16,5 @@ Cross Site Scripting (XSS) in Configuration page in SKYWORTH GN542VF Hardware Ve - https://github.com/ARPSyndicate/cvemon - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/swzhouu/CVE-2020-26733 diff --git a/2020/CVE-2020-26939.md b/2020/CVE-2020-26939.md index 48d328b0fa..9db37ca5ea 100644 --- a/2020/CVE-2020-26939.md +++ b/2020/CVE-2020-26939.md @@ -17,6 +17,7 @@ No PoCs from references. - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter - https://github.com/IkerSaint/VULNAPP-vulnerable-app +- https://github.com/LibHunter/LibHunter - https://github.com/box/box-java-sdk - https://github.com/pctF/vulnerable-app diff --git a/2020/CVE-2020-27194.md b/2020/CVE-2020-27194.md index 844370fad4..83e8806eaa 100644 --- a/2020/CVE-2020-27194.md +++ b/2020/CVE-2020-27194.md @@ -15,6 +15,7 @@ An issue was discovered in the Linux kernel before 5.8.15. scalar32_min_max_or i #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Al1ex/LinuxEelvation +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/OrangeGzY/security-research-learning - https://github.com/XiaozaYa/CVE-Recording @@ -37,6 +38,7 @@ An issue was discovered in the Linux kernel before 5.8.15. scalar32_min_max_or i - https://github.com/scannells/exploits - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/willinin/CVE-2020-27194-exp +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xmzyshypnc/CVE-2020-27194 diff --git a/2020/CVE-2020-27352.md b/2020/CVE-2020-27352.md new file mode 100644 index 0000000000..be4a7aedd5 --- /dev/null +++ b/2020/CVE-2020-27352.md @@ -0,0 +1,20 @@ +### [CVE-2020-27352](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27352) +![](https://img.shields.io/static/v1?label=Product&message=snapd&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.48.3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading system units. This may grant additional privileges to a container within the snap that were not originally intended. + +### POC + +#### Reference +- https://bugs.launchpad.net/snapd/+bug/1910456 + +#### Github +- https://github.com/43622283/awesome-cloud-native-security +- https://github.com/Metarget/awesome-cloud-native-security +- https://github.com/atesemre/awesome-cloud-native-security +- https://github.com/reni2study/Cloud-Native-Security2 + diff --git a/2020/CVE-2020-27368.md b/2020/CVE-2020-27368.md index d8f2dcdfd5..3f69267e2c 100644 --- a/2020/CVE-2020-27368.md +++ b/2020/CVE-2020-27368.md @@ -16,4 +16,5 @@ Directory Indexing in Login Portal of Login Portal of TOTOLINK-A702R-V1.0.0-B201 - https://github.com/ARPSyndicate/cvemon - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/swzhouu/CVE-2020-27368 diff --git a/2020/CVE-2020-27688.md b/2020/CVE-2020-27688.md index 8a598c4e03..4fc8e89f47 100644 --- a/2020/CVE-2020-27688.md +++ b/2020/CVE-2020-27688.md @@ -16,5 +16,6 @@ RVToolsPasswordEncryption.exe in RVTools 4.0.6 allows users to encrypt passwords - https://github.com/ARPSyndicate/cvemon - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/matthiasmaes/CVE-2020-27688 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2020/CVE-2020-27786.md b/2020/CVE-2020-27786.md index 1fc43388f7..8a133cf11b 100644 --- a/2020/CVE-2020-27786.md +++ b/2020/CVE-2020-27786.md @@ -32,5 +32,6 @@ A flaw was found in the Linux kernel’s implementation of MIDI, where an attack - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2020/CVE-2020-28052.md b/2020/CVE-2020-28052.md index 6e2baf947b..befb23a293 100644 --- a/2020/CVE-2020-28052.md +++ b/2020/CVE-2020-28052.md @@ -21,6 +21,7 @@ An issue was discovered in Legion of the Bouncy Castle BC Java 1.65 and 1.66. Th - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/Live-Hack-CVE/CVE-2020-2805 - https://github.com/Live-Hack-CVE/CVE-2020-28052 - https://github.com/alphaSeclab/sec-daily-2020 diff --git a/2020/CVE-2020-28328.md b/2020/CVE-2020-28328.md index 0b323c6d74..efe5154df2 100644 --- a/2020/CVE-2020-28328.md +++ b/2020/CVE-2020-28328.md @@ -19,5 +19,6 @@ SuiteCRM before 7.11.17 is vulnerable to remote code execution via the system se - https://github.com/ARPSyndicate/cvemon - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/mcorybillington/SuiteCRM-RCE - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2020/CVE-2020-28343.md b/2020/CVE-2020-28343.md index 89b8be7b44..cfa347a251 100644 --- a/2020/CVE-2020-28343.md +++ b/2020/CVE-2020-28343.md @@ -24,5 +24,6 @@ An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) (Exyno - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2020/CVE-2020-28373.md b/2020/CVE-2020-28373.md index bffaa5120f..40e68e580f 100644 --- a/2020/CVE-2020-28373.md +++ b/2020/CVE-2020-28373.md @@ -13,5 +13,6 @@ upnpd on certain NETGEAR devices allows remote (LAN) attackers to execute arbitr - https://github.com/cpeggg/Netgear-upnpd-poc #### Github +- https://github.com/cpeggg/Netgear-upnpd-poc - https://github.com/peanuts62/IOT_CVE diff --git a/2020/CVE-2020-28588.md b/2020/CVE-2020-28588.md index 50f4d91509..8e88496aaf 100644 --- a/2020/CVE-2020-28588.md +++ b/2020/CVE-2020-28588.md @@ -24,5 +24,6 @@ An information disclosure vulnerability exists in the /proc/pid/syscall function - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2020/CVE-2020-2883.md b/2020/CVE-2020-2883.md index c81308bcff..d53dd42b89 100644 --- a/2020/CVE-2020-2883.md +++ b/2020/CVE-2020-2883.md @@ -15,6 +15,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware #### Github - https://github.com/0x727/JNDIExploit +- https://github.com/0xMarcio/cve - https://github.com/0xT11/CVE-POC - https://github.com/0xdu/WLExploit - https://github.com/0xn0ne/weblogicScanner diff --git a/2020/CVE-2020-29007.md b/2020/CVE-2020-29007.md index d613d4a46e..8fa7035b0c 100644 --- a/2020/CVE-2020-29007.md +++ b/2020/CVE-2020-29007.md @@ -21,4 +21,5 @@ The Score extension through 0.3.0 for MediaWiki has a remote code execution vuln - https://github.com/mariodon/GeekGame-2nd-Writeup - https://github.com/mbiel92/Hugo-MB - https://github.com/mmiszczyk/lilypond-scheme-hacking +- https://github.com/seqred-s-a/cve-2020-29007 diff --git a/2020/CVE-2020-3452.md b/2020/CVE-2020-3452.md index 952b4ebd67..819504b0fd 100644 --- a/2020/CVE-2020-3452.md +++ b/2020/CVE-2020-3452.md @@ -85,6 +85,7 @@ A vulnerability in the web services interface of Cisco Adaptive Security Applian - https://github.com/dwisiswant0/awesome-oneliner-bugbounty - https://github.com/faisalfs10x/Cisco-CVE-2020-3452-shodan-scanner - https://github.com/faisalfs10x/dirty-scripts +- https://github.com/fierceoj/ShonyDanza - https://github.com/foulenzer/CVE-2020-3452 - https://github.com/fuzzlove/Cisco-ASA-FTD-Web-Services-Traversal - https://github.com/grim3/CVE-2020-3452 diff --git a/2020/CVE-2020-35262.md b/2020/CVE-2020-35262.md index a893ce2acf..68a2f62528 100644 --- a/2020/CVE-2020-35262.md +++ b/2020/CVE-2020-35262.md @@ -17,4 +17,5 @@ Cross Site Scripting (XSS) vulnerability in Digisol DG-HR3400 can be exploited v - https://github.com/ARPSyndicate/cvemon - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/the-girl-who-lived/CVE-2020-35262 diff --git a/2020/CVE-2020-35488.md b/2020/CVE-2020-35488.md index 8f4b5bcd81..b6f34925a3 100644 --- a/2020/CVE-2020-35488.md +++ b/2020/CVE-2020-35488.md @@ -14,6 +14,7 @@ The fileop module of the NXLog service in NXLog Community Edition 2.10.2150 allo #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/GuillaumePetit84/CVE-2020-35488 - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/githubfoam/nxlog-ubuntu-githubactions - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2020/CVE-2020-36180.md b/2020/CVE-2020-36180.md index 83ccfa10b9..ca1ff9df6e 100644 --- a/2020/CVE-2020-36180.md +++ b/2020/CVE-2020-36180.md @@ -23,5 +23,6 @@ FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction betwee - https://github.com/Al1ex/Al1ex - https://github.com/Al1ex/CVE-2020-36179 - https://github.com/Live-Hack-CVE/CVE-2020-36180 +- https://github.com/enomothem/PenTestNote - https://github.com/seal-community/patches diff --git a/2020/CVE-2020-36182.md b/2020/CVE-2020-36182.md index 1ad4410432..bea0748eb6 100644 --- a/2020/CVE-2020-36182.md +++ b/2020/CVE-2020-36182.md @@ -24,6 +24,7 @@ FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction betwee - https://github.com/Al1ex/CVE-2020-36179 - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/Live-Hack-CVE/CVE-2020-36182 - https://github.com/seal-community/patches diff --git a/2020/CVE-2020-3680.md b/2020/CVE-2020-3680.md index 51b3c2043d..c59b9d7729 100644 --- a/2020/CVE-2020-3680.md +++ b/2020/CVE-2020-3680.md @@ -25,5 +25,6 @@ A race condition can occur when using the fastrpc memory mapping API. in Snapdra - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2020/CVE-2020-3952.md b/2020/CVE-2020-3952.md index 40c23e9510..f34cbabbe9 100644 --- a/2020/CVE-2020-3952.md +++ b/2020/CVE-2020-3952.md @@ -13,6 +13,7 @@ Under certain conditions, vmdir that ships with VMware vCenter Server, as part o - http://packetstormsecurity.com/files/157896/VMware-vCenter-Server-6.7-Authentication-Bypass.html #### Github +- https://github.com/0xMarcio/cve - https://github.com/0xMrNiko/Awesome-Red-Teaming - https://github.com/0xT11/CVE-POC - https://github.com/20142995/sectool diff --git a/2020/CVE-2020-3956.md b/2020/CVE-2020-3956.md index 5bdbdf7714..ec3c9f79af 100644 --- a/2020/CVE-2020-3956.md +++ b/2020/CVE-2020-3956.md @@ -17,6 +17,7 @@ VMware Cloud Director 10.0.x before 10.0.0.2, 9.7.0.x before 9.7.0.5, 9.5.0.x be #### Github - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon +- https://github.com/aaronsvk/CVE-2020-3956 - https://github.com/alphaSeclab/sec-daily-2020 - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2020/CVE-2020-5844.md b/2020/CVE-2020-5844.md index 22065cf8a3..95522a7156 100644 --- a/2020/CVE-2020-5844.md +++ b/2020/CVE-2020-5844.md @@ -18,6 +18,7 @@ index.php?sec=godmode/extensions&sec2=extensions/files_repo in Pandora FMS v7.0 - https://github.com/1Gould/CVE-2020-5844-exploit - https://github.com/ARPSyndicate/cvemon - https://github.com/Live-Hack-CVE/CVE-2020-5844 +- https://github.com/TheCyberGeek/CVE-2020-5844 - https://github.com/UNICORDev/exploit-CVE-2020-5844 - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2020/CVE-2020-5902.md b/2020/CVE-2020-5902.md index cbc7afec7a..73c23ca4eb 100644 --- a/2020/CVE-2020-5902.md +++ b/2020/CVE-2020-5902.md @@ -149,6 +149,7 @@ In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12. - https://github.com/emtee40/win-pentest-tools - https://github.com/f5devcentral/cve-2020-5902-ioc-bigip-checker - https://github.com/faisalfs10x/F5-BIG-IP-CVE-2020-5902-shodan-scanner +- https://github.com/fierceoj/ShonyDanza - https://github.com/freeFV/CVE-2020-5902-fofa-scan - https://github.com/freeFV/CVE-2020-6308-mass-exploiter - https://github.com/gaahrdner/starred diff --git a/2020/CVE-2020-6427.md b/2020/CVE-2020-6427.md index c86d4f9198..7d072d2fbf 100644 --- a/2020/CVE-2020-6427.md +++ b/2020/CVE-2020-6427.md @@ -15,4 +15,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/ferdinandmudjialim/metasploit-cve-search +- https://github.com/tunnelcat/metasploit-cve-search diff --git a/2020/CVE-2020-7693.md b/2020/CVE-2020-7693.md index 4b17cee7a2..fe97916c8d 100644 --- a/2020/CVE-2020-7693.md +++ b/2020/CVE-2020-7693.md @@ -17,6 +17,7 @@ Incorrect handling of Upgrade header with the value websocket leads in crashing #### Github - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon +- https://github.com/andsnw/sockjs-dos-py - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2020/CVE-2020-7934.md b/2020/CVE-2020-7934.md index 5943ace1fc..94636c2777 100644 --- a/2020/CVE-2020-7934.md +++ b/2020/CVE-2020-7934.md @@ -15,6 +15,7 @@ In LifeRay Portal CE 7.1.0 through 7.2.1 GA2, the First Name, Middle Name, and L - https://semanticbits.com/liferay-portal-authenticated-xss-disclosure/ #### Github +- https://github.com/3ndG4me/liferay-xss-7.2.1GA2-poc-report-CVE-2020-7934 - https://github.com/ARPSyndicate/cvemon - https://github.com/Sergio235705/audit-xss-cve-2020-7934 - https://github.com/developer3000S/PoC-in-GitHub diff --git a/2020/CVE-2020-7980.md b/2020/CVE-2020-7980.md index d90a460c67..db8f8cd349 100644 --- a/2020/CVE-2020-7980.md +++ b/2020/CVE-2020-7980.md @@ -19,6 +19,7 @@ Intellian Aptus Web 1.24 allows remote attackers to execute arbitrary OS command - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/HimmelAward/Goby_POC +- https://github.com/Xh4H/Satellian-CVE-2020-7980 - https://github.com/Z0fhack/Goby_POC - https://github.com/apachecn-archive/Middleware-Vulnerability-detection - https://github.com/hectorgie/PoC-in-GitHub diff --git a/2020/CVE-2020-8022.md b/2020/CVE-2020-8022.md index 17a8b7825f..3a7e5f9bca 100644 --- a/2020/CVE-2020-8022.md +++ b/2020/CVE-2020-8022.md @@ -28,5 +28,6 @@ A Incorrect Default Permissions vulnerability in the packaging of tomcat on SUSE No PoCs from references. #### Github +- https://github.com/versio-io/product-lifecycle-security-api - https://github.com/vincent-deng/veracode-container-security-finding-parser diff --git a/2020/CVE-2020-8130.md b/2020/CVE-2020-8130.md index bab3402837..c90fce6594 100644 --- a/2020/CVE-2020-8130.md +++ b/2020/CVE-2020-8130.md @@ -14,6 +14,7 @@ There is an OS command injection vulnerability in Ruby Rake < 12.3.3 in Rake::Fi #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/m-mizutani/octovy - https://github.com/m-mizutani/triview - https://github.com/wxianfeng/hanzi_to_pinyin diff --git a/2020/CVE-2020-8504.md b/2020/CVE-2020-8504.md index d32a4fde57..cd42a24f9d 100644 --- a/2020/CVE-2020-8504.md +++ b/2020/CVE-2020-8504.md @@ -13,4 +13,5 @@ School Management Software PHP/mySQL through 2019-03-14 allows office_admin/?act - https://github.com/J3rryBl4nks/SchoolERPCSRF #### Github +- https://github.com/J3rryBl4nks/SchoolERPCSRF diff --git a/2020/CVE-2020-8505.md b/2020/CVE-2020-8505.md index 2752eb7162..225afec3ee 100644 --- a/2020/CVE-2020-8505.md +++ b/2020/CVE-2020-8505.md @@ -13,4 +13,5 @@ School Management Software PHP/mySQL through 2019-03-14 allows office_admin/?act - https://github.com/J3rryBl4nks/SchoolERPCSRF #### Github +- https://github.com/J3rryBl4nks/SchoolERPCSRF diff --git a/2020/CVE-2020-8597.md b/2020/CVE-2020-8597.md index 18c35f6701..8c4f478584 100644 --- a/2020/CVE-2020-8597.md +++ b/2020/CVE-2020-8597.md @@ -30,6 +30,7 @@ eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the - https://github.com/YIXINSHUWU/Penetration_Testing_POC - https://github.com/ZTK-009/Penetration_PoC - https://github.com/developer3000S/PoC-in-GitHub +- https://github.com/dointisme/CVE-2020-8597 - https://github.com/hasee2018/Penetration_Testing_POC - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/hktalent/bug-bounty diff --git a/2020/CVE-2020-8825.md b/2020/CVE-2020-8825.md index 824f430947..64c001c19e 100644 --- a/2020/CVE-2020-8825.md +++ b/2020/CVE-2020-8825.md @@ -17,6 +17,7 @@ index.php?p=/dashboard/settings/branding in Vanilla 2.6.3 allows stored XSS. - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon - https://github.com/developer3000S/PoC-in-GitHub +- https://github.com/hacky1997/CVE-2020-8825 - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/soosmile/POC diff --git a/2020/CVE-2020-8835.md b/2020/CVE-2020-8835.md index 24dd4bf811..6ec3d19cfe 100644 --- a/2020/CVE-2020-8835.md +++ b/2020/CVE-2020-8835.md @@ -18,6 +18,7 @@ In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) di - https://github.com/ARPSyndicate/cvemon - https://github.com/Al1ex/LinuxEelvation - https://github.com/De4dCr0w/Linux-kernel-EoP-exp +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/KatsuragiCSL/Presentations-Blogs-Papers-Tutorials-Books - https://github.com/OrangeGzY/security-research-learning @@ -47,6 +48,7 @@ In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) di - https://github.com/snorez/ebpf-fuzzer - https://github.com/soosmile/POC - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xmzyshypnc/CVE-2020-27194 - https://github.com/yoniko/gctf21_ebpf diff --git a/2020/CVE-2020-8840.md b/2020/CVE-2020-8840.md index de3603f5e2..f1a0f56647 100644 --- a/2020/CVE-2020-8840.md +++ b/2020/CVE-2020-8840.md @@ -28,6 +28,7 @@ FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JN - https://github.com/EchoGin404/- - https://github.com/EchoGin404/gongkaishouji - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet +- https://github.com/LibHunter/LibHunter - https://github.com/Mr-xn/Penetration_Testing_POC - https://github.com/NetW0rK1le3r/awesome-hacking-lists - https://github.com/OWASP/www-project-ide-vulscanner diff --git a/2020/CVE-2020-9014.md b/2020/CVE-2020-9014.md index 5501c574d7..0b13e633fd 100644 --- a/2020/CVE-2020-9014.md +++ b/2020/CVE-2020-9014.md @@ -16,5 +16,6 @@ In Epson iProjection v2.30, the driver file (EMP_NSAU.sys) allows local users to #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Arryboom/Kernel-exploits +- https://github.com/FULLSHADE/Kernel-exploits - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2020/CVE-2020-9057.md b/2020/CVE-2020-9057.md index cf3afd24d6..88cecd7d15 100644 --- a/2020/CVE-2020-9057.md +++ b/2020/CVE-2020-9057.md @@ -18,4 +18,5 @@ Z-Wave devices based on Silicon Labs 100, 200, and 300 series chipsets do not su - https://github.com/CNK2100/VFuzz-public #### Github +- https://github.com/CNK2100/VFuzz-public diff --git a/2020/CVE-2020-9058.md b/2020/CVE-2020-9058.md index e029fe2e07..bc1102e466 100644 --- a/2020/CVE-2020-9058.md +++ b/2020/CVE-2020-9058.md @@ -19,4 +19,5 @@ Z-Wave devices based on Silicon Labs 500 series chipsets using CRC-16 encapsulat - https://github.com/CNK2100/VFuzz-public #### Github +- https://github.com/CNK2100/VFuzz-public diff --git a/2020/CVE-2020-9059.md b/2020/CVE-2020-9059.md index f384eacde4..684dc8238e 100644 --- a/2020/CVE-2020-9059.md +++ b/2020/CVE-2020-9059.md @@ -15,5 +15,6 @@ Z-Wave devices based on Silicon Labs 500 series chipsets using S0 authentication - https://github.com/CNK2100/VFuzz-public #### Github +- https://github.com/CNK2100/VFuzz-public - https://github.com/Live-Hack-CVE/CVE-2020-9059 diff --git a/2020/CVE-2020-9060.md b/2020/CVE-2020-9060.md index c329e138de..27048dbbaa 100644 --- a/2020/CVE-2020-9060.md +++ b/2020/CVE-2020-9060.md @@ -23,5 +23,6 @@ Z-Wave devices based on Silicon Labs 500 series chipsets using S2, including but - https://github.com/CNK2100/VFuzz-public #### Github +- https://github.com/CNK2100/VFuzz-public - https://github.com/Live-Hack-CVE/CVE-2020-9060 diff --git a/2020/CVE-2020-9061.md b/2020/CVE-2020-9061.md index 88c34e293d..2225d8a65e 100644 --- a/2020/CVE-2020-9061.md +++ b/2020/CVE-2020-9061.md @@ -21,4 +21,5 @@ Z-Wave devices using Silicon Labs 500 and 700 series chipsets, including but not - https://github.com/CNK2100/VFuzz-public #### Github +- https://github.com/CNK2100/VFuzz-public diff --git a/2020/CVE-2020-9380.md b/2020/CVE-2020-9380.md index d33c8d9a41..1f9a2873ae 100644 --- a/2020/CVE-2020-9380.md +++ b/2020/CVE-2020-9380.md @@ -19,6 +19,7 @@ IPTV Smarters WEB TV PLAYER through 2020-02-22 allows attackers to execute OS co - https://github.com/Z0fhack/Goby_POC - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub +- https://github.com/migueltarga/CVE-2020-9380 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/soosmile/POC - https://github.com/xu-xiang/awesome-security-vul-llm diff --git a/2020/CVE-2020-9453.md b/2020/CVE-2020-9453.md index bc5884b4e9..8cfa9e9f63 100644 --- a/2020/CVE-2020-9453.md +++ b/2020/CVE-2020-9453.md @@ -15,4 +15,5 @@ In Epson iProjection v2.30, the driver file EMP_MPAU.sys allows local users to c #### Github - https://github.com/Arryboom/Kernel-exploits +- https://github.com/FULLSHADE/Kernel-exploits diff --git a/2020/CVE-2020-9484.md b/2020/CVE-2020-9484.md index e79472efb1..ff393b1cb0 100644 --- a/2020/CVE-2020-9484.md +++ b/2020/CVE-2020-9484.md @@ -100,6 +100,7 @@ When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8. - https://github.com/taielab/awesome-hacking-lists - https://github.com/tdtc7/qps - https://github.com/threedr3am/tomcat-cluster-session-sync-exp +- https://github.com/versio-io/product-lifecycle-security-api - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC- - https://github.com/woods-sega/woodswiki diff --git a/2020/CVE-2020-9546.md b/2020/CVE-2020-9546.md index 93e146bc23..ede2d2d42a 100644 --- a/2020/CVE-2020-9546.md +++ b/2020/CVE-2020-9546.md @@ -22,6 +22,7 @@ FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction betwee - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter - https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh +- https://github.com/LibHunter/LibHunter - https://github.com/OWASP/www-project-ide-vulscanner - https://github.com/PalindromeLabs/Java-Deserialization-CVEs - https://github.com/lnick2023/nicenice diff --git a/2021/CVE-2021-0341.md b/2021/CVE-2021-0341.md index 0688f2eff4..efa77fd358 100644 --- a/2021/CVE-2021-0341.md +++ b/2021/CVE-2021-0341.md @@ -16,6 +16,7 @@ No PoCs from references. - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/NicheToolkit/rest-toolkit - https://github.com/TinyNiko/android_bulletin_notes - https://github.com/au-abd/python-stuff diff --git a/2021/CVE-2021-0399.md b/2021/CVE-2021-0399.md index 9e4966a25c..4e8ee8f141 100644 --- a/2021/CVE-2021-0399.md +++ b/2021/CVE-2021-0399.md @@ -27,5 +27,6 @@ No PoCs from references. - https://github.com/nipund513/Exploiting-UAF-by-Ret2bpf-in-Android-Kernel-CVE-2021-0399- - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2021/CVE-2021-0920.md b/2021/CVE-2021-0920.md index bcc7e81c0b..841142bd23 100644 --- a/2021/CVE-2021-0920.md +++ b/2021/CVE-2021-0920.md @@ -27,5 +27,6 @@ No PoCs from references. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2021/CVE-2021-1048.md b/2021/CVE-2021-1048.md index 4bb1ff9920..535743f553 100644 --- a/2021/CVE-2021-1048.md +++ b/2021/CVE-2021-1048.md @@ -26,5 +26,6 @@ No PoCs from references. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2021/CVE-2021-1585.md b/2021/CVE-2021-1585.md index 56665b5ddc..acb0ee7c68 100644 --- a/2021/CVE-2021-1585.md +++ b/2021/CVE-2021-1585.md @@ -19,6 +19,7 @@ A vulnerability in the Cisco Adaptive Security Device Manager (ASDM) Launcher co - https://github.com/WhooAmii/POC_to_review - https://github.com/anquanscan/sec-tools - https://github.com/jbaines-r7/cisco_asa_research +- https://github.com/jbaines-r7/staystaystay - https://github.com/jbaines-r7/theway - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC diff --git a/2021/CVE-2021-1905.md b/2021/CVE-2021-1905.md index 0f956c4116..3b096e2a3b 100644 --- a/2021/CVE-2021-1905.md +++ b/2021/CVE-2021-1905.md @@ -35,6 +35,7 @@ Possible use after free due to improper handling of memory mapping of multiple p - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/trhacknon/Pocingit - https://github.com/whoforget/CVE-POC +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/youwizard/CVE-POC - https://github.com/zecool/cve diff --git a/2021/CVE-2021-1940.md b/2021/CVE-2021-1940.md index f0588c1e6e..69f1cc3d2f 100644 --- a/2021/CVE-2021-1940.md +++ b/2021/CVE-2021-1940.md @@ -25,5 +25,6 @@ Use after free can occur due to improper handling of response from firmware in S - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2021/CVE-2021-1961.md b/2021/CVE-2021-1961.md index fea6ec97b4..d4a19fc8f6 100644 --- a/2021/CVE-2021-1961.md +++ b/2021/CVE-2021-1961.md @@ -35,6 +35,7 @@ Possible buffer overflow due to lack of offset length check while updating the b - https://github.com/tamirzb/CVE-2021-1961 - https://github.com/trhacknon/Pocingit - https://github.com/whoforget/CVE-POC +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/youwizard/CVE-POC - https://github.com/zecool/cve diff --git a/2021/CVE-2021-1968.md b/2021/CVE-2021-1968.md index 7e79f0db2b..218cd56261 100644 --- a/2021/CVE-2021-1968.md +++ b/2021/CVE-2021-1968.md @@ -25,5 +25,6 @@ Improper validation of kernel buffer address while copying information back to u - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2021/CVE-2021-1969.md b/2021/CVE-2021-1969.md index 6c38e1d7bd..feeadc6b9d 100644 --- a/2021/CVE-2021-1969.md +++ b/2021/CVE-2021-1969.md @@ -25,5 +25,6 @@ Improper validation of kernel buffer address while copying information back to u - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2021/CVE-2021-20021.md b/2021/CVE-2021-20021.md index 9eaccc5aba..14a4077f62 100644 --- a/2021/CVE-2021-20021.md +++ b/2021/CVE-2021-20021.md @@ -13,6 +13,7 @@ A vulnerability in the SonicWall Email Security version 10.0.9.x allows an attac No PoCs from references. #### Github +- https://github.com/CVEDB/awesome-cve-repo - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/SUPRAAA-1337/CVE-2021-20021 diff --git a/2021/CVE-2021-20190.md b/2021/CVE-2021-20190.md index cea2ea3afd..de12919a13 100644 --- a/2021/CVE-2021-20190.md +++ b/2021/CVE-2021-20190.md @@ -15,5 +15,6 @@ A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the i #### Github - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/seal-community/patches diff --git a/2021/CVE-2021-20226.md b/2021/CVE-2021-20226.md index d1c891701f..de3c197991 100644 --- a/2021/CVE-2021-20226.md +++ b/2021/CVE-2021-20226.md @@ -25,5 +25,6 @@ No PoCs from references. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2021/CVE-2021-2109.md b/2021/CVE-2021-2109.md index e546f7ef30..0261d4d752 100644 --- a/2021/CVE-2021-2109.md +++ b/2021/CVE-2021-2109.md @@ -29,6 +29,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware - https://github.com/Astrogeorgeonethree/Starred2 - https://github.com/Atem1988/Starred - https://github.com/BrittanyKuhn/javascript-tutorial +- https://github.com/CLincat/vulcat - https://github.com/CVEDB/PoC-List - https://github.com/Drun1baby/JavaSecurityLearning - https://github.com/EdgeSecurityTeam/Vulnerability diff --git a/2021/CVE-2021-21315.md b/2021/CVE-2021-21315.md index 62a5fabe5c..c76f4884cf 100644 --- a/2021/CVE-2021-21315.md +++ b/2021/CVE-2021-21315.md @@ -19,6 +19,7 @@ No PoCs from references. - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/CITIZENDOT/CS547-CVEs +- https://github.com/CLincat/vulcat - https://github.com/Elsfa7-110/kenzer-templates - https://github.com/FB-Sec/exploits - https://github.com/ForbiddenProgrammer/CVE-2021-21315-PoC diff --git a/2021/CVE-2021-21551.md b/2021/CVE-2021-21551.md index 77804213a8..f9196fdbc3 100644 --- a/2021/CVE-2021-21551.md +++ b/2021/CVE-2021-21551.md @@ -33,6 +33,7 @@ Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability - https://github.com/SYRTI/POC_to_review - https://github.com/SpikySabra/Kernel-Cactus - https://github.com/SyncroScripting/Artichoke_Consulting +- https://github.com/TheMalwareGuardian/Awesome-Bootkits-Rootkits-Development - https://github.com/WhooAmii/POC_to_review - https://github.com/alfarom256/MCP-PoC - https://github.com/anquanscan/sec-tools diff --git a/2021/CVE-2021-2173.md b/2021/CVE-2021-2173.md index 5a176b7227..551aeafdf7 100644 --- a/2021/CVE-2021-2173.md +++ b/2021/CVE-2021-2173.md @@ -19,6 +19,7 @@ Vulnerability in the Recovery component of Oracle Database Server. Supported ver - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review +- https://github.com/emad-almousa/CVE-2021-2173 - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2021/CVE-2021-21972.md b/2021/CVE-2021-21972.md index 0eb9413f8e..86709af1ab 100644 --- a/2021/CVE-2021-21972.md +++ b/2021/CVE-2021-21972.md @@ -32,6 +32,7 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability in a v - https://github.com/B1anda0/CVE-2021-21972 - https://github.com/BugBlocker/lotus-scripts - https://github.com/ByZain/CVE-2021-21972 +- https://github.com/CLincat/vulcat - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top diff --git a/2021/CVE-2021-22205.md b/2021/CVE-2021-22205.md index 11e895390b..12dbfaac62 100644 --- a/2021/CVE-2021-22205.md +++ b/2021/CVE-2021-22205.md @@ -15,6 +15,7 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro #### Github - https://github.com/0x0021h/expbox +- https://github.com/0xMarcio/cve - https://github.com/0xget/cve-2001-1473 - https://github.com/0xn0ne/simple-scanner - https://github.com/20142995/Goby @@ -54,6 +55,7 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro - https://github.com/SexyBeast233/SecBooks - https://github.com/Threekiii/Awesome-Exploit - https://github.com/Threekiii/Awesome-POC +- https://github.com/Threekiii/Awesome-Redteam - https://github.com/Threekiii/Vulhub-Reproduce - https://github.com/WhooAmii/POC_to_review - https://github.com/X1pe0/Automated-Gitlab-RCE diff --git a/2021/CVE-2021-22555.md b/2021/CVE-2021-22555.md index 615c5d843e..de85fe6560 100644 --- a/2021/CVE-2021-22555.md +++ b/2021/CVE-2021-22555.md @@ -36,6 +36,7 @@ A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in n - https://github.com/EGI-Federation/SVG-advisories - https://github.com/Ha0-Y/LinuxKernelExploits - https://github.com/Ha0-Y/kernel-exploit-cve +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/JoneyJunior/cve-2021-22555 - https://github.com/Metarget/awesome-cloud-native-security @@ -100,6 +101,7 @@ A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in n - https://github.com/veritas501/pipe-primitive - https://github.com/whoforget/CVE-POC - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC- +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/x90hack/vulnerabilty_lab - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xuetusummer/Penetration_Testing_POC diff --git a/2021/CVE-2021-23134.md b/2021/CVE-2021-23134.md index 22c04317a7..8b4464928c 100644 --- a/2021/CVE-2021-23134.md +++ b/2021/CVE-2021-23134.md @@ -24,5 +24,6 @@ No PoCs from references. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2021/CVE-2021-24122.md b/2021/CVE-2021-24122.md index 986fd4bc28..830e8acf56 100644 --- a/2021/CVE-2021-24122.md +++ b/2021/CVE-2021-24122.md @@ -22,5 +22,6 @@ When serving resources from a network location using the NTFS file system, Apach - https://github.com/Threekiii/Awesome-POC - https://github.com/d4n-sec/d4n-sec.github.io - https://github.com/mklmfane/betvictor +- https://github.com/versio-io/product-lifecycle-security-api - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough diff --git a/2021/CVE-2021-25122.md b/2021/CVE-2021-25122.md index 8021ab77e8..ed3c7793a0 100644 --- a/2021/CVE-2021-25122.md +++ b/2021/CVE-2021-25122.md @@ -17,5 +17,6 @@ When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/DNTYO/F5_Vulnerability +- https://github.com/versio-io/product-lifecycle-security-api - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough diff --git a/2021/CVE-2021-25329.md b/2021/CVE-2021-25329.md index 620d6991ed..a0e422afd2 100644 --- a/2021/CVE-2021-25329.md +++ b/2021/CVE-2021-25329.md @@ -20,5 +20,6 @@ The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to - https://github.com/Live-Hack-CVE/CVE-2021-25329 - https://github.com/mklmfane/betvictor - https://github.com/raner/projo +- https://github.com/versio-io/product-lifecycle-security-api - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough diff --git a/2021/CVE-2021-25369.md b/2021/CVE-2021-25369.md index 3630441ec0..d316de2c4a 100644 --- a/2021/CVE-2021-25369.md +++ b/2021/CVE-2021-25369.md @@ -26,5 +26,6 @@ An improper access control vulnerability in sec_log file prior to SMR MAR-2021 R - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2021/CVE-2021-25370.md b/2021/CVE-2021-25370.md index 41d1f9185f..f95e5973c1 100644 --- a/2021/CVE-2021-25370.md +++ b/2021/CVE-2021-25370.md @@ -26,5 +26,6 @@ An incorrect implementation handling file descriptor in dpu driver prior to SMR - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2021/CVE-2021-25646.md b/2021/CVE-2021-25646.md index ad66ca6c49..f33f13e8bf 100644 --- a/2021/CVE-2021-25646.md +++ b/2021/CVE-2021-25646.md @@ -26,6 +26,7 @@ Apache Druid includes the ability to execute user-provided JavaScript code embed - https://github.com/Astrogeorgeonethree/Starred2 - https://github.com/Atem1988/Starred - https://github.com/Awrrays/FrameVul +- https://github.com/CLincat/vulcat - https://github.com/EdgeSecurityTeam/Vulnerability - https://github.com/Elsfa7-110/kenzer-templates - https://github.com/FDlucifer/firece-fish diff --git a/2021/CVE-2021-26084.md b/2021/CVE-2021-26084.md index bfd19f8833..01a5ac1700 100644 --- a/2021/CVE-2021-26084.md +++ b/2021/CVE-2021-26084.md @@ -18,6 +18,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul #### Github - https://github.com/0day404/vulnerability-poc - https://github.com/0x727/ShuiZe_0x727 +- https://github.com/0xMarcio/cve - https://github.com/0xMrNiko/Awesome-Red-Teaming - https://github.com/0xf4n9x/CVE-2021-26084 - https://github.com/0xsyr0/OSCP @@ -110,6 +111,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul - https://github.com/dorkerdevil/CVE-2021-26084 - https://github.com/elinakrmova/RedTeam-Tools - https://github.com/emtee40/win-pentest-tools +- https://github.com/enomothem/PenTestNote - https://github.com/fardeen-ahmed/Bug-bounty-Writeups - https://github.com/h3v0x/CVE-2021-26084_Confluence - https://github.com/hack-parthsharma/Pentest-Tools diff --git a/2021/CVE-2021-26085.md b/2021/CVE-2021-26085.md index be3c3f498b..dd31d54f85 100644 --- a/2021/CVE-2021-26085.md +++ b/2021/CVE-2021-26085.md @@ -31,6 +31,7 @@ Affected versions of Atlassian Confluence Server allow remote attackers to view - https://github.com/e-hakson/OSCP - https://github.com/eljosep/OSCP-Guide - https://github.com/emadshanab/Some-BugBounty-Tips-from-my-Twitter-feed +- https://github.com/enomothem/PenTestNote - https://github.com/k0mi-tg/CVE-POC - https://github.com/kgwanjala/oscp-cheatsheet - https://github.com/manas3c/CVE-POC diff --git a/2021/CVE-2021-26341.md b/2021/CVE-2021-26341.md index cc4098f15e..11d57af5ed 100644 --- a/2021/CVE-2021-26341.md +++ b/2021/CVE-2021-26341.md @@ -26,5 +26,6 @@ No PoCs from references. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2021/CVE-2021-26708.md b/2021/CVE-2021-26708.md index a5a47f861b..5eda063b40 100644 --- a/2021/CVE-2021-26708.md +++ b/2021/CVE-2021-26708.md @@ -46,6 +46,7 @@ A local privilege escalation was discovered in the Linux kernel before 5.10.13. - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/trhacknon/Pocingit - https://github.com/whoforget/CVE-POC +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/x90hack/vulnerabilty_lab - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xuetusummer/Penetration_Testing_POC diff --git a/2021/CVE-2021-27190.md b/2021/CVE-2021-27190.md index ca3efe6721..6da253f9e5 100644 --- a/2021/CVE-2021-27190.md +++ b/2021/CVE-2021-27190.md @@ -21,6 +21,7 @@ A Stored Cross Site Scripting(XSS) Vulnerability was discovered in PEEL SHOPPING - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review - https://github.com/anmolksachan/CVE +- https://github.com/anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS - https://github.com/anmolksachan/anmolksachan - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/k0mi-tg/CVE-POC diff --git a/2021/CVE-2021-27201.md b/2021/CVE-2021-27201.md index 62b9c3e106..40bc7b66e5 100644 --- a/2021/CVE-2021-27201.md +++ b/2021/CVE-2021-27201.md @@ -14,4 +14,5 @@ Endian Firewall Community (aka EFW) 3.3.2 allows remote authenticated users to e - https://www.endian.com/company/news/endian-community-releases-new-version-332-148/ #### Github +- https://github.com/MucahitSaratar/endian_firewall_authenticated_rce diff --git a/2021/CVE-2021-27328.md b/2021/CVE-2021-27328.md index a067822192..7b09135f8e 100644 --- a/2021/CVE-2021-27328.md +++ b/2021/CVE-2021-27328.md @@ -22,6 +22,7 @@ Yeastar NeoGate TG400 91.3.0.3 devices are affected by Directory Traversal. An a - https://github.com/KayCHENvip/vulnerability-poc - https://github.com/Miraitowa70/POC-Notes - https://github.com/NaInSec/CVE-PoC-in-GitHub +- https://github.com/SQSamir/CVE-2021-27328 - https://github.com/SYRTI/POC_to_review - https://github.com/SexyBeast233/SecBooks - https://github.com/SouthWind0/southwind0.github.io diff --git a/2021/CVE-2021-27363.md b/2021/CVE-2021-27363.md index 2f0c8752e2..68e4f050b8 100644 --- a/2021/CVE-2021-27363.md +++ b/2021/CVE-2021-27363.md @@ -31,5 +31,6 @@ An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer lea - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/teresaweber685/book_list +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2021/CVE-2021-27364.md b/2021/CVE-2021-27364.md index ffd1266f77..a24d277925 100644 --- a/2021/CVE-2021-27364.md +++ b/2021/CVE-2021-27364.md @@ -32,5 +32,6 @@ An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_tr - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/teresaweber685/book_list +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2021/CVE-2021-27365.md b/2021/CVE-2021-27365.md index cd5e3a9e67..2e50d93cbd 100644 --- a/2021/CVE-2021-27365.md +++ b/2021/CVE-2021-27365.md @@ -19,6 +19,7 @@ An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data s #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/EGI-Federation/SVG-advisories +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/aaronxie55/Presentation2_Markdown - https://github.com/bollwarm/SecToolSet @@ -37,5 +38,6 @@ An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data s - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/teresaweber685/book_list +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2021/CVE-2021-27963.md b/2021/CVE-2021-27963.md index f8549caa83..25c086203d 100644 --- a/2021/CVE-2021-27963.md +++ b/2021/CVE-2021-27963.md @@ -18,6 +18,7 @@ SonLogger before 6.4.1 is affected by user creation with any user permissions pr - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review - https://github.com/developer3000S/PoC-in-GitHub +- https://github.com/erberkan/SonLogger-vulns - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2021/CVE-2021-27964.md b/2021/CVE-2021-27964.md index cb9b95c94b..421e3cd8c0 100644 --- a/2021/CVE-2021-27964.md +++ b/2021/CVE-2021-27964.md @@ -15,4 +15,5 @@ SonLogger before 6.4.1 is affected by Unauthenticated Arbitrary File Upload. An #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/erberkan/SonLogger-vulns diff --git a/2021/CVE-2021-28663.md b/2021/CVE-2021-28663.md index 28b9ffb847..7e28dfb647 100644 --- a/2021/CVE-2021-28663.md +++ b/2021/CVE-2021-28663.md @@ -28,6 +28,7 @@ The Arm Mali GPU kernel driver allows privilege escalation or information disclo - https://github.com/khanhhdz06/linux-kernel-exploitation - https://github.com/khanhnd123/linux-kernel-exploitation - https://github.com/knd06/linux-kernel-exploitation +- https://github.com/lntrx/CVE-2021-28663 - https://github.com/manas3c/CVE-POC - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/nomi-sec/PoC-in-GitHub @@ -35,6 +36,7 @@ The Arm Mali GPU kernel driver allows privilege escalation or information disclo - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/trhacknon/Pocingit - https://github.com/whoforget/CVE-POC +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/youwizard/CVE-POC - https://github.com/zecool/cve diff --git a/2021/CVE-2021-29267.md b/2021/CVE-2021-29267.md index 7611dbd71e..aca2ffdefa 100644 --- a/2021/CVE-2021-29267.md +++ b/2021/CVE-2021-29267.md @@ -16,6 +16,7 @@ Sherlock SherlockIM through 2021-03-29 allows Cross Site Scripting (XSS) by leve - https://github.com/ARPSyndicate/cvemon - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review +- https://github.com/Security-AVS/CVE-2021-29267 - https://github.com/WhooAmii/POC_to_review - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/soosmile/POC diff --git a/2021/CVE-2021-29337.md b/2021/CVE-2021-29337.md index 0a52a0a0a0..a830737917 100644 --- a/2021/CVE-2021-29337.md +++ b/2021/CVE-2021-29337.md @@ -18,6 +18,7 @@ MODAPI.sys in MSI Dragon Center 2.0.104.0 allows low-privileged users to access - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/rjt-gupta/CVE-2021-29337 - https://github.com/soosmile/POC - https://github.com/trhacknon/Pocingit - https://github.com/zecool/cve diff --git a/2021/CVE-2021-29657.md b/2021/CVE-2021-29657.md index 8806f36b56..a36a28f601 100644 --- a/2021/CVE-2021-29657.md +++ b/2021/CVE-2021-29657.md @@ -26,5 +26,6 @@ arch/x86/kvm/svm/nested.c in the Linux kernel before 5.11.12 has a use-after-fre - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2021/CVE-2021-30146.md b/2021/CVE-2021-30146.md index a6efd10641..811d899f26 100644 --- a/2021/CVE-2021-30146.md +++ b/2021/CVE-2021-30146.md @@ -16,6 +16,7 @@ Seafile 7.0.5 (2019) allows Persistent XSS via the "share of library functionali - https://github.com/ARPSyndicate/cvemon - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review +- https://github.com/Security-AVS/CVE-2021-30146 - https://github.com/WhooAmii/POC_to_review - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/soosmile/POC diff --git a/2021/CVE-2021-30640.md b/2021/CVE-2021-30640.md index 3f8570b457..724d55e7ff 100644 --- a/2021/CVE-2021-30640.md +++ b/2021/CVE-2021-30640.md @@ -15,5 +15,5 @@ A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authent - https://www.oracle.com/security-alerts/cpuoct2021.html #### Github -No PoCs found on GitHub currently. +- https://github.com/versio-io/product-lifecycle-security-api diff --git a/2021/CVE-2021-3120.md b/2021/CVE-2021-3120.md index 570832dee5..67b3fb5a3b 100644 --- a/2021/CVE-2021-3120.md +++ b/2021/CVE-2021-3120.md @@ -13,4 +13,5 @@ An arbitrary file upload vulnerability in the YITH WooCommerce Gift Cards Premiu - https://github.com/guy-liu/yith-giftdrop #### Github +- https://github.com/guy-liu/yith-giftdrop diff --git a/2021/CVE-2021-3129.md b/2021/CVE-2021-3129.md index e11136e308..b401c0a75c 100644 --- a/2021/CVE-2021-3129.md +++ b/2021/CVE-2021-3129.md @@ -17,6 +17,7 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic - https://github.com/0day404/vulnerability-poc - https://github.com/0day666/Vulnerability-verification - https://github.com/0nion1/CVE-2021-3129 +- https://github.com/0xMarcio/cve - https://github.com/0xStrygwyr/OSCP-Guide - https://github.com/0xZipp0/OSCP - https://github.com/0xaniketB/HackTheBox-Horizontall diff --git a/2021/CVE-2021-31440.md b/2021/CVE-2021-31440.md index faca39d715..b7b25f50d1 100644 --- a/2021/CVE-2021-31440.md +++ b/2021/CVE-2021-31440.md @@ -16,6 +16,7 @@ This vulnerability allows local attackers to escalate privileges on affected ins - https://github.com/ARPSyndicate/cvemon - https://github.com/Al1ex/LinuxEelvation - https://github.com/ChoKyuWon/exploit_articles +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/XiaozaYa/CVE-Recording - https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground diff --git a/2021/CVE-2021-3164.md b/2021/CVE-2021-3164.md index e545ebd27e..c7973ff168 100644 --- a/2021/CVE-2021-3164.md +++ b/2021/CVE-2021-3164.md @@ -21,6 +21,7 @@ ChurchRota 2.6.4 is vulnerable to authenticated remote code execution. The user - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/rmccarth/cve-2021-3164 - https://github.com/soosmile/POC - https://github.com/trhacknon/Pocingit - https://github.com/whoforget/CVE-POC diff --git a/2021/CVE-2021-31760.md b/2021/CVE-2021-31760.md index 228dac5bc8..69f9b5fb32 100644 --- a/2021/CVE-2021-31760.md +++ b/2021/CVE-2021-31760.md @@ -19,11 +19,13 @@ Webmin 1.973 is affected by Cross Site Request Forgery (CSRF) to achieve Remote - https://github.com/ARPSyndicate/cvemon - https://github.com/EdgeSecurityTeam/Vulnerability - https://github.com/KayCHENvip/vulnerability-poc +- https://github.com/Mesh3l911/CVE-2021-31760 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/Threekiii/Awesome-POC - https://github.com/WhooAmii/POC_to_review - https://github.com/d4n-sec/d4n-sec.github.io +- https://github.com/electronicbots/CVE-2021-31760 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/soosmile/POC - https://github.com/trhacknon/Pocingit diff --git a/2021/CVE-2021-31761.md b/2021/CVE-2021-31761.md index 2cd1147c27..54203763b9 100644 --- a/2021/CVE-2021-31761.md +++ b/2021/CVE-2021-31761.md @@ -16,9 +16,11 @@ Webmin 1.973 is affected by reflected Cross Site Scripting (XSS) to achieve Remo #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/Mesh3l911/CVE-2021-31761 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review +- https://github.com/electronicbots/CVE-2021-31761 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/soosmile/POC - https://github.com/trhacknon/Pocingit diff --git a/2021/CVE-2021-31762.md b/2021/CVE-2021-31762.md index 2049a50dc3..5154816d56 100644 --- a/2021/CVE-2021-31762.md +++ b/2021/CVE-2021-31762.md @@ -17,9 +17,11 @@ Webmin 1.973 is affected by Cross Site Request Forgery (CSRF) to create a privil #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/Mesh3l911/CVE-2021-31762 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review +- https://github.com/electronicbots/CVE-2021-31762 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/soosmile/POC - https://github.com/trhacknon/Pocingit diff --git a/2021/CVE-2021-32156.md b/2021/CVE-2021-32156.md index 0a23358a5b..fbec6b889d 100644 --- a/2021/CVE-2021-32156.md +++ b/2021/CVE-2021-32156.md @@ -14,6 +14,7 @@ A cross-site request forgery (CSRF) vulnerability exists in Webmin 1.973 via the #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/Mesh3l911/CVE-2021-32156 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review diff --git a/2021/CVE-2021-32157.md b/2021/CVE-2021-32157.md index 22c00ee809..d154f5be8a 100644 --- a/2021/CVE-2021-32157.md +++ b/2021/CVE-2021-32157.md @@ -14,6 +14,7 @@ A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973 via the Schedu #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/Mesh3l911/CVE-2021-32157 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review diff --git a/2021/CVE-2021-32158.md b/2021/CVE-2021-32158.md index b66f7f529c..a38e56520c 100644 --- a/2021/CVE-2021-32158.md +++ b/2021/CVE-2021-32158.md @@ -14,6 +14,7 @@ A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973 via the Upload #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/Mesh3l911/CVE-2021-32158 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review diff --git a/2021/CVE-2021-32159.md b/2021/CVE-2021-32159.md index 86bb1df6c1..664bdc4769 100644 --- a/2021/CVE-2021-32159.md +++ b/2021/CVE-2021-32159.md @@ -14,6 +14,7 @@ A Cross-site request forgery (CSRF) vulnerability exists in Webmin 1.973 via the #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/Mesh3l911/CVE-2021-32159 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review diff --git a/2021/CVE-2021-32160.md b/2021/CVE-2021-32160.md index 92746c8e76..18344f021a 100644 --- a/2021/CVE-2021-32160.md +++ b/2021/CVE-2021-32160.md @@ -14,6 +14,7 @@ A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973 through the Ad #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/Mesh3l911/CVE-2021-32160 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review diff --git a/2021/CVE-2021-32161.md b/2021/CVE-2021-32161.md index 9464fd2ade..5a85c9a3dc 100644 --- a/2021/CVE-2021-32161.md +++ b/2021/CVE-2021-32161.md @@ -14,6 +14,7 @@ A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973 through the Fi #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/Mesh3l911/CVE-2021-32161 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review diff --git a/2021/CVE-2021-32162.md b/2021/CVE-2021-32162.md index 7d8e568b04..2a63df5965 100644 --- a/2021/CVE-2021-32162.md +++ b/2021/CVE-2021-32162.md @@ -14,6 +14,7 @@ A Cross-site request forgery (CSRF) vulnerability exists in Webmin 1.973 through #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/Mesh3l911/CVE-2021-32162 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review diff --git a/2021/CVE-2021-32606.md b/2021/CVE-2021-32606.md index 0fb608279a..e662f52684 100644 --- a/2021/CVE-2021-32606.md +++ b/2021/CVE-2021-32606.md @@ -25,5 +25,6 @@ No PoCs from references. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2021/CVE-2021-3291.md b/2021/CVE-2021-3291.md index 73e96b97ff..7ebbcaa12a 100644 --- a/2021/CVE-2021-3291.md +++ b/2021/CVE-2021-3291.md @@ -17,6 +17,7 @@ Zen Cart 1.5.7b allows admins to execute arbitrary OS commands by inspecting an - https://github.com/ARPSyndicate/cvemon - https://github.com/EdgeSecurityTeam/Vulnerability - https://github.com/ImHades101/CVE-2021-3291 +- https://github.com/MucahitSaratar/zencart_auth_rce_poc - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review diff --git a/2021/CVE-2021-33037.md b/2021/CVE-2021-33037.md index 3632ee3851..57ec6d2e81 100644 --- a/2021/CVE-2021-33037.md +++ b/2021/CVE-2021-33037.md @@ -18,4 +18,5 @@ Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did no #### Github - https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh +- https://github.com/versio-io/product-lifecycle-security-api diff --git a/2021/CVE-2021-33558.md b/2021/CVE-2021-33558.md index 24feca5784..44b39976d4 100644 --- a/2021/CVE-2021-33558.md +++ b/2021/CVE-2021-33558.md @@ -19,6 +19,7 @@ - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review - https://github.com/anldori/CVE-2021-33558 +- https://github.com/mdanzaruddin/CVE-2021-33558. - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/soosmile/POC - https://github.com/trhacknon/Pocingit diff --git a/2021/CVE-2021-33564.md b/2021/CVE-2021-33564.md index d7e1566607..1ff5ec2a82 100644 --- a/2021/CVE-2021-33564.md +++ b/2021/CVE-2021-33564.md @@ -25,6 +25,7 @@ An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby a - https://github.com/dorkerdevil/CVE-2021-33564 - https://github.com/harsh-bothra/learn365 - https://github.com/markevans/dragonfly +- https://github.com/mlr0p/CVE-2021-33564 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/rodolfomarianocy/OSCP-Tricks-2023 - https://github.com/soosmile/POC diff --git a/2021/CVE-2021-3378.md b/2021/CVE-2021-3378.md index 596528c292..e36e3764e7 100644 --- a/2021/CVE-2021-3378.md +++ b/2021/CVE-2021-3378.md @@ -26,6 +26,7 @@ FortiLogger 4.4.2.2 is affected by Arbitrary File Upload by sending a "Content-T - https://github.com/Z0fhack/Goby_POC - https://github.com/d4n-sec/d4n-sec.github.io - https://github.com/developer3000S/PoC-in-GitHub +- https://github.com/erberkan/fortilogger_arbitrary_fileupload - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2021/CVE-2021-33909.md b/2021/CVE-2021-33909.md index 2dbedf5a0a..934e47158a 100644 --- a/2021/CVE-2021-33909.md +++ b/2021/CVE-2021-33909.md @@ -51,6 +51,7 @@ fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not pro - https://github.com/sfowl/deep-directory - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC- +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xuetusummer/Penetration_Testing_POC diff --git a/2021/CVE-2021-34527.md b/2021/CVE-2021-34527.md index 703c46b554..40aea3cac8 100644 --- a/2021/CVE-2021-34527.md +++ b/2021/CVE-2021-34527.md @@ -51,6 +51,7 @@ #### Github - https://github.com/0x6d69636b/windows_hardening - https://github.com/0x727/usefull-elevation-of-privilege +- https://github.com/0xMarcio/cve - https://github.com/0xStrygwyr/OSCP-Guide - https://github.com/0xZipp0/OSCP - https://github.com/0xaniketB/HackTheBox-Driver diff --git a/2021/CVE-2021-34866.md b/2021/CVE-2021-34866.md index b27b9dd9e4..15b05b28c1 100644 --- a/2021/CVE-2021-34866.md +++ b/2021/CVE-2021-34866.md @@ -25,5 +25,6 @@ No PoCs from references. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2021/CVE-2021-3490.md b/2021/CVE-2021-3490.md index e67d60d97c..dfce8c8408 100644 --- a/2021/CVE-2021-3490.md +++ b/2021/CVE-2021-3490.md @@ -18,6 +18,7 @@ The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux ke - https://github.com/20142995/sectool - https://github.com/ARPSyndicate/cvemon - https://github.com/Al1ex/LinuxEelvation +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Mr-xn/Penetration_Testing_POC @@ -54,6 +55,7 @@ The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux ke - https://github.com/trhacknon/Pocingit - https://github.com/whoforget/CVE-POC - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC- +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xuetusummer/Penetration_Testing_POC - https://github.com/youwizard/CVE-POC diff --git a/2021/CVE-2021-3492.md b/2021/CVE-2021-3492.md index ec106678c8..539e27115b 100644 --- a/2021/CVE-2021-3492.md +++ b/2021/CVE-2021-3492.md @@ -37,6 +37,7 @@ Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, d - https://github.com/synacktiv/CVE-2021-3492 - https://github.com/trhacknon/Pocingit - https://github.com/whoforget/CVE-POC +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/youwizard/CVE-POC - https://github.com/zecool/cve diff --git a/2021/CVE-2021-3493.md b/2021/CVE-2021-3493.md index d89b7403c6..2a3e779fce 100644 --- a/2021/CVE-2021-3493.md +++ b/2021/CVE-2021-3493.md @@ -17,6 +17,7 @@ The overlayfs implementation in the linux kernel did not properly validate with #### Github - https://github.com/0day404/vulnerability-poc +- https://github.com/0xMarcio/cve - https://github.com/0xMat10/eJPT_Prep - https://github.com/0xWhoami35/root-kernel - https://github.com/0xsyr0/OSCP @@ -35,6 +36,7 @@ The overlayfs implementation in the linux kernel did not properly validate with - https://github.com/GhostTroops/TOP - https://github.com/GibzB/THM-Captured-Rooms - https://github.com/H0j3n/EzpzCheatSheet +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/Ishan3011/CVE-2021-3493 - https://github.com/JERRY123S/all-poc - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits @@ -109,6 +111,7 @@ The overlayfs implementation in the linux kernel did not properly validate with - https://github.com/tzwlhack/Vulnerability - https://github.com/weeka10/-hktalent-TOP - https://github.com/whoforget/CVE-POC +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xhref/OSCP - https://github.com/xuetusummer/Penetration_Testing_POC diff --git a/2021/CVE-2021-35296.md b/2021/CVE-2021-35296.md index f0a938a082..3e526b3fc6 100644 --- a/2021/CVE-2021-35296.md +++ b/2021/CVE-2021-35296.md @@ -17,6 +17,7 @@ An issue in the administrator authentication panel of PTCL HG150-Ub v3.0 allows - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review +- https://github.com/afaq1337/CVE-2021-35296 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/soosmile/POC - https://github.com/trhacknon/Pocingit diff --git a/2021/CVE-2021-3573.md b/2021/CVE-2021-3573.md index de0ea246e9..56109f2e77 100644 --- a/2021/CVE-2021-3573.md +++ b/2021/CVE-2021-3573.md @@ -26,5 +26,6 @@ A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subs - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2021/CVE-2021-35975.md b/2021/CVE-2021-35975.md index a54a9a70d3..6f9e12c1ad 100644 --- a/2021/CVE-2021-35975.md +++ b/2021/CVE-2021-35975.md @@ -16,6 +16,7 @@ Absolute path traversal vulnerability in the Systematica SMTP Adapter component - https://github.com/ARPSyndicate/cvemon - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/WhooAmii/POC_to_review +- https://github.com/fbkcs/CVE-2021-35975 - https://github.com/soosmile/POC - https://github.com/trump88/CVE-2021-35975 - https://github.com/zecool/cve diff --git a/2021/CVE-2021-3609.md b/2021/CVE-2021-3609.md index dab276b326..53b8a27f1c 100644 --- a/2021/CVE-2021-3609.md +++ b/2021/CVE-2021-3609.md @@ -24,5 +24,6 @@ - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2021/CVE-2021-36260.md b/2021/CVE-2021-36260.md index a049994230..6160543271 100644 --- a/2021/CVE-2021-36260.md +++ b/2021/CVE-2021-36260.md @@ -15,6 +15,7 @@ A command injection vulnerability in the web server of some Hikvision product. D #### Github - https://github.com/0day404/vulnerability-poc +- https://github.com/0xMarcio/cve - https://github.com/1f3lse/taiE - https://github.com/20142995/Goby - https://github.com/20142995/sectool diff --git a/2021/CVE-2021-36460.md b/2021/CVE-2021-36460.md index ee57ef619b..2b822fb5ad 100644 --- a/2021/CVE-2021-36460.md +++ b/2021/CVE-2021-36460.md @@ -18,6 +18,7 @@ VeryFitPro (com.veryfit2hr.second) 3.2.8 hashes the account's password locally o - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review - https://github.com/karimhabush/cyberowl +- https://github.com/martinfrancois/CVE-2021-36460 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/trhacknon/Pocingit - https://github.com/zecool/cve diff --git a/2021/CVE-2021-36563.md b/2021/CVE-2021-36563.md index 6ac6bb103a..b2afae04bf 100644 --- a/2021/CVE-2021-36563.md +++ b/2021/CVE-2021-36563.md @@ -14,6 +14,7 @@ The CheckMK management web console (versions 1.5.0 to 2.0.0) does not sanitise u #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/Edgarloyola/CVE-2021-36563 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review diff --git a/2021/CVE-2021-36749.md b/2021/CVE-2021-36749.md index 67e87890d7..62eb145f98 100644 --- a/2021/CVE-2021-36749.md +++ b/2021/CVE-2021-36749.md @@ -21,6 +21,7 @@ No PoCs from references. - https://github.com/ArrestX/--POC - https://github.com/Awrrays/FrameVul - https://github.com/BrucessKING/CVE-2021-36749 +- https://github.com/CLincat/vulcat - https://github.com/HimmelAward/Goby_POC - https://github.com/Ilovewomen/db_script_v2 - https://github.com/Ilovewomen/db_script_v2_2 diff --git a/2021/CVE-2021-36799.md b/2021/CVE-2021-36799.md index 9dd15b6dc7..df1d654542 100644 --- a/2021/CVE-2021-36799.md +++ b/2021/CVE-2021-36799.md @@ -19,6 +19,7 @@ - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/robertguetzkow/ets5-password-recovery - https://github.com/robertguetzkow/robertguetzkow - https://github.com/soosmile/POC - https://github.com/trhacknon/Pocingit diff --git a/2021/CVE-2021-36981.md b/2021/CVE-2021-36981.md index 177d5b8236..7f79143011 100644 --- a/2021/CVE-2021-36981.md +++ b/2021/CVE-2021-36981.md @@ -13,6 +13,7 @@ In the server in SerNet verinice before 1.22.2, insecure Java deserialization al - https://github.com/0xBrAinsTorM/CVE-2021-36981 #### Github +- https://github.com/0xBrAinsTorM/CVE-2021-36981 - https://github.com/ARPSyndicate/cvemon - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2021/CVE-2021-3715.md b/2021/CVE-2021-3715.md index ba9aa7488b..d469c31d18 100644 --- a/2021/CVE-2021-3715.md +++ b/2021/CVE-2021-3715.md @@ -30,5 +30,6 @@ A flaw was found in the "Routing decision" classifier in the Linux kernel's Traf - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2021/CVE-2021-37740.md b/2021/CVE-2021-37740.md index 5b1b6a28e8..3abd833b8c 100644 --- a/2021/CVE-2021-37740.md +++ b/2021/CVE-2021-37740.md @@ -19,6 +19,7 @@ A denial of service vulnerability exists in MDT's firmware for the KNXnet/IP Sec - https://github.com/WhooAmii/POC_to_review - https://github.com/anquanscan/sec-tools - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/robertguetzkow/CVE-2021-37740 - https://github.com/robertguetzkow/robertguetzkow - https://github.com/trhacknon/Pocingit - https://github.com/zecool/cve diff --git a/2021/CVE-2021-38149.md b/2021/CVE-2021-38149.md index e994ab6c61..09de35602f 100644 --- a/2021/CVE-2021-38149.md +++ b/2021/CVE-2021-38149.md @@ -14,4 +14,5 @@ index.php/admin/add_user in Chikitsa Patient Management System 2.0.0 allows XSS. #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/jboogie15/CVE-2021-38149 diff --git a/2021/CVE-2021-38185.md b/2021/CVE-2021-38185.md index f0f4ecabaf..4e397ef16b 100644 --- a/2021/CVE-2021-38185.md +++ b/2021/CVE-2021-38185.md @@ -15,5 +15,6 @@ GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted p #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Jauler/cve2021-3156-sudo-heap-overflow +- https://github.com/fangqyi/cpiopwn - https://github.com/fokypoky/places-list diff --git a/2021/CVE-2021-38647.md b/2021/CVE-2021-38647.md index 1528cef0ae..2746a99b81 100644 --- a/2021/CVE-2021-38647.md +++ b/2021/CVE-2021-38647.md @@ -28,6 +28,7 @@ Open Management Infrastructure Remote Code Execution Vulnerability - http://packetstormsecurity.com/files/164694/Microsoft-OMI-Management-Interface-Authentication-Bypass.html #### Github +- https://github.com/0xMarcio/cve - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/AlteredSecurity/CVE-2021-38647 diff --git a/2021/CVE-2021-38699.md b/2021/CVE-2021-38699.md index 3b7f03cc30..cdc4d3b6fd 100644 --- a/2021/CVE-2021-38699.md +++ b/2021/CVE-2021-38699.md @@ -18,6 +18,8 @@ TastyIgniter 3.0.7 allows XSS via /account, /reservation, /admin/dashboard, and - https://github.com/2lambda123/CVE-mitre - https://github.com/2lambda123/Windows10Exploits - https://github.com/ARPSyndicate/cvemon +- https://github.com/HuskyHacks/CVE-2021-38699-Reflected-XSS +- https://github.com/HuskyHacks/CVE-2021-38699-Stored-XSS - https://github.com/Justin-1993/CVE-2021-38699 - https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame - https://github.com/nu11secur1ty/CVE-mitre diff --git a/2021/CVE-2021-39322.md b/2021/CVE-2021-39322.md index 2aa987073c..cbb78febef 100644 --- a/2021/CVE-2021-39322.md +++ b/2021/CVE-2021-39322.md @@ -10,7 +10,7 @@ The Easy Social Icons plugin <= 3.0.8 for WordPress echoes out the raw value of ### POC #### Reference -No PoCs from references. +- https://wpvulndb.com/vulnerabilities/5e0bf0b6-9809-426b-b1d4-1fb653083b58 #### Github - https://github.com/ARPSyndicate/cvemon diff --git a/2021/CVE-2021-39815.md b/2021/CVE-2021-39815.md index 61e3b9b608..460b9dcfad 100644 --- a/2021/CVE-2021-39815.md +++ b/2021/CVE-2021-39815.md @@ -24,5 +24,6 @@ No PoCs from references. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2021/CVE-2021-40154.md b/2021/CVE-2021-40154.md index e95b8c397a..b6b68e0924 100644 --- a/2021/CVE-2021-40154.md +++ b/2021/CVE-2021-40154.md @@ -15,6 +15,7 @@ NXP LPC55S69 devices before A3 have a buffer over-read via a crafted wlength val #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Jeromeyoung/CVE-2021-40154 +- https://github.com/Xen1thLabs-AE/CVE-2021-40154 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/soosmile/POC diff --git a/2021/CVE-2021-4034.md b/2021/CVE-2021-4034.md index d2e69a0f8f..d19eb949b0 100644 --- a/2021/CVE-2021-4034.md +++ b/2021/CVE-2021-4034.md @@ -82,6 +82,7 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility. - https://github.com/H3arn/hackergame-2022-writeup - https://github.com/HadessCS/Awesome-Privilege-Escalation - https://github.com/HattMobb/TryHackMe-Bugle-Machine-Writeup-Walkthrough +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/HellGateCorp/pwnkit - https://github.com/HrishitJoshi/CVE-2021-4034 - https://github.com/IBM-Cloud/vpc-ha-iac diff --git a/2021/CVE-2021-40845.md b/2021/CVE-2021-40845.md index 911c81a015..ec2449ec4f 100644 --- a/2021/CVE-2021-40845.md +++ b/2021/CVE-2021-40845.md @@ -19,4 +19,5 @@ The web part of Zenitel AlphaCom XE Audio Server through 11.2.3.10, called Alpha - https://github.com/ARPSyndicate/cvemon - https://github.com/FDlucifer/firece-fish - https://github.com/anquanscan/sec-tools +- https://github.com/ricardojoserf/CVE-2021-40845 diff --git a/2021/CVE-2021-40875.md b/2021/CVE-2021-40875.md index d52d7c0dc9..920a103f4f 100644 --- a/2021/CVE-2021-40875.md +++ b/2021/CVE-2021-40875.md @@ -20,6 +20,7 @@ Improper Access Control in Gurock TestRail versions < 7.2.0.3014 resulted in sen - https://github.com/Lul/TestRail-files.md5-IAC-scanner - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review +- https://github.com/SakuraSamuraii/derailed - https://github.com/StarCrossPortal/scalpel - https://github.com/WhooAmii/POC_to_review - https://github.com/Z0fhack/Goby_POC diff --git a/2021/CVE-2021-40904.md b/2021/CVE-2021-40904.md index c07085b22c..640b399a93 100644 --- a/2021/CVE-2021-40904.md +++ b/2021/CVE-2021-40904.md @@ -14,6 +14,7 @@ The web management console of CheckMK Raw Edition (versions 1.5.0 to 1.6.0) allo #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/Edgarloyola/CVE-2021-40904 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review diff --git a/2021/CVE-2021-40906.md b/2021/CVE-2021-40906.md index 452ad58385..a803072bc8 100644 --- a/2021/CVE-2021-40906.md +++ b/2021/CVE-2021-40906.md @@ -14,6 +14,7 @@ CheckMK Raw Edition software (versions 1.5.0 to 1.6.0) does not sanitise the inp #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/Edgarloyola/CVE-2021-40906 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review diff --git a/2021/CVE-2021-40978.md b/2021/CVE-2021-40978.md index 65f2dbd5c8..84b41a1598 100644 --- a/2021/CVE-2021-40978.md +++ b/2021/CVE-2021-40978.md @@ -28,6 +28,7 @@ - https://github.com/WhooAmii/POC_to_review - https://github.com/Z0fhack/Goby_POC - https://github.com/d4n-sec/d4n-sec.github.io +- https://github.com/nisdn/CVE-2021-40978 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/trhacknon/Pocingit - https://github.com/xinyisleep/pocscan diff --git a/2021/CVE-2021-41073.md b/2021/CVE-2021-41073.md index 62bfa655f8..94cdd917b6 100644 --- a/2021/CVE-2021-41073.md +++ b/2021/CVE-2021-41073.md @@ -17,6 +17,7 @@ loop_rw_iter in fs/io_uring.c in the Linux kernel 5.10 through 5.14.6 allows loc - https://github.com/ARPSyndicate/cvemon - https://github.com/Ch4nc3n/PublicExploitation - https://github.com/DarkFunct/CVE_Exploits +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review @@ -41,6 +42,7 @@ loop_rw_iter in fs/io_uring.c in the Linux kernel 5.10 through 5.14.6 allows loc - https://github.com/star-sg/CVE - https://github.com/trhacknon/CVE2 - https://github.com/trhacknon/Pocingit +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/zecool/cve - https://github.com/zzcentury/PublicExploitation diff --git a/2021/CVE-2021-41079.md b/2021/CVE-2021-41079.md index 022fb46e99..43d8ebe914 100644 --- a/2021/CVE-2021-41079.md +++ b/2021/CVE-2021-41079.md @@ -15,4 +15,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/chnzzh/OpenSSL-CVE-lib +- https://github.com/versio-io/product-lifecycle-security-api diff --git a/2021/CVE-2021-41511.md b/2021/CVE-2021-41511.md index 62b5d7f9fd..79afed1ac3 100644 --- a/2021/CVE-2021-41511.md +++ b/2021/CVE-2021-41511.md @@ -19,6 +19,7 @@ The username and password field of login in Lodging Reservation Management Syste - https://github.com/2lambda123/CVE-mitre - https://github.com/2lambda123/Windows10Exploits - https://github.com/ARPSyndicate/cvemon +- https://github.com/Ni7inSharma/CVE-2021-41511 - https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame - https://github.com/nu11secur1ty/CVE-mitre - https://github.com/nu11secur1ty/CVE-nu11secur1ty diff --git a/2021/CVE-2021-4154.md b/2021/CVE-2021-4154.md index 0094071276..ee1539d1cd 100644 --- a/2021/CVE-2021-4154.md +++ b/2021/CVE-2021-4154.md @@ -14,6 +14,7 @@ A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Markakd/CVE-2021-4154 - https://github.com/Markakd/DirtyCred diff --git a/2021/CVE-2021-41647.md b/2021/CVE-2021-41647.md index b3c57c20e3..1a2e8cd5e4 100644 --- a/2021/CVE-2021-41647.md +++ b/2021/CVE-2021-41647.md @@ -18,6 +18,7 @@ An un-authenticated error-based and time-based blind SQL injection vulnerability - https://github.com/2lambda123/CVE-mitre - https://github.com/2lambda123/Windows10Exploits - https://github.com/ARPSyndicate/cvemon +- https://github.com/MobiusBinary/CVE-2021-41647 - https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame - https://github.com/nu11secur1ty/CVE-mitre - https://github.com/nu11secur1ty/CVE-nu11secur1ty diff --git a/2021/CVE-2021-41648.md b/2021/CVE-2021-41648.md index b0cb62e147..dbe543c1a2 100644 --- a/2021/CVE-2021-41648.md +++ b/2021/CVE-2021-41648.md @@ -19,6 +19,7 @@ An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-syste - https://github.com/2lambda123/Windows10Exploits - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates +- https://github.com/MobiusBinary/CVE-2021-41648 - https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame - https://github.com/nu11secur1ty/CVE-mitre - https://github.com/nu11secur1ty/CVE-nu11secur1ty diff --git a/2021/CVE-2021-41946.md b/2021/CVE-2021-41946.md index 7b9d639cbd..461d8a7b19 100644 --- a/2021/CVE-2021-41946.md +++ b/2021/CVE-2021-41946.md @@ -17,6 +17,7 @@ In FiberHome VDSL2 Modem HG150-Ub_V3.0, a stored cross-site scripting (XSS) vuln - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review +- https://github.com/afaq1337/CVE-2021-41946 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/trhacknon/Pocingit - https://github.com/zecool/cve diff --git a/2021/CVE-2021-42008.md b/2021/CVE-2021-42008.md index 7ff881ae04..fc67273ee1 100644 --- a/2021/CVE-2021-42008.md +++ b/2021/CVE-2021-42008.md @@ -18,6 +18,7 @@ The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel bef - https://github.com/ARPSyndicate/cvemon - https://github.com/Al1ex/LinuxEelvation - https://github.com/BachoSeven/stellestelline +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review @@ -40,6 +41,7 @@ The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel bef - https://github.com/soosmile/POC - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/trhacknon/Pocingit +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/zecool/cve diff --git a/2021/CVE-2021-4204.md b/2021/CVE-2021-4204.md index a02de60b16..2355782ff2 100644 --- a/2021/CVE-2021-4204.md +++ b/2021/CVE-2021-4204.md @@ -36,6 +36,7 @@ No PoCs from references. - https://github.com/tr3ee/CVE-2021-4204 - https://github.com/trhacknon/Pocingit - https://github.com/whoforget/CVE-POC +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xuetusummer/Penetration_Testing_POC - https://github.com/youwizard/CVE-POC diff --git a/2021/CVE-2021-42056.md b/2021/CVE-2021-42056.md index 9c82050775..864ec9ec68 100644 --- a/2021/CVE-2021-42056.md +++ b/2021/CVE-2021-42056.md @@ -20,5 +20,6 @@ Thales Safenet Authentication Client (SAC) for Linux and Windows through 10.7.7 - https://github.com/WhooAmii/POC_to_review - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/trhacknon/Pocingit +- https://github.com/z00z00z00/Safenet_SAC_CVE-2021-42056 - https://github.com/zecool/cve diff --git a/2021/CVE-2021-42327.md b/2021/CVE-2021-42327.md index 683249dbbd..9f89c5a08d 100644 --- a/2021/CVE-2021-42327.md +++ b/2021/CVE-2021-42327.md @@ -31,6 +31,7 @@ No PoCs from references. - https://github.com/soosmile/POC - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/trhacknon/Pocingit +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/zecool/cve diff --git a/2021/CVE-2021-42662.md b/2021/CVE-2021-42662.md index 0475e6935a..4f74d41d5f 100644 --- a/2021/CVE-2021-42662.md +++ b/2021/CVE-2021-42662.md @@ -20,6 +20,7 @@ A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Onlin - https://github.com/ARPSyndicate/cvemon - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review +- https://github.com/TheHackingRabbi/CVE-2021-42662 - https://github.com/TheHackingRabbi/CVE-2021-42663 - https://github.com/WhooAmii/POC_to_review - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2021/CVE-2021-42663.md b/2021/CVE-2021-42663.md index 59f46f7219..13d1e21677 100644 --- a/2021/CVE-2021-42663.md +++ b/2021/CVE-2021-42663.md @@ -18,6 +18,7 @@ An HTML injection vulnerability exists in Sourcecodester Online Event Booking an - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review +- https://github.com/TheHackingRabbi/CVE-2021-42663 - https://github.com/WhooAmii/POC_to_review - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/soosmile/POC diff --git a/2021/CVE-2021-42664.md b/2021/CVE-2021-42664.md index b790a43220..fe89b6c061 100644 --- a/2021/CVE-2021-42664.md +++ b/2021/CVE-2021-42664.md @@ -19,6 +19,7 @@ A Stored Cross Site Scripting (XSS) Vulneraibiilty exists in Sourcecodester Engi - https://github.com/ARPSyndicate/cvemon - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review +- https://github.com/TheHackingRabbi/CVE-2021-42664 - https://github.com/WhooAmii/POC_to_review - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/soosmile/POC diff --git a/2021/CVE-2021-42665.md b/2021/CVE-2021-42665.md index f2cae92e74..8239d52ade 100644 --- a/2021/CVE-2021-42665.md +++ b/2021/CVE-2021-42665.md @@ -22,6 +22,7 @@ An SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame - https://github.com/SYRTI/POC_to_review +- https://github.com/TheHackingRabbi/CVE-2021-42665 - https://github.com/WhooAmii/POC_to_review - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/nu11secur1ty/CVE-mitre diff --git a/2021/CVE-2021-42666.md b/2021/CVE-2021-42666.md index 96557a8a71..17ba592262 100644 --- a/2021/CVE-2021-42666.md +++ b/2021/CVE-2021-42666.md @@ -21,6 +21,7 @@ A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal i - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame - https://github.com/SYRTI/POC_to_review +- https://github.com/TheHackingRabbi/CVE-2021-42666 - https://github.com/WhooAmii/POC_to_review - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/nu11secur1ty/CVE-mitre diff --git a/2021/CVE-2021-42667.md b/2021/CVE-2021-42667.md index 0f944fce26..0984a625c2 100644 --- a/2021/CVE-2021-42667.md +++ b/2021/CVE-2021-42667.md @@ -22,6 +22,7 @@ A SQL Injection vulnerability exists in Sourcecodester Online Event Booking and - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame - https://github.com/SYRTI/POC_to_review +- https://github.com/TheHackingRabbi/CVE-2021-42667 - https://github.com/WhooAmii/POC_to_review - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/nu11secur1ty/CVE-mitre diff --git a/2021/CVE-2021-42668.md b/2021/CVE-2021-42668.md index d6d5adfd88..b047bbd96a 100644 --- a/2021/CVE-2021-42668.md +++ b/2021/CVE-2021-42668.md @@ -21,6 +21,7 @@ A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal i - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame - https://github.com/SYRTI/POC_to_review +- https://github.com/TheHackingRabbi/CVE-2021-42668 - https://github.com/WhooAmii/POC_to_review - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/nu11secur1ty/CVE-mitre diff --git a/2021/CVE-2021-42669.md b/2021/CVE-2021-42669.md index d86b00363d..96372a60fe 100644 --- a/2021/CVE-2021-42669.md +++ b/2021/CVE-2021-42669.md @@ -20,6 +20,7 @@ A file upload vulnerability exists in Sourcecodester Engineers Online Portal in - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame - https://github.com/SYRTI/POC_to_review +- https://github.com/TheHackingRabbi/CVE-2021-42669 - https://github.com/WhooAmii/POC_to_review - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/nu11secur1ty/CVE-mitre diff --git a/2021/CVE-2021-42670.md b/2021/CVE-2021-42670.md index 927942ecfe..41e7ee97a9 100644 --- a/2021/CVE-2021-42670.md +++ b/2021/CVE-2021-42670.md @@ -20,6 +20,7 @@ A SQL injection vulnerability exists in Sourcecodester Engineers Online Portal i - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame - https://github.com/SYRTI/POC_to_review +- https://github.com/TheHackingRabbi/CVE-2021-42670 - https://github.com/WhooAmii/POC_to_review - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/nu11secur1ty/CVE-mitre diff --git a/2021/CVE-2021-42671.md b/2021/CVE-2021-42671.md index 2b1bd3dd80..2d55cb5f2d 100644 --- a/2021/CVE-2021-42671.md +++ b/2021/CVE-2021-42671.md @@ -21,6 +21,7 @@ An incorrect access control vulnerability exists in Sourcecodester Engineers Onl - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame - https://github.com/SYRTI/POC_to_review +- https://github.com/TheHackingRabbi/CVE-2021-42671 - https://github.com/WhooAmii/POC_to_review - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/nu11secur1ty/CVE-mitre diff --git a/2021/CVE-2021-43032.md b/2021/CVE-2021-43032.md index 274671ed00..76627439a9 100644 --- a/2021/CVE-2021-43032.md +++ b/2021/CVE-2021-43032.md @@ -14,5 +14,6 @@ In XenForo through 2.2.7, a threat actor with access to the admin panel can crea #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/SakuraSamuraii/CVE-2021-43032 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2021/CVE-2021-43129.md b/2021/CVE-2021-43129.md index 4f8b36296e..fc4a33d259 100644 --- a/2021/CVE-2021-43129.md +++ b/2021/CVE-2021-43129.md @@ -16,6 +16,7 @@ A bypass exists for Desire2Learn/D2L Brightspace’s “Disable Right Click” o - https://github.com/ARPSyndicate/cvemon - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review +- https://github.com/Skotizo/CVE-2021-43129 - https://github.com/WhooAmii/POC_to_review - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/trhacknon/Pocingit diff --git a/2021/CVE-2021-43267.md b/2021/CVE-2021-43267.md index 14f0a9974c..dd4b1a08d8 100644 --- a/2021/CVE-2021-43267.md +++ b/2021/CVE-2021-43267.md @@ -17,6 +17,7 @@ An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. - https://github.com/ARPSyndicate/cvemon - https://github.com/Al1ex/LinuxEelvation - https://github.com/DarkSprings/CVE-2021-43267-POC +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/aixcc-public/challenge-001-exemplar - https://github.com/bcoles/kasld @@ -37,6 +38,7 @@ An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. - https://github.com/ohnonoyesyes/CVE-2021-43267 - https://github.com/soosmile/POC - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/zzhacked/CVE-2021-43267 diff --git a/2021/CVE-2021-43287.md b/2021/CVE-2021-43287.md index 033d804ca0..44d46a29a8 100644 --- a/2021/CVE-2021-43287.md +++ b/2021/CVE-2021-43287.md @@ -19,6 +19,7 @@ No PoCs from references. - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/ArrestX/--POC +- https://github.com/CLincat/vulcat - https://github.com/HimmelAward/Goby_POC - https://github.com/KayCHENvip/vulnerability-poc - https://github.com/Miraitowa70/POC-Notes diff --git a/2021/CVE-2021-43609.md b/2021/CVE-2021-43609.md index 52bbd3b3a2..feb99f7e79 100644 --- a/2021/CVE-2021-43609.md +++ b/2021/CVE-2021-43609.md @@ -14,4 +14,5 @@ An issue was discovered in Spiceworks Help Desk Server before 1.3.3. A Blind Boo - https://www.linkedin.com/pulse/cve-2021-43609-write-up-division5-security-4lgwe #### Github +- https://github.com/d5sec/CVE-2021-43609-POC diff --git a/2021/CVE-2021-43798.md b/2021/CVE-2021-43798.md index a2173c2595..23295f5c34 100644 --- a/2021/CVE-2021-43798.md +++ b/2021/CVE-2021-43798.md @@ -17,6 +17,7 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver - https://github.com/0day404/vulnerability-poc - https://github.com/0x783kb/Security-operation-book - https://github.com/0xAwali/Virtual-Host +- https://github.com/0xMarcio/cve - https://github.com/20142995/Goby - https://github.com/20142995/pocsuite3 - https://github.com/20142995/sectool diff --git a/2021/CVE-2021-43980.md b/2021/CVE-2021-43980.md index 242fc20da5..6a707c637b 100644 --- a/2021/CVE-2021-43980.md +++ b/2021/CVE-2021-43980.md @@ -15,4 +15,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/sr-monika/sprint-rest +- https://github.com/versio-io/product-lifecycle-security-api diff --git a/2021/CVE-2021-44228.md b/2021/CVE-2021-44228.md index 1f9be59cee..e7f698fc6b 100644 --- a/2021/CVE-2021-44228.md +++ b/2021/CVE-2021-44228.md @@ -294,6 +294,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - https://github.com/LemonCraftRu/JndiRemover - https://github.com/LeonardoE95/yt-it - https://github.com/Lercas/CVE_scoring +- https://github.com/LibHunter/LibHunter - https://github.com/Liderbord/Log4j-Security - https://github.com/LinkMJB/log4shell_scanner - https://github.com/Live-Hack-CVE/CVE-2021-4104 @@ -776,6 +777,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - https://github.com/emadshanab/Nuclei-Templates-Collection - https://github.com/emilywang0/CVE_testing_VULN - https://github.com/emilywang0/MergeBase_test_vuln +- https://github.com/enomothem/PenTestNote - https://github.com/erickrr-bd/TekiumLog4jApp - https://github.com/ericmedina024/JndiLookupRemover - https://github.com/erikschippers/Log4J-Hyper-V-Script diff --git a/2021/CVE-2021-44733.md b/2021/CVE-2021-44733.md index 17202e6dea..68994ab94d 100644 --- a/2021/CVE-2021-44733.md +++ b/2021/CVE-2021-44733.md @@ -32,6 +32,7 @@ A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Lin - https://github.com/soosmile/POC - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/trhacknon/Pocingit +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/zecool/cve diff --git a/2021/CVE-2021-45041.md b/2021/CVE-2021-45041.md index baf773bd7e..6fe3ec963b 100644 --- a/2021/CVE-2021-45041.md +++ b/2021/CVE-2021-45041.md @@ -17,6 +17,7 @@ SuiteCRM before 7.12.2 and 8.x before 8.0.1 allows authenticated SQL injection v - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review +- https://github.com/manuelz120/CVE-2021-45041 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/soosmile/POC - https://github.com/trhacknon/Pocingit diff --git a/2021/CVE-2021-45046.md b/2021/CVE-2021-45046.md index 0d94a88b0b..028edc19ec 100644 --- a/2021/CVE-2021-45046.md +++ b/2021/CVE-2021-45046.md @@ -57,6 +57,7 @@ It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was i - https://github.com/HynekPetrak/log4shell-finder - https://github.com/ITninja04/awesome-stars - https://github.com/JERRY123S/all-poc +- https://github.com/LibHunter/LibHunter - https://github.com/LoliKingdom/NukeJndiLookupFromLog4j - https://github.com/MLX15/log4j-scan - https://github.com/Maelstromage/Log4jSherlock diff --git a/2021/CVE-2021-45268.md b/2021/CVE-2021-45268.md index 9e5d8b5e72..2e54419e10 100644 --- a/2021/CVE-2021-45268.md +++ b/2021/CVE-2021-45268.md @@ -15,5 +15,6 @@ #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/V1n1v131r4/CSRF-to-RCE-on-Backdrop-CMS - https://github.com/V1n1v131r4/My-CVEs diff --git a/2021/CVE-2021-45416.md b/2021/CVE-2021-45416.md index d42a5914fb..6e8fccdcd3 100644 --- a/2021/CVE-2021-45416.md +++ b/2021/CVE-2021-45416.md @@ -13,6 +13,7 @@ Reflected Cross-site scripting (XSS) vulnerability in RosarioSIS 8.2.1 allows at - https://github.com/86x/CVE-2021-45416 #### Github +- https://github.com/86x/CVE-2021-45416 - https://github.com/ARPSyndicate/cvemon - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review diff --git a/2021/CVE-2021-45608.md b/2021/CVE-2021-45608.md index 845cc1e680..2c8aa5a83c 100644 --- a/2021/CVE-2021-45608.md +++ b/2021/CVE-2021-45608.md @@ -24,5 +24,6 @@ Certain D-Link, Edimax, NETGEAR, TP-Link, Tenda, and Western Digital devices are - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2021/CVE-2021-45897.md b/2021/CVE-2021-45897.md index 7f4d24dddd..63b7b43bad 100644 --- a/2021/CVE-2021-45897.md +++ b/2021/CVE-2021-45897.md @@ -19,6 +19,7 @@ SuiteCRM before 7.12.3 and 8.x before 8.0.2 allows remote code execution. - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review - https://github.com/binganao/vulns-2022 +- https://github.com/manuelz120/CVE-2021-45897 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/soosmile/POC - https://github.com/trhacknon/Pocingit diff --git a/2021/CVE-2021-46088.md b/2021/CVE-2021-46088.md index 48f7e69ed6..2b2192ae6a 100644 --- a/2021/CVE-2021-46088.md +++ b/2021/CVE-2021-46088.md @@ -14,4 +14,5 @@ Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Execution (RC #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/paalbra/zabbix-zbxsec-7 diff --git a/2021/CVE-2021-46557.md b/2021/CVE-2021-46557.md index 35d6e13800..8604da1120 100644 --- a/2021/CVE-2021-46557.md +++ b/2021/CVE-2021-46557.md @@ -14,5 +14,6 @@ Vicidial 2.14-783a was discovered to contain a cross-site scripting (XSS) vulner #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/Zeyad-Azima/Vicidial-stored-XSS - https://github.com/Zeyad-Azima/Zeyad-Azima diff --git a/2021/CVE-2021-46558.md b/2021/CVE-2021-46558.md index 2700cc545e..873cd66b9f 100644 --- a/2021/CVE-2021-46558.md +++ b/2021/CVE-2021-46558.md @@ -14,5 +14,6 @@ Multiple cross-site scripting (XSS) vulnerabilities in the Add User module of Is #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/Zeyad-Azima/Issabel-stored-XSS - https://github.com/Zeyad-Azima/Zeyad-Azima diff --git a/2022/CVE-2022-0185.md b/2022/CVE-2022-0185.md index 576582147f..a3edcc1d1e 100644 --- a/2022/CVE-2022-0185.md +++ b/2022/CVE-2022-0185.md @@ -27,6 +27,7 @@ A heap-based buffer overflow flaw was found in the way the legacy_parse_param fu - https://github.com/GhostTroops/TOP - https://github.com/Ha0-Y/LinuxKernelExploits - https://github.com/Ha0-Y/kernel-exploit-cve +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JERRY123S/all-poc - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Metarget/metarget @@ -88,6 +89,7 @@ A heap-based buffer overflow flaw was found in the way the legacy_parse_param fu - https://github.com/veritas501/pipe-primitive - https://github.com/weeka10/-hktalent-TOP - https://github.com/whoforget/CVE-POC +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xuetusummer/Penetration_Testing_POC - https://github.com/youwizard/CVE-POC diff --git a/2022/CVE-2022-0236.md b/2022/CVE-2022-0236.md index 26b104ff6f..503fa9479a 100644 --- a/2022/CVE-2022-0236.md +++ b/2022/CVE-2022-0236.md @@ -22,6 +22,7 @@ The WP Import Export WordPress plugin (both free and premium versions) is vulner - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/qurbat/CVE-2022-0236 - https://github.com/soosmile/POC - https://github.com/trhacknon/Pocingit - https://github.com/whoforget/CVE-POC diff --git a/2022/CVE-2022-0435.md b/2022/CVE-2022-0435.md index 75f879664f..42726a9741 100644 --- a/2022/CVE-2022-0435.md +++ b/2022/CVE-2022-0435.md @@ -30,6 +30,7 @@ No PoCs from references. - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/teresaweber685/book_list - https://github.com/whoforget/CVE-POC +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/wlswotmd/CVE-2022-0435 - https://github.com/xairy/linux-kernel-exploitation - https://github.com/youwizard/CVE-POC diff --git a/2022/CVE-2022-0529.md b/2022/CVE-2022-0529.md index 969c05be1b..be2674e7d9 100644 --- a/2022/CVE-2022-0529.md +++ b/2022/CVE-2022-0529.md @@ -15,6 +15,7 @@ A flaw was found in Unzip. The vulnerability occurs during the conversion of a w #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/ByteHackr/unzip_poc - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review diff --git a/2022/CVE-2022-0530.md b/2022/CVE-2022-0530.md index 66540b293c..9cdbf0dc2c 100644 --- a/2022/CVE-2022-0530.md +++ b/2022/CVE-2022-0530.md @@ -15,6 +15,7 @@ A flaw was found in Unzip. The vulnerability occurs during the conversion of a w #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/ByteHackr/unzip_poc - https://github.com/maxim12z/ECommerce - https://github.com/nanaao/unzip_poc diff --git a/2022/CVE-2022-0557.md b/2022/CVE-2022-0557.md index 72609896c0..33524626d4 100644 --- a/2022/CVE-2022-0557.md +++ b/2022/CVE-2022-0557.md @@ -16,6 +16,7 @@ OS Command Injection in Packagist microweber/microweber prior to 1.2.11. #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/AggressiveUser/AggressiveUser - https://github.com/Enes4xd/Enes4xd - https://github.com/cr0ss2018/cr0ss2018 - https://github.com/enesamaafkolan/enesamaafkolan diff --git a/2022/CVE-2022-0563.md b/2022/CVE-2022-0563.md index 222cd791d9..382dc4de26 100644 --- a/2022/CVE-2022-0563.md +++ b/2022/CVE-2022-0563.md @@ -22,6 +22,7 @@ No PoCs from references. - https://github.com/cdupuis/image-api - https://github.com/denoslab/ensf400-lab10-ssc - https://github.com/fokypoky/places-list +- https://github.com/m-pasima/CI-CD-Security-image-scan - https://github.com/mauraneh/WIK-DPS-TP02 - https://github.com/testing-felickz/docker-scout-demo - https://github.com/toyhoshi/helm diff --git a/2022/CVE-2022-0847.md b/2022/CVE-2022-0847.md index 4f14f0f202..9a3901e4a9 100644 --- a/2022/CVE-2022-0847.md +++ b/2022/CVE-2022-0847.md @@ -75,6 +75,7 @@ A flaw was found in the way the "flags" member of the new pipe buffer structure - https://github.com/Ha0-Y/LinuxKernelExploits - https://github.com/Ha0-Y/kernel-exploit-cve - https://github.com/HadessCS/Awesome-Privilege-Escalation +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/IHenakaarachchi/debian11-dirty_pipe-patcher - https://github.com/ITMarcin2211/CVE-2022-0847-DirtyPipe-Exploit - https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation @@ -333,6 +334,7 @@ A flaw was found in the way the "flags" member of the new pipe buffer structure - https://github.com/weeka10/-hktalent-TOP - https://github.com/whoami-chmod777/Hacking-Articles-Linux-Privilege-Escalation- - https://github.com/whoforget/CVE-POC +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/wpressly/exploitations - https://github.com/x90hack/vulnerabilty_lab - https://github.com/xairy/linux-kernel-exploitation diff --git a/2022/CVE-2022-0995.md b/2022/CVE-2022-0995.md index c00fdef2f3..4900846498 100644 --- a/2022/CVE-2022-0995.md +++ b/2022/CVE-2022-0995.md @@ -28,6 +28,7 @@ An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch - https://github.com/CVEDB/top - https://github.com/Ch4nc3n/PublicExploitation - https://github.com/GhostTroops/TOP +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JERRY123S/all-poc - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Metarget/metarget @@ -63,6 +64,7 @@ An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch - https://github.com/trhacknon/Pocingit - https://github.com/weeka10/-hktalent-TOP - https://github.com/whoforget/CVE-POC +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xuetusummer/Penetration_Testing_POC - https://github.com/youwizard/CVE-POC diff --git a/2022/CVE-2022-0996.md b/2022/CVE-2022-0996.md index 8a7c4d9716..54b7d6757c 100644 --- a/2022/CVE-2022-0996.md +++ b/2022/CVE-2022-0996.md @@ -14,4 +14,5 @@ A vulnerability was found in the 389 Directory Server that allows expired passwo #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/ByteHackr/389-ds-base diff --git a/2022/CVE-2022-1015.md b/2022/CVE-2022-1015.md index 211ec87493..bfcf543ede 100644 --- a/2022/CVE-2022-1015.md +++ b/2022/CVE-2022-1015.md @@ -20,6 +20,7 @@ A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of t - https://github.com/ARPSyndicate/cvemon - https://github.com/EGI-Federation/SVG-advisories - https://github.com/H4K6/CVE-2023-0179-PoC +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Mr-xn/Penetration_Testing_POC - https://github.com/NaInSec/CVE-PoC-in-GitHub @@ -59,6 +60,7 @@ A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of t - https://github.com/trhacknon/Pocingit - https://github.com/wechicken456/Linux-kernel - https://github.com/whoforget/CVE-POC +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/wlswotmd/CVE-2022-1015 - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xuetusummer/Penetration_Testing_POC diff --git a/2022/CVE-2022-1016.md b/2022/CVE-2022-1016.md index 5322a899da..01a8a3dd88 100644 --- a/2022/CVE-2022-1016.md +++ b/2022/CVE-2022-1016.md @@ -25,6 +25,7 @@ A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_ch - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/wechicken456/Linux-kernel +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/yaobinwen/robin_on_rails - https://github.com/zanezhub/CVE-2022-1015-1016 diff --git a/2022/CVE-2022-1172.md b/2022/CVE-2022-1172.md index f4a8782900..03545c8d32 100644 --- a/2022/CVE-2022-1172.md +++ b/2022/CVE-2022-1172.md @@ -13,5 +13,5 @@ Null Pointer Dereference Caused Segmentation Fault in GitHub repository gpac/gpa - https://huntr.dev/bounties/a26cb79c-9257-4fbf-98c5-a5a331efa264 #### Github -No PoCs found on GitHub currently. +- https://github.com/Joe1sn/Joe1sn diff --git a/2022/CVE-2022-1388.md b/2022/CVE-2022-1388.md index 9a49fae77e..e79b95c5e1 100644 --- a/2022/CVE-2022-1388.md +++ b/2022/CVE-2022-1388.md @@ -19,6 +19,7 @@ On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5. - https://github.com/0x783kb/Security-operation-book - https://github.com/0x7eTeam/CVE-2022-1388-PocExp - https://github.com/0xAgun/CVE-2022-1388 +- https://github.com/0xMarcio/cve - https://github.com/0xf4n9x/CVE-2022-1388 - https://github.com/20142995/Goby - https://github.com/20142995/pocsuite3 diff --git a/2022/CVE-2022-1530.md b/2022/CVE-2022-1530.md index 6fa84726c0..7681d4e508 100644 --- a/2022/CVE-2022-1530.md +++ b/2022/CVE-2022-1530.md @@ -13,5 +13,5 @@ Cross-site Scripting (XSS) in GitHub repository livehelperchat/livehelperchat pr - https://huntr.dev/bounties/8fd8de01-7e83-4324-9cc8-a97acb9b70d6 #### Github -No PoCs found on GitHub currently. +- https://github.com/AggressiveUser/AggressiveUser diff --git a/2022/CVE-2022-1588.md b/2022/CVE-2022-1588.md index d91bf8ccd2..7924d22462 100644 --- a/2022/CVE-2022-1588.md +++ b/2022/CVE-2022-1588.md @@ -14,4 +14,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/AggressiveUser/AggressiveUser diff --git a/2022/CVE-2022-1768.md b/2022/CVE-2022-1768.md index 4e771c71af..b99b28143a 100644 --- a/2022/CVE-2022-1768.md +++ b/2022/CVE-2022-1768.md @@ -5,9 +5,7 @@ ### Description -The RSVPMaker plugin for WordPress is vulnerable to unauthenticated SQL Injection due to insufficient escaping and parameterization on user supplied data passed to multiple SQL queries in the ~/rsvpmaker-email.php file. This makes it possible for unauthenticated attackers to steal sensitive information from the database in versions up to, and including, 9.3.2. - -Please note that this is separate from CVE-2022-1453 & CVE-2022-1505. +The RSVPMaker plugin for WordPress is vulnerable to unauthenticated SQL Injection due to insufficient escaping and parameterization on user supplied data passed to multiple SQL queries in the ~/rsvpmaker-email.php file. This makes it possible for unauthenticated attackers to steal sensitive information from the database in versions up to, and including, 9.3.2. Please note that this is separate from CVE-2022-1453 & CVE-2022-1505. ### POC diff --git a/2022/CVE-2022-1786.md b/2022/CVE-2022-1786.md index 883f8588ff..571d65087c 100644 --- a/2022/CVE-2022-1786.md +++ b/2022/CVE-2022-1786.md @@ -27,5 +27,6 @@ No PoCs from references. - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/scratchadams/Heap-Resources - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2022/CVE-2022-1972.md b/2022/CVE-2022-1972.md index 8739d8f065..bfa740e025 100644 --- a/2022/CVE-2022-1972.md +++ b/2022/CVE-2022-1972.md @@ -36,6 +36,7 @@ No PoCs from references. - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/trhacknon/Pocingit - https://github.com/whoforget/CVE-POC +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xuetusummer/Penetration_Testing_POC - https://github.com/youwizard/CVE-POC diff --git a/2022/CVE-2022-20004.md b/2022/CVE-2022-20004.md index 080795adfe..d6b36b657e 100644 --- a/2022/CVE-2022-20004.md +++ b/2022/CVE-2022-20004.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo - https://github.com/Live-Hack-CVE/CVE-2022-2000 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review diff --git a/2022/CVE-2022-20005.md b/2022/CVE-2022-20005.md index c86f1ba6c9..7b1816f7f1 100644 --- a/2022/CVE-2022-20005.md +++ b/2022/CVE-2022-20005.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo - https://github.com/Live-Hack-CVE/CVE-2022-2000 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review diff --git a/2022/CVE-2022-20007.md b/2022/CVE-2022-20007.md index 95f3bf932e..09dd046057 100644 --- a/2022/CVE-2022-20007.md +++ b/2022/CVE-2022-20007.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List +- https://github.com/CVEDB/awesome-cve-repo - https://github.com/Live-Hack-CVE/CVE-2022-2000 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review diff --git a/2022/CVE-2022-20122.md b/2022/CVE-2022-20122.md index 1b32571570..53b869b080 100644 --- a/2022/CVE-2022-20122.md +++ b/2022/CVE-2022-20122.md @@ -25,5 +25,6 @@ No PoCs from references. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2022/CVE-2022-20186.md b/2022/CVE-2022-20186.md index c5ba071772..178091c5da 100644 --- a/2022/CVE-2022-20186.md +++ b/2022/CVE-2022-20186.md @@ -37,6 +37,7 @@ In kbase_mem_alias of mali_kbase_mem_linux.c, there is a possible arbitrary code - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/trhacknon/Pocingit - https://github.com/whoforget/CVE-POC +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/youwizard/CVE-POC - https://github.com/zecool/cve diff --git a/2022/CVE-2022-20699.md b/2022/CVE-2022-20699.md index 13a352f7a4..80be619112 100644 --- a/2022/CVE-2022-20699.md +++ b/2022/CVE-2022-20699.md @@ -14,6 +14,7 @@ Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D #### Github +- https://github.com/0xMarcio/cve - https://github.com/ARPSyndicate/cvemon - https://github.com/Audiobahn/CVE-2022-20699 - https://github.com/CVEDB/awesome-cve-repo diff --git a/2022/CVE-2022-2078.md b/2022/CVE-2022-2078.md index e86e70554b..8adf1ef0af 100644 --- a/2022/CVE-2022-2078.md +++ b/2022/CVE-2022-2078.md @@ -26,5 +26,6 @@ A vulnerability was found in the Linux kernel's nft_set_desc_concat_parse() func - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2022/CVE-2022-20826.md b/2022/CVE-2022-20826.md index 102b2dc7f4..7964df45a5 100644 --- a/2022/CVE-2022-20826.md +++ b/2022/CVE-2022-20826.md @@ -7,9 +7,7 @@ ### Description -A vulnerability in the secure boot implementation of Cisco Secure Firewalls 3100 Series that are running Cisco Adaptive Security Appliance (ASA) Software or Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated attacker with physical access to the device to bypass the secure boot functionality. - - This vulnerability is due to a logic error in the boot process. An attacker could exploit this vulnerability by injecting malicious code into a specific memory location during the boot process of an affected device. A successful exploit could allow the attacker to execute persistent code at boot time and break the chain of trust. +A vulnerability in the secure boot implementation of Cisco Secure Firewalls 3100 Series that are running Cisco Adaptive Security Appliance (ASA) Software or Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated attacker with physical access to the device to bypass the secure boot functionality. This vulnerability is due to a logic error in the boot process. An attacker could exploit this vulnerability by injecting malicious code into a specific memory location during the boot process of an affected device. A successful exploit could allow the attacker to execute persistent code at boot time and break the chain of trust. ### POC diff --git a/2022/CVE-2022-20829.md b/2022/CVE-2022-20829.md index e0c098ca67..69d9db99af 100644 --- a/2022/CVE-2022-20829.md +++ b/2022/CVE-2022-20829.md @@ -18,6 +18,7 @@ A vulnerability in the packaging of Cisco Adaptive Security Device Manager (ASDM - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review - https://github.com/jbaines-r7/cisco_asa_research +- https://github.com/jbaines-r7/theway - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-20917.md b/2022/CVE-2022-20917.md index 99bfe3c304..aeb11298d6 100644 --- a/2022/CVE-2022-20917.md +++ b/2022/CVE-2022-20917.md @@ -5,8 +5,7 @@ ### Description -A vulnerability in the Extensible Messaging and Presence Protocol (XMPP) message processing feature of Cisco Jabber could allow an authenticated, remote attacker to manipulate the content of XMPP messages that are used by the affected application. - This vulnerability is due to the improper handling of nested XMPP messages within requests that are sent to the Cisco Jabber client software. An attacker could exploit this vulnerability by connecting to an XMPP messaging server and sending crafted XMPP messages to an affected Jabber client. A successful exploit could allow the attacker to manipulate the content of XMPP messages, possibly allowing the attacker to cause the Jabber client application to perform unsafe actions. +A vulnerability in the Extensible Messaging and Presence Protocol (XMPP) message processing feature of Cisco Jabber could allow an authenticated, remote attacker to manipulate the content of XMPP messages that are used by the affected application. This vulnerability is due to the improper handling of nested XMPP messages within requests that are sent to the Cisco Jabber client software. An attacker could exploit this vulnerability by connecting to an XMPP messaging server and sending crafted XMPP messages to an affected Jabber client. A successful exploit could allow the attacker to manipulate the content of XMPP messages, possibly allowing the attacker to cause the Jabber client application to perform unsafe actions. ### POC diff --git a/2022/CVE-2022-20929.md b/2022/CVE-2022-20929.md index 92b424c05e..1f17dbc592 100644 --- a/2022/CVE-2022-20929.md +++ b/2022/CVE-2022-20929.md @@ -5,8 +5,7 @@ ### Description -A vulnerability in the upgrade signature verification of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an unauthenticated, local attacker to provide an unauthentic upgrade file for upload. - This vulnerability is due to insufficient cryptographic signature verification of upgrade files. An attacker could exploit this vulnerability by providing an administrator with an unauthentic upgrade file. A successful exploit could allow the attacker to fully compromise the Cisco NFVIS system. +A vulnerability in the upgrade signature verification of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an unauthenticated, local attacker to provide an unauthentic upgrade file for upload. This vulnerability is due to insufficient cryptographic signature verification of upgrade files. An attacker could exploit this vulnerability by providing an administrator with an unauthentic upgrade file. A successful exploit could allow the attacker to fully compromise the Cisco NFVIS system. ### POC diff --git a/2022/CVE-2022-20951.md b/2022/CVE-2022-20951.md index c3527663e7..c2cc20be6f 100644 --- a/2022/CVE-2022-20951.md +++ b/2022/CVE-2022-20951.md @@ -5,13 +5,7 @@ ### Description -A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot application could allow an authenticated, remote attacker to perform a server-side request forgery (SSRF) attack on an affected device. - - This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to obtain confidential information from the BroadWorks server and other device on the network. - - - - {{value}} ["%7b%7bvalue%7d%7d"])}]] +A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot application could allow an authenticated, remote attacker to perform a server-side request forgery (SSRF) attack on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to obtain confidential information from the BroadWorks server and other device on the network. {{value}} ["%7b%7bvalue%7d%7d"])}]] ### POC diff --git a/2022/CVE-2022-20956.md b/2022/CVE-2022-20956.md index 0c0ceb76d1..d58b278cd5 100644 --- a/2022/CVE-2022-20956.md +++ b/2022/CVE-2022-20956.md @@ -5,13 +5,7 @@ ### Description -A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to bypass authorization and access system files. - - This vulnerability is due to improper access control in the web-based management interface of an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to list, download, and delete certain files that they should not have access to. - - Cisco plans to release software updates that address this vulnerability. - - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx"] +A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to bypass authorization and access system files. This vulnerability is due to improper access control in the web-based management interface of an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to list, download, and delete certain files that they should not have access to. Cisco plans to release software updates that address this vulnerability. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx"] ### POC diff --git a/2022/CVE-2022-20964.md b/2022/CVE-2022-20964.md index ffc3b7ece5..63951bfbdb 100644 --- a/2022/CVE-2022-20964.md +++ b/2022/CVE-2022-20964.md @@ -5,11 +5,7 @@ ### Description -A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to inject arbitrary commands on the underlying operating system. - - This vulnerability is due to improper validation of user input within requests as part of the web-based management interface. An attacker could exploit this vulnerability by manipulating requests to the web-based management interface to contain operating system commands. A successful exploit could allow the attacker to execute arbitrary operating system commands on the underlying operating system with the privileges of the web services user. - - Cisco has not yet released software updates that address this vulnerability. +A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to inject arbitrary commands on the underlying operating system. This vulnerability is due to improper validation of user input within requests as part of the web-based management interface. An attacker could exploit this vulnerability by manipulating requests to the web-based management interface to contain operating system commands. A successful exploit could allow the attacker to execute arbitrary operating system commands on the underlying operating system with the privileges of the web services user. Cisco has not yet released software updates that address this vulnerability. ### POC diff --git a/2022/CVE-2022-20965.md b/2022/CVE-2022-20965.md index d6dc0633bc..6c6793d95a 100644 --- a/2022/CVE-2022-20965.md +++ b/2022/CVE-2022-20965.md @@ -5,13 +5,7 @@ ### Description -A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to take privileges actions within the web-based management interface. - - This vulnerability is due to improper access control on a feature within the web-based management interface of the affected system. An attacker could exploit this vulnerability by accessing features through direct requests, bypassing checks within the application. A successful exploit could allow the attacker to take privileged actions within the web-based management interface that should be otherwise restricted. - - - - {{value}} ["%7b%7bvalue%7d%7d"])}]] +A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to take privileges actions within the web-based management interface. This vulnerability is due to improper access control on a feature within the web-based management interface of the affected system. An attacker could exploit this vulnerability by accessing features through direct requests, bypassing checks within the application. A successful exploit could allow the attacker to take privileged actions within the web-based management interface that should be otherwise restricted. {{value}} ["%7b%7bvalue%7d%7d"])}]] ### POC diff --git a/2022/CVE-2022-20966.md b/2022/CVE-2022-20966.md index 263cb69704..2cb66bbf66 100644 --- a/2022/CVE-2022-20966.md +++ b/2022/CVE-2022-20966.md @@ -5,11 +5,7 @@ ### Description -A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to conduct cross-site scripting attacks against other users of the application web-based management interface. - - This vulnerability is due to improper validation of input to an application feature before storage within the web-based management interface. An attacker could exploit this vulnerability by creating entries within the application interface that contain malicious HTML or script code. A successful exploit could allow the attacker to store malicious HTML or script code within the application interface for use in further cross-site scripting attacks. - - Cisco has not yet released software updates that address this vulnerability. +A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to conduct cross-site scripting attacks against other users of the application web-based management interface. This vulnerability is due to improper validation of input to an application feature before storage within the web-based management interface. An attacker could exploit this vulnerability by creating entries within the application interface that contain malicious HTML or script code. A successful exploit could allow the attacker to store malicious HTML or script code within the application interface for use in further cross-site scripting attacks. Cisco has not yet released software updates that address this vulnerability. ### POC diff --git a/2022/CVE-2022-20967.md b/2022/CVE-2022-20967.md index c167e8f5dd..0b36cf5264 100644 --- a/2022/CVE-2022-20967.md +++ b/2022/CVE-2022-20967.md @@ -5,11 +5,7 @@ ### Description -A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to conduct cross-site scripting attacks against other users of the application web-based management interface. - - This vulnerability is due to improper validation of input to an application feature before storage within the web-based management interface. An attacker could exploit this vulnerability by creating entries within the application interface that contain malicious HTML or script code. A successful exploit could allow the attacker to store malicious HTML or script code within the application interface for use in further cross-site scripting attacks. - - Cisco has not yet released software updates that address this vulnerability. +A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to conduct cross-site scripting attacks against other users of the application web-based management interface. This vulnerability is due to improper validation of input to an application feature before storage within the web-based management interface. An attacker could exploit this vulnerability by creating entries within the application interface that contain malicious HTML or script code. A successful exploit could allow the attacker to store malicious HTML or script code within the application interface for use in further cross-site scripting attacks. Cisco has not yet released software updates that address this vulnerability. ### POC diff --git a/2022/CVE-2022-20968.md b/2022/CVE-2022-20968.md index 23a004dbb5..c52e69eff7 100644 --- a/2022/CVE-2022-20968.md +++ b/2022/CVE-2022-20968.md @@ -5,9 +5,7 @@ ### Description -A vulnerability in the Cisco Discovery Protocol processing feature of Cisco IP Phone 7800 and 8800 Series firmware could allow an unauthenticated, adjacent attacker to cause a stack overflow on an affected device. - -This vulnerability is due to insufficient input validation of received Cisco Discovery Protocol packets. An attacker could exploit this vulnerability by sending crafted Cisco Discovery Protocol traffic to an affected device. A successful exploit could allow the attacker to cause a stack overflow, resulting in possible remote code execution or a denial of service (DoS) condition on an affected device. +A vulnerability in the Cisco Discovery Protocol processing feature of Cisco IP Phone 7800 and 8800 Series firmware could allow an unauthenticated, adjacent attacker to cause a stack overflow on an affected device. This vulnerability is due to insufficient input validation of received Cisco Discovery Protocol packets. An attacker could exploit this vulnerability by sending crafted Cisco Discovery Protocol traffic to an affected device. A successful exploit could allow the attacker to cause a stack overflow, resulting in possible remote code execution or a denial of service (DoS) condition on an affected device. ### POC diff --git a/2022/CVE-2022-21894.md b/2022/CVE-2022-21894.md index 4bd1e20cc9..80de84058b 100644 --- a/2022/CVE-2022-21894.md +++ b/2022/CVE-2022-21894.md @@ -41,6 +41,7 @@ Secure Boot Security Feature Bypass Vulnerability No PoCs from references. #### Github +- https://github.com/0xMarcio/cve - https://github.com/ARPSyndicate/cvemon - https://github.com/ASkyeye/CVE-2022-21894-Payload - https://github.com/CVEDB/awesome-cve-repo diff --git a/2022/CVE-2022-21907.md b/2022/CVE-2022-21907.md index f0bfe2fd29..162bfa6eee 100644 --- a/2022/CVE-2022-21907.md +++ b/2022/CVE-2022-21907.md @@ -28,6 +28,7 @@ HTTP Protocol Stack Remote Code Execution Vulnerability - https://github.com/nu11secur1ty/Windows10Exploits/tree/master/2022/CVE-2022-21907 #### Github +- https://github.com/0xMarcio/cve - https://github.com/0xmaximus/Home-Demolisher - https://github.com/20142995/sectool - https://github.com/2lambda123/CVE-mitre diff --git a/2022/CVE-2022-22057.md b/2022/CVE-2022-22057.md index cbf5ab931a..7d9ea6b63e 100644 --- a/2022/CVE-2022-22057.md +++ b/2022/CVE-2022-22057.md @@ -27,5 +27,6 @@ Use after free in graphics fence due to a race condition while closing fence fil - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2022/CVE-2022-22719.md b/2022/CVE-2022-22719.md index b1a46be1a6..90ba4dd34a 100644 --- a/2022/CVE-2022-22719.md +++ b/2022/CVE-2022-22719.md @@ -15,6 +15,7 @@ A carefully crafted request body can cause a read to a random memory area which #### Github - https://github.com/8ctorres/SIND-Practicas - https://github.com/ARPSyndicate/cvemon +- https://github.com/EzeTauil/Maquina-Upload - https://github.com/PierreChrd/py-projet-tut - https://github.com/Totes5706/TotesHTB - https://github.com/bioly230/THM_Skynet diff --git a/2022/CVE-2022-22720.md b/2022/CVE-2022-22720.md index ac82e9c60d..a829f4dfc3 100644 --- a/2022/CVE-2022-22720.md +++ b/2022/CVE-2022-22720.md @@ -17,6 +17,7 @@ Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when err - https://github.com/8ctorres/SIND-Practicas - https://github.com/ARPSyndicate/cvemon - https://github.com/Benasin/CVE-2022-22720 +- https://github.com/EzeTauil/Maquina-Upload - https://github.com/PierreChrd/py-projet-tut - https://github.com/Totes5706/TotesHTB - https://github.com/bioly230/THM_Skynet diff --git a/2022/CVE-2022-22721.md b/2022/CVE-2022-22721.md index 814527c32d..09af0d081c 100644 --- a/2022/CVE-2022-22721.md +++ b/2022/CVE-2022-22721.md @@ -16,6 +16,7 @@ If LimitXMLRequestBody is set to allow request bodies larger than 350MB (default #### Github - https://github.com/8ctorres/SIND-Practicas - https://github.com/ARPSyndicate/cvemon +- https://github.com/EzeTauil/Maquina-Upload - https://github.com/PierreChrd/py-projet-tut - https://github.com/Totes5706/TotesHTB - https://github.com/bioly230/THM_Skynet diff --git a/2022/CVE-2022-22909.md b/2022/CVE-2022-22909.md index a4a7336c56..60298f5497 100644 --- a/2022/CVE-2022-22909.md +++ b/2022/CVE-2022-22909.md @@ -13,6 +13,7 @@ HotelDruid v3.0.3 was discovered to contain a remote code execution (RCE) vulner - https://github.com/0z09e/CVE-2022-22909 #### Github +- https://github.com/0z09e/CVE-2022-22909 - https://github.com/ARPSyndicate/cvemon - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review diff --git a/2022/CVE-2022-22947.md b/2022/CVE-2022-22947.md index b0b3dd1812..8b92a74d64 100644 --- a/2022/CVE-2022-22947.md +++ b/2022/CVE-2022-22947.md @@ -122,6 +122,7 @@ In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are v - https://github.com/debug4you/CVE-2022-22947 - https://github.com/dingxiao77/-cve-2022-22947- - https://github.com/dravenww/curated-article +- https://github.com/enomothem/PenTestNote - https://github.com/expzhizhuo/Burp_VulPscan - https://github.com/fbion/CVE-2022-22947 - https://github.com/flying0er/CVE-2022-22947-goby diff --git a/2022/CVE-2022-23222.md b/2022/CVE-2022-23222.md index 5a6e4d79b2..cd4809ca13 100644 --- a/2022/CVE-2022-23222.md +++ b/2022/CVE-2022-23222.md @@ -26,6 +26,7 @@ No PoCs from references. - https://github.com/Ch4nc3n/PublicExploitation - https://github.com/FridayOrtiz/CVE-2022-23222 - https://github.com/GhostTroops/TOP +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JERRY123S/all-poc - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/KayCHENvip/vulnerability-poc @@ -70,6 +71,7 @@ No PoCs from references. - https://github.com/trhacknon/Pocingit - https://github.com/weeka10/-hktalent-TOP - https://github.com/whoforget/CVE-POC +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/wxrdnx/bpf_exploit_template - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xuetusummer/Penetration_Testing_POC diff --git a/2022/CVE-2022-23342.md b/2022/CVE-2022-23342.md index 31142e11e6..841931e44b 100644 --- a/2022/CVE-2022-23342.md +++ b/2022/CVE-2022-23342.md @@ -14,6 +14,7 @@ The Hyland Onbase Application Server releases prior to 20.3.58.1000 and OnBase r #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/InitRoot/CVE-2022-23342 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review diff --git a/2022/CVE-2022-23378.md b/2022/CVE-2022-23378.md index 0a675e4d29..30d56a7623 100644 --- a/2022/CVE-2022-23378.md +++ b/2022/CVE-2022-23378.md @@ -16,6 +16,7 @@ A Cross-Site Scripting (XSS) vulnerability exists within the 3.2.2 version of Ta - https://github.com/ARPSyndicate/cvemon - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review +- https://github.com/TheGetch/CVE-2022-23378 - https://github.com/WhooAmii/POC_to_review - https://github.com/binganao/vulns-2022 - https://github.com/k0mi-tg/CVE-POC diff --git a/2022/CVE-2022-23539.md b/2022/CVE-2022-23539.md index 05cdd5a6dd..723d476490 100644 --- a/2022/CVE-2022-23539.md +++ b/2022/CVE-2022-23539.md @@ -5,7 +5,7 @@ ### Description -Versions `<=8.5.1` of `jsonwebtoken` library could be misconfigured so that legacy, insecure key types are used for signature verification. For example, DSA keys could be used with the RS256 algorithm. You are affected if you are using an algorithm and a key type other than a combination listed in the GitHub Security Advisory as unaffected. This issue has been fixed, please update to version 9.0.0. This version validates for asymmetric key type and algorithm combinations. Please refer to the above mentioned algorithm / key type combinations for the valid secure configuration. After updating to version 9.0.0, if you still intend to continue with signing or verifying tokens using invalid key type/algorithm value combinations, you’ll need to set the `allowInvalidAsymmetricKeyTypes` option to `true` in the `sign()` and/or `verify()` functions. +Versions `<=8.5.1` of `jsonwebtoken` library could be misconfigured so that legacy, insecure key types are used for signature verification. For example, DSA keys could be used with the RS256 algorithm. You are affected if you are using an algorithm and a key type other than a combination listed in the GitHub Security Advisory as unaffected. This issue has been fixed, please update to version 9.0.0. This version validates for asymmetric key type and algorithm combinations. Please refer to the above mentioned algorithm / key type combinations for the valid secure configuration. After updating to version 9.0.0, if you still intend to continue with signing or verifying tokens using invalid key type/algorithm value combinations, you’ll need to set the `allowInvalidAsymmetricKeyTypes` option to `true` in the `sign()` and/or `verify()` functions. ### POC diff --git a/2022/CVE-2022-23541.md b/2022/CVE-2022-23541.md index c8be7fa3d4..9d6025e9b4 100644 --- a/2022/CVE-2022-23541.md +++ b/2022/CVE-2022-23541.md @@ -6,7 +6,7 @@ ### Description -jsonwebtoken is an implementation of JSON Web Tokens. Versions `<= 8.5.1` of `jsonwebtoken` library can be misconfigured so that passing a poorly implemented key retrieval function referring to the `secretOrPublicKey` argument from the readme link will result in incorrect verification of tokens. There is a possibility of using a different algorithm and key combination in verification, other than the one that was used to sign the tokens. Specifically, tokens signed with an asymmetric public key could be verified with a symmetric HS256 algorithm. This can lead to successful validation of forged tokens. If your application is supporting usage of both symmetric key and asymmetric key in jwt.verify() implementation with the same key retrieval function. This issue has been patched, please update to version 9.0.0. +jsonwebtoken is an implementation of JSON Web Tokens. Versions `<= 8.5.1` of `jsonwebtoken` library can be misconfigured so that passing a poorly implemented key retrieval function referring to the `secretOrPublicKey` argument from the readme link will result in incorrect verification of tokens. There is a possibility of using a different algorithm and key combination in verification, other than the one that was used to sign the tokens. Specifically, tokens signed with an asymmetric public key could be verified with a symmetric HS256 algorithm. This can lead to successful validation of forged tokens. If your application is supporting usage of both symmetric key and asymmetric key in jwt.verify() implementation with the same key retrieval function. This issue has been patched, please update to version 9.0.0. ### POC diff --git a/2022/CVE-2022-23943.md b/2022/CVE-2022-23943.md index 6c83056776..0ee16695ef 100644 --- a/2022/CVE-2022-23943.md +++ b/2022/CVE-2022-23943.md @@ -15,6 +15,7 @@ Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an att #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/EzeTauil/Maquina-Upload - https://github.com/PierreChrd/py-projet-tut - https://github.com/Totes5706/TotesHTB - https://github.com/bioly230/THM_Skynet diff --git a/2022/CVE-2022-23967.md b/2022/CVE-2022-23967.md index 63a8f64881..5659781365 100644 --- a/2022/CVE-2022-23967.md +++ b/2022/CVE-2022-23967.md @@ -14,6 +14,7 @@ #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/MaherAzzouzi/CVE-2022-23967 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review diff --git a/2022/CVE-2022-24125.md b/2022/CVE-2022-24125.md index 418d7aa72c..b8d5286cea 100644 --- a/2022/CVE-2022-24125.md +++ b/2022/CVE-2022-24125.md @@ -22,6 +22,7 @@ The matchmaking servers of Bandai Namco FromSoftware Dark Souls III through 2022 - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/soosmile/POC +- https://github.com/tremwil/ds3-nrssr-rce - https://github.com/trhacknon/Pocingit - https://github.com/whoforget/CVE-POC - https://github.com/youwizard/CVE-POC diff --git a/2022/CVE-2022-24126.md b/2022/CVE-2022-24126.md index 8b256be987..0789ae6703 100644 --- a/2022/CVE-2022-24126.md +++ b/2022/CVE-2022-24126.md @@ -15,4 +15,5 @@ A buffer overflow in the NRSessionSearchResult parser in Bandai Namco FromSoftwa #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/anquanscan/sec-tools +- https://github.com/tremwil/ds3-nrssr-rce diff --git a/2022/CVE-2022-24354.md b/2022/CVE-2022-24354.md index a7b3443e1d..4455c9da72 100644 --- a/2022/CVE-2022-24354.md +++ b/2022/CVE-2022-24354.md @@ -25,5 +25,6 @@ No PoCs from references. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2022/CVE-2022-24449.md b/2022/CVE-2022-24449.md index bd5ee3d101..815c92520e 100644 --- a/2022/CVE-2022-24449.md +++ b/2022/CVE-2022-24449.md @@ -17,6 +17,7 @@ Solar appScreener through 3.10.4, when a valid license is not present, allows XX - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review +- https://github.com/jet-pentest/CVE-2022-24449 - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-24654.md b/2022/CVE-2022-24654.md index ae7f7b4196..d4f28a4001 100644 --- a/2022/CVE-2022-24654.md +++ b/2022/CVE-2022-24654.md @@ -19,6 +19,7 @@ Authenticated stored cross-site scripting (XSS) vulnerability in "Field Server A - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review - https://github.com/k0mi-tg/CVE-POC +- https://github.com/leonardobg/CVE-2022-24654 - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/trhacknon/Pocingit diff --git a/2022/CVE-2022-24899.md b/2022/CVE-2022-24899.md index a3d04a3cb6..37ed253bd7 100644 --- a/2022/CVE-2022-24899.md +++ b/2022/CVE-2022-24899.md @@ -14,4 +14,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/kenzer-templates +- https://github.com/AggressiveUser/AggressiveUser diff --git a/2022/CVE-2022-24999.md b/2022/CVE-2022-24999.md index c55a0d055c..aba0b42fda 100644 --- a/2022/CVE-2022-24999.md +++ b/2022/CVE-2022-24999.md @@ -21,6 +21,7 @@ qs before 6.10.3, as used in Express before 4.17.3 and other products, allows at - https://github.com/k0imet/pyfetch - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC +- https://github.com/n8tz/CVE-2022-24999 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/norefice-github/juvenile - https://github.com/seal-community/patches diff --git a/2022/CVE-2022-25090.md b/2022/CVE-2022-25090.md index 10ed96c716..97047acd15 100644 --- a/2022/CVE-2022-25090.md +++ b/2022/CVE-2022-25090.md @@ -17,6 +17,7 @@ Printix Secure Cloud Print Management through 1.3.1106.0 creates a temporary tem #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/ComparedArray/printix-CVE-2022-25090 - https://github.com/Enes4xd/Enes4xd - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review diff --git a/2022/CVE-2022-25165.md b/2022/CVE-2022-25165.md index d2d5c78fb1..e36565ae4d 100644 --- a/2022/CVE-2022-25165.md +++ b/2022/CVE-2022-25165.md @@ -19,6 +19,7 @@ An issue was discovered in Amazon AWS VPN Client 2.0.0. A TOCTOU race condition - https://github.com/H4cksploit/CVEs-master - https://github.com/Jaikumar3/Cloud-Security-Attacks - https://github.com/Mehedi-Babu/security_attacks_cloud +- https://github.com/RhinoSecurityLabs/CVEs - https://github.com/SummitRoute/csp_security_mistakes - https://github.com/atesemre/awesome-aws-security - https://github.com/blaise442/awesome-aws-security diff --git a/2022/CVE-2022-25166.md b/2022/CVE-2022-25166.md index f08c2c5c5a..0b6173f0d6 100644 --- a/2022/CVE-2022-25166.md +++ b/2022/CVE-2022-25166.md @@ -16,6 +16,7 @@ An issue was discovered in Amazon AWS VPN Client 2.0.0. It is possible to includ #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/H4cksploit/CVEs-master +- https://github.com/RhinoSecurityLabs/CVEs - https://github.com/merlinepedra/RHINOECURITY-CVEs - https://github.com/merlinepedra25/RHINOSECURITY-CVEs diff --git a/2022/CVE-2022-25265.md b/2022/CVE-2022-25265.md index 12f25d2271..e2c9df75a9 100644 --- a/2022/CVE-2022-25265.md +++ b/2022/CVE-2022-25265.md @@ -15,4 +15,5 @@ In the Linux kernel through 5.16.10, certain binary files may have the exec-all #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/x0reaxeax/exec-prot-bypass diff --git a/2022/CVE-2022-25622.md b/2022/CVE-2022-25622.md index 5a813ffe89..0569af25ca 100644 --- a/2022/CVE-2022-25622.md +++ b/2022/CVE-2022-25622.md @@ -1,12 +1,12 @@ ### [CVE-2022-25622](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25622) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20CFU%20DIQ&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20CFU%20PA&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20ET%20200AL%20IM%20157-1%20PN&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20ET%20200S%20IM151-8%20PN%2FDP%20CPU&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20ET%20200S%20IM151-8F%20PN%2FDP%20CPU&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20ET%20200pro%20IM154-8%20PN%2FDP%20CPU&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20ET%20200pro%20IM154-8F%20PN%2FDP%20CPU&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20ET%20200pro%20IM154-8FX%20PN%2FDP%20CPU&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20ET200AL%20IM157-1%20PN&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20ET200MP%20IM155-5%20PN%20HF%20(incl.%20SIPLUS%20variants)&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20ET200SP%20IM155-6%20MF%20HF&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20ET200SP%20IM155-6%20PN%20HA%20(incl.%20SIPLUS%20variants)&color=blue) @@ -82,9 +82,11 @@ ![](https://img.shields.io/static/v1?label=Version&message=0%3C%20*%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V1.1.10%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V1.2.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V2.0.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V4.7%20SP14%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V4.7.14%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V5.2%20SP3%20HF13%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V5.2%20SP3%20HF18%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V5.2.3.13%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V6.0.10%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V8.2.3%20&color=brighgreen) @@ -94,7 +96,7 @@ ### Description -A vulnerability has been identified in SIMATIC CFU DIQ (6ES7655-5PX31-1XX0), SIMATIC CFU PA (6ES7655-5PX11-0XX0), SIMATIC ET 200pro IM154-8 PN/DP CPU (6ES7154-8AB01-0AB0), SIMATIC ET 200pro IM154-8F PN/DP CPU (6ES7154-8FB01-0AB0), SIMATIC ET 200pro IM154-8FX PN/DP CPU (6ES7154-8FX00-0AB0), SIMATIC ET 200S IM151-8 PN/DP CPU (6ES7151-8AB01-0AB0), SIMATIC ET 200S IM151-8F PN/DP CPU (6ES7151-8FB01-0AB0), SIMATIC ET200AL IM157-1 PN, SIMATIC ET200ecoPN, AI 8xRTD/TC, M12-L (6ES7144-6JF00-0BB0), SIMATIC ET200ecoPN, CM 4x IO-Link, M12-L (6ES7148-6JE00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JG00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JJ00-0BB0), SIMATIC ET200ecoPN, DI 16x24VDC, M12-L (6ES7141-6BH00-0BB0), SIMATIC ET200ecoPN, DI 8x24VDC, M12-L (6ES7141-6BG00-0BB0), SIMATIC ET200ecoPN, DIQ 16x24VDC/2A, M12-L (6ES7143-6BH00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/0,5A, M12-L (6ES7142-6BG00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/2A, M12-L (6ES7142-6BR00-0BB0), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 MF HF, SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants), SIMATIC PN/MF Coupler (6ES7158-3MU10-0XA0), SIMATIC PN/PN Coupler (6ES7158-3AD10-0XA0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-300 CPU 314C-2 PN/DP (6ES7314-6EH04-0AB0), SIMATIC S7-300 CPU 315-2 PN/DP (6ES7315-2EH14-0AB0), SIMATIC S7-300 CPU 315F-2 PN/DP (6ES7315-2FJ14-0AB0), SIMATIC S7-300 CPU 315T-3 PN/DP (6ES7315-7TJ10-0AB0), SIMATIC S7-300 CPU 317-2 PN/DP (6ES7317-2EK14-0AB0), SIMATIC S7-300 CPU 317F-2 PN/DP (6ES7317-2FK14-0AB0), SIMATIC S7-300 CPU 317T-3 PN/DP (6ES7317-7TK10-0AB0), SIMATIC S7-300 CPU 317TF-3 PN/DP (6ES7317-7UL10-0AB0), SIMATIC S7-300 CPU 319-3 PN/DP (6ES7318-3EL01-0AB0), SIMATIC S7-300 CPU 319F-3 PN/DP (6ES7318-3FL01-0AB0), SIMATIC S7-400 CPU 412-2 PN V7 (6ES7412-2EK07-0AB0), SIMATIC S7-400 CPU 414-3 PN/DP V7 (6ES7414-3EM07-0AB0), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (6ES7414-3FM07-0AB0), SIMATIC S7-400 CPU 416-3 PN/DP V7 (6ES7416-3ES07-0AB0), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (6ES7416-3FS07-0AB0), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants), SIMATIC TDC CP51M1, SIMATIC TDC CPU555, SIMATIC WinAC RTX 2010 (6ES7671-0RC08-0YA0), SIMATIC WinAC RTX F 2010 (6ES7671-1RC08-0YA0), SINAMICS DCM, SINAMICS G110M, SINAMICS G115D, SINAMICS G120 (incl. SIPLUS variants), SINAMICS G130, SINAMICS G150, SINAMICS S110, SINAMICS S120 (incl. SIPLUS variants), SINAMICS S150, SINAMICS S210 (6SL5...), SINAMICS V90, SIPLUS ET 200S IM151-8 PN/DP CPU (6AG1151-8AB01-7AB0), SIPLUS ET 200S IM151-8F PN/DP CPU (6AG1151-8FB01-2AB0), SIPLUS HCS4200 CIM4210 (6BK1942-1AA00-0AA0), SIPLUS HCS4200 CIM4210C (6BK1942-1AA00-0AA1), SIPLUS HCS4300 CIM4310 (6BK1943-1AA00-0AA0), SIPLUS NET PN/PN Coupler (6AG2158-3AD10-4XA0), SIPLUS S7-300 CPU 314C-2 PN/DP (6AG1314-6EH04-7AB0), SIPLUS S7-300 CPU 315-2 PN/DP (6AG1315-2EH14-7AB0), SIPLUS S7-300 CPU 315F-2 PN/DP (6AG1315-2FJ14-2AB0), SIPLUS S7-300 CPU 317-2 PN/DP (6AG1317-2EK14-7AB0), SIPLUS S7-300 CPU 317F-2 PN/DP (6AG1317-2FK14-2AB0), SIPLUS S7-400 CPU 414-3 PN/DP V7 (6AG1414-3EM07-7AB0), SIPLUS S7-400 CPU 416-3 PN/DP V7 (6AG1416-3ES07-7AB0). The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined.This could allow an attacker to create a denial of service condition for TCP services on affected devices by sending specially crafted TCP segments. +A vulnerability has been identified in SIMATIC CFU DIQ (6ES7655-5PX31-1XX0), SIMATIC CFU PA (6ES7655-5PX11-0XX0), SIMATIC ET 200AL IM 157-1 PN (6ES7157-1AB00-0AB0), SIMATIC ET 200pro IM154-8 PN/DP CPU (6ES7154-8AB01-0AB0), SIMATIC ET 200pro IM154-8F PN/DP CPU (6ES7154-8FB01-0AB0), SIMATIC ET 200pro IM154-8FX PN/DP CPU (6ES7154-8FX00-0AB0), SIMATIC ET 200S IM151-8 PN/DP CPU (6ES7151-8AB01-0AB0), SIMATIC ET 200S IM151-8F PN/DP CPU (6ES7151-8FB01-0AB0), SIMATIC ET200ecoPN, AI 8xRTD/TC, M12-L (6ES7144-6JF00-0BB0), SIMATIC ET200ecoPN, CM 4x IO-Link, M12-L (6ES7148-6JE00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JG00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JJ00-0BB0), SIMATIC ET200ecoPN, DI 16x24VDC, M12-L (6ES7141-6BH00-0BB0), SIMATIC ET200ecoPN, DI 8x24VDC, M12-L (6ES7141-6BG00-0BB0), SIMATIC ET200ecoPN, DIQ 16x24VDC/2A, M12-L (6ES7143-6BH00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/0,5A, M12-L (6ES7142-6BG00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/2A, M12-L (6ES7142-6BR00-0BB0), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 MF HF, SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants), SIMATIC PN/MF Coupler (6ES7158-3MU10-0XA0), SIMATIC PN/PN Coupler (6ES7158-3AD10-0XA0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-300 CPU 314C-2 PN/DP (6ES7314-6EH04-0AB0), SIMATIC S7-300 CPU 315-2 PN/DP (6ES7315-2EH14-0AB0), SIMATIC S7-300 CPU 315F-2 PN/DP (6ES7315-2FJ14-0AB0), SIMATIC S7-300 CPU 315T-3 PN/DP (6ES7315-7TJ10-0AB0), SIMATIC S7-300 CPU 317-2 PN/DP (6ES7317-2EK14-0AB0), SIMATIC S7-300 CPU 317F-2 PN/DP (6ES7317-2FK14-0AB0), SIMATIC S7-300 CPU 317T-3 PN/DP (6ES7317-7TK10-0AB0), SIMATIC S7-300 CPU 317TF-3 PN/DP (6ES7317-7UL10-0AB0), SIMATIC S7-300 CPU 319-3 PN/DP (6ES7318-3EL01-0AB0), SIMATIC S7-300 CPU 319F-3 PN/DP (6ES7318-3FL01-0AB0), SIMATIC S7-400 CPU 412-2 PN V7 (6ES7412-2EK07-0AB0), SIMATIC S7-400 CPU 414-3 PN/DP V7 (6ES7414-3EM07-0AB0), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (6ES7414-3FM07-0AB0), SIMATIC S7-400 CPU 416-3 PN/DP V7 (6ES7416-3ES07-0AB0), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (6ES7416-3FS07-0AB0), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants), SIMATIC TDC CP51M1, SIMATIC TDC CPU555, SIMATIC WinAC RTX 2010 (6ES7671-0RC08-0YA0), SIMATIC WinAC RTX F 2010 (6ES7671-1RC08-0YA0), SINAMICS DCM, SINAMICS G110M, SINAMICS G115D, SINAMICS G120 (incl. SIPLUS variants), SINAMICS G130, SINAMICS G150, SINAMICS S110, SINAMICS S120 (incl. SIPLUS variants), SINAMICS S150, SINAMICS S210 (6SL5...), SINAMICS V90, SIPLUS ET 200S IM151-8 PN/DP CPU (6AG1151-8AB01-7AB0), SIPLUS ET 200S IM151-8F PN/DP CPU (6AG1151-8FB01-2AB0), SIPLUS HCS4200 CIM4210 (6BK1942-1AA00-0AA0), SIPLUS HCS4200 CIM4210C (6BK1942-1AA00-0AA1), SIPLUS HCS4300 CIM4310 (6BK1943-1AA00-0AA0), SIPLUS NET PN/PN Coupler (6AG2158-3AD10-4XA0), SIPLUS S7-300 CPU 314C-2 PN/DP (6AG1314-6EH04-7AB0), SIPLUS S7-300 CPU 315-2 PN/DP (6AG1315-2EH14-7AB0), SIPLUS S7-300 CPU 315F-2 PN/DP (6AG1315-2FJ14-2AB0), SIPLUS S7-300 CPU 317-2 PN/DP (6AG1317-2EK14-7AB0), SIPLUS S7-300 CPU 317F-2 PN/DP (6AG1317-2FK14-2AB0), SIPLUS S7-400 CPU 414-3 PN/DP V7 (6AG1414-3EM07-7AB0), SIPLUS S7-400 CPU 416-3 PN/DP V7 (6AG1416-3ES07-7AB0). The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined.This could allow an attacker to create a denial of service condition for TCP services on affected devices by sending specially crafted TCP segments. ### POC diff --git a/2022/CVE-2022-25636.md b/2022/CVE-2022-25636.md index f2bc12fd80..aebc29bef9 100644 --- a/2022/CVE-2022-25636.md +++ b/2022/CVE-2022-25636.md @@ -20,12 +20,14 @@ net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows loca - https://github.com/20142995/sectool - https://github.com/ARPSyndicate/cvemon - https://github.com/B0nfee/CVE-2022-25636 +- https://github.com/Bonfee/CVE-2022-25636 - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top - https://github.com/Ch4nc3n/PublicExploitation - https://github.com/EGI-Federation/SVG-advisories - https://github.com/GhostTroops/TOP +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JERRY123S/all-poc - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Meowmycks/OSCPprep-Cute @@ -73,6 +75,7 @@ net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows loca - https://github.com/veritas501/pipe-primitive - https://github.com/weeka10/-hktalent-TOP - https://github.com/whoforget/CVE-POC +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xuetusummer/Penetration_Testing_POC - https://github.com/yaobinwen/robin_on_rails diff --git a/2022/CVE-2022-25647.md b/2022/CVE-2022-25647.md index fc0641bed2..694fbdb02c 100644 --- a/2022/CVE-2022-25647.md +++ b/2022/CVE-2022-25647.md @@ -15,6 +15,7 @@ The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserializa #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CGCL-codes/PHunter +- https://github.com/LibHunter/LibHunter - https://github.com/hinat0y/Dataset1 - https://github.com/hinat0y/Dataset10 - https://github.com/hinat0y/Dataset11 diff --git a/2022/CVE-2022-25762.md b/2022/CVE-2022-25762.md index 1321bac417..d5d7c0b786 100644 --- a/2022/CVE-2022-25762.md +++ b/2022/CVE-2022-25762.md @@ -13,5 +13,5 @@ If a web application sends a WebSocket message concurrently with the WebSocket c - https://www.oracle.com/security-alerts/cpujul2022.html #### Github -No PoCs found on GitHub currently. +- https://github.com/versio-io/product-lifecycle-security-api diff --git a/2022/CVE-2022-2585.md b/2022/CVE-2022-2585.md index cc3ea0ac33..70173f614a 100644 --- a/2022/CVE-2022-2585.md +++ b/2022/CVE-2022-2585.md @@ -16,6 +16,7 @@ It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU t - https://www.openwall.com/lists/oss-security/2022/08/09/7 #### Github +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/greek0x0/2022-LPE-UAF diff --git a/2022/CVE-2022-2586.md b/2022/CVE-2022-2586.md index 57c8136950..7823731133 100644 --- a/2022/CVE-2022-2586.md +++ b/2022/CVE-2022-2586.md @@ -20,6 +20,7 @@ It was discovered that a nft object or expression could reference a nft set on a #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/Snoopy-Sec/Localroot-ALL-CVE @@ -45,6 +46,7 @@ It was discovered that a nft object or expression could reference a nft set on a - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/substing/internal_ctf - https://github.com/whoforget/CVE-POC +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/youwizard/CVE-POC - https://github.com/zecool/cve diff --git a/2022/CVE-2022-2588.md b/2022/CVE-2022-2588.md index e0591dc53c..66203a68e6 100644 --- a/2022/CVE-2022-2588.md +++ b/2022/CVE-2022-2588.md @@ -32,6 +32,7 @@ It was discovered that the cls_route filter implementation in the Linux kernel w - https://github.com/GhostTroops/TOP - https://github.com/Ha0-Y/LinuxKernelExploits - https://github.com/Ha0-Y/kernel-exploit-cve +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Markakd/CVE-2022-2588 - https://github.com/Markakd/DirtyCred diff --git a/2022/CVE-2022-25881.md b/2022/CVE-2022-25881.md index eadf4de85a..d6ef0743f0 100644 --- a/2022/CVE-2022-25881.md +++ b/2022/CVE-2022-25881.md @@ -6,8 +6,7 @@ ### Description -This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library. - +This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library. ### POC diff --git a/2022/CVE-2022-25883.md b/2022/CVE-2022-25883.md index ea9751c982..d1013f518e 100644 --- a/2022/CVE-2022-25883.md +++ b/2022/CVE-2022-25883.md @@ -5,9 +5,7 @@ ### Description -Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range. - - +Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range. ### POC diff --git a/2022/CVE-2022-25901.md b/2022/CVE-2022-25901.md index 29ba2bd99d..3da3249e07 100644 --- a/2022/CVE-2022-25901.md +++ b/2022/CVE-2022-25901.md @@ -7,8 +7,7 @@ ### Description -Versions of the package cookiejar before 2.1.4 are vulnerable to Regular Expression Denial of Service (ReDoS) via the Cookie.parse function, which uses an insecure regular expression. - +Versions of the package cookiejar before 2.1.4 are vulnerable to Regular Expression Denial of Service (ReDoS) via the Cookie.parse function, which uses an insecure regular expression. ### POC diff --git a/2022/CVE-2022-25943.md b/2022/CVE-2022-25943.md index 15b3c15134..999cc05714 100644 --- a/2022/CVE-2022-25943.md +++ b/2022/CVE-2022-25943.md @@ -14,6 +14,7 @@ The installer of WPS Office for Windows versions prior to v11.2.0.10258 fails to #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/HadiMed/KINGSOFT-WPS-Office-LPE - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review diff --git a/2022/CVE-2022-2602.md b/2022/CVE-2022-2602.md index c953f20dbb..8023236d00 100644 --- a/2022/CVE-2022-2602.md +++ b/2022/CVE-2022-2602.md @@ -15,6 +15,7 @@ io_uring UAF, Unix SCM garbage collection #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/LukeGix/CVE-2022-2602 - https://github.com/Mr-xn/Penetration_Testing_POC @@ -39,6 +40,7 @@ io_uring UAF, Unix SCM garbage collection - https://github.com/th3-5had0w/CVE-2022-2602-Study - https://github.com/wechicken456/Linux-kernel - https://github.com/whoforget/CVE-POC +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/youwizard/CVE-POC diff --git a/2022/CVE-2022-26134.md b/2022/CVE-2022-26134.md index 8b3a2dd932..95a7e3caa8 100644 --- a/2022/CVE-2022-26134.md +++ b/2022/CVE-2022-26134.md @@ -131,6 +131,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul - https://github.com/demining/Log4j-Vulnerability - https://github.com/e-hakson/OSCP - https://github.com/eljosep/OSCP-Guide +- https://github.com/enomothem/PenTestNote - https://github.com/f4yd4-s3c/cve-2022-26134 - https://github.com/getastra/hypejab - https://github.com/getdrive/PoC diff --git a/2022/CVE-2022-26180.md b/2022/CVE-2022-26180.md index 1b2c0c472c..93ee11584a 100644 --- a/2022/CVE-2022-26180.md +++ b/2022/CVE-2022-26180.md @@ -15,4 +15,5 @@ qdPM 9.2 allows Cross-Site Request Forgery (CSRF) via the index.php/myAccount/up #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/AggressiveUser/AggressiveUser diff --git a/2022/CVE-2022-26377.md b/2022/CVE-2022-26377.md index 132d66918e..6c366c3439 100644 --- a/2022/CVE-2022-26377.md +++ b/2022/CVE-2022-26377.md @@ -16,6 +16,7 @@ No PoCs from references. - https://github.com/ARPSyndicate/cvemon - https://github.com/Awrrays/FrameVul - https://github.com/ByteXenon/IP-Security-Database +- https://github.com/EzeTauil/Maquina-Upload - https://github.com/Totes5706/TotesHTB - https://github.com/bioly230/THM_Skynet - https://github.com/firatesatoglu/shodanSearch diff --git a/2022/CVE-2022-2639.md b/2022/CVE-2022-2639.md index 97080f059a..8dd00a67a9 100644 --- a/2022/CVE-2022-2639.md +++ b/2022/CVE-2022-2639.md @@ -17,6 +17,7 @@ No PoCs from references. - https://github.com/20142995/sectool - https://github.com/ARPSyndicate/cvemon - https://github.com/EkamSinghWalia/Detection-and-Mitigation-for-CVE-2022-2639 +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/KayCHENvip/vulnerability-poc - https://github.com/Miraitowa70/POC-Notes diff --git a/2022/CVE-2022-26629.md b/2022/CVE-2022-26629.md index ef3bd52658..c60362fa4c 100644 --- a/2022/CVE-2022-26629.md +++ b/2022/CVE-2022-26629.md @@ -22,6 +22,7 @@ An Access Control vulnerability exists in SoroushPlus+ Messenger 1.0.30 in the L - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/scopion/CVE-2022-26629 - https://github.com/soosmile/POC +- https://github.com/sysenter-eip/CVE-2022-26629 - https://github.com/trhacknon/Pocingit - https://github.com/whoforget/CVE-POC - https://github.com/youwizard/CVE-POC diff --git a/2022/CVE-2022-27134.md b/2022/CVE-2022-27134.md index d6fe178644..031a7e3e95 100644 --- a/2022/CVE-2022-27134.md +++ b/2022/CVE-2022-27134.md @@ -14,6 +14,7 @@ EOSIO batdappboomx v327c04cf has an Access-control vulnerability in the `transfe #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/Kenun99/CVE-batdappboomx - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review diff --git a/2022/CVE-2022-27226.md b/2022/CVE-2022-27226.md index 2e11bc8d13..b332dc0781 100644 --- a/2022/CVE-2022-27226.md +++ b/2022/CVE-2022-27226.md @@ -19,6 +19,7 @@ A CSRF issue in /api/crontab on iRZ Mobile Routers through 2022-03-16 allows a t - https://github.com/AlexRogalskiy/AlexRogalskiy - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review +- https://github.com/SakuraSamuraii/ez-iRZ - https://github.com/WhooAmii/POC_to_review - https://github.com/k0mi-tg/CVE-POC - https://github.com/karimhabush/cyberowl diff --git a/2022/CVE-2022-27254.md b/2022/CVE-2022-27254.md index ac408558f2..87fd16f7b4 100644 --- a/2022/CVE-2022-27254.md +++ b/2022/CVE-2022-27254.md @@ -38,6 +38,7 @@ The remote keyless system on Honda Civic 2018 vehicles sends the same RF signal - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/nonamecoder/CVE-2022-27254 - https://github.com/nonamecoder/FlipperZeroHondaFirmware - https://github.com/pipiscrew/timeline - https://github.com/soosmile/POC diff --git a/2022/CVE-2022-27255.md b/2022/CVE-2022-27255.md index 8f7c081f8f..9d6d0e26f6 100644 --- a/2022/CVE-2022-27255.md +++ b/2022/CVE-2022-27255.md @@ -13,6 +13,7 @@ In Realtek eCos RSDK 1.5.7p1 and MSDK 4.9.4p1, the SIP ALG function that rewrite No PoCs from references. #### Github +- https://github.com/0xMarcio/cve - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo diff --git a/2022/CVE-2022-27666.md b/2022/CVE-2022-27666.md index c64a017a9e..3f9b35f783 100644 --- a/2022/CVE-2022-27666.md +++ b/2022/CVE-2022-27666.md @@ -21,6 +21,7 @@ A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ip - https://github.com/CVEDB/top - https://github.com/Ch4nc3n/PublicExploitation - https://github.com/GhostTroops/TOP +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation - https://github.com/JERRY123S/all-poc - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits @@ -54,6 +55,7 @@ A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ip - https://github.com/trhacknon/Pocingit - https://github.com/weeka10/-hktalent-TOP - https://github.com/whoforget/CVE-POC +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xuetusummer/Penetration_Testing_POC - https://github.com/youwizard/CVE-POC diff --git a/2022/CVE-2022-27927.md b/2022/CVE-2022-27927.md index 6d848ad3ec..d9e6fab41f 100644 --- a/2022/CVE-2022-27927.md +++ b/2022/CVE-2022-27927.md @@ -19,6 +19,7 @@ A SQL injection vulnerability exists in Microfinance Management System 1.0 when - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review +- https://github.com/erengozaydin/Microfinance-Management-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-28079.md b/2022/CVE-2022-28079.md index 45e66d6fee..db3e4c45f6 100644 --- a/2022/CVE-2022-28079.md +++ b/2022/CVE-2022-28079.md @@ -19,6 +19,7 @@ College Management System v1.0 was discovered to contain a SQL injection vulnera - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review +- https://github.com/erengozaydin/College-Management-System-course_code-SQL-Injection-Authenticated - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-28080.md b/2022/CVE-2022-28080.md index 5fdf9bc166..8eac9aaebf 100644 --- a/2022/CVE-2022-28080.md +++ b/2022/CVE-2022-28080.md @@ -20,6 +20,7 @@ Royal Event Management System v1.0 was discovered to contain a SQL injection vul - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review +- https://github.com/erengozaydin/Royal-Event-Management-System-todate-SQL-Injection-Authenticated - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-28330.md b/2022/CVE-2022-28330.md index baf91ad1e2..5d50a97d3a 100644 --- a/2022/CVE-2022-28330.md +++ b/2022/CVE-2022-28330.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/8ctorres/SIND-Practicas - https://github.com/ARPSyndicate/cvemon +- https://github.com/EzeTauil/Maquina-Upload - https://github.com/firatesatoglu/shodanSearch - https://github.com/kasem545/vulnsearch diff --git a/2022/CVE-2022-28452.md b/2022/CVE-2022-28452.md index 829b3654d5..70aab1d030 100644 --- a/2022/CVE-2022-28452.md +++ b/2022/CVE-2022-28452.md @@ -21,6 +21,7 @@ Red Planet Laundry Management System 1.0 is vulnerable to SQL Injection. - https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review +- https://github.com/YavuzSahbaz/Red-Planet-Laundry-Management-System-1.0-is-vulnerable-to-SQL - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-28601.md b/2022/CVE-2022-28601.md index 54d948b40e..9a18641c2f 100644 --- a/2022/CVE-2022-28601.md +++ b/2022/CVE-2022-28601.md @@ -14,6 +14,7 @@ A Two-Factor Authentication (2FA) bypass vulnerability in "Simple 2FA Plugin for #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/FlaviuPopescu/CVE-2022-28601 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review diff --git a/2022/CVE-2022-28614.md b/2022/CVE-2022-28614.md index 463a126b80..03f0d6f3a4 100644 --- a/2022/CVE-2022-28614.md +++ b/2022/CVE-2022-28614.md @@ -16,6 +16,7 @@ No PoCs from references. #### Github - https://github.com/8ctorres/SIND-Practicas - https://github.com/ARPSyndicate/cvemon +- https://github.com/EzeTauil/Maquina-Upload - https://github.com/Totes5706/TotesHTB - https://github.com/bioly230/THM_Skynet - https://github.com/firatesatoglu/shodanSearch diff --git a/2022/CVE-2022-28615.md b/2022/CVE-2022-28615.md index 3dbb292193..a76cd3764a 100644 --- a/2022/CVE-2022-28615.md +++ b/2022/CVE-2022-28615.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/8ctorres/SIND-Practicas - https://github.com/ARPSyndicate/cvemon +- https://github.com/EzeTauil/Maquina-Upload - https://github.com/Totes5706/TotesHTB - https://github.com/bioly230/THM_Skynet - https://github.com/firatesatoglu/shodanSearch diff --git a/2022/CVE-2022-28986.md b/2022/CVE-2022-28986.md index 2ee1760934..a5ad6d752b 100644 --- a/2022/CVE-2022-28986.md +++ b/2022/CVE-2022-28986.md @@ -14,6 +14,7 @@ LMS Doctor Simple 2 Factor Authentication Plugin For Moodle Affected: 2021072900 #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/FlaviuPopescu/CVE-2022-28986 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review diff --git a/2022/CVE-2022-29072.md b/2022/CVE-2022-29072.md index 526b9179df..4748756897 100644 --- a/2022/CVE-2022-29072.md +++ b/2022/CVE-2022-29072.md @@ -37,6 +37,7 @@ - https://github.com/jbmihoub/all-poc - https://github.com/k0mi-tg/CVE-POC - https://github.com/kagancapar/7-zip-malicious-code-vulnerability +- https://github.com/kagancapar/CVE-2022-29072 - https://github.com/karimhabush/cyberowl - https://github.com/kun-g/Scraping-Github-trending - https://github.com/lions2012/Penetration_Testing_POC diff --git a/2022/CVE-2022-29404.md b/2022/CVE-2022-29404.md index 6c2e62e4af..4196676890 100644 --- a/2022/CVE-2022-29404.md +++ b/2022/CVE-2022-29404.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/8ctorres/SIND-Practicas - https://github.com/ARPSyndicate/cvemon +- https://github.com/EzeTauil/Maquina-Upload - https://github.com/Totes5706/TotesHTB - https://github.com/bioly230/THM_Skynet - https://github.com/firatesatoglu/shodanSearch diff --git a/2022/CVE-2022-29464.md b/2022/CVE-2022-29464.md index 6379b33cba..f6dcb0eb79 100644 --- a/2022/CVE-2022-29464.md +++ b/2022/CVE-2022-29464.md @@ -17,6 +17,7 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code #### Github - https://github.com/0day404/vulnerability-poc - https://github.com/0xAgun/CVE-2022-29464 +- https://github.com/0xMarcio/cve - https://github.com/20142995/Goby - https://github.com/20142995/pocsuite3 - https://github.com/2lambda123/panopticon-unattributed @@ -82,6 +83,7 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code - https://github.com/gbrsh/CVE-2022-29464 - https://github.com/gpiechnik2/nmap-CVE-2022-29464 - https://github.com/h3v0x/CVE-2022-29464 +- https://github.com/hakivvi/CVE-2022-29464 - https://github.com/hev0x/CVE-2022-29464 - https://github.com/hktalent/TOP - https://github.com/hupe1980/CVE-2022-29464 diff --git a/2022/CVE-2022-29582.md b/2022/CVE-2022-29582.md index 3f08e276b3..19a999f91b 100644 --- a/2022/CVE-2022-29582.md +++ b/2022/CVE-2022-29582.md @@ -38,6 +38,7 @@ In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a r - https://github.com/tr3ss/gofetch - https://github.com/trhacknon/Pocingit - https://github.com/whoforget/CVE-POC +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/youwizard/CVE-POC - https://github.com/zecool/cve diff --git a/2022/CVE-2022-29597.md b/2022/CVE-2022-29597.md index 95719230c8..05a566678e 100644 --- a/2022/CVE-2022-29597.md +++ b/2022/CVE-2022-29597.md @@ -16,6 +16,7 @@ Solutions Atlantic Regulatory Reporting System (RRS) v500 is vulnerable to Local - https://github.com/ARPSyndicate/cvemon - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review +- https://github.com/TheGetch/CVE-2022-29597 - https://github.com/WhooAmii/POC_to_review - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC diff --git a/2022/CVE-2022-29598.md b/2022/CVE-2022-29598.md index 3bf2854eb1..4b5dab99d0 100644 --- a/2022/CVE-2022-29598.md +++ b/2022/CVE-2022-29598.md @@ -16,6 +16,7 @@ Solutions Atlantic Regulatory Reporting System (RRS) v500 is vulnerable to an re - https://github.com/ARPSyndicate/cvemon - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review +- https://github.com/TheGetch/CVE-2022-29598 - https://github.com/WhooAmii/POC_to_review - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC diff --git a/2022/CVE-2022-29778.md b/2022/CVE-2022-29778.md index 3c96eb25f4..3d15f22aee 100644 --- a/2022/CVE-2022-29778.md +++ b/2022/CVE-2022-29778.md @@ -17,6 +17,7 @@ - https://github.com/ARPSyndicate/cvemon - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review +- https://github.com/TyeYeah/DIR-890L-1.20-RCE - https://github.com/WhooAmii/POC_to_review - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC diff --git a/2022/CVE-2022-30040.md b/2022/CVE-2022-30040.md index 08895be3ae..0c0d9cef39 100644 --- a/2022/CVE-2022-30040.md +++ b/2022/CVE-2022-30040.md @@ -15,6 +15,7 @@ Tenda AX1803 v1.0.0.1_2890 is vulnerable to Buffer Overflow. The vulnerability l #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/Le1a/CVE-2022-30040 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review diff --git a/2022/CVE-2022-30075.md b/2022/CVE-2022-30075.md index aca27cd83c..4a4df2176e 100644 --- a/2022/CVE-2022-30075.md +++ b/2022/CVE-2022-30075.md @@ -16,6 +16,7 @@ In TP-Link Router AX50 firmware 210730 and older, import of a malicious backup f - https://www.exploit-db.com/exploits/50962 #### Github +- https://github.com/0xMarcio/cve - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top @@ -30,6 +31,7 @@ In TP-Link Router AX50 firmware 210730 and older, import of a malicious backup f - https://github.com/Tig3rHu/Awesome_IOT_Vul_lib - https://github.com/Tig3rHu/MessageForV - https://github.com/WhooAmii/POC_to_review +- https://github.com/aaronsvk/CVE-2022-30075 - https://github.com/cyberanand1337x/bug-bounty-2022 - https://github.com/gscamelo/TP-Link-Archer-AX10-V1 - https://github.com/hktalent/TOP diff --git a/2022/CVE-2022-30292.md b/2022/CVE-2022-30292.md index a10ac28f63..e5b71e8316 100644 --- a/2022/CVE-2022-30292.md +++ b/2022/CVE-2022-30292.md @@ -20,6 +20,7 @@ Heap-based buffer overflow in sqbaselib.cpp in SQUIRREL 3.2 due to lack of a cer - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/sprushed/CVE-2022-30292 - https://github.com/trhacknon/Pocingit - https://github.com/whoforget/CVE-POC - https://github.com/youwizard/CVE-POC diff --git a/2022/CVE-2022-30556.md b/2022/CVE-2022-30556.md index 0e0542bdb1..8a299d31f5 100644 --- a/2022/CVE-2022-30556.md +++ b/2022/CVE-2022-30556.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/8ctorres/SIND-Practicas - https://github.com/ARPSyndicate/cvemon +- https://github.com/EzeTauil/Maquina-Upload - https://github.com/Totes5706/TotesHTB - https://github.com/bioly230/THM_Skynet - https://github.com/firatesatoglu/shodanSearch diff --git a/2022/CVE-2022-30929.md b/2022/CVE-2022-30929.md index aff38fcf32..9e47f148e2 100644 --- a/2022/CVE-2022-30929.md +++ b/2022/CVE-2022-30929.md @@ -14,6 +14,7 @@ Mini-Tmall v1.0 is vulnerable to Insecure Permissions via tomcat-embed-jasper. #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/AgainstTheLight/CVE-2022-30929 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review diff --git a/2022/CVE-2022-31138.md b/2022/CVE-2022-31138.md index 50be48d000..a146084d7c 100644 --- a/2022/CVE-2022-31138.md +++ b/2022/CVE-2022-31138.md @@ -18,6 +18,7 @@ mailcow is a mailserver suite. Prior to mailcow-dockerized version 2022-06a, an - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review - https://github.com/k0mi-tg/CVE-POC +- https://github.com/ly1g3/Mailcow-CVE-2022-31138 - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/trhacknon/Pocingit diff --git a/2022/CVE-2022-31245.md b/2022/CVE-2022-31245.md index 72f2abec8b..cf1299cbe0 100644 --- a/2022/CVE-2022-31245.md +++ b/2022/CVE-2022-31245.md @@ -20,6 +20,7 @@ mailcow before 2022-05d allows a remote authenticated user to inject OS commands - https://github.com/k0mi-tg/CVE-POC - https://github.com/karimhabush/cyberowl - https://github.com/ly1g3/Mailcow-CVE-2022-31138 +- https://github.com/ly1g3/Mailcow-CVE-2022-31245 - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/trhacknon/Pocingit diff --git a/2022/CVE-2022-31262.md b/2022/CVE-2022-31262.md index 0952315fd5..1697923555 100644 --- a/2022/CVE-2022-31262.md +++ b/2022/CVE-2022-31262.md @@ -25,6 +25,7 @@ An exploitable local privilege escalation vulnerability exists in GOG Galaxy 2.0 - https://github.com/lions2012/Penetration_Testing_POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/secure-77/CVE-2022-31262 - https://github.com/trhacknon/Pocingit - https://github.com/whoforget/CVE-POC - https://github.com/xuetusummer/Penetration_Testing_POC diff --git a/2022/CVE-2022-31373.md b/2022/CVE-2022-31373.md index 70a6314f12..0c18783337 100644 --- a/2022/CVE-2022-31373.md +++ b/2022/CVE-2022-31373.md @@ -15,5 +15,6 @@ SolarView Compact v6.0 was discovered to contain a cross-site scripting (XSS) vu #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates +- https://github.com/badboycxcc/SolarView_Compact_6.0_xss - https://github.com/badboycxcc/badboycxcc diff --git a/2022/CVE-2022-31813.md b/2022/CVE-2022-31813.md index a0c01e24d4..d69df67ee9 100644 --- a/2022/CVE-2022-31813.md +++ b/2022/CVE-2022-31813.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/8ctorres/SIND-Practicas - https://github.com/ARPSyndicate/cvemon +- https://github.com/EzeTauil/Maquina-Upload - https://github.com/Totes5706/TotesHTB - https://github.com/bioly230/THM_Skynet - https://github.com/firatesatoglu/shodanSearch diff --git a/2022/CVE-2022-31901.md b/2022/CVE-2022-31901.md index 546e50d257..50f500bd5b 100644 --- a/2022/CVE-2022-31901.md +++ b/2022/CVE-2022-31901.md @@ -13,6 +13,7 @@ Buffer overflow in function Notepad_plus::addHotSpot in Notepad++ v8.4.3 and ear - https://github.com/CDACesec/CVE-2022-31901 #### Github +- https://github.com/CDACesec/CVE-2022-31901 - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-31902.md b/2022/CVE-2022-31902.md index 0706b84f39..2d74d67a0c 100644 --- a/2022/CVE-2022-31902.md +++ b/2022/CVE-2022-31902.md @@ -13,6 +13,7 @@ Notepad++ v8.4.1 was discovered to contain a stack overflow via the component Fi - https://github.com/CDACesec/CVE-2022-31902 #### Github +- https://github.com/CDACesec/CVE-2022-31902 - https://github.com/k0mi-tg/CVE-POC - https://github.com/karimhabush/cyberowl - https://github.com/manas3c/CVE-POC diff --git a/2022/CVE-2022-32199.md b/2022/CVE-2022-32199.md index b1d15486a8..b52291bd6e 100644 --- a/2022/CVE-2022-32199.md +++ b/2022/CVE-2022-32199.md @@ -13,5 +13,6 @@ db_convert.php in ScriptCase through 9.9.008 is vulnerable to Arbitrary File Del - https://github.com/Toxich4/CVE-2022-32199 #### Github +- https://github.com/Toxich4/CVE-2022-32199 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-32250.md b/2022/CVE-2022-32250.md index 9c79551477..e0db184944 100644 --- a/2022/CVE-2022-32250.md +++ b/2022/CVE-2022-32250.md @@ -22,6 +22,7 @@ net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local - https://github.com/ARPSyndicate/cvemon - https://github.com/Decstor5/2022-32250LPE - https://github.com/EGI-Federation/SVG-advisories +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Mr-xn/Penetration_Testing_POC - https://github.com/NaInSec/CVE-PoC-in-GitHub @@ -50,6 +51,7 @@ net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local - https://github.com/theori-io/CVE-2022-32250-exploit - https://github.com/trhacknon/Pocingit - https://github.com/whoforget/CVE-POC +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xuetusummer/Penetration_Testing_POC - https://github.com/youwizard/CVE-POC diff --git a/2022/CVE-2022-32275.md b/2022/CVE-2022-32275.md index 936feff5af..634a5cda5b 100644 --- a/2022/CVE-2022-32275.md +++ b/2022/CVE-2022-32275.md @@ -15,6 +15,7 @@ #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/BrotherOfJhonny/grafana - https://github.com/Mr-xn/Penetration_Testing_POC - https://github.com/kh4sh3i/Grafana-CVE - https://github.com/lions2012/Penetration_Testing_POC diff --git a/2022/CVE-2022-32988.md b/2022/CVE-2022-32988.md index 6399cc472e..0037e8d48d 100644 --- a/2022/CVE-2022-32988.md +++ b/2022/CVE-2022-32988.md @@ -15,6 +15,8 @@ Cross Site Scripting (XSS) vulnerability in router Asus DSL-N14U-B1 1.1.2.3_805 #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/FedericoHeichou/CVE-2022-32988 +- https://github.com/FedericoHeichou/DSL-N14U-XSS - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review diff --git a/2022/CVE-2022-34265.md b/2022/CVE-2022-34265.md index b4828a6a01..941d049341 100644 --- a/2022/CVE-2022-34265.md +++ b/2022/CVE-2022-34265.md @@ -34,6 +34,7 @@ No PoCs from references. - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/qwqoro/GPN-Hackathon +- https://github.com/seal-community/patches - https://github.com/simonepetruzzi/WebSecurityProject - https://github.com/t0m4too/t0m4to - https://github.com/traumatising/CVE-2022-34265 diff --git a/2022/CVE-2022-34328.md b/2022/CVE-2022-34328.md index c30c52bec7..beddf587d6 100644 --- a/2022/CVE-2022-34328.md +++ b/2022/CVE-2022-34328.md @@ -16,4 +16,5 @@ PMB 7.3.10 allows reflected XSS via the id parameter in an lvl=author_see reques - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/Orange-Cyberdefense/CVE-repository +- https://github.com/jenaye/PMB diff --git a/2022/CVE-2022-34918.md b/2022/CVE-2022-34918.md index 8213049e5c..4b4b30f04e 100644 --- a/2022/CVE-2022-34918.md +++ b/2022/CVE-2022-34918.md @@ -18,11 +18,13 @@ An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug - https://www.randorisec.fr/crack-linux-firewall/ #### Github +- https://github.com/0xMarcio/cve - https://github.com/0xStrygwyr/OSCP-Guide - https://github.com/0xZipp0/OSCP - https://github.com/0xsyr0/OSCP - https://github.com/20142995/sectool - https://github.com/ARPSyndicate/cvemon +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/IdanBanani/ELF-Injection-Shellcode-Bridgehead - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Ly0nt4r/OSCP @@ -72,6 +74,7 @@ An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug - https://github.com/txuswashere/OSCP - https://github.com/veritas501/CVE-2022-34918 - https://github.com/whoforget/CVE-POC +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/xhref/OSCP - https://github.com/xuetusummer/Penetration_Testing_POC diff --git a/2022/CVE-2022-35131.md b/2022/CVE-2022-35131.md index f1f700058e..bbf2d75ae7 100644 --- a/2022/CVE-2022-35131.md +++ b/2022/CVE-2022-35131.md @@ -19,6 +19,7 @@ Joplin v2.8.8 allows attackers to execute arbitrary commands via a crafted paylo - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review - https://github.com/k0mi-tg/CVE-POC +- https://github.com/ly1g3/Joplin-CVE-2022-35131 - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/trhacknon/Pocingit diff --git a/2022/CVE-2022-35513.md b/2022/CVE-2022-35513.md index f1896c4e92..e1598fb2b9 100644 --- a/2022/CVE-2022-35513.md +++ b/2022/CVE-2022-35513.md @@ -21,6 +21,7 @@ The Blink1Control2 application <= 2.2.7 uses weak password encryption and an ins - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/p1ckzi/CVE-2022-35513 - https://github.com/security-anthem/IoTPene - https://github.com/trhacknon/Pocingit - https://github.com/whoforget/CVE-POC diff --git a/2022/CVE-2022-35621.md b/2022/CVE-2022-35621.md index 6f5c486b25..936e563e56 100644 --- a/2022/CVE-2022-35621.md +++ b/2022/CVE-2022-35621.md @@ -14,5 +14,6 @@ Access control vulnerability in Evoh NFT EvohClaimable contract with sha256 hash #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/MacherCS/CVE_Evoh_Contract - https://github.com/karimhabush/cyberowl diff --git a/2022/CVE-2022-35890.md b/2022/CVE-2022-35890.md index 1527c59160..52d179022b 100644 --- a/2022/CVE-2022-35890.md +++ b/2022/CVE-2022-35890.md @@ -14,4 +14,5 @@ An issue was discovered in Inductive Automation Ignition before 7.9.20 and 8.x b #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/sourceincite/randy diff --git a/2022/CVE-2022-35899.md b/2022/CVE-2022-35899.md index 26630bbe96..39fbeb30a2 100644 --- a/2022/CVE-2022-35899.md +++ b/2022/CVE-2022-35899.md @@ -16,6 +16,7 @@ There is an unquoted service path in ASUSTeK Aura Ready Game SDK service (GameSD #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/AngeloPioAmirante/CVE-2022-35899 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review diff --git a/2022/CVE-2022-36126.md b/2022/CVE-2022-36126.md index d28ddfb910..29da0722fe 100644 --- a/2022/CVE-2022-36126.md +++ b/2022/CVE-2022-36126.md @@ -15,4 +15,5 @@ An issue was discovered in Inductive Automation Ignition before 7.9.20 and 8.x b #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/sourceincite/randy diff --git a/2022/CVE-2022-36200.md b/2022/CVE-2022-36200.md index ec2744894a..c9511209ed 100644 --- a/2022/CVE-2022-36200.md +++ b/2022/CVE-2022-36200.md @@ -17,6 +17,7 @@ In FiberHome VDSL2 Modem HG150-Ub_V3.0, Credentials of Admin are submitted in UR - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review +- https://github.com/afaq1337/CVE-2022-36200 - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-36231.md b/2022/CVE-2022-36231.md index 8380e7a2da..77975fb980 100644 --- a/2022/CVE-2022-36231.md +++ b/2022/CVE-2022-36231.md @@ -13,6 +13,7 @@ pdf_info 0.5.3 is vulnerable to Command Execution because the Ruby code uses bac - https://github.com/affix/CVE-2022-36231 #### Github +- https://github.com/affix/CVE-2022-36231 - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-36271.md b/2022/CVE-2022-36271.md index 7efcedd85b..0fc4600d9d 100644 --- a/2022/CVE-2022-36271.md +++ b/2022/CVE-2022-36271.md @@ -16,6 +16,7 @@ Outbyte PC Repair Installation File 1.7.112.7856 is vulnerable to Dll Hijacking. - https://github.com/ARPSyndicate/cvemon - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review +- https://github.com/SaumyajeetDas/POC-of-CVE-2022-36271 - https://github.com/WhooAmii/POC_to_review - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC diff --git a/2022/CVE-2022-36359.md b/2022/CVE-2022-36359.md index 21dd0ecf1a..6dd0a0400f 100644 --- a/2022/CVE-2022-36359.md +++ b/2022/CVE-2022-36359.md @@ -15,4 +15,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/motoyasu-saburi/reported_vulnerability +- https://github.com/seal-community/patches diff --git a/2022/CVE-2022-36760.md b/2022/CVE-2022-36760.md index 320c5e9c89..22b62c9a8d 100644 --- a/2022/CVE-2022-36760.md +++ b/2022/CVE-2022-36760.md @@ -14,6 +14,7 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/EzeTauil/Maquina-Upload - https://github.com/bioly230/THM_Skynet - https://github.com/firatesatoglu/shodanSearch - https://github.com/karimhabush/cyberowl diff --git a/2022/CVE-2022-37298.md b/2022/CVE-2022-37298.md index 582e0c84f7..d468214554 100644 --- a/2022/CVE-2022-37298.md +++ b/2022/CVE-2022-37298.md @@ -14,6 +14,7 @@ Shinken Solutions Shinken Monitoring Version 2.4.3 affected is vulnerable to Inc #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/dbyio/cve-2022-37298 - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-37434.md b/2022/CVE-2022-37434.md index 48bd052ff2..13d71d9160 100644 --- a/2022/CVE-2022-37434.md +++ b/2022/CVE-2022-37434.md @@ -31,6 +31,7 @@ zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in infl - https://github.com/bollwarm/SecToolSet - https://github.com/fivexl/aws-ecr-client-golang - https://github.com/isgo-golgo13/gokit-gorillakit-enginesvc +- https://github.com/ivd38/zlib_overflow - https://github.com/k0mi-tg/CVE-POC - https://github.com/karimhabush/cyberowl - https://github.com/manas3c/CVE-POC diff --git a/2022/CVE-2022-37436.md b/2022/CVE-2022-37436.md index 773b60d720..75f8630771 100644 --- a/2022/CVE-2022-37436.md +++ b/2022/CVE-2022-37436.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/8ctorres/SIND-Practicas - https://github.com/ARPSyndicate/cvemon +- https://github.com/EzeTauil/Maquina-Upload - https://github.com/bioly230/THM_Skynet - https://github.com/firatesatoglu/shodanSearch - https://github.com/karimhabush/cyberowl diff --git a/2022/CVE-2022-37703.md b/2022/CVE-2022-37703.md index 3c7e5b8706..f58cb92dac 100644 --- a/2022/CVE-2022-37703.md +++ b/2022/CVE-2022-37703.md @@ -14,6 +14,7 @@ In Amanda 3.5.1, an information leak vulnerability was found in the calcsize SUI #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/MaherAzzouzi/CVE-2022-37703 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review diff --git a/2022/CVE-2022-37704.md b/2022/CVE-2022-37704.md index 9e2a4a9eaa..e57c4f8688 100644 --- a/2022/CVE-2022-37704.md +++ b/2022/CVE-2022-37704.md @@ -13,6 +13,7 @@ Amanda 3.5.1 allows privilege escalation from the regular user backup to root. T - https://github.com/MaherAzzouzi/CVE-2022-37704 #### Github +- https://github.com/MaherAzzouzi/CVE-2022-37704 - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-37705.md b/2022/CVE-2022-37705.md index eb57e05e31..2a8121212c 100644 --- a/2022/CVE-2022-37705.md +++ b/2022/CVE-2022-37705.md @@ -13,6 +13,7 @@ A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user c - https://github.com/MaherAzzouzi/CVE-2022-37705 #### Github +- https://github.com/MaherAzzouzi/CVE-2022-37705 - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC diff --git a/2022/CVE-2022-37706.md b/2022/CVE-2022-37706.md index a57874539b..356e703fe1 100644 --- a/2022/CVE-2022-37706.md +++ b/2022/CVE-2022-37706.md @@ -17,6 +17,7 @@ enlightenment_sys in Enlightenment before 0.25.4 allows local users to gain priv - https://github.com/ECU-10525611-Xander/CVE-2022-37706 - https://github.com/GrayHatZone/CVE-2022-37706-LPE-exploit - https://github.com/J0hnbX/Ubuntu-22-LPE +- https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/Snoopy-Sec/Localroot-ALL-CVE diff --git a/2022/CVE-2022-37783.md b/2022/CVE-2022-37783.md new file mode 100644 index 0000000000..6552ade458 --- /dev/null +++ b/2022/CVE-2022-37783.md @@ -0,0 +1,17 @@ +### [CVE-2022-37783](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37783) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +All Craft CMS versions between 3.0.0 and 3.7.32 disclose password hashes of users who authenticate using their E-Mail address or username in Anti-CSRF-Tokens. Craft CMS uses a cookie called CRAFT_CSRF_TOKEN and a HTML hidden field called CRAFT_CSRF_TOKEN to avoid Cross Site Request Forgery attacks. The CRAFT_CSRF_TOKEN cookie discloses the password hash in without encoding it whereas the corresponding HTML hidden field discloses the users' password hash in a masked manner, which can be decoded by using public functions of the YII framework. + +### POC + +#### Reference +- http://www.openwall.com/lists/oss-security/2024/06/06/1 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2022/CVE-2022-38604.md b/2022/CVE-2022-38604.md index fec51b924d..d0edfc76d7 100644 --- a/2022/CVE-2022-38604.md +++ b/2022/CVE-2022-38604.md @@ -14,5 +14,6 @@ Wacom Driver 6.3.46-1 for Windows and lower was discovered to contain an arbitra - https://lucabarile.github.io/Blog/CVE-2022-38604/index.html #### Github +- https://github.com/LucaBarile/CVE-2022-38604 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-38766.md b/2022/CVE-2022-38766.md index 48943f076c..269e519c8f 100644 --- a/2022/CVE-2022-38766.md +++ b/2022/CVE-2022-38766.md @@ -15,6 +15,7 @@ The remote keyless system on Renault ZOE 2021 vehicles sends 433.92 MHz RF signa #### Github - https://github.com/1-tong/vehicle_cves - https://github.com/ARPSyndicate/cvemon +- https://github.com/AUTOCRYPT-IVS-VnV/CVE-2022-38766 - https://github.com/AUTOCRYPT-RED/CVE-2022-38766 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review diff --git a/2022/CVE-2022-38813.md b/2022/CVE-2022-38813.md index 3346a0fea4..64995edaf2 100644 --- a/2022/CVE-2022-38813.md +++ b/2022/CVE-2022-38813.md @@ -15,6 +15,7 @@ PHPGurukul Blood Donor Management System 1.0 does not properly restrict access t - https://ihexcoder.wixsite.com/secresearch/post/cve-2022-38813-privilege-escalations-in-blood-donor-management-system-v1-0 #### Github +- https://github.com/RashidKhanPathan/CVE-2022-38813 - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-39838.md b/2022/CVE-2022-39838.md index 27228834c2..865d793e61 100644 --- a/2022/CVE-2022-39838.md +++ b/2022/CVE-2022-39838.md @@ -15,5 +15,6 @@ Systematic FIX Adapter (ALFAFX) 2.4.0.25 13/09/2017 allows remote file inclusion #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/fbkcs/CVE-2021-35975 +- https://github.com/jet-pentest/CVE-2022-39838 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-39952.md b/2022/CVE-2022-39952.md index a674fbdadb..eec38d5829 100644 --- a/2022/CVE-2022-39952.md +++ b/2022/CVE-2022-39952.md @@ -13,6 +13,7 @@ A external control of file name or path in Fortinet FortiNAC versions 9.4.0, 9.2 No PoCs from references. #### Github +- https://github.com/0xMarcio/cve - https://github.com/1f3lse/taiE - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates diff --git a/2022/CVE-2022-40032.md b/2022/CVE-2022-40032.md index c45879ac89..d5d4efc424 100644 --- a/2022/CVE-2022-40032.md +++ b/2022/CVE-2022-40032.md @@ -14,6 +14,7 @@ SQL Injection vulnerability in Simple Task Managing System version 1.0 in login. - https://github.com/h4md153v63n/CVE-2022-40032_Simple-Task-Managing-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated #### Github +- https://github.com/h4md153v63n/CVE-2022-40032_Simple-Task-Managing-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated - https://github.com/h4md153v63n/CVEs - https://github.com/h4md153v63n/h4md153v63n - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-40297.md b/2022/CVE-2022-40297.md index 698d5a1de8..dcef4a2918 100644 --- a/2022/CVE-2022-40297.md +++ b/2022/CVE-2022-40297.md @@ -17,6 +17,7 @@ - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review +- https://github.com/filipkarc/PoC-ubuntutouch-pin-privesc - https://github.com/k0mi-tg/CVE-POC - https://github.com/karimhabush/cyberowl - https://github.com/manas3c/CVE-POC diff --git a/2022/CVE-2022-40347.md b/2022/CVE-2022-40347.md index d4b9d4e755..a6efe1de7f 100644 --- a/2022/CVE-2022-40347.md +++ b/2022/CVE-2022-40347.md @@ -14,6 +14,7 @@ SQL Injection vulnerability in Intern Record System version 1.0 in /intern/contr - https://github.com/h4md153v63n/CVE-2022-40347_Intern-Record-System-phone-V1.0-SQL-Injection-Vulnerability-Unauthenticated #### Github +- https://github.com/h4md153v63n/CVE-2022-40347_Intern-Record-System-phone-V1.0-SQL-Injection-Vulnerability-Unauthenticated - https://github.com/h4md153v63n/CVEs - https://github.com/h4md153v63n/h4md153v63n - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-40348.md b/2022/CVE-2022-40348.md index 4cdd405a05..8edc282169 100644 --- a/2022/CVE-2022-40348.md +++ b/2022/CVE-2022-40348.md @@ -13,6 +13,7 @@ Cross Site Scripting (XSS) vulnerability in Intern Record System version 1.0 in - https://github.com/h4md153v63n/CVE-2022-40348_Intern-Record-System-Cross-site-Scripting-V1.0-Vulnerability-Unauthenticated #### Github +- https://github.com/h4md153v63n/CVE-2022-40348_Intern-Record-System-Cross-site-Scripting-V1.0-Vulnerability-Unauthenticated - https://github.com/h4md153v63n/CVEs - https://github.com/h4md153v63n/h4md153v63n - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-40471.md b/2022/CVE-2022-40471.md index f47017a7c2..557af62396 100644 --- a/2022/CVE-2022-40471.md +++ b/2022/CVE-2022-40471.md @@ -15,6 +15,7 @@ Remote Code Execution in Clinic's Patient Management System v 1.0 allows Attacke #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/RashidKhanPathan/CVE-2022-40471 - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-40624.md b/2022/CVE-2022-40624.md index aff323b9ac..ebe3884962 100644 --- a/2022/CVE-2022-40624.md +++ b/2022/CVE-2022-40624.md @@ -14,6 +14,7 @@ pfSense pfBlockerNG through 2.1.4_27 allows remote attackers to execute arbitrar #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/dhammon/pfBlockerNg-CVE-2022-40624 - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-40684.md b/2022/CVE-2022-40684.md index 79fb02e1d0..b604e4af28 100644 --- a/2022/CVE-2022-40684.md +++ b/2022/CVE-2022-40684.md @@ -15,6 +15,7 @@ An authentication bypass using an alternate path or channel [CWE-288] in Fortine #### Github - https://github.com/0day404/vulnerability-poc +- https://github.com/0xMarcio/cve - https://github.com/20142995/sectool - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates diff --git a/2022/CVE-2022-40881.md b/2022/CVE-2022-40881.md index 3dbfa1634b..297072f12d 100644 --- a/2022/CVE-2022-40881.md +++ b/2022/CVE-2022-40881.md @@ -18,6 +18,7 @@ SolarView Compact 6.00 was discovered to contain a command injection vulnerabili - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/KayCHENvip/vulnerability-poc - https://github.com/Threekiii/Awesome-POC +- https://github.com/Timorlover/SolarView_Compact_6.0_rce_via_network_test.php - https://github.com/d4n-sec/d4n-sec.github.io - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/yilin1203/CVE-2022-40881 diff --git a/2022/CVE-2022-40890.md b/2022/CVE-2022-40890.md index 36558308a4..d170d45981 100644 --- a/2022/CVE-2022-40890.md +++ b/2022/CVE-2022-40890.md @@ -14,4 +14,5 @@ A vulnerability in /src/amf/amf-context.c in Open5GS 2.4.10 and earlier leads to #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/ToughRunner/Open5gs_bugreport diff --git a/2022/CVE-2022-40982.md b/2022/CVE-2022-40982.md index 30d133e7d3..e9c6180d2b 100644 --- a/2022/CVE-2022-40982.md +++ b/2022/CVE-2022-40982.md @@ -16,6 +16,7 @@ Information exposure through microarchitectural state after transient execution #### Github - https://github.com/EGI-Federation/SVG-advisories - https://github.com/bcoles/kasld +- https://github.com/codexlynx/hardware-attacks-state-of-the-art - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/giterlizzi/secdb-feeds - https://github.com/hughsie/python-uswid diff --git a/2022/CVE-2022-41218.md b/2022/CVE-2022-41218.md index 3cdff643b4..527111c5e7 100644 --- a/2022/CVE-2022-41218.md +++ b/2022/CVE-2022-41218.md @@ -33,6 +33,7 @@ In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/whoforget/CVE-POC +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/youwizard/CVE-POC - https://github.com/zecool/cve diff --git a/2022/CVE-2022-41358.md b/2022/CVE-2022-41358.md index e08a7174a3..aaa3df72dd 100644 --- a/2022/CVE-2022-41358.md +++ b/2022/CVE-2022-41358.md @@ -20,6 +20,7 @@ A stored cross-site scripting (XSS) vulnerability in Garage Management System v1 - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/thecasual/CVE-2022-41358 - https://github.com/whoforget/CVE-POC - https://github.com/youwizard/CVE-POC diff --git a/2022/CVE-2022-41401.md b/2022/CVE-2022-41401.md index 30999c2d88..d9cc2884ad 100644 --- a/2022/CVE-2022-41401.md +++ b/2022/CVE-2022-41401.md @@ -13,5 +13,6 @@ OpenRefine <= v3.5.2 contains a Server-Side Request Forgery (SSRF) vulnerability - https://github.com/ixSly/CVE-2022-41401 #### Github +- https://github.com/ixSly/CVE-2022-41401 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-41412.md b/2022/CVE-2022-41412.md index 837cb6573d..aecbc0234e 100644 --- a/2022/CVE-2022-41412.md +++ b/2022/CVE-2022-41412.md @@ -17,6 +17,7 @@ An issue in the graphData.cgi component of perfSONAR v4.4.5 and prior allows att - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/renmizo/CVE-2022-41412 - https://github.com/whoforget/CVE-POC - https://github.com/youwizard/CVE-POC diff --git a/2022/CVE-2022-41413.md b/2022/CVE-2022-41413.md index a098762f76..194cd31e2e 100644 --- a/2022/CVE-2022-41413.md +++ b/2022/CVE-2022-41413.md @@ -18,6 +18,7 @@ perfSONAR v4.x <= v4.4.5 was discovered to contain a Cross-Site Request Forgery - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/renmizo/CVE-2022-41413 - https://github.com/whoforget/CVE-POC - https://github.com/youwizard/CVE-POC diff --git a/2022/CVE-2022-41445.md b/2022/CVE-2022-41445.md index 397d35b980..e1a807843d 100644 --- a/2022/CVE-2022-41445.md +++ b/2022/CVE-2022-41445.md @@ -14,6 +14,7 @@ A cross-site scripting (XSS) vulnerability in Record Management System using Cod - https://ihexcoder.wixsite.com/secresearch/post/cve-2022-41445-cross-site-scripting-in-teachers-record-management-system-using-codeignitor #### Github +- https://github.com/RashidKhanPathan/CVE-2022-41445 - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-41446.md b/2022/CVE-2022-41446.md index 83f066497f..04a403136c 100644 --- a/2022/CVE-2022-41446.md +++ b/2022/CVE-2022-41446.md @@ -14,6 +14,7 @@ An access control issue in /Admin/dashboard.php of Record Management System usin - https://ihexcoder.wixsite.com/secresearch/post/privilege-escalation-in-teachers-record-management-system-using-codeignitor #### Github +- https://github.com/RashidKhanPathan/CVE-2022-41446 - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-42046.md b/2022/CVE-2022-42046.md index dc2c0ec42b..7386ad8184 100644 --- a/2022/CVE-2022-42046.md +++ b/2022/CVE-2022-42046.md @@ -18,6 +18,7 @@ wfshbr64.sys and wfshbr32.sys specially crafted IOCTL allows arbitrary user to p - https://github.com/gmh5225/awesome-game-security - https://github.com/goldenscale/GS_GithubMirror - https://github.com/k0mi-tg/CVE-POC +- https://github.com/kkent030315/CVE-2022-42046 - https://github.com/manas3c/CVE-POC - https://github.com/nanaroam/kaditaroam - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-42176.md b/2022/CVE-2022-42176.md index 66f23075a4..24cbb0bb23 100644 --- a/2022/CVE-2022-42176.md +++ b/2022/CVE-2022-42176.md @@ -17,6 +17,7 @@ In PCTechSoft PCSecure V5.0.8.xw, use of Hard-coded Credentials in configuration - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/soy-oreocato/CVE-2022-42176 - https://github.com/whoforget/CVE-POC - https://github.com/youwizard/CVE-POC diff --git a/2022/CVE-2022-42252.md b/2022/CVE-2022-42252.md index 8980870d06..12b37e02a6 100644 --- a/2022/CVE-2022-42252.md +++ b/2022/CVE-2022-42252.md @@ -17,4 +17,5 @@ No PoCs from references. - https://github.com/fernandoreb/dependency-check-springboot - https://github.com/sr-monika/sprint-rest - https://github.com/tanjiti/sec_profile +- https://github.com/versio-io/product-lifecycle-security-api diff --git a/2022/CVE-2022-42457.md b/2022/CVE-2022-42457.md index f5710c7187..c2c45eabbc 100644 --- a/2022/CVE-2022-42457.md +++ b/2022/CVE-2022-42457.md @@ -14,4 +14,5 @@ Generex CS141 through 2.10 allows remote command execution by administrators via #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/hubertfarnsworth12/Generex-CS141-Authenticated-Remote-Command-Execution diff --git a/2022/CVE-2022-42703.md b/2022/CVE-2022-42703.md index d571037386..bbf3413659 100644 --- a/2022/CVE-2022-42703.md +++ b/2022/CVE-2022-42703.md @@ -35,5 +35,6 @@ mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf - https://github.com/pray77/SCTF2023_kernelpwn - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/veritas501/hbp_attack_demo +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2022/CVE-2022-42889.md b/2022/CVE-2022-42889.md index 38a6c61de9..c8527257ec 100644 --- a/2022/CVE-2022-42889.md +++ b/2022/CVE-2022-42889.md @@ -55,6 +55,7 @@ Apache Commons Text performs variable interpolation, allowing properties to be d - https://github.com/Vamckis/Container-Security - https://github.com/Vulnmachines/text4shell-CVE-2022-42889 - https://github.com/WFS-Mend/vtrade-common +- https://github.com/Whoopsunix/PPPVULNS - https://github.com/XRSec/AWVS-Update - https://github.com/Y4tacker/JavaSec - https://github.com/aaronm-sysdig/text4shell-docker diff --git a/2022/CVE-2022-42895.md b/2022/CVE-2022-42895.md index 26139707b3..c2c00f1764 100644 --- a/2022/CVE-2022-42895.md +++ b/2022/CVE-2022-42895.md @@ -25,5 +25,6 @@ No PoCs from references. - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2022/CVE-2022-42896.md b/2022/CVE-2022-42896.md index 0f8107399e..8bd5ac6767 100644 --- a/2022/CVE-2022-42896.md +++ b/2022/CVE-2022-42896.md @@ -30,5 +30,6 @@ No PoCs from references. - https://github.com/nidhi7598/linux-4.1.15_CVE-2022-42896 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/ssr-111/linux-kernel-exploitation +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2022/CVE-2022-43117.md b/2022/CVE-2022-43117.md index a13e184824..ac1e3cebc0 100644 --- a/2022/CVE-2022-43117.md +++ b/2022/CVE-2022-43117.md @@ -14,6 +14,7 @@ Sourcecodester Password Storage Application in PHP/OOP and MySQL 1.0 was discove - https://github.com/RashidKhanPathan/CVE-2022-43117 #### Github +- https://github.com/RashidKhanPathan/CVE-2022-43117 - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-43144.md b/2022/CVE-2022-43144.md index b10e18c68e..756140379c 100644 --- a/2022/CVE-2022-43144.md +++ b/2022/CVE-2022-43144.md @@ -15,6 +15,7 @@ A cross-site scripting (XSS) vulnerability in Canteen Management System v1.0 all #### Github - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC +- https://github.com/mudassiruddin/CVE-2022-43144-Stored-XSS - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/whoforget/CVE-POC - https://github.com/youwizard/CVE-POC diff --git a/2022/CVE-2022-43293.md b/2022/CVE-2022-43293.md index 4b270bc733..e36396f3d6 100644 --- a/2022/CVE-2022-43293.md +++ b/2022/CVE-2022-43293.md @@ -14,5 +14,6 @@ Wacom Driver 6.3.46-1 for Windows was discovered to contain an arbitrary file wr - https://lucabarile.github.io/Blog/CVE-2022-43293/index.html #### Github +- https://github.com/LucaBarile/CVE-2022-43293 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-44215.md b/2022/CVE-2022-44215.md index 4d09376d1a..f4e212c581 100644 --- a/2022/CVE-2022-44215.md +++ b/2022/CVE-2022-44215.md @@ -13,6 +13,7 @@ There is an open redirect vulnerability in Titan FTP server 19.0 and below. User - https://github.com/JBalanza/CVE-2022-44215 #### Github +- https://github.com/JBalanza/CVE-2022-44215 - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-44268.md b/2022/CVE-2022-44268.md index 7887ff27cd..de8676236d 100644 --- a/2022/CVE-2022-44268.md +++ b/2022/CVE-2022-44268.md @@ -44,6 +44,7 @@ ImageMagick 7.1.0-49 is vulnerable to Information Disclosure. When it parses a P - https://github.com/daniellemonika/CSCE-5552-Prying-Eyes - https://github.com/doyensec/imagemagick-security-policy-evaluator - https://github.com/duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC +- https://github.com/enomothem/PenTestNote - https://github.com/entr0pie/CVE-2022-44268 - https://github.com/fanbyprinciple/ImageMagick-lfi-poc - https://github.com/jnschaeffer/cve-2022-44268-detector diff --git a/2022/CVE-2022-44276.md b/2022/CVE-2022-44276.md index c3d4cf742c..efd36558bf 100644 --- a/2022/CVE-2022-44276.md +++ b/2022/CVE-2022-44276.md @@ -13,5 +13,6 @@ In Responsive Filemanager < 9.12.0, an attacker can bypass upload restrictions r - https://github.com/HerrLeStrate/CVE-2022-44276-PoC #### Github +- https://github.com/HerrLeStrate/CVE-2022-44276-PoC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-44830.md b/2022/CVE-2022-44830.md index c10ba81eb8..f2c5bb9a82 100644 --- a/2022/CVE-2022-44830.md +++ b/2022/CVE-2022-44830.md @@ -13,6 +13,7 @@ Sourcecodester Event Registration App v1.0 was discovered to contain multiple CS - https://github.com/RashidKhanPathan/CVE-2022-44830 #### Github +- https://github.com/RashidKhanPathan/CVE-2022-44830 - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-45063.md b/2022/CVE-2022-45063.md index 3f596a7d8a..77a75f49e0 100644 --- a/2022/CVE-2022-45063.md +++ b/2022/CVE-2022-45063.md @@ -10,7 +10,7 @@ xterm before 375 allows code execution via font ops, e.g., because an OSC 50 res ### POC #### Reference -No PoCs from references. +- http://www.openwall.com/lists/oss-security/2024/06/17/1 #### Github - https://github.com/ARPSyndicate/cvemon diff --git a/2022/CVE-2022-45168.md b/2022/CVE-2022-45168.md new file mode 100644 index 0000000000..7020b444c0 --- /dev/null +++ b/2022/CVE-2022-45168.md @@ -0,0 +1,17 @@ +### [CVE-2022-45168](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45168) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue was discovered in LIVEBOX Collaboration vDesk through v018. A Bypass of Two-Factor Authentication can occur under the /login/backup_code endpoint and the /api/v1/vdeskintegration/createbackupcodes endpoint, because the application allows a user to generate or regenerate the backup codes before checking the TOTP. + +### POC + +#### Reference +- https://www.gruppotim.it/it/footer/red-team.html + +#### Github +No PoCs found on GitHub currently. + diff --git a/2022/CVE-2022-45176.md b/2022/CVE-2022-45176.md new file mode 100644 index 0000000000..cafff37d62 --- /dev/null +++ b/2022/CVE-2022-45176.md @@ -0,0 +1,17 @@ +### [CVE-2022-45176](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45176) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue was discovered in LIVEBOX Collaboration vDesk through v018. Stored Cross-site Scripting (XSS) can occur under the /api/v1/getbodyfile endpoint via the uri parameter. The web application (through its vShare functionality section) doesn't properly check parameters, sent in HTTP requests as input, before saving them on the server. In addition, crafted JavaScript content can then be reflected back to the end user and executed by the web browser. + +### POC + +#### Reference +- https://www.gruppotim.it/it/footer/red-team.html + +#### Github +No PoCs found on GitHub currently. + diff --git a/2022/CVE-2022-45299.md b/2022/CVE-2022-45299.md index ac6b653426..9df7e314d7 100644 --- a/2022/CVE-2022-45299.md +++ b/2022/CVE-2022-45299.md @@ -17,6 +17,7 @@ An issue in the IpFile argument of rust-lang webbrowser-rs v0.8.2 allows attacke - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/offalltn/CVE-2022-45299 - https://github.com/whoforget/CVE-POC - https://github.com/youwizard/CVE-POC diff --git a/2022/CVE-2022-4543.md b/2022/CVE-2022-4543.md index 3717746f7d..388128dcdb 100644 --- a/2022/CVE-2022-4543.md +++ b/2022/CVE-2022-4543.md @@ -32,5 +32,6 @@ A flaw named "EntryBleed" was found in the Linux Kernel Page Table Isolation (KP - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/sunichi/cve-2022-4543-wrapper +- https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation diff --git a/2022/CVE-2022-45599.md b/2022/CVE-2022-45599.md index 229cfe47d9..036373b82e 100644 --- a/2022/CVE-2022-45599.md +++ b/2022/CVE-2022-45599.md @@ -14,5 +14,6 @@ Aztech WMB250AC Mesh Routers Firmware Version 016 2020 is vulnerable to PHP Type #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/ethancunt/CVE-2022-45599 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-45600.md b/2022/CVE-2022-45600.md index 9ce0231332..3101bfa005 100644 --- a/2022/CVE-2022-45600.md +++ b/2022/CVE-2022-45600.md @@ -14,5 +14,6 @@ Aztech WMB250AC Mesh Routers Firmware Version 016 2020 devices improperly manage #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/ethancunt/CVE-2022-45600 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-45697.md b/2022/CVE-2022-45697.md index fb90e8c9c8..4ef92c6903 100644 --- a/2022/CVE-2022-45697.md +++ b/2022/CVE-2022-45697.md @@ -14,4 +14,5 @@ Arbitrary File Delete vulnerability in Razer Central before v7.8.0.381 when hand #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/Wh04m1001/CVE diff --git a/2022/CVE-2022-46440.md b/2022/CVE-2022-46440.md index 53ab8034e6..51f22f3ab0 100644 --- a/2022/CVE-2022-46440.md +++ b/2022/CVE-2022-46440.md @@ -15,4 +15,5 @@ ttftool v0.9.2 was discovered to contain a segmentation violation via the readU1 #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/keepinggg/poc diff --git a/2022/CVE-2022-46485.md b/2022/CVE-2022-46485.md index 2cb73b305e..e35daba261 100644 --- a/2022/CVE-2022-46485.md +++ b/2022/CVE-2022-46485.md @@ -13,6 +13,7 @@ Data Illusion Survey Software Solutions ngSurvey version 2.4.28 and below is vul - https://github.com/WodenSec/CVE-2022-46485 #### Github +- https://github.com/WodenSec/CVE-2022-46485 - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-47072.md b/2022/CVE-2022-47072.md index 00f4fe28b4..637bce62c0 100644 --- a/2022/CVE-2022-47072.md +++ b/2022/CVE-2022-47072.md @@ -14,4 +14,5 @@ SQL injection vulnerability in Enterprise Architect 16.0.1605 32-bit allows atta #### Github - https://github.com/DojoSecurity/DojoSecurity +- https://github.com/DojoSecurity/Enterprise-Architect-SQL-Injection diff --git a/2022/CVE-2022-47514.md b/2022/CVE-2022-47514.md index d2f604db8d..e6ca343ccf 100644 --- a/2022/CVE-2022-47514.md +++ b/2022/CVE-2022-47514.md @@ -14,4 +14,5 @@ An XML external entity (XXE) injection vulnerability in XML-RPC.NET before 2.5.0 #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/jumpycastle/xmlrpc.net-poc diff --git a/2022/CVE-2022-47949.md b/2022/CVE-2022-47949.md index 4d99ca8187..f44296bccc 100644 --- a/2022/CVE-2022-47949.md +++ b/2022/CVE-2022-47949.md @@ -14,5 +14,6 @@ The Nintendo NetworkBuffer class, as used in Animal Crossing: New Horizons befor #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/PabloMK7/ENLBufferPwn - https://github.com/dgwynne/udp-bind-proxy diff --git a/2022/CVE-2022-47966.md b/2022/CVE-2022-47966.md index 814a2799d4..8729ca0f2b 100644 --- a/2022/CVE-2022-47966.md +++ b/2022/CVE-2022-47966.md @@ -29,6 +29,7 @@ Multiple Zoho ManageEngine on-premise products, such as ServiceDesk Plus through - https://github.com/UNC1739/awesome-vulnerability-research - https://github.com/aneasystone/github-trending - https://github.com/fardeen-ahmed/Bug-bounty-Writeups +- https://github.com/horizon3ai/CVE-2022-47966 - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2022/CVE-2022-48019.md b/2022/CVE-2022-48019.md index e018eba838..0cbb49c958 100644 --- a/2022/CVE-2022-48019.md +++ b/2022/CVE-2022-48019.md @@ -13,4 +13,5 @@ The components wfshbr64.sys and wfshbr32.sys in Another Eden before v3.0.20 and - https://github.com/kkent030315/CVE-2022-42046 #### Github +- https://github.com/kkent030315/CVE-2022-42046 diff --git a/2022/CVE-2022-48150.md b/2022/CVE-2022-48150.md index df7099467b..6492120337 100644 --- a/2022/CVE-2022-48150.md +++ b/2022/CVE-2022-48150.md @@ -14,4 +14,5 @@ Shopware v5.5.10 was discovered to contain a cross-site scripting (XSS) vulnerab #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/sahilop123/-CVE-2022-48150 diff --git a/2022/CVE-2022-48311.md b/2022/CVE-2022-48311.md index e88bcd6b8c..11b8e68046 100644 --- a/2022/CVE-2022-48311.md +++ b/2022/CVE-2022-48311.md @@ -17,6 +17,7 @@ - https://github.com/karimhabush/cyberowl - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/swzhouu/CVE-2022-48311 - https://github.com/whoforget/CVE-POC - https://github.com/youwizard/CVE-POC diff --git a/2023/CVE-2023-1370.md b/2023/CVE-2023-1370.md index ba1a366f57..3667571e6e 100644 --- a/2023/CVE-2023-1370.md +++ b/2023/CVE-2023-1370.md @@ -5,7 +5,7 @@ ### Description -[Json-smart](https://netplex.github.io/json-smart/) is a performance focused, JSON processor lib. When reaching a ‘[‘ or ‘{‘ character in the JSON input, the code parses an array or an object respectively. It was discovered that the code does not have any limit to the nesting of such arrays or objects. Since the parsing of nested arrays and objects is done recursively, nesting too many of them can cause a stack exhaustion (stack overflow) and crash the software. +[Json-smart](https://netplex.github.io/json-smart/) is a performance focused, JSON processor lib.When reaching a ‘[‘ or ‘{‘ character in the JSON input, the code parses an array or an object respectively.It was discovered that the code does not have any limit to the nesting of such arrays or objects. Since the parsing of nested arrays and objects is done recursively, nesting too many of them can cause a stack exhaustion (stack overflow) and crash the software. ### POC diff --git a/2023/CVE-2023-20007.md b/2023/CVE-2023-20007.md index 55d9331287..e731286c86 100644 --- a/2023/CVE-2023-20007.md +++ b/2023/CVE-2023-20007.md @@ -5,9 +5,7 @@ ### Description -A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code or cause the web-based management process on the device to restart unexpectedly, resulting in a denial of service (DoS) condition. The attacker must have valid administrator credentials. - - This vulnerability is due to insufficient validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the web-based management process to restart, resulting in a DoS condition. +A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code or cause the web-based management process on the device to restart unexpectedly, resulting in a denial of service (DoS) condition. The attacker must have valid administrator credentials. This vulnerability is due to insufficient validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the web-based management process to restart, resulting in a DoS condition. ### POC diff --git a/2023/CVE-2023-20009.md b/2023/CVE-2023-20009.md index f5126d2a55..e7baf443f2 100644 --- a/2023/CVE-2023-20009.md +++ b/2023/CVE-2023-20009.md @@ -7,9 +7,7 @@ ### Description -A vulnerability in the Web UI and administrative CLI of the Cisco Secure Email Gateway (ESA) and Cisco Secure Email and Web Manager (SMA) could allow an authenticated remote attacker and or authenticated local attacker to escalate their privilege level and gain root access. The attacker has to have a valid user credential with at least a [[privilege of operator - validate actual name]]. - - The vulnerability is due to the processing of a specially crafted SNMP configuration file. An attacker could exploit this vulnerability by authenticating to the targeted device and uploading a specially crafted SNMP configuration file that when uploaded could allow for the execution of commands as root. An exploit could allow the attacker to gain root access on the device. +A vulnerability in the Web UI and administrative CLI of the Cisco Secure Email Gateway (ESA) and Cisco Secure Email and Web Manager (SMA) could allow an authenticated remote attacker and or authenticated local attacker to escalate their privilege level and gain root access. The attacker has to have a valid user credential with at least a [[privilege of operator - validate actual name]]. The vulnerability is due to the processing of a specially crafted SNMP configuration file. An attacker could exploit this vulnerability by authenticating to the targeted device and uploading a specially crafted SNMP configuration file that when uploaded could allow for the execution of commands as root. An exploit could allow the attacker to gain root access on the device. ### POC diff --git a/2023/CVE-2023-20010.md b/2023/CVE-2023-20010.md index 4482eaa6b5..565d5d18d6 100644 --- a/2023/CVE-2023-20010.md +++ b/2023/CVE-2023-20010.md @@ -5,9 +5,7 @@ ### Description -A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. - - This vulnerability exists because the web-based management interface inadequately validates user input. An attacker could exploit this vulnerability by authenticating to the application as a low-privileged user and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to read or modify any data on the underlying database or elevate their privileges. +A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability exists because the web-based management interface inadequately validates user input. An attacker could exploit this vulnerability by authenticating to the application as a low-privileged user and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to read or modify any data on the underlying database or elevate their privileges. ### POC diff --git a/2023/CVE-2023-20019.md b/2023/CVE-2023-20019.md index 45dbe893af..4b21b9361c 100644 --- a/2023/CVE-2023-20019.md +++ b/2023/CVE-2023-20019.md @@ -5,9 +5,7 @@ ### Description -A vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform, Cisco BroadWorks Application Server, and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. - - This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. +A vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform, Cisco BroadWorks Application Server, and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. ### POC diff --git a/2023/CVE-2023-20020.md b/2023/CVE-2023-20020.md index ee5d26afcb..731a1b9d55 100644 --- a/2023/CVE-2023-20020.md +++ b/2023/CVE-2023-20020.md @@ -5,9 +5,7 @@ ### Description -A vulnerability in the Device Management Servlet application of Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. - - This vulnerability is due to improper input validation when parsing HTTP requests. An attacker could exploit this vulnerability by sending a sustained stream of crafted requests to an affected device. A successful exploit could allow the attacker to cause all subsequent requests to be dropped, resulting in a DoS condition. +A vulnerability in the Device Management Servlet application of Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper input validation when parsing HTTP requests. An attacker could exploit this vulnerability by sending a sustained stream of crafted requests to an affected device. A successful exploit could allow the attacker to cause all subsequent requests to be dropped, resulting in a DoS condition. ### POC diff --git a/2023/CVE-2023-20025.md b/2023/CVE-2023-20025.md index 85300e5589..5fd853bbc0 100644 --- a/2023/CVE-2023-20025.md +++ b/2023/CVE-2023-20025.md @@ -5,9 +5,7 @@ ### Description -A vulnerability in the web-based management interface of Cisco Small Business RV042 Series Routers could allow an unauthenticated, remote attacker to bypass authentication on the affected device. - - This vulnerability is due to incorrect user input validation of incoming HTTP packets. An attacker could exploit this vulnerability by sending crafted requests to the web-based management interface. A successful exploit could allow the attacker to gain root privileges on the affected device. +A vulnerability in the web-based management interface of Cisco Small Business RV042 Series Routers could allow an unauthenticated, remote attacker to bypass authentication on the affected device. This vulnerability is due to incorrect user input validation of incoming HTTP packets. An attacker could exploit this vulnerability by sending crafted requests to the web-based management interface. A successful exploit could allow the attacker to gain root privileges on the affected device. ### POC @@ -15,6 +13,7 @@ A vulnerability in the web-based management interface of Cisco Small Business RV - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5 #### Github +- https://github.com/CVEDB/awesome-cve-repo - https://github.com/lnversed/CVE-2023-20025 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-20026.md b/2023/CVE-2023-20026.md index 20e04beeba..1ce62fd111 100644 --- a/2023/CVE-2023-20026.md +++ b/2023/CVE-2023-20026.md @@ -5,9 +5,7 @@ ### Description -A vulnerability in the web-based management interface of Cisco Small Business Routers RV042 Series could allow an authenticated, remote attacker to inject arbitrary commands on an affected device. - - This vulnerability is due to improper validation of user input fields within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. +A vulnerability in the web-based management interface of Cisco Small Business Routers RV042 Series could allow an authenticated, remote attacker to inject arbitrary commands on an affected device. This vulnerability is due to improper validation of user input fields within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. ### POC diff --git a/2023/CVE-2023-20032.md b/2023/CVE-2023-20032.md index 58ba8c3b86..40d7aa5f7d 100644 --- a/2023/CVE-2023-20032.md +++ b/2023/CVE-2023-20032.md @@ -9,15 +9,7 @@ ### Description -On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed: - - - A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code. - - - This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition. - - For a description of this vulnerability, see the ClamAV blog ["https://blog.clamav.net/"]. +On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed: A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code. This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition. For a description of this vulnerability, see the ClamAV blog ["https://blog.clamav.net/"]. ### POC diff --git a/2023/CVE-2023-20043.md b/2023/CVE-2023-20043.md index 8bd154e309..3130036d85 100644 --- a/2023/CVE-2023-20043.md +++ b/2023/CVE-2023-20043.md @@ -5,9 +5,7 @@ ### Description -A vulnerability in Cisco CX Cloud Agent of could allow an authenticated, local attacker to elevate their privileges. - - This vulnerability is due to insecure file permissions. An attacker could exploit this vulnerability by calling the script with sudo. A successful exploit could allow the attacker to take complete control of the affected device. +A vulnerability in Cisco CX Cloud Agent of could allow an authenticated, local attacker to elevate their privileges. This vulnerability is due to insecure file permissions. An attacker could exploit this vulnerability by calling the script with sudo. A successful exploit could allow the attacker to take complete control of the affected device. ### POC diff --git a/2023/CVE-2023-20046.md b/2023/CVE-2023-20046.md index 3cf265bd8a..bbd312beee 100644 --- a/2023/CVE-2023-20046.md +++ b/2023/CVE-2023-20046.md @@ -7,11 +7,7 @@ ### Description -A vulnerability in the key-based SSH authentication feature of Cisco StarOS Software could allow an authenticated, remote attacker to elevate privileges on an affected device. - - This vulnerability is due to insufficient validation of user-supplied credentials. An attacker could exploit this vulnerability by sending a valid low-privileged SSH key to an affected device from a host that has an IP address that is configured as the source for a high-privileged user account. A successful exploit could allow the attacker to log in to the affected device through SSH as a high-privileged user. - - There are workarounds that address this vulnerability. +A vulnerability in the key-based SSH authentication feature of Cisco StarOS Software could allow an authenticated, remote attacker to elevate privileges on an affected device. This vulnerability is due to insufficient validation of user-supplied credentials. An attacker could exploit this vulnerability by sending a valid low-privileged SSH key to an affected device from a host that has an IP address that is configured as the source for a high-privileged user account. A successful exploit could allow the attacker to log in to the affected device through SSH as a high-privileged user. There are workarounds that address this vulnerability. ### POC diff --git a/2023/CVE-2023-20052.md b/2023/CVE-2023-20052.md index cf416e51a5..575b4c826f 100644 --- a/2023/CVE-2023-20052.md +++ b/2023/CVE-2023-20052.md @@ -5,13 +5,7 @@ ### Description -On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed: - - - A vulnerability in the DMG file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to access sensitive information on an affected device. - - - This vulnerability is due to enabling XML entity substitution that may result in XML external entity injection. An attacker could exploit this vulnerability by submitting a crafted DMG file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to leak bytes from any file that may be read by the ClamAV scanning process. +On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed: A vulnerability in the DMG file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to access sensitive information on an affected device. This vulnerability is due to enabling XML entity substitution that may result in XML external entity injection. An attacker could exploit this vulnerability by submitting a crafted DMG file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to leak bytes from any file that may be read by the ClamAV scanning process. ### POC diff --git a/2023/CVE-2023-20057.md b/2023/CVE-2023-20057.md index 64e94bd642..56d4327848 100644 --- a/2023/CVE-2023-20057.md +++ b/2023/CVE-2023-20057.md @@ -5,9 +5,7 @@ ### Description -A vulnerability in the URL filtering mechanism of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. - - This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device. +A vulnerability in the URL filtering mechanism of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device. ### POC diff --git a/2023/CVE-2023-20065.md b/2023/CVE-2023-20065.md index 41ed79c57b..92119e588a 100644 --- a/2023/CVE-2023-20065.md +++ b/2023/CVE-2023-20065.md @@ -5,9 +5,7 @@ ### Description -A vulnerability in the Cisco IOx application hosting subsystem of Cisco IOS XE Software could allow an authenticated, local attacker to elevate privileges to root on an affected device. - - This vulnerability is due to insufficient restrictions on the hosted application. An attacker could exploit this vulnerability by logging in to and then escaping the Cisco IOx application container. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. +A vulnerability in the Cisco IOx application hosting subsystem of Cisco IOS XE Software could allow an authenticated, local attacker to elevate privileges to root on an affected device. This vulnerability is due to insufficient restrictions on the hosted application. An attacker could exploit this vulnerability by logging in to and then escaping the Cisco IOx application container. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. ### POC diff --git a/2023/CVE-2023-20075.md b/2023/CVE-2023-20075.md index 021acc8f7d..ce12816e34 100644 --- a/2023/CVE-2023-20075.md +++ b/2023/CVE-2023-20075.md @@ -5,9 +5,7 @@ ### Description -Vulnerability in the CLI of Cisco Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary commands. - - These vulnerability is due to improper input validation in the CLI. An attacker could exploit this vulnerability by injecting operating system commands into a legitimate command. A successful exploit could allow the attacker to escape the restricted command prompt and execute arbitrary commands on the underlying operating system. To successfully exploit this vulnerability, an attacker would need valid Administrator credentials. +Vulnerability in the CLI of Cisco Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary commands. These vulnerability is due to improper input validation in the CLI. An attacker could exploit this vulnerability by injecting operating system commands into a legitimate command. A successful exploit could allow the attacker to escape the restricted command prompt and execute arbitrary commands on the underlying operating system. To successfully exploit this vulnerability, an attacker would need valid Administrator credentials. ### POC diff --git a/2023/CVE-2023-20098.md b/2023/CVE-2023-20098.md index a04c64207c..aaa6ae60f4 100644 --- a/2023/CVE-2023-20098.md +++ b/2023/CVE-2023-20098.md @@ -5,9 +5,7 @@ ### Description -A vulnerability in the CLI of Cisco SDWAN vManage Software could allow an authenticated, local attacker to delete arbitrary files. - - This vulnerability is due to improper filtering of directory traversal character sequences within system commands. An attacker with administrative privileges could exploit this vulnerability by running a system command containing directory traversal character sequences to target an arbitrary file. A successful exploit could allow the attacker to delete arbitrary files from the system, including files owned by root. +A vulnerability in the CLI of Cisco SDWAN vManage Software could allow an authenticated, local attacker to delete arbitrary files. This vulnerability is due to improper filtering of directory traversal character sequences within system commands. An attacker with administrative privileges could exploit this vulnerability by running a system command containing directory traversal character sequences to target an arbitrary file. A successful exploit could allow the attacker to delete arbitrary files from the system, including files owned by root. ### POC diff --git a/2023/CVE-2023-20105.md b/2023/CVE-2023-20105.md index 4c4882ea30..f81323c81d 100644 --- a/2023/CVE-2023-20105.md +++ b/2023/CVE-2023-20105.md @@ -5,11 +5,7 @@ ### Description -A vulnerability in the change password functionality of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with Read-only credentials to elevate privileges to Administrator on an affected system. - - This vulnerability is due to incorrect handling of password change requests. An attacker could exploit this vulnerability by authenticating to the application as a Read-only user and sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to alter the passwords of any user on the system, including an administrative user, and then impersonate that user. - - Note: Cisco Expressway Series refers to the Expressway Control (Expressway-C) device and the Expressway Edge (Expressway-E) device. +A vulnerability in the change password functionality of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with Read-only credentials to elevate privileges to Administrator on an affected system. This vulnerability is due to incorrect handling of password change requests. An attacker could exploit this vulnerability by authenticating to the application as a Read-only user and sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to alter the passwords of any user on the system, including an administrative user, and then impersonate that user. Note: Cisco Expressway Series refers to the Expressway Control (Expressway-C) device and the Expressway Edge (Expressway-E) device. ### POC diff --git a/2023/CVE-2023-20109.md b/2023/CVE-2023-20109.md index b67285b028..111f693c92 100644 --- a/2023/CVE-2023-20109.md +++ b/2023/CVE-2023-20109.md @@ -7,9 +7,7 @@ ### Description -A vulnerability in the Cisco Group Encrypted Transport VPN (GET VPN) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker who has administrative control of either a group member or a key server to execute arbitrary code on an affected device or cause the device to crash. - - This vulnerability is due to insufficient validation of attributes in the Group Domain of Interpretation (GDOI) and G-IKEv2 protocols of the GET VPN feature. An attacker could exploit this vulnerability by either compromising an installed key server or modifying the configuration of a group member to point to a key server that is controlled by the attacker. A successful exploit could allow the attacker to execute arbitrary code and gain full control of the affected system or cause the affected system to reload, resulting in a denial of service (DoS) condition. For more information, see the Details ["#details"] section of this advisory. +A vulnerability in the Cisco Group Encrypted Transport VPN (GET VPN) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker who has administrative control of either a group member or a key server to execute arbitrary code on an affected device or cause the device to crash. This vulnerability is due to insufficient validation of attributes in the Group Domain of Interpretation (GDOI) and G-IKEv2 protocols of the GET VPN feature. An attacker could exploit this vulnerability by either compromising an installed key server or modifying the configuration of a group member to point to a key server that is controlled by the attacker. A successful exploit could allow the attacker to execute arbitrary code and gain full control of the affected system or cause the affected system to reload, resulting in a denial of service (DoS) condition. For more information, see the Details ["#details"] section of this advisory. ### POC diff --git a/2023/CVE-2023-20115.md b/2023/CVE-2023-20115.md index 6b4a48bb1b..640903ea87 100644 --- a/2023/CVE-2023-20115.md +++ b/2023/CVE-2023-20115.md @@ -5,11 +5,7 @@ ### Description -A vulnerability in the SFTP server implementation for Cisco Nexus 3000 Series Switches and 9000 Series Switches in standalone NX-OS mode could allow an authenticated, remote attacker to download or overwrite files from the underlying operating system of an affected device. - - This vulnerability is due to a logic error when verifying the user role when an SFTP connection is opened to an affected device. An attacker could exploit this vulnerability by connecting and authenticating via SFTP as a valid, non-administrator user. A successful exploit could allow the attacker to read or overwrite files from the underlying operating system with the privileges of the authenticated user. - - There are workarounds that address this vulnerability. +A vulnerability in the SFTP server implementation for Cisco Nexus 3000 Series Switches and 9000 Series Switches in standalone NX-OS mode could allow an authenticated, remote attacker to download or overwrite files from the underlying operating system of an affected device. This vulnerability is due to a logic error when verifying the user role when an SFTP connection is opened to an affected device. An attacker could exploit this vulnerability by connecting and authenticating via SFTP as a valid, non-administrator user. A successful exploit could allow the attacker to read or overwrite files from the underlying operating system with the privileges of the authenticated user. There are workarounds that address this vulnerability. ### POC diff --git a/2023/CVE-2023-20116.md b/2023/CVE-2023-20116.md index 6898f9e494..79d7f43b07 100644 --- a/2023/CVE-2023-20116.md +++ b/2023/CVE-2023-20116.md @@ -7,9 +7,7 @@ ### Description -A vulnerability in the Administrative XML Web Service (AXL) API of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. - - This vulnerability is due to insufficient validation of user-supplied input to the web UI of the Self Care Portal. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to cause a DoS condition on the affected device. +A vulnerability in the Administrative XML Web Service (AXL) API of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of user-supplied input to the web UI of the Self Care Portal. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to cause a DoS condition on the affected device. ### POC diff --git a/2023/CVE-2023-20118.md b/2023/CVE-2023-20118.md index c8c1fd68b9..80b17d5a41 100644 --- a/2023/CVE-2023-20118.md +++ b/2023/CVE-2023-20118.md @@ -5,11 +5,7 @@ ### Description -A vulnerability in the web-based management interface of Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. - - This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to gain root-level privileges and access unauthorized data. To exploit this vulnerability, an attacker would need to have valid administrative credentials on the affected device. - - Cisco has not and will not release software updates that address this vulnerability. +A vulnerability in the web-based management interface of Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to gain root-level privileges and access unauthorized data. To exploit this vulnerability, an attacker would need to have valid administrative credentials on the affected device. Cisco has not and will not release software updates that address this vulnerability. ### POC diff --git a/2023/CVE-2023-20119.md b/2023/CVE-2023-20119.md index 696f963c93..3093b67901 100644 --- a/2023/CVE-2023-20119.md +++ b/2023/CVE-2023-20119.md @@ -5,9 +5,7 @@ ### Description -A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, formerly known as Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. - - This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. +A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, formerly known as Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. ### POC diff --git a/2023/CVE-2023-20133.md b/2023/CVE-2023-20133.md index 13bf8397ad..0cba1cf975 100644 --- a/2023/CVE-2023-20133.md +++ b/2023/CVE-2023-20133.md @@ -5,9 +5,7 @@ ### Description -A vulnerability in the web interface of Cisco Webex Meetings could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. - - This vulnerability exists because of insufficient validation of user-supplied input in Webex Events (classic) programs, email templates, and survey questions. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. +A vulnerability in the web interface of Cisco Webex Meetings could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because of insufficient validation of user-supplied input in Webex Events (classic) programs, email templates, and survey questions. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. ### POC diff --git a/2023/CVE-2023-20178.md b/2023/CVE-2023-20178.md index 5781373659..b3f75a7e06 100644 --- a/2023/CVE-2023-20178.md +++ b/2023/CVE-2023-20178.md @@ -5,9 +5,7 @@ ### Description -A vulnerability in the client update process of Cisco AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows could allow a low-privileged, authenticated, local attacker to elevate privileges to those of SYSTEM. The client update process is executed after a successful VPN connection is established. - - This vulnerability exists because improper permissions are assigned to a temporary directory that is created during the update process. An attacker could exploit this vulnerability by abusing a specific function of the Windows installer process. A successful exploit could allow the attacker to execute code with SYSTEM privileges. +A vulnerability in the client update process of Cisco AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows could allow a low-privileged, authenticated, local attacker to elevate privileges to those of SYSTEM. The client update process is executed after a successful VPN connection is established. This vulnerability exists because improper permissions are assigned to a temporary directory that is created during the update process. An attacker could exploit this vulnerability by abusing a specific function of the Windows installer process. A successful exploit could allow the attacker to execute code with SYSTEM privileges. ### POC diff --git a/2023/CVE-2023-20180.md b/2023/CVE-2023-20180.md index b698aa7f58..1b073460e9 100644 --- a/2023/CVE-2023-20180.md +++ b/2023/CVE-2023-20180.md @@ -5,9 +5,7 @@ ### Description -A vulnerability in the web interface of Cisco Webex Meetings could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. - - This vulnerability is due to insufficient CSRF protections for the web interface on an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions. These actions could include joining meetings and scheduling training sessions. +A vulnerability in the web interface of Cisco Webex Meetings could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. This vulnerability is due to insufficient CSRF protections for the web interface on an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions. These actions could include joining meetings and scheduling training sessions. ### POC diff --git a/2023/CVE-2023-20188.md b/2023/CVE-2023-20188.md index 0081e7b938..4e7f0f6e86 100644 --- a/2023/CVE-2023-20188.md +++ b/2023/CVE-2023-20188.md @@ -5,11 +5,7 @@ ### Description -A vulnerability in the web-based management interface of Cisco Small Business 200 Series Smart Switches, Cisco Small Business 300 Series Managed Switches, and Cisco Small Business 500 Series Stackable Managed Switches could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device. - - This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need to have valid credentials to access the web-based management interface of the affected device. - - Cisco has not released software updates to address this vulnerability. +A vulnerability in the web-based management interface of Cisco Small Business 200 Series Smart Switches, Cisco Small Business 300 Series Managed Switches, and Cisco Small Business 500 Series Stackable Managed Switches could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need to have valid credentials to access the web-based management interface of the affected device. Cisco has not released software updates to address this vulnerability. ### POC diff --git a/2023/CVE-2023-20197.md b/2023/CVE-2023-20197.md index 3d82a7dee3..6d2f68d913 100644 --- a/2023/CVE-2023-20197.md +++ b/2023/CVE-2023-20197.md @@ -7,11 +7,7 @@ ### Description -A vulnerability in the filesystem image parser for Hierarchical File System Plus (HFS+) of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. - - This vulnerability is due to an incorrect check for completion when a file is decompressed, which may result in a loop condition that could cause the affected software to stop responding. An attacker could exploit this vulnerability by submitting a crafted HFS+ filesystem image to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to stop responding, resulting in a DoS condition on the affected software and consuming available system resources. - - For a description of this vulnerability, see the ClamAV blog . +A vulnerability in the filesystem image parser for Hierarchical File System Plus (HFS+) of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an incorrect check for completion when a file is decompressed, which may result in a loop condition that could cause the affected software to stop responding. An attacker could exploit this vulnerability by submitting a crafted HFS+ filesystem image to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to stop responding, resulting in a DoS condition on the affected software and consuming available system resources. For a description of this vulnerability, see the ClamAV blog . ### POC diff --git a/2023/CVE-2023-20198.md b/2023/CVE-2023-20198.md index f1188214b6..c8d66672d6 100644 --- a/2023/CVE-2023-20198.md +++ b/2023/CVE-2023-20198.md @@ -37,6 +37,7 @@ Cisco is providing an update for the ongoing investigation into observed exploit - https://github.com/XRSec/AWVS-Update - https://github.com/ZephrFish/CVE-2023-20198-Checker - https://github.com/ZephrFish/Cisco-IOS-XE-Scanner +- https://github.com/aleff-github/aleff-github - https://github.com/aleff-github/my-flipper-shits - https://github.com/alekos3/CVE_2023_20198_Detector - https://github.com/alekos3/CVE_2023_20198_Remediator diff --git a/2023/CVE-2023-20202.md b/2023/CVE-2023-20202.md index 9244b5a889..31dc2babd9 100644 --- a/2023/CVE-2023-20202.md +++ b/2023/CVE-2023-20202.md @@ -5,9 +5,7 @@ ### Description -A vulnerability in the Wireless Network Control daemon (wncd) of Cisco IOS XE Software for Wireless LAN Controllers could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. - - This vulnerability is due to improper memory management. An attacker could exploit this vulnerability by sending a series of network requests to an affected device. A successful exploit could allow the attacker to cause the wncd process to consume available memory and eventually cause the device to reload, resulting in a DoS condition. +A vulnerability in the Wireless Network Control daemon (wncd) of Cisco IOS XE Software for Wireless LAN Controllers could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper memory management. An attacker could exploit this vulnerability by sending a series of network requests to an affected device. A successful exploit could allow the attacker to cause the wncd process to consume available memory and eventually cause the device to reload, resulting in a DoS condition. ### POC diff --git a/2023/CVE-2023-20209.md b/2023/CVE-2023-20209.md index d76add2bdb..c08e332d28 100644 --- a/2023/CVE-2023-20209.md +++ b/2023/CVE-2023-20209.md @@ -5,9 +5,7 @@ ### Description -A vulnerability in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read-write privileges on the application to perform a command injection attack that could result in remote code execution on an affected device. - - This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to establish a remote shell with root privileges. +A vulnerability in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read-write privileges on the application to perform a command injection attack that could result in remote code execution on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to establish a remote shell with root privileges. ### POC diff --git a/2023/CVE-2023-20211.md b/2023/CVE-2023-20211.md index 6bdef5130d..dd7d348cb7 100644 --- a/2023/CVE-2023-20211.md +++ b/2023/CVE-2023-20211.md @@ -7,9 +7,7 @@ ### Description -A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. - - This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by authenticating to the application as a user with read-only or higher privileges and sending crafted HTTP requests to an affected system. A successful exploit could allow the attacker to read or modify data in the underlying database or elevate their privileges. +A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by authenticating to the application as a user with read-only or higher privileges and sending crafted HTTP requests to an affected system. A successful exploit could allow the attacker to read or modify data in the underlying database or elevate their privileges. ### POC diff --git a/2023/CVE-2023-20217.md b/2023/CVE-2023-20217.md index 2eec74774c..5a013da11b 100644 --- a/2023/CVE-2023-20217.md +++ b/2023/CVE-2023-20217.md @@ -5,9 +5,7 @@ ### Description -A vulnerability in the CLI of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, local attacker to elevate privileges on an affected device. - - This vulnerability is due to insufficient input validation by the operating system CLI. An attacker could exploit this vulnerability by issuing certain commands using sudo. A successful exploit could allow the attacker to view arbitrary files as root on the underlying operating system. The attacker must have valid credentials on the affected device. +A vulnerability in the CLI of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, local attacker to elevate privileges on an affected device. This vulnerability is due to insufficient input validation by the operating system CLI. An attacker could exploit this vulnerability by issuing certain commands using sudo. A successful exploit could allow the attacker to view arbitrary files as root on the underlying operating system. The attacker must have valid credentials on the affected device. ### POC diff --git a/2023/CVE-2023-20218.md b/2023/CVE-2023-20218.md index c313e86f2f..86da4c5d8f 100644 --- a/2023/CVE-2023-20218.md +++ b/2023/CVE-2023-20218.md @@ -5,13 +5,7 @@ ### Description -A vulnerability in web-based management interface of Cisco SPA500 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to to modify a web page in the context of a user's browser. - - This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to alter the contents of a web page to redirect the user to potentially malicious websites, or the attacker could use this vulnerability to conduct further client-side attacks. - - Cisco will not release software updates that address this vulnerability. - - {{value}} ["%7b%7bvalue%7d%7d"])}]] +A vulnerability in web-based management interface of Cisco SPA500 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to to modify a web page in the context of a user's browser. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to alter the contents of a web page to redirect the user to potentially malicious websites, or the attacker could use this vulnerability to conduct further client-side attacks. Cisco will not release software updates that address this vulnerability. {{value}} ["%7b%7bvalue%7d%7d"])}]] ### POC diff --git a/2023/CVE-2023-20224.md b/2023/CVE-2023-20224.md index 31732aba2c..7661cdb684 100644 --- a/2023/CVE-2023-20224.md +++ b/2023/CVE-2023-20224.md @@ -5,9 +5,7 @@ ### Description -A vulnerability in the CLI of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, local attacker to elevate privileges to root on an affected device. - - This vulnerability is due to insufficient input validation of user-supplied CLI arguments. An attacker could exploit this vulnerability by authenticating to an affected device and using crafted commands at the prompt. A successful exploit could allow the attacker to execute arbitrary commands as root. The attacker must have valid credentials on the affected device. +A vulnerability in the CLI of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, local attacker to elevate privileges to root on an affected device. This vulnerability is due to insufficient input validation of user-supplied CLI arguments. An attacker could exploit this vulnerability by authenticating to an affected device and using crafted commands at the prompt. A successful exploit could allow the attacker to execute arbitrary commands as root. The attacker must have valid credentials on the affected device. ### POC diff --git a/2023/CVE-2023-20226.md b/2023/CVE-2023-20226.md index d7b4bfbcce..ba4f99a54d 100644 --- a/2023/CVE-2023-20226.md +++ b/2023/CVE-2023-20226.md @@ -5,9 +5,7 @@ ### Description -A vulnerability in Application Quality of Experience (AppQoE) and Unified Threat Defense (UTD) on Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. - - This vulnerability is due to the mishandling of a crafted packet stream through the AppQoE or UTD application. An attacker could exploit this vulnerability by sending a crafted packet stream through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. +A vulnerability in Application Quality of Experience (AppQoE) and Unified Threat Defense (UTD) on Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to the mishandling of a crafted packet stream through the AppQoE or UTD application. An attacker could exploit this vulnerability by sending a crafted packet stream through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. ### POC diff --git a/2023/CVE-2023-20227.md b/2023/CVE-2023-20227.md index 02212c4313..e95964941a 100644 --- a/2023/CVE-2023-20227.md +++ b/2023/CVE-2023-20227.md @@ -5,11 +5,7 @@ ### Description -A vulnerability in the Layer 2 Tunneling Protocol (L2TP) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. - - This vulnerability is due to improper handling of certain L2TP packets. An attacker could exploit this vulnerability by sending crafted L2TP packets to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. - - Note: Only traffic directed to the affected system can be used to exploit this vulnerability. +A vulnerability in the Layer 2 Tunneling Protocol (L2TP) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of certain L2TP packets. An attacker could exploit this vulnerability by sending crafted L2TP packets to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. ### POC diff --git a/2023/CVE-2023-20231.md b/2023/CVE-2023-20231.md index 9b46a7f73a..b1103b5594 100644 --- a/2023/CVE-2023-20231.md +++ b/2023/CVE-2023-20231.md @@ -5,11 +5,7 @@ ### Description -A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to perform an injection attack against an affected device. - - This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary Cisco IOS XE Software CLI commands with level 15 privileges. - - Note: This vulnerability is exploitable only if the attacker obtains the credentials for a Lobby Ambassador account. This account is not configured by default. +A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to perform an injection attack against an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary Cisco IOS XE Software CLI commands with level 15 privileges. Note: This vulnerability is exploitable only if the attacker obtains the credentials for a Lobby Ambassador account. This account is not configured by default. ### POC diff --git a/2023/CVE-2023-20235.md b/2023/CVE-2023-20235.md index a55ec564cb..9390131eb0 100644 --- a/2023/CVE-2023-20235.md +++ b/2023/CVE-2023-20235.md @@ -5,9 +5,7 @@ ### Description -A vulnerability in the on-device application development workflow feature for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an authenticated, remote attacker to access the underlying operating system as the root user. - - This vulnerability exists because Docker containers with the privileged runtime option are not blocked when they are in application development mode. An attacker could exploit this vulnerability by using the Docker CLI to access an affected device. The application development workflow is meant to be used only on development systems and not in production systems. +A vulnerability in the on-device application development workflow feature for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an authenticated, remote attacker to access the underlying operating system as the root user. This vulnerability exists because Docker containers with the privileged runtime option are not blocked when they are in application development mode. An attacker could exploit this vulnerability by using the Docker CLI to access an affected device. The application development workflow is meant to be used only on development systems and not in production systems. ### POC diff --git a/2023/CVE-2023-20251.md b/2023/CVE-2023-20251.md index 912775e154..7d648666c6 100644 --- a/2023/CVE-2023-20251.md +++ b/2023/CVE-2023-20251.md @@ -7,9 +7,7 @@ ### Description -A vulnerability in the memory buffer of Cisco Wireless LAN Controller (WLC) AireOS Software could allow an unauthenticated, adjacent attacker to cause memory leaks that could eventually lead to a device reboot. - - This vulnerability is due to memory leaks caused by multiple clients connecting under specific conditions. An attacker could exploit this vulnerability by causing multiple wireless clients to attempt to connect to an access point (AP) on an affected device. A successful exploit could allow the attacker to cause the affected device to reboot after a significant amount of time, resulting in a denial of service (DoS) condition. +A vulnerability in the memory buffer of Cisco Wireless LAN Controller (WLC) AireOS Software could allow an unauthenticated, adjacent attacker to cause memory leaks that could eventually lead to a device reboot. This vulnerability is due to memory leaks caused by multiple clients connecting under specific conditions. An attacker could exploit this vulnerability by causing multiple wireless clients to attempt to connect to an access point (AP) on an affected device. A successful exploit could allow the attacker to cause the affected device to reboot after a significant amount of time, resulting in a denial of service (DoS) condition. ### POC diff --git a/2023/CVE-2023-20268.md b/2023/CVE-2023-20268.md index 214203d2c1..1bd8d86f22 100644 --- a/2023/CVE-2023-20268.md +++ b/2023/CVE-2023-20268.md @@ -9,9 +9,7 @@ ### Description -A vulnerability in the packet processing functionality of Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to exhaust resources on an affected device. - - This vulnerability is due to insufficient management of resources when handling certain types of traffic. An attacker could exploit this vulnerability by sending a series of specific wireless packets to an affected device. A successful exploit could allow the attacker to consume resources on an affected device. A sustained attack could lead to the disruption of the Control and Provisioning of Wireless Access Points (CAPWAP) tunnel and intermittent loss of wireless client traffic. +A vulnerability in the packet processing functionality of Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to exhaust resources on an affected device. This vulnerability is due to insufficient management of resources when handling certain types of traffic. An attacker could exploit this vulnerability by sending a series of specific wireless packets to an affected device. A successful exploit could allow the attacker to consume resources on an affected device. A sustained attack could lead to the disruption of the Control and Provisioning of Wireless Access Points (CAPWAP) tunnel and intermittent loss of wireless client traffic. ### POC diff --git a/2023/CVE-2023-20269.md b/2023/CVE-2023-20269.md index 4b817525c0..d1199f0707 100644 --- a/2023/CVE-2023-20269.md +++ b/2023/CVE-2023-20269.md @@ -7,21 +7,7 @@ ### Description -A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or an authenticated, remote attacker to establish a clientless SSL VPN session with an unauthorized user. - - This vulnerability is due to improper separation of authentication, authorization, and accounting (AAA) between the remote access VPN feature and the HTTPS management and site-to-site VPN features. An attacker could exploit this vulnerability by specifying a default connection profile/tunnel group while conducting a brute force attack or while establishing a clientless SSL VPN session using valid credentials. A successful exploit could allow the attacker to achieve one or both of the following: - - - Identify valid credentials that could then be used to establish an unauthorized remote access VPN session. - Establish a clientless SSL VPN session (only when running Cisco ASA Software Release 9.16 or earlier). - - Notes: - - - Establishing a client-based remote access VPN tunnel is not possible as these default connection profiles/tunnel groups do not and cannot have an IP address pool configured. - This vulnerability does not allow an attacker to bypass authentication. To successfully establish a remote access VPN session, valid credentials are required, including a valid second factor if multi-factor authentication (MFA) is configured. - - Cisco will release software updates that address this vulnerability. There are workarounds that address this vulnerability. +A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or an authenticated, remote attacker to establish a clientless SSL VPN session with an unauthorized user. This vulnerability is due to improper separation of authentication, authorization, and accounting (AAA) between the remote access VPN feature and the HTTPS management and site-to-site VPN features. An attacker could exploit this vulnerability by specifying a default connection profile/tunnel group while conducting a brute force attack or while establishing a clientless SSL VPN session using valid credentials. A successful exploit could allow the attacker to achieve one or both of the following: Identify valid credentials that could then be used to establish an unauthorized remote access VPN session. Establish a clientless SSL VPN session (only when running Cisco ASA Software Release 9.16 or earlier). Notes: Establishing a client-based remote access VPN tunnel is not possible as these default connection profiles/tunnel groups do not and cannot have an IP address pool configured. This vulnerability does not allow an attacker to bypass authentication. To successfully establish a remote access VPN session, valid credentials are required, including a valid second factor if multi-factor authentication (MFA) is configured. Cisco will release software updates that address this vulnerability. There are workarounds that address this vulnerability. ### POC diff --git a/2023/CVE-2023-20273.md b/2023/CVE-2023-20273.md index ff992ab70e..ede2d16ef9 100644 --- a/2023/CVE-2023-20273.md +++ b/2023/CVE-2023-20273.md @@ -17,6 +17,7 @@ A vulnerability in the web UI feature of Cisco IOS XE Software could allow an au - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/Shadow0ps/CVE-2023-20198-Scanner +- https://github.com/aleff-github/aleff-github - https://github.com/aleff-github/my-flipper-shits - https://github.com/cadencejames/Check-HttpServerStatus - https://github.com/f1tao/awesome-iot-security-resource diff --git a/2023/CVE-2023-20598.md b/2023/CVE-2023-20598.md index 84a2c5c9bd..77165471e2 100644 --- a/2023/CVE-2023-20598.md +++ b/2023/CVE-2023-20598.md @@ -25,4 +25,5 @@ No PoCs from references. #### Github - https://github.com/hfiref0x/KDU +- https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-2123.md b/2023/CVE-2023-2123.md index 31bb375d62..86076dcfad 100644 --- a/2023/CVE-2023-2123.md +++ b/2023/CVE-2023-2123.md @@ -15,5 +15,6 @@ The WP Inventory Manager WordPress plugin before 2.1.0.13 does not sanitise and #### Github - https://github.com/0xn4d/poc-cve-xss-encoded-wp-inventory-manager-plugin +- https://github.com/daniloalbuqrque/poc-cve-xss-encoded-wp-inventory-manager-plugin - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-21839.md b/2023/CVE-2023-21839.md index 30770a2c78..dbfdf34767 100644 --- a/2023/CVE-2023-21839.md +++ b/2023/CVE-2023-21839.md @@ -14,6 +14,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware - https://www.oracle.com/security-alerts/cpujan2023.html #### Github +- https://github.com/0xMarcio/cve - https://github.com/0xn0ne/simple-scanner - https://github.com/20142995/pocsuite3 - https://github.com/20142995/sectool diff --git a/2023/CVE-2023-21987.md b/2023/CVE-2023-21987.md index 7835e8396b..42b880e477 100644 --- a/2023/CVE-2023-21987.md +++ b/2023/CVE-2023-21987.md @@ -14,4 +14,5 @@ Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp #### Github - https://github.com/AtonceInventions/Hypervisor +- https://github.com/husseinmuhaisen/Hypervisor diff --git a/2023/CVE-2023-21991.md b/2023/CVE-2023-21991.md index 7a68422da8..bdcc2f995f 100644 --- a/2023/CVE-2023-21991.md +++ b/2023/CVE-2023-21991.md @@ -14,4 +14,5 @@ Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp #### Github - https://github.com/AtonceInventions/Hypervisor +- https://github.com/husseinmuhaisen/Hypervisor diff --git a/2023/CVE-2023-22515.md b/2023/CVE-2023-22515.md index 05723667fd..8f4321d636 100644 --- a/2023/CVE-2023-22515.md +++ b/2023/CVE-2023-22515.md @@ -6,9 +6,7 @@ ### Description -Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. - -Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. +Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. ### POC diff --git a/2023/CVE-2023-22527.md b/2023/CVE-2023-22527.md index 848c917071..e2fdeda50c 100644 --- a/2023/CVE-2023-22527.md +++ b/2023/CVE-2023-22527.md @@ -36,6 +36,7 @@ A template injection vulnerability on older versions of Confluence Data Center a - https://github.com/RevoltSecurities/CVE-2023-22527 - https://github.com/Sudistark/patch-diff-CVE-2023-22527 - https://github.com/Threekiii/Awesome-POC +- https://github.com/Threekiii/Awesome-Redteam - https://github.com/Threekiii/CVE - https://github.com/Threekiii/Vulhub-Reproduce - https://github.com/Tropinene/Yscanner diff --git a/2023/CVE-2023-22906.md b/2023/CVE-2023-22906.md index 53efd5cdf3..6bd671956e 100644 --- a/2023/CVE-2023-22906.md +++ b/2023/CVE-2023-22906.md @@ -15,4 +15,5 @@ Hero Qubo HCD01_02_V1.38_20220125 devices allow TELNET access with root privileg #### Github - https://github.com/abrahim7112/Vulnerability-checking-program-for-Android - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/nonamecoder/CVE-2023-22906 diff --git a/2023/CVE-2023-23169.md b/2023/CVE-2023-23169.md index 70fd7f818d..da0703ef07 100644 --- a/2023/CVE-2023-23169.md +++ b/2023/CVE-2023-23169.md @@ -13,5 +13,6 @@ Synapsoft pdfocus 1.17 is vulnerable to local file inclusion and server-side req - https://github.com/S4nshine/CVE-2023-23169 #### Github +- https://github.com/S4nshine/CVE-2023-23169 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-23333.md b/2023/CVE-2023-23333.md index 6996962b02..de2f661426 100644 --- a/2023/CVE-2023-23333.md +++ b/2023/CVE-2023-23333.md @@ -17,6 +17,7 @@ There is a command injection vulnerability in SolarView Compact through 6.00, at - https://github.com/BugBlocker/lotus-scripts - https://github.com/Mr-xn/CVE-2023-23333 - https://github.com/Mr-xn/Penetration_Testing_POC +- https://github.com/Timorlover/CVE-2023-23333 - https://github.com/WhiteOwl-Pub/PoC-SolarView-Compact-CVE-2023-23333 - https://github.com/abrahim7112/Vulnerability-checking-program-for-Android - https://github.com/dddinmx/POC-Pocsuite3 diff --git a/2023/CVE-2023-23397.md b/2023/CVE-2023-23397.md index 68d2164891..c39da8f18f 100644 --- a/2023/CVE-2023-23397.md +++ b/2023/CVE-2023-23397.md @@ -58,6 +58,7 @@ No PoCs from references. - https://github.com/ahmedkhlief/CVE-2023-23397-POC - https://github.com/ahmedkhlief/CVE-2023-23397-POC-Using-Interop-Outlook - https://github.com/alecdhuse/Lantern-Shark +- https://github.com/aleff-github/aleff-github - https://github.com/aleff-github/my-flipper-shits - https://github.com/alicangnll/CVE-2023-23397 - https://github.com/alsaeroth/CVE-2023-23397-POC diff --git a/2023/CVE-2023-23563.md b/2023/CVE-2023-23563.md index a32ce3a5b5..e96ecd14a9 100644 --- a/2023/CVE-2023-23563.md +++ b/2023/CVE-2023-23563.md @@ -14,4 +14,5 @@ An issue was discovered in Geomatika IsiGeo Web 6.0. It allows remote authentica - https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_geomatika_isigeoweb.md #### Github +- https://github.com/Orange-Cyberdefense/CVE-repository diff --git a/2023/CVE-2023-23564.md b/2023/CVE-2023-23564.md index fb0b99122b..5386c55406 100644 --- a/2023/CVE-2023-23564.md +++ b/2023/CVE-2023-23564.md @@ -14,4 +14,5 @@ An issue was discovered in Geomatika IsiGeo Web 6.0. It allows remote authentica - https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_geomatika_isigeoweb.md #### Github +- https://github.com/Orange-Cyberdefense/CVE-repository diff --git a/2023/CVE-2023-23565.md b/2023/CVE-2023-23565.md index fd041cf280..a50308a2d4 100644 --- a/2023/CVE-2023-23565.md +++ b/2023/CVE-2023-23565.md @@ -14,4 +14,5 @@ An issue was discovered in Geomatika IsiGeo Web 6.0. It allows remote authentica - https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_geomatika_isigeoweb.md #### Github +- https://github.com/Orange-Cyberdefense/CVE-repository diff --git a/2023/CVE-2023-23583.md b/2023/CVE-2023-23583.md index 04ac64979a..222a846b13 100644 --- a/2023/CVE-2023-23583.md +++ b/2023/CVE-2023-23583.md @@ -17,6 +17,7 @@ No PoCs from references. - https://github.com/EGI-Federation/SVG-advisories - https://github.com/Mav3r1ck0x1/CVE-2023-23583-Reptar- - https://github.com/blazcode/INTEL-SA-00950 +- https://github.com/codexlynx/hardware-attacks-state-of-the-art - https://github.com/giterlizzi/secdb-feeds - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/speed47/spectre-meltdown-checker diff --git a/2023/CVE-2023-23607.md b/2023/CVE-2023-23607.md index 62426c6479..ed764d54ae 100644 --- a/2023/CVE-2023-23607.md +++ b/2023/CVE-2023-23607.md @@ -13,5 +13,5 @@ erohtar/Dasherr is a dashboard for self-hosted services. In affected versions un - https://github.com/erohtar/Dasherr/security/advisories/GHSA-6rgc-2x44-7phq #### Github -No PoCs found on GitHub currently. +- https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-23752.md b/2023/CVE-2023-23752.md index 97b025b187..d6a95c2d49 100644 --- a/2023/CVE-2023-23752.md +++ b/2023/CVE-2023-23752.md @@ -35,6 +35,7 @@ No PoCs from references. - https://github.com/BearClaw96/Joomla-v4.x-Unauthenticated-information-disclosure - https://github.com/BugBlocker/lotus-scripts - https://github.com/C1ph3rX13/CVE-2023-23752 +- https://github.com/CLincat/vulcat - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top diff --git a/2023/CVE-2023-24580.md b/2023/CVE-2023-24580.md index 9b22245b11..4dca2e7c2f 100644 --- a/2023/CVE-2023-24580.md +++ b/2023/CVE-2023-24580.md @@ -14,4 +14,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/seal-community/patches diff --git a/2023/CVE-2023-24709.md b/2023/CVE-2023-24709.md index 721b7b5a0b..4468931092 100644 --- a/2023/CVE-2023-24709.md +++ b/2023/CVE-2023-24709.md @@ -17,6 +17,7 @@ An issue found in Paradox Security Systems IPR512 allows attackers to cause a de #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/DRAGOWN/Injection-vulnerability-in-Paradox-Security-Systems-IPR512-CVE-2023-24709-PoC +- https://github.com/SlashXzerozero/Injection-vulnerability-in-Paradox-Security-Systems-IPR512 - https://github.com/SlashXzerozero/Injection-vulnerability-in-Paradox-Security-Systems-IPR512-CVE-2023-24709-PoC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-25157.md b/2023/CVE-2023-25157.md index 1d9c9691f3..d33148c472 100644 --- a/2023/CVE-2023-25157.md +++ b/2023/CVE-2023-25157.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/0x2458bughunt/CVE-2023-25157 - https://github.com/0x783kb/Security-operation-book +- https://github.com/0xMarcio/cve - https://github.com/20142995/sectool - https://github.com/7imbitz/CVE-2023-25157-checker - https://github.com/Awrrays/FrameVul diff --git a/2023/CVE-2023-25690.md b/2023/CVE-2023-25690.md index 4a4b1aa48b..dc1ed2b37f 100644 --- a/2023/CVE-2023-25690.md +++ b/2023/CVE-2023-25690.md @@ -18,6 +18,7 @@ Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.5 - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top - https://github.com/EGI-Federation/SVG-advisories +- https://github.com/EzeTauil/Maquina-Upload - https://github.com/GGontijo/CTF-s - https://github.com/GhostTroops/TOP - https://github.com/H4lo/awesome-IoT-security-article diff --git a/2023/CVE-2023-2579.md b/2023/CVE-2023-2579.md index 3b6fcdabbb..016dc8b763 100644 --- a/2023/CVE-2023-2579.md +++ b/2023/CVE-2023-2579.md @@ -15,5 +15,6 @@ The InventoryPress WordPress plugin through 1.7 does not sanitise and escape som #### Github - https://github.com/0xn4d/poc-cve-xss-inventory-press-plugin +- https://github.com/daniloalbuqrque/poc-cve-xss-inventory-press-plugin - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-26112.md b/2023/CVE-2023-26112.md index 6a20d07cf8..502b0c82af 100644 --- a/2023/CVE-2023-26112.md +++ b/2023/CVE-2023-26112.md @@ -5,10 +5,7 @@ ### Description -All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). - -**Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file. - +All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file. ### POC diff --git a/2023/CVE-2023-26115.md b/2023/CVE-2023-26115.md index 7b27caff5b..6ee5f63752 100644 --- a/2023/CVE-2023-26115.md +++ b/2023/CVE-2023-26115.md @@ -6,8 +6,7 @@ ### Description -All versions of the package word-wrap are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regular expression within the result variable. - +All versions of the package word-wrap are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regular expression within the result variable. ### POC diff --git a/2023/CVE-2023-26122.md b/2023/CVE-2023-26122.md index 495876cdfe..7d7d88a617 100644 --- a/2023/CVE-2023-26122.md +++ b/2023/CVE-2023-26122.md @@ -5,12 +5,7 @@ ### Description -All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation. -Exploiting this vulnerability might result in remote code execution ("RCE"). - -**Vulnerable functions:** - -__defineGetter__, stack(), toLocaleString(), propertyIsEnumerable.call(), valueOf(). +All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation. Exploiting this vulnerability might result in remote code execution ("RCE"). **Vulnerable functions:** __defineGetter__, stack(), toLocaleString(), propertyIsEnumerable.call(), valueOf(). ### POC diff --git a/2023/CVE-2023-26123.md b/2023/CVE-2023-26123.md index da03cfb4b5..fac99b54a1 100644 --- a/2023/CVE-2023-26123.md +++ b/2023/CVE-2023-26123.md @@ -5,9 +5,7 @@ ### Description -Versions of the package raysan5/raylib before 4.5.0 are vulnerable to Cross-site Scripting (XSS) such that the SetClipboardText API does not properly escape the ' character, allowing attacker-controlled input to break out of the string and execute arbitrary JavaScript via emscripten_run_script function. - -**Note:** This vulnerability is present only when compiling raylib for PLATFORM_WEB. All the other Desktop/Mobile/Embedded platforms are not affected. +Versions of the package raysan5/raylib before 4.5.0 are vulnerable to Cross-site Scripting (XSS) such that the SetClipboardText API does not properly escape the ' character, allowing attacker-controlled input to break out of the string and execute arbitrary JavaScript via emscripten_run_script function. **Note:** This vulnerability is present only when compiling raylib for PLATFORM_WEB. All the other Desktop/Mobile/Embedded platforms are not affected. ### POC diff --git a/2023/CVE-2023-26125.md b/2023/CVE-2023-26125.md index fa6537296f..e9cb193328 100644 --- a/2023/CVE-2023-26125.md +++ b/2023/CVE-2023-26125.md @@ -5,9 +5,7 @@ ### Description -Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning. - -**Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic. +Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning. **Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic. ### POC diff --git a/2023/CVE-2023-26126.md b/2023/CVE-2023-26126.md index 4abf3846f2..f072573134 100644 --- a/2023/CVE-2023-26126.md +++ b/2023/CVE-2023-26126.md @@ -5,8 +5,7 @@ ### Description -All versions of the package m.static are vulnerable to Directory Traversal due to improper input sanitization of the path being requested via the requestFile function. - +All versions of the package m.static are vulnerable to Directory Traversal due to improper input sanitization of the path being requested via the requestFile function. ### POC diff --git a/2023/CVE-2023-26127.md b/2023/CVE-2023-26127.md index 623b43b27a..cf1c6abc93 100644 --- a/2023/CVE-2023-26127.md +++ b/2023/CVE-2023-26127.md @@ -5,11 +5,7 @@ ### Description -All versions of the package n158 are vulnerable to Command Injection due to improper input sanitization in the 'module.exports' function. - -**Note:** - -To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment. +All versions of the package n158 are vulnerable to Command Injection due to improper input sanitization in the 'module.exports' function. **Note:** To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment. ### POC diff --git a/2023/CVE-2023-26128.md b/2023/CVE-2023-26128.md index a5a642e9bf..13840b6fef 100644 --- a/2023/CVE-2023-26128.md +++ b/2023/CVE-2023-26128.md @@ -5,11 +5,7 @@ ### Description -All versions of the package keep-module-latest are vulnerable to Command Injection due to missing input sanitization or other checks and sandboxes being employed to the installModule function. - -**Note:** - -To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment. +All versions of the package keep-module-latest are vulnerable to Command Injection due to missing input sanitization or other checks and sandboxes being employed to the installModule function. **Note:** To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment. ### POC diff --git a/2023/CVE-2023-26129.md b/2023/CVE-2023-26129.md index 60971d1812..6a15b4e967 100644 --- a/2023/CVE-2023-26129.md +++ b/2023/CVE-2023-26129.md @@ -5,11 +5,7 @@ ### Description -All versions of the package bwm-ng are vulnerable to Command Injection due to improper input sanitization in the 'check' function in the bwm-ng.js file. - -**Note:** - -To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment. +All versions of the package bwm-ng are vulnerable to Command Injection due to improper input sanitization in the 'check' function in the bwm-ng.js file. **Note:** To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment. ### POC diff --git a/2023/CVE-2023-26130.md b/2023/CVE-2023-26130.md index 02afa5b332..327c0e5f65 100644 --- a/2023/CVE-2023-26130.md +++ b/2023/CVE-2023-26130.md @@ -5,9 +5,7 @@ ### Description -Versions of the package yhirose/cpp-httplib before 0.12.4 are vulnerable to CRLF Injection when untrusted user input is used to set the content-type header in the HTTP .Patch, .Post, .Put and .Delete requests. This can lead to logical errors and other misbehaviors. - -**Note:** This issue is present due to an incomplete fix for [CVE-2020-11709](https://security.snyk.io/vuln/SNYK-UNMANAGED-YHIROSECPPHTTPLIB-2366507). +Versions of the package yhirose/cpp-httplib before 0.12.4 are vulnerable to CRLF Injection when untrusted user input is used to set the content-type header in the HTTP .Patch, .Post, .Put and .Delete requests. This can lead to logical errors and other misbehaviors. **Note:** This issue is present due to an incomplete fix for [CVE-2020-11709](https://security.snyk.io/vuln/SNYK-UNMANAGED-YHIROSECPPHTTPLIB-2366507). ### POC diff --git a/2023/CVE-2023-26131.md b/2023/CVE-2023-26131.md index 85a64f25f6..efa9689e9e 100644 --- a/2023/CVE-2023-26131.md +++ b/2023/CVE-2023-26131.md @@ -6,8 +6,7 @@ ### Description -All versions of the package github.com/xyproto/algernon/engine; all versions of the package github.com/xyproto/algernon/themes are vulnerable to Cross-site Scripting (XSS) via the themes.NoPage(filename, theme) function due to improper user input sanitization. Exploiting this vulnerability is possible when a file/resource is not found. - +All versions of the package github.com/xyproto/algernon/engine; all versions of the package github.com/xyproto/algernon/themes are vulnerable to Cross-site Scripting (XSS) via the themes.NoPage(filename, theme) function due to improper user input sanitization. Exploiting this vulnerability is possible when a file/resource is not found. ### POC diff --git a/2023/CVE-2023-26133.md b/2023/CVE-2023-26133.md index 9cf648fe23..ae2181f9bc 100644 --- a/2023/CVE-2023-26133.md +++ b/2023/CVE-2023-26133.md @@ -5,8 +5,7 @@ ### Description -All versions of the package progressbar.js are vulnerable to Prototype Pollution via the function extend() in the file utils.js. - +All versions of the package progressbar.js are vulnerable to Prototype Pollution via the function extend() in the file utils.js. ### POC diff --git a/2023/CVE-2023-26144.md b/2023/CVE-2023-26144.md index 71442e72ab..0fe2520a96 100644 --- a/2023/CVE-2023-26144.md +++ b/2023/CVE-2023-26144.md @@ -5,9 +5,7 @@ ### Description -Versions of the package graphql from 16.3.0 and before 16.8.1 are vulnerable to Denial of Service (DoS) due to insufficient checks in the OverlappingFieldsCanBeMergedRule.ts file when parsing large queries. This vulnerability allows an attacker to degrade system performance. - -**Note:** It was not proven that this vulnerability can crash the process. +Versions of the package graphql from 16.3.0 and before 16.8.1 are vulnerable to Denial of Service (DoS) due to insufficient checks in the OverlappingFieldsCanBeMergedRule.ts file when parsing large queries. This vulnerability allows an attacker to degrade system performance. **Note:** It was not proven that this vulnerability can crash the process. ### POC diff --git a/2023/CVE-2023-26145.md b/2023/CVE-2023-26145.md index 30c8dfc97a..4e2904973d 100644 --- a/2023/CVE-2023-26145.md +++ b/2023/CVE-2023-26145.md @@ -5,18 +5,7 @@ ### Description -This affects versions of the package pydash before 6.0.0. A number of pydash methods such as pydash.objects.invoke() and pydash.collections.invoke_map() accept dotted paths (Deep Path Strings) to target a nested Python object, relative to the original source object. These paths can be used to target internal class attributes and dict items, to retrieve, modify or invoke nested Python objects. - -**Note:** - -The pydash.objects.invoke() method is vulnerable to Command Injection when the following prerequisites are satisfied: - -1) The source object (argument 1) is not a built-in object such as list/dict (otherwise, the __init__.__globals__ path is not accessible) - -2) The attacker has control over argument 2 (the path string) and argument 3 (the argument to pass to the invoked method) - - -The pydash.collections.invoke_map() method is also vulnerable, but is harder to exploit as the attacker does not have direct control over the argument to be passed to the invoked function. +This affects versions of the package pydash before 6.0.0. A number of pydash methods such as pydash.objects.invoke() and pydash.collections.invoke_map() accept dotted paths (Deep Path Strings) to target a nested Python object, relative to the original source object. These paths can be used to target internal class attributes and dict items, to retrieve, modify or invoke nested Python objects. **Note:** The pydash.objects.invoke() method is vulnerable to Command Injection when the following prerequisites are satisfied: 1) The source object (argument 1) is not a built-in object such as list/dict (otherwise, the __init__.__globals__ path is not accessible) 2) The attacker has control over argument 2 (the path string) and argument 3 (the argument to pass to the invoked method) The pydash.collections.invoke_map() method is also vulnerable, but is harder to exploit as the attacker does not have direct control over the argument to be passed to the invoked function. ### POC diff --git a/2023/CVE-2023-26149.md b/2023/CVE-2023-26149.md index 69a7c20037..b585e359f7 100644 --- a/2023/CVE-2023-26149.md +++ b/2023/CVE-2023-26149.md @@ -5,11 +5,7 @@ ### Description -Versions of the package quill-mention before 4.0.0 are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization, via the renderList function. - -**Note:** - -If the mentions list is sourced from unsafe (user-sourced) data, this might allow an injection attack when a Quill user hits @. +Versions of the package quill-mention before 4.0.0 are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization, via the renderList function. **Note:** If the mentions list is sourced from unsafe (user-sourced) data, this might allow an injection attack when a Quill user hits @. ### POC diff --git a/2023/CVE-2023-26150.md b/2023/CVE-2023-26150.md index c38f7c3135..88df5f52aa 100644 --- a/2023/CVE-2023-26150.md +++ b/2023/CVE-2023-26150.md @@ -5,11 +5,7 @@ ### Description -Versions of the package asyncua before 0.9.96 are vulnerable to Improper Authentication such that it is possible to access Address Space without encryption and authentication. - -**Note:** - -This issue is a result of missing checks for services that require an active session. +Versions of the package asyncua before 0.9.96 are vulnerable to Improper Authentication such that it is possible to access Address Space without encryption and authentication. **Note:** This issue is a result of missing checks for services that require an active session. ### POC diff --git a/2023/CVE-2023-26153.md b/2023/CVE-2023-26153.md index 245702dedf..18f19433b5 100644 --- a/2023/CVE-2023-26153.md +++ b/2023/CVE-2023-26153.md @@ -5,11 +5,7 @@ ### Description -Versions of the package geokit-rails before 2.5.0 are vulnerable to Command Injection due to unsafe deserialisation of YAML within the 'geo_location' cookie. This issue can be exploited remotely via a malicious cookie value. - -**Note:** - - An attacker can use this vulnerability to execute commands on the host system. +Versions of the package geokit-rails before 2.5.0 are vulnerable to Command Injection due to unsafe deserialisation of YAML within the 'geo_location' cookie. This issue can be exploited remotely via a malicious cookie value. **Note:** An attacker can use this vulnerability to execute commands on the host system. ### POC diff --git a/2023/CVE-2023-26156.md b/2023/CVE-2023-26156.md index 80c975b685..6ed271e247 100644 --- a/2023/CVE-2023-26156.md +++ b/2023/CVE-2023-26156.md @@ -5,11 +5,7 @@ ### Description -Versions of the package chromedriver before 119.0.1 are vulnerable to Command Injection when setting the chromedriver.path to an arbitrary system binary. This could lead to unauthorized access and potentially malicious actions on the host system. - -**Note:** - -An attacker must have access to the system running the vulnerable chromedriver library to exploit it. The success of exploitation also depends on the permissions and privileges of the process running chromedriver. +Versions of the package chromedriver before 119.0.1 are vulnerable to Command Injection when setting the chromedriver.path to an arbitrary system binary. This could lead to unauthorized access and potentially malicious actions on the host system. **Note:** An attacker must have access to the system running the vulnerable chromedriver library to exploit it. The success of exploitation also depends on the permissions and privileges of the process running chromedriver. ### POC diff --git a/2023/CVE-2023-26158.md b/2023/CVE-2023-26158.md index de8f656a14..a0c0ba62de 100644 --- a/2023/CVE-2023-26158.md +++ b/2023/CVE-2023-26158.md @@ -5,58 +5,7 @@ ### Description -All versions of the package mockjs are vulnerable to Prototype Pollution via the Util.extend function due to missing check if the attribute resolves to the object prototype. By adding or modifying attributes of an object prototype, it is possible to create attributes that exist on every object, or replace critical attributes with malicious ones. This can be problematic if the software depends on existence or non-existence of certain attributes, or uses pre-defined attributes of object prototype (such as hasOwnProperty, toString or valueOf). - -User controlled inputs inside the extend() method of the Mock.Handler, Mock.Random, Mock.RE.Handler or Mock.Util, will allow an attacker to exploit this vulnerability. - - Workaround - -By using a denylist of dangerous attributes, this weakness can be eliminated. - -Add the following line in the Util.extend function: - -js -js if (["__proto__", "constructor", "prototype"].includes(name)) continue - - -js -// src/mock/handler.js -Util.extend = function extend() { - var target = arguments[0] || {}, - i = 1, - length = arguments.length, - options, name, src, copy, clone - - if (length === 1) { - target = this - i = 0 - } - - for (; i < length; i++) { - options = arguments[i] - if (!options) continue - - for (name in options) { - if (["__proto__", "constructor", "prototype"].includes(name)) continue - src = target[name] - copy = options[name] - - if (target === copy) continue - if (copy === undefined) continue - - if (Util.isArray(copy) || Util.isObject(copy)) { - if (Util.isArray(copy)) clone = src && Util.isArray(src) ? src : [] - if (Util.isObject(copy)) clone = src && Util.isObject(src) ? src : {} - - target[name] = Util.extend(clone, copy) - } else { - target[name] = copy - } - } - } - - return target - } +All versions of the package mockjs are vulnerable to Prototype Pollution via the Util.extend function due to missing check if the attribute resolves to the object prototype. By adding or modifying attributes of an object prototype, it is possible to create attributes that exist on every object, or replace critical attributes with malicious ones. This can be problematic if the software depends on existence or non-existence of certain attributes, or uses pre-defined attributes of object prototype (such as hasOwnProperty, toString or valueOf). User controlled inputs inside the extend() method of the Mock.Handler, Mock.Random, Mock.RE.Handler or Mock.Util, will allow an attacker to exploit this vulnerability. Workaround By using a denylist of dangerous attributes, this weakness can be eliminated. Add the following line in the Util.extend function: js js if (["__proto__", "constructor", "prototype"].includes(name)) continue js // src/mock/handler.js Util.extend = function extend() { var target = arguments[0] || {}, i = 1, length = arguments.length, options, name, src, copy, clone if (length === 1) { target = this i = 0 } for (; i < length; i++) { options = arguments[i] if (!options) continue for (name in options) { if (["__proto__", "constructor", "prototype"].includes(name)) continue src = target[name] copy = options[name] if (target === copy) continue if (copy === undefined) continue if (Util.isArray(copy) || Util.isObject(copy)) { if (Util.isArray(copy)) clone = src && Util.isArray(src) ? src : [] if (Util.isObject(copy)) clone = src && Util.isObject(src) ? src : {} target[name] = Util.extend(clone, copy) } else { target[name] = copy } } } return target } ### POC diff --git a/2023/CVE-2023-2640.md b/2023/CVE-2023-2640.md index dd6587587a..35ce8c38e6 100644 --- a/2023/CVE-2023-2640.md +++ b/2023/CVE-2023-2640.md @@ -16,6 +16,7 @@ No PoCs from references. - https://github.com/0xWhoami35/root-kernel - https://github.com/0xsyr0/OSCP - https://github.com/Ev3rPalestine/Analytics-HTB-Walkthrough +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/K5LK/CVE-2023-2640-32629 - https://github.com/Kiosec/Linux-Exploitation - https://github.com/Nkipohcs/CVE-2023-2640-CVE-2023-32629 diff --git a/2023/CVE-2023-27035.md b/2023/CVE-2023-27035.md index 2e811ef6b2..7c3af3c6bd 100644 --- a/2023/CVE-2023-27035.md +++ b/2023/CVE-2023-27035.md @@ -14,5 +14,6 @@ An issue discovered in Obsidian Canvas 1.1.9 allows remote attackers to send des - https://github.com/fivex3/CVE-2023-27035 #### Github +- https://github.com/fivex3/CVE-2023-27035 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-27055.md b/2023/CVE-2023-27055.md index 106cc3ab4e..146fc8d824 100644 --- a/2023/CVE-2023-27055.md +++ b/2023/CVE-2023-27055.md @@ -13,4 +13,5 @@ Aver Information Inc PTZApp2 v20.01044.48 allows attackers to access sensitive f - https://github.com/StolidWaffle/AVer-PTZApp2 #### Github +- https://github.com/StolidWaffle/AVer-PTZApp2 diff --git a/2023/CVE-2023-27522.md b/2023/CVE-2023-27522.md index 20bdb51e20..49c7e2a46b 100644 --- a/2023/CVE-2023-27522.md +++ b/2023/CVE-2023-27522.md @@ -14,6 +14,7 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/EzeTauil/Maquina-Upload - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/xonoxitron/cpe2cve diff --git a/2023/CVE-2023-27653.md b/2023/CVE-2023-27653.md new file mode 100644 index 0000000000..122fe25851 --- /dev/null +++ b/2023/CVE-2023-27653.md @@ -0,0 +1,17 @@ +### [CVE-2023-27653](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27653) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue found in WHOv.1.0.28, v.1.0.30, v.1.0.32 allows an attacker to cause a denial of service via the SharedPreference files. + +### POC + +#### Reference +- https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27653/CVE%20detail.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2023/CVE-2023-27654.md b/2023/CVE-2023-27654.md new file mode 100644 index 0000000000..bc473b0842 --- /dev/null +++ b/2023/CVE-2023-27654.md @@ -0,0 +1,17 @@ +### [CVE-2023-27654](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27654) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue found in WHOv.1.0.28, v.1.0.30, v.1.0.32 allows an attacker to cause a escalation of privileges via the TTMultiProvider component. + +### POC + +#### Reference +- https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27654/CVE%20detail.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2023/CVE-2023-27742.md b/2023/CVE-2023-27742.md index d3a9a17651..8e9393882f 100644 --- a/2023/CVE-2023-27742.md +++ b/2023/CVE-2023-27742.md @@ -13,5 +13,6 @@ IDURAR ERP/CRM v1 was discovered to contain a SQL injection vulnerability via th - https://github.com/G37SYS73M/CVE-2023-27742 #### Github +- https://github.com/G37SYS73M/CVE-2023-27742 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-27842.md b/2023/CVE-2023-27842.md index 86e65290d2..144c622d3e 100644 --- a/2023/CVE-2023-27842.md +++ b/2023/CVE-2023-27842.md @@ -18,4 +18,5 @@ Insecure Permissions vulnerability found in Extplorer File manager eXtplorer v.2 - https://github.com/0xFTW/CVE-2023-27842 - https://github.com/cowsecurity/CVE-2023-27842 - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/tristao-marinho/CVE-2023-27842 diff --git a/2023/CVE-2023-28252.md b/2023/CVE-2023-28252.md index 6a633ac411..eae917346e 100644 --- a/2023/CVE-2023-28252.md +++ b/2023/CVE-2023-28252.md @@ -47,6 +47,7 @@ Windows Common Log File System Driver Elevation of Privilege Vulnerability - http://packetstormsecurity.com/files/174668/Windows-Common-Log-File-System-Driver-clfs.sys-Privilege-Escalation.html #### Github +- https://github.com/0xMarcio/cve - https://github.com/726232111/CVE-2023-28252 - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/awesome-cve-repo diff --git a/2023/CVE-2023-28489.md b/2023/CVE-2023-28489.md index ba8ba40ef5..1a9844f5c6 100644 --- a/2023/CVE-2023-28489.md +++ b/2023/CVE-2023-28489.md @@ -6,8 +6,7 @@ ### Description -A vulnerability has been identified in CP-8031 MASTER MODULE (All versions < CPCI85 V05), CP-8050 MASTER MODULE (All versions < CPCI85 V05). Affected devices are vulnerable to command injection via the web server port 443/tcp, if the parameter “Remote Operation” is enabled. The parameter is disabled by default. -The vulnerability could allow an unauthenticated remote attacker to perform arbitrary code execution on the device. +A vulnerability has been identified in CP-8031 MASTER MODULE (All versions < CPCI85 V05), CP-8050 MASTER MODULE (All versions < CPCI85 V05). Affected devices are vulnerable to command injection via the web server port 443/tcp, if the parameter “Remote Operation” is enabled. The parameter is disabled by default. The vulnerability could allow an unauthenticated remote attacker to perform arbitrary code execution on the device. ### POC diff --git a/2023/CVE-2023-28708.md b/2023/CVE-2023-28708.md index 004187d183..59ba789973 100644 --- a/2023/CVE-2023-28708.md +++ b/2023/CVE-2023-28708.md @@ -19,4 +19,5 @@ No PoCs from references. - https://github.com/fernandoreb/dependency-check-springboot - https://github.com/scordero1234/java_sec_demo-main - https://github.com/trganda/dockerv +- https://github.com/versio-io/product-lifecycle-security-api diff --git a/2023/CVE-2023-29357.md b/2023/CVE-2023-29357.md index da37df7bc8..58850be7f4 100644 --- a/2023/CVE-2023-29357.md +++ b/2023/CVE-2023-29357.md @@ -13,6 +13,7 @@ Microsoft SharePoint Server Elevation of Privilege Vulnerability No PoCs from references. #### Github +- https://github.com/0xMarcio/cve - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top - https://github.com/Chocapikk/CVE-2023-29357 diff --git a/2023/CVE-2023-29360.md b/2023/CVE-2023-29360.md index c354d5e8c3..18681cf2e2 100644 --- a/2023/CVE-2023-29360.md +++ b/2023/CVE-2023-29360.md @@ -29,6 +29,9 @@ Microsoft Streaming Service Elevation of Privilege Vulnerability No PoCs from references. #### Github +- https://github.com/CVEDB/awesome-cve-repo +- https://github.com/CVEDB/top +- https://github.com/GhostTroops/TOP - https://github.com/Nero22k/cve-2023-29360 - https://github.com/Ostorlab/KEV - https://github.com/cvefeed/cvefeed.io diff --git a/2023/CVE-2023-29478.md b/2023/CVE-2023-29478.md index d72a0398f2..cd5cb6a294 100644 --- a/2023/CVE-2023-29478.md +++ b/2023/CVE-2023-29478.md @@ -14,5 +14,6 @@ BiblioCraft before 2.4.6 does not sanitize path-traversal characters in filename #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/Exopteron/BiblioRCE - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-2986.md b/2023/CVE-2023-2986.md index c7a7b78437..6b7747ac3c 100644 --- a/2023/CVE-2023-2986.md +++ b/2023/CVE-2023-2986.md @@ -17,6 +17,7 @@ The Abandoned Cart Lite for WooCommerce plugin for WordPress is vulnerable to au #### Github - https://github.com/Alucard0x1/CVE-2023-2986 +- https://github.com/Ayantaker/CVE-2023-2986 - https://github.com/abrahim7112/Vulnerability-checking-program-for-Android - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-30145.md b/2023/CVE-2023-30145.md index a08e779947..a99d841bab 100644 --- a/2023/CVE-2023-30145.md +++ b/2023/CVE-2023-30145.md @@ -16,4 +16,5 @@ Camaleon CMS v2.7.0 was discovered to contain a Server-Side Template Injection ( #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/paragbagul111/CVE-2023-30145 diff --git a/2023/CVE-2023-30146.md b/2023/CVE-2023-30146.md index 155fac892d..a20ce35de5 100644 --- a/2023/CVE-2023-30146.md +++ b/2023/CVE-2023-30146.md @@ -13,5 +13,6 @@ Assmann Digitus Plug&View IP Camera HT-IP211HDP, version 2.000.022 allows unauth - https://github.com/L1-0/CVE-2023-30146 #### Github +- https://github.com/L1-0/CVE-2023-30146 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-30256.md b/2023/CVE-2023-30256.md index d1348742a7..ffbbf96147 100644 --- a/2023/CVE-2023-30256.md +++ b/2023/CVE-2023-30256.md @@ -14,6 +14,7 @@ Cross Site Scripting vulnerability found in Webkil QloApps v.1.5.2 allows a remo - https://github.com/ahrixia/CVE-2023-30256 #### Github +- https://github.com/ahrixia/CVE-2023-30256 - https://github.com/ahrixia/ahrixia - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-30330.md b/2023/CVE-2023-30330.md index 66dc7a7c59..d4e6d6e2ec 100644 --- a/2023/CVE-2023-30330.md +++ b/2023/CVE-2023-30330.md @@ -14,4 +14,5 @@ SoftExpert (SE) Excellence Suite 2.x versions before 2.1.3 is vulnerable to Loca - https://www.exploit-db.com/exploits/51404 #### Github +- https://github.com/Filiplain/LFI-to-RCE-SE-Suite-2.0 diff --git a/2023/CVE-2023-30367.md b/2023/CVE-2023-30367.md index 13d1a73798..0aaf339635 100644 --- a/2023/CVE-2023-30367.md +++ b/2023/CVE-2023-30367.md @@ -14,6 +14,7 @@ Multi-Remote Next Generation Connection Manager (mRemoteNG) is free software tha - https://github.com/S1lkys/CVE-2023-30367-mRemoteNG-password-dumper #### Github +- https://github.com/S1lkys/CVE-2023-30367-mRemoteNG-password-dumper - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-3044.md b/2023/CVE-2023-3044.md index 94378b746c..0e3e85491b 100644 --- a/2023/CVE-2023-3044.md +++ b/2023/CVE-2023-3044.md @@ -13,4 +13,5 @@ An excessively large PDF page size (found in fuzz testing, unlikely in normal PD - https://github.com/baker221/poc-xpdf #### Github +- https://github.com/baker221/poc-xpdf diff --git a/2023/CVE-2023-30459.md b/2023/CVE-2023-30459.md index d1128b6d33..92d900810d 100644 --- a/2023/CVE-2023-30459.md +++ b/2023/CVE-2023-30459.md @@ -14,5 +14,6 @@ SmartPTT SCADA 1.1.0.0 allows remote code execution (when the attacker has admin - https://smartptt.com #### Github +- https://github.com/Toxich4/CVE-2023-30459 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-30757.md b/2023/CVE-2023-30757.md index 8581b25a16..c6b5e31153 100644 --- a/2023/CVE-2023-30757.md +++ b/2023/CVE-2023-30757.md @@ -11,9 +11,7 @@ ### Description -A vulnerability has been identified in Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions), Totally Integrated Automation Portal (TIA Portal) V19 (All versions). The know-how protection feature in affected products does not properly update the encryption of existing program blocks when a project file is updated. - -This could allow attackers with access to the project file to recover previous - yet unprotected - versions of the project without the knowledge of the know-how protection password. +A vulnerability has been identified in Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions), Totally Integrated Automation Portal (TIA Portal) V19 (All versions). The know-how protection feature in affected products does not properly update the encryption of existing program blocks when a project file is updated. This could allow attackers with access to the project file to recover previous - yet unprotected - versions of the project without the knowledge of the know-how protection password. ### POC diff --git a/2023/CVE-2023-31122.md b/2023/CVE-2023-31122.md index b7b140fe06..cf8cfa95c5 100644 --- a/2023/CVE-2023-31122.md +++ b/2023/CVE-2023-31122.md @@ -13,6 +13,7 @@ Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue a No PoCs from references. #### Github +- https://github.com/EzeTauil/Maquina-Upload - https://github.com/arsenalzp/apch-operator - https://github.com/klemakle/audit-pentest-BOX - https://github.com/xonoxitron/cpe2cve diff --git a/2023/CVE-2023-31445.md b/2023/CVE-2023-31445.md index eb1a7b8bea..0cb392e138 100644 --- a/2023/CVE-2023-31445.md +++ b/2023/CVE-2023-31445.md @@ -15,5 +15,6 @@ Cassia Access controller before 2.1.1.2203171453, was discovered to have a unpri - https://www.swiruhack.online/cves/202331445/md.html #### Github +- https://github.com/Dodge-MPTC/CVE-2023-31445-Unprivileged-Information-Disclosure - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-3149.md b/2023/CVE-2023-3149.md index f994785b27..7c5a1c48d9 100644 --- a/2023/CVE-2023-3149.md +++ b/2023/CVE-2023-3149.md @@ -11,6 +11,7 @@ A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0. It #### Reference - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-adminusermanage_userphp +- https://vuldb.com/?id.231018 #### Github No PoCs found on GitHub currently. diff --git a/2023/CVE-2023-31497.md b/2023/CVE-2023-31497.md index e7f91d66df..fb6f2df528 100644 --- a/2023/CVE-2023-31497.md +++ b/2023/CVE-2023-31497.md @@ -13,5 +13,6 @@ Incorrect access control in Quick Heal Technologies Limited Seqrite Endpoint Sec - https://github.com/0xInfection/EPScalate #### Github +- https://github.com/0xInfection/EPScalate - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-31594.md b/2023/CVE-2023-31594.md index e9b8dce109..ef8fb8f959 100644 --- a/2023/CVE-2023-31594.md +++ b/2023/CVE-2023-31594.md @@ -13,5 +13,6 @@ IC Realtime ICIP-P2012T 2.420 is vulnerable to Incorrect Access Control via an e - https://github.com/Yozarseef95/CVE-2023-31594 #### Github +- https://github.com/Yozarseef95/CVE-2023-31594 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-31595.md b/2023/CVE-2023-31595.md index 4147c9ada0..5edfc9584d 100644 --- a/2023/CVE-2023-31595.md +++ b/2023/CVE-2023-31595.md @@ -13,5 +13,6 @@ IC Realtime ICIP-P2012T 2.420 is vulnerable to Incorrect Access Control via unau - https://github.com/Yozarseef95/CVE-2023-31595 #### Github +- https://github.com/Yozarseef95/CVE-2023-31595 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-31664.md b/2023/CVE-2023-31664.md index d250056c07..dfc87c98c2 100644 --- a/2023/CVE-2023-31664.md +++ b/2023/CVE-2023-31664.md @@ -13,5 +13,6 @@ A reflected cross-site scripting (XSS) vulnerability in /authenticationendpoint/ - https://github.com/adilkhan7/CVE-2023-31664 #### Github +- https://github.com/adilkhan7/CVE-2023-31664 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-31705.md b/2023/CVE-2023-31705.md index c983e056c3..cf937c7fb8 100644 --- a/2023/CVE-2023-31705.md +++ b/2023/CVE-2023-31705.md @@ -13,5 +13,6 @@ A Reflected Cross-site scripting (XSS) vulnerability in Sourcecodester Task Remi - https://github.com/d34dun1c02n/CVE-2023-31705 #### Github +- https://github.com/d34dun1c02n/CVE-2023-31705 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-31726.md b/2023/CVE-2023-31726.md index b502a52d93..cf9bccb4a7 100644 --- a/2023/CVE-2023-31726.md +++ b/2023/CVE-2023-31726.md @@ -13,5 +13,6 @@ AList 3.15.1 is vulnerable to Incorrect Access Control, which can be exploited b - https://github.com/J6451/CVE-2023-31726 #### Github +- https://github.com/J6451/CVE-2023-31726 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-31851.md b/2023/CVE-2023-31851.md index 944497c8c3..279b49c21c 100644 --- a/2023/CVE-2023-31851.md +++ b/2023/CVE-2023-31851.md @@ -13,5 +13,6 @@ Cudy LT400 1.13.4 is has a cross-site scripting (XSS) vulnerability in /cgi-bin/ - https://github.com/CalfCrusher/CVE-2023-31851 #### Github +- https://github.com/CalfCrusher/CVE-2023-31851 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-31852.md b/2023/CVE-2023-31852.md index f96c4089ad..df64b18e92 100644 --- a/2023/CVE-2023-31852.md +++ b/2023/CVE-2023-31852.md @@ -13,5 +13,6 @@ Cudy LT400 1.13.4 is vulnerable to Cross Site Scripting (XSS) in cgi-bin/luci/ad - https://github.com/CalfCrusher/CVE-2023-31852 #### Github +- https://github.com/CalfCrusher/CVE-2023-31852 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-31853.md b/2023/CVE-2023-31853.md index e286baa814..112b24a0bc 100644 --- a/2023/CVE-2023-31853.md +++ b/2023/CVE-2023-31853.md @@ -13,5 +13,6 @@ Cudy LT400 1.13.4 is vulnerable Cross Site Scripting (XSS) in /cgi-bin/luci/admi - https://github.com/CalfCrusher/CVE-2023-31853 #### Github +- https://github.com/CalfCrusher/CVE-2023-31853 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-32522.md b/2023/CVE-2023-32522.md index a4dd9f55dd..0d981d3008 100644 --- a/2023/CVE-2023-32522.md +++ b/2023/CVE-2023-32522.md @@ -5,9 +5,7 @@ ### Description -A path traversal exists in a specific dll of Trend Micro Mobile Security (Enterprise) 9.8 SP5 which could allow an authenticated remote attacker to delete arbitrary files. - -Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. +A path traversal exists in a specific dll of Trend Micro Mobile Security (Enterprise) 9.8 SP5 which could allow an authenticated remote attacker to delete arbitrary files. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. ### POC diff --git a/2023/CVE-2023-32629.md b/2023/CVE-2023-32629.md index 91a4d35f32..dbb89ffd42 100644 --- a/2023/CVE-2023-32629.md +++ b/2023/CVE-2023-32629.md @@ -16,6 +16,7 @@ Local privilege escalation vulnerability in Ubuntu Kernels overlayfs ovl_copy_up - https://github.com/0xWhoami35/root-kernel - https://github.com/0xsyr0/OSCP - https://github.com/Ev3rPalestine/Analytics-HTB-Walkthrough +- https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/K5LK/CVE-2023-2640-32629 - https://github.com/Kiosec/Linux-Exploitation - https://github.com/Nkipohcs/CVE-2023-2640-CVE-2023-32629 diff --git a/2023/CVE-2023-32784.md b/2023/CVE-2023-32784.md index 96f3afa9d2..9be05613b1 100644 --- a/2023/CVE-2023-32784.md +++ b/2023/CVE-2023-32784.md @@ -53,6 +53,7 @@ In KeePass 2.x before 2.54, it is possible to recover the cleartext master passw - https://github.com/rvsvishnuv/rvsvishnuv.github.io - https://github.com/s3mPr1linux/KEEPASS_PASS_DUMP - https://github.com/und3sc0n0c1d0/BruteForce-to-KeePass +- https://github.com/vdohney/keepass-password-dumper - https://github.com/ynuwenhof/keedump - https://github.com/z-jxy/keepass_dump diff --git a/2023/CVE-2023-33105.md b/2023/CVE-2023-33105.md index 77e7e09787..0147ac7757 100644 --- a/2023/CVE-2023-33105.md +++ b/2023/CVE-2023-33105.md @@ -14,4 +14,5 @@ No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-33253.md b/2023/CVE-2023-33253.md index af13d7b9b9..b5c45bcf47 100644 --- a/2023/CVE-2023-33253.md +++ b/2023/CVE-2023-33253.md @@ -13,5 +13,6 @@ LabCollector 6.0 though 6.15 allows remote code execution. An authenticated remo - https://github.com/Toxich4/CVE-2023-33253 #### Github +- https://github.com/Toxich4/CVE-2023-33253 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-33408.md b/2023/CVE-2023-33408.md index e0bd4a44ec..93d64d7034 100644 --- a/2023/CVE-2023-33408.md +++ b/2023/CVE-2023-33408.md @@ -13,5 +13,6 @@ Minical 1.0.0 is vulnerable to Cross Site Scripting (XSS). The vulnerability exi - https://github.com/Thirukrishnan/CVE-2023-33408 #### Github +- https://github.com/Thirukrishnan/CVE-2023-33408 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-33409.md b/2023/CVE-2023-33409.md index 6302d841ef..a836550d73 100644 --- a/2023/CVE-2023-33409.md +++ b/2023/CVE-2023-33409.md @@ -13,5 +13,6 @@ Minical 1.0.0 is vulnerable to Cross Site Request Forgery (CSRF) via minical/pub - https://github.com/Thirukrishnan/CVE-2023-33409 #### Github +- https://github.com/Thirukrishnan/CVE-2023-33409 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-33410.md b/2023/CVE-2023-33410.md index b3cf9b1d4f..7adb3ff627 100644 --- a/2023/CVE-2023-33410.md +++ b/2023/CVE-2023-33410.md @@ -13,5 +13,6 @@ Minical 1.0.0 and earlier contains a CSV injection vulnerability which allows an - https://github.com/Thirukrishnan/CVE-2023-33410 #### Github +- https://github.com/Thirukrishnan/CVE-2023-33410 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-33693.md b/2023/CVE-2023-33693.md index c3c6d93b9d..7a6b0d9a91 100644 --- a/2023/CVE-2023-33693.md +++ b/2023/CVE-2023-33693.md @@ -13,5 +13,5 @@ A buffer overflow in EasyPlayerPro-Win v3.2.19.0106 to v3.6.19.0823 allows attac - https://github.com/tsingsee/EasyPlayerPro-Win/pull/24 #### Github -No PoCs found on GitHub currently. +- https://github.com/ernestang98/win-exploits diff --git a/2023/CVE-2023-33733.md b/2023/CVE-2023-33733.md index fc3234780a..0121e50e45 100644 --- a/2023/CVE-2023-33733.md +++ b/2023/CVE-2023-33733.md @@ -15,6 +15,7 @@ Reportlab up to v3.6.12 allows attackers to execute arbitrary code via supplying #### Github - https://github.com/L41KAA/CVE-2023-33733-Exploit-PoC - https://github.com/buiduchoang24/CVE-2023-33733 +- https://github.com/c53elyas/CVE-2023-33733 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/onion2203/CVE-2023-33733 - https://github.com/onion2203/Lab_Reportlab diff --git a/2023/CVE-2023-33747.md b/2023/CVE-2023-33747.md index 18bd1cf2ba..90503256cb 100644 --- a/2023/CVE-2023-33747.md +++ b/2023/CVE-2023-33747.md @@ -15,5 +15,6 @@ CloudPanel v2.2.2 allows attackers to execute a path traversal. #### Github - https://github.com/0xWhoami35/CloudPanel-CVE-2023-33747 +- https://github.com/EagleTube/CloudPanel - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-33757.md b/2023/CVE-2023-33757.md index 527b63f341..9c0ddaed71 100644 --- a/2023/CVE-2023-33757.md +++ b/2023/CVE-2023-33757.md @@ -13,4 +13,5 @@ A lack of SSL certificate validation in Splicecom iPCS (iOS App) v1.3.4, iPCS2 ( - https://github.com/twignet/splicecom #### Github +- https://github.com/twignet/splicecom diff --git a/2023/CVE-2023-33758.md b/2023/CVE-2023-33758.md index 341bea458d..11bb7a2daa 100644 --- a/2023/CVE-2023-33758.md +++ b/2023/CVE-2023-33758.md @@ -13,4 +13,5 @@ Splicecom Maximiser Soft PBX v1.5 and before was discovered to contain a cross-s - https://github.com/twignet/splicecom #### Github +- https://github.com/twignet/splicecom diff --git a/2023/CVE-2023-33759.md b/2023/CVE-2023-33759.md index 676f795d1e..12ad356b06 100644 --- a/2023/CVE-2023-33759.md +++ b/2023/CVE-2023-33759.md @@ -13,4 +13,5 @@ SpliceCom Maximiser Soft PBX v1.5 and before does not restrict excessive authent - https://github.com/twignet/splicecom #### Github +- https://github.com/twignet/splicecom diff --git a/2023/CVE-2023-33760.md b/2023/CVE-2023-33760.md index 89a31065b2..e39cffbf2d 100644 --- a/2023/CVE-2023-33760.md +++ b/2023/CVE-2023-33760.md @@ -13,4 +13,5 @@ SpliceCom Maximiser Soft PBX v1.5 and before was discovered to utilize a default - https://github.com/twignet/splicecom #### Github +- https://github.com/twignet/splicecom diff --git a/2023/CVE-2023-33781.md b/2023/CVE-2023-33781.md index 3a91a1578e..ee4a39d97e 100644 --- a/2023/CVE-2023-33781.md +++ b/2023/CVE-2023-33781.md @@ -14,4 +14,5 @@ An issue in D-Link DIR-842V2 v1.0.3 allows attackers to execute arbitrary comman #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/s0tr/CVE-2023-33781 diff --git a/2023/CVE-2023-33782.md b/2023/CVE-2023-33782.md index ef06d11bd6..c668aaf994 100644 --- a/2023/CVE-2023-33782.md +++ b/2023/CVE-2023-33782.md @@ -14,4 +14,5 @@ D-Link DIR-842V2 v1.0.3 was discovered to contain a command injection vulnerabil #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/s0tr/CVE-2023-33782 diff --git a/2023/CVE-2023-33817.md b/2023/CVE-2023-33817.md index bca2b26e75..bef9a8b831 100644 --- a/2023/CVE-2023-33817.md +++ b/2023/CVE-2023-33817.md @@ -14,5 +14,6 @@ hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability. #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/leekenghwa/CVE-2023-33817---SQL-Injection-found-in-HotelDruid-3.0.5 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-3396.md b/2023/CVE-2023-3396.md new file mode 100644 index 0000000000..d6da42f469 --- /dev/null +++ b/2023/CVE-2023-3396.md @@ -0,0 +1,17 @@ +### [CVE-2023-3396](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3396) +![](https://img.shields.io/static/v1?label=Product&message=Retro%20Cellphone%20Online%20Store&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in Campcodes Retro Cellphone Online Store 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/index.php. The manipulation of the argument username/password leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-232351. + +### POC + +#### Reference +- https://vuldb.com/?id.232351 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2023/CVE-2023-34096.md b/2023/CVE-2023-34096.md index 51e6ea98e8..079357a248 100644 --- a/2023/CVE-2023-34096.md +++ b/2023/CVE-2023-34096.md @@ -17,5 +17,6 @@ Thruk is a multibackend monitoring webinterface which currently supports Naemon, - https://www.exploit-db.com/exploits/51509 #### Github +- https://github.com/galoget/Thruk-CVE-2023-34096 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-34312.md b/2023/CVE-2023-34312.md index 018784964f..3d6bdfb0be 100644 --- a/2023/CVE-2023-34312.md +++ b/2023/CVE-2023-34312.md @@ -25,4 +25,5 @@ In Tencent QQ through 9.7.8.29039 and TIM through 3.4.7.22084, QQProtect.exe and - https://github.com/silentEAG/awesome-stars - https://github.com/u604b/Awsome-Stars - https://github.com/u604b/awesome-stars +- https://github.com/vi3t1/qq-tim-elevation diff --git a/2023/CVE-2023-34362.md b/2023/CVE-2023-34362.md index 1dd2444833..df6e6f505a 100644 --- a/2023/CVE-2023-34362.md +++ b/2023/CVE-2023-34362.md @@ -14,6 +14,7 @@ In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0. - http://packetstormsecurity.com/files/173110/MOVEit-SQL-Injection.html #### Github +- https://github.com/0xMarcio/cve - https://github.com/0xdead8ead-randori/cve_search_msf - https://github.com/ARPSyndicate/cvemon - https://github.com/BenjiTrapp/cisa-known-vuln-scraper diff --git a/2023/CVE-2023-34598.md b/2023/CVE-2023-34598.md index 43676ca78c..1e78a22460 100644 --- a/2023/CVE-2023-34598.md +++ b/2023/CVE-2023-34598.md @@ -20,6 +20,7 @@ Gibbon v25.0.0 is vulnerable to a Local File Inclusion (LFI) where it's possible - https://github.com/izj007/wechat - https://github.com/komodoooo/Some-things - https://github.com/komodoooo/some-things +- https://github.com/maddsec/CVE-2023-34598 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/whoami13apt/files2 diff --git a/2023/CVE-2023-34599.md b/2023/CVE-2023-34599.md index c1a0873ee7..5ef10d0336 100644 --- a/2023/CVE-2023-34599.md +++ b/2023/CVE-2023-34599.md @@ -15,5 +15,6 @@ Multiple Cross-Site Scripting (XSS) vulnerabilities have been identified in Gibb #### Github - https://github.com/Imahian/CVE-2023-34599 - https://github.com/hheeyywweellccoommee/CVE-2023-34599-xsddo +- https://github.com/maddsec/CVE-2023-34599 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-34758.md b/2023/CVE-2023-34758.md index 059d064334..84c5ce3bf0 100644 --- a/2023/CVE-2023-34758.md +++ b/2023/CVE-2023-34758.md @@ -15,4 +15,5 @@ Sliver from v1.5.x to v1.5.39 has an improper cryptographic implementation, whic #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/tangent65536/Slivjacker diff --git a/2023/CVE-2023-34924.md b/2023/CVE-2023-34924.md index 8fde7379cf..c9fe12b24b 100644 --- a/2023/CVE-2023-34924.md +++ b/2023/CVE-2023-34924.md @@ -13,6 +13,7 @@ H3C Magic B1STW B1STV100R012 was discovered to contain a stack overflow via the - https://github.com/ChrisL0tus/CVE-2023-34924 #### Github +- https://github.com/ChrisL0tus/CVE-2023-34924 - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-34939.md b/2023/CVE-2023-34939.md index 14a9958b29..98b20b17c5 100644 --- a/2023/CVE-2023-34939.md +++ b/2023/CVE-2023-34939.md @@ -15,4 +15,5 @@ Onlyoffice Community Server before v12.5.2 was discovered to contain a remote co #### Github - https://github.com/20142995/sectool +- https://github.com/firsov/onlyoffice diff --git a/2023/CVE-2023-3505.md b/2023/CVE-2023-3505.md new file mode 100644 index 0000000000..adcac7a8c5 --- /dev/null +++ b/2023/CVE-2023-3505.md @@ -0,0 +1,17 @@ +### [CVE-2023-3505](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3505) +![](https://img.shields.io/static/v1?label=Product&message=CRM&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross%20Site%20Scripting&color=brighgreen) + +### Description + +A vulnerability was found in Onest CRM 1.0. It has been classified as problematic. This affects an unknown part of the file /admin/project/update/2 of the component Project List Handler. The manipulation of the argument name with the input leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-232953 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +- https://vuldb.com/?id.232953 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2023/CVE-2023-3519.md b/2023/CVE-2023-3519.md index e876e0ae42..07b32b06ae 100644 --- a/2023/CVE-2023-3519.md +++ b/2023/CVE-2023-3519.md @@ -14,6 +14,7 @@ Unauthenticated remote code execution - http://packetstormsecurity.com/files/173997/Citrix-ADC-NetScaler-Remote-Code-Execution.html #### Github +- https://github.com/0xMarcio/cve - https://github.com/Aicks/Citrix-CVE-2023-3519 - https://github.com/BishopFox/CVE-2023-3519 - https://github.com/CVEDB/awesome-cve-repo diff --git a/2023/CVE-2023-35885.md b/2023/CVE-2023-35885.md index a637e35c0a..7573e6ea8a 100644 --- a/2023/CVE-2023-35885.md +++ b/2023/CVE-2023-35885.md @@ -19,6 +19,7 @@ CloudPanel 2 before 2.3.1 has insecure file-manager cookie authentication. - https://github.com/Threekiii/Awesome-POC - https://github.com/Tropinene/Yscanner - https://github.com/d4n-sec/d4n-sec.github.io +- https://github.com/datackmy/FallingSkies-CVE-2023-35885 - https://github.com/getdrive/PoC - https://github.com/iluaster/getdrive_PoC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-36123.md b/2023/CVE-2023-36123.md index 663bcdc623..cd2189c92d 100644 --- a/2023/CVE-2023-36123.md +++ b/2023/CVE-2023-36123.md @@ -13,5 +13,6 @@ Directory Traversal vulnerability in Hex-Dragon Plain Craft Launcher 2 version A - https://github.com/9Bakabaka/CVE-2023-36123 #### Github +- https://github.com/9Bakabaka/CVE-2023-36123 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-36143.md b/2023/CVE-2023-36143.md index 61537604f0..4bd45c1bcb 100644 --- a/2023/CVE-2023-36143.md +++ b/2023/CVE-2023-36143.md @@ -14,5 +14,6 @@ Maxprint Maxlink 1200G v3.4.11E has an OS command injection vulnerability in the #### Github - https://github.com/RobinTrigon/CVE-2023-36143 +- https://github.com/leonardobg/CVE-2023-36143 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-36144.md b/2023/CVE-2023-36144.md index 8c6057e6e8..d63cdeccbf 100644 --- a/2023/CVE-2023-36144.md +++ b/2023/CVE-2023-36144.md @@ -13,5 +13,6 @@ An authentication bypass in Intelbras Switch SG 2404 MR in firmware 1.00.54 allo - https://github.com/leonardobg/CVE-2023-36144 #### Github +- https://github.com/leonardobg/CVE-2023-36144 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-36644.md b/2023/CVE-2023-36644.md index f9dd5ac9cd..d303084d85 100644 --- a/2023/CVE-2023-36644.md +++ b/2023/CVE-2023-36644.md @@ -13,5 +13,6 @@ Incorrect Access Control in ITB-GmbH TradePro v9.5, allows remote attackers to r - https://github.com/caffeinated-labs/CVE-2023-36644 #### Github +- https://github.com/caffeinated-labs/CVE-2023-36644 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-36745.md b/2023/CVE-2023-36745.md index d3be5f56a1..c3ed1e77b9 100644 --- a/2023/CVE-2023-36745.md +++ b/2023/CVE-2023-36745.md @@ -17,6 +17,7 @@ Microsoft Exchange Server Remote Code Execution Vulnerability No PoCs from references. #### Github +- https://github.com/0xMarcio/cve - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top - https://github.com/GhostTroops/TOP diff --git a/2023/CVE-2023-3684.md b/2023/CVE-2023-3684.md index a606da0eba..57098154db 100644 --- a/2023/CVE-2023-3684.md +++ b/2023/CVE-2023-3684.md @@ -10,7 +10,7 @@ A vulnerability was found in LivelyWorks Articart 2.0.1 and classified as proble ### POC #### Reference -No PoCs from references. +- https://vuldb.com/?id.234230 #### Github - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2023/CVE-2023-36884.md b/2023/CVE-2023-36884.md index 84fbb0b1d9..0d1f4684ad 100644 --- a/2023/CVE-2023-36884.md +++ b/2023/CVE-2023-36884.md @@ -49,6 +49,7 @@ Windows Search Remote Code Execution Vulnerability - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/ToddMaxey/CVE-2023-36884 +- https://github.com/aleff-github/aleff-github - https://github.com/aleff-github/my-flipper-shits - https://github.com/bkzk/cisco-email-filters - https://github.com/deepinstinct/Storm0978-RomCom-Campaign diff --git a/2023/CVE-2023-3753.md b/2023/CVE-2023-3753.md new file mode 100644 index 0000000000..75d5a4a985 --- /dev/null +++ b/2023/CVE-2023-3753.md @@ -0,0 +1,17 @@ +### [CVE-2023-3753](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3753) +![](https://img.shields.io/static/v1?label=Product&message=Mastery%20LMS&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross%20Site%20Scripting&color=brighgreen) + +### Description + +A vulnerability classified as problematic has been found in Creativeitem Mastery LMS 1.2. This affects an unknown part of the file /browse. The manipulation of the argument search/featured/recommended/skill leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-234423. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +- https://vuldb.com/?id.234423 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2023/CVE-2023-37598.md b/2023/CVE-2023-37598.md index 680fa77bf7..208944a948 100644 --- a/2023/CVE-2023-37598.md +++ b/2023/CVE-2023-37598.md @@ -15,4 +15,5 @@ A Cross Site Request Forgery (CSRF) vulnerability in issabel-pbx v.4.0.0-6 allow #### Github - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/sahiloj/CVE-2023-37598 diff --git a/2023/CVE-2023-3784.md b/2023/CVE-2023-3784.md index ac8b8ef453..8d086b594f 100644 --- a/2023/CVE-2023-3784.md +++ b/2023/CVE-2023-3784.md @@ -11,6 +11,7 @@ A vulnerability was found in Dooblou WiFi File Explorer 1.13.3. It has been decl #### Reference - https://seclists.org/fulldisclosure/2023/Jul/37 +- https://vuldb.com/?id.235051 - https://www.vulnerability-lab.com/get_content.php?id=2317 #### Github diff --git a/2023/CVE-2023-38286.md b/2023/CVE-2023-38286.md index f7a873801f..2cd9c5bbdc 100644 --- a/2023/CVE-2023-38286.md +++ b/2023/CVE-2023-38286.md @@ -15,5 +15,6 @@ Thymeleaf through 3.1.1.RELEASE, as used in spring-boot-admin (aka Spring Boot A #### Github - https://github.com/fractal-visi0n/security-assessement - https://github.com/izj007/wechat +- https://github.com/p1n93r/SpringBootAdmin-thymeleaf-SSTI - https://github.com/whoami13apt/files2 diff --git a/2023/CVE-2023-3833.md b/2023/CVE-2023-3833.md new file mode 100644 index 0000000000..b0a8c096f4 --- /dev/null +++ b/2023/CVE-2023-3833.md @@ -0,0 +1,17 @@ +### [CVE-2023-3833](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3833) +![](https://img.shields.io/static/v1?label=Product&message=Montage&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross%20Site%20Scripting&color=brighgreen) + +### Description + +A vulnerability was found in Bug Finder Montage 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /user/ticket/create of the component Ticket Handler. The manipulation of the argument message leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-235159. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +- https://vuldb.com/?id.235159 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2023/CVE-2023-38389.md b/2023/CVE-2023-38389.md new file mode 100644 index 0000000000..9fcc24030a --- /dev/null +++ b/2023/CVE-2023-38389.md @@ -0,0 +1,18 @@ +### [CVE-2023-38389](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38389) +![](https://img.shields.io/static/v1?label=Product&message=JupiterX%20Core&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-863%20Incorrect%20Authorization&color=brighgreen) + +### Description + +Incorrect Authorization vulnerability in Artbees JupiterX Core allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects JupiterX Core: from n/a through 3.3.8. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/codeb0ss/CVE-2023-38389-PoC +- https://github.com/securi3ytalent/wordpress-exploit + diff --git a/2023/CVE-2023-38545.md b/2023/CVE-2023-38545.md index 1316e890c3..47f1bb2131 100644 --- a/2023/CVE-2023-38545.md +++ b/2023/CVE-2023-38545.md @@ -25,6 +25,7 @@ No PoCs from references. - https://github.com/fatmo666/CVE-2023-38545-libcurl-SOCKS5-heap-buffer-overflow - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/imfht/CVE-2023-38545 +- https://github.com/industrial-edge/iih-essentials-development-kit - https://github.com/izj007/wechat - https://github.com/kherrick/lobsters - https://github.com/malinkamedok/devops_sandbox diff --git a/2023/CVE-2023-38546.md b/2023/CVE-2023-38546.md index 68a474dcde..c1b416d69c 100644 --- a/2023/CVE-2023-38546.md +++ b/2023/CVE-2023-38546.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/alex-grandson/docker-python-example - https://github.com/fokypoky/places-list +- https://github.com/industrial-edge/iih-essentials-development-kit - https://github.com/malinkamedok/devops_sandbox - https://github.com/testing-felickz/docker-scout-demo diff --git a/2023/CVE-2023-38624.md b/2023/CVE-2023-38624.md index cf051a13d8..e73f9a2e40 100644 --- a/2023/CVE-2023-38624.md +++ b/2023/CVE-2023-38624.md @@ -5,11 +5,7 @@ ### Description -A post-authenticated server-side request forgery (SSRF) vulnerability in Trend Micro Apex Central 2019 (lower than build 6481) could allow an attacker to interact with internal or local services directly. - -Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. - -This is a similar, but not identical vulnerability as CVE-2023-38625 through CVE-2023-38627. +A post-authenticated server-side request forgery (SSRF) vulnerability in Trend Micro Apex Central 2019 (lower than build 6481) could allow an attacker to interact with internal or local services directly. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is a similar, but not identical vulnerability as CVE-2023-38625 through CVE-2023-38627. ### POC diff --git a/2023/CVE-2023-38829.md b/2023/CVE-2023-38829.md index 2f6cc818e2..49e4ab8b04 100644 --- a/2023/CVE-2023-38829.md +++ b/2023/CVE-2023-38829.md @@ -14,5 +14,6 @@ An issue in NETIS SYSTEMS WF2409E v.3.6.42541 allows a remote attacker to execut #### Github - https://github.com/Luwak-IoT-Security/CVEs +- https://github.com/adhikara13/CVE-2023-38829-NETIS-WF2409E - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-38840.md b/2023/CVE-2023-38840.md index 5d65b96065..ab7405e306 100644 --- a/2023/CVE-2023-38840.md +++ b/2023/CVE-2023-38840.md @@ -15,5 +15,6 @@ Bitwarden Desktop 2023.7.0 and below allows an attacker with local access to obt - https://redmaple.tech/blogs/2023/extract-bitwarden-vault-passwords/ #### Github +- https://github.com/markuta/bw-dump - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-38890.md b/2023/CVE-2023-38890.md index 138ca6c7e1..5416ee78fd 100644 --- a/2023/CVE-2023-38890.md +++ b/2023/CVE-2023-38890.md @@ -13,5 +13,6 @@ Online Shopping Portal Project 3.1 allows remote attackers to execute arbitrary - https://github.com/akshadjoshi/CVE-2023-38890 #### Github +- https://github.com/akshadjoshi/CVE-2023-38890 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-38891.md b/2023/CVE-2023-38891.md index e26d05bfc6..7c5c1d7abb 100644 --- a/2023/CVE-2023-38891.md +++ b/2023/CVE-2023-38891.md @@ -13,5 +13,6 @@ SQL injection vulnerability in Vtiger CRM v.7.5.0 allows a remote authenticated - https://github.com/jselliott/CVE-2023-38891 #### Github +- https://github.com/jselliott/CVE-2023-38891 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-39063.md b/2023/CVE-2023-39063.md index f70caca44d..58c8a67729 100644 --- a/2023/CVE-2023-39063.md +++ b/2023/CVE-2023-39063.md @@ -13,5 +13,6 @@ Buffer Overflow vulnerability in RaidenFTPD 2.4.4005 allows a local attacker to - https://github.com/AndreGNogueira/CVE-2023-39063 #### Github +- https://github.com/AndreGNogueira/CVE-2023-39063 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-39115.md b/2023/CVE-2023-39115.md index cb3328589b..125ecebfd4 100644 --- a/2023/CVE-2023-39115.md +++ b/2023/CVE-2023-39115.md @@ -15,5 +15,6 @@ install/aiz-uploader/upload in Campcodes Online Matrimonial Website System Scrip - https://www.exploit-db.com/exploits/51656 #### Github +- https://github.com/Raj789-sec/CVE-2023-39115 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-39269.md b/2023/CVE-2023-39269.md index c8ec9a243d..3b3cbf8827 100644 --- a/2023/CVE-2023-39269.md +++ b/2023/CVE-2023-39269.md @@ -154,8 +154,7 @@ ### Description -A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i800NC, RUGGEDCOM i801, RUGGEDCOM i801NC, RUGGEDCOM i802, RUGGEDCOM i802NC, RUGGEDCOM i803, RUGGEDCOM i803NC, RUGGEDCOM M2100, RUGGEDCOM M2100F, RUGGEDCOM M2100NC, RUGGEDCOM M2200, RUGGEDCOM M2200F, RUGGEDCOM M2200NC, RUGGEDCOM M969, RUGGEDCOM M969F, RUGGEDCOM M969NC, RUGGEDCOM RMC30, RUGGEDCOM RMC30NC, RUGGEDCOM RMC8388 V4.X, RUGGEDCOM RMC8388 V5.X, RUGGEDCOM RMC8388NC V4.X, RUGGEDCOM RMC8388NC V5.X, RUGGEDCOM RP110, RUGGEDCOM RP110NC, RUGGEDCOM RS1600, RUGGEDCOM RS1600F, RUGGEDCOM RS1600FNC, RUGGEDCOM RS1600NC, RUGGEDCOM RS1600T, RUGGEDCOM RS1600TNC, RUGGEDCOM RS400, RUGGEDCOM RS400F, RUGGEDCOM RS400NC, RUGGEDCOM RS401, RUGGEDCOM RS401NC, RUGGEDCOM RS416, RUGGEDCOM RS416F, RUGGEDCOM RS416NC, RUGGEDCOM RS416NCv2 V4.X, RUGGEDCOM RS416NCv2 V5.X, RUGGEDCOM RS416P, RUGGEDCOM RS416PF, RUGGEDCOM RS416PNC, RUGGEDCOM RS416PNCv2 V4.X, RUGGEDCOM RS416PNCv2 V5.X, RUGGEDCOM RS416Pv2 V4.X, RUGGEDCOM RS416Pv2 V5.X, RUGGEDCOM RS416v2 V4.X, RUGGEDCOM RS416v2 V5.X, RUGGEDCOM RS8000, RUGGEDCOM RS8000A, RUGGEDCOM RS8000ANC, RUGGEDCOM RS8000H, RUGGEDCOM RS8000HNC, RUGGEDCOM RS8000NC, RUGGEDCOM RS8000T, RUGGEDCOM RS8000TNC, RUGGEDCOM RS900, RUGGEDCOM RS900 (32M) V4.X, RUGGEDCOM RS900 (32M) V5.X, RUGGEDCOM RS900F, RUGGEDCOM RS900G, RUGGEDCOM RS900G (32M) V4.X, RUGGEDCOM RS900G (32M) V5.X, RUGGEDCOM RS900GF, RUGGEDCOM RS900GNC, RUGGEDCOM RS900GNC(32M) V4.X, RUGGEDCOM RS900GNC(32M) V5.X, RUGGEDCOM RS900GP, RUGGEDCOM RS900GPF, RUGGEDCOM RS900GPNC, RUGGEDCOM RS900L, RUGGEDCOM RS900LNC, RUGGEDCOM RS900M-GETS-C01, RUGGEDCOM RS900M-GETS-XX, RUGGEDCOM RS900M-STND-C01, RUGGEDCOM RS900M-STND-XX, RUGGEDCOM RS900MNC-GETS-C01, RUGGEDCOM RS900MNC-GETS-XX, RUGGEDCOM RS900MNC-STND-XX, RUGGEDCOM RS900MNC-STND-XX-C01, RUGGEDCOM RS900NC, RUGGEDCOM RS900NC(32M) V4.X, RUGGEDCOM RS900NC(32M) V5.X, RUGGEDCOM RS900W, RUGGEDCOM RS910, RUGGEDCOM RS910L, RUGGEDCOM RS910LNC, RUGGEDCOM RS910NC, RUGGEDCOM RS910W, RUGGEDCOM RS920L, RUGGEDCOM RS920LNC, RUGGEDCOM RS920W, RUGGEDCOM RS930L, RUGGEDCOM RS930LNC, RUGGEDCOM RS930W, RUGGEDCOM RS940G, RUGGEDCOM RS940GF, RUGGEDCOM RS940GNC, RUGGEDCOM RS969, RUGGEDCOM RS969NC, RUGGEDCOM RSG2100, RUGGEDCOM RSG2100 (32M) V4.X, RUGGEDCOM RSG2100 (32M) V5.X, RUGGEDCOM RSG2100F, RUGGEDCOM RSG2100NC, RUGGEDCOM RSG2100NC(32M) V4.X, RUGGEDCOM RSG2100NC(32M) V5.X, RUGGEDCOM RSG2100P, RUGGEDCOM RSG2100PF, RUGGEDCOM RSG2100PNC, RUGGEDCOM RSG2200, RUGGEDCOM RSG2200F, RUGGEDCOM RSG2200NC, RUGGEDCOM RSG2288 V4.X, RUGGEDCOM RSG2288 V5.X, RUGGEDCOM RSG2288NC V4.X, RUGGEDCOM RSG2288NC V5.X, RUGGEDCOM RSG2300 V4.X, RUGGEDCOM RSG2300 V5.X, RUGGEDCOM RSG2300F, RUGGEDCOM RSG2300NC V4.X, RUGGEDCOM RSG2300NC V5.X, RUGGEDCOM RSG2300P V4.X, RUGGEDCOM RSG2300P V5.X, RUGGEDCOM RSG2300PF, RUGGEDCOM RSG2300PNC V4.X, RUGGEDCOM RSG2300PNC V5.X, RUGGEDCOM RSG2488 V4.X, RUGGEDCOM RSG2488 V5.X, RUGGEDCOM RSG2488F, RUGGEDCOM RSG2488NC V4.X, RUGGEDCOM RSG2488NC V5.X, RUGGEDCOM RSG907R, RUGGEDCOM RSG908C, RUGGEDCOM RSG909R, RUGGEDCOM RSG910C, RUGGEDCOM RSG920P V4.X, RUGGEDCOM RSG920P V5.X, RUGGEDCOM RSG920PNC V4.X, RUGGEDCOM RSG920PNC V5.X, RUGGEDCOM RSL910, RUGGEDCOM RSL910NC, RUGGEDCOM RST2228, RUGGEDCOM RST2228P, RUGGEDCOM RST916C, RUGGEDCOM RST916P. The web server of the affected devices contains a vulnerability that may lead to a denial of service condition. -An attacker may cause total loss of availability of the web server, which might recover after the attack is over. +A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i800NC, RUGGEDCOM i801, RUGGEDCOM i801NC, RUGGEDCOM i802, RUGGEDCOM i802NC, RUGGEDCOM i803, RUGGEDCOM i803NC, RUGGEDCOM M2100, RUGGEDCOM M2100F, RUGGEDCOM M2100NC, RUGGEDCOM M2200, RUGGEDCOM M2200F, RUGGEDCOM M2200NC, RUGGEDCOM M969, RUGGEDCOM M969F, RUGGEDCOM M969NC, RUGGEDCOM RMC30, RUGGEDCOM RMC30NC, RUGGEDCOM RMC8388 V4.X, RUGGEDCOM RMC8388 V5.X, RUGGEDCOM RMC8388NC V4.X, RUGGEDCOM RMC8388NC V5.X, RUGGEDCOM RP110, RUGGEDCOM RP110NC, RUGGEDCOM RS1600, RUGGEDCOM RS1600F, RUGGEDCOM RS1600FNC, RUGGEDCOM RS1600NC, RUGGEDCOM RS1600T, RUGGEDCOM RS1600TNC, RUGGEDCOM RS400, RUGGEDCOM RS400F, RUGGEDCOM RS400NC, RUGGEDCOM RS401, RUGGEDCOM RS401NC, RUGGEDCOM RS416, RUGGEDCOM RS416F, RUGGEDCOM RS416NC, RUGGEDCOM RS416NCv2 V4.X, RUGGEDCOM RS416NCv2 V5.X, RUGGEDCOM RS416P, RUGGEDCOM RS416PF, RUGGEDCOM RS416PNC, RUGGEDCOM RS416PNCv2 V4.X, RUGGEDCOM RS416PNCv2 V5.X, RUGGEDCOM RS416Pv2 V4.X, RUGGEDCOM RS416Pv2 V5.X, RUGGEDCOM RS416v2 V4.X, RUGGEDCOM RS416v2 V5.X, RUGGEDCOM RS8000, RUGGEDCOM RS8000A, RUGGEDCOM RS8000ANC, RUGGEDCOM RS8000H, RUGGEDCOM RS8000HNC, RUGGEDCOM RS8000NC, RUGGEDCOM RS8000T, RUGGEDCOM RS8000TNC, RUGGEDCOM RS900, RUGGEDCOM RS900 (32M) V4.X, RUGGEDCOM RS900 (32M) V5.X, RUGGEDCOM RS900F, RUGGEDCOM RS900G, RUGGEDCOM RS900G (32M) V4.X, RUGGEDCOM RS900G (32M) V5.X, RUGGEDCOM RS900GF, RUGGEDCOM RS900GNC, RUGGEDCOM RS900GNC(32M) V4.X, RUGGEDCOM RS900GNC(32M) V5.X, RUGGEDCOM RS900GP, RUGGEDCOM RS900GPF, RUGGEDCOM RS900GPNC, RUGGEDCOM RS900L, RUGGEDCOM RS900LNC, RUGGEDCOM RS900M-GETS-C01, RUGGEDCOM RS900M-GETS-XX, RUGGEDCOM RS900M-STND-C01, RUGGEDCOM RS900M-STND-XX, RUGGEDCOM RS900MNC-GETS-C01, RUGGEDCOM RS900MNC-GETS-XX, RUGGEDCOM RS900MNC-STND-XX, RUGGEDCOM RS900MNC-STND-XX-C01, RUGGEDCOM RS900NC, RUGGEDCOM RS900NC(32M) V4.X, RUGGEDCOM RS900NC(32M) V5.X, RUGGEDCOM RS900W, RUGGEDCOM RS910, RUGGEDCOM RS910L, RUGGEDCOM RS910LNC, RUGGEDCOM RS910NC, RUGGEDCOM RS910W, RUGGEDCOM RS920L, RUGGEDCOM RS920LNC, RUGGEDCOM RS920W, RUGGEDCOM RS930L, RUGGEDCOM RS930LNC, RUGGEDCOM RS930W, RUGGEDCOM RS940G, RUGGEDCOM RS940GF, RUGGEDCOM RS940GNC, RUGGEDCOM RS969, RUGGEDCOM RS969NC, RUGGEDCOM RSG2100, RUGGEDCOM RSG2100 (32M) V4.X, RUGGEDCOM RSG2100 (32M) V5.X, RUGGEDCOM RSG2100F, RUGGEDCOM RSG2100NC, RUGGEDCOM RSG2100NC(32M) V4.X, RUGGEDCOM RSG2100NC(32M) V5.X, RUGGEDCOM RSG2100P, RUGGEDCOM RSG2100PF, RUGGEDCOM RSG2100PNC, RUGGEDCOM RSG2200, RUGGEDCOM RSG2200F, RUGGEDCOM RSG2200NC, RUGGEDCOM RSG2288 V4.X, RUGGEDCOM RSG2288 V5.X, RUGGEDCOM RSG2288NC V4.X, RUGGEDCOM RSG2288NC V5.X, RUGGEDCOM RSG2300 V4.X, RUGGEDCOM RSG2300 V5.X, RUGGEDCOM RSG2300F, RUGGEDCOM RSG2300NC V4.X, RUGGEDCOM RSG2300NC V5.X, RUGGEDCOM RSG2300P V4.X, RUGGEDCOM RSG2300P V5.X, RUGGEDCOM RSG2300PF, RUGGEDCOM RSG2300PNC V4.X, RUGGEDCOM RSG2300PNC V5.X, RUGGEDCOM RSG2488 V4.X, RUGGEDCOM RSG2488 V5.X, RUGGEDCOM RSG2488F, RUGGEDCOM RSG2488NC V4.X, RUGGEDCOM RSG2488NC V5.X, RUGGEDCOM RSG907R, RUGGEDCOM RSG908C, RUGGEDCOM RSG909R, RUGGEDCOM RSG910C, RUGGEDCOM RSG920P V4.X, RUGGEDCOM RSG920P V5.X, RUGGEDCOM RSG920PNC V4.X, RUGGEDCOM RSG920PNC V5.X, RUGGEDCOM RSL910, RUGGEDCOM RSL910NC, RUGGEDCOM RST2228, RUGGEDCOM RST2228P, RUGGEDCOM RST916C, RUGGEDCOM RST916P. The web server of the affected devices contains a vulnerability that may lead to a denial of service condition. An attacker may cause total loss of availability of the web server, which might recover after the attack is over. ### POC diff --git a/2023/CVE-2023-39341.md b/2023/CVE-2023-39341.md index e3b2dbe260..b4aff6c8b5 100644 --- a/2023/CVE-2023-39341.md +++ b/2023/CVE-2023-39341.md @@ -17,8 +17,7 @@ ### Description -"FFRI yarai", "FFRI yarai Home and Business Edition" and their OEM products handle exceptional conditions improperly, which may lead to denial-of-service (DoS) condition. -Affected products and versions are as follows: FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0, FFRI yarai Home and Business Edition version 1.4.0, InfoTrace Mark II Malware Protection (Mark II Zerona) versions 3.0.1 to 3.2.2, Zerona / Zerona PLUS versions 3.2.32 to 3.2.36, ActSecure χ versions 3.4.0 to 3.4.6 and 3.5.0, Dual Safe Powered by FFRI yarai version 1.4.1, EDR Plus Pack (Bundled FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0), and EDR Plus Pack Cloud (Bundled FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0). +"FFRI yarai", "FFRI yarai Home and Business Edition" and their OEM products handle exceptional conditions improperly, which may lead to denial-of-service (DoS) condition. Affected products and versions are as follows: FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0, FFRI yarai Home and Business Edition version 1.4.0, InfoTrace Mark II Malware Protection (Mark II Zerona) versions 3.0.1 to 3.2.2, Zerona / Zerona PLUS versions 3.2.32 to 3.2.36, ActSecure χ versions 3.4.0 to 3.4.6 and 3.5.0, Dual Safe Powered by FFRI yarai version 1.4.1, EDR Plus Pack (Bundled FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0), and EDR Plus Pack Cloud (Bundled FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0). ### POC diff --git a/2023/CVE-2023-39379.md b/2023/CVE-2023-39379.md index ab9beb66cf..1755b6c1fc 100644 --- a/2023/CVE-2023-39379.md +++ b/2023/CVE-2023-39379.md @@ -7,7 +7,7 @@ ### Description -Fujitsu Software Infrastructure Manager (ISM) stores sensitive information at the product's maintenance data (ismsnap) in cleartext form. As a result, the password for the proxy server that is configured in ISM may be retrieved. Affected products and versions are as follows: Fujitsu Software Infrastructure Manager Advanced Edition V2.8.0.060, Fujitsu Software Infrastructure Manager Advanced Edition for PRIMEFLEX V2.8.0.060, and Fujitsu Software Infrastructure Manager Essential Edition V2.8.0.060. +Fujitsu Software Infrastructure Manager (ISM) stores sensitive information at the product's maintenance data (ismsnap) in cleartext form. As a result, the password for the proxy server that is configured in ISM may be retrieved. Affected products and versions are as follows: Fujitsu Software Infrastructure Manager Advanced Edition V2.8.0.060, Fujitsu Software Infrastructure Manager Advanced Edition for PRIMEFLEX V2.8.0.060, and Fujitsu Software Infrastructure Manager Essential Edition V2.8.0.060. ### POC diff --git a/2023/CVE-2023-39848.md b/2023/CVE-2023-39848.md index de85d18187..98de84a1b5 100644 --- a/2023/CVE-2023-39848.md +++ b/2023/CVE-2023-39848.md @@ -14,6 +14,7 @@ No PoCs from references. #### Github - https://github.com/AS-Mend-RenovateEE/RenovateEEDVWA +- https://github.com/Abhitejabodapati/DVWA-SAST - https://github.com/Blake384/DVWA - https://github.com/BrunoiMesquita/DAMN-VULNERABLE-PHP-WEB-APPLICATION - https://github.com/Bulnick/SCode @@ -25,6 +26,7 @@ No PoCs from references. - https://github.com/HowAreYouChristian/crs - https://github.com/HycCodeQL/DVWA - https://github.com/Iamishfaq07/DVWA +- https://github.com/Jackbling/DVWA - https://github.com/Jun1u2/TestGR - https://github.com/Kir-Scheluh/SSDLC-lab4-test - https://github.com/LenninPeren/PruebaDVWA @@ -43,6 +45,8 @@ No PoCs from references. - https://github.com/Security-Test-Account/DVWA - https://github.com/ShrutikaNakhale/DVWA2 - https://github.com/Slon12jr/DVWA +- https://github.com/TINNI-Lal/DVWA +- https://github.com/Yahyazaizi/application-test-security - https://github.com/Zahidkhan1221/DWVA - https://github.com/andersongodoy/DVWA-CORRIGIDO - https://github.com/asmendio/RenovateEETest diff --git a/2023/CVE-2023-40297.md b/2023/CVE-2023-40297.md index dac55aeb63..49c9d0a825 100644 --- a/2023/CVE-2023-40297.md +++ b/2023/CVE-2023-40297.md @@ -14,4 +14,5 @@ Stakater Forecastle 1.0.139 and before allows %5C../ directory traversal in the #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/sahar042/CVE-2023-40297 diff --git a/2023/CVE-2023-40362.md b/2023/CVE-2023-40362.md index 3c81386982..013f493548 100644 --- a/2023/CVE-2023-40362.md +++ b/2023/CVE-2023-40362.md @@ -13,5 +13,6 @@ An issue was discovered in CentralSquare Click2Gov Building Permit before Octobe - https://github.com/ally-petitt/CVE-2023-40362 #### Github +- https://github.com/ally-petitt/CVE-2023-40362 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-4039.md b/2023/CVE-2023-4039.md index 7b65cf42f5..d7bae6e309 100644 --- a/2023/CVE-2023-4039.md +++ b/2023/CVE-2023-4039.md @@ -6,7 +6,7 @@ ### Description -**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables.The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself. +** DISPUTED ** **DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables.The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself. ### POC @@ -17,4 +17,5 @@ - https://github.com/GrigGM/05-virt-04-docker-hw - https://github.com/bollwarm/SecToolSet - https://github.com/fokypoky/places-list +- https://github.com/m-pasima/CI-CD-Security-image-scan diff --git a/2023/CVE-2023-40546.md b/2023/CVE-2023-40546.md index daebd90d15..aab7faa99f 100644 --- a/2023/CVE-2023-40546.md +++ b/2023/CVE-2023-40546.md @@ -26,4 +26,5 @@ No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/seal-community/patches diff --git a/2023/CVE-2023-40547.md b/2023/CVE-2023-40547.md index 0c1593bf27..4f27dfdf80 100644 --- a/2023/CVE-2023-40547.md +++ b/2023/CVE-2023-40547.md @@ -26,4 +26,5 @@ No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/seal-community/patches diff --git a/2023/CVE-2023-40549.md b/2023/CVE-2023-40549.md index bd16178fef..f139556565 100644 --- a/2023/CVE-2023-40549.md +++ b/2023/CVE-2023-40549.md @@ -26,4 +26,5 @@ No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/seal-community/patches diff --git a/2023/CVE-2023-40550.md b/2023/CVE-2023-40550.md index 3f27ad431b..0f99794419 100644 --- a/2023/CVE-2023-40550.md +++ b/2023/CVE-2023-40550.md @@ -26,4 +26,5 @@ No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/seal-community/patches diff --git a/2023/CVE-2023-40551.md b/2023/CVE-2023-40551.md index c7b462e6d0..2b19198c17 100644 --- a/2023/CVE-2023-40551.md +++ b/2023/CVE-2023-40551.md @@ -26,4 +26,5 @@ No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/seal-community/patches diff --git a/2023/CVE-2023-40661.md b/2023/CVE-2023-40661.md index fd35bbe77d..1f6ce615b8 100644 --- a/2023/CVE-2023-40661.md +++ b/2023/CVE-2023-40661.md @@ -7,8 +7,7 @@ ### Description -Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow -compromise key generation, certificate loading, and other card management operations during enrollment. +Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment. ### POC diff --git a/2023/CVE-2023-40868.md b/2023/CVE-2023-40868.md index 0f47866d99..ea35379368 100644 --- a/2023/CVE-2023-40868.md +++ b/2023/CVE-2023-40868.md @@ -13,5 +13,6 @@ Cross Site Request Forgery vulnerability in mooSocial MooSocial Software v.Demo - https://github.com/MinoTauro2020/CVE-2023-40868 #### Github +- https://github.com/MinoTauro2020/CVE-2023-40868 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-40869.md b/2023/CVE-2023-40869.md index dd77eaa972..0d4ecabb3e 100644 --- a/2023/CVE-2023-40869.md +++ b/2023/CVE-2023-40869.md @@ -13,5 +13,6 @@ Cross Site Scripting vulnerability in mooSocial mooSocial Software 3.1.6 and 3.1 - https://github.com/MinoTauro2020/CVE-2023-40869 #### Github +- https://github.com/MinoTauro2020/CVE-2023-40869 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-41164.md b/2023/CVE-2023-41164.md index 1ca17327b4..82655e5469 100644 --- a/2023/CVE-2023-41164.md +++ b/2023/CVE-2023-41164.md @@ -14,4 +14,5 @@ No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/seal-community/patches diff --git a/2023/CVE-2023-41179.md b/2023/CVE-2023-41179.md index 33351efbda..825c8593c4 100644 --- a/2023/CVE-2023-41179.md +++ b/2023/CVE-2023-41179.md @@ -9,9 +9,7 @@ ### Description -A vulnerability in the 3rd party AV uninstaller module contained in Trend Micro Apex One (on-prem and SaaS), Worry-Free Business Security and Worry-Free Business Security Services could allow an attacker to manipulate the module to execute arbitrary commands on an affected installation. - -Note that an attacker must first obtain administrative console access on the target system in order to exploit this vulnerability. +A vulnerability in the 3rd party AV uninstaller module contained in Trend Micro Apex One (on-prem and SaaS), Worry-Free Business Security and Worry-Free Business Security Services could allow an attacker to manipulate the module to execute arbitrary commands on an affected installation. Note that an attacker must first obtain administrative console access on the target system in order to exploit this vulnerability. ### POC diff --git a/2023/CVE-2023-41707.md b/2023/CVE-2023-41707.md index bdc5afd9f6..3aeca01b81 100644 --- a/2023/CVE-2023-41707.md +++ b/2023/CVE-2023-41707.md @@ -5,8 +5,7 @@ ### Description -Processing of user-defined mail search expressions is not limited. Availability of OX App Suite could be reduced due to high processing load. Please deploy the provided updates and patch releases. Processing time of mail search expressions now gets monitored, and the related request is terminated if a resource threshold is reached. - No publicly available exploits are known. +Processing of user-defined mail search expressions is not limited. Availability of OX App Suite could be reduced due to high processing load. Please deploy the provided updates and patch releases. Processing time of mail search expressions now gets monitored, and the related request is terminated if a resource threshold is reached. No publicly available exploits are known. ### POC diff --git a/2023/CVE-2023-41717.md b/2023/CVE-2023-41717.md index a63c118551..3d97366cab 100644 --- a/2023/CVE-2023-41717.md +++ b/2023/CVE-2023-41717.md @@ -13,5 +13,6 @@ Inappropriate file type control in Zscaler Proxy versions 3.6.1.25 and prior all - https://github.com/federella/CVE-2023-41717 #### Github +- https://github.com/federella/CVE-2023-41717 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-42222.md b/2023/CVE-2023-42222.md index 580debde46..cc31250b9a 100644 --- a/2023/CVE-2023-42222.md +++ b/2023/CVE-2023-42222.md @@ -14,5 +14,6 @@ WebCatalog before 49.0 is vulnerable to Incorrect Access Control. WebCatalog cal - https://github.com/itssixtyn3in/CVE-2023-42222 #### Github +- https://github.com/itssixtyn3in/CVE-2023-42222 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-42283.md b/2023/CVE-2023-42283.md index 7a44dad463..8bb44062dc 100644 --- a/2023/CVE-2023-42283.md +++ b/2023/CVE-2023-42283.md @@ -13,5 +13,6 @@ Blind SQL injection in api_id parameter in Tyk Gateway version 5.0.3 allows atta - https://github.com/andreysanyuk/CVE-2023-42283 #### Github +- https://github.com/andreysanyuk/CVE-2023-42283 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-42284.md b/2023/CVE-2023-42284.md index 9a1c669dff..2f0f253655 100644 --- a/2023/CVE-2023-42284.md +++ b/2023/CVE-2023-42284.md @@ -13,5 +13,6 @@ Blind SQL injection in api_version parameter in Tyk Gateway version 5.0.3 allows - https://github.com/andreysanyuk/CVE-2023-42284 #### Github +- https://github.com/andreysanyuk/CVE-2023-42284 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-42362.md b/2023/CVE-2023-42362.md index 45b7793f1d..11eee24ca6 100644 --- a/2023/CVE-2023-42362.md +++ b/2023/CVE-2023-42362.md @@ -13,5 +13,6 @@ An arbitrary file upload vulnerability in Teller Web App v.4.4.0 allows a remote - https://github.com/Mr-n0b3dy/CVE-2023-42362 #### Github +- https://github.com/Mr-n0b3dy/CVE-2023-42362 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-42363.md b/2023/CVE-2023-42363.md index 2e5569722d..f83424ecf5 100644 --- a/2023/CVE-2023-42363.md +++ b/2023/CVE-2023-42363.md @@ -13,5 +13,6 @@ A use-after-free vulnerability was discovered in xasprintf function in xfuncs_pr No PoCs from references. #### Github +- https://github.com/bcgov/jag-cdds - https://github.com/cdupuis/aspnetapp diff --git a/2023/CVE-2023-42366.md b/2023/CVE-2023-42366.md index 8c8b1407f8..f4f780a7d9 100644 --- a/2023/CVE-2023-42366.md +++ b/2023/CVE-2023-42366.md @@ -13,5 +13,6 @@ A heap-buffer-overflow was discovered in BusyBox v.1.36.1 in the next_token func No PoCs from references. #### Github +- https://github.com/bcgov/jag-cdds - https://github.com/cdupuis/aspnetapp diff --git a/2023/CVE-2023-42469.md b/2023/CVE-2023-42469.md index b4e62a1266..ef46c08bdf 100644 --- a/2023/CVE-2023-42469.md +++ b/2023/CVE-2023-42469.md @@ -16,6 +16,7 @@ The com.full.dialer.top.secure.encrypted application through 1.0.1 for Android e - https://github.com/actuator/cve/blob/main/CVE-2023-42469 #### Github +- https://github.com/actuator/com.full.dialer.top.secure.encrypted - https://github.com/actuator/cve - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-43148.md b/2023/CVE-2023-43148.md index 12a0b3d169..e80212b526 100644 --- a/2023/CVE-2023-43148.md +++ b/2023/CVE-2023-43148.md @@ -14,5 +14,6 @@ SPA-Cart 1.9.0.3 has a Cross Site Request Forgery (CSRF) vulnerability that allo #### Github - https://github.com/MinoTauro2020/CVE-2023-43147 +- https://github.com/MinoTauro2020/CVE-2023-43148 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-43149.md b/2023/CVE-2023-43149.md index 541d28ea64..b3bd6851e4 100644 --- a/2023/CVE-2023-43149.md +++ b/2023/CVE-2023-43149.md @@ -13,6 +13,7 @@ SPA-Cart 1.9.0.3 is vulnerable to Cross Site Request Forgery (CSRF) that allows - https://github.com/MinoTauro2020/CVE-2023-43149 #### Github +- https://github.com/MinoTauro2020/CVE-2023-43149 - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-43261.md b/2023/CVE-2023-43261.md index ec81f648d5..6531bf31a9 100644 --- a/2023/CVE-2023-43261.md +++ b/2023/CVE-2023-43261.md @@ -20,4 +20,5 @@ An information disclosure in Milesight UR5X, UR32L, UR32, UR35, UR41 before v35. - https://github.com/johe123qwe/github-trending - https://github.com/komodoooo/Some-things - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/win3zz/CVE-2023-43261 diff --git a/2023/CVE-2023-43284.md b/2023/CVE-2023-43284.md index 546fecbefc..a2cf254f03 100644 --- a/2023/CVE-2023-43284.md +++ b/2023/CVE-2023-43284.md @@ -13,5 +13,6 @@ D-Link Wireless MU-MIMO Gigabit AC1200 Router DIR-846 100A53DBR-Retail devices a - https://github.com/MateusTesser/CVE-2023-43284 #### Github +- https://github.com/MateusTesser/CVE-2023-43284 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-43323.md b/2023/CVE-2023-43323.md index 0483c48a94..88068df89a 100644 --- a/2023/CVE-2023-43323.md +++ b/2023/CVE-2023-43323.md @@ -13,5 +13,6 @@ mooSocial 3.1.8 is vulnerable to external service interaction on post function. - https://github.com/ahrixia/CVE-2023-43323 #### Github +- https://github.com/ahrixia/CVE-2023-43323 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-43325.md b/2023/CVE-2023-43325.md index c6808775e8..a9001e267b 100644 --- a/2023/CVE-2023-43325.md +++ b/2023/CVE-2023-43325.md @@ -13,6 +13,7 @@ A reflected cross-site scripting (XSS) vulnerability in the data[redirect_url] p - https://github.com/ahrixia/CVE-2023-43325 #### Github +- https://github.com/ahrixia/CVE-2023-43325 - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-43326.md b/2023/CVE-2023-43326.md index 8da3e2baaf..5ac20afeed 100644 --- a/2023/CVE-2023-43326.md +++ b/2023/CVE-2023-43326.md @@ -13,5 +13,6 @@ A reflected cross-site scripting (XSS) vulnerability exisits in multiple url of - https://github.com/ahrixia/CVE-2023-43326 #### Github +- https://github.com/ahrixia/CVE-2023-43326 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-43340.md b/2023/CVE-2023-43340.md index 5ee60cee30..9527b9642b 100644 --- a/2023/CVE-2023-43340.md +++ b/2023/CVE-2023-43340.md @@ -15,4 +15,5 @@ Cross-site scripting (XSS) vulnerability in evolution v.3.2.3 allows a local att #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/sromanhu/-CVE-2023-43340-Evolution-Reflected-XSS---Installation-Admin-Options diff --git a/2023/CVE-2023-43341.md b/2023/CVE-2023-43341.md index b59e09d184..388ebe4ed5 100644 --- a/2023/CVE-2023-43341.md +++ b/2023/CVE-2023-43341.md @@ -15,4 +15,5 @@ Cross-site scripting (XSS) vulnerability in evolution evo v.3.2.3 allows a local #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/sromanhu/CVE-2023-43341-Evolution-Reflected-XSS---Installation-Connection- diff --git a/2023/CVE-2023-43342.md b/2023/CVE-2023-43342.md index e34d95cd76..33ab0495c8 100644 --- a/2023/CVE-2023-43342.md +++ b/2023/CVE-2023-43342.md @@ -15,4 +15,5 @@ Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/sromanhu/CVE-2023-43342-Quick-CMS-Stored-XSS---Languages-Frontend diff --git a/2023/CVE-2023-43343.md b/2023/CVE-2023-43343.md index 123d92b1c1..0bffc5c7d5 100644 --- a/2023/CVE-2023-43343.md +++ b/2023/CVE-2023-43343.md @@ -15,4 +15,5 @@ Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/sromanhu/CVE-2023-43343-Quick-CMS-Stored-XSS---Pages-Files diff --git a/2023/CVE-2023-43344.md b/2023/CVE-2023-43344.md index 4537a668b6..7b821dc45f 100644 --- a/2023/CVE-2023-43344.md +++ b/2023/CVE-2023-43344.md @@ -14,4 +14,5 @@ Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/sromanhu/CVE-2023-43344-Quick-CMS-Stored-XSS---SEO-Meta-description diff --git a/2023/CVE-2023-43345.md b/2023/CVE-2023-43345.md index 5c699a2e64..802e780ec7 100644 --- a/2023/CVE-2023-43345.md +++ b/2023/CVE-2023-43345.md @@ -14,4 +14,5 @@ Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/sromanhu/CVE-2023-43345-Quick-CMS-Stored-XSS---Pages-Content diff --git a/2023/CVE-2023-43346.md b/2023/CVE-2023-43346.md index 8e51707d02..b062a5635e 100644 --- a/2023/CVE-2023-43346.md +++ b/2023/CVE-2023-43346.md @@ -15,4 +15,5 @@ Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/sromanhu/CVE-2023-43346-Quick-CMS-Stored-XSS---Languages-Backend diff --git a/2023/CVE-2023-43352.md b/2023/CVE-2023-43352.md index 0944fe9458..1874f1a0d7 100644 --- a/2023/CVE-2023-43352.md +++ b/2023/CVE-2023-43352.md @@ -15,4 +15,5 @@ An issue in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/sromanhu/CVE-2023-43352-CMSmadesimple-SSTI--Content diff --git a/2023/CVE-2023-43353.md b/2023/CVE-2023-43353.md index cfbd5c423b..180639d27c 100644 --- a/2023/CVE-2023-43353.md +++ b/2023/CVE-2023-43353.md @@ -14,4 +14,5 @@ Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local atta #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/sromanhu/CVE-2023-43353-CMSmadesimple-Stored-XSS---News---Extra diff --git a/2023/CVE-2023-43354.md b/2023/CVE-2023-43354.md index 5097b024ad..6f56eb5ac8 100644 --- a/2023/CVE-2023-43354.md +++ b/2023/CVE-2023-43354.md @@ -14,4 +14,5 @@ Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local atta #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/sromanhu/CVE-2023-43354-CMSmadesimple-Stored-XSS---MicroTIny-extension diff --git a/2023/CVE-2023-43355.md b/2023/CVE-2023-43355.md index 58735851ed..81fcbe0995 100644 --- a/2023/CVE-2023-43355.md +++ b/2023/CVE-2023-43355.md @@ -15,4 +15,5 @@ Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local atta #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/sromanhu/CVE-2023-43355-CMSmadesimple-Reflected-XSS---Add-user diff --git a/2023/CVE-2023-43356.md b/2023/CVE-2023-43356.md index 85d60a8e64..9c93343d30 100644 --- a/2023/CVE-2023-43356.md +++ b/2023/CVE-2023-43356.md @@ -14,4 +14,5 @@ Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local atta #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/sromanhu/CVE-2023-43356-CMSmadesimple-Stored-XSS---Global-Settings diff --git a/2023/CVE-2023-43357.md b/2023/CVE-2023-43357.md index ceacb41299..ba3c68230c 100644 --- a/2023/CVE-2023-43357.md +++ b/2023/CVE-2023-43357.md @@ -14,4 +14,5 @@ Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local atta #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/sromanhu/CVE-2023-43357-CMSmadesimple-Stored-XSS---Shortcut diff --git a/2023/CVE-2023-43358.md b/2023/CVE-2023-43358.md index edab2e54a4..9762c4ac1b 100644 --- a/2023/CVE-2023-43358.md +++ b/2023/CVE-2023-43358.md @@ -15,4 +15,5 @@ Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local atta #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/sromanhu/CVE-2023-43358-CMSmadesimple-Stored-XSS---News diff --git a/2023/CVE-2023-43359.md b/2023/CVE-2023-43359.md index d0b4a30cef..7757315975 100644 --- a/2023/CVE-2023-43359.md +++ b/2023/CVE-2023-43359.md @@ -14,4 +14,5 @@ Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local atta #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/sromanhu/CVE-2023-43359-CMSmadesimple-Stored-XSS----Content-Manager diff --git a/2023/CVE-2023-43360.md b/2023/CVE-2023-43360.md index ca92d6f1e4..9a48708632 100644 --- a/2023/CVE-2023-43360.md +++ b/2023/CVE-2023-43360.md @@ -15,4 +15,5 @@ Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local atta #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/sromanhu/CVE-2023-43360-CMSmadesimple-Stored-XSS---File-Picker-extension diff --git a/2023/CVE-2023-43662.md b/2023/CVE-2023-43662.md new file mode 100644 index 0000000000..abd891c9a8 --- /dev/null +++ b/2023/CVE-2023-43662.md @@ -0,0 +1,17 @@ +### [CVE-2023-43662](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43662) +![](https://img.shields.io/static/v1?label=Product&message=ShokoServer&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%3D%204.2.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen) + +### Description + +ShokoServer is a media server which specializes in organizing anime. In affected versions the `/api/Image/WithPath` endpoint is accessible without authentication and is supposed to return default server images. The endpoint accepts the parameter `serverImagePath`, which is not sanitized in any way before being passed to `System.IO.File.OpenRead`, which results in an arbitrary file read. This issue may lead to an arbitrary file read which is exacerbated in the windows installer which installs the ShokoServer as administrator. Any unauthenticated attacker may be able to access sensitive information and read files stored on the server. The `/api/Image/WithPath` endpoint has been removed in commit `6c57ba0f0` which will be included in subsequent releases. Users should limit access to the `/api/Image/WithPath` endpoint or manually patch their installations until a patched release is made. This issue was discovered by the GitHub Security lab and is also indexed as GHSL-2023-191. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/wy876/POC + diff --git a/2023/CVE-2023-43955.md b/2023/CVE-2023-43955.md index cf84a8909d..7deb34abaa 100644 --- a/2023/CVE-2023-43955.md +++ b/2023/CVE-2023-43955.md @@ -15,6 +15,7 @@ The com.phlox.tvwebbrowser TV Bro application through 2.0.0 for Android mishandl - https://github.com/actuator/com.phlox.tvwebbrowser/blob/main/poc.apk #### Github +- https://github.com/actuator/com.phlox.tvwebbrowser - https://github.com/actuator/cve - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-44313.md b/2023/CVE-2023-44313.md new file mode 100644 index 0000000000..2cd5bd7a27 --- /dev/null +++ b/2023/CVE-2023-44313.md @@ -0,0 +1,17 @@ +### [CVE-2023-44313](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44313) +![](https://img.shields.io/static/v1?label=Product&message=Apache%20ServiceComb%20Service-Center&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%3D%202.1.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)&color=brighgreen) + +### Description + +Server-Side Request Forgery (SSRF) vulnerability in Apache ServiceComb Service-Center. Attackers can obtain sensitive server information through specially crafted requests.This issue affects Apache ServiceComb before 2.1.0(include).Users are recommended to upgrade to version 2.2.0, which fixes the issue. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/tanjiti/sec_profile + diff --git a/2023/CVE-2023-44487.md b/2023/CVE-2023-44487.md index 113a08f1dd..1e77ac6fd0 100644 --- a/2023/CVE-2023-44487.md +++ b/2023/CVE-2023-44487.md @@ -45,6 +45,7 @@ The HTTP/2 protocol allows a denial of service (server resource consumption) bec - https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event #### Github +- https://github.com/0xMarcio/cve - https://github.com/AlexRogalskiy/AlexRogalskiy - https://github.com/Austnez/tools - https://github.com/ByteHackr/CVE-2023-44487 @@ -84,6 +85,7 @@ The HTTP/2 protocol allows a denial of service (server resource consumption) bec - https://github.com/lucasrod16/exploitlens - https://github.com/m00dy/r4p1d-r3s3t - https://github.com/malinkamedok/devops_sandbox +- https://github.com/micrictor/http2-rst-stream - https://github.com/ndrscodes/http2-rst-stream-attacker - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/nvdg2/http2RapidReset diff --git a/2023/CVE-2023-4450.md b/2023/CVE-2023-4450.md index b6e5c4f93d..7e8873e553 100644 --- a/2023/CVE-2023-4450.md +++ b/2023/CVE-2023-4450.md @@ -14,6 +14,7 @@ No PoCs from references. #### Github - https://github.com/Threekiii/Awesome-POC +- https://github.com/bigblackhat/oFx - https://github.com/chennbnbnb/JDoop-release - https://github.com/hxysaury/saury-vulnhub - https://github.com/ilikeoyt/CVE-2023-4450-Attack diff --git a/2023/CVE-2023-4462.md b/2023/CVE-2023-4462.md index f02d25dd2b..48b561901c 100644 --- a/2023/CVE-2023-4462.md +++ b/2023/CVE-2023-4462.md @@ -49,4 +49,5 @@ A vulnerability classified as problematic has been found in Poly Trio 8300, Trio - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices #### Github +- https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices diff --git a/2023/CVE-2023-4464.md b/2023/CVE-2023-4464.md index b59d175efc..030291981c 100644 --- a/2023/CVE-2023-4464.md +++ b/2023/CVE-2023-4464.md @@ -49,4 +49,5 @@ A vulnerability, which was classified as critical, has been found in Poly Trio 8 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices #### Github +- https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices diff --git a/2023/CVE-2023-4465.md b/2023/CVE-2023-4465.md index 2c946d15c9..4b6f198f30 100644 --- a/2023/CVE-2023-4465.md +++ b/2023/CVE-2023-4465.md @@ -49,4 +49,5 @@ A vulnerability, which was classified as problematic, was found in Poly Trio 830 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices #### Github +- https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices diff --git a/2023/CVE-2023-4467.md b/2023/CVE-2023-4467.md index ff21efffca..a2c1d62b17 100644 --- a/2023/CVE-2023-4467.md +++ b/2023/CVE-2023-4467.md @@ -14,4 +14,5 @@ A vulnerability was found in Poly Trio 8800 7.2.6.0019 and classified as critica #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices diff --git a/2023/CVE-2023-44811.md b/2023/CVE-2023-44811.md index 2d0724665a..a4c67df12b 100644 --- a/2023/CVE-2023-44811.md +++ b/2023/CVE-2023-44811.md @@ -13,5 +13,6 @@ Cross Site Request Forgery (CSRF) vulnerability in MooSocial v.3.1.8 allows a re - https://github.com/ahrixia/CVE-2023-44811 #### Github +- https://github.com/ahrixia/CVE-2023-44811 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-44812.md b/2023/CVE-2023-44812.md index e72f2b1890..f18a86bbc6 100644 --- a/2023/CVE-2023-44812.md +++ b/2023/CVE-2023-44812.md @@ -13,5 +13,6 @@ Cross Site Scripting (XSS) vulnerability in mooSocial v.3.1.8 allows a remote at - https://github.com/ahrixia/CVE-2023-44812 #### Github +- https://github.com/ahrixia/CVE-2023-44812 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-44813.md b/2023/CVE-2023-44813.md index abac28d4dd..376d579459 100644 --- a/2023/CVE-2023-44813.md +++ b/2023/CVE-2023-44813.md @@ -13,5 +13,6 @@ Cross Site Scripting (XSS) vulnerability in mooSocial v.3.1.8 allows a remote at - https://github.com/ahrixia/CVE-2023-44813 #### Github +- https://github.com/ahrixia/CVE-2023-44813 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-44961.md b/2023/CVE-2023-44961.md index 669dcf2db7..253e4eb94c 100644 --- a/2023/CVE-2023-44961.md +++ b/2023/CVE-2023-44961.md @@ -13,5 +13,6 @@ SQL Injection vulnerability in Koha Library Software 23.0.5.04 and before allows - https://github.com/ggb0n/CVE-2023-44961 #### Github +- https://github.com/ggb0n/CVE-2023-44961 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-44962.md b/2023/CVE-2023-44962.md index 8ead16aba7..d6a9e740e2 100644 --- a/2023/CVE-2023-44962.md +++ b/2023/CVE-2023-44962.md @@ -13,5 +13,6 @@ File Upload vulnerability in Koha Library Software 23.05.04 and before allows a - https://github.com/ggb0n/CVE-2023-44962 #### Github +- https://github.com/ggb0n/CVE-2023-44962 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-45205.md b/2023/CVE-2023-45205.md index f7c688814a..afaddd5174 100644 --- a/2023/CVE-2023-45205.md +++ b/2023/CVE-2023-45205.md @@ -1,6 +1,6 @@ ### [CVE-2023-45205](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45205) ![](https://img.shields.io/static/v1?label=Product&message=SICAM%20PAS%2FPQS&color=blue) -![](https://img.shields.io/static/v1?label=Version&message=%3D%20All%20versions%20%3E%3D%20V8.00%20%3C%20V8.20%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=V8.00%3C%20V8.20%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource&color=brighgreen) ### Description diff --git a/2023/CVE-2023-45471.md b/2023/CVE-2023-45471.md index 394f629ad1..2572b162aa 100644 --- a/2023/CVE-2023-45471.md +++ b/2023/CVE-2023-45471.md @@ -13,6 +13,7 @@ The QAD Search Server is vulnerable to Stored Cross-Site Scripting (XSS) in vers - https://github.com/itsAptx/CVE-2023-45471 #### Github +- https://github.com/itsAptx/CVE-2023-45471 - https://github.com/mehdibelhajamor/CVE-2023-45471 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-45542.md b/2023/CVE-2023-45542.md index 506b14096e..91cd322700 100644 --- a/2023/CVE-2023-45542.md +++ b/2023/CVE-2023-45542.md @@ -13,5 +13,6 @@ Cross Site Scripting vulnerability in mooSocial 3.1.8 allows a remote attacker t - https://github.com/ahrixia/CVE-2023-45542 #### Github +- https://github.com/ahrixia/CVE-2023-45542 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-45674.md b/2023/CVE-2023-45674.md new file mode 100644 index 0000000000..3a87f9baae --- /dev/null +++ b/2023/CVE-2023-45674.md @@ -0,0 +1,17 @@ +### [CVE-2023-45674](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45674) +![](https://img.shields.io/static/v1?label=Product&message=Farmbot-Web-App&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%2015.8.4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brighgreen) + +### Description + +Farmbot-Web-App is a web control interface for the Farmbot farm automation platform. An SQL injection vulnerability was found in FarmBot's web app that allows authenticated attackers to extract arbitrary data from its database (including the user table). This issue may lead to Information Disclosure. This issue has been patched in version 15.8.4. Users are advised to upgrade. There are no known workarounds for this issue. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/OrenGitHub/dhscanner + diff --git a/2023/CVE-2023-45802.md b/2023/CVE-2023-45802.md index f177d8c4fd..ed4f7daa5d 100644 --- a/2023/CVE-2023-45802.md +++ b/2023/CVE-2023-45802.md @@ -13,6 +13,7 @@ When a HTTP/2 stream was reset (RST frame) by a client, there was a time window No PoCs from references. #### Github +- https://github.com/EzeTauil/Maquina-Upload - https://github.com/arsenalzp/apch-operator - https://github.com/karimhabush/cyberowl - https://github.com/xonoxitron/cpe2cve diff --git a/2023/CVE-2023-45992.md b/2023/CVE-2023-45992.md index 3de8bee383..4f4fc5c8f4 100644 --- a/2023/CVE-2023-45992.md +++ b/2023/CVE-2023-45992.md @@ -14,5 +14,6 @@ A vulnerability in the web-based interface of the RUCKUS Cloudpath product on ve #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/harry935/CVE-2023-45992 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-46014.md b/2023/CVE-2023-46014.md index 0d627f2a0d..e45f796fbc 100644 --- a/2023/CVE-2023-46014.md +++ b/2023/CVE-2023-46014.md @@ -13,6 +13,7 @@ SQL Injection vulnerability in hospitalLogin.php in Code-Projects Blood Bank 1.0 - https://github.com/ersinerenler/CVE-2023-46014-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability #### Github +- https://github.com/ersinerenler/CVE-2023-46014-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability - https://github.com/ersinerenler/Code-Projects-Blood-Bank-1.0 - https://github.com/esasadam06/Simple-CRUD-Functionality-SQLi-POC - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-46015.md b/2023/CVE-2023-46015.md index 149138c635..8d5f96830e 100644 --- a/2023/CVE-2023-46015.md +++ b/2023/CVE-2023-46015.md @@ -13,6 +13,7 @@ Cross Site Scripting (XSS) vulnerability in index.php in Code-Projects Blood Ban - https://github.com/ersinerenler/CVE-2023-46015-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability #### Github +- https://github.com/ersinerenler/CVE-2023-46015-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability - https://github.com/ersinerenler/Code-Projects-Blood-Bank-1.0 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-46016.md b/2023/CVE-2023-46016.md index f8a9d1c88a..9c6f03e0de 100644 --- a/2023/CVE-2023-46016.md +++ b/2023/CVE-2023-46016.md @@ -13,6 +13,7 @@ Cross Site Scripting (XSS) in abs.php in Code-Projects Blood Bank 1.0 allows att - https://github.com/ersinerenler/CVE-2023-46016-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability #### Github +- https://github.com/ersinerenler/CVE-2023-46016-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability - https://github.com/ersinerenler/Code-Projects-Blood-Bank-1.0 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-46017.md b/2023/CVE-2023-46017.md index 56a3dcc152..aba14ee280 100644 --- a/2023/CVE-2023-46017.md +++ b/2023/CVE-2023-46017.md @@ -13,6 +13,7 @@ SQL Injection vulnerability in receiverLogin.php in Code-Projects Blood Bank 1.0 - https://github.com/ersinerenler/CVE-2023-46017-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability #### Github +- https://github.com/ersinerenler/CVE-2023-46017-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability - https://github.com/ersinerenler/Code-Projects-Blood-Bank-1.0 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-46018.md b/2023/CVE-2023-46018.md index ba28a29d44..67428a7cc0 100644 --- a/2023/CVE-2023-46018.md +++ b/2023/CVE-2023-46018.md @@ -13,6 +13,7 @@ SQL injection vulnerability in receiverReg.php in Code-Projects Blood Bank 1.0 \ - https://github.com/ersinerenler/CVE-2023-46018-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability #### Github +- https://github.com/ersinerenler/CVE-2023-46018-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability - https://github.com/ersinerenler/Code-Projects-Blood-Bank-1.0 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-46019.md b/2023/CVE-2023-46019.md index 5434ef7792..d97d23c39d 100644 --- a/2023/CVE-2023-46019.md +++ b/2023/CVE-2023-46019.md @@ -13,6 +13,7 @@ Cross Site Scripting (XSS) vulnerability in abs.php in Code-Projects Blood Bank - https://github.com/ersinerenler/CVE-2023-46019-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability #### Github +- https://github.com/ersinerenler/CVE-2023-46019-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability - https://github.com/ersinerenler/Code-Projects-Blood-Bank-1.0 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-46020.md b/2023/CVE-2023-46020.md index eda46ed760..aaaeb03ac6 100644 --- a/2023/CVE-2023-46020.md +++ b/2023/CVE-2023-46020.md @@ -13,6 +13,7 @@ Cross Site Scripting (XSS) in updateprofile.php in Code-Projects Blood Bank 1.0 - https://github.com/ersinerenler/CVE-2023-46020-Code-Projects-Blood-Bank-1.0-Stored-Cross-Site-Scripting-Vulnerability #### Github +- https://github.com/ersinerenler/CVE-2023-46020-Code-Projects-Blood-Bank-1.0-Stored-Cross-Site-Scripting-Vulnerability - https://github.com/ersinerenler/Code-Projects-Blood-Bank-1.0 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-46021.md b/2023/CVE-2023-46021.md index 04a2df885b..b7a1286305 100644 --- a/2023/CVE-2023-46021.md +++ b/2023/CVE-2023-46021.md @@ -13,6 +13,7 @@ SQL Injection vulnerability in cancel.php in Code-Projects Blood Bank 1.0 allows - https://github.com/ersinerenler/CVE-2023-46021-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability #### Github +- https://github.com/ersinerenler/CVE-2023-46021-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability - https://github.com/ersinerenler/Code-Projects-Blood-Bank-1.0 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-46022.md b/2023/CVE-2023-46022.md index 231ed7e7ce..b855eb4224 100644 --- a/2023/CVE-2023-46022.md +++ b/2023/CVE-2023-46022.md @@ -13,6 +13,7 @@ SQL Injection vulnerability in delete.php in Code-Projects Blood Bank 1.0 allows - https://github.com/ersinerenler/CVE-2023-46022-Code-Projects-Blood-Bank-1.0-OOB-SQL-Injection-Vulnerability #### Github +- https://github.com/ersinerenler/CVE-2023-46022-Code-Projects-Blood-Bank-1.0-OOB-SQL-Injection-Vulnerability - https://github.com/ersinerenler/Code-Projects-Blood-Bank-1.0 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-46404.md b/2023/CVE-2023-46404.md index 9a5128beb0..d6988e03c1 100644 --- a/2023/CVE-2023-46404.md +++ b/2023/CVE-2023-46404.md @@ -14,4 +14,5 @@ PCRS <= 3.11 (d0de1e) “Questions” page and “Code editor” page are vulner #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/windecks/CVE-2023-46404 diff --git a/2023/CVE-2023-46451.md b/2023/CVE-2023-46451.md index 6a03e6105a..1df7d00013 100644 --- a/2023/CVE-2023-46451.md +++ b/2023/CVE-2023-46451.md @@ -15,4 +15,5 @@ Best Courier Management System v1.0 is vulnerable to Cross Site Scripting (XSS) #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/sajaljat/CVE-2023-46451 diff --git a/2023/CVE-2023-46480.md b/2023/CVE-2023-46480.md index 9bc11a4c78..9cfbd4b730 100644 --- a/2023/CVE-2023-46480.md +++ b/2023/CVE-2023-46480.md @@ -14,4 +14,5 @@ An issue in OwnCast v.0.1.1 allows a remote attacker to execute arbitrary code a #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/shahzaibak96/CVE-2023-46480 diff --git a/2023/CVE-2023-46694.md b/2023/CVE-2023-46694.md index 84432f9a51..7cbdc452de 100644 --- a/2023/CVE-2023-46694.md +++ b/2023/CVE-2023-46694.md @@ -13,4 +13,5 @@ Vtenext 21.02 allows an authenticated attacker to upload arbitrary files, potent - https://github.com/invisiblebyte/CVE-2023-46694 #### Github +- https://github.com/invisiblebyte/CVE-2023-46694 diff --git a/2023/CVE-2023-46747.md b/2023/CVE-2023-46747.md index 63e48a5b35..8ba473a12e 100644 --- a/2023/CVE-2023-46747.md +++ b/2023/CVE-2023-46747.md @@ -13,6 +13,7 @@ Undisclosed requests may bypass configuration utility authentication, allowing a - http://packetstormsecurity.com/files/175673/F5-BIG-IP-TMUI-AJP-Smuggling-Remote-Command-Execution.html #### Github +- https://github.com/0xMarcio/cve - https://github.com/AliBrTab/CVE-2023-46747-POC - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top diff --git a/2023/CVE-2023-46865.md b/2023/CVE-2023-46865.md index 08036db584..8bb60ab7b0 100644 --- a/2023/CVE-2023-46865.md +++ b/2023/CVE-2023-46865.md @@ -15,6 +15,7 @@ - https://notes.netbytesec.com/2023/11/post-auth-rce-in-crater-invoice.html #### Github +- https://github.com/asylumdx/Crater-CVE-2023-46865-RCE - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-48078.md b/2023/CVE-2023-48078.md index 0a3540a0aa..1b5888e613 100644 --- a/2023/CVE-2023-48078.md +++ b/2023/CVE-2023-48078.md @@ -13,4 +13,5 @@ SQL Injection vulnerability in add.php in Simple CRUD Functionality v1.0 allows - https://github.com/esasadam06/Simple-CRUD-Functionality-SQLi-POC #### Github +- https://github.com/esasadam06/Simple-CRUD-Functionality-SQLi-POC diff --git a/2023/CVE-2023-48104.md b/2023/CVE-2023-48104.md index 04e10224f6..83058ad40a 100644 --- a/2023/CVE-2023-48104.md +++ b/2023/CVE-2023-48104.md @@ -14,5 +14,6 @@ Alinto SOGo before 5.9.1 is vulnerable to HTML Injection. - https://habr.com/ru/articles/804863/ #### Github +- https://github.com/E1tex/CVE-2023-48104 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-48193.md b/2023/CVE-2023-48193.md index 44f018cfc6..e372e513ac 100644 --- a/2023/CVE-2023-48193.md +++ b/2023/CVE-2023-48193.md @@ -5,7 +5,7 @@ ### Description -Insecure Permissions vulnerability in JumpServer GPLv3 v.3.8.0 allows a remote attacker to execute arbitrary code via bypassing the command filtering function. +** DISPUTED ** Insecure Permissions vulnerability in JumpServer GPLv3 v.3.8.0 allows a remote attacker to execute arbitrary code via bypassing the command filtering function. NOTE: this is disputed because command filtering is not intended to restrict what code can be run by authorized users who are allowed to execute files. ### POC diff --git a/2023/CVE-2023-48849.md b/2023/CVE-2023-48849.md index 823cc14c9d..baa5142096 100644 --- a/2023/CVE-2023-48849.md +++ b/2023/CVE-2023-48849.md @@ -13,5 +13,6 @@ Ruijie EG Series Routers version EG_3.0(1)B11P216 and before allows unauthentica - https://github.com/delsploit/CVE-2023-48849 #### Github +- https://github.com/delsploit/CVE-2023-48849 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-48858.md b/2023/CVE-2023-48858.md index 943148ee4b..f1e844dc8c 100644 --- a/2023/CVE-2023-48858.md +++ b/2023/CVE-2023-48858.md @@ -13,5 +13,6 @@ A Cross-site scripting (XSS) vulnerability in login page php code in Armex ABO.C - https://github.com/Shumerez/CVE-2023-48858 #### Github +- https://github.com/Shumerez/CVE-2023-48858 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-49052.md b/2023/CVE-2023-49052.md index 98c51d2eae..a9d5ae82e4 100644 --- a/2023/CVE-2023-49052.md +++ b/2023/CVE-2023-49052.md @@ -14,5 +14,6 @@ File Upload vulnerability in Microweber v.2.0.4 allows a remote attacker to exec - https://github.com/Cyber-Wo0dy/report/blob/main/microweber/v2.0.4/microweber_unrestricted_upload #### Github +- https://github.com/Cyber-Wo0dy/CVE-2023-49052 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-49110.md b/2023/CVE-2023-49110.md new file mode 100644 index 0000000000..03b7b76946 --- /dev/null +++ b/2023/CVE-2023-49110.md @@ -0,0 +1,17 @@ +### [CVE-2023-49110](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49110) +![](https://img.shields.io/static/v1?label=Product&message=SAST&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference&color=brighgreen) + +### Description + +When the Kiuwan Local Analyzer uploads the scan results to the Kiuwan SAST web application (either on-premises or cloud/SaaS solution), the transmitted data consists of a ZIP archive containing several files, some of them in the XML file format. During Kiuwan's server-side processing of these XML files, it resolves external XML entities, resulting in a XML external entity injection attack. An attacker with privileges to scan source code within the "Code Security" module is able to extract any files of the operating system with the rights of the application server user and is potentially able to gain sensitive files, such as configuration and passwords. Furthermore, this vulnerability also allows an attacker to initiate connections to internal systems, e.g. for port scans or accessing other internal functions / applications such as the Wildfly admin console of Kiuwan.This issue affects Kiuwan SAST: = V3.2.3 < V3.3.0 only when manufactured between LQN231003... and LQN231215... ( with LQNYYMMDD...)), SENTRON 7KM PAC3120 DC (7KM3120-1BA01-1EA0) (All versions >= V3.2.3 < V3.3.0 only when manufactured between LQN231003... and LQN231215... ( with LQNYYMMDD...)), SENTRON 7KM PAC3220 AC/DC (7KM3220-0BA01-1DA0) (All versions >= V3.2.3 < V3.3.0 only when manufactured between LQN231003... and LQN231215... ( with LQNYYMMDD...)), SENTRON 7KM PAC3220 DC (7KM3220-1BA01-1EA0) (All versions >= V3.2.3 < V3.3.0 only when manufactured between LQN231003... and LQN231215... ( with LQNYYMMDD...)). The read out protection of the internal flash of affected devices was not properly set at the end of the manufacturing process. - -An attacker with physical access to the device could read out the data. +A vulnerability has been identified in SENTRON 7KM PAC3120 AC/DC (7KM3120-0BA01-1DA0) (All versions >= V3.2.3 < V3.3.0 only when manufactured between LQN231003... and LQN231215... ( with LQNYYMMDD...)), SENTRON 7KM PAC3120 DC (7KM3120-1BA01-1EA0) (All versions >= V3.2.3 < V3.3.0 only when manufactured between LQN231003... and LQN231215... ( with LQNYYMMDD...)), SENTRON 7KM PAC3220 AC/DC (7KM3220-0BA01-1DA0) (All versions >= V3.2.3 < V3.3.0 only when manufactured between LQN231003... and LQN231215... ( with LQNYYMMDD...)), SENTRON 7KM PAC3220 DC (7KM3220-1BA01-1EA0) (All versions >= V3.2.3 < V3.3.0 only when manufactured between LQN231003... and LQN231215... ( with LQNYYMMDD...)). The read out protection of the internal flash of affected devices was not properly set at the end of the manufacturing process. An attacker with physical access to the device could read out the data. ### POC diff --git a/2024/CVE-2024-21484.md b/2024/CVE-2024-21484.md index f02c68c393..3fa96105c4 100644 --- a/2024/CVE-2024-21484.md +++ b/2024/CVE-2024-21484.md @@ -9,11 +9,7 @@ ### Description -Versions of the package jsrsasign before 11.0.0 are vulnerable to Observable Discrepancy via the RSA PKCS1.5 or RSAOAEP decryption process. An attacker can decrypt ciphertexts by exploiting the Marvin security flaw. Exploiting this vulnerability requires the attacker to have access to a large number of ciphertexts encrypted with the same key. - - Workaround - -The vulnerability can be mitigated by finding and replacing RSA and RSAOAEP decryption with another crypto library. +Versions of the package jsrsasign before 11.0.0 are vulnerable to Observable Discrepancy via the RSA PKCS1.5 or RSAOAEP decryption process. An attacker can decrypt ciphertexts by exploiting the Marvin security flaw. Exploiting this vulnerability requires the attacker to have access to a large number of ciphertexts encrypted with the same key. Workaround The vulnerability can be mitigated by finding and replacing RSA and RSAOAEP decryption with another crypto library. ### POC diff --git a/2024/CVE-2024-21485.md b/2024/CVE-2024-21485.md index cd4ec60279..9b65faa5e8 100644 --- a/2024/CVE-2024-21485.md +++ b/2024/CVE-2024-21485.md @@ -9,11 +9,7 @@ ### Description -Versions of the package dash-core-components before 2.13.0; versions of the package dash-core-components before 2.0.0; versions of the package dash before 2.15.0; versions of the package dash-html-components before 2.0.0; versions of the package dash-html-components before 2.0.16 are vulnerable to Cross-site Scripting (XSS) when the href of the a tag is controlled by an adversary. An authenticated attacker who stores a view that exploits this vulnerability could steal the data that's visible to another user who opens that view - not just the data already included on the page, but they could also, in theory, make additional requests and access other data accessible to this user. In some cases, they could also steal the access tokens of that user, which would allow the attacker to act as that user, including viewing other apps and resources hosted on the same server. - -**Note:** - -This is only exploitable in Dash apps that include some mechanism to store user input to be reloaded by a different user. +Versions of the package dash-core-components before 2.13.0; versions of the package dash-core-components before 2.0.0; versions of the package dash before 2.15.0; versions of the package dash-html-components before 2.0.0; versions of the package dash-html-components before 2.0.16 are vulnerable to Cross-site Scripting (XSS) when the href of the a tag is controlled by an adversary. An authenticated attacker who stores a view that exploits this vulnerability could steal the data that's visible to another user who opens that view - not just the data already included on the page, but they could also, in theory, make additional requests and access other data accessible to this user. In some cases, they could also steal the access tokens of that user, which would allow the attacker to act as that user, including viewing other apps and resources hosted on the same server. **Note:** This is only exploitable in Dash apps that include some mechanism to store user input to be reloaded by a different user. ### POC diff --git a/2024/CVE-2024-21490.md b/2024/CVE-2024-21490.md index f1ca5adff5..317fd98159 100644 --- a/2024/CVE-2024-21490.md +++ b/2024/CVE-2024-21490.md @@ -7,12 +7,7 @@ ### Description -This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With large carefully-crafted input, this can result in catastrophic backtracking and cause a denial of service. - - -**Note:** - -This package is EOL and will not receive any updates to address this issue. Users should migrate to [@angular/core](https://www.npmjs.com/package/@angular/core). +This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With large carefully-crafted input, this can result in catastrophic backtracking and cause a denial of service. **Note:** This package is EOL and will not receive any updates to address this issue. Users should migrate to [@angular/core](https://www.npmjs.com/package/@angular/core). ### POC diff --git a/2024/CVE-2024-21491.md b/2024/CVE-2024-21491.md index c3b34a3c65..39a227ac25 100644 --- a/2024/CVE-2024-21491.md +++ b/2024/CVE-2024-21491.md @@ -5,11 +5,7 @@ ### Description -Versions of the package svix before 1.17.0 are vulnerable to Authentication Bypass due to an issue in the verify function where signatures of different lengths are incorrectly compared. An attacker can bypass signature verification by providing a shorter signature that matches the beginning of the actual signature. - -**Note:** - -The attacker would need to know a victim uses the Rust library for verification,no easy way to automatically check that; and uses webhooks by a service that uses Svix, and then figure out a way to craft a malicious payload that will actually include all of the correct identifiers needed to trick the receivers to cause actual issues. +Versions of the package svix before 1.17.0 are vulnerable to Authentication Bypass due to an issue in the verify function where signatures of different lengths are incorrectly compared. An attacker can bypass signature verification by providing a shorter signature that matches the beginning of the actual signature. **Note:** The attacker would need to know a victim uses the Rust library for verification,no easy way to automatically check that; and uses webhooks by a service that uses Svix, and then figure out a way to craft a malicious payload that will actually include all of the correct identifiers needed to trick the receivers to cause actual issues. ### POC diff --git a/2024/CVE-2024-21503.md b/2024/CVE-2024-21503.md index 92d42803c3..07e8c2c20b 100644 --- a/2024/CVE-2024-21503.md +++ b/2024/CVE-2024-21503.md @@ -5,9 +5,7 @@ ### Description -Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. - -Exploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings. +Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. Exploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings. ### POC diff --git a/2024/CVE-2024-21505.md b/2024/CVE-2024-21505.md index 3fc5117d1f..be237606d0 100644 --- a/2024/CVE-2024-21505.md +++ b/2024/CVE-2024-21505.md @@ -5,8 +5,7 @@ ### Description -Versions of the package web3-utils before 4.2.1 are vulnerable to Prototype Pollution via the utility functions format and mergeDeep, due to insecure recursive merge. -An attacker can manipulate an object's prototype, potentially leading to the alteration of the behavior of all objects inheriting from the affected prototype by passing specially crafted input to these functions. +Versions of the package web3-utils before 4.2.1 are vulnerable to Prototype Pollution via the utility functions format and mergeDeep, due to insecure recursive merge. An attacker can manipulate an object's prototype, potentially leading to the alteration of the behavior of all objects inheriting from the affected prototype by passing specially crafted input to these functions. ### POC diff --git a/2024/CVE-2024-21677.md b/2024/CVE-2024-21677.md index 33d2583ba9..88ae3466fa 100644 --- a/2024/CVE-2024-21677.md +++ b/2024/CVE-2024-21677.md @@ -14,6 +14,7 @@ No PoCs from references. #### Github - https://github.com/NaInSec/CVE-LIST +- https://github.com/enomothem/PenTestNote - https://github.com/netlas-io/netlas-dorks - https://github.com/tanjiti/sec_profile diff --git a/2024/CVE-2024-21683.md b/2024/CVE-2024-21683.md index d01ef1d9eb..f82503542e 100644 --- a/2024/CVE-2024-21683.md +++ b/2024/CVE-2024-21683.md @@ -5,7 +5,7 @@ ### Description -This High severity RCE (Remote Code Execution) vulnerability was introduced in version 5.2 of Confluence Data Center and Server.This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.3, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions. See the release notes https://confluence.atlassian.com/doc/confluence-release-notes-327.htmlYou can download the latest version of Confluence Data Center and Server from the download center https://www.atlassian.com/software/confluence/download-archives.This vulnerability was found internally. +This High severity RCE (Remote Code Execution) vulnerability was introduced in version 5.2 of Confluence Data Center and Server.This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.2, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions. See the release notes https://confluence.atlassian.com/doc/confluence-release-notes-327.htmlYou can download the latest version of Confluence Data Center and Server from the download center https://www.atlassian.com/software/confluence/download-archives.This vulnerability was found internally. ### POC @@ -21,6 +21,7 @@ No PoCs from references. - https://github.com/ZonghaoLi777/githubTrending - https://github.com/absholi7ly/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server - https://github.com/aneasystone/github-trending +- https://github.com/enomothem/PenTestNote - https://github.com/fireinrain/github-trending - https://github.com/jafshare/GithubTrending - https://github.com/johe123qwe/github-trending diff --git a/2024/CVE-2024-21733.md b/2024/CVE-2024-21733.md index 3780fd7adb..08ddba969e 100644 --- a/2024/CVE-2024-21733.md +++ b/2024/CVE-2024-21733.md @@ -17,6 +17,7 @@ Generation of Error Message Containing Sensitive Information vulnerability in Ap - https://github.com/Marco-zcl/POC - https://github.com/Ostorlab/KEV - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/versio-io/product-lifecycle-security-api - https://github.com/wjlin0/poc-doc - https://github.com/wy876/POC diff --git a/2024/CVE-2024-21751.md b/2024/CVE-2024-21751.md new file mode 100644 index 0000000000..a5c597c6a7 --- /dev/null +++ b/2024/CVE-2024-21751.md @@ -0,0 +1,17 @@ +### [CVE-2024-21751](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21751) +![](https://img.shields.io/static/v1?label=Product&message=RabbitLoader&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in RabbitLoader.This issue affects RabbitLoader: from n/a through 2.19.13. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-21798.md b/2024/CVE-2024-21798.md index e1c9c7e627..0aac23f476 100644 --- a/2024/CVE-2024-21798.md +++ b/2024/CVE-2024-21798.md @@ -1,4 +1,5 @@ ### [CVE-2024-21798](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21798) +![](https://img.shields.io/static/v1?label=Product&message=WMC-X1800GST-B&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=WRC-1167GS2-B&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=WRC-1167GS2H-B&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=WRC-2533GS2-B&color=blue) @@ -8,13 +9,14 @@ ![](https://img.shields.io/static/v1?label=Product&message=WRC-X3200GST3-B&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.24%20and%20earlier%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.25%20and%20earlier%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.41%20and%20earlier%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.62%20and%20earlier%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.67%20and%20earlier%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-site%20scripting%20(XSS)&color=brighgreen) ### Description -ELECOM wireless LAN routers contain a cross-site scripting vulnerability. Assume that a malicious administrative user configures the affected product with specially crafted content. When another administrative user logs in and operates the product, an arbitrary script may be executed on the web browser. Affected products and versions are as follows: WRC-1167GS2-B v1.67 and earlier, WRC-1167GS2H-B v1.67 and earlier, WRC-2533GS2-B v1.62 and earlier, WRC-2533GS2-W v1.62 and earlier, WRC-2533GS2V-B v1.62 and earlier, WRC-X3200GST3-B v1.25 and earlier, and WRC-G01-W v1.24 and earlier. +ELECOM wireless LAN routers contain a cross-site scripting vulnerability. Assume that a malicious administrative user configures the affected product with specially crafted content. When another administrative user logs in and operates the product, an arbitrary script may be executed on the web browser. Note that WMC-X1800GST-B is also included in e-Mesh Starter Kit "WMC-2LX-B". ### POC diff --git a/2024/CVE-2024-2193.md b/2024/CVE-2024-2193.md index 86dbe35439..852edd609a 100644 --- a/2024/CVE-2024-2193.md +++ b/2024/CVE-2024-2193.md @@ -16,6 +16,7 @@ A Speculative Race Condition (SRC) vulnerability that impacts modern CPU archite #### Github - https://github.com/NaInSec/CVE-LIST +- https://github.com/codexlynx/hardware-attacks-state-of-the-art - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/uthrasri/CVE-2024-2193 diff --git a/2024/CVE-2024-22002.md b/2024/CVE-2024-22002.md new file mode 100644 index 0000000000..b467f6fa7b --- /dev/null +++ b/2024/CVE-2024-22002.md @@ -0,0 +1,18 @@ +### [CVE-2024-22002](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22002) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +CORSAIR iCUE 5.9.105 with iCUE Murals on Windows allows unprivileged users to insert DLL files in the cuepkg-1.2.6 subdirectory of the installation directory. + +### POC + +#### Reference +- https://github.com/0xkickit/iCUE_DllHijack_LPE-CVE-2024-22002 + +#### Github +- https://github.com/0xkickit/iCUE_DllHijack_LPE-CVE-2024-22002 +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-22039.md b/2024/CVE-2024-22039.md index 04ffb7ef37..71771a0385 100644 --- a/2024/CVE-2024-22039.md +++ b/2024/CVE-2024-22039.md @@ -37,8 +37,7 @@ ### Description -A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions < IP8), Cerberus PRO EN Fire Panel FC72x IP6 (All versions < IP6 SR3), Cerberus PRO EN Fire Panel FC72x IP7 (All versions < IP7 SR5), Cerberus PRO EN X200 Cloud Distribution IP7 (All versions < V3.0.6602), Cerberus PRO EN X200 Cloud Distribution IP8 (All versions < V4.0.5016), Cerberus PRO EN X300 Cloud Distribution IP7 (All versions < V3.2.6601), Cerberus PRO EN X300 Cloud Distribution IP8 (All versions < V4.2.5015), Cerberus PRO UL Compact Panel FC922/924 (All versions < MP4), Cerberus PRO UL Engineering Tool (All versions < MP4), Cerberus PRO UL X300 Cloud Distribution (All versions < V4.3.0001), Desigo Fire Safety UL Compact Panel FC2025/2050 (All versions < MP4), Desigo Fire Safety UL Engineering Tool (All versions < MP4), Desigo Fire Safety UL X300 Cloud Distribution (All versions < V4.3.0001), Sinteso FS20 EN Engineering Tool (All versions < MP8), Sinteso FS20 EN Fire Panel FC20 MP6 (All versions < MP6 SR3), Sinteso FS20 EN Fire Panel FC20 MP7 (All versions < MP7 SR5), Sinteso FS20 EN X200 Cloud Distribution MP7 (All versions < V3.0.6602), Sinteso FS20 EN X200 Cloud Distribution MP8 (All versions < V4.0.5016), Sinteso FS20 EN X300 Cloud Distribution MP7 (All versions < V3.2.6601), Sinteso FS20 EN X300 Cloud Distribution MP8 (All versions < V4.2.5015), Sinteso Mobile (All versions < V3.0.0). The network communication library in affected systems does not validate the length of certain X.509 certificate attributes which might result in a stack-based buffer overflow. -This could allow an unauthenticated remote attacker to execute code on the underlying operating system with root privileges. +A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions < IP8), Cerberus PRO EN Fire Panel FC72x IP6 (All versions < IP6 SR3), Cerberus PRO EN Fire Panel FC72x IP7 (All versions < IP7 SR5), Cerberus PRO EN X200 Cloud Distribution IP7 (All versions < V3.0.6602), Cerberus PRO EN X200 Cloud Distribution IP8 (All versions < V4.0.5016), Cerberus PRO EN X300 Cloud Distribution IP7 (All versions < V3.2.6601), Cerberus PRO EN X300 Cloud Distribution IP8 (All versions < V4.2.5015), Cerberus PRO UL Compact Panel FC922/924 (All versions < MP4), Cerberus PRO UL Engineering Tool (All versions < MP4), Cerberus PRO UL X300 Cloud Distribution (All versions < V4.3.0001), Desigo Fire Safety UL Compact Panel FC2025/2050 (All versions < MP4), Desigo Fire Safety UL Engineering Tool (All versions < MP4), Desigo Fire Safety UL X300 Cloud Distribution (All versions < V4.3.0001), Sinteso FS20 EN Engineering Tool (All versions < MP8), Sinteso FS20 EN Fire Panel FC20 MP6 (All versions < MP6 SR3), Sinteso FS20 EN Fire Panel FC20 MP7 (All versions < MP7 SR5), Sinteso FS20 EN X200 Cloud Distribution MP7 (All versions < V3.0.6602), Sinteso FS20 EN X200 Cloud Distribution MP8 (All versions < V4.0.5016), Sinteso FS20 EN X300 Cloud Distribution MP7 (All versions < V3.2.6601), Sinteso FS20 EN X300 Cloud Distribution MP8 (All versions < V4.2.5015), Sinteso Mobile (All versions < V3.0.0). The network communication library in affected systems does not validate the length of certain X.509 certificate attributes which might result in a stack-based buffer overflow. This could allow an unauthenticated remote attacker to execute code on the underlying operating system with root privileges. ### POC diff --git a/2024/CVE-2024-22040.md b/2024/CVE-2024-22040.md index fd024cbedd..ac5f425f03 100644 --- a/2024/CVE-2024-22040.md +++ b/2024/CVE-2024-22040.md @@ -33,8 +33,7 @@ ### Description -A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions), Cerberus PRO EN Fire Panel FC72x IP6 (All versions), Cerberus PRO EN Fire Panel FC72x IP7 (All versions), Cerberus PRO EN Fire Panel FC72x IP8 (All versions < IP8 SR4), Cerberus PRO EN X200 Cloud Distribution IP7 (All versions), Cerberus PRO EN X200 Cloud Distribution IP8 (All versions < V4.3.5618), Cerberus PRO EN X300 Cloud Distribution IP7 (All versions), Cerberus PRO EN X300 Cloud Distribution IP8 (All versions < V4.3.5617), Cerberus PRO UL Compact Panel FC922/924 (All versions < MP4), Cerberus PRO UL Engineering Tool (All versions < MP4), Cerberus PRO UL X300 Cloud Distribution (All versions < V4.3.0001), Desigo Fire Safety UL Compact Panel FC2025/2050 (All versions < MP4), Desigo Fire Safety UL Engineering Tool (All versions < MP4), Desigo Fire Safety UL X300 Cloud Distribution (All versions < V4.3.0001), Sinteso FS20 EN Engineering Tool (All versions), Sinteso FS20 EN Fire Panel FC20 MP6 (All versions), Sinteso FS20 EN Fire Panel FC20 MP7 (All versions), Sinteso FS20 EN Fire Panel FC20 MP8 (All versions < MP8 SR4), Sinteso FS20 EN X200 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X200 Cloud Distribution MP8 (All versions < V4.3.5618), Sinteso FS20 EN X300 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X300 Cloud Distribution MP8 (All versions < V4.3.5617), Sinteso Mobile (All versions). The network communication library in affected systems insufficiently validates HMAC values which might result in a buffer overread. -This could allow an unauthenticated remote attacker to crash the network service. +A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions), Cerberus PRO EN Fire Panel FC72x IP6 (All versions), Cerberus PRO EN Fire Panel FC72x IP7 (All versions), Cerberus PRO EN Fire Panel FC72x IP8 (All versions < IP8 SR4), Cerberus PRO EN X200 Cloud Distribution IP7 (All versions), Cerberus PRO EN X200 Cloud Distribution IP8 (All versions < V4.3.5618), Cerberus PRO EN X300 Cloud Distribution IP7 (All versions), Cerberus PRO EN X300 Cloud Distribution IP8 (All versions < V4.3.5617), Cerberus PRO UL Compact Panel FC922/924 (All versions < MP4), Cerberus PRO UL Engineering Tool (All versions < MP4), Cerberus PRO UL X300 Cloud Distribution (All versions < V4.3.0001), Desigo Fire Safety UL Compact Panel FC2025/2050 (All versions < MP4), Desigo Fire Safety UL Engineering Tool (All versions < MP4), Desigo Fire Safety UL X300 Cloud Distribution (All versions < V4.3.0001), Sinteso FS20 EN Engineering Tool (All versions), Sinteso FS20 EN Fire Panel FC20 MP6 (All versions), Sinteso FS20 EN Fire Panel FC20 MP7 (All versions), Sinteso FS20 EN Fire Panel FC20 MP8 (All versions < MP8 SR4), Sinteso FS20 EN X200 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X200 Cloud Distribution MP8 (All versions < V4.3.5618), Sinteso FS20 EN X300 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X300 Cloud Distribution MP8 (All versions < V4.3.5617), Sinteso Mobile (All versions). The network communication library in affected systems insufficiently validates HMAC values which might result in a buffer overread. This could allow an unauthenticated remote attacker to crash the network service. ### POC diff --git a/2024/CVE-2024-22041.md b/2024/CVE-2024-22041.md index 7472f77962..8f25ddab2b 100644 --- a/2024/CVE-2024-22041.md +++ b/2024/CVE-2024-22041.md @@ -33,8 +33,7 @@ ### Description -A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions), Cerberus PRO EN Fire Panel FC72x IP6 (All versions), Cerberus PRO EN Fire Panel FC72x IP7 (All versions), Cerberus PRO EN Fire Panel FC72x IP8 (All versions < IP8 SR4), Cerberus PRO EN X200 Cloud Distribution IP7 (All versions), Cerberus PRO EN X200 Cloud Distribution IP8 (All versions < V4.3.5618), Cerberus PRO EN X300 Cloud Distribution IP7 (All versions), Cerberus PRO EN X300 Cloud Distribution IP8 (All versions < V4.3.5617), Cerberus PRO UL Compact Panel FC922/924 (All versions < MP4), Cerberus PRO UL Engineering Tool (All versions < MP4), Cerberus PRO UL X300 Cloud Distribution (All versions < V4.3.0001), Desigo Fire Safety UL Compact Panel FC2025/2050 (All versions < MP4), Desigo Fire Safety UL Engineering Tool (All versions < MP4), Desigo Fire Safety UL X300 Cloud Distribution (All versions < V4.3.0001), Sinteso FS20 EN Engineering Tool (All versions), Sinteso FS20 EN Fire Panel FC20 MP6 (All versions), Sinteso FS20 EN Fire Panel FC20 MP7 (All versions), Sinteso FS20 EN Fire Panel FC20 MP8 (All versions < MP8 SR4), Sinteso FS20 EN X200 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X200 Cloud Distribution MP8 (All versions < V4.3.5618), Sinteso FS20 EN X300 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X300 Cloud Distribution MP8 (All versions < V4.3.5617), Sinteso Mobile (All versions). The network communication library in affected systems improperly handles memory buffers when parsing X.509 certificates. -This could allow an unauthenticated remote attacker to crash the network service. +A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions), Cerberus PRO EN Fire Panel FC72x IP6 (All versions), Cerberus PRO EN Fire Panel FC72x IP7 (All versions), Cerberus PRO EN Fire Panel FC72x IP8 (All versions < IP8 SR4), Cerberus PRO EN X200 Cloud Distribution IP7 (All versions), Cerberus PRO EN X200 Cloud Distribution IP8 (All versions < V4.3.5618), Cerberus PRO EN X300 Cloud Distribution IP7 (All versions), Cerberus PRO EN X300 Cloud Distribution IP8 (All versions < V4.3.5617), Cerberus PRO UL Compact Panel FC922/924 (All versions < MP4), Cerberus PRO UL Engineering Tool (All versions < MP4), Cerberus PRO UL X300 Cloud Distribution (All versions < V4.3.0001), Desigo Fire Safety UL Compact Panel FC2025/2050 (All versions < MP4), Desigo Fire Safety UL Engineering Tool (All versions < MP4), Desigo Fire Safety UL X300 Cloud Distribution (All versions < V4.3.0001), Sinteso FS20 EN Engineering Tool (All versions), Sinteso FS20 EN Fire Panel FC20 MP6 (All versions), Sinteso FS20 EN Fire Panel FC20 MP7 (All versions), Sinteso FS20 EN Fire Panel FC20 MP8 (All versions < MP8 SR4), Sinteso FS20 EN X200 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X200 Cloud Distribution MP8 (All versions < V4.3.5618), Sinteso FS20 EN X300 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X300 Cloud Distribution MP8 (All versions < V4.3.5617), Sinteso Mobile (All versions). The network communication library in affected systems improperly handles memory buffers when parsing X.509 certificates. This could allow an unauthenticated remote attacker to crash the network service. ### POC diff --git a/2024/CVE-2024-22120.md b/2024/CVE-2024-22120.md index 81e7730cfe..8cfd0b32b6 100644 --- a/2024/CVE-2024-22120.md +++ b/2024/CVE-2024-22120.md @@ -19,6 +19,7 @@ Zabbix server can perform command execution for configured scripts. After comman - https://github.com/W01fh4cker/CVE-2024-22120-RCE - https://github.com/ZonghaoLi777/githubTrending - https://github.com/aneasystone/github-trending +- https://github.com/enomothem/PenTestNote - https://github.com/fireinrain/github-trending - https://github.com/johe123qwe/github-trending - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-2218.md b/2024/CVE-2024-2218.md new file mode 100644 index 0000000000..0004f8a116 --- /dev/null +++ b/2024/CVE-2024-2218.md @@ -0,0 +1,17 @@ +### [CVE-2024-2218](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2218) +![](https://img.shields.io/static/v1?label=Product&message=LuckyWP%20Table%20of%20Contents&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The LuckyWP Table of Contents WordPress plugin through 2.1.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) + +### POC + +#### Reference +- https://wpscan.com/vulnerability/ecd615f7-946e-45af-a610-0654a243b1dc/ + +#### Github +- https://github.com/DojoSecurity/DojoSecurity + diff --git a/2024/CVE-2024-22296.md b/2024/CVE-2024-22296.md new file mode 100644 index 0000000000..32667221eb --- /dev/null +++ b/2024/CVE-2024-22296.md @@ -0,0 +1,17 @@ +### [CVE-2024-22296](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22296) +![](https://img.shields.io/static/v1?label=Product&message=12%20Step%20Meeting%20List&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in Code for Recovery 12 Step Meeting List.This issue affects 12 Step Meeting List: from n/a through 3.14.28. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-22298.md b/2024/CVE-2024-22298.md new file mode 100644 index 0000000000..eee87fdab1 --- /dev/null +++ b/2024/CVE-2024-22298.md @@ -0,0 +1,17 @@ +### [CVE-2024-22298](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22298) +![](https://img.shields.io/static/v1?label=Product&message=Amelia&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in TMS Amelia ameliabooking.This issue affects Amelia: from n/a through 1.0.98. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-22514.md b/2024/CVE-2024-22514.md index 21b2960f35..2cc450567d 100644 --- a/2024/CVE-2024-22514.md +++ b/2024/CVE-2024-22514.md @@ -14,5 +14,6 @@ An issue discovered in iSpyConnect.com Agent DVR 5.1.6.0 allows attackers to run #### Github - https://github.com/Orange-418/AgentDVR-5.1.6.0-File-Upload-and-Remote-Code-Execution +- https://github.com/Orange-418/CVE-2024-22514-Remote-Code-Execution - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-22515.md b/2024/CVE-2024-22515.md index be03dc8cec..8f3912f6aa 100644 --- a/2024/CVE-2024-22515.md +++ b/2024/CVE-2024-22515.md @@ -14,5 +14,6 @@ Unrestricted File Upload vulnerability in iSpyConnect.com Agent DVR 5.1.6.0 allo #### Github - https://github.com/Orange-418/AgentDVR-5.1.6.0-File-Upload-and-Remote-Code-Execution +- https://github.com/Orange-418/CVE-2024-22515-File-Upload-Vulnerability - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-22532.md b/2024/CVE-2024-22532.md index edd08fb65e..b680f748c1 100644 --- a/2024/CVE-2024-22532.md +++ b/2024/CVE-2024-22532.md @@ -15,4 +15,5 @@ Buffer Overflow vulnerability in XNSoft NConvert 7.163 (for Windows x86) allows #### Github - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/pwndorei/CVE-2024-22532 diff --git a/2024/CVE-2024-2257.md b/2024/CVE-2024-2257.md new file mode 100644 index 0000000000..9dafdd26ac --- /dev/null +++ b/2024/CVE-2024-2257.md @@ -0,0 +1,17 @@ +### [CVE-2024-2257](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2257) +![](https://img.shields.io/static/v1?label=Product&message=Digisol%20Router%20DG-GR1321&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20v3.2.02%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20Improper%20Input%20Validation&color=brighgreen) + +### Description + +This vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version : v3.2.02) due to improper implementation of password policies. An attacker with physical access could exploit this by creating password that do not adhere to the defined security standards/policy on the vulnerable system.Successful exploitation of this vulnerability could allow the attacker to expose the router to potential security threats. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-22640.md b/2024/CVE-2024-22640.md index 71a910679c..1621d88b20 100644 --- a/2024/CVE-2024-22640.md +++ b/2024/CVE-2024-22640.md @@ -15,4 +15,5 @@ TCPDF version <=6.6.5 is vulnerable to ReDoS (Regular Expression Denial of Servi #### Github - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/zunak/CVE-2024-22640 diff --git a/2024/CVE-2024-22641.md b/2024/CVE-2024-22641.md index 3d33413d07..f28241a95a 100644 --- a/2024/CVE-2024-22641.md +++ b/2024/CVE-2024-22641.md @@ -14,4 +14,5 @@ TCPDF version 6.6.5 and before is vulnerable to ReDoS (Regular Expression Denial #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/zunak/CVE-2024-22641 diff --git a/2024/CVE-2024-22663.md b/2024/CVE-2024-22663.md index 9fd1e5b850..67bb5aa7dd 100644 --- a/2024/CVE-2024-22663.md +++ b/2024/CVE-2024-22663.md @@ -13,5 +13,5 @@ TOTOLINK_A3700R_V9.1.2u.6165_20211012has a command Injection vulnerability via s - https://github.com/Covteam/iot_vuln/tree/main/setOpModeCfg2 #### Github -No PoCs found on GitHub currently. +- https://github.com/Joe1sn/Joe1sn diff --git a/2024/CVE-2024-22752.md b/2024/CVE-2024-22752.md index c0ffdbe0f4..9834397058 100644 --- a/2024/CVE-2024-22752.md +++ b/2024/CVE-2024-22752.md @@ -13,5 +13,6 @@ Insecure permissions issue in EaseUS MobiMover 6.0.5 Build 21620 allows attacker - https://github.com/hacker625/CVE-2024-22752 #### Github +- https://github.com/hacker625/CVE-2024-22752 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-22795.md b/2024/CVE-2024-22795.md index 8ec44f9ee8..6c48f2aedd 100644 --- a/2024/CVE-2024-22795.md +++ b/2024/CVE-2024-22795.md @@ -13,4 +13,5 @@ Insecure Permissions vulnerability in Forescout SecureConnector v.11.3.06.0063 a - https://github.com/Hagrid29/ForeScout-SecureConnector-EoP #### Github +- https://github.com/Hagrid29/ForeScout-SecureConnector-EoP diff --git a/2024/CVE-2024-22855.md b/2024/CVE-2024-22855.md new file mode 100644 index 0000000000..502c3dda63 --- /dev/null +++ b/2024/CVE-2024-22855.md @@ -0,0 +1,17 @@ +### [CVE-2024-22855](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22855) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A cross-site scripting (XSS) vulnerability in the User Maintenance section of ITSS iMLog v1.307 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Last Name parameter. + +### POC + +#### Reference +- https://www.exploit-db.com/exploits/52025 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-22889.md b/2024/CVE-2024-22889.md index f294354628..31d6a41fa2 100644 --- a/2024/CVE-2024-22889.md +++ b/2024/CVE-2024-22889.md @@ -15,4 +15,5 @@ Due to incorrect access control in Plone version v6.0.9, remote attackers can vi #### Github - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/shenhav12/CVE-2024-22889-Plone-v6.0.9 diff --git a/2024/CVE-2024-22939.md b/2024/CVE-2024-22939.md index 6e0aec1dd9..ebef31f9af 100644 --- a/2024/CVE-2024-22939.md +++ b/2024/CVE-2024-22939.md @@ -14,5 +14,6 @@ Cross Site Request Forgery vulnerability in FlyCms v.1.0 allows a remote attacke - https://github.com/NUDTTAN91/CVE20240109/blob/master/README.md #### Github +- https://github.com/NUDTTAN91/CVE-2024-22939 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-23120.md b/2024/CVE-2024-23120.md index bf54d29ff1..1c9706cf5c 100644 --- a/2024/CVE-2024-23120.md +++ b/2024/CVE-2024-23120.md @@ -1,11 +1,11 @@ ### [CVE-2024-23120](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23120) -![](https://img.shields.io/static/v1?label=Product&message=AutoCAD%2C%20Advance%20Steel%20and%20Civil%203D&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Autodesk%20applications&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%202024%2C%202023%2C%202022%2C%202021%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-787%20Out-of-bounds%20Write&color=brighgreen) ### Description -A maliciously crafted STP file in ASMIMPORT228A.dll when parsed throughAutodesk AutoCAD can force an Out-of-Bound Write. A malicious actor canleverage this vulnerability to cause a crash, write sensitive data, or executearbitrary code in the context of the current process. +A maliciously crafted STP and STEP file when parsed in ASMIMPORT228A.dll and ASMIMPORT229A.dll and through Autodesk applications can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. ### POC diff --git a/2024/CVE-2024-23121.md b/2024/CVE-2024-23121.md index 90180675d3..41deb28ce0 100644 --- a/2024/CVE-2024-23121.md +++ b/2024/CVE-2024-23121.md @@ -1,11 +1,11 @@ ### [CVE-2024-23121](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23121) -![](https://img.shields.io/static/v1?label=Product&message=AutoCAD%2C%20Advance%20Steel%20and%20Civil%203D&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Autodesk%20applications&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%202024%2C%202023%2C%202022%2C%202021%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-787%20Out-of-bounds%20Write&color=brighgreen) ### Description -A maliciously crafted MODEL file in libodxdll.dll when parsed through Autodesk AutoCAD can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process. +A maliciously crafted MODEL file when parsed in libodxdll.dll through Autodesk applications can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. ### POC diff --git a/2024/CVE-2024-23134.md b/2024/CVE-2024-23134.md index f4847550d8..7e5dfc20ff 100644 --- a/2024/CVE-2024-23134.md +++ b/2024/CVE-2024-23134.md @@ -1,5 +1,5 @@ ### [CVE-2024-23134](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23134) -![](https://img.shields.io/static/v1?label=Product&message=AutoCAD%2C%20Advance%20Steel%20and%20Civil%203D&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Autodesk%20applications&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%202024%2C%202023%2C%202022%2C%202021%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-416%20Use%20After%20Free&color=brighgreen) diff --git a/2024/CVE-2024-23282.md b/2024/CVE-2024-23282.md new file mode 100644 index 0000000000..fd7295925c --- /dev/null +++ b/2024/CVE-2024-23282.md @@ -0,0 +1,21 @@ +### [CVE-2024-23282](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23282) +![](https://img.shields.io/static/v1?label=Product&message=iOS%20and%20iPadOS&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=macOS&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=watchOS&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2010.5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2014.5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2017.5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=A%20maliciously%20crafted%20email%20may%20be%20able%20to%20initiate%20FaceTime%20calls%20without%20user%20authorization&color=brighgreen) + +### Description + +The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.5, watchOS 10.5, iOS 17.5 and iPadOS 17.5, iOS 16.7.8 and iPadOS 16.7.8. A maliciously crafted email may be able to initiate FaceTime calls without user authorization. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/dlehgus1023/dlehgus1023 + diff --git a/2024/CVE-2024-23524.md b/2024/CVE-2024-23524.md new file mode 100644 index 0000000000..6c1ff8f702 --- /dev/null +++ b/2024/CVE-2024-23524.md @@ -0,0 +1,17 @@ +### [CVE-2024-23524](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23524) +![](https://img.shields.io/static/v1?label=Product&message=PilotPress&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in ONTRAPORT Inc. PilotPress.This issue affects PilotPress: from n/a through 2.0.30. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-23656.md b/2024/CVE-2024-23656.md index ae2510decf..021bf720f0 100644 --- a/2024/CVE-2024-23656.md +++ b/2024/CVE-2024-23656.md @@ -11,6 +11,7 @@ Dex is an identity service that uses OpenID Connect to drive authentication for ### POC #### Reference +- https://github.com/dexidp/dex/pull/2964 - https://github.com/dexidp/dex/security/advisories/GHSA-gr79-9v6v-gc9r #### Github diff --git a/2024/CVE-2024-2369.md b/2024/CVE-2024-2369.md index 98fb64afcb..8d1a29b02d 100644 --- a/2024/CVE-2024-2369.md +++ b/2024/CVE-2024-2369.md @@ -14,4 +14,5 @@ The Page Builder Gutenberg Blocks WordPress plugin before 3.1.7 does not validat #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/tanjiti/sec_profile diff --git a/2024/CVE-2024-23692.md b/2024/CVE-2024-23692.md index 92c1abff9a..2b16f998e8 100644 --- a/2024/CVE-2024-23692.md +++ b/2024/CVE-2024-23692.md @@ -14,5 +14,9 @@ - https://mohemiv.com/all/rejetto-http-file-server-2-3m-unauthenticated-rce/ #### Github -No PoCs found on GitHub currently. +- https://github.com/Threekiii/CVE +- https://github.com/enomothem/PenTestNote +- https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/tanjiti/sec_profile +- https://github.com/wy876/POC diff --git a/2024/CVE-2024-23745.md b/2024/CVE-2024-23745.md index 27782d61be..65419c0ce7 100644 --- a/2024/CVE-2024-23745.md +++ b/2024/CVE-2024-23745.md @@ -16,6 +16,7 @@ #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/louiselalanne/CVE-2024-23745 - https://github.com/louiselalanne/louiselalanne - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-23746.md b/2024/CVE-2024-23746.md index 8636a7f46d..d930edb928 100644 --- a/2024/CVE-2024-23746.md +++ b/2024/CVE-2024-23746.md @@ -14,6 +14,7 @@ Miro Desktop 0.8.18 on macOS allows local Electron code injection via a complex #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/louiselalanne/CVE-2024-23746 - https://github.com/louiselalanne/louiselalanne - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-23747.md b/2024/CVE-2024-23747.md index f8bd2f7195..e96a383fd9 100644 --- a/2024/CVE-2024-23747.md +++ b/2024/CVE-2024-23747.md @@ -13,6 +13,7 @@ The Moderna Sistemas ModernaNet Hospital Management System 2024 is susceptible t - https://github.com/louiselalanne/CVE-2024-23747 #### Github +- https://github.com/louiselalanne/CVE-2024-23747 - https://github.com/louiselalanne/louiselalanne - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-2389.md b/2024/CVE-2024-2389.md index 2ce9377b00..a005a5bed6 100644 --- a/2024/CVE-2024-2389.md +++ b/2024/CVE-2024-2389.md @@ -17,6 +17,7 @@ No PoCs from references. - https://github.com/RhinoSecurityLabs/CVEs - https://github.com/YN1337/exploit - https://github.com/adhikara13/CVE-2024-2389 +- https://github.com/enomothem/PenTestNote - https://github.com/getdrive/PoC - https://github.com/mayur-esh/vuln-liners - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-23910.md b/2024/CVE-2024-23910.md index 2f8674dd6b..cbc63c796f 100644 --- a/2024/CVE-2024-23910.md +++ b/2024/CVE-2024-23910.md @@ -1,4 +1,5 @@ ### [CVE-2024-23910](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23910) +![](https://img.shields.io/static/v1?label=Product&message=WMC-X1800GST-B&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=WRC-1167GS2-B&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=WRC-1167GS2H-B&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=WRC-2533GS2-B&color=blue) @@ -6,15 +7,17 @@ ![](https://img.shields.io/static/v1?label=Product&message=WRC-2533GS2V-B&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=WRC-G01-W&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=WRC-X3200GST3-B&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=WSC-X1800GS-B&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.24%20and%20earlier%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.25%20and%20earlier%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.41%20and%20earlier%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.62%20and%20earlier%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.67%20and%20earlier%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-site%20request%20forgery%20(CSRF)&color=brighgreen) ### Description -Cross-site request forgery (CSRF) vulnerability in ELECOM wireless LAN routers allows a remote unauthenticated attacker to hijack the authentication of administrators and to perform unintended operations to the affected product. Affected products and versions are as follows: WRC-1167GS2-B v1.67 and earlier, WRC-1167GS2H-B v1.67 and earlier, WRC-2533GS2-B v1.62 and earlier, WRC-2533GS2-W v1.62 and earlier, WRC-2533GS2V-B v1.62 and earlier, WRC-X3200GST3-B v1.25 and earlier, and WRC-G01-W v1.24 and earlier. +Cross-site request forgery (CSRF) vulnerability in ELECOM wireless LAN routers and wireless LAN repeater allows a remote unauthenticated attacker to hijack the authentication of administrators and to perform unintended operations to the affected product. Note that WMC-X1800GST-B and WSC-X1800GS-B are also included in e-Mesh Starter Kit "WMC-2LX-B". ### POC diff --git a/2024/CVE-2024-24051.md b/2024/CVE-2024-24051.md new file mode 100644 index 0000000000..8569dd0460 --- /dev/null +++ b/2024/CVE-2024-24051.md @@ -0,0 +1,17 @@ +### [CVE-2024-24051](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24051) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Improper input validation of printing files in Monoprice Select Mini V2 V37.115.32 allows attackers to instruct the device's movable parts to destinations that exceed the devices' maximum coordinates via the printing of a malicious .gcode file. + +### POC + +#### Reference +- https://github.com/tkruppert/Reported_Vulnerabilities/blob/main/CVE-2024-24051.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-24320.md b/2024/CVE-2024-24320.md new file mode 100644 index 0000000000..a64b515330 --- /dev/null +++ b/2024/CVE-2024-24320.md @@ -0,0 +1,17 @@ +### [CVE-2024-24320](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24320) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Directory Traversal vulnerability in Mgt-commerce CloudPanel v.2.0.0 thru v.2.4.0 allows a remote attacker to obtain sensitive information and execute arbitrary code via the service parameter of the load-logfiles function. + +### POC + +#### Reference +- https://datack.my/cloudpanel-v2-0-0-v2-4-0-authenticated-user-session-hijacking-cve-2024-24320/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-24590.md b/2024/CVE-2024-24590.md index 74f3412a88..2588ad8b90 100644 --- a/2024/CVE-2024-24590.md +++ b/2024/CVE-2024-24590.md @@ -14,4 +14,5 @@ No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-24919.md b/2024/CVE-2024-24919.md index c8476995be..c71029943d 100644 --- a/2024/CVE-2024-24919.md +++ b/2024/CVE-2024-24919.md @@ -32,6 +32,7 @@ No PoCs from references. - https://github.com/Praison001/CVE-2024-24919-Check-Point-Remote-Access-VPN - https://github.com/RevoltSecurities/CVE-2024-24919 - https://github.com/Rug4lo/CVE-2024-24919-Exploit +- https://github.com/Threekiii/CVE - https://github.com/Tim-Hoekstra/CVE-2024-24919 - https://github.com/Vulnpire/CVE-2024-24919 - https://github.com/YN1337/CVE-2024-24919 @@ -39,7 +40,9 @@ No PoCs from references. - https://github.com/bigb0x/CVE-2024-24919-Sniper - https://github.com/birdlex/cve-2024-24919-checker - https://github.com/c3rrberu5/CVE-2024-24919 +- https://github.com/defronixpro/Defronix-Cybersecurity-Roadmap - https://github.com/emanueldosreis/CVE-2024-24919 +- https://github.com/enomothem/PenTestNote - https://github.com/eoslvs/CVE-2024-24919 - https://github.com/fernandobortotti/CVE-2024-24919 - https://github.com/gurudattch/CVE-2024-24919 diff --git a/2024/CVE-2024-2511.md b/2024/CVE-2024-2511.md index 2462202093..1f2372537b 100644 --- a/2024/CVE-2024-2511.md +++ b/2024/CVE-2024-2511.md @@ -14,6 +14,7 @@ No PoCs from references. #### Github - https://github.com/GrigGM/05-virt-04-docker-hw +- https://github.com/bcgov/jag-cdds - https://github.com/chnzzh/OpenSSL-CVE-lib - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-25111.md b/2024/CVE-2024-25111.md new file mode 100644 index 0000000000..99fd4755f7 --- /dev/null +++ b/2024/CVE-2024-25111.md @@ -0,0 +1,17 @@ +### [CVE-2024-25111](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25111) +![](https://img.shields.io/static/v1?label=Product&message=squid&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%203.5.27%2C%20%3C%206.8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-674%3A%20Uncontrolled%20Recursion&color=brighgreen) + +### Description + +Squid is a web proxy cache. Starting in version 3.5.27 and prior to version 6.8, Squid may be vulnerable to a Denial of Service attack against HTTP Chunked decoder due to an uncontrolled recursion bug. This problem allows a remote attacker to cause Denial of Service when sending a crafted, chunked, encoded HTTP Message. This bug is fixed in Squid version 6.8. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. There is no workaround for this issue. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/MegaManSec/Squid-Security-Audit + diff --git a/2024/CVE-2024-25169.md b/2024/CVE-2024-25169.md index fa099d42d9..930687bc3c 100644 --- a/2024/CVE-2024-25169.md +++ b/2024/CVE-2024-25169.md @@ -16,4 +16,5 @@ An issue in Mezzanine v6.0.0 allows attackers to bypass access control mechanism - https://github.com/AppThreat/vulnerability-db - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/shenhav12/CVE-2024-25169-Mezzanine-v6.0.0 diff --git a/2024/CVE-2024-25170.md b/2024/CVE-2024-25170.md index 2a8c6315d6..52c945eeb0 100644 --- a/2024/CVE-2024-25170.md +++ b/2024/CVE-2024-25170.md @@ -15,4 +15,5 @@ An issue in Mezzanine v6.0.0 allows attackers to bypass access controls via mani #### Github - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/shenhav12/CVE-2024-25170-Mezzanine-v6.0.0 diff --git a/2024/CVE-2024-25202.md b/2024/CVE-2024-25202.md index 77cb3e514e..67c30ef059 100644 --- a/2024/CVE-2024-25202.md +++ b/2024/CVE-2024-25202.md @@ -14,6 +14,7 @@ Cross Site Scripting vulnerability in Phpgurukul User Registration & Login and U - https://medium.com/@agampreetsingh_93704/cve-2024-25202-discover-by-agampreet-singh-cyber-security-expert-ff8e32f5cf52 #### Github +- https://github.com/Agampreet-Singh/CVE-2024-25202 - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-25359.md b/2024/CVE-2024-25359.md new file mode 100644 index 0000000000..b8837e7287 --- /dev/null +++ b/2024/CVE-2024-25359.md @@ -0,0 +1,17 @@ +### [CVE-2024-25359](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25359) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue in zuoxingdong lagom v.0.1.2 allows a local attacker to execute arbitrary code via the pickle_load function of the serialize.py file. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/bayuncao/bayuncao + diff --git a/2024/CVE-2024-25400.md b/2024/CVE-2024-25400.md index 330c523a04..543beecb31 100644 --- a/2024/CVE-2024-25400.md +++ b/2024/CVE-2024-25400.md @@ -5,7 +5,7 @@ ### Description -Subrion CMS 4.2.1 is vulnerable to SQL Injection via ia.core.mysqli.php. +** DISPUTED ** Subrion CMS 4.2.1 is vulnerable to SQL Injection via ia.core.mysqli.php. NOTE: this is disputed by multiple third parties because it refers to an HTTP request to a PHP file that only contains a class, without any mechanism for accepting external input, and the reportedly vulnerable method is not present in the file. ### POC diff --git a/2024/CVE-2024-25423.md b/2024/CVE-2024-25423.md index 1d7dcee6a6..566ce2f825 100644 --- a/2024/CVE-2024-25423.md +++ b/2024/CVE-2024-25423.md @@ -13,6 +13,7 @@ An issue in MAXON CINEMA 4D R2024.2.0 allows a local attacker to execute arbitra - https://github.com/DriverUnload/cve-2024-25423 #### Github +- https://github.com/DriverUnload/cve-2024-25423 - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-25579.md b/2024/CVE-2024-25579.md index 9a614f765f..2b661504f7 100644 --- a/2024/CVE-2024-25579.md +++ b/2024/CVE-2024-25579.md @@ -1,4 +1,5 @@ ### [CVE-2024-25579](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25579) +![](https://img.shields.io/static/v1?label=Product&message=WMC-X1800GST-B&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=WRC-1167GS2-B&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=WRC-1167GS2H-B&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=WRC-2533GS2-B&color=blue) @@ -8,13 +9,14 @@ ![](https://img.shields.io/static/v1?label=Product&message=WRC-X3200GST3-B&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.24%20and%20earlier%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.25%20and%20earlier%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.41%20and%20earlier%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.62%20and%20earlier%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.67%20and%20earlier%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=OS%20command%20injection&color=brighgreen) ### Description -OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product. Affected products and versions are as follows: WRC-1167GS2-B v1.67 and earlier, WRC-1167GS2H-B v1.67 and earlier, WRC-2533GS2-B v1.62 and earlier, WRC-2533GS2-W v1.62 and earlier, WRC-2533GS2V-B v1.62 and earlier, WRC-X3200GST3-B v1.25 and earlier, and WRC-G01-W v1.24 and earlier. +OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product. Note that WMC-X1800GST-B is also included in e-Mesh Starter Kit "WMC-2LX-B". ### POC diff --git a/2024/CVE-2024-25600.md b/2024/CVE-2024-25600.md index f48cd93ab4..7dc70c8bf5 100644 --- a/2024/CVE-2024-25600.md +++ b/2024/CVE-2024-25600.md @@ -17,8 +17,10 @@ Improper Control of Generation of Code ('Code Injection') vulnerability in Codee #### Github - https://github.com/0bl1v10nf0rg0773n/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress - https://github.com/0xMarcio/cve +- https://github.com/Chocapikk/CVE-2024-25600 - https://github.com/Christbowel/CVE-2024-25600_Nuclei-Template - https://github.com/GhostTroops/TOP +- https://github.com/K3ysTr0K3R/CVE-2024-25600-EXPLOIT - https://github.com/K3ysTr0K3R/K3ysTr0K3R - https://github.com/RHYru9/CVE-2024-25600-mass - https://github.com/Threekiii/CVE diff --git a/2024/CVE-2024-25617.md b/2024/CVE-2024-25617.md index ce7ef094c5..2e0f5d30b8 100644 --- a/2024/CVE-2024-25617.md +++ b/2024/CVE-2024-25617.md @@ -14,5 +14,6 @@ Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, a No PoCs from references. #### Github +- https://github.com/MegaManSec/Squid-Security-Audit - https://github.com/NaInSec/CVE-LIST diff --git a/2024/CVE-2024-25975.md b/2024/CVE-2024-25975.md index bc0ce3ff9e..07250f0e68 100644 --- a/2024/CVE-2024-25975.md +++ b/2024/CVE-2024-25975.md @@ -10,6 +10,7 @@ The application implements an up- and downvote function which alters a value wit ### POC #### Reference +- http://seclists.org/fulldisclosure/2024/May/34 - https://r.sec-consult.com/hawki #### Github diff --git a/2024/CVE-2024-25976.md b/2024/CVE-2024-25976.md index dadbe2f170..27ce008fe2 100644 --- a/2024/CVE-2024-25976.md +++ b/2024/CVE-2024-25976.md @@ -10,6 +10,7 @@ When LDAP authentication is activated in the configuration it is possible to obt ### POC #### Reference +- http://seclists.org/fulldisclosure/2024/May/34 - https://r.sec-consult.com/hawki #### Github diff --git a/2024/CVE-2024-25977.md b/2024/CVE-2024-25977.md index 56a9aa5c54..d3f950c53e 100644 --- a/2024/CVE-2024-25977.md +++ b/2024/CVE-2024-25977.md @@ -10,6 +10,7 @@ The application does not change the session token when using the login or logout ### POC #### Reference +- http://seclists.org/fulldisclosure/2024/May/34 - https://r.sec-consult.com/hawki #### Github diff --git a/2024/CVE-2024-26026.md b/2024/CVE-2024-26026.md index 27715328f1..aa33f672ed 100644 --- a/2024/CVE-2024-26026.md +++ b/2024/CVE-2024-26026.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/GRTMALDET/Big-IP-Next-CVE-2024-26026 - https://github.com/Threekiii/CVE +- https://github.com/enomothem/PenTestNote - https://github.com/netlas-io/netlas-dorks - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/passwa11/CVE-2024-26026 diff --git a/2024/CVE-2024-26163.md b/2024/CVE-2024-26163.md index 229d8ce284..3ffc5d17cf 100644 --- a/2024/CVE-2024-26163.md +++ b/2024/CVE-2024-26163.md @@ -1,7 +1,8 @@ ### [CVE-2024-26163](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26163) +![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Edge%20(Chromium-based)%20Extended%20Stable&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Edge%20(Chromium-based)&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.0.0%3C%20122.0.2365.92%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Vulnerability&message=Security%20Feature%20Bypass&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-693%3A%20Protection%20Mechanism%20Failure&color=brighgreen) ### Description diff --git a/2024/CVE-2024-26165.md b/2024/CVE-2024-26165.md index 6a8141c287..9545de08a7 100644 --- a/2024/CVE-2024-26165.md +++ b/2024/CVE-2024-26165.md @@ -1,7 +1,7 @@ ### [CVE-2024-26165](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26165) ![](https://img.shields.io/static/v1?label=Product&message=Visual%20Studio%20Code&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.0.0%3C%201.87.2%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20Privilege&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password&color=brighgreen) ### Description diff --git a/2024/CVE-2024-26167.md b/2024/CVE-2024-26167.md index a2ff21ab00..c24dbba1a1 100644 --- a/2024/CVE-2024-26167.md +++ b/2024/CVE-2024-26167.md @@ -1,7 +1,7 @@ ### [CVE-2024-26167](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26167) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Edge%20for%20Android&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.0.0%3C%20122.0.2365.92%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Vulnerability&message=Spoofing&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1021%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames&color=brighgreen) ### Description diff --git a/2024/CVE-2024-26173.md b/2024/CVE-2024-26173.md index d4b7cb835e..53e56574bc 100644 --- a/2024/CVE-2024-26173.md +++ b/2024/CVE-2024-26173.md @@ -38,7 +38,7 @@ ![](https://img.shields.io/static/v1?label=Version&message=6.1.0%3C%206.1.7601.27017%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.2.0%3C%206.2.9200.24768%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.3.0%3C%206.3.9600.21871%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20Privilege&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%3A%20Improper%20Input%20Validation&color=brighgreen) ### Description diff --git a/2024/CVE-2024-26181.md b/2024/CVE-2024-26181.md index 0b03052bfd..a5bb84a280 100644 --- a/2024/CVE-2024-26181.md +++ b/2024/CVE-2024-26181.md @@ -38,7 +38,7 @@ ![](https://img.shields.io/static/v1?label=Version&message=6.1.0%3C%206.1.7601.27017%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.2.0%3C%206.2.9200.24768%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.3.0%3C%206.3.9600.21871%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Vulnerability&message=Denial%20of%20Service&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%3A%20Improper%20Input%20Validation&color=brighgreen) ### Description diff --git a/2024/CVE-2024-26188.md b/2024/CVE-2024-26188.md index 3cf7084d97..df9ce8e9ea 100644 --- a/2024/CVE-2024-26188.md +++ b/2024/CVE-2024-26188.md @@ -1,7 +1,7 @@ ### [CVE-2024-26188](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26188) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Edge%20for%20Android&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.0.0%3C%20122.0.2365.52%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Vulnerability&message=Spoofing&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-357%3A%20Insufficient%20UI%20Warning%20of%20Dangerous%20Operations&color=brighgreen) ### Description diff --git a/2024/CVE-2024-26192.md b/2024/CVE-2024-26192.md index f25c7a6bf3..7983c2af7a 100644 --- a/2024/CVE-2024-26192.md +++ b/2024/CVE-2024-26192.md @@ -1,7 +1,7 @@ ### [CVE-2024-26192](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26192) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Edge%20(Chromium-based)&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.0.0%3C%20122.0.2365.52%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Disclosure&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen) ### Description diff --git a/2024/CVE-2024-26196.md b/2024/CVE-2024-26196.md index 28979f14a7..87827f2292 100644 --- a/2024/CVE-2024-26196.md +++ b/2024/CVE-2024-26196.md @@ -1,7 +1,7 @@ ### [CVE-2024-26196](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26196) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Edge%20for%20Android&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.0.0%3C%20122.0.2365.63%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Disclosure&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-259%3A%20Use%20of%20Hard-coded%20Password&color=brighgreen) ### Description diff --git a/2024/CVE-2024-26229.md b/2024/CVE-2024-26229.md new file mode 100644 index 0000000000..40a040571f --- /dev/null +++ b/2024/CVE-2024-26229.md @@ -0,0 +1,58 @@ +### [CVE-2024-26229](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26229) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201507&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201607&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201809&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%2021H2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%2022H2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2011%20Version%2023H2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2011%20version%2021H2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2011%20version%2022H2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2011%20version%2022H3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20%20Service%20Pack%202&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20R2%20Service%20Pack%201%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20R2%20Service%20Pack%201&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20Service%20Pack%202%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20Service%20Pack%202&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20R2%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20R2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202022&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.10240.20596%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.14393.6897%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.17763.5696%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.19044.4291%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.19045.4291%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.20348.2402%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.22000.2899%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.22621.3447%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.22631.3447%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.25398.830%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=6.0.0%3C%206.0.6003.22618%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=6.0.0%3C%206.1.7601.27067%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=6.1.0%3C%206.1.7601.27067%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=6.2.0%3C%206.2.9200.24821%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=6.3.0%3C%206.3.9600.21924%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-122%3A%20Heap-based%20Buffer%20Overflow&color=brighgreen) + +### Description + +Windows CSC Service Elevation of Privilege Vulnerability + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/0xMarcio/cve +- https://github.com/GhostTroops/TOP +- https://github.com/michredteam/PoC-26229 +- https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/tanjiti/sec_profile + diff --git a/2024/CVE-2024-26246.md b/2024/CVE-2024-26246.md index f619db997d..96d2a1fd7e 100644 --- a/2024/CVE-2024-26246.md +++ b/2024/CVE-2024-26246.md @@ -1,7 +1,7 @@ ### [CVE-2024-26246](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26246) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Edge%20for%20Android&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.0.0%3C%20122.0.2365.92%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Vulnerability&message=Security%20Feature%20Bypass&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control&color=brighgreen) ### Description diff --git a/2024/CVE-2024-26247.md b/2024/CVE-2024-26247.md index 4ed501188e..87106ea4fe 100644 --- a/2024/CVE-2024-26247.md +++ b/2024/CVE-2024-26247.md @@ -1,7 +1,7 @@ ### [CVE-2024-26247](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26247) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Edge%20(Chromium-based)&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.0.0%3C%20123.0.2420.53%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Vulnerability&message=Security%20Feature%20Bypass&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-269%3A%20Improper%20Privilege%20Management&color=brighgreen) ### Description diff --git a/2024/CVE-2024-26256.md b/2024/CVE-2024-26256.md index 760fd6bbc8..c639cef556 100644 --- a/2024/CVE-2024-26256.md +++ b/2024/CVE-2024-26256.md @@ -10,7 +10,7 @@ ### Description -libarchive Remote Code Execution Vulnerability +Libarchive Remote Code Execution Vulnerability ### POC diff --git a/2024/CVE-2024-26507.md b/2024/CVE-2024-26507.md new file mode 100644 index 0000000000..9751dfc7f9 --- /dev/null +++ b/2024/CVE-2024-26507.md @@ -0,0 +1,17 @@ +### [CVE-2024-26507](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26507) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue in FinalWire AIRDA Extreme, AIDA64 Engineer, AIDA64 Business, AIDA64 Network Audit v.7.00.6700 and before allows a local attacker to escalate privileges via the DeviceIoControl call associated with MmMapIoSpace, IoAllocateMdl, MmBuildMdlForNonPagedPool, or MmMapLockedPages components. + +### POC + +#### Reference +- https://belong2yourself.github.io/vulnerabilities/docs/AIDA/Elevation-of-Privileges/readme/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-26521.md b/2024/CVE-2024-26521.md index f735c1798a..0eec55856f 100644 --- a/2024/CVE-2024-26521.md +++ b/2024/CVE-2024-26521.md @@ -14,5 +14,6 @@ HTML Injection vulnerability in CE Phoenix v1.0.8.20 and before allows a remote - https://github.com/hackervegas001/CVE-2024-26521 #### Github +- https://github.com/hackervegas001/CVE-2024-26521 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-26581.md b/2024/CVE-2024-26581.md index e63f997b59..5ae252d735 100644 --- a/2024/CVE-2024-26581.md +++ b/2024/CVE-2024-26581.md @@ -1,6 +1,6 @@ ### [CVE-2024-26581](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) -![](https://img.shields.io/static/v1?label=Version&message=acaee227cf79%3C%2010e9cb393136%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=8284a79136c3%3C%20c60d252949ca%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description diff --git a/2024/CVE-2024-26602.md b/2024/CVE-2024-26602.md index f91e9bd9d1..0057f7ca65 100644 --- a/2024/CVE-2024-26602.md +++ b/2024/CVE-2024-26602.md @@ -13,5 +13,6 @@ In the Linux kernel, the following vulnerability has been resolved:sched/membarr No PoCs from references. #### Github +- https://github.com/codexlynx/hardware-attacks-state-of-the-art - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-26629.md b/2024/CVE-2024-26629.md index 8a78326cfa..8fe5d546e9 100644 --- a/2024/CVE-2024-26629.md +++ b/2024/CVE-2024-26629.md @@ -1,6 +1,6 @@ ### [CVE-2024-26629](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26629) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) -![](https://img.shields.io/static/v1?label=Version&message=e2fc17fcc503%3C%20c6f8b3fcc627%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=3097f38e9126%3C%2099fb654d01dc%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description diff --git a/2024/CVE-2024-26639.md b/2024/CVE-2024-26639.md index aebaab5adf..3cf04be809 100644 --- a/2024/CVE-2024-26639.md +++ b/2024/CVE-2024-26639.md @@ -1,11 +1,11 @@ ### [CVE-2024-26639](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26639) -![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) -![](https://img.shields.io/static/v1?label=Version&message=68ed9e333240%3C%20dc904345e377%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description -In the Linux kernel, the following vulnerability has been resolved:mm, kmsan: fix infinite recursion due to RCU critical sectionAlexander Potapenko writes in [1]: "For every memory access in the codeinstrumented by KMSAN we call kmsan_get_metadata() to obtain the metadatafor the memory being accessed. For virtual memory the metadata pointersare stored in the corresponding `struct page`, therefore we need to callvirt_to_page() to get them.According to the comment in arch/x86/include/asm/page.h,virt_to_page(kaddr) returns a valid pointer iff virt_addr_valid(kaddr) istrue, so KMSAN needs to call virt_addr_valid() as well.To avoid recursion, kmsan_get_metadata() must not call instrumented code,therefore ./arch/x86/include/asm/kmsan.h forks parts ofarch/x86/mm/physaddr.c to check whether a virtual address is valid or not.But the introduction of rcu_read_lock() to pfn_valid() added instrumentedRCU API calls to virt_to_page_or_null(), which is called bykmsan_get_metadata(), so there is an infinite recursion now. I do notthink it is correct to stop that recursion by doingkmsan_enter_runtime()/kmsan_exit_runtime() in kmsan_get_metadata(): thatwould prevent instrumented functions called from within the runtime fromtracking the shadow values, which might introduce false positives."Fix the issue by switching pfn_valid() to the _sched() variant ofrcu_read_lock/unlock(), which does not require calling into RCU. Giventhe critical section in pfn_valid() is very small, this is a reasonabletrade-off (with preemptible RCU).KMSAN further needs to be careful to suppress calls into the scheduler,which would be another source of recursion. This can be done by wrappingthe call to pfn_valid() into preempt_disable/enable_no_resched(). Thedownside is that this sacrifices breaking scheduling guarantees; however,a kernel compiled with KMSAN has already given up any performanceguarantees due to being heavily instrumented.Note, KMSAN code already disables tracing via Makefile, and since mmzone.his included, it is not necessary to use the notrace variant, which isgenerally preferred in all other cases. +** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. ### POC diff --git a/2024/CVE-2024-26643.md b/2024/CVE-2024-26643.md index a9eedd759a..87ecb5967e 100644 --- a/2024/CVE-2024-26643.md +++ b/2024/CVE-2024-26643.md @@ -1,6 +1,6 @@ ### [CVE-2024-26643](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) -![](https://img.shields.io/static/v1?label=Version&message=bbdb3b65aa91%3C%20edcf1a3f182e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=8da1b048f9a5%3C%20d75a589bb92a%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description diff --git a/2024/CVE-2024-26979.md b/2024/CVE-2024-26979.md index 27a364e410..bf71212893 100644 --- a/2024/CVE-2024-26979.md +++ b/2024/CVE-2024-26979.md @@ -1,11 +1,11 @@ ### [CVE-2024-26979](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26979) -![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) -![](https://img.shields.io/static/v1?label=Version&message=9c079b8ce8bf%3C%20c560327d900b%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description -In the Linux kernel, the following vulnerability has been resolved:drm/vmwgfx: Fix possible null pointer derefence with invalid contextsvmw_context_cotable can return either an error or a null pointer and itsusage sometimes went unchecked. Subsequent code would then try to accesseither a null pointer or an error value.The invalid dereferences were only possible with malformed userspaceapps which never properly initialized the rendering contexts.Check the results of vmw_context_cotable to fix the invalid derefs.Thanks:ziming zhang(@ezrak1e) from Ant Group Light-Year Security Labwho was the first person to discover it.Niels De Graef who reported it and helped to track down the poc. +** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. ### POC diff --git a/2024/CVE-2024-2700.md b/2024/CVE-2024-2700.md index d4bd7ad51d..ab23f3e1e1 100644 --- a/2024/CVE-2024-2700.md +++ b/2024/CVE-2024-2700.md @@ -1,5 +1,5 @@ ### [CVE-2024-2700](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2700) -![](https://img.shields.io/static/v1?label=Product&message=OpenShift%20Serverless&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=RHOSS-1.33-RHEL-8&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20AMQ%20Streams%202.7.0&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Build%20of%20Keycloak&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Integration%20Camel%20K&color=blue) diff --git a/2024/CVE-2024-27019.md b/2024/CVE-2024-27019.md index cf2d59400b..27b2e6b9b2 100644 --- a/2024/CVE-2024-27019.md +++ b/2024/CVE-2024-27019.md @@ -1,6 +1,6 @@ ### [CVE-2024-27019](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) -![](https://img.shields.io/static/v1?label=Version&message=e50092404c1b%3C%20379bf7257bc5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=e50092404c1b%3C%20cade34279c22%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description diff --git a/2024/CVE-2024-27173.md b/2024/CVE-2024-27173.md new file mode 100644 index 0000000000..e68d773e08 --- /dev/null +++ b/2024/CVE-2024-27173.md @@ -0,0 +1,17 @@ +### [CVE-2024-27173](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27173) +![](https://img.shields.io/static/v1?label=Product&message=Toshiba%20Tec%20e-Studio%20multi-function%20peripheral%20(MFP)&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20see%20the%20reference%20URL%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen) + +### Description + +Remote Command program allows an attacker to get Remote Code Execution by overwriting existing Python files containing executable code. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-27282.md b/2024/CVE-2024-27282.md index 301289e3b1..c148cb25ff 100644 --- a/2024/CVE-2024-27282.md +++ b/2024/CVE-2024-27282.md @@ -14,4 +14,5 @@ No PoCs from references. #### Github - https://github.com/lifeparticle/Ruby-Cheatsheet +- https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-27316.md b/2024/CVE-2024-27316.md index daca5afc4e..6df5454f75 100644 --- a/2024/CVE-2024-27316.md +++ b/2024/CVE-2024-27316.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/Ampferl/poc_http2-continuation-flood - https://github.com/DrewskyDev/H2Flood +- https://github.com/EzeTauil/Maquina-Upload - https://github.com/Vos68/HTTP2-Continuation-Flood-PoC - https://github.com/aeyesec/CVE-2024-27316_poc - https://github.com/lockness-Ko/CVE-2024-27316 diff --git a/2024/CVE-2024-27518.md b/2024/CVE-2024-27518.md index f0f02651b3..83b94aa3a6 100644 --- a/2024/CVE-2024-27518.md +++ b/2024/CVE-2024-27518.md @@ -15,4 +15,5 @@ An issue in SUPERAntiSyware Professional X 10.0.1262 and 10.0.1264 allows unpriv #### Github - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/secunnix/CVE-2024-27518 diff --git a/2024/CVE-2024-27619.md b/2024/CVE-2024-27619.md index cd7654d3df..7942d2e66a 100644 --- a/2024/CVE-2024-27619.md +++ b/2024/CVE-2024-27619.md @@ -14,5 +14,6 @@ Dlink Dir-3040us A1 1.20b03a hotfix is vulnerable to Buffer Overflow. Any user h - https://www.dlink.com/en/security-bulletin/ #### Github +- https://github.com/ioprojecton/dir-3040_dos - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-2762.md b/2024/CVE-2024-2762.md new file mode 100644 index 0000000000..8a20a2c3bf --- /dev/null +++ b/2024/CVE-2024-2762.md @@ -0,0 +1,18 @@ +### [CVE-2024-2762](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2762) +![](https://img.shields.io/static/v1?label=Product&message=FooGallery%20&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=foogallery-premium&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.4.15%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The FooGallery WordPress plugin before 2.4.15, foogallery-premium WordPress plugin before 2.4.15 does not validate and escape some of its Gallery settings before outputting them back in the page, which could allow users with a role as low as Author to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin + +### POC + +#### Reference +- https://wpscan.com/vulnerability/92e0f5ca-0184-4e9c-b01a-7656e05dce69/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-27622.md b/2024/CVE-2024-27622.md index e6b63308fb..814bd515d9 100644 --- a/2024/CVE-2024-27622.md +++ b/2024/CVE-2024-27622.md @@ -5,7 +5,7 @@ ### Description -A remote code execution vulnerability has been identified in the User Defined Tags module of CMS Made Simple version 2.2.19. This vulnerability arises from inadequate sanitization of user-supplied input in the 'Code' section of the module. As a result, authenticated users with administrative privileges can inject and execute arbitrary PHP code. +A remote code execution vulnerability has been identified in the User Defined Tags module of CMS Made Simple version 2.2.19 / 2.2.21. This vulnerability arises from inadequate sanitization of user-supplied input in the 'Code' section of the module. As a result, authenticated users with administrative privileges can inject and execute arbitrary PHP code. ### POC diff --git a/2024/CVE-2024-27631.md b/2024/CVE-2024-27631.md index df73451667..8c7339889f 100644 --- a/2024/CVE-2024-27631.md +++ b/2024/CVE-2024-27631.md @@ -14,5 +14,6 @@ Cross Site Request Forgery vulnerability in GNU Savane v.3.12 and before allows - https://medium.com/@allypetitt/how-i-found-3-cves-in-2-days-8a135eb924d3 #### Github +- https://github.com/ally-petitt/CVE-2024-27631 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-27815.md b/2024/CVE-2024-27815.md new file mode 100644 index 0000000000..7756fe184d --- /dev/null +++ b/2024/CVE-2024-27815.md @@ -0,0 +1,24 @@ +### [CVE-2024-27815](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27815) +![](https://img.shields.io/static/v1?label=Product&message=iOS%20and%20iPadOS&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=macOS&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=tvOS&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=visionOS&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=watchOS&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%201.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2010.5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2014.5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2017.5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges&color=brighgreen) + +### Description + +An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. An app may be able to execute arbitrary code with kernel privileges. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-27830.md b/2024/CVE-2024-27830.md new file mode 100644 index 0000000000..13b9755d95 --- /dev/null +++ b/2024/CVE-2024-27830.md @@ -0,0 +1,26 @@ +### [CVE-2024-27830](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27830) +![](https://img.shields.io/static/v1?label=Product&message=Safari&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=iOS%20and%20iPadOS&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=macOS&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=tvOS&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=visionOS&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=watchOS&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%201.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2010.5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2014.5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2017.5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=A%20maliciously%20crafted%20webpage%20may%20be%20able%20to%20fingerprint%20the%20user&color=brighgreen) + +### Description + +This issue was addressed through improved state management. This issue is fixed in tvOS 17.5, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. A maliciously crafted webpage may be able to fingerprint the user. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/Joe12387/Joe12387 +- https://github.com/Joe12387/safari-canvas-fingerprinting-exploit + diff --git a/2024/CVE-2024-27834.md b/2024/CVE-2024-27834.md new file mode 100644 index 0000000000..e7ff4e19c5 --- /dev/null +++ b/2024/CVE-2024-27834.md @@ -0,0 +1,23 @@ +### [CVE-2024-27834](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834) +![](https://img.shields.io/static/v1?label=Product&message=Safari&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=iOS%20and%20iPadOS&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=macOS&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=tvOS&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=watchOS&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2010.5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2014.5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2017.5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=An%20attacker%20with%20arbitrary%20read%20and%20write%20capability%20may%20be%20able%20to%20bypass%20Pointer%20Authentication&color=brighgreen) + +### Description + +The issue was addressed with improved checks. This issue is fixed in iOS 17.5 and iPadOS 17.5, tvOS 17.5, Safari 17.5, watchOS 10.5, macOS Sonoma 14.5. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-27936.md b/2024/CVE-2024-27936.md index a8483230ea..9ff5f0178b 100644 --- a/2024/CVE-2024-27936.md +++ b/2024/CVE-2024-27936.md @@ -1,11 +1,11 @@ ### [CVE-2024-27936](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27936) ![](https://img.shields.io/static/v1?label=Product&message=deno&color=blue) -![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%201.32.1%2C%20%3C%201.41%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%201.32.1%2C%20%3C%201.41.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-150%3A%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences&color=brighgreen) ### Description -Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Starting in version 1.32.1 and prior to version 1.41 of the deno_runtime library, maliciously crafted permission request can show the spoofed permission prompt by inserting a broken ANSI escape sequence into the request contents. Deno is stripping any ANSI escape sequences from the permission prompt, but permissions given to the program are based on the contents that contain the ANSI escape sequences. Any Deno program can spoof the content of the interactive permission prompt by inserting a broken ANSI code, which allows a malicious Deno program to display the wrong file path or program name to the user. Version 1.41 of the deno_runtime library contains a patch for the issue. +Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Starting in version 1.32.1 and prior to version 1.41.0 of the deno library, maliciously crafted permission request can show the spoofed permission prompt by inserting a broken ANSI escape sequence into the request contents. Deno is stripping any ANSI escape sequences from the permission prompt, but permissions given to the program are based on the contents that contain the ANSI escape sequences. Any Deno program can spoof the content of the interactive permission prompt by inserting a broken ANSI code, which allows a malicious Deno program to display the wrong file path or program name to the user. Version 1.41.0 of the deno library contains a patch for the issue. ### POC diff --git a/2024/CVE-2024-28085.md b/2024/CVE-2024-28085.md index 2f160360b4..344a6b6518 100644 --- a/2024/CVE-2024-28085.md +++ b/2024/CVE-2024-28085.md @@ -10,6 +10,7 @@ wall in util-linux through 2.40, often installed with setgid tty permissions, al ### POC #### Reference +- http://www.openwall.com/lists/oss-security/2024/03/27/5 - https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt - https://www.openwall.com/lists/oss-security/2024/03/27/5 diff --git a/2024/CVE-2024-28147.md b/2024/CVE-2024-28147.md new file mode 100644 index 0000000000..c1ac4d855a --- /dev/null +++ b/2024/CVE-2024-28147.md @@ -0,0 +1,17 @@ +### [CVE-2024-28147](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28147) +![](https://img.shields.io/static/v1?label=Product&message=edu-sharing&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type&color=brighgreen) + +### Description + +An authenticated user can upload arbitrary files in the upload function for collection preview images. An attacker may upload an HTML file that includes malicious JavaScript code which will be executed if a user visits the direct URL of the collection preview image (Stored Cross Site Scripting). It is also possible to upload SVG files that include nested XML entities. Those are parsed when a user visits the direct URL of the collection preview image, which may be utilized for a Denial of Service attack.This issue affects edu-sharing: <8.0.8-RC2, <8.1.4-RC0, <9.0.0-RC19. + +### POC + +#### Reference +- https://r.sec-consult.com/metaventis + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-28397.md b/2024/CVE-2024-28397.md new file mode 100644 index 0000000000..da386528e6 --- /dev/null +++ b/2024/CVE-2024-28397.md @@ -0,0 +1,18 @@ +### [CVE-2024-28397](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28397) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue in the component js2py.disable_pyimport() of js2py up to v0.74 allows attackers to execute arbitrary code via a crafted API call. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/Marven11/CVE-2024-28397 +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-28423.md b/2024/CVE-2024-28423.md new file mode 100644 index 0000000000..e18587da6b --- /dev/null +++ b/2024/CVE-2024-28423.md @@ -0,0 +1,17 @@ +### [CVE-2024-28423](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28423) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Airflow-Diagrams v2.1.0 was discovered to contain an arbitrary file upload vulnerability in the unsafe_load function at cli.py. This vulnerability allows attackers to execute arbitrary code via uploading a crafted YML file. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/bayuncao/bayuncao + diff --git a/2024/CVE-2024-28424.md b/2024/CVE-2024-28424.md new file mode 100644 index 0000000000..9007fd8c06 --- /dev/null +++ b/2024/CVE-2024-28424.md @@ -0,0 +1,17 @@ +### [CVE-2024-28424](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28424) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +zenml v0.55.4 was discovered to contain an arbitrary file upload vulnerability in the load function at /materializers/cloudpickle_materializer.py. This vulnerability allows attackers to execute arbitrary code via uploading a crafted file. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/bayuncao/bayuncao + diff --git a/2024/CVE-2024-28425.md b/2024/CVE-2024-28425.md new file mode 100644 index 0000000000..e47a23d932 --- /dev/null +++ b/2024/CVE-2024-28425.md @@ -0,0 +1,17 @@ +### [CVE-2024-28425](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28425) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +greykite v1.0.0 was discovered to contain an arbitrary file upload vulnerability in the load_obj function at /templates/pickle_utils.py. This vulnerability allows attackers to execute arbitrary code via uploading a crafted file. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/bayuncao/bayuncao + diff --git a/2024/CVE-2024-28515.md b/2024/CVE-2024-28515.md index 40d6ea8fc5..d2afb3fb12 100644 --- a/2024/CVE-2024-28515.md +++ b/2024/CVE-2024-28515.md @@ -13,5 +13,6 @@ Buffer Overflow vulnerability in CSAPP_Lab CSAPP Lab3 15-213 Fall 20xx allows a - https://github.com/heshi906/CVE-2024-28515 #### Github +- https://github.com/heshi906/CVE-2024-28515 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-28623.md b/2024/CVE-2024-28623.md index 09fee81e1d..9498c1ddae 100644 --- a/2024/CVE-2024-28623.md +++ b/2024/CVE-2024-28623.md @@ -13,4 +13,5 @@ RiteCMS v3.0.0 was discovered to contain a cross-site scripting (XSS) vulnerabil - https://github.com/GURJOTEXPERT/ritecms #### Github +- https://github.com/GURJOTEXPERT/ritecms diff --git a/2024/CVE-2024-28715.md b/2024/CVE-2024-28715.md index 9a847cf71c..680a4ffc52 100644 --- a/2024/CVE-2024-28715.md +++ b/2024/CVE-2024-28715.md @@ -13,6 +13,7 @@ Cross Site Scripting vulnerability in DOraCMS v.2.18 and before allows a remote - https://github.com/Lq0ne/CVE-2024-28715 #### Github +- https://github.com/Lq0ne/CVE-2024-28715 - https://github.com/NaInSec/CVE-LIST - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-28833.md b/2024/CVE-2024-28833.md new file mode 100644 index 0000000000..b498b9fdd6 --- /dev/null +++ b/2024/CVE-2024-28833.md @@ -0,0 +1,17 @@ +### [CVE-2024-28833](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28833) +![](https://img.shields.io/static/v1?label=Product&message=Checkmk&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=2.3.0%3C%202.3.0p6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts&color=brighgreen) + +### Description + +Improper restriction of excessive authentication attempts with two factor authentication methods in Checkmk 2.3 before 2.3.0p6 facilitates brute-forcing of second factor mechanisms. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-28834.md b/2024/CVE-2024-28834.md index 1440d0f742..03a7885eee 100644 --- a/2024/CVE-2024-28834.md +++ b/2024/CVE-2024-28834.md @@ -23,4 +23,5 @@ A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability - https://github.com/GrigGM/05-virt-04-docker-hw - https://github.com/NaInSec/CVE-LIST - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/m-pasima/CI-CD-Security-image-scan diff --git a/2024/CVE-2024-28995.md b/2024/CVE-2024-28995.md new file mode 100644 index 0000000000..94e400fad9 --- /dev/null +++ b/2024/CVE-2024-28995.md @@ -0,0 +1,20 @@ +### [CVE-2024-28995](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28995) +![](https://img.shields.io/static/v1?label=Product&message=SolarWinds%20Serv-U%20&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen) + +### Description + +SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/enomothem/PenTestNote +- https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/tanjiti/sec_profile +- https://github.com/wy876/POC + diff --git a/2024/CVE-2024-29057.md b/2024/CVE-2024-29057.md index e7fd724904..634d425c89 100644 --- a/2024/CVE-2024-29057.md +++ b/2024/CVE-2024-29057.md @@ -1,7 +1,7 @@ ### [CVE-2024-29057](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29057) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Edge%20(Chromium-based)&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.0.0%3C%20123.0.2420.53%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Vulnerability&message=Spoofing&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-357%3A%20Insufficient%20UI%20Warning%20of%20Dangerous%20Operations&color=brighgreen) ### Description diff --git a/2024/CVE-2024-29201.md b/2024/CVE-2024-29201.md index bbd2c69a43..80e904fd09 100644 --- a/2024/CVE-2024-29201.md +++ b/2024/CVE-2024-29201.md @@ -13,6 +13,7 @@ JumpServer is an open source bastion host and an operation and maintenance secur No PoCs from references. #### Github +- https://github.com/Threekiii/Awesome-POC - https://github.com/enomothem/PenTestNote - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/tanjiti/sec_profile diff --git a/2024/CVE-2024-29202.md b/2024/CVE-2024-29202.md index 6f36b0265a..2c0d97ff95 100644 --- a/2024/CVE-2024-29202.md +++ b/2024/CVE-2024-29202.md @@ -13,6 +13,7 @@ JumpServer is an open source bastion host and an operation and maintenance secur No PoCs from references. #### Github +- https://github.com/Threekiii/Awesome-POC - https://github.com/enomothem/PenTestNote - https://github.com/tanjiti/sec_profile - https://github.com/wjlin0/poc-doc diff --git a/2024/CVE-2024-29275.md b/2024/CVE-2024-29275.md index 92a993b893..de03bbe97e 100644 --- a/2024/CVE-2024-29275.md +++ b/2024/CVE-2024-29275.md @@ -14,4 +14,5 @@ SQL injection vulnerability in SeaCMS version 12.9, allows remote unauthenticate #### Github - https://github.com/NaInSec/CVE-LIST +- https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-29296.md b/2024/CVE-2024-29296.md index 6964b7a78f..784d53b99c 100644 --- a/2024/CVE-2024-29296.md +++ b/2024/CVE-2024-29296.md @@ -14,5 +14,6 @@ A user enumeration vulnerability was found in Portainer CE 2.19.4. This issue oc #### Github - https://github.com/Lavender-exe/CVE-2024-29296-PoC +- https://github.com/ThaySolis/CVE-2024-29296 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-29368.md b/2024/CVE-2024-29368.md index 11845ddce7..999c7e3af1 100644 --- a/2024/CVE-2024-29368.md +++ b/2024/CVE-2024-29368.md @@ -13,5 +13,6 @@ An arbitrary file upload vulnerability in the file handling module of moziloCMS - https://github.com/becpn/mozilocms #### Github +- https://github.com/becpn/mozilocms - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-29375.md b/2024/CVE-2024-29375.md index ad31f3ba7a..0013885b01 100644 --- a/2024/CVE-2024-29375.md +++ b/2024/CVE-2024-29375.md @@ -14,5 +14,6 @@ CSV Injection vulnerability in Addactis IBNRS v.3.10.3.107 allows a remote attac #### Github - https://github.com/c0rvane/CVE-2024-29375 +- https://github.com/ismailcemunver/CVE-2024-29375 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-29399.md b/2024/CVE-2024-29399.md index 77fbe1acee..66e31125fe 100644 --- a/2024/CVE-2024-29399.md +++ b/2024/CVE-2024-29399.md @@ -13,5 +13,6 @@ An issue was discovered in GNU Savane v.3.13 and before, allows a remote attacke - https://github.com/ally-petitt/CVE-2024-29399 #### Github +- https://github.com/ally-petitt/CVE-2024-29399 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-29513.md b/2024/CVE-2024-29513.md index 49250a2279..fe2cb2ad11 100644 --- a/2024/CVE-2024-29513.md +++ b/2024/CVE-2024-29513.md @@ -13,4 +13,5 @@ An issue in briscKernelDriver.sys in BlueRiSC WindowsSCOPE Cyber Forensics befor - https://github.com/dru1d-foofus/briscKernelDriver #### Github +- https://github.com/dru1d-foofus/briscKernelDriver diff --git a/2024/CVE-2024-29824.md b/2024/CVE-2024-29824.md new file mode 100644 index 0000000000..adba7a63b4 --- /dev/null +++ b/2024/CVE-2024-29824.md @@ -0,0 +1,19 @@ +### [CVE-2024-29824](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29824) +![](https://img.shields.io/static/v1?label=Product&message=EPM&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=2022%20SU5%3C%3D%202022%20SU5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/enomothem/PenTestNote +- https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/wy876/POC + diff --git a/2024/CVE-2024-29855.md b/2024/CVE-2024-29855.md new file mode 100644 index 0000000000..80f7d1b210 --- /dev/null +++ b/2024/CVE-2024-29855.md @@ -0,0 +1,17 @@ +### [CVE-2024-29855](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29855) +![](https://img.shields.io/static/v1?label=Product&message=Recovery%20Orchestrator&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=7.1.0.230%3C%207.1.0.230%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Hard-coded JWT secret allows authentication bypass in Veeam Recovery Orchestrator + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-29972.md b/2024/CVE-2024-29972.md index 12484517a4..97ff65341f 100644 --- a/2024/CVE-2024-29972.md +++ b/2024/CVE-2024-29972.md @@ -15,5 +15,5 @@ - https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ #### Github -No PoCs found on GitHub currently. +- https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-29973.md b/2024/CVE-2024-29973.md index fa272948b8..d6f545139f 100644 --- a/2024/CVE-2024-29973.md +++ b/2024/CVE-2024-29973.md @@ -15,5 +15,6 @@ - https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ #### Github -No PoCs found on GitHub currently. +- https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/wy876/POC diff --git a/2024/CVE-2024-3000.md b/2024/CVE-2024-3000.md index 4e5f896371..f724c46f7e 100644 --- a/2024/CVE-2024-3000.md +++ b/2024/CVE-2024-3000.md @@ -11,6 +11,7 @@ A vulnerability classified as critical was found in code-projects Online Book Sy #### Reference - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Authentication%20Bypass.md +- https://vuldb.com/?id.258202 #### Github - https://github.com/FoxyProxys/CVE-2024-3000 diff --git a/2024/CVE-2024-3003.md b/2024/CVE-2024-3003.md index bcb03c96cc..419e0d9b18 100644 --- a/2024/CVE-2024-3003.md +++ b/2024/CVE-2024-3003.md @@ -11,6 +11,7 @@ A vulnerability has been found in code-projects Online Book System 1.0 and class #### Reference - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%205.md +- https://vuldb.com/?id.258205 #### Github - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-30050.md b/2024/CVE-2024-30050.md index 8b1f442342..c411c0af8a 100644 --- a/2024/CVE-2024-30050.md +++ b/2024/CVE-2024-30050.md @@ -38,7 +38,7 @@ ![](https://img.shields.io/static/v1?label=Version&message=6.1.0%3C%206.1.7601.27117%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.2.0%3C%206.2.9200.24868%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.3.0%3C%206.3.9600.21972%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Vulnerability&message=Security%20Feature%20Bypass&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-693%3A%20Protection%20Mechanism%20Failure&color=brighgreen) ### Description diff --git a/2024/CVE-2024-30078.md b/2024/CVE-2024-30078.md new file mode 100644 index 0000000000..39ea2e060c --- /dev/null +++ b/2024/CVE-2024-30078.md @@ -0,0 +1,58 @@ +### [CVE-2024-30078](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30078) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201507&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201607&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201809&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%2021H2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%2022H2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2011%20Version%2023H2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2011%20version%2021H2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2011%20version%2022H2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2011%20version%2022H3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20%20Service%20Pack%202&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20R2%20Service%20Pack%201%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20R2%20Service%20Pack%201&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20Service%20Pack%202%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20Service%20Pack%202&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20R2%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20R2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202022&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.10240.20680%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.14393.7070%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.17763.5936%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.19044.4529%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.19045.4529%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.20348.2527%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.22000.3019%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.22621.3737%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.22631.3737%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.25398.950%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=6.0.0%3C%206.0.6003.22720%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=6.0.0%3C%206.1.7601.27170%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=6.1.0%3C%206.1.7601.27170%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=6.2.0%3C%206.2.9200.24919%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=6.3.0%3C%206.3.9600.22023%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%3A%20Improper%20Input%20Validation&color=brighgreen) + +### Description + +Windows Wi-Fi Driver Remote Code Execution Vulnerability + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/0xMarcio/cve +- https://github.com/GhostTroops/TOP +- https://github.com/enomothem/PenTestNote +- https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/stryngs/edgedressing + diff --git a/2024/CVE-2024-30080.md b/2024/CVE-2024-30080.md new file mode 100644 index 0000000000..f53260361f --- /dev/null +++ b/2024/CVE-2024-30080.md @@ -0,0 +1,54 @@ +### [CVE-2024-30080](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30080) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201507&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201607&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201809&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%2021H2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%2022H2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2011%20Version%2023H2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2011%20version%2021H2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2011%20version%2022H2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2011%20version%2022H3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20%20Service%20Pack%202&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20R2%20Service%20Pack%201%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20R2%20Service%20Pack%201&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20Service%20Pack%202%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20Service%20Pack%202&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20R2%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20R2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202022&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.10240.20680%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.14393.7070%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.17763.5936%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.19044.4529%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.19045.4529%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.20348.2527%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.22000.3019%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.22621.3737%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.22631.3737%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.25398.950%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=6.0.0%3C%206.0.6003.22720%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=6.0.0%3C%206.1.7601.27170%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=6.1.0%3C%206.1.7601.27170%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=6.2.0%3C%206.2.9200.24919%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=6.3.0%3C%206.3.9600.22023%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-416%3A%20Use%20After%20Free&color=brighgreen) + +### Description + +Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/tanjiti/sec_profile + diff --git a/2024/CVE-2024-30212.md b/2024/CVE-2024-30212.md new file mode 100644 index 0000000000..4bb476295d --- /dev/null +++ b/2024/CVE-2024-30212.md @@ -0,0 +1,17 @@ +### [CVE-2024-30212](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30212) +![](https://img.shields.io/static/v1?label=Product&message=MPLAB%C2%AE%20Harmony%203%20Core%20Module&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=3.0.0%3C%203.13.4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-190%3A%20Integer%20Overflow%20or%20Wraparound&color=brighgreen) + +### Description + +If a SCSI READ(10) command is initiated via USB using the largest LBA (0xFFFFFFFF) with it's default block size of 512 and a count of 1,the first 512 byte of the 0x80000000 memory area is returned to the user. If the block count is increased, the full RAM can be exposed.The same method works to write to this memory area. If RAM contains pointers, those can be - depending on the application - overwritten toreturn data from any other offset including Progam and Boot Flash. + +### POC + +#### Reference +- https://github.com/Fehr-GmbH/blackleak + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-30256.md b/2024/CVE-2024-30256.md new file mode 100644 index 0000000000..1b4f528197 --- /dev/null +++ b/2024/CVE-2024-30256.md @@ -0,0 +1,17 @@ +### [CVE-2024-30256](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30256) +![](https://img.shields.io/static/v1?label=Product&message=open-webui&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%200.1.117%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)&color=brighgreen) + +### Description + +Open WebUI is a user-friendly WebUI for LLMs. Open-webui is vulnerable to authenticated blind server-side request forgery. This vulnerability is fixed in 0.1.117. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/OrenGitHub/dhscanner + diff --git a/2024/CVE-2024-30270.md b/2024/CVE-2024-30270.md new file mode 100644 index 0000000000..818c1a20ba --- /dev/null +++ b/2024/CVE-2024-30270.md @@ -0,0 +1,17 @@ +### [CVE-2024-30270](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30270) +![](https://img.shields.io/static/v1?label=Product&message=mailcow-dockerized&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%202024-04%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen) + +### Description + +mailcow: dockerized is an open source groupware/email suite based on docker. A security vulnerability has been identified in mailcow affecting versions prior to 2024-04. This vulnerability is a combination of path traversal and arbitrary code execution, specifically targeting the `rspamd_maps()` function. It allows authenticated admin users to overwrite any file writable by the www-data user by exploiting improper path validation. The exploit chain can lead to the execution of arbitrary commands on the server. Version 2024-04 contains a patch for the issue. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-30311.md b/2024/CVE-2024-30311.md new file mode 100644 index 0000000000..ed160cbff3 --- /dev/null +++ b/2024/CVE-2024-30311.md @@ -0,0 +1,17 @@ +### [CVE-2024-30311](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30311) +![](https://img.shields.io/static/v1?label=Product&message=Acrobat%20Reader&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=Out-of-bounds%20Read%20(CWE-125)&color=brighgreen) + +### Description + +Acrobat Reader versions 20.005.30574, 24.002.20736 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. + +### POC + +#### Reference +- https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1946 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-3032.md b/2024/CVE-2024-3032.md new file mode 100644 index 0000000000..da1ff2c882 --- /dev/null +++ b/2024/CVE-2024-3032.md @@ -0,0 +1,17 @@ +### [CVE-2024-3032](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3032) +![](https://img.shields.io/static/v1?label=Product&message=Themify%20Builder&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%207.5.8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20('Open%20Redirect')&color=brighgreen) + +### Description + +Themify Builder WordPress plugin before 7.5.8 does not validate a parameter before redirecting the user to its value, leading to an Open Redirect issue + +### POC + +#### Reference +- https://wpscan.com/vulnerability/d130a60c-c36b-4994-9b0e-e52cd7f99387/ + +#### Github +- https://github.com/Chocapikk/My-CVEs + diff --git a/2024/CVE-2024-30848.md b/2024/CVE-2024-30848.md new file mode 100644 index 0000000000..2c75411d4c --- /dev/null +++ b/2024/CVE-2024-30848.md @@ -0,0 +1,17 @@ +### [CVE-2024-30848](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30848) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Cross-site scripting (XSS) vulnerability in SilverSky E-mail service version 5.0.3126 allows remote attackers to inject arbitrary web script or HTML via the version parameter. + +### POC + +#### Reference +- https://github.com/Excis3/CVE-Disclosure/blob/main/CVE-2024-30848.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-30851.md b/2024/CVE-2024-30851.md index 7dab4f05d7..7c66116c4a 100644 --- a/2024/CVE-2024-30851.md +++ b/2024/CVE-2024-30851.md @@ -13,6 +13,7 @@ Directory Traversal vulnerability in codesiddhant Jasmin Ransomware v.1.0.1 allo - https://github.com/chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc #### Github +- https://github.com/chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-3094.md b/2024/CVE-2024-3094.md index 7350f152bd..7401d61991 100644 --- a/2024/CVE-2024-3094.md +++ b/2024/CVE-2024-3094.md @@ -9,8 +9,7 @@ ### Description -Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. -Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library. +Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library. ### POC @@ -83,6 +82,7 @@ Through a series of complex obfuscations, the liblzma build process extracts a p - https://github.com/drdry2/CVE-2024-3094-EXPLOIT - https://github.com/duytruongpham/duytruongpham - https://github.com/emirkmo/xz-backdoor-github +- https://github.com/enomothem/PenTestNote - https://github.com/felipecosta09/cve-2024-3094 - https://github.com/fevar54/Detectar-Backdoor-en-liblzma-de-XZ-utils-CVE-2024-3094- - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-3116.md b/2024/CVE-2024-3116.md index 7cb8219531..d08d3bb1c2 100644 --- a/2024/CVE-2024-3116.md +++ b/2024/CVE-2024-3116.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/FoxyProxys/CVE-2024-3116 - https://github.com/TechieNeurons/CVE-2024-3116_RCE_in_pgadmin_8.4 +- https://github.com/enomothem/PenTestNote - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/tanjiti/sec_profile diff --git a/2024/CVE-2024-31210.md b/2024/CVE-2024-31210.md new file mode 100644 index 0000000000..2dc4116fcb --- /dev/null +++ b/2024/CVE-2024-31210.md @@ -0,0 +1,17 @@ +### [CVE-2024-31210](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31210) +![](https://img.shields.io/static/v1?label=Product&message=wordpress-develop&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%206.4.0%2C%20%3C%206.4.3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type&color=brighgreen) + +### Description + +WordPress is an open publishing platform for the Web. It's possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -> Add New -> Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it's otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sites where the `DISALLOW_FILE_MODS` constant is set to `true` are not affected. Sites where an administrative user either does not need to enter FTP credentials or they have access to the valid FTP credentials, are not affected. The issue was fixed in WordPress 6.4.3 on January 30, 2024 and backported to versions 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13, 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3.33, 4.2.37, and 4.1.40. A workaround is available. If the `DISALLOW_FILE_MODS` constant is defined as `true` then it will not be possible for any user to upload a plugin and therefore this issue will not be exploitable. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-31217.md b/2024/CVE-2024-31217.md new file mode 100644 index 0000000000..921bcb3151 --- /dev/null +++ b/2024/CVE-2024-31217.md @@ -0,0 +1,17 @@ +### [CVE-2024-31217](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31217) +![](https://img.shields.io/static/v1?label=Product&message=strapi&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%204.22.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-248%3A%20Uncaught%20Exception&color=brighgreen) + +### Description + +Strapi is an open-source content management system. Prior to version 4.22.0, a denial-of-service vulnerability is present in the media upload process causing the server to crash without restarting, affecting either development and production environments. Usually, errors in the application cause it to log the error and keep it running for other clients. This behavior, in contrast, stops the server execution, making it unavailable for any clients until it's manually restarted. Any user with access to the file upload functionality is able to exploit this vulnerability, affecting applications running in both development mode and production mode as well. Users should upgrade @strapi/plugin-upload to version 4.22.0 to receive a patch. + +### POC + +#### Reference +- https://github.com/strapi/strapi/security/advisories/GHSA-pm9q-xj9p-96pm + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-3148.md b/2024/CVE-2024-3148.md index feb3f8b112..230c60764c 100644 --- a/2024/CVE-2024-3148.md +++ b/2024/CVE-2024-3148.md @@ -10,7 +10,7 @@ A vulnerability, which was classified as critical, has been found in DedeCMS 5.7 ### POC #### Reference -No PoCs from references. +- https://vuldb.com/?id.258923 #### Github - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-31497.md b/2024/CVE-2024-31497.md index fd614a554f..dba8897ec7 100644 --- a/2024/CVE-2024-31497.md +++ b/2024/CVE-2024-31497.md @@ -10,6 +10,7 @@ In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an ### POC #### Reference +- https://github.com/daedalus/BreakingECDSAwithLLL - https://securityonline.info/cve-2024-31497-critical-putty-vulnerability-exposes-private-keys-immediate-action-required/ - https://www.bleepingcomputer.com/news/security/putty-ssh-client-flaw-allows-recovery-of-cryptographic-private-keys/ @@ -17,6 +18,7 @@ In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an - https://github.com/HugoBond/CVE-2024-31497-POC - https://github.com/PazDak/LoonSecurity - https://github.com/ViktorNaum/CVE-2024-31497-POC +- https://github.com/daedalus/BreakingECDSAwithLLL - https://github.com/edutko/cve-2024-31497 - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-31510.md b/2024/CVE-2024-31510.md index 42afbc513c..647d65c1c1 100644 --- a/2024/CVE-2024-31510.md +++ b/2024/CVE-2024-31510.md @@ -14,4 +14,5 @@ An issue in Open Quantum Safe liboqs v.10.0 allows a remote attacker to escalate #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/liang-junkai/Fault-injection-of-ML-DSA diff --git a/2024/CVE-2024-31586.md b/2024/CVE-2024-31586.md new file mode 100644 index 0000000000..c8dca6e959 --- /dev/null +++ b/2024/CVE-2024-31586.md @@ -0,0 +1,17 @@ +### [CVE-2024-31586](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31586) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A Cross Site Scripting (XSS) vulnerability exists in Computer Laboratory Management System version 1.0. This vulnerability allows a remote attacker to execute arbitrary code via the Borrower Name, Department, and Remarks parameters. + +### POC + +#### Reference +- https://github.com/CyberSentryX/CVE_Hunting/tree/main/CVE-2024-31586 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-31612.md b/2024/CVE-2024-31612.md new file mode 100644 index 0000000000..ea80bd727b --- /dev/null +++ b/2024/CVE-2024-31612.md @@ -0,0 +1,17 @@ +### [CVE-2024-31612](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31612) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Emlog pro2.3 is vulnerable to Cross Site Request Forgery (CSRF) via twitter.php which can be used with a XSS vulnerability to access administrator information. + +### POC + +#### Reference +- https://github.com/ss122-0ss/cms/blob/main/emlog-csrf.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-31613.md b/2024/CVE-2024-31613.md new file mode 100644 index 0000000000..437ca81078 --- /dev/null +++ b/2024/CVE-2024-31613.md @@ -0,0 +1,17 @@ +### [CVE-2024-31613](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31613) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +BOSSCMS v3.10 is vulnerable to Cross Site Request Forgery (CSRF) in name="head_code" or name="foot_code." + +### POC + +#### Reference +- https://github.com/ss122-0ss/BOSSCMS/blob/main/bosscms%20csrf.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-31777.md b/2024/CVE-2024-31777.md new file mode 100644 index 0000000000..b6467fef36 --- /dev/null +++ b/2024/CVE-2024-31777.md @@ -0,0 +1,18 @@ +### [CVE-2024-31777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31777) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +File Upload vulnerability in openeclass v.3.15 and before allows an attacker to execute arbitrary code via a crafted file to the certbadge.php endpoint. + +### POC + +#### Reference +- https://github.com/FreySolarEye/Exploit-CVE-2024-31777 + +#### Github +- https://github.com/FreySolarEye/Exploit-CVE-2024-31777 +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-31819.md b/2024/CVE-2024-31819.md index c6d86c6376..85d046479f 100644 --- a/2024/CVE-2024-31819.md +++ b/2024/CVE-2024-31819.md @@ -14,6 +14,7 @@ An issue in WWBN AVideo v.12.4 through v.14.2 allows a remote attacker to execut - https://github.com/Chocapikk/CVE-2024-31819 #### Github +- https://github.com/Chocapikk/CVE-2024-31819 - https://github.com/Chocapikk/My-CVEs - https://github.com/Jhonsonwannaa/CVE-2024-31819 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-31861.md b/2024/CVE-2024-31861.md index 6d5b6905b4..a442273d3c 100644 --- a/2024/CVE-2024-31861.md +++ b/2024/CVE-2024-31861.md @@ -1,11 +1,11 @@ ### [CVE-2024-31861](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31861) -![](https://img.shields.io/static/v1?label=Product&message=Apache%20Zeppelin&color=blue) -![](https://img.shields.io/static/v1?label=Version&message=0.10.1%3C%200.11.1%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20('Code%20Injection')&color=brighgreen) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description -Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Zeppelin.The attackers can use Shell interpreter as a code generation gateway, and execute the generated code as a normal way.This issue affects Apache Zeppelin: from 0.10.1 before 0.11.1.Users are recommended to upgrade to version 0.11.1, which doesn't have Shell interpreter by default. +** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. ### POC @@ -13,5 +13,6 @@ Improper Control of Generation of Code ('Code Injection') vulnerability in Apach No PoCs from references. #### Github +- https://github.com/enomothem/PenTestNote - https://github.com/tanjiti/sec_profile diff --git a/2024/CVE-2024-31982.md b/2024/CVE-2024-31982.md new file mode 100644 index 0000000000..b3999cbe30 --- /dev/null +++ b/2024/CVE-2024-31982.md @@ -0,0 +1,17 @@ +### [CVE-2024-31982](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31982) +![](https://img.shields.io/static/v1?label=Product&message=xwiki-platform&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%202.4-milestone-1%2C%20%3C%2014.10.20%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20('Eval%20Injection')&color=brighgreen) + +### Description + +XWiki Platform is a generic wiki platform. Starting in version 2.4-milestone-1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, XWiki's database search allows remote code execution through the search text. This allows remote code execution for any visitor of a public wiki or user of a closed wiki as the database search is by default accessible for all users. This impacts the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10RC1. As a workaround, one may manually apply the patch to the page `Main.DatabaseSearch`. Alternatively, unless database search is explicitly used by users, this page can be deleted as this is not the default search interface of XWiki. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/tanjiti/sec_profile + diff --git a/2024/CVE-2024-32002.md b/2024/CVE-2024-32002.md index 5f3e301fcf..79d53df57a 100644 --- a/2024/CVE-2024-32002.md +++ b/2024/CVE-2024-32002.md @@ -14,6 +14,7 @@ Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42 No PoCs from references. #### Github +- https://github.com/0xMarcio/cve - https://github.com/10cks/CVE-2024-32002-EXP - https://github.com/10cks/CVE-2024-32002-POC - https://github.com/10cks/CVE-2024-32002-hulk @@ -73,6 +74,7 @@ No PoCs from references. - https://github.com/markuta/CVE-2024-32002 - https://github.com/markuta/hooky - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/p1tsi/misc - https://github.com/pkjmesra/PKScreener - https://github.com/safebuffer/CVE-2024-32002 - https://github.com/sampsonv/github-trending diff --git a/2024/CVE-2024-32022.md b/2024/CVE-2024-32022.md index e9f63d3924..339af3d267 100644 --- a/2024/CVE-2024-32022.md +++ b/2024/CVE-2024-32022.md @@ -13,5 +13,5 @@ Kohya_ss is a GUI for Kohya's Stable Diffusion trainers. Kohya_ss is vulnerable - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss #### Github -No PoCs found on GitHub currently. +- https://github.com/OrenGitHub/dhscanner diff --git a/2024/CVE-2024-32113.md b/2024/CVE-2024-32113.md index 2abd76d02b..c104b16970 100644 --- a/2024/CVE-2024-32113.md +++ b/2024/CVE-2024-32113.md @@ -17,6 +17,7 @@ No PoCs from references. - https://github.com/Ostorlab/KEV - https://github.com/Threekiii/CVE - https://github.com/absholi7ly/Apache-OFBiz-Directory-Traversal-exploit +- https://github.com/enomothem/PenTestNote - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/tanjiti/sec_profile diff --git a/2024/CVE-2024-32114.md b/2024/CVE-2024-32114.md index 6024bd153c..a2af05da12 100644 --- a/2024/CVE-2024-32114.md +++ b/2024/CVE-2024-32114.md @@ -14,5 +14,6 @@ No PoCs from references. #### Github - https://github.com/Threekiii/CVE +- https://github.com/enomothem/PenTestNote - https://github.com/tanjiti/sec_profile diff --git a/2024/CVE-2024-32167.md b/2024/CVE-2024-32167.md new file mode 100644 index 0000000000..d839bc8df3 --- /dev/null +++ b/2024/CVE-2024-32167.md @@ -0,0 +1,17 @@ +### [CVE-2024-32167](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32167) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Sourcecodester Online Medicine Ordering System 1.0 is vulnerable to Arbitrary file deletion vulnerability as the backend settings have the function of deleting pictures to delete any files. + +### POC + +#### Reference +- https://github.com/ss122-0ss/cms/blob/main/omos.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-3221.md b/2024/CVE-2024-3221.md new file mode 100644 index 0000000000..1986ed84d1 --- /dev/null +++ b/2024/CVE-2024-3221.md @@ -0,0 +1,17 @@ +### [CVE-2024-3221](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3221) +![](https://img.shields.io/static/v1?label=Product&message=PHP%20Task%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability classified as critical was found in SourceCodester PHP Task Management System 1.0. This vulnerability affects unknown code of the file attendance-info.php. The manipulation of the argument user_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-259066 is the identifier assigned to this vulnerability. + +### POC + +#### Reference +- https://vuldb.com/?id.259066 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-32258.md b/2024/CVE-2024-32258.md index 367dce8316..22b52d51cc 100644 --- a/2024/CVE-2024-32258.md +++ b/2024/CVE-2024-32258.md @@ -15,5 +15,6 @@ The network server of fceux 2.7.0 has a path traversal vulnerability, allowing a #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/liyansong2018/CVE-2024-32258 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-32337.md b/2024/CVE-2024-32337.md index 836efe9e85..1b0fa19f71 100644 --- a/2024/CVE-2024-32337.md +++ b/2024/CVE-2024-32337.md @@ -13,4 +13,5 @@ A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS - https://github.com/adiapera/xss_security_wondercms_3.4.3 #### Github +- https://github.com/adiapera/xss_security_wondercms_3.4.3 diff --git a/2024/CVE-2024-32338.md b/2024/CVE-2024-32338.md index 3817a9c8b1..215cf522f7 100644 --- a/2024/CVE-2024-32338.md +++ b/2024/CVE-2024-32338.md @@ -13,4 +13,5 @@ A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS - https://github.com/adiapera/xss_current_page_wondercms_3.4.3 #### Github +- https://github.com/adiapera/xss_current_page_wondercms_3.4.3 diff --git a/2024/CVE-2024-32339.md b/2024/CVE-2024-32339.md index 2957d6a8ca..a60152db57 100644 --- a/2024/CVE-2024-32339.md +++ b/2024/CVE-2024-32339.md @@ -13,4 +13,5 @@ Multiple cross-site scripting (XSS) vulnerabilities in the HOW TO page of Wonder - https://github.com/adiapera/xss_how_to_page_wondercms_3.4.3 #### Github +- https://github.com/adiapera/xss_how_to_page_wondercms_3.4.3 diff --git a/2024/CVE-2024-32340.md b/2024/CVE-2024-32340.md index 6e997b9776..244bd6a9f2 100644 --- a/2024/CVE-2024-32340.md +++ b/2024/CVE-2024-32340.md @@ -13,4 +13,5 @@ A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS - https://github.com/adiapera/xss_menu_page_wondercms_3.4.3 #### Github +- https://github.com/adiapera/xss_menu_page_wondercms_3.4.3 diff --git a/2024/CVE-2024-32341.md b/2024/CVE-2024-32341.md index 01f3714ec9..91417b5886 100644 --- a/2024/CVE-2024-32341.md +++ b/2024/CVE-2024-32341.md @@ -13,4 +13,5 @@ Multiple cross-site scripting (XSS) vulnerabilities in the Home page of WonderCM - https://github.com/adiapera/xss_home_page_wondercms_3.4.3 #### Github +- https://github.com/adiapera/xss_home_page_wondercms_3.4.3 diff --git a/2024/CVE-2024-32342.md b/2024/CVE-2024-32342.md index f3d8100314..77f3c9492f 100644 --- a/2024/CVE-2024-32342.md +++ b/2024/CVE-2024-32342.md @@ -13,4 +13,5 @@ A cross-site scripting (XSS) vulnerability in the Create Page of Boid CMS v2.1.0 - https://github.com/adiapera/xss_create_boidcms_2.1.0 #### Github +- https://github.com/adiapera/xss_create_boidcms_2.1.0 diff --git a/2024/CVE-2024-32343.md b/2024/CVE-2024-32343.md index a0f139578f..86df11ea9a 100644 --- a/2024/CVE-2024-32343.md +++ b/2024/CVE-2024-32343.md @@ -13,4 +13,5 @@ A cross-site scripting (XSS) vulnerability in the Create Page of Boid CMS v2.1.0 - https://github.com/adiapera/xss_create2_boidcms_2.1.0 #### Github +- https://github.com/adiapera/xss_create2_boidcms_2.1.0 diff --git a/2024/CVE-2024-32345.md b/2024/CVE-2024-32345.md index bec70fa7c4..f59311b7de 100644 --- a/2024/CVE-2024-32345.md +++ b/2024/CVE-2024-32345.md @@ -13,4 +13,5 @@ A cross-site scripting (XSS) vulnerability in the Settings menu of CMSimple v5.1 - https://github.com/adiapera/xss_language_cmsimple_5.15 #### Github +- https://github.com/adiapera/xss_language_cmsimple_5.15 diff --git a/2024/CVE-2024-3236.md b/2024/CVE-2024-3236.md new file mode 100644 index 0000000000..0ffe92f485 --- /dev/null +++ b/2024/CVE-2024-3236.md @@ -0,0 +1,17 @@ +### [CVE-2024-3236](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3236) +![](https://img.shields.io/static/v1?label=Product&message=Popup%20Builder&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%201.1.33%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The Popup Builder WordPress plugin before 1.1.33 does not sanitise and escape some of its Notification fields, which could allow users such as contributor and above to perform Stored Cross-Site Scripting attacks. + +### POC + +#### Reference +- https://wpscan.com/vulnerability/a6c2da28-dc03-4bcc-a6c3-ee55a73861db/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-32369.md b/2024/CVE-2024-32369.md index b794565ee4..b597784578 100644 --- a/2024/CVE-2024-32369.md +++ b/2024/CVE-2024-32369.md @@ -13,6 +13,7 @@ SQL Injection vulnerability in HSC Cybersecurity HC Mailinspector 5.2.17-3 throu - https://github.com/chucrutis/CVE-2024-32369 #### Github +- https://github.com/chucrutis/CVE-2024-32369 - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-3244.md b/2024/CVE-2024-3244.md index a0e6b8ecfb..4285822553 100644 --- a/2024/CVE-2024-3244.md +++ b/2024/CVE-2024-3244.md @@ -5,8 +5,7 @@ ### Description -The EmbedPress – Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's -'embedpress_calendar' shortcode in all versions up to, and including, 3.9.14 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. +The EmbedPress – Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'embedpress_calendar' shortcode in all versions up to, and including, 3.9.14 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### POC diff --git a/2024/CVE-2024-3273.md b/2024/CVE-2024-3273.md index 943d790a26..398491e337 100644 --- a/2024/CVE-2024-3273.md +++ b/2024/CVE-2024-3273.md @@ -16,6 +16,7 @@ No PoCs from references. #### Github +- https://github.com/0xMarcio/cve - https://github.com/Chocapikk/CVE-2024-3273 - https://github.com/GhostTroops/TOP - https://github.com/K3ysTr0K3R/CVE-2024-3273-EXPLOIT diff --git a/2024/CVE-2024-32743.md b/2024/CVE-2024-32743.md index c18f22112b..5254e093d4 100644 --- a/2024/CVE-2024-32743.md +++ b/2024/CVE-2024-32743.md @@ -13,4 +13,5 @@ A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS - https://github.com/adiapera/xss_security_wondercms_3.4.3 #### Github +- https://github.com/adiapera/xss_security_wondercms_3.4.3 diff --git a/2024/CVE-2024-32744.md b/2024/CVE-2024-32744.md index c1f3ae47a4..6ec620123a 100644 --- a/2024/CVE-2024-32744.md +++ b/2024/CVE-2024-32744.md @@ -13,4 +13,5 @@ A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS - https://github.com/adiapera/xss_current_page_wondercms_3.4.3 #### Github +- https://github.com/adiapera/xss_current_page_wondercms_3.4.3 diff --git a/2024/CVE-2024-32745.md b/2024/CVE-2024-32745.md index 23e9e4b7d1..a39c301976 100644 --- a/2024/CVE-2024-32745.md +++ b/2024/CVE-2024-32745.md @@ -13,4 +13,5 @@ A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS - https://github.com/adiapera/xss_current_page_wondercms_3.4.3 #### Github +- https://github.com/adiapera/xss_current_page_wondercms_3.4.3 diff --git a/2024/CVE-2024-32746.md b/2024/CVE-2024-32746.md index ebd7a80613..9eb55c74ad 100644 --- a/2024/CVE-2024-32746.md +++ b/2024/CVE-2024-32746.md @@ -13,4 +13,5 @@ A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS - https://github.com/adiapera/xss_menu_page_wondercms_3.4.3 #### Github +- https://github.com/adiapera/xss_menu_page_wondercms_3.4.3 diff --git a/2024/CVE-2024-3276.md b/2024/CVE-2024-3276.md new file mode 100644 index 0000000000..f8336d1f53 --- /dev/null +++ b/2024/CVE-2024-3276.md @@ -0,0 +1,18 @@ +### [CVE-2024-3276](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3276) +![](https://img.shields.io/static/v1?label=Product&message=Lightbox%20%26%20Modal%20Popup%20WordPress%20Plugin%20&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=foobox-image-lightbox-premium&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.7.28%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The Lightbox & Modal Popup WordPress Plugin WordPress plugin before 2.7.28, foobox-image-lightbox-premium WordPress plugin before 2.7.28 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). + +### POC + +#### Reference +- https://wpscan.com/vulnerability/996d3247-ebdd-49d1-a1a3-ceedcf9f2f95/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-33253.md b/2024/CVE-2024-33253.md new file mode 100644 index 0000000000..c31388401d --- /dev/null +++ b/2024/CVE-2024-33253.md @@ -0,0 +1,17 @@ +### [CVE-2024-33253](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33253) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Cross-site scripting (XSS) vulnerability in GUnet OpenEclass E-learning Platform version 3.15 and before allows a authenticated privileged attacker to execute arbitrary code via the title and description fields of the badge template editing function. + +### POC + +#### Reference +- https://github.com/FreySolarEye/CVE/blob/master/GUnet%20OpenEclass%20E-learning%20platform%203.15%20-%20'certbadge.php'%20Stored%20Cross%20Site%20Scripting + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-33373.md b/2024/CVE-2024-33373.md new file mode 100644 index 0000000000..67b07c5cb6 --- /dev/null +++ b/2024/CVE-2024-33373.md @@ -0,0 +1,17 @@ +### [CVE-2024-33373](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33373) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue in the LB-LINK BL-W1210M v2.0 router allows attackers to bypass password complexity requirements and set single digit passwords for authentication. This vulnerability can allow attackers to access the router via a brute-force attack. + +### POC + +#### Reference +- https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Password-Policy-Bypass--%7C--Inconsistent-Password-Policy-(CVE%E2%80%902024%E2%80%9033373) + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-33374.md b/2024/CVE-2024-33374.md new file mode 100644 index 0000000000..fbfcd43cbb --- /dev/null +++ b/2024/CVE-2024-33374.md @@ -0,0 +1,17 @@ +### [CVE-2024-33374](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33374) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Incorrect access control in the UART/Serial interface on the LB-LINK BL-W1210M v2.0 router allows attackers to access the root terminal without authentication. + +### POC + +#### Reference +- https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Incorrect-Access-Control-(CVE%E2%80%902024%E2%80%9033374) + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-33377.md b/2024/CVE-2024-33377.md new file mode 100644 index 0000000000..7c0d171ff0 --- /dev/null +++ b/2024/CVE-2024-33377.md @@ -0,0 +1,17 @@ +### [CVE-2024-33377](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33377) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +LB-LINK BL-W1210M v2.0 was discovered to contain a clickjacking vulnerability via the Administrator login page. Attackers can cause victim users to perform arbitrary operations via interaction with crafted elements on the web page. + +### POC + +#### Reference +- https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Clickjacking-(CVE%E2%80%902024%E2%80%9033377) + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-33423.md b/2024/CVE-2024-33423.md index e9c5dcb97b..0af6b81ad6 100644 --- a/2024/CVE-2024-33423.md +++ b/2024/CVE-2024-33423.md @@ -13,4 +13,5 @@ Cross-Site Scripting (XSS) vulnerability in the Settings menu of CMSimple v5.15 - https://github.com/adiapera/xss_language_cmsimple_5.15 #### Github +- https://github.com/adiapera/xss_language_cmsimple_5.15 diff --git a/2024/CVE-2024-33424.md b/2024/CVE-2024-33424.md index 2830422e64..8cc2942f8b 100644 --- a/2024/CVE-2024-33424.md +++ b/2024/CVE-2024-33424.md @@ -13,4 +13,5 @@ A cross-site scripting (XSS) vulnerability in the Settings menu of CMSimple v5.1 - https://github.com/adiapera/xss_language_cmsimple_5.15 #### Github +- https://github.com/adiapera/xss_language_cmsimple_5.15 diff --git a/2024/CVE-2024-33438.md b/2024/CVE-2024-33438.md index b2d194ddc0..bf6e4905e9 100644 --- a/2024/CVE-2024-33438.md +++ b/2024/CVE-2024-33438.md @@ -13,5 +13,6 @@ File Upload vulnerability in CubeCart before 6.5.5 allows an authenticated user - https://github.com/julio-cfa/CVE-2024-33438 #### Github +- https://github.com/julio-cfa/CVE-2024-33438 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-3400.md b/2024/CVE-2024-3400.md index db88513dd9..0bdf7f2a60 100644 --- a/2024/CVE-2024-3400.md +++ b/2024/CVE-2024-3400.md @@ -18,6 +18,7 @@ A command injection as a result of arbitrary file creation vulnerability in the #### Github - https://github.com/0x0d3ad/CVE-2024-3400 +- https://github.com/0xMarcio/cve - https://github.com/0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection - https://github.com/AdaniKamal/CVE-2024-3400 - https://github.com/CONDITIONBLACK/CVE-2024-3400-POC @@ -43,6 +44,7 @@ A command injection as a result of arbitrary file creation vulnerability in the - https://github.com/andrelia-hacks/CVE-2024-3400 - https://github.com/aneasystone/github-trending - https://github.com/codeblueprint/CVE-2024-3400 +- https://github.com/enomothem/PenTestNote - https://github.com/fatguru/dorks - https://github.com/fireinrain/github-trending - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-34058.md b/2024/CVE-2024-34058.md index 8057b5a609..166eb7b594 100644 --- a/2024/CVE-2024-34058.md +++ b/2024/CVE-2024-34058.md @@ -10,6 +10,7 @@ The WebTop package for NethServer 7 and 8 allows stored XSS (for example, via th ### POC #### Reference +- http://www.openwall.com/lists/oss-security/2024/05/16/3 - https://www.openwall.com/lists/oss-security/2024/05/16/3 #### Github diff --git a/2024/CVE-2024-34220.md b/2024/CVE-2024-34220.md index 222a4d66ad..736bb98a77 100644 --- a/2024/CVE-2024-34220.md +++ b/2024/CVE-2024-34220.md @@ -13,6 +13,7 @@ Sourcecodester Human Resource Management System 1.0 is vulnerable to SQL Injecti - https://github.com/dovankha/CVE-2024-34220 #### Github +- https://github.com/dovankha/CVE-2024-34220 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/tanjiti/sec_profile diff --git a/2024/CVE-2024-34221.md b/2024/CVE-2024-34221.md index 7932ad3285..1b5e694728 100644 --- a/2024/CVE-2024-34221.md +++ b/2024/CVE-2024-34221.md @@ -13,5 +13,6 @@ Sourcecodester Human Resource Management System 1.0 is vulnerable to Insecure Pe - https://github.com/dovankha/CVE-2024-34221 #### Github +- https://github.com/dovankha/CVE-2024-34221 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-34222.md b/2024/CVE-2024-34222.md index 28f80721e2..a2bc20704a 100644 --- a/2024/CVE-2024-34222.md +++ b/2024/CVE-2024-34222.md @@ -13,5 +13,6 @@ Sourcecodester Human Resource Management System 1.0 is vulnerable to SQL Injecti - https://github.com/dovankha/CVE-2024-34222 #### Github +- https://github.com/dovankha/CVE-2024-34222 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-34223.md b/2024/CVE-2024-34223.md index eeee69d81a..916afe6f2a 100644 --- a/2024/CVE-2024-34223.md +++ b/2024/CVE-2024-34223.md @@ -13,5 +13,6 @@ Insecure permission vulnerability in /hrm/leaverequest.php in SourceCodester Hum - https://github.com/dovankha/CVE-2024-34223 #### Github +- https://github.com/dovankha/CVE-2024-34223 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-34224.md b/2024/CVE-2024-34224.md index 703d079e47..a22e5799b1 100644 --- a/2024/CVE-2024-34224.md +++ b/2024/CVE-2024-34224.md @@ -13,5 +13,6 @@ Cross Site Scripting vulnerability in /php-lms/classes/Users.php?f=save in Compu - https://github.com/dovankha/CVE-2024-34224 #### Github +- https://github.com/dovankha/CVE-2024-34224 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-34225.md b/2024/CVE-2024-34225.md index 44d06bf0d5..cd5ccebfc6 100644 --- a/2024/CVE-2024-34225.md +++ b/2024/CVE-2024-34225.md @@ -13,5 +13,6 @@ Cross Site Scripting vulnerability in php-lms/admin/?page=system_info in Compute - https://github.com/dovankha/CVE-2024-34225 #### Github +- https://github.com/dovankha/CVE-2024-34225 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-34226.md b/2024/CVE-2024-34226.md index 1d977926f7..8dcdca229b 100644 --- a/2024/CVE-2024-34226.md +++ b/2024/CVE-2024-34226.md @@ -13,5 +13,6 @@ SQL injection vulnerability in /php-sqlite-vms/?page=manage_visitor&id=1 in Sour - https://github.com/dovankha/CVE-2024-34226 #### Github +- https://github.com/dovankha/CVE-2024-34226 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-34332.md b/2024/CVE-2024-34332.md new file mode 100644 index 0000000000..bb8a991164 --- /dev/null +++ b/2024/CVE-2024-34332.md @@ -0,0 +1,17 @@ +### [CVE-2024-34332](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34332) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue in SiSoftware SANDRA v31.66 (SANDRA.sys 15.18.1.1) and before allows an attacker to escalate privileges via a crafted buffer sent to the Kernel Driver using the DeviceIoControl Windows API. + +### POC + +#### Reference +- https://belong2yourself.github.io/vulnerabilities/docs/SANDRA/Elevation-of-Privileges/readme/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-34452.md b/2024/CVE-2024-34452.md new file mode 100644 index 0000000000..a20ff1e7f9 --- /dev/null +++ b/2024/CVE-2024-34452.md @@ -0,0 +1,18 @@ +### [CVE-2024-34452](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34452) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +CMSimple_XH 1.7.6 allows XSS by uploading a crafted SVG document. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/surajhacx/CVE-2024-34452 + diff --git a/2024/CVE-2024-34467.md b/2024/CVE-2024-34467.md index 39d0cd3eca..7c6e797589 100644 --- a/2024/CVE-2024-34467.md +++ b/2024/CVE-2024-34467.md @@ -5,7 +5,7 @@ ### Description -ThinkPHP 8.0.3 allows remote attackers to discover the PHPSESSION cookie because think_exception.tpl (aka the debug error output source code) provides this in an error message for a crafted URI in a GET request. +ThinkPHP 8.0.3 allows remote attackers to exploit XSS due to inadequate filtering of function argument values in think_exception.tpl. ### POC diff --git a/2024/CVE-2024-34470.md b/2024/CVE-2024-34470.md index cda6d4a489..6c2b3ce74f 100644 --- a/2024/CVE-2024-34470.md +++ b/2024/CVE-2024-34470.md @@ -15,6 +15,7 @@ An issue was discovered in HSC Mailinspector 5.2.17-3 through v.5.2.18. An Unaut #### Github - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/osvaldotenorio/CVE-2024-34470 - https://github.com/wy876/POC - https://github.com/wy876/wiki diff --git a/2024/CVE-2024-34471.md b/2024/CVE-2024-34471.md index 675720faff..c5d0c3296e 100644 --- a/2024/CVE-2024-34471.md +++ b/2024/CVE-2024-34471.md @@ -15,4 +15,5 @@ An issue was discovered in HSC Mailinspector 5.2.17-3. A Path Traversal vulnerab #### Github - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/osvaldotenorio/CVE-2024-34471 diff --git a/2024/CVE-2024-34472.md b/2024/CVE-2024-34472.md index c43bd56ff0..a48b661d38 100644 --- a/2024/CVE-2024-34472.md +++ b/2024/CVE-2024-34472.md @@ -15,4 +15,5 @@ An issue was discovered in HSC Mailinspector 5.2.17-3 through v.5.2.18. An authe #### Github - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/osvaldotenorio/CVE-2024-34472 diff --git a/2024/CVE-2024-34582.md b/2024/CVE-2024-34582.md index dff0b4bc0c..30edffc307 100644 --- a/2024/CVE-2024-34582.md +++ b/2024/CVE-2024-34582.md @@ -15,4 +15,5 @@ Sunhillo SureLine through 8.10.0 on RICI 5000 devices allows cgi/usrPasswd.cgi u #### Github - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/silent6trinity/CVE-2024-34582 diff --git a/2024/CVE-2024-34694.md b/2024/CVE-2024-34694.md new file mode 100644 index 0000000000..9bc5f6bdf6 --- /dev/null +++ b/2024/CVE-2024-34694.md @@ -0,0 +1,17 @@ +### [CVE-2024-34694](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34694) +![](https://img.shields.io/static/v1?label=Product&message=lnbits&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%200.12.6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions&color=brighgreen) + +### Description + +LNbits is a Lightning wallet and accounts system. Paying invoices in Eclair that do not get settled within the internal timeout (about 30s) lead to a payment being considered failed, even though it may still be in flight. This vulnerability can lead to a total loss of funds for the node backend. This vulnerability is fixed in 0.12.6. + +### POC + +#### Reference +- https://github.com/lnbits/lnbits/security/advisories/GHSA-3j4h-h3fp-vwww + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-34833.md b/2024/CVE-2024-34833.md new file mode 100644 index 0000000000..7804a7e185 --- /dev/null +++ b/2024/CVE-2024-34833.md @@ -0,0 +1,18 @@ +### [CVE-2024-34833](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34833) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Sourcecodester Payroll Management System v1.0 is vulnerable to File Upload. Users can upload images via the "save_settings" page. An unauthenticated attacker can leverage this functionality to upload a malicious PHP file instead. Successful exploitation of this vulnerability results in the ability to execute arbitrary code as the user running the web server. + +### POC + +#### Reference +- https://github.com/ShellUnease/payroll-management-system-rce +- https://packetstormsecurity.com/files/179106/Payroll-Management-System-1.0-Remote-Code-Execution.html + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-34987.md b/2024/CVE-2024-34987.md index 784c5aea73..092edbb938 100644 --- a/2024/CVE-2024-34987.md +++ b/2024/CVE-2024-34987.md @@ -11,6 +11,7 @@ A SQL Injection vulnerability exists in the `ofrs/admin/index.php` script of PHP #### Reference - https://github.com/MarkLee131/PoCs/blob/main/CVE-2024-34987.md +- https://www.exploit-db.com/exploits/51989 #### Github - https://github.com/MarkLee131/PoCs diff --git a/2024/CVE-2024-34989.md b/2024/CVE-2024-34989.md new file mode 100644 index 0000000000..f0b61ac268 --- /dev/null +++ b/2024/CVE-2024-34989.md @@ -0,0 +1,17 @@ +### [CVE-2024-34989](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34989) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +In the module RSI PDF/HTML catalog evolution (prestapdf) <= 7.0.0 from RSI for PrestaShop, a guest can perform SQL injection via `PrestaPDFProductListModuleFrontController::queryDb().' + +### POC + +#### Reference +- https://security.friendsofpresta.org/modules/2024/06/20/prestapdf.html + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-34997.md b/2024/CVE-2024-34997.md index c93f2e05ab..8dfa8fbcca 100644 --- a/2024/CVE-2024-34997.md +++ b/2024/CVE-2024-34997.md @@ -5,7 +5,7 @@ ### Description -joblib v1.4.2 was discovered to contain a deserialization vulnerability via the component joblib.numpy_pickle::NumpyArrayWrapper().read_array(). +** DISPUTED ** joblib v1.4.2 was discovered to contain a deserialization vulnerability via the component joblib.numpy_pickle::NumpyArrayWrapper().read_array(). NOTE: this is disputed by the supplier because NumpyArrayWrapper is only used during caching of trusted content. ### POC diff --git a/2024/CVE-2024-35235.md b/2024/CVE-2024-35235.md new file mode 100644 index 0000000000..c479e8ca19 --- /dev/null +++ b/2024/CVE-2024-35235.md @@ -0,0 +1,19 @@ +### [CVE-2024-35235](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235) +![](https://img.shields.io/static/v1?label=Product&message=cups&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%3D%202.4.8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-252%3A%20Unchecked%20Return%20Value&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20('Link%20Following')&color=brighgreen) + +### Description + +OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.8 and earlier, when starting the cupsd server with a Listen configuration item pointing to a symbolic link, the cupsd process can be caused to perform an arbitrary chmod of the provided argument, providing world-writable access to the target. Given that cupsd is often running as root, this can result in the change of permission of any user or system files to be world writable. Given the aforementioned Ubuntu AppArmor context, on such systems this vulnerability is limited to those files modifiable by the cupsd process. In that specific case it was found to be possible to turn the configuration of the Listen argument into full control over the cupsd.conf and cups-files.conf configuration files. By later setting the User and Group arguments in cups-files.conf, and printing with a printer configured by PPD with a `FoomaticRIPCommandLine` argument, arbitrary user and group (not root) command execution could be achieved, which can further be used on Ubuntu systems to achieve full root command execution. Commit ff1f8a623e090dee8a8aadf12a6a4b25efac143d contains a patch for the issue. + +### POC + +#### Reference +- http://www.openwall.com/lists/oss-security/2024/06/11/1 +- https://github.com/OpenPrinting/cups/security/advisories/GHSA-vvwp-mv6j-hw6f + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-35326.md b/2024/CVE-2024-35326.md new file mode 100644 index 0000000000..5df82f6baa --- /dev/null +++ b/2024/CVE-2024-35326.md @@ -0,0 +1,17 @@ +### [CVE-2024-35326](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35326) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +libyaml v0.2.5 is vulnerable to Buffer Overflow. Affected by this issue is the function yaml_emitter_emit of the file /src/libyaml/src/emitter.c. The manipulation leads to a double-free. + +### POC + +#### Reference +- https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35326.c + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-35328.md b/2024/CVE-2024-35328.md new file mode 100644 index 0000000000..5cb78c6710 --- /dev/null +++ b/2024/CVE-2024-35328.md @@ -0,0 +1,17 @@ +### [CVE-2024-35328](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35328) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +libyaml v0.2.5 is vulnerable to DDOS. Affected by this issue is the function yaml_parser_parse of the file /src/libyaml/src/parser.c. + +### POC + +#### Reference +- https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35328.c + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-35333.md b/2024/CVE-2024-35333.md index 797f9ca4e1..2dd3921ec3 100644 --- a/2024/CVE-2024-35333.md +++ b/2024/CVE-2024-35333.md @@ -13,5 +13,6 @@ A stack-buffer-overflow vulnerability exists in the read_charset_decl function o - https://github.com/momo1239/CVE-2024-35333 #### Github +- https://github.com/momo1239/CVE-2024-35333 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-3537.md b/2024/CVE-2024-3537.md index af5a9a9318..1d931708c2 100644 --- a/2024/CVE-2024-3537.md +++ b/2024/CVE-2024-3537.md @@ -10,7 +10,7 @@ A vulnerability was found in Campcodes Church Management System 1.0 and classifi ### POC #### Reference -No PoCs from references. +- https://vuldb.com/?id.259907 #### Github - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-35468.md b/2024/CVE-2024-35468.md index b4ca6455df..1f80ffbf66 100644 --- a/2024/CVE-2024-35468.md +++ b/2024/CVE-2024-35468.md @@ -13,5 +13,6 @@ A SQL injection vulnerability in /hrm/index.php in SourceCodester Human Resource - https://github.com/dovankha/CVE-2024-35468 #### Github +- https://github.com/dovankha/CVE-2024-35468 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-35469.md b/2024/CVE-2024-35469.md index 09e5560fdb..3bdde53386 100644 --- a/2024/CVE-2024-35469.md +++ b/2024/CVE-2024-35469.md @@ -13,5 +13,6 @@ A SQL injection vulnerability in /hrm/user/ in SourceCodester Human Resource Man - https://github.com/dovankha/CVE-2024-35469 #### Github +- https://github.com/dovankha/CVE-2024-35469 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-35475.md b/2024/CVE-2024-35475.md index b86076e3ae..1407e432e0 100644 --- a/2024/CVE-2024-35475.md +++ b/2024/CVE-2024-35475.md @@ -14,5 +14,6 @@ A Cross-Site Request Forgery (CSRF) vulnerability was discovered in OpenKM Commu - https://github.com/carsonchan12345/OpenKM-CSRF-PoC #### Github +- https://github.com/carsonchan12345/CVE-2024-35475 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-3552.md b/2024/CVE-2024-3552.md new file mode 100644 index 0000000000..6f3b9b2a26 --- /dev/null +++ b/2024/CVE-2024-3552.md @@ -0,0 +1,21 @@ +### [CVE-2024-3552](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3552) +![](https://img.shields.io/static/v1?label=Product&message=Web%20Directory%20Free&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%201.7.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +The Web Directory Free WordPress plugin before 1.7.0 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection with different techniques like UNION, Time-Based and Error-Based. + +### POC + +#### Reference +- https://wpscan.com/vulnerability/34b03ee4-de81-4fec-9f3d-e1bd5b94d136/ + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/truonghuuphuc/CVE-2024-3552-Poc +- https://github.com/wjlin0/poc-doc +- https://github.com/wy876/POC +- https://github.com/wy876/wiki + diff --git a/2024/CVE-2024-35717.md b/2024/CVE-2024-35717.md new file mode 100644 index 0000000000..50f8407142 --- /dev/null +++ b/2024/CVE-2024-35717.md @@ -0,0 +1,17 @@ +### [CVE-2024-35717](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35717) +![](https://img.shields.io/static/v1?label=Product&message=Media%20Slider%20%E2%80%93%20Photo%20Sleder%2C%20Video%20Slider%2C%20Link%20Slider%2C%20Carousal%20Slideshow&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in A WP Life Media Slider – Photo Sleder, Video Slider, Link Slider, Carousal Slideshow.This issue affects Media Slider – Photo Sleder, Video Slider, Link Slider, Carousal Slideshow: from n/a through 1.3.9. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-36104.md b/2024/CVE-2024-36104.md index 126bb3d8f5..11fca9c3ba 100644 --- a/2024/CVE-2024-36104.md +++ b/2024/CVE-2024-36104.md @@ -15,6 +15,10 @@ No PoCs from references. #### Github - https://github.com/Co5mos/nuclei-tps - https://github.com/Mr-xn/CVE-2024-32113 +- https://github.com/Threekiii/Awesome-POC +- https://github.com/Threekiii/CVE +- https://github.com/enomothem/PenTestNote +- https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/tanjiti/sec_profile - https://github.com/wy876/POC - https://github.com/wy876/wiki diff --git a/2024/CVE-2024-36405.md b/2024/CVE-2024-36405.md new file mode 100644 index 0000000000..14e9e8c291 --- /dev/null +++ b/2024/CVE-2024-36405.md @@ -0,0 +1,18 @@ +### [CVE-2024-36405](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36405) +![](https://img.shields.io/static/v1?label=Product&message=liboqs&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%200.10.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-208%3A%20Observable%20Timing%20Discrepancy&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-385%3A%20Covert%20Timing%20Channel&color=brighgreen) + +### Description + +liboqs is a C-language cryptographic library that provides implementations of post-quantum cryptography algorithms. A control-flow timing lean has been identified in the reference implementation of the Kyber key encapsulation mechanism when it is compiled with Clang 15-18 for `-Os`, `-O1`, and other compilation options. A proof-of-concept local attack on the reference implementation leaks the entire ML-KEM 512 secret key in ~10 minutes using end-to-end decapsulation timing measurements. The issue has been fixed in version 0.10.1. As a possible workaround, some compiler options may produce vectorized code that does not leak secret information, however relying on these compiler options as a workaround may not be reliable. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-36416.md b/2024/CVE-2024-36416.md new file mode 100644 index 0000000000..316aabdffa --- /dev/null +++ b/2024/CVE-2024-36416.md @@ -0,0 +1,17 @@ +### [CVE-2024-36416](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36416) +![](https://img.shields.io/static/v1?label=Product&message=SuiteCRM&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%207.14.4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-779%3A%20Logging%20of%20Excessive%20Data&color=brighgreen) + +### Description + +SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a deprecated v4 API example with no log rotation allows denial of service by logging excessive data. Versions 7.14.4 and 8.6.1 contain a fix for this issue. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-36527.md b/2024/CVE-2024-36527.md new file mode 100644 index 0000000000..319974c01f --- /dev/null +++ b/2024/CVE-2024-36527.md @@ -0,0 +1,17 @@ +### [CVE-2024-36527](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36527) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal. Attackers can exploit the URL parameter using the file protocol to read sensitive information from the server. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-36586.md b/2024/CVE-2024-36586.md new file mode 100644 index 0000000000..9b6fdb6023 --- /dev/null +++ b/2024/CVE-2024-36586.md @@ -0,0 +1,17 @@ +### [CVE-2024-36586](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36586) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue in AdGuardHome v0.93 to latest allows unprivileged attackers to escalate privileges via overwriting the AdGuardHome binary. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/go-compile/security-advisories + diff --git a/2024/CVE-2024-36587.md b/2024/CVE-2024-36587.md new file mode 100644 index 0000000000..8a77e48049 --- /dev/null +++ b/2024/CVE-2024-36587.md @@ -0,0 +1,17 @@ +### [CVE-2024-36587](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36587) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Insecure permissions in DNSCrypt-proxy v2.0.0alpha9 to v2.1.5 allows non-privileged attackers to escalate privileges to root via overwriting the binary dnscrypt-proxy. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/go-compile/security-advisories + diff --git a/2024/CVE-2024-36588.md b/2024/CVE-2024-36588.md new file mode 100644 index 0000000000..328f96f21d --- /dev/null +++ b/2024/CVE-2024-36588.md @@ -0,0 +1,17 @@ +### [CVE-2024-36588](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36588) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue in Annonshop.app DecentralizeJustice/ anonymousLocker commit 2b2b4 allows attackers to send messages erroneously attributed to arbitrary users via a crafted HTTP request. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/go-compile/security-advisories + diff --git a/2024/CVE-2024-36589.md b/2024/CVE-2024-36589.md new file mode 100644 index 0000000000..d0ad505c76 --- /dev/null +++ b/2024/CVE-2024-36589.md @@ -0,0 +1,17 @@ +### [CVE-2024-36589](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36589) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue in Annonshop.app DecentralizeJustice/anonymousLocker commit 2b2b4 to ba9fd and DecentralizeJustice/anonBackend commit 57837 to cd815 was discovered to store credentials in plaintext. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/go-compile/security-advisories + diff --git a/2024/CVE-2024-36597.md b/2024/CVE-2024-36597.md new file mode 100644 index 0000000000..b70cf6c83e --- /dev/null +++ b/2024/CVE-2024-36597.md @@ -0,0 +1,17 @@ +### [CVE-2024-36597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36597) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Aegon Life v1.0 was discovered to contain a SQL injection vulnerability via the client_id parameter at clientStatus.php. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/wy876/POC + diff --git a/2024/CVE-2024-36598.md b/2024/CVE-2024-36598.md new file mode 100644 index 0000000000..ac257b1f18 --- /dev/null +++ b/2024/CVE-2024-36598.md @@ -0,0 +1,17 @@ +### [CVE-2024-36598](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36598) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An arbitrary file upload vulnerability in Aegon Life v1.0 allows attackers to execute arbitrary code via uploading a crafted image file. + +### POC + +#### Reference +- https://github.com/kaliankhe/CVE-Aslam-mahi/blob/9ec0572c68bfd3708a7d6e089181024131f4e927/vendors/projectworlds.in/AEGON%20LIFE%20v1.0%20Life%20Insurance%20Management%20System/CVE-2024-36598 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-36678.md b/2024/CVE-2024-36678.md new file mode 100644 index 0000000000..a10c5d4eb4 --- /dev/null +++ b/2024/CVE-2024-36678.md @@ -0,0 +1,17 @@ +### [CVE-2024-36678](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36678) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +In the module "Theme settings" (pk_themesettings) <= 1.8.8 from Promokit.eu for PrestaShop, a guest can perform SQL injection. The script ajax.php have a sensitive SQL call that can be executed with a trivial http call and exploited to forge a SQL injection. + +### POC + +#### Reference +- https://security.friendsofpresta.org/modules/2024/06/18/pk_themesettings.html + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-36679.md b/2024/CVE-2024-36679.md new file mode 100644 index 0000000000..693dac07ec --- /dev/null +++ b/2024/CVE-2024-36679.md @@ -0,0 +1,17 @@ +### [CVE-2024-36679](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36679) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +In the module "Module Live Chat Pro (All in One Messaging)" (livechatpro) <=8.4.0, a guest can perform PHP Code injection. Due to a predictable token, the method `Lcp::saveTranslations()` suffer of a white writer that can inject PHP code into a PHP file. + +### POC + +#### Reference +- https://security.friendsofpresta.org/modules/2024/06/18/livechatpro.html + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-36680.md b/2024/CVE-2024-36680.md new file mode 100644 index 0000000000..718edb8e7f --- /dev/null +++ b/2024/CVE-2024-36680.md @@ -0,0 +1,17 @@ +### [CVE-2024-36680](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36680) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +In the module "Facebook" (pkfacebook) <=1.0.1 from Promokit.eu for PrestaShop, a guest can perform SQL injection. The ajax script facebookConnect.php have a sensitive SQL call that can be executed with a trivial http call and exploited to forge a SQL injection. + +### POC + +#### Reference +- https://security.friendsofpresta.org/modules/2024/06/18/pkfacebook.html + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-36821.md b/2024/CVE-2024-36821.md new file mode 100644 index 0000000000..13c1ce3241 --- /dev/null +++ b/2024/CVE-2024-36821.md @@ -0,0 +1,17 @@ +### [CVE-2024-36821](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36821) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Insecure permissions in Linksys Velop WiFi 5 (WHW01v1) 1.1.13.202617 allows attackers to escalate privileges from Guest to root. + +### POC + +#### Reference +- https://github.com/IvanGlinkin/CVE-2024-36821 + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-36837.md b/2024/CVE-2024-36837.md new file mode 100644 index 0000000000..c86ec8e35d --- /dev/null +++ b/2024/CVE-2024-36837.md @@ -0,0 +1,18 @@ +### [CVE-2024-36837](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36837) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +SQL Injection vulnerability in CRMEB v.5.2.2 allows a remote attacker to obtain sensitive information via the getProductList function in the ProductController.php file. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/tanjiti/sec_profile + diff --git a/2024/CVE-2024-36840.md b/2024/CVE-2024-36840.md new file mode 100644 index 0000000000..64c118d2af --- /dev/null +++ b/2024/CVE-2024-36840.md @@ -0,0 +1,19 @@ +### [CVE-2024-36840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36840) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +SQL Injection vulnerability in Boelter Blue System Management v.1.3 allows a remote attacker to execute arbitrary code and obtain sensitive information via the id parameter to news_details.php and location_details.php; and the section parameter to services.php. + +### POC + +#### Reference +- https://infosec-db.github.io/CyberDepot/vuln_boelter_blue/ +- https://packetstormsecurity.com/files/178978/Boelter-Blue-System-Management-1.3-SQL-Injection.html +- https://sploitus.com/exploit?id=PACKETSTORM:178978 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-3690.md b/2024/CVE-2024-3690.md index 965bb578e4..838dbd2312 100644 --- a/2024/CVE-2024-3690.md +++ b/2024/CVE-2024-3690.md @@ -14,4 +14,5 @@ A vulnerability classified as critical was found in PHPGurukul Small CRM 3.0. Af #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/psudo-bugboy/CVE-2024 diff --git a/2024/CVE-2024-3691.md b/2024/CVE-2024-3691.md index 251d4801ad..f5819c1d99 100644 --- a/2024/CVE-2024-3691.md +++ b/2024/CVE-2024-3691.md @@ -15,4 +15,5 @@ A vulnerability, which was classified as critical, has been found in PHPGurukul #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/nikhil-aniill/Small-CRM-CVE diff --git a/2024/CVE-2024-36966.md b/2024/CVE-2024-36966.md index e1baddca9f..28e3f11270 100644 --- a/2024/CVE-2024-36966.md +++ b/2024/CVE-2024-36966.md @@ -1,6 +1,6 @@ ### [CVE-2024-36966](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36966) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) -![](https://img.shields.io/static/v1?label=Version&message=1da177e4c3f4%3C%20f9b877a7ee31%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=aca740cecbe5%3C%20f9b877a7ee31%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description diff --git a/2024/CVE-2024-36971.md b/2024/CVE-2024-36971.md new file mode 100644 index 0000000000..eb497f9022 --- /dev/null +++ b/2024/CVE-2024-36971.md @@ -0,0 +1,17 @@ +### [CVE-2024-36971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971) +![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=a87cb3e48ee8%3C%20051c0bde9f04%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +In the Linux kernel, the following vulnerability has been resolved:net: fix __dst_negative_advice() race__dst_negative_advice() does not enforce proper RCU rules whensk->dst_cache must be cleared, leading to possible UAF.RCU rules are that we must first clear sk->sk_dst_cache,then call dst_release(old_dst).Note that sk_dst_reset(sk) is implementing this protocol correctly,while __dst_negative_advice() uses the wrong order.Given that ip6_negative_advice() has special logicagainst RTF_CACHE, this means each of the three ->negative_advice()existing methods must perform the sk_dst_reset() themselves.Note the check against NULL dst is centralized in__dst_negative_advice(), there is no need to duplicateit in various callbacks.Many thanks to Clement Lecigne for tracking this issue.This old bug became visible after the blamed commit, using UDP sockets. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-3699.md b/2024/CVE-2024-3699.md new file mode 100644 index 0000000000..47a8428d6d --- /dev/null +++ b/2024/CVE-2024-3699.md @@ -0,0 +1,17 @@ +### [CVE-2024-3699](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3699) +![](https://img.shields.io/static/v1?label=Product&message=drEryk%20Gabinet&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=7.0.0.0%3C%3D%209.17.0.0.%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-798%20Use%20of%20Hard-coded%20Credentials&color=brighgreen) + +### Description + +Use of hard-coded password to the patients' database allows an attacker to retrieve sensitive data stored in the database. The password is the same among all drEryk Gabinet installations.This issue affects drEryk Gabinet software versions from 7.0.0.0 through 9.17.0.0. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-3700.md b/2024/CVE-2024-3700.md new file mode 100644 index 0000000000..92d84c7f9f --- /dev/null +++ b/2024/CVE-2024-3700.md @@ -0,0 +1,17 @@ +### [CVE-2024-3700](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3700) +![](https://img.shields.io/static/v1?label=Product&message=Simple%20Care&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-798%20Use%20of%20Hard-coded%20Credentials&color=brighgreen) + +### Description + +Use of hard-coded password to the patients' database allows an attacker to retrieve sensitive data stored in the database. The password is the same among all Simple Care software installations.This issue affects Estomed Sp. z o.o. Simple Care software in all versions. The software is no longer supported. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-37051.md b/2024/CVE-2024-37051.md new file mode 100644 index 0000000000..91829c27be --- /dev/null +++ b/2024/CVE-2024-37051.md @@ -0,0 +1,34 @@ +### [CVE-2024-37051](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37051) +![](https://img.shields.io/static/v1?label=Product&message=Aqua&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=CLion&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DataGrip&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DataSpell&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GoLand&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=IntelliJ%20IDEA&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MPS&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=PhpStorm&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=PyCharm&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Rider&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=RubyMine&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=RustRover&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=WebStorm&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%202024.1.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%202024.1.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=2023.1%3C%202023.1.3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=2023.1%3C%202023.1.6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=2023.1%3C%202023.1.7%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=2023.1%3C%202023.2.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-522%3A%20Insufficiently%20Protected%20Credentials&color=brighgreen) + +### Description + +GitHub access token could be exposed to third-party sites in JetBrains IDEs after version 2023.1 and less than: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4 + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-37079.md b/2024/CVE-2024-37079.md new file mode 100644 index 0000000000..3b3a8875f7 --- /dev/null +++ b/2024/CVE-2024-37079.md @@ -0,0 +1,20 @@ +### [CVE-2024-37079](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37079) +![](https://img.shields.io/static/v1?label=Product&message=VMware%20Cloud%20Foundation&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=VMware%20vCenter%20Server&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205.x%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=8.0%3C%208.0%20U2d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=Heap-overflow%20vulnerability&color=brighgreen) + +### Description + +vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/tanjiti/sec_profile + diff --git a/2024/CVE-2024-37080.md b/2024/CVE-2024-37080.md new file mode 100644 index 0000000000..c00a0f38e7 --- /dev/null +++ b/2024/CVE-2024-37080.md @@ -0,0 +1,19 @@ +### [CVE-2024-37080](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37080) +![](https://img.shields.io/static/v1?label=Product&message=VMware%20Cloud%20Foundation&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=VMware%20vCenter%20Server&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205.x%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=8.0%3C%208.0%20U2d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=Heap-overflow%20vulnerability&color=brighgreen) + +### Description + +vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/tanjiti/sec_profile + diff --git a/2024/CVE-2024-37301.md b/2024/CVE-2024-37301.md new file mode 100644 index 0000000000..8cd6d94da7 --- /dev/null +++ b/2024/CVE-2024-37301.md @@ -0,0 +1,17 @@ +### [CVE-2024-37301](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37301) +![](https://img.shields.io/static/v1?label=Product&message=document-merge-service&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%206.5.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine&color=brighgreen) + +### Description + +Document Merge Service is a document template merge service providing an API to manage templates and merge them with given data. Versions 6.5.1 and prior are vulnerable to remote code execution via server-side template injection which, when executed as root, can result in full takeover of the affected system. As of time of publication, no patched version exists, nor have any known workarounds been disclosed. + +### POC + +#### Reference +- https://github.com/adfinis/document-merge-service/security/advisories/GHSA-v5gf-r78h-55q6 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37305.md b/2024/CVE-2024-37305.md new file mode 100644 index 0000000000..5d6996eba6 --- /dev/null +++ b/2024/CVE-2024-37305.md @@ -0,0 +1,21 @@ +### [CVE-2024-37305](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37305) +![](https://img.shields.io/static/v1?label=Product&message=oqs-provider&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%200.6.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20('Classic%20Buffer%20Overflow')&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-130%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-190%3A%20Integer%20Overflow%20or%20Wraparound&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-680%3A%20Integer%20Overflow%20to%20Buffer%20Overflow&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-805%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value&color=brighgreen) + +### Description + +oqs-provider is a provider for the OpenSSL 3 cryptography library that adds support for post-quantum cryptography in TLS, X.509, and S/MIME using post-quantum algorithms from liboqs. Flaws have been identified in the way oqs-provider handles lengths decoded with DECODE_UINT32 at the start of serialized hybrid (traditional + post-quantum) keys and signatures. Unchecked length values are later used for memory reads and writes; malformed input can lead to crashes or information leakage. Handling of plain/non-hybrid PQ key operation is not affected. This issue has been patched in in v0.6.1. All users are advised to upgrade. There are no workarounds for this issue. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/chnzzh/OpenSSL-CVE-lib + diff --git a/2024/CVE-2024-37308.md b/2024/CVE-2024-37308.md new file mode 100644 index 0000000000..13c9e877a5 --- /dev/null +++ b/2024/CVE-2024-37308.md @@ -0,0 +1,17 @@ +### [CVE-2024-37308](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37308) +![](https://img.shields.io/static/v1?label=Product&message=Cooked&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.8.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) + +### Description + +The Cooked Pro recipe plugin for WordPress is vulnerable to Persistent Cross-Site Scripting (XSS) via the `_recipe_settings[post_title]` parameter in versions up to, and including, 1.7.15.4 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with contributor-level access and above to inject arbitrary web scripts in pages that will execute whenever a user accesses a compromised page. A patch is available at commit 8cf88f334ccbf11134080bbb655c66f1cfe77026 and will be part of version 1.8.0. + +### POC + +#### Reference +- https://github.com/XjSv/Cooked/security/advisories/GHSA-9vfv-c966-jwrv + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37309.md b/2024/CVE-2024-37309.md new file mode 100644 index 0000000000..ed3f6f0df2 --- /dev/null +++ b/2024/CVE-2024-37309.md @@ -0,0 +1,17 @@ +### [CVE-2024-37309](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37309) +![](https://img.shields.io/static/v1?label=Product&message=crate&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%205.7.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&color=brighgreen) + +### Description + +CrateDB is a distributed SQL database. A high-risk vulnerability has been identified in versions prior to 5.7.2 where the TLS endpoint (port 4200) permits client-initiated renegotiation. In this scenario, an attacker can exploit this feature to repeatedly request renegotiation of security parameters during an ongoing TLS session. This flaw could lead to excessive consumption of CPU resources, resulting in potential server overload and service disruption. The vulnerability was confirmed using an openssl client where the command `R` initiates renegotiation, followed by the server confirming with `RENEGOTIATING`. This vulnerability allows an attacker to perform a denial of service attack by exhausting server CPU resources through repeated TLS renegotiations. This impacts the availability of services running on the affected server, posing a significant risk to operational stability and security. TLS 1.3 explicitly forbids renegotiation, since it closes a window of opportunity for an attack. Version 5.7.2 of CrateDB contains the fix for the issue. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/chnzzh/OpenSSL-CVE-lib + diff --git a/2024/CVE-2024-37393.md b/2024/CVE-2024-37393.md new file mode 100644 index 0000000000..f3fcbd630b --- /dev/null +++ b/2024/CVE-2024-37393.md @@ -0,0 +1,17 @@ +### [CVE-2024-37393](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37393) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Multiple LDAP injections vulnerabilities exist in SecurEnvoy MFA before 9.4.514 due to improper validation of user-supplied input. An unauthenticated remote attacker could exfiltrate data from Active Directory through blind LDAP injection attacks against the DESKTOP service exposed on the /secserver HTTP endpoint. This may include ms-Mcs-AdmPwd, which has a cleartext password for the Local Administrator Password Solution (LAPS) feature. + +### POC + +#### Reference +- https://www.optistream.io/blogs/tech/securenvoy-cve-2024-37393 + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-3754.md b/2024/CVE-2024-3754.md new file mode 100644 index 0000000000..f8d5e52429 --- /dev/null +++ b/2024/CVE-2024-3754.md @@ -0,0 +1,17 @@ +### [CVE-2024-3754](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3754) +![](https://img.shields.io/static/v1?label=Product&message=Alemha%20watermarker&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The Alemha watermarker WordPress plugin through 1.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) + +### POC + +#### Reference +- https://wpscan.com/vulnerability/8c6f3e3e-3047-4446-a190-750a60c29fa3/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37568.md b/2024/CVE-2024-37568.md index 5457a2cb42..dbbb8064ee 100644 --- a/2024/CVE-2024-37568.md +++ b/2024/CVE-2024-37568.md @@ -10,7 +10,7 @@ lepture Authlib before 1.3.1 has algorithm confusion with asymmetric public keys ### POC #### Reference -No PoCs from references. +- https://github.com/lepture/authlib/issues/654 #### Github - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-37619.md b/2024/CVE-2024-37619.md new file mode 100644 index 0000000000..c4fd5279c3 --- /dev/null +++ b/2024/CVE-2024-37619.md @@ -0,0 +1,17 @@ +### [CVE-2024-37619](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37619) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +StrongShop v1.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the spec_group_id parameter at /spec/index.blade.php. + +### POC + +#### Reference +- https://github.com/Hebing123/cve/issues/45 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37620.md b/2024/CVE-2024-37620.md new file mode 100644 index 0000000000..3f8df4feea --- /dev/null +++ b/2024/CVE-2024-37620.md @@ -0,0 +1,17 @@ +### [CVE-2024-37620](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37620) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +PHPVOD v4.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the id parameter at /view/admin/view.php. + +### POC + +#### Reference +- https://github.com/Hebing123/cve/issues/46 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37622.md b/2024/CVE-2024-37622.md new file mode 100644 index 0000000000..bba05b21c7 --- /dev/null +++ b/2024/CVE-2024-37622.md @@ -0,0 +1,17 @@ +### [CVE-2024-37622](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37622) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Xinhu RockOA v2.6.3 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the num parameter at /flow/flow.php. + +### POC + +#### Reference +- https://github.com/rainrocka/xinhu/issues/4 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37623.md b/2024/CVE-2024-37623.md new file mode 100644 index 0000000000..5fad94d134 --- /dev/null +++ b/2024/CVE-2024-37623.md @@ -0,0 +1,17 @@ +### [CVE-2024-37623](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37623) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Xinhu RockOA v2.6.3 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the /kaoqin/tpl_kaoqin_locationchange.html component. + +### POC + +#### Reference +- https://github.com/rainrocka/xinhu/issues/5 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37624.md b/2024/CVE-2024-37624.md new file mode 100644 index 0000000000..f6813752b5 --- /dev/null +++ b/2024/CVE-2024-37624.md @@ -0,0 +1,17 @@ +### [CVE-2024-37624](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37624) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Xinhu RockOA v2.6.3 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the /chajian/inputChajian.php. component. + +### POC + +#### Reference +- https://github.com/rainrocka/xinhu/issues/6 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37625.md b/2024/CVE-2024-37625.md new file mode 100644 index 0000000000..7ea3913026 --- /dev/null +++ b/2024/CVE-2024-37625.md @@ -0,0 +1,17 @@ +### [CVE-2024-37625](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37625) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +zhimengzhe iBarn v1.5 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the $search parameter at /index.php. + +### POC + +#### Reference +- https://github.com/zhimengzhe/iBarn/issues/20 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37629.md b/2024/CVE-2024-37629.md new file mode 100644 index 0000000000..a541318988 --- /dev/null +++ b/2024/CVE-2024-37629.md @@ -0,0 +1,17 @@ +### [CVE-2024-37629](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37629) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +SummerNote 0.8.18 is vulnerable to Cross Site Scripting (XSS) via the Code View Function. + +### POC + +#### Reference +- https://github.com/summernote/summernote/issues/4642 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37632.md b/2024/CVE-2024-37632.md new file mode 100644 index 0000000000..985cb84157 --- /dev/null +++ b/2024/CVE-2024-37632.md @@ -0,0 +1,17 @@ +### [CVE-2024-37632](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37632) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via the password parameter in function loginAuth . + +### POC + +#### Reference +- https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/loginAuth/README.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37633.md b/2024/CVE-2024-37633.md new file mode 100644 index 0000000000..51356dc7c4 --- /dev/null +++ b/2024/CVE-2024-37633.md @@ -0,0 +1,17 @@ +### [CVE-2024-37633](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37633) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via ssid in the function setWiFiGuestCfg + +### POC + +#### Reference +- https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWiFiGuestCfg/README.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37634.md b/2024/CVE-2024-37634.md new file mode 100644 index 0000000000..8824ff6d3d --- /dev/null +++ b/2024/CVE-2024-37634.md @@ -0,0 +1,17 @@ +### [CVE-2024-37634](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37634) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via ssid in the function setWiFiEasyCfg. + +### POC + +#### Reference +- https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWiFiEasyCfg/README.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37637.md b/2024/CVE-2024-37637.md new file mode 100644 index 0000000000..6c0f8c6821 --- /dev/null +++ b/2024/CVE-2024-37637.md @@ -0,0 +1,17 @@ +### [CVE-2024-37637](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37637) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via ssid5g in the function setWizardCfg. + +### POC + +#### Reference +- https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWizardCfg/README.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37642.md b/2024/CVE-2024-37642.md new file mode 100644 index 0000000000..884453c138 --- /dev/null +++ b/2024/CVE-2024-37642.md @@ -0,0 +1,17 @@ +### [CVE-2024-37642](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37642) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +TRENDnet TEW-814DAP v1_(FW1.01B01) was discovered to contain a command injection vulnerability via the ipv4_ping, ipv6_ping parameter at /formSystemCheck . + +### POC + +#### Reference +- https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TRENDnet/TEW-814DAP/formSystemCheck/README.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37643.md b/2024/CVE-2024-37643.md new file mode 100644 index 0000000000..90862d117b --- /dev/null +++ b/2024/CVE-2024-37643.md @@ -0,0 +1,17 @@ +### [CVE-2024-37643](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37643) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +TRENDnet TEW-814DAP v1_(FW1.01B01) was discovered to contain a stack overflow vulnerability via the submit-url parameter at /formPasswordAuth . + +### POC + +#### Reference +- https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TRENDnet/TEW-814DAP/formPasswordAuth/README.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37661.md b/2024/CVE-2024-37661.md new file mode 100644 index 0000000000..72358a2525 --- /dev/null +++ b/2024/CVE-2024-37661.md @@ -0,0 +1,17 @@ +### [CVE-2024-37661](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37661) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +TP-LINK TL-7DR5130 v1.0.23 is vulnerable to forged ICMP redirect message attacks. An attacker in the same WLAN as the victim can hijack the traffic between the victim and any remote server by sending out forged ICMP redirect messages. + +### POC + +#### Reference +- https://github.com/ouuan/router-vuln-report/blob/master/icmp-redirect/tl-7dr5130-redirect.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37662.md b/2024/CVE-2024-37662.md new file mode 100644 index 0000000000..8b9d3deb0e --- /dev/null +++ b/2024/CVE-2024-37662.md @@ -0,0 +1,17 @@ +### [CVE-2024-37662](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37662) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +TP-LINK TL-7DR5130 v1.0.23 is vulnerable to TCP DoS or hijacking attacks. An attacker in the same WLAN as the victim can disconnect or hijack the traffic between the victim and any remote server by sending out forged TCP RST messages to evict NAT mappings in the router. + +### POC + +#### Reference +- https://github.com/ouuan/router-vuln-report/blob/master/nat-rst/tl-7dr5130-nat-rst.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37671.md b/2024/CVE-2024-37671.md new file mode 100644 index 0000000000..b79ebf2d75 --- /dev/null +++ b/2024/CVE-2024-37671.md @@ -0,0 +1,17 @@ +### [CVE-2024-37671](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37671) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Cross Site Scripting vulnerability in Tessi Docubase Document Management product 5.x allows a remote attacker to execute arbitrary code via the page parameter. + +### POC + +#### Reference +- https://github.com/MohamedAzizMSALLEMI/Docubase_Security/blob/main/CVE-2024-37671.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37672.md b/2024/CVE-2024-37672.md new file mode 100644 index 0000000000..af3ba811db --- /dev/null +++ b/2024/CVE-2024-37672.md @@ -0,0 +1,17 @@ +### [CVE-2024-37672](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37672) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Cross Site Scripting vulnerability in Tessi Docubase Document Management product 5.x allows a remote attacker to execute arbitrary code via the idactivity parameter. + +### POC + +#### Reference +- https://github.com/MohamedAzizMSALLEMI/Docubase_Security/blob/main/CVE-2024-37672.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37673.md b/2024/CVE-2024-37673.md new file mode 100644 index 0000000000..4106103b9e --- /dev/null +++ b/2024/CVE-2024-37673.md @@ -0,0 +1,17 @@ +### [CVE-2024-37673](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37673) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Cross Site Scripting vulnerability in Tessi Docubase Document Management product 5.x allows a remote attacker to execute arbitrary code via the filename parameter. + +### POC + +#### Reference +- https://github.com/MohamedAzizMSALLEMI/Docubase_Security/blob/main/CVE-2024-37673.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37674.md b/2024/CVE-2024-37674.md new file mode 100644 index 0000000000..a027995050 --- /dev/null +++ b/2024/CVE-2024-37674.md @@ -0,0 +1,17 @@ +### [CVE-2024-37674](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37674) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Cross Site Scripting vulnerability in Moodle CMS v3.10 allows a remote attacker to execute arbitrary code via the Field Name (name parameter) of a new activity. + +### POC + +#### Reference +- https://github.com/MohamedAzizMSALLEMI/Moodle_Security/blob/main/CVE-2024-37674.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37675.md b/2024/CVE-2024-37675.md new file mode 100644 index 0000000000..99000e1a46 --- /dev/null +++ b/2024/CVE-2024-37675.md @@ -0,0 +1,17 @@ +### [CVE-2024-37675](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37675) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Cross Site Scripting vulnerability in Tessi Docubase Document Management product 5.x allows a remote attacker to execute arbitrary code via the parameter "sectionContent" related to the functionality of adding notes to an uploaded file. + +### POC + +#### Reference +- https://github.com/MohamedAzizMSALLEMI/Docubase_Security/blob/main/CVE-2024-37675.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-3768.md b/2024/CVE-2024-3768.md index 1d722afc89..72c0f83395 100644 --- a/2024/CVE-2024-3768.md +++ b/2024/CVE-2024-3768.md @@ -11,6 +11,7 @@ A vulnerability, which was classified as critical, has been found in PHPGurukul #### Reference - https://github.com/BurakSevben/CVEs/blob/main/News%20Portal/News%20Portal%20-%20SQL%20Injection%20-%204.md +- https://vuldb.com/?id.260615 #### Github - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-37791.md b/2024/CVE-2024-37791.md new file mode 100644 index 0000000000..646b51c7cd --- /dev/null +++ b/2024/CVE-2024-37791.md @@ -0,0 +1,17 @@ +### [CVE-2024-37791](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37791) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +DuxCMS3 v3.1.3 was discovered to contain a SQL injection vulnerability via the keyword parameter at /article/Content/index?class_id. + +### POC + +#### Reference +- https://github.com/duxphp/DuxCMS3/issues/5 + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-37799.md b/2024/CVE-2024-37799.md new file mode 100644 index 0000000000..9d974a2fdb --- /dev/null +++ b/2024/CVE-2024-37799.md @@ -0,0 +1,17 @@ +### [CVE-2024-37799](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37799) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +CodeProjects Restaurant Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the reserv_id parameter at view_reservations.php. + +### POC + +#### Reference +- https://github.com/himanshubindra/CVEs/blob/main/CVE-2024-37799 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37803.md b/2024/CVE-2024-37803.md new file mode 100644 index 0000000000..f05add75e8 --- /dev/null +++ b/2024/CVE-2024-37803.md @@ -0,0 +1,17 @@ +### [CVE-2024-37803](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37803) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Multiple stored cross-site scripting (XSS) vulnerabilities in CodeProjects Health Care hospital Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the fname and lname parameters under the Staff Info page. + +### POC + +#### Reference +- https://github.com/himanshubindra/CVEs/blob/main/CVE-2024-37803 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37840.md b/2024/CVE-2024-37840.md new file mode 100644 index 0000000000..3488e5f43a --- /dev/null +++ b/2024/CVE-2024-37840.md @@ -0,0 +1,17 @@ +### [CVE-2024-37840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37840) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +SQL injection vulnerability in processscore.php in Itsourcecode Learning Management System Project In PHP With Source Code v1.0 allows remote attackers to execute arbitrary SQL commands via the LessonID parameter. + +### POC + +#### Reference +- https://github.com/ganzhi-qcy/cve/issues/4 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37848.md b/2024/CVE-2024-37848.md new file mode 100644 index 0000000000..59c6a448fd --- /dev/null +++ b/2024/CVE-2024-37848.md @@ -0,0 +1,17 @@ +### [CVE-2024-37848](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37848) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +SQL Injection vulnerability in Online-Bookstore-Project-In-PHP v1.0 allows a local attacker to execute arbitrary code via the admin_delete.php component. + +### POC + +#### Reference +- https://github.com/Lanxiy7th/lx_CVE_report-/issues/13 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37849.md b/2024/CVE-2024-37849.md new file mode 100644 index 0000000000..2e93bee59f --- /dev/null +++ b/2024/CVE-2024-37849.md @@ -0,0 +1,17 @@ +### [CVE-2024-37849](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37849) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A SQL Injection vulnerability in itsourcecode Billing System 1.0 allows a local attacker to execute arbitrary code in process.php via the username parameter. + +### POC + +#### Reference +- https://github.com/ganzhi-qcy/cve/issues/3 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37877.md b/2024/CVE-2024-37877.md new file mode 100644 index 0000000000..77a798c496 --- /dev/null +++ b/2024/CVE-2024-37877.md @@ -0,0 +1,17 @@ +### [CVE-2024-37877](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37877) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +UERANSIM before 3.2.6 allows out-of-bounds read when a RLS packet is sent to gNodeB with malformed PDU length. This occurs in function readOctetString in src/utils/octet_view.cpp and in function DecodeRlsMessage in src/lib/rls/rls_pdu.cpp + +### POC + +#### Reference +- https://github.com/f4rs1ght/vuln-research/tree/main/CVE-2024-37877 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37885.md b/2024/CVE-2024-37885.md new file mode 100644 index 0000000000..fa7d1ba309 --- /dev/null +++ b/2024/CVE-2024-37885.md @@ -0,0 +1,17 @@ +### [CVE-2024-37885](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37885) +![](https://img.shields.io/static/v1?label=Product&message=security-advisories&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%203.12.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20('Code%20Injection')&color=brighgreen) + +### Description + +The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with your computer. A code injection in Nextcloud Desktop Client for macOS allowed to load arbitrary code when starting the client with DYLD_INSERT_LIBRARIES set in the enviroment. It is recommended that the Nextcloud Desktop client is upgraded to 3.12.0. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/LOURC0D3/LOURC0D3 + diff --git a/2024/CVE-2024-37888.md b/2024/CVE-2024-37888.md new file mode 100644 index 0000000000..8226a78f5e --- /dev/null +++ b/2024/CVE-2024-37888.md @@ -0,0 +1,17 @@ +### [CVE-2024-37888](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37888) +![](https://img.shields.io/static/v1?label=Product&message=ckeditor-plugin-openlink&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.0.5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) + +### Description + +The Open Link is a CKEditor plugin, extending context menu with a possibility to open link in a new tab. The vulnerability allowed to execute JavaScript code by abusing link href attribute. It affects all users using the Open Link plugin at version < **1.0.5**. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-37889.md b/2024/CVE-2024-37889.md new file mode 100644 index 0000000000..6aaca38af5 --- /dev/null +++ b/2024/CVE-2024-37889.md @@ -0,0 +1,17 @@ +### [CVE-2024-37889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37889) +![](https://img.shields.io/static/v1?label=Product&message=MyFinances&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%200.4.6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key&color=brighgreen) + +### Description + +MyFinances is a web application for managing finances. MyFinances has a way to access other customer invoices while signed in as a user. This method allows an actor to access PII and financial information from another account. The vulnerability is fixed in 0.4.6. + +### POC + +#### Reference +- https://github.com/TreyWW/MyFinances/security/advisories/GHSA-4884-3gvp-3wj2 + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-37890.md b/2024/CVE-2024-37890.md new file mode 100644 index 0000000000..0087c3f961 --- /dev/null +++ b/2024/CVE-2024-37890.md @@ -0,0 +1,17 @@ +### [CVE-2024-37890](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37890) +![](https://img.shields.io/static/v1?label=Product&message=ws&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%202.1.0%2C%20%3C%205.2.4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-476%3A%20NULL%20Pointer%20Dereference&color=brighgreen) + +### Description + +ws is an open source WebSocket client and server for Node.js. A request with a number of headers exceeding theserver.maxHeadersCount threshold could be used to crash a ws server. The vulnerability was fixed in ws@8.17.1 (e55e510) and backported to ws@7.5.10 (22c2876), ws@6.2.3 (eeb76d3), and ws@5.2.4 (4abd8f6). In vulnerable versions of ws, the issue can be mitigated in the following ways: 1. Reduce the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options so that no more headers than the server.maxHeadersCount limit can be sent. 2. Set server.maxHeadersCount to 0 so that no limit is applied. + +### POC + +#### Reference +- https://github.com/websockets/ws/security/advisories/GHSA-3h5v-q93c-6h6q + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37891.md b/2024/CVE-2024-37891.md new file mode 100644 index 0000000000..c0113f6087 --- /dev/null +++ b/2024/CVE-2024-37891.md @@ -0,0 +1,17 @@ +### [CVE-2024-37891](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37891) +![](https://img.shields.io/static/v1?label=Product&message=urllib3&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.26.19%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-669%3A%20Incorrect%20Resource%20Transfer%20Between%20Spheres&color=brighgreen) + +### Description + + urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy-Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects. Because this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident. Users should use urllib3's proxy support or disable automatic redirects to achieve safe processing of the `Proxy-Authorization` header, but we still decided to strip the header by default in order to further protect users who aren't using the correct approach. We believe the number of usages affected by this advisory is low. It requires all of the following to be true to be exploited: 1. Setting the `Proxy-Authorization` header without using urllib3's built-in proxy support. 2. Not disabling HTTP redirects. 3. Either not using an HTTPS origin server or for the proxy or target origin to redirect to a malicious origin. Users are advised to update to either version 1.26.19 or version 2.2.2. Users unable to upgrade may use the `Proxy-Authorization` header with urllib3's `ProxyManager`, disable HTTP redirects using `redirects=False` when sending requests, or not user the `Proxy-Authorization` header as mitigations. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/PBorocz/raindrop-io-py + diff --git a/2024/CVE-2024-37896.md b/2024/CVE-2024-37896.md new file mode 100644 index 0000000000..ca642ed372 --- /dev/null +++ b/2024/CVE-2024-37896.md @@ -0,0 +1,17 @@ +### [CVE-2024-37896](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37896) +![](https://img.shields.io/static/v1?label=Product&message=gin-vue-admin&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%202.6.6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brighgreen) + +### Description + +Gin-vue-admin is a backstage management system based on vue and gin. Gin-vue-admin <= v2.6.5 has SQL injection vulnerability. The SQL injection vulnerabilities occur when a web application allows users to input data into SQL queries without sufficiently validating or sanitizing the input. Failing to properly enforce restrictions on user input could mean that even a basic form input field can be used to inject arbitrary and potentially dangerous SQL commands. This could lead to unauthorized access to the database, data leakage, data manipulation, or even complete compromise of the database server. This vulnerability has been addressed in commit `53d033821` which has been included in release version 2.6.6. Users are advised to upgrade. There are no known workarounds for this vulnerability. + +### POC + +#### Reference +- https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gf3r-h744-mqgp + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37904.md b/2024/CVE-2024-37904.md new file mode 100644 index 0000000000..8a81ab0e0b --- /dev/null +++ b/2024/CVE-2024-37904.md @@ -0,0 +1,17 @@ +### [CVE-2024-37904](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37904) +![](https://img.shields.io/static/v1?label=Product&message=minder&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%200.0.52%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-400%3A%20Uncontrolled%20Resource%20Consumption&color=brighgreen) + +### Description + +Minder is an open source Software Supply Chain Security Platform. Minder's Git provider is vulnerable to a denial of service from a maliciously configured GitHub repository. The Git provider clones users repositories using the `github.com/go-git/go-git/v5` library on lines `L55-L89`. The Git provider does the following on the lines `L56-L62`. First, it sets the `CloneOptions`, specifying the url, the depth etc. It then validates the options. It then sets up an in-memory filesystem, to which it clones and Finally, it clones the repository. The `(g *Git) Clone()` method is vulnerable to a DoS attack: A Minder user can instruct Minder to clone a large repository which will exhaust memory and crash the Minder server. The root cause of this vulnerability is a combination of the following conditions: 1. Users can control the Git URL which Minder clones, 2. Minder does not enforce a size limit to the repository, 3. Minder clones the entire repository into memory. This issue has been addressed in commit `7979b43` which has been included in release version v0.0.52. Users are advised to upgrade. There are no known workarounds for this vulnerability. + +### POC + +#### Reference +- https://github.com/stacklok/minder/security/advisories/GHSA-hpcg-xjq5-g666 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-38276.md b/2024/CVE-2024-38276.md new file mode 100644 index 0000000000..cffb3c065c --- /dev/null +++ b/2024/CVE-2024-38276.md @@ -0,0 +1,17 @@ +### [CVE-2024-38276](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38276) +![](https://img.shields.io/static/v1?label=Product&message=Moodle&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204.4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352&color=brighgreen) + +### Description + +Incorrect CSRF token checks resulted in multiple CSRF risks. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/cli-ish/cli-ish + diff --git a/2024/CVE-2024-38347.md b/2024/CVE-2024-38347.md new file mode 100644 index 0000000000..d9bfeb5dfd --- /dev/null +++ b/2024/CVE-2024-38347.md @@ -0,0 +1,17 @@ +### [CVE-2024-38347](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38347) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +CodeProjects Health Care hospital Management System v1.0 was discovered to contain a SQL injection vulnerability in the Room Information module via the id parameter. + +### POC + +#### Reference +- https://github.com/SandeepRajauriya/CVEs/blob/main/CVE-2024-38347 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-38348.md b/2024/CVE-2024-38348.md new file mode 100644 index 0000000000..ea6018f7fd --- /dev/null +++ b/2024/CVE-2024-38348.md @@ -0,0 +1,17 @@ +### [CVE-2024-38348](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38348) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +CodeProjects Health Care hospital Management System v1.0 was discovered to contain a SQL injection vulnerability in the Staff Info module via the searvalu parameter. + +### POC + +#### Reference +- https://github.com/SandeepRajauriya/CVEs/blob/main/CVE-2024-38348 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-38355.md b/2024/CVE-2024-38355.md new file mode 100644 index 0000000000..ce79d0aadc --- /dev/null +++ b/2024/CVE-2024-38355.md @@ -0,0 +1,18 @@ +### [CVE-2024-38355](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38355) +![](https://img.shields.io/static/v1?label=Product&message=socket.io&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%202.5.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%3A%20Improper%20Input%20Validation&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions&color=brighgreen) + +### Description + +Socket.IO is an open source, real-time, bidirectional, event-based, communication framework. A specially crafted Socket.IO packet can trigger an uncaught exception on the Socket.IO server, thus killing the Node.js process. This issue is fixed by commit `15af22fc22` which has been included in `socket.io@4.6.2` (released in May 2023). The fix was backported in the 2.x branch as well with commit `d30630ba10`. Users are advised to upgrade. Users unable to upgrade may attach a listener for the "error" event to catch these errors. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/Y0ursTruly/Y0ursTruly + diff --git a/2024/CVE-2024-38358.md b/2024/CVE-2024-38358.md new file mode 100644 index 0000000000..234e436d12 --- /dev/null +++ b/2024/CVE-2024-38358.md @@ -0,0 +1,17 @@ +### [CVE-2024-38358](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38358) +![](https://img.shields.io/static/v1?label=Product&message=wasmer&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%204.3.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen) + +### Description + +Wasmer is a web assembly (wasm) Runtime supporting WASIX, WASI and Emscripten. If the preopened directory has a symlink pointing outside, WASI programs can traverse the symlink and access host filesystem if the caller sets both `oflags::creat` and `rights::fd_write`. Programs can also crash the runtime by creating a symlink pointing outside with `path_symlink` and `path_open`ing the link. This issue has been addressed in commit `b9483d022` which has been included in release version 4.3.2. Users are advised to upgrade. There are no known workarounds for this vulnerability. + +### POC + +#### Reference +- https://github.com/wasmerio/wasmer/security/advisories/GHSA-55f3-3qvg-8pv5 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-38394.md b/2024/CVE-2024-38394.md new file mode 100644 index 0000000000..328bfeb9f7 --- /dev/null +++ b/2024/CVE-2024-38394.md @@ -0,0 +1,19 @@ +### [CVE-2024-38394](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38394) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +** DISPUTED ** Mismatches in interpreting USB authorization policy between GNOME Settings Daemon (GSD) through 46.0 and the Linux kernel's underlying device matching logic allow a physically proximate attacker to access some unintended Linux kernel USB functionality, such as USB device-specific kernel modules and filesystem implementations. NOTE: the GSD supplier indicates that consideration of a mitigation for this within GSD would be in the context of "a new feature, not a CVE." + +### POC + +#### Reference +- https://gitlab.gnome.org/GNOME/gnome-settings-daemon/-/issues/780 +- https://gitlab.gnome.org/GNOME/gnome-settings-daemon/-/issues/780#note_2047914 +- https://pulsesecurity.co.nz/advisories/usbguard-bypass + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-38395.md b/2024/CVE-2024-38395.md new file mode 100644 index 0000000000..b256ea9013 --- /dev/null +++ b/2024/CVE-2024-38395.md @@ -0,0 +1,17 @@ +### [CVE-2024-38395](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38395) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +In iTerm2 before 3.5.2, the "Terminal may report window title" setting is not honored, and thus remote code execution might occur but "is not trivially exploitable." + +### POC + +#### Reference +- http://www.openwall.com/lists/oss-security/2024/06/17/1 + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-38396.md b/2024/CVE-2024-38396.md new file mode 100644 index 0000000000..9d7b859462 --- /dev/null +++ b/2024/CVE-2024-38396.md @@ -0,0 +1,18 @@ +### [CVE-2024-38396](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38396) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue was discovered in iTerm2 3.5.x before 3.5.2. Unfiltered use of an escape sequence to report a window title, in combination with the built-in tmux integration feature (enabled by default), allows an attacker to inject arbitrary code into the terminal, a different vulnerability than CVE-2024-38395. + +### POC + +#### Reference +- http://www.openwall.com/lists/oss-security/2024/06/17/1 +- https://vin01.github.io/piptagole/escape-sequences/iterm2/rce/2024/06/16/iterm2-rce-window-title-tmux-integration.html + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-3840.md b/2024/CVE-2024-3840.md index f2cb9781f7..49a680dd34 100644 --- a/2024/CVE-2024-3840.md +++ b/2024/CVE-2024-3840.md @@ -10,7 +10,7 @@ Insufficient policy enforcement in Site Isolation in Google Chrome prior to 124. ### POC #### Reference -No PoCs from references. +- https://issues.chromium.org/issues/41493458 #### Github - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-38427.md b/2024/CVE-2024-38427.md new file mode 100644 index 0000000000..60dd2b432a --- /dev/null +++ b/2024/CVE-2024-38427.md @@ -0,0 +1,18 @@ +### [CVE-2024-38427](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38427) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +In International Color Consortium DemoIccMAX before 85ce74e, a logic flaw in CIccTagXmlProfileSequenceId::ParseXml in IccXML/IccLibXML/IccTagXml.cpp results in unconditionally returning false. + +### POC + +#### Reference +- https://github.com/InternationalColorConsortium/DemoIccMAX/pull/66 +- https://github.com/InternationalColorConsortium/DemoIccMAX/pull/66/commits/85ce74ef19fb0751c7e188b06daed22fe74c332c + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-38449.md b/2024/CVE-2024-38449.md new file mode 100644 index 0000000000..7c760801e5 --- /dev/null +++ b/2024/CVE-2024-38449.md @@ -0,0 +1,17 @@ +### [CVE-2024-38449](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38449) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A Directory Traversal vulnerability in KasmVNC 1.3.1.230e50f7b89663316c70de7b0e3db6f6b9340489 and possibly earlier versions allows remote authenticated attackers to browse parent directories and read the content of files outside the scope of the application. + +### POC + +#### Reference +- https://kasmweb.atlassian.net/servicedesk/customer/portal/3/topic/30ffee7f-4b85-4783-b118-6ae4fd8b0c52 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-38460.md b/2024/CVE-2024-38460.md new file mode 100644 index 0000000000..f895efc94f --- /dev/null +++ b/2024/CVE-2024-38460.md @@ -0,0 +1,17 @@ +### [CVE-2024-38460](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38460) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +In SonarQube before 10.4 and 9.9.4 LTA, encrypted values generated using the Settings Encryption feature are potentially exposed in cleartext as part of the URL parameters in the logs (such as SonarQube Access Logs, Proxy Logs, etc). + +### POC + +#### Reference +- https://sonarsource.atlassian.net/browse/SONAR-21559 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-38469.md b/2024/CVE-2024-38469.md new file mode 100644 index 0000000000..e28a4a4dc9 --- /dev/null +++ b/2024/CVE-2024-38469.md @@ -0,0 +1,17 @@ +### [CVE-2024-38469](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38469) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +zhimengzhe iBarn v1.5 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the $search parameter at /pay.php. + +### POC + +#### Reference +- https://github.com/zhimengzhe/iBarn/issues/20 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-38470.md b/2024/CVE-2024-38470.md new file mode 100644 index 0000000000..409a357886 --- /dev/null +++ b/2024/CVE-2024-38470.md @@ -0,0 +1,17 @@ +### [CVE-2024-38470](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38470) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +zhimengzhe iBarn v1.5 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the $search parameter at /own.php. + +### POC + +#### Reference +- https://github.com/zhimengzhe/iBarn/issues/20 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-3882.md b/2024/CVE-2024-3882.md index bc5db5c91f..8c8a74660a 100644 --- a/2024/CVE-2024-3882.md +++ b/2024/CVE-2024-3882.md @@ -11,6 +11,7 @@ A vulnerability was found in Tenda W30E 1.0.1.25(633). It has been classified as #### Reference - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromRouteStatic.md +- https://vuldb.com/?id.260916 #### Github No PoCs found on GitHub currently. diff --git a/2024/CVE-2024-3922.md b/2024/CVE-2024-3922.md new file mode 100644 index 0000000000..c07dfc1e02 --- /dev/null +++ b/2024/CVE-2024-3922.md @@ -0,0 +1,17 @@ +### [CVE-2024-3922](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3922) +![](https://img.shields.io/static/v1?label=Product&message=Dokan%20Pro&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%203.10.3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brighgreen) + +### Description + +The Dokan Pro plugin for WordPress is vulnerable to SQL Injection via the 'code' parameter in all versions up to, and including, 3.10.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-3965.md b/2024/CVE-2024-3965.md new file mode 100644 index 0000000000..8a86491aaf --- /dev/null +++ b/2024/CVE-2024-3965.md @@ -0,0 +1,17 @@ +### [CVE-2024-3965](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3965) +![](https://img.shields.io/static/v1?label=Product&message=Pray%20For%20Me&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +The Pray For Me WordPress plugin through 1.0.4 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack + +### POC + +#### Reference +- https://wpscan.com/vulnerability/0e1ba2b3-5849-42f6-b503-8b3b520e4a79/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-3966.md b/2024/CVE-2024-3966.md new file mode 100644 index 0000000000..523f32c504 --- /dev/null +++ b/2024/CVE-2024-3966.md @@ -0,0 +1,17 @@ +### [CVE-2024-3966](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3966) +![](https://img.shields.io/static/v1?label=Product&message=Pray%20For%20Me&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The Pray For Me WordPress plugin through 1.0.4 does not sanitise and escape some parameters, which could unauthenticated visitors to perform Cross-Site Scripting attacks that trigger when an admin visits the Prayer Requests in the WP Admin + +### POC + +#### Reference +- https://wpscan.com/vulnerability/9f0a575f-862d-4f2e-8d25-82c6f58dd11a/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-3971.md b/2024/CVE-2024-3971.md new file mode 100644 index 0000000000..96322cd4f3 --- /dev/null +++ b/2024/CVE-2024-3971.md @@ -0,0 +1,18 @@ +### [CVE-2024-3971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3971) +![](https://img.shields.io/static/v1?label=Product&message=Similarity&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The Similarity WordPress plugin through 3.0 does not have CSRF check in place when resetting its settings, which could allow attackers to make a logged in admin reset them via a CSRF attack + +### POC + +#### Reference +- https://wpscan.com/vulnerability/5dec5719-105d-4989-a97f-bda04d223322/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-3972.md b/2024/CVE-2024-3972.md new file mode 100644 index 0000000000..e5e3492499 --- /dev/null +++ b/2024/CVE-2024-3972.md @@ -0,0 +1,18 @@ +### [CVE-2024-3972](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3972) +![](https://img.shields.io/static/v1?label=Product&message=Similarity&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The Similarity WordPress plugin through 3.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack + +### POC + +#### Reference +- https://wpscan.com/vulnerability/55dfb9b5-d590-478b-bd1f-d420b79037fa/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-3977.md b/2024/CVE-2024-3977.md new file mode 100644 index 0000000000..bed80a8040 --- /dev/null +++ b/2024/CVE-2024-3977.md @@ -0,0 +1,17 @@ +### [CVE-2024-3977](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3977) +![](https://img.shields.io/static/v1?label=Product&message=WordPress%20Jitsi%20Shortcode&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The WordPress Jitsi Shortcode WordPress plugin through 0.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) + +### POC + +#### Reference +- https://wpscan.com/vulnerability/25851386-eccf-49cb-afbf-c25286c9b19e/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-3978.md b/2024/CVE-2024-3978.md new file mode 100644 index 0000000000..87a2bbca62 --- /dev/null +++ b/2024/CVE-2024-3978.md @@ -0,0 +1,17 @@ +### [CVE-2024-3978](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3978) +![](https://img.shields.io/static/v1?label=Product&message=WordPress%20Jitsi%20Shortcode&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The WordPress Jitsi Shortcode WordPress plugin through 0.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks + +### POC + +#### Reference +- https://wpscan.com/vulnerability/a9f47d11-47ac-4998-a82a-dc2f3b0decdf/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-3992.md b/2024/CVE-2024-3992.md new file mode 100644 index 0000000000..551277c8e6 --- /dev/null +++ b/2024/CVE-2024-3992.md @@ -0,0 +1,17 @@ +### [CVE-2024-3992](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3992) +![](https://img.shields.io/static/v1?label=Product&message=Amen&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The Amen WordPress plugin through 3.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) + +### POC + +#### Reference +- https://wpscan.com/vulnerability/e9fe3101-8033-4eee-8b37-06856872e9ef/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-3993.md b/2024/CVE-2024-3993.md new file mode 100644 index 0000000000..4cfead9943 --- /dev/null +++ b/2024/CVE-2024-3993.md @@ -0,0 +1,18 @@ +### [CVE-2024-3993](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3993) +![](https://img.shields.io/static/v1?label=Product&message=AZAN%20Plugin&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The AZAN Plugin WordPress plugin through 0.6 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack + +### POC + +#### Reference +- https://wpscan.com/vulnerability/19cd60dd-8599-4af3-99db-c42de504606c/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4005.md b/2024/CVE-2024-4005.md new file mode 100644 index 0000000000..e16c938143 --- /dev/null +++ b/2024/CVE-2024-4005.md @@ -0,0 +1,17 @@ +### [CVE-2024-4005](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4005) +![](https://img.shields.io/static/v1?label=Product&message=Social%20Pixel&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The Social Pixel WordPress plugin through 2.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) + +### POC + +#### Reference +- https://wpscan.com/vulnerability/02ca09f8-4080-4969-992d-0e6afb29bc62/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4040.md b/2024/CVE-2024-4040.md index da624de538..28e550381c 100644 --- a/2024/CVE-2024-4040.md +++ b/2024/CVE-2024-4040.md @@ -24,6 +24,7 @@ A server side template injection vulnerability in CrushFTP in all versions befor - https://github.com/Y4tacker/JavaSec - https://github.com/absholi7ly/absholi7ly - https://github.com/airbus-cert/CVE-2024-4040 +- https://github.com/enomothem/PenTestNote - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/getdrive/PoC - https://github.com/gotr00t0day/CVE-2024-4040 diff --git a/2024/CVE-2024-4068.md b/2024/CVE-2024-4068.md index 20c4c39c6a..86f3d52f1e 100644 --- a/2024/CVE-2024-4068.md +++ b/2024/CVE-2024-4068.md @@ -14,5 +14,5 @@ The NPM package `braces`, versions prior to 3.0.3, fails to limit the number of - https://github.com/micromatch/braces/pull/37 #### Github -No PoCs found on GitHub currently. +- https://github.com/seal-community/patches diff --git a/2024/CVE-2024-4094.md b/2024/CVE-2024-4094.md new file mode 100644 index 0000000000..79e5e3838c --- /dev/null +++ b/2024/CVE-2024-4094.md @@ -0,0 +1,17 @@ +### [CVE-2024-4094](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4094) +![](https://img.shields.io/static/v1?label=Product&message=Simple%20Share%20Buttons%20Adder&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%208.5.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The Simple Share Buttons Adder WordPress plugin before 8.5.1 does not sanitise and escape some of its settings, which could allow high privilege users such as editors to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed + +### POC + +#### Reference +- https://wpscan.com/vulnerability/04b2feba-e009-4fce-8539-5dfdb4300433/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4145.md b/2024/CVE-2024-4145.md new file mode 100644 index 0000000000..496b16a68f --- /dev/null +++ b/2024/CVE-2024-4145.md @@ -0,0 +1,17 @@ +### [CVE-2024-4145](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4145) +![](https://img.shields.io/static/v1?label=Product&message=Search%20%26%20Replace&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%203.2.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +The Search & Replace WordPress plugin before 3.2.2 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks (such as within a multi-site network). + +### POC + +#### Reference +- https://wpscan.com/vulnerability/7d5b8764-c82d-4969-a707-f38b63bcadca/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4149.md b/2024/CVE-2024-4149.md new file mode 100644 index 0000000000..a947fa79a8 --- /dev/null +++ b/2024/CVE-2024-4149.md @@ -0,0 +1,17 @@ +### [CVE-2024-4149](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4149) +![](https://img.shields.io/static/v1?label=Product&message=Floating%20Chat%20Widget%3A%20Contact%20Chat%20Icons%2C%20WhatsApp%2C%20Telegram%20Chat%2C%20Line%20Messenger%2C%20WeChat%2C%20Email%2C%20SMS%2C%20Call%20Button%20&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%203.2.3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The Floating Chat Widget: Contact Chat Icons, WhatsApp, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button WordPress plugin before 3.2.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). + +### POC + +#### Reference +- https://wpscan.com/vulnerability/0256ec2a-f1a9-4110-9978-ee88f9e24237/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4231.md b/2024/CVE-2024-4231.md new file mode 100644 index 0000000000..241ba219dd --- /dev/null +++ b/2024/CVE-2024-4231.md @@ -0,0 +1,17 @@ +### [CVE-2024-4231](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4231) +![](https://img.shields.io/static/v1?label=Product&message=Digisol%20Router%20DG-GR1321&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20v3.2.02%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1191%3A%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control&color=brighgreen) + +### Description + +This vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version : v3.2.02) due to presence of root terminal access on a serial interface without proper access control. An attacker with physical access could exploit this by identifying UART pins and accessing the root shell on the vulnerable system.Successful exploitation of this vulnerability could allow the attacker to access the sensitive information on the targeted system. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-4232.md b/2024/CVE-2024-4232.md new file mode 100644 index 0000000000..3f850a0929 --- /dev/null +++ b/2024/CVE-2024-4232.md @@ -0,0 +1,17 @@ +### [CVE-2024-4232](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4232) +![](https://img.shields.io/static/v1?label=Product&message=Digisol%20Router%20DG-GR1321&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20v3.2.02%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password&color=brighgreen) + +### Description + +This vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version : v3.2.02) due to lack of encryption or hashing in storing of passwords within the router's firmware/ database. An attacker with physical access could exploit this by extracting the firmware and reverse engineer the binary data to access the plaintext passwords on the vulnerable system.Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted system. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-4270.md b/2024/CVE-2024-4270.md new file mode 100644 index 0000000000..a05bb686b9 --- /dev/null +++ b/2024/CVE-2024-4270.md @@ -0,0 +1,17 @@ +### [CVE-2024-4270](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4270) +![](https://img.shields.io/static/v1?label=Product&message=SVGMagic&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The SVGMagic WordPress plugin through 1.1 does not sanitize SVG file contents, which enables users with at least the author role to SVG with malicious JavaScript to conduct Stored XSS attacks. + +### POC + +#### Reference +- https://wpscan.com/vulnerability/7a3b89cc-7a81-448a-94fc-36a7033609d5/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4271.md b/2024/CVE-2024-4271.md new file mode 100644 index 0000000000..a4aaead59f --- /dev/null +++ b/2024/CVE-2024-4271.md @@ -0,0 +1,17 @@ +### [CVE-2024-4271](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4271) +![](https://img.shields.io/static/v1?label=Product&message=SVGator%20&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The SVGator WordPress plugin through 1.2.6 does not sanitize SVG file contents, which enables users with at least the author role to SVG with malicious JavaScript to conduct Stored XSS attacks. + +### POC + +#### Reference +- https://wpscan.com/vulnerability/c1fe0bc7-a340-428e-a549-1e37291bea1c/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4305.md b/2024/CVE-2024-4305.md new file mode 100644 index 0000000000..babcdb1e10 --- /dev/null +++ b/2024/CVE-2024-4305.md @@ -0,0 +1,17 @@ +### [CVE-2024-4305](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4305) +![](https://img.shields.io/static/v1?label=Product&message=Post%20Grid%20Gutenberg%20Blocks%20and%20WordPress%20Blog%20Plugin%20&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%204.1.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The Post Grid Gutenberg Blocks and WordPress Blog Plugin WordPress plugin before 4.1.0 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks + +### POC + +#### Reference +- https://wpscan.com/vulnerability/635be98d-4c17-4e75-871f-9794d85a2eb1/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4358.md b/2024/CVE-2024-4358.md index 6efcb4826a..07d5af395c 100644 --- a/2024/CVE-2024-4358.md +++ b/2024/CVE-2024-4358.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/GhostTroops/TOP - https://github.com/Harydhk7/CVE-2024-4358 +- https://github.com/Ostorlab/KEV - https://github.com/RevoltSecurities/CVE-2024-4358 - https://github.com/Sk1dr0wz/CVE-2024-4358_Mass_Exploit - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-4369.md b/2024/CVE-2024-4369.md index e40ffd015b..6975e52d81 100644 --- a/2024/CVE-2024-4369.md +++ b/2024/CVE-2024-4369.md @@ -1,5 +1,6 @@ ### [CVE-2024-4369](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4369) -![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20OpenShift%20Container%20Platform%204&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20OpenShift%20Container%20Platform%204.14&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20OpenShift%20Container%20Platform%204.15&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Cleartext%20Storage%20of%20Sensitive%20Information%20in%20an%20Environment%20Variable&color=brighgreen) diff --git a/2024/CVE-2024-4377.md b/2024/CVE-2024-4377.md new file mode 100644 index 0000000000..27bc435fb6 --- /dev/null +++ b/2024/CVE-2024-4377.md @@ -0,0 +1,17 @@ +### [CVE-2024-4377](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4377) +![](https://img.shields.io/static/v1?label=Product&message=DOP%20Shortcodes&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The DOP Shortcodes WordPress plugin through 1.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks + +### POC + +#### Reference +- https://wpscan.com/vulnerability/778cebec-bdbb-4538-9518-c5bd50f76961/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4381.md b/2024/CVE-2024-4381.md new file mode 100644 index 0000000000..87714db347 --- /dev/null +++ b/2024/CVE-2024-4381.md @@ -0,0 +1,17 @@ +### [CVE-2024-4381](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4381) +![](https://img.shields.io/static/v1?label=Product&message=CB%20(legacy)&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The CB (legacy) WordPress plugin through 0.9.4.18 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) + +### POC + +#### Reference +- https://wpscan.com/vulnerability/9b3cda9a-17a7-4173-93a2-d552a874fae9/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4382.md b/2024/CVE-2024-4382.md new file mode 100644 index 0000000000..ed3edc7c4a --- /dev/null +++ b/2024/CVE-2024-4382.md @@ -0,0 +1,17 @@ +### [CVE-2024-4382](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4382) +![](https://img.shields.io/static/v1?label=Product&message=CB%20(legacy)&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +The CB (legacy) WordPress plugin through 0.9.4.18 does not have CSRF checks in some bulk actions, which could allow attackers to make logged in admins perform unwanted actions, such as deleting codes, timeframes, and bookings via CSRF attacks + +### POC + +#### Reference +- https://wpscan.com/vulnerability/1a67aeab-8145-4c8a-9c18-e6436fa39b63/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4384.md b/2024/CVE-2024-4384.md new file mode 100644 index 0000000000..19bb12faed --- /dev/null +++ b/2024/CVE-2024-4384.md @@ -0,0 +1,17 @@ +### [CVE-2024-4384](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4384) +![](https://img.shields.io/static/v1?label=Product&message=CSSable%20Countdown&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The CSSable Countdown WordPress plugin through 1.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) + +### POC + +#### Reference +- https://wpscan.com/vulnerability/ad714196-2590-4dc9-b5b9-50808e9e0d26/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4474.md b/2024/CVE-2024-4474.md new file mode 100644 index 0000000000..638b1539ee --- /dev/null +++ b/2024/CVE-2024-4474.md @@ -0,0 +1,17 @@ +### [CVE-2024-4474](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4474) +![](https://img.shields.io/static/v1?label=Product&message=WP%20Logs%20Book&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +The WP Logs Book WordPress plugin through 1.0.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack + +### POC + +#### Reference +- https://wpscan.com/vulnerability/71954c60-6a5b-4cac-9920-6d9b787ead9c/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4475.md b/2024/CVE-2024-4475.md new file mode 100644 index 0000000000..cf8d8111a5 --- /dev/null +++ b/2024/CVE-2024-4475.md @@ -0,0 +1,17 @@ +### [CVE-2024-4475](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4475) +![](https://img.shields.io/static/v1?label=Product&message=WP%20Logs%20Book&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +The WP Logs Book WordPress plugin through 1.0.1 does not have CSRF check when clearing logs, which could allow attackers to make a logged in admin clear the logs them via a CSRF attack + +### POC + +#### Reference +- https://wpscan.com/vulnerability/f0c7fa00-da6e-4f07-875f-7b85759a54b3/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4477.md b/2024/CVE-2024-4477.md new file mode 100644 index 0000000000..644487245a --- /dev/null +++ b/2024/CVE-2024-4477.md @@ -0,0 +1,17 @@ +### [CVE-2024-4477](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4477) +![](https://img.shields.io/static/v1?label=Product&message=WP%20Logs%20Book&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The WP Logs Book WordPress plugin through 1.0.1 does not sanitise and escape some of its log data before outputting them back in an admin dashboard, leading to an Unauthenticated Stored Cross-Site Scripting + +### POC + +#### Reference +- https://wpscan.com/vulnerability/ab551552-944c-4e2a-9355-7011cbe553b0/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4480.md b/2024/CVE-2024-4480.md new file mode 100644 index 0000000000..ce37619504 --- /dev/null +++ b/2024/CVE-2024-4480.md @@ -0,0 +1,17 @@ +### [CVE-2024-4480](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4480) +![](https://img.shields.io/static/v1?label=Product&message=WP%20Prayer%20II&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +The WP Prayer II WordPress plugin through 2.4.7 does not have CSRF check in place when updating its email settings, which could allow attackers to make a logged in admin change them via a CSRF attack + +### POC + +#### Reference +- https://wpscan.com/vulnerability/c1e5dee9-c540-4cc1-8b94-c6d1650b52d3/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4484.md b/2024/CVE-2024-4484.md new file mode 100644 index 0000000000..fef819e8f3 --- /dev/null +++ b/2024/CVE-2024-4484.md @@ -0,0 +1,17 @@ +### [CVE-2024-4484](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4484) +![](https://img.shields.io/static/v1?label=Product&message=The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Addons%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%205.5.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) + +### Description + +The The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘xai_username’ parameter in versions up to, and including, 5.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-4565.md b/2024/CVE-2024-4565.md new file mode 100644 index 0000000000..2ae39ed6db --- /dev/null +++ b/2024/CVE-2024-4565.md @@ -0,0 +1,18 @@ +### [CVE-2024-4565](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4565) +![](https://img.shields.io/static/v1?label=Product&message=Advanced%20Custom%20Fields%20(ACF)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Advanced%20Custom%20Fields%20Pro&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%206.3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-284%20Improper%20Access%20Control&color=brighgreen) + +### Description + +The Advanced Custom Fields (ACF) WordPress plugin before 6.3, Advanced Custom Fields Pro WordPress plugin before 6.3 allows you to display custom field values for any post via shortcode without checking for the correct access + +### POC + +#### Reference +- https://wpscan.com/vulnerability/430224c4-d6e3-4ca8-b1bc-b2229a9bcf12/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4577.md b/2024/CVE-2024-4577.md index a22482274e..8a5e2075ee 100644 --- a/2024/CVE-2024-4577.md +++ b/2024/CVE-2024-4577.md @@ -11,6 +11,7 @@ In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, w #### Reference - https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ +- https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately - https://github.com/11whoami99/CVE-2024-4577 - https://github.com/watchtowrlabs/CVE-2024-4577 - https://github.com/xcanwin/CVE-2024-4577-PHP-RCE @@ -18,19 +19,27 @@ In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, w #### Github - https://github.com/0x20c/CVE-2024-4577-nuclei +- https://github.com/0xMarcio/cve - https://github.com/0xsyr0/OSCP +- https://github.com/11whoami99/CVE-2024-4577 - https://github.com/Chocapikk/CVE-2024-4577 - https://github.com/GhostTroops/TOP - https://github.com/Junp0/CVE-2024-4577 - https://github.com/K3ysTr0K3R/CVE-2024-4577-EXPLOIT - https://github.com/K3ysTr0K3R/K3ysTr0K3R +- https://github.com/Ostorlab/KEV - https://github.com/Sysc4ll3r/CVE-2024-4577 - https://github.com/TAM-K592/CVE-2024-4577 +- https://github.com/Threekiii/Awesome-POC +- https://github.com/Threekiii/CVE - https://github.com/WanLiChangChengWanLiChang/CVE-2024-4577-RCE-EXP - https://github.com/Wh02m1/CVE-2024-4577 +- https://github.com/XiangDongCJC/CVE-2024-4577-PHP-CGI-RCE - https://github.com/Yukiioz/CVE-2024-4577 - https://github.com/ZephrFish/CVE-2024-4577-PHP-RCE +- https://github.com/bl4cksku11/CVE-2024-4577 - https://github.com/dbyMelina/CVE-2024-4577 +- https://github.com/enomothem/PenTestNote - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/huseyinstif/CVE-2024-4577-Nuclei-Template - https://github.com/it-t4mpan/check_cve_2024_4577.sh @@ -41,7 +50,9 @@ In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, w - https://github.com/taida957789/CVE-2024-4577 - https://github.com/tanjiti/sec_profile - https://github.com/vwilzz/PHP-RCE-4577 +- https://github.com/watchtowrlabs/CVE-2024-4577 - https://github.com/wy876/POC - https://github.com/wy876/wiki +- https://github.com/xcanwin/CVE-2024-4577-PHP-RCE - https://github.com/zomasec/CVE-2024-4577 diff --git a/2024/CVE-2024-4603.md b/2024/CVE-2024-4603.md index 19c14d27db..309629ce51 100644 --- a/2024/CVE-2024-4603.md +++ b/2024/CVE-2024-4603.md @@ -13,6 +13,7 @@ Issue summary: Checking excessively long DSA keys or parameters may be veryslow. No PoCs from references. #### Github +- https://github.com/bcgov/jag-cdds - https://github.com/chnzzh/OpenSSL-CVE-lib - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-4616.md b/2024/CVE-2024-4616.md new file mode 100644 index 0000000000..57c652aa82 --- /dev/null +++ b/2024/CVE-2024-4616.md @@ -0,0 +1,17 @@ +### [CVE-2024-4616](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4616) +![](https://img.shields.io/static/v1?label=Product&message=Widget%20Bundle&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The Widget Bundle WordPress plugin through 2.0.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against only unauthenticated users + +### POC + +#### Reference +- https://wpscan.com/vulnerability/d203bf3b-aee9-4755-b429-d6bbdd940890/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4744.md b/2024/CVE-2024-4744.md new file mode 100644 index 0000000000..426a685f60 --- /dev/null +++ b/2024/CVE-2024-4744.md @@ -0,0 +1,17 @@ +### [CVE-2024-4744](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4744) +![](https://img.shields.io/static/v1?label=Product&message=iPages%20Flipbook&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in Avirtum iPages Flipbook.This issue affects iPages Flipbook: from n/a through 1.5.1. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-4745.md b/2024/CVE-2024-4745.md new file mode 100644 index 0000000000..aa532fa9ba --- /dev/null +++ b/2024/CVE-2024-4745.md @@ -0,0 +1,17 @@ +### [CVE-2024-4745](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4745) +![](https://img.shields.io/static/v1?label=Product&message=Giveaways%20and%20Contests%20by%20RafflePress&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in RafflePress Giveaways and Contests by RafflePress.This issue affects Giveaways and Contests by RafflePress: from n/a through 1.12.4. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-4746.md b/2024/CVE-2024-4746.md new file mode 100644 index 0000000000..4d9c455c99 --- /dev/null +++ b/2024/CVE-2024-4746.md @@ -0,0 +1,17 @@ +### [CVE-2024-4746](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4746) +![](https://img.shields.io/static/v1?label=Product&message=Netgsm&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%202.9.16%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in Netgsm.This issue affects Netgsm: from n/a through 2.9.16. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-4751.md b/2024/CVE-2024-4751.md new file mode 100644 index 0000000000..1fcaf87ad8 --- /dev/null +++ b/2024/CVE-2024-4751.md @@ -0,0 +1,17 @@ +### [CVE-2024-4751](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4751) +![](https://img.shields.io/static/v1?label=Product&message=WP%20Prayer%20II&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +The WP Prayer II WordPress plugin through 2.4.7 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack + +### POC + +#### Reference +- https://wpscan.com/vulnerability/94f4cc45-4c55-43d4-8ad2-a20c118b589f/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4755.md b/2024/CVE-2024-4755.md new file mode 100644 index 0000000000..b30b99f142 --- /dev/null +++ b/2024/CVE-2024-4755.md @@ -0,0 +1,17 @@ +### [CVE-2024-4755](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4755) +![](https://img.shields.io/static/v1?label=Product&message=Google%20CSE&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The Google CSE WordPress plugin through 1.0.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) + +### POC + +#### Reference +- https://wpscan.com/vulnerability/adc6ea6d-29d8-4ad0-b0db-2540e8b3f9a9/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4859.md b/2024/CVE-2024-4859.md index 38874d0a71..1647d9606d 100644 --- a/2024/CVE-2024-4859.md +++ b/2024/CVE-2024-4859.md @@ -13,5 +13,6 @@ Solidus <= 4.3.4 is affected by a Stored Cross-Site Scripting vulnerability in No PoCs from references. #### Github +- https://github.com/JoshuaMart/JoshuaMart - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-4860.md b/2024/CVE-2024-4860.md index 1dabcbe1db..700cf2c676 100644 --- a/2024/CVE-2024-4860.md +++ b/2024/CVE-2024-4860.md @@ -13,5 +13,6 @@ The 'WordPress RSS Aggregator' WordPress Plugin, versions < 4.23.9 are affected - https://www.tenable.com/security/research/tra-2024-16 #### Github +- https://github.com/JoshuaMart/JoshuaMart - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-4898.md b/2024/CVE-2024-4898.md new file mode 100644 index 0000000000..9da9406ed2 --- /dev/null +++ b/2024/CVE-2024-4898.md @@ -0,0 +1,17 @@ +### [CVE-2024-4898](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4898) +![](https://img.shields.io/static/v1?label=Product&message=InstaWP%20Connect%20%E2%80%93%201-click%20WP%20Staging%20%26%20Migration&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%200.1.0.38%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary option updates due to a missing authorization checks on the REST API calls in all versions up to, and including, 0.1.0.38. This makes it possible for unauthenticated attackers to connect the site to InstaWP API, edit arbitrary site options and create administrator accounts. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-4924.md b/2024/CVE-2024-4924.md new file mode 100644 index 0000000000..551090421a --- /dev/null +++ b/2024/CVE-2024-4924.md @@ -0,0 +1,17 @@ +### [CVE-2024-4924](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4924) +![](https://img.shields.io/static/v1?label=Product&message=Social%20Sharing%20Plugin%20&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%203.3.63%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The Social Sharing Plugin WordPress plugin before 3.3.63 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) + +### POC + +#### Reference +- https://wpscan.com/vulnerability/1867505f-d112-4919-9fd5-01745aa0433e/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4956.md b/2024/CVE-2024-4956.md index 79534f46a1..9612903684 100644 --- a/2024/CVE-2024-4956.md +++ b/2024/CVE-2024-4956.md @@ -23,6 +23,7 @@ No PoCs from references. - https://github.com/X1r0z/JettyFuzz - https://github.com/banditzCyber0x/CVE-2024-4956 - https://github.com/codeb0ss/CVE-2024-4956-PoC +- https://github.com/enomothem/PenTestNote - https://github.com/erickfernandox/CVE-2024-4956 - https://github.com/fin3ss3g0d/CVE-2024-4956 - https://github.com/fin3ss3g0d/Shiro1Extractor diff --git a/2024/CVE-2024-4960.md b/2024/CVE-2024-4960.md new file mode 100644 index 0000000000..1d647af79a --- /dev/null +++ b/2024/CVE-2024-4960.md @@ -0,0 +1,17 @@ +### [CVE-2024-4960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4960) +![](https://img.shields.io/static/v1?label=Product&message=DAR-7000-40&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20V31R02B1413C%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%20Unrestricted%20Upload&color=brighgreen) + +### Description + +** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical has been found in D-Link DAR-7000-40 V31R02B1413C. Affected is an unknown function of the file interface/sysmanage/licenseauthorization.php. The manipulation of the argument file_upload leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264528. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/JoshuaMart/JoshuaMart + diff --git a/2024/CVE-2024-4969.md b/2024/CVE-2024-4969.md new file mode 100644 index 0000000000..9b53e62abd --- /dev/null +++ b/2024/CVE-2024-4969.md @@ -0,0 +1,17 @@ +### [CVE-2024-4969](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4969) +![](https://img.shields.io/static/v1?label=Product&message=Widget%20Bundle&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +The Widget Bundle WordPress plugin through 2.0.0 does not have CSRF checks when logging Widgets, which could allow attackers to make logged in admin enable/disable widgets via a CSRF attack + +### POC + +#### Reference +- https://wpscan.com/vulnerability/1a7ec5dc-eda4-4fed-9df9-f41d2b937fed/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4970.md b/2024/CVE-2024-4970.md new file mode 100644 index 0000000000..40c77d663f --- /dev/null +++ b/2024/CVE-2024-4970.md @@ -0,0 +1,17 @@ +### [CVE-2024-4970](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4970) +![](https://img.shields.io/static/v1?label=Product&message=Widget%20Bundle&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The Widget Bundle WordPress plugin through 2.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) + +### POC + +#### Reference +- https://wpscan.com/vulnerability/4a9fc352-7ec2-4992-9cda-7bdca4f42788/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-5102.md b/2024/CVE-2024-5102.md new file mode 100644 index 0000000000..b999267875 --- /dev/null +++ b/2024/CVE-2024-5102.md @@ -0,0 +1,17 @@ +### [CVE-2024-5102](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5102) +![](https://img.shields.io/static/v1?label=Product&message=Antivirus&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2024.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input&color=brighgreen) + +### Description + +A sym-linked file accessed via the repair function in Avast Antivirus <24.2 on Windows may allow user to elevate privilege to delete arbitrary files or run processes as NT AUTHORITY\SYSTEM. The vulnerability exists within the "Repair" (settings -> troubleshooting -> repair) feature, which attempts to delete a file in the current user's AppData directory as NT AUTHORITY\SYSTEM. A low-privileged user can make a pseudo-symlink and a junction folder and point to a file on the system. This can provide a low-privileged user an Elevation of Privilege to win a race-condition which will re-create the system files and make Windows callback to a specially-crafted file which could be used to launch a privileged shell instance.This issue affects Avast Antivirus prior to 24.2. + +### POC + +#### Reference +- https://support.norton.com/sp/static/external/tools/security-advisories.html + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-5155.md b/2024/CVE-2024-5155.md new file mode 100644 index 0000000000..3d9b069c02 --- /dev/null +++ b/2024/CVE-2024-5155.md @@ -0,0 +1,18 @@ +### [CVE-2024-5155](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5155) +![](https://img.shields.io/static/v1?label=Product&message=Inquiry%20cart&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The Inquiry cart WordPress plugin through 3.4.2 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack + +### POC + +#### Reference +- https://wpscan.com/vulnerability/f1e90a8a-d959-4316-a5d4-e183854944bd/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-5172.md b/2024/CVE-2024-5172.md new file mode 100644 index 0000000000..b2b421fda5 --- /dev/null +++ b/2024/CVE-2024-5172.md @@ -0,0 +1,17 @@ +### [CVE-2024-5172](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5172) +![](https://img.shields.io/static/v1?label=Product&message=Expert%20Invoice&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The Expert Invoice WordPress plugin through 1.0.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) + +### POC + +#### Reference +- https://wpscan.com/vulnerability/65d84e69-0548-4c7d-bcde-5777d72da555/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-5208.md b/2024/CVE-2024-5208.md new file mode 100644 index 0000000000..013bc865ea --- /dev/null +++ b/2024/CVE-2024-5208.md @@ -0,0 +1,17 @@ +### [CVE-2024-5208](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5208) +![](https://img.shields.io/static/v1?label=Product&message=mintplex-labs%2Fanything-llm&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%201.0.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-400%20Uncontrolled%20Resource%20Consumption&color=brighgreen) + +### Description + +An uncontrolled resource consumption vulnerability exists in the `upload-link` endpoint of mintplex-labs/anything-llm. This vulnerability allows attackers to cause a denial of service (DOS) by shutting down the server through sending invalid upload requests. Specifically, the server can be made to shut down by sending an empty body with a 'Content-Length: 0' header or by sending a body with arbitrary content, such as 'asdasdasd', with a 'Content-Length: 9' header. The vulnerability is reproducible by users with at least a 'Manager' role, sending a crafted request to any workspace. This issue indicates that a previous fix was not effective in mitigating the vulnerability. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/sev-hack/sev-hack + diff --git a/2024/CVE-2024-5410.md b/2024/CVE-2024-5410.md index 660bcd8d7b..95a282da72 100644 --- a/2024/CVE-2024-5410.md +++ b/2024/CVE-2024-5410.md @@ -10,6 +10,7 @@ Missing input validation in the ORing IAP-420 web-interface allows stored Cross- ### POC #### Reference +- http://seclists.org/fulldisclosure/2024/May/36 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-oring-iap420/ #### Github diff --git a/2024/CVE-2024-5411.md b/2024/CVE-2024-5411.md index e3ad2cda6e..3f1326218e 100644 --- a/2024/CVE-2024-5411.md +++ b/2024/CVE-2024-5411.md @@ -10,6 +10,7 @@ Missing input validation and OS command integration of the input in the ORing IA ### POC #### Reference +- http://seclists.org/fulldisclosure/2024/May/36 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-oring-iap420/ #### Github diff --git a/2024/CVE-2024-5420.md b/2024/CVE-2024-5420.md index 62e1243a00..0ccceebcb4 100644 --- a/2024/CVE-2024-5420.md +++ b/2024/CVE-2024-5420.md @@ -12,6 +12,7 @@ Missing input validation in the SEH Computertechnik utnserver Pro, SEH Computer ### POC #### Reference +- http://seclists.org/fulldisclosure/2024/Jun/4 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-oring-iap420/index.html #### Github diff --git a/2024/CVE-2024-5421.md b/2024/CVE-2024-5421.md index 768a58ff0c..0318228471 100644 --- a/2024/CVE-2024-5421.md +++ b/2024/CVE-2024-5421.md @@ -12,6 +12,7 @@ Missing input validation and OS command integration of the input in the utnserve ### POC #### Reference +- http://seclists.org/fulldisclosure/2024/Jun/4 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-seh-untserver-pro/index.html #### Github diff --git a/2024/CVE-2024-5422.md b/2024/CVE-2024-5422.md index c983739f8a..88fa4164c9 100644 --- a/2024/CVE-2024-5422.md +++ b/2024/CVE-2024-5422.md @@ -12,6 +12,7 @@ An uncontrolled resource consumption of file descriptors in SEH Computertechnik ### POC #### Reference +- http://seclists.org/fulldisclosure/2024/Jun/4 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-seh-untserver-pro/index.html #### Github diff --git a/2024/CVE-2024-5447.md b/2024/CVE-2024-5447.md new file mode 100644 index 0000000000..eb1507dbfd --- /dev/null +++ b/2024/CVE-2024-5447.md @@ -0,0 +1,17 @@ +### [CVE-2024-5447](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5447) +![](https://img.shields.io/static/v1?label=Product&message=PayPal%20Pay%20Now%2C%20Buy%20Now%2C%20Donation%20and%20Cart%20Buttons%20Shortcode&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The PayPal Pay Now, Buy Now, Donation and Cart Buttons Shortcode WordPress plugin through 1.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) + +### POC + +#### Reference +- https://wpscan.com/vulnerability/a692b869-1666-42d1-b56d-dfcccd68ab67/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-5448.md b/2024/CVE-2024-5448.md new file mode 100644 index 0000000000..c352f042e0 --- /dev/null +++ b/2024/CVE-2024-5448.md @@ -0,0 +1,17 @@ +### [CVE-2024-5448](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5448) +![](https://img.shields.io/static/v1?label=Product&message=PayPal%20Pay%20Now%2C%20Buy%20Now%2C%20Donation%20and%20Cart%20Buttons%20Shortcode&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The PayPal Pay Now, Buy Now, Donation and Cart Buttons Shortcode WordPress plugin through 1.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks + +### POC + +#### Reference +- https://wpscan.com/vulnerability/c482fe19-b643-41ea-8194-22776b388290/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-5475.md b/2024/CVE-2024-5475.md new file mode 100644 index 0000000000..e0f2fe41a7 --- /dev/null +++ b/2024/CVE-2024-5475.md @@ -0,0 +1,17 @@ +### [CVE-2024-5475](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5475) +![](https://img.shields.io/static/v1?label=Product&message=Responsive%20video%20embed&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%200.5.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The Responsive video embed WordPress plugin before 0.5.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. + +### POC + +#### Reference +- https://wpscan.com/vulnerability/cee66543-b5d6-4205-8f9b-0febd7fee445/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-5522.md b/2024/CVE-2024-5522.md new file mode 100644 index 0000000000..eaa30b33d7 --- /dev/null +++ b/2024/CVE-2024-5522.md @@ -0,0 +1,18 @@ +### [CVE-2024-5522](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5522) +![](https://img.shields.io/static/v1?label=Product&message=HTML5%20Video%20Player%20&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.5.27%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +The HTML5 Video Player WordPress plugin before 2.5.27 does not sanitize and escape a parameter from a REST route before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks + +### POC + +#### Reference +- https://wpscan.com/vulnerability/bc76ef95-a2a9-4185-8ed9-1059097a506a/ + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/truonghuuphuc/CVE-2024-5522-Poc + diff --git a/2024/CVE-2024-5585.md b/2024/CVE-2024-5585.md index 38f3f3c764..3808121311 100644 --- a/2024/CVE-2024-5585.md +++ b/2024/CVE-2024-5585.md @@ -15,4 +15,5 @@ In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, t #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/tianstcht/tianstcht diff --git a/2024/CVE-2024-5656.md b/2024/CVE-2024-5656.md index 17bdb54823..da58c70045 100644 --- a/2024/CVE-2024-5656.md +++ b/2024/CVE-2024-5656.md @@ -1,11 +1,11 @@ ### [CVE-2024-5656](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5656) -![](https://img.shields.io/static/v1?label=Product&message=Google%20CSE&color=blue) -![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%201.0.7%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description -The Google CSE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. +** REJECT ** Accidental duplicate assignment of CVE-2024-4755. Please use CVE-2024-4755. ### POC diff --git a/2024/CVE-2024-5657.md b/2024/CVE-2024-5657.md index c6c1791da3..da4d02bb46 100644 --- a/2024/CVE-2024-5657.md +++ b/2024/CVE-2024-5657.md @@ -10,6 +10,7 @@ The CraftCMS plugin Two-Factor Authentication in versions 3.3.1, 3.3.2 and 3.3.3 ### POC #### Reference +- http://www.openwall.com/lists/oss-security/2024/06/06/1 - https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20240202-01_CraftCMS_Plugin_Two-Factor_Authentication_Password_Hash_Disclosure #### Github diff --git a/2024/CVE-2024-5658.md b/2024/CVE-2024-5658.md index 1d2d78b37b..3626e5ccfa 100644 --- a/2024/CVE-2024-5658.md +++ b/2024/CVE-2024-5658.md @@ -10,6 +10,7 @@ The CraftCMS plugin Two-Factor Authentication through 3.3.3 allows reuse of TOTP ### POC #### Reference +- http://www.openwall.com/lists/oss-security/2024/06/06/2 - https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20240202-02_CraftCMS_Plugin_Two-Factor_Authentication_TOTP_Valid_After_Use #### Github diff --git a/2024/CVE-2024-5676.md b/2024/CVE-2024-5676.md new file mode 100644 index 0000000000..3ac02ff514 --- /dev/null +++ b/2024/CVE-2024-5676.md @@ -0,0 +1,17 @@ +### [CVE-2024-5676](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5676) +![](https://img.shields.io/static/v1?label=Product&message=IP150%20Internet%20Module&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.40.00%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +The Paradox IP150 Internet Module in version 1.40.00 is vulnerable to Cross-Site Request Forgery (CSRF) attacks due to a lack of countermeasures and the use of the HTTP method `GET` to introduce changes in the system. + +### POC + +#### Reference +- https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20240321-01_Paradox_Cross_Site_Request_Forgery + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-5758.md b/2024/CVE-2024-5758.md index fb586b47da..5cc0a16ed7 100644 --- a/2024/CVE-2024-5758.md +++ b/2024/CVE-2024-5758.md @@ -1,11 +1,11 @@ ### [CVE-2024-5758](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5758) -![](https://img.shields.io/static/v1?label=Product&message=Post%20Grid%20Gutenberg%20Blocks%20and%20WordPress%20Blog%20Plugin%20%E2%80%93%20PostX&color=blue) -![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%204.0.4%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description -The Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the filterMobileText parameter in all versions up to, and including, 4.0.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. +** REJECT ** Duplicate of CVE-2024-4305. Please use CVE-2024-4305 instead. ### POC diff --git a/2024/CVE-2024-5772.md b/2024/CVE-2024-5772.md index f48e275f1b..2afcce72e2 100644 --- a/2024/CVE-2024-5772.md +++ b/2024/CVE-2024-5772.md @@ -10,7 +10,7 @@ A vulnerability, which was classified as critical, has been found in Netentsec N ### POC #### Reference -No PoCs from references. +- https://github.com/charliecatsec/cve1/blob/main/NS-ASG-sql-deleteiscuser.md #### Github - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-5785.md b/2024/CVE-2024-5785.md new file mode 100644 index 0000000000..f4113aef72 --- /dev/null +++ b/2024/CVE-2024-5785.md @@ -0,0 +1,17 @@ +### [CVE-2024-5785](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5785) +![](https://img.shields.io/static/v1?label=Product&message=Comtrend%20WLD71-T1_v2.0.201820&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20GRG-4280us%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brighgreen) + +### Description + +Command injection vulnerability in Comtrend router WLD71-T1_v2.0.201820, affecting the GRG-4280us version. This vulnerability could allow an authenticated user to execute commands inside the router by making a POST request to the URL “/boaform/admin/formUserTracert”. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-5786.md b/2024/CVE-2024-5786.md new file mode 100644 index 0000000000..266699814c --- /dev/null +++ b/2024/CVE-2024-5786.md @@ -0,0 +1,17 @@ +### [CVE-2024-5786](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5786) +![](https://img.shields.io/static/v1?label=Product&message=Comtrend%20WLD71-T1_v2.0.201820&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20GRG-4280us%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +Cross-Site Request Forgery vulnerability in Comtrend router WLD71-T1_v2.0.201820, affecting the GRG-4280us version. This vulnerability allows an attacker to force an end user to execute unwanted actions in a web application to which he is authenticated. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-5851.md b/2024/CVE-2024-5851.md new file mode 100644 index 0000000000..920de9aa08 --- /dev/null +++ b/2024/CVE-2024-5851.md @@ -0,0 +1,17 @@ +### [CVE-2024-5851](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5851) +![](https://img.shields.io/static/v1?label=Product&message=playSMS&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.4.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-80%20Basic%20Cross%20Site%20Scripting&color=brighgreen) + +### Description + +A vulnerability classified as problematic has been found in playSMS up to 1.4.7. Affected is an unknown function of the file /index.php?app=main&inc=feature_schedule&op=list of the component SMS Schedule Handler. The manipulation of the argument name/message leads to basic cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.4.8 is able to address this issue. The name of the patch is 7a88920f6b536c6a91512e739bcb4e8adefeed2b. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-267912. NOTE: The code maintainer was contacted early about this disclosure and was eager to prepare a fix as quickly as possible. + +### POC + +#### Reference +- https://vuldb.com/?submit.347385 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-5894.md b/2024/CVE-2024-5894.md new file mode 100644 index 0000000000..7928458996 --- /dev/null +++ b/2024/CVE-2024-5894.md @@ -0,0 +1,17 @@ +### [CVE-2024-5894](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5894) +![](https://img.shields.io/static/v1?label=Product&message=Online%20Eyewear%20Shop&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability classified as critical was found in SourceCodester Online Eyewear Shop 1.0. This vulnerability affects unknown code of the file manage_product.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-268138 is the identifier assigned to this vulnerability. + +### POC + +#### Reference +- https://github.com/Hefei-Coffee/cve/blob/main/sql10.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-5895.md b/2024/CVE-2024-5895.md new file mode 100644 index 0000000000..ccf827fc15 --- /dev/null +++ b/2024/CVE-2024-5895.md @@ -0,0 +1,17 @@ +### [CVE-2024-5895](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5895) +![](https://img.shields.io/static/v1?label=Product&message=Employee%20and%20Visitor%20Gate%20Pass%20Logging%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability, which was classified as critical, has been found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. This issue affects the function delete_users of the file /classes/Users.php?f=delete. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268139. + +### POC + +#### Reference +- https://github.com/Hefei-Coffee/cve/blob/main/sql11.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-5896.md b/2024/CVE-2024-5896.md new file mode 100644 index 0000000000..33e6d5b025 --- /dev/null +++ b/2024/CVE-2024-5896.md @@ -0,0 +1,17 @@ +### [CVE-2024-5896](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5896) +![](https://img.shields.io/static/v1?label=Product&message=Employee%20and%20Visitor%20Gate%20Pass%20Logging%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability, which was classified as critical, was found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. Affected is the function save_users of the file /classes/Users.php?f=save. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268140. + +### POC + +#### Reference +- https://github.com/Hefei-Coffee/cve/blob/main/sql12.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-5898.md b/2024/CVE-2024-5898.md new file mode 100644 index 0000000000..c72a2be2d3 --- /dev/null +++ b/2024/CVE-2024-5898.md @@ -0,0 +1,17 @@ +### [CVE-2024-5898](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5898) +![](https://img.shields.io/static/v1?label=Product&message=Payroll%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in itsourcecode Payroll Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file print_payroll.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-268142 is the identifier assigned to this vulnerability. + +### POC + +#### Reference +- https://github.com/guiyxli/cve/issues/1 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-5981.md b/2024/CVE-2024-5981.md new file mode 100644 index 0000000000..918181f26c --- /dev/null +++ b/2024/CVE-2024-5981.md @@ -0,0 +1,17 @@ +### [CVE-2024-5981](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5981) +![](https://img.shields.io/static/v1?label=Product&message=Online%20House%20Rental%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in itsourcecode Online House Rental System 1.0. It has been classified as critical. Affected is an unknown function of the file manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268458 is the identifier assigned to this vulnerability. + +### POC + +#### Reference +- https://github.com/LiuYongXiang-git/cve/issues/1 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-5983.md b/2024/CVE-2024-5983.md new file mode 100644 index 0000000000..4cacff38bd --- /dev/null +++ b/2024/CVE-2024-5983.md @@ -0,0 +1,17 @@ +### [CVE-2024-5983](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5983) +![](https://img.shields.io/static/v1?label=Product&message=Online%20Bookstore&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in itsourcecode Online Bookstore 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file bookPerPub.php. The manipulation of the argument pubid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268459. + +### POC + +#### Reference +- https://github.com/LiuYongXiang-git/cve/issues/2 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-5984.md b/2024/CVE-2024-5984.md new file mode 100644 index 0000000000..1729586a5d --- /dev/null +++ b/2024/CVE-2024-5984.md @@ -0,0 +1,17 @@ +### [CVE-2024-5984](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5984) +![](https://img.shields.io/static/v1?label=Product&message=Online%20Bookstore&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in itsourcecode Online Bookstore 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file book.php. The manipulation of the argument bookisbn leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268460. + +### POC + +#### Reference +- https://github.com/LiuYongXiang-git/cve/issues/3 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-5985.md b/2024/CVE-2024-5985.md new file mode 100644 index 0000000000..0c4fd63652 --- /dev/null +++ b/2024/CVE-2024-5985.md @@ -0,0 +1,17 @@ +### [CVE-2024-5985](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5985) +![](https://img.shields.io/static/v1?label=Product&message=Best%20Online%20News%20Portal&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability classified as critical has been found in SourceCodester Best Online News Portal 1.0. This affects an unknown part of the file /admin/index.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268461 was assigned to this vulnerability. + +### POC + +#### Reference +- https://github.com/CveSecLook/cve/issues/45 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6006.md b/2024/CVE-2024-6006.md new file mode 100644 index 0000000000..611794f638 --- /dev/null +++ b/2024/CVE-2024-6006.md @@ -0,0 +1,17 @@ +### [CVE-2024-6006](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6006) +![](https://img.shields.io/static/v1?label=Product&message=ZKBio%20CVSecurity%20V5000&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204.1.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross%20Site%20Scripting&color=brighgreen) + +### Description + +A vulnerability was found in ZKTeco ZKBio CVSecurity V5000 4.1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Summer Schedule Handler. The manipulation of the argument Schedule Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-268694 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +- https://vuldb.com/?submit.351403 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6007.md b/2024/CVE-2024-6007.md new file mode 100644 index 0000000000..7ee3173759 --- /dev/null +++ b/2024/CVE-2024-6007.md @@ -0,0 +1,17 @@ +### [CVE-2024-6007](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6007) +![](https://img.shields.io/static/v1?label=Product&message=NS-ASG%20Application%20Security%20Gateway&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206.3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability classified as critical has been found in Netentsec NS-ASG Application Security Gateway 6.3. This affects an unknown part of the file /protocol/iscgwtunnel/deleteiscgwrouteconf.php. The manipulation of the argument messagecontent leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268695. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +- https://github.com/SecureF1sh/findings/blob/main/ns_sqli.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6009.md b/2024/CVE-2024-6009.md new file mode 100644 index 0000000000..387923852a --- /dev/null +++ b/2024/CVE-2024-6009.md @@ -0,0 +1,17 @@ +### [CVE-2024-6009](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6009) +![](https://img.shields.io/static/v1?label=Product&message=Event%20Calendar&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability has been found in itsourcecode Event Calendar 1.0 and classified as critical. Affected by this vulnerability is the function regConfirm/regDelete of the file process.php. The manipulation of the argument userId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268699. + +### POC + +#### Reference +- https://github.com/AutoZhou1/cve/issues/1 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6013.md b/2024/CVE-2024-6013.md new file mode 100644 index 0000000000..d7e08702a1 --- /dev/null +++ b/2024/CVE-2024-6013.md @@ -0,0 +1,17 @@ +### [CVE-2024-6013](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6013) +![](https://img.shields.io/static/v1?label=Product&message=Online%20Book%20Store&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in itsourcecode Online Book Store 1.0. It has been rated as critical. This issue affects some unknown processing of the file admin_delete.php. The manipulation of the argument bookisbn leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268721 was assigned to this vulnerability. + +### POC + +#### Reference +- https://github.com/gabriel202212/cve/issues/1 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6015.md b/2024/CVE-2024-6015.md new file mode 100644 index 0000000000..3b0dd99dd9 --- /dev/null +++ b/2024/CVE-2024-6015.md @@ -0,0 +1,17 @@ +### [CVE-2024-6015](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6015) +![](https://img.shields.io/static/v1?label=Product&message=Online%20House%20Rental%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability classified as critical was found in itsourcecode Online House Rental System 1.0. Affected by this vulnerability is an unknown functionality of the file manage_user.php. The manipulation of the argument month_of leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268723. + +### POC + +#### Reference +- https://github.com/chenwulin-bit/cve/issues/1 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6016.md b/2024/CVE-2024-6016.md new file mode 100644 index 0000000000..1551def276 --- /dev/null +++ b/2024/CVE-2024-6016.md @@ -0,0 +1,17 @@ +### [CVE-2024-6016](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6016) +![](https://img.shields.io/static/v1?label=Product&message=Online%20Laundry%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability, which was classified as critical, has been found in itsourcecode Online Laundry Management System 1.0. Affected by this issue is some unknown functionality of the file admin_class.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268724. + +### POC + +#### Reference +- https://github.com/chenwulin-bit/cve/issues/2 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6041.md b/2024/CVE-2024-6041.md new file mode 100644 index 0000000000..702ab78424 --- /dev/null +++ b/2024/CVE-2024-6041.md @@ -0,0 +1,17 @@ +### [CVE-2024-6041](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6041) +![](https://img.shields.io/static/v1?label=Product&message=Gym%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in itsourcecode Gym Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268765 was assigned to this vulnerability. + +### POC + +#### Reference +- https://github.com/ssiicckk/cve/issues/1 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6042.md b/2024/CVE-2024-6042.md new file mode 100644 index 0000000000..d69f663300 --- /dev/null +++ b/2024/CVE-2024-6042.md @@ -0,0 +1,17 @@ +### [CVE-2024-6042](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6042) +![](https://img.shields.io/static/v1?label=Product&message=Real%20Estate%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in itsourcecode Real Estate Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file property-detail.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-268766 is the identifier assigned to this vulnerability. + +### POC + +#### Reference +- https://github.com/Cormac315/cve/issues/1 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6043.md b/2024/CVE-2024-6043.md new file mode 100644 index 0000000000..27c758d485 --- /dev/null +++ b/2024/CVE-2024-6043.md @@ -0,0 +1,17 @@ +### [CVE-2024-6043](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6043) +![](https://img.shields.io/static/v1?label=Product&message=Best%20House%20Rental%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability classified as critical has been found in SourceCodester Best House Rental Management System 1.0. This affects the function login of the file admin_class.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268767. + +### POC + +#### Reference +- https://github.com/yezzzo/y3/blob/main/SourceCodester%20Best%20house%20rental%20management%20system%20project%20in%20php%201.0%20SQL%20Injection.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6061.md b/2024/CVE-2024-6061.md new file mode 100644 index 0000000000..fcd120ca84 --- /dev/null +++ b/2024/CVE-2024-6061.md @@ -0,0 +1,17 @@ +### [CVE-2024-6061](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6061) +![](https://img.shields.io/static/v1?label=Product&message=GPAC&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202.5-DEV-rev228-g11067ea92-master%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-835%20Infinite%20Loop&color=brighgreen) + +### Description + +A vulnerability has been found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this vulnerability is the function isoffin_process of the file src/filters/isoffin_read.c of the component MP4Box. The manipulation leads to infinite loop. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is 20c0f29139a82779b86453ce7f68d0681ec7624c. It is recommended to apply a patch to fix this issue. The identifier VDB-268789 was assigned to this vulnerability. + +### POC + +#### Reference +- https://github.com/gpac/gpac/issues/2871 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6084.md b/2024/CVE-2024-6084.md new file mode 100644 index 0000000000..39a590d5d2 --- /dev/null +++ b/2024/CVE-2024-6084.md @@ -0,0 +1,17 @@ +### [CVE-2024-6084](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6084) +![](https://img.shields.io/static/v1?label=Product&message=Pool%20of%20Bethesda%20Online%20Reservation%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%20Unrestricted%20Upload&color=brighgreen) + +### Description + +A vulnerability has been found in itsourcecode Pool of Bethesda Online Reservation System up to 1.0 and classified as critical. Affected by this vulnerability is the function uploadImage of the file /admin/mod_room/controller.php?action=add. The manipulation of the argument image leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268825 was assigned to this vulnerability. + +### POC + +#### Reference +- https://github.com/Laster-dev/CVE/issues/2 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6111.md b/2024/CVE-2024-6111.md new file mode 100644 index 0000000000..b16ad1f4d8 --- /dev/null +++ b/2024/CVE-2024-6111.md @@ -0,0 +1,17 @@ +### [CVE-2024-6111](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6111) +![](https://img.shields.io/static/v1?label=Product&message=Pool%20of%20Bethesda%20Online%20Reservation%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability classified as critical has been found in itsourcecode Pool of Bethesda Online Reservation System 1.0. This affects an unknown part of the file login.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268857 was assigned to this vulnerability. + +### POC + +#### Reference +- https://github.com/wangyuan-ui/CVE/issues/1 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6113.md b/2024/CVE-2024-6113.md new file mode 100644 index 0000000000..458bb4f41e --- /dev/null +++ b/2024/CVE-2024-6113.md @@ -0,0 +1,17 @@ +### [CVE-2024-6113](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6113) +![](https://img.shields.io/static/v1?label=Product&message=Monbela%20Tourist%20Inn%20Online%20Reservation%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in itsourcecode Monbela Tourist Inn Online Reservation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file login.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The identifier VDB-268865 was assigned to this vulnerability. + +### POC + +#### Reference +- https://github.com/wangyuan-ui/CVE/issues/3 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6114.md b/2024/CVE-2024-6114.md new file mode 100644 index 0000000000..79f66a9fd4 --- /dev/null +++ b/2024/CVE-2024-6114.md @@ -0,0 +1,17 @@ +### [CVE-2024-6114](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6114) +![](https://img.shields.io/static/v1?label=Product&message=Monbela%20Tourist%20Inn%20Online%20Reservation%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%20Unrestricted%20Upload&color=brighgreen) + +### Description + +A vulnerability classified as critical has been found in itsourcecode Monbela Tourist Inn Online Reservation System up to 1.0. Affected is an unknown function of the file controller.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268866 is the identifier assigned to this vulnerability. + +### POC + +#### Reference +- https://github.com/wangyuan-ui/CVE/issues/4 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6120.md b/2024/CVE-2024-6120.md new file mode 100644 index 0000000000..4e4f5f92cf --- /dev/null +++ b/2024/CVE-2024-6120.md @@ -0,0 +1,17 @@ +### [CVE-2024-6120](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6120) +![](https://img.shields.io/static/v1?label=Product&message=Sparkle%20Demo%20Importer&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%201.4.7%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +The Sparkle Demo Importer plugin for WordPress is vulnerable to unauthorized database reset and demo data import due to a missing capability check on the multiple functions in all versions up to and including 1.4.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete all posts, pages, and uploaded files, as well as download and install a limited set of demo plugins. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-6184.md b/2024/CVE-2024-6184.md new file mode 100644 index 0000000000..38febe46bd --- /dev/null +++ b/2024/CVE-2024-6184.md @@ -0,0 +1,17 @@ +### [CVE-2024-6184](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6184) +![](https://img.shields.io/static/v1?label=Product&message=RG-UAC&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%20OS%20Command%20Injection&color=brighgreen) + +### Description + +A vulnerability classified as critical was found in Ruijie RG-UAC 1.0. Affected by this vulnerability is an unknown functionality of the file /view/systemConfig/reboot/reboot_commit.php. The manipulation of the argument servicename leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269155. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +- https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_a.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6187.md b/2024/CVE-2024-6187.md new file mode 100644 index 0000000000..244c0adb91 --- /dev/null +++ b/2024/CVE-2024-6187.md @@ -0,0 +1,17 @@ +### [CVE-2024-6187](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6187) +![](https://img.shields.io/static/v1?label=Product&message=RG-UAC&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%20OS%20Command%20Injection&color=brighgreen) + +### Description + +A vulnerability has been found in Ruijie RG-UAC 1.0 and classified as critical. This vulnerability affects unknown code of the file /view/vpn/autovpn/sub_commit.php. The manipulation of the argument key leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-269158 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +- https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_d.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6188.md b/2024/CVE-2024-6188.md new file mode 100644 index 0000000000..9b16386c58 --- /dev/null +++ b/2024/CVE-2024-6188.md @@ -0,0 +1,17 @@ +### [CVE-2024-6188](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6188) +![](https://img.shields.io/static/v1?label=Product&message=TrackSYS&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2011.x.x%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-425%20Direct%20Request&color=brighgreen) + +### Description + +A vulnerability was found in Parsec Automation TrackSYS 11.x.x and classified as problematic. This issue affects some unknown processing of the file /TS/export/pagedefinition. The manipulation of the argument ID leads to direct request. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269159. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +- https://kiwiyumi.com/post/tracksys-export-source-code/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6190.md b/2024/CVE-2024-6190.md new file mode 100644 index 0000000000..b632c7b532 --- /dev/null +++ b/2024/CVE-2024-6190.md @@ -0,0 +1,17 @@ +### [CVE-2024-6190](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6190) +![](https://img.shields.io/static/v1?label=Product&message=Farm%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in itsourcecode Farm Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php of the component Login. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-269162 is the identifier assigned to this vulnerability. + +### POC + +#### Reference +- https://github.com/HryspaHodor/CVE/issues/2 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6191.md b/2024/CVE-2024-6191.md new file mode 100644 index 0000000000..a34d2c7e72 --- /dev/null +++ b/2024/CVE-2024-6191.md @@ -0,0 +1,17 @@ +### [CVE-2024-6191](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6191) +![](https://img.shields.io/static/v1?label=Product&message=Student%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability classified as critical has been found in itsourcecode Student Management System 1.0. This affects an unknown part of the file login.php of the component Login Page. The manipulation of the argument user leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269163. + +### POC + +#### Reference +- https://github.com/HryspaHodor/CVE/issues/3 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6192.md b/2024/CVE-2024-6192.md new file mode 100644 index 0000000000..b937c27c4d --- /dev/null +++ b/2024/CVE-2024-6192.md @@ -0,0 +1,17 @@ +### [CVE-2024-6192](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6192) +![](https://img.shields.io/static/v1?label=Product&message=Loan%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability classified as critical was found in itsourcecode Loan Management System 1.0. This vulnerability affects unknown code of the file login.php of the component Login Page. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-269164. + +### POC + +#### Reference +- https://github.com/HryspaHodor/CVE/issues/4 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6194.md b/2024/CVE-2024-6194.md new file mode 100644 index 0000000000..0b8e581c9b --- /dev/null +++ b/2024/CVE-2024-6194.md @@ -0,0 +1,17 @@ +### [CVE-2024-6194](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6194) +![](https://img.shields.io/static/v1?label=Product&message=Tailoring%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability, which was classified as critical, was found in itsourcecode Tailoring Management System 1.0. Affected is an unknown function of the file editmeasurement.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-269166 is the identifier assigned to this vulnerability. + +### POC + +#### Reference +- https://github.com/HryspaHodor/CVE/issues/6 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6218.md b/2024/CVE-2024-6218.md new file mode 100644 index 0000000000..ab51e10805 --- /dev/null +++ b/2024/CVE-2024-6218.md @@ -0,0 +1,17 @@ +### [CVE-2024-6218](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6218) +![](https://img.shields.io/static/v1?label=Product&message=Vehicle%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability, which was classified as critical, has been found in itsourcecode Vehicle Management System 1.0. Affected by this issue is some unknown functionality of the file busprofile.php. The manipulation of the argument busid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-269282 is the identifier assigned to this vulnerability. + +### POC + +#### Reference +- https://github.com/HryspaHodor/CVE/issues/7 + +#### Github +No PoCs found on GitHub currently. + diff --git a/github.txt b/github.txt index 8ffa4bbefa..6ae042fc67 100644 --- a/github.txt +++ b/github.txt @@ -102,6 +102,7 @@ CVE-1999-0256 - https://github.com/x00itachi/metasploit-exploit-search-online CVE-1999-0372 - https://github.com/SamanShafigh/vulBERT CVE-1999-0428 - https://github.com/chnzzh/OpenSSL-CVE-lib CVE-1999-0502 - https://github.com/ahm3dhany/IDS-Evasion +CVE-1999-0511 - https://github.com/anvithalolla/Tesla_PenTest CVE-1999-0524 - https://github.com/mikemackintosh/ruby-qualys CVE-1999-0532 - https://github.com/HeiTang/ZYXEl-CTF-WriteUp CVE-1999-0635 - https://github.com/muchdogesec/cve2stix @@ -161,6 +162,7 @@ CVE-2000-0109 - https://github.com/Live-Hack-CVE/CVE-2000-0109 CVE-2000-0114 - https://github.com/0xPugal/One-Liners CVE-2000-0114 - https://github.com/0xPugazh/One-Liners CVE-2000-0114 - https://github.com/ARPSyndicate/kenzer-templates +CVE-2000-0114 - https://github.com/CVEDB/awesome-cve-repo CVE-2000-0114 - https://github.com/Cappricio-Securities/CVE-2000-0114 CVE-2000-0114 - https://github.com/Live-Hack-CVE/CVE-2000-0114 CVE-2000-0114 - https://github.com/POORVAJA-195/Nuclei-Analysis-main @@ -175,6 +177,7 @@ CVE-2000-0142 - https://github.com/Live-Hack-CVE/CVE-2000-0142 CVE-2000-0143 - https://github.com/Live-Hack-CVE/CVE-2000-0143 CVE-2000-0170 - https://github.com/ARPSyndicate/cvemon CVE-2000-0170 - https://github.com/CVEDB/PoC-List +CVE-2000-0170 - https://github.com/CVEDB/awesome-cve-repo CVE-2000-0170 - https://github.com/mike182/exploit CVE-2000-0182 - https://github.com/Live-Hack-CVE/CVE-2000-0182 CVE-2000-0388 - https://github.com/ARPSyndicate/cvemon @@ -189,6 +192,8 @@ CVE-2000-0564 - https://github.com/CamiloEscobar98/DjangoProject CVE-2000-0649 - https://github.com/0xNVAN/win-iisadmin CVE-2000-0649 - https://github.com/ARPSyndicate/cvemon CVE-2000-0649 - https://github.com/CVEDB/PoC-List +CVE-2000-0649 - https://github.com/CVEDB/awesome-cve-repo +CVE-2000-0649 - https://github.com/Downgraderz/PoC-CVE-2000-0649 CVE-2000-0649 - https://github.com/JimboJimbabwe/HackGPTV2 CVE-2000-0649 - https://github.com/amtzespinosa/lord-of-the-root-walkthrough CVE-2000-0649 - https://github.com/hanmin0512/Web-hacking-LAB @@ -211,6 +216,7 @@ CVE-2000-0936 - https://github.com/Parist0nH1ll/Vulnerabilities-Write-Ups CVE-2000-0979 - https://github.com/ARPSyndicate/cvemon CVE-2000-0979 - https://github.com/Ascotbe/Kernelhub CVE-2000-0979 - https://github.com/CVEDB/PoC-List +CVE-2000-0979 - https://github.com/CVEDB/awesome-cve-repo CVE-2000-0979 - https://github.com/Cruxer8Mech/Idk CVE-2000-0979 - https://github.com/Z6543/CVE-2000-0979 CVE-2000-0979 - https://github.com/ycdxsb/WindowsPrivilegeEscalation @@ -285,6 +291,7 @@ CVE-2001-0550 - https://github.com/AnyMaster/EQGRP CVE-2001-0550 - https://github.com/Badbug6/EQGRP CVE-2001-0550 - https://github.com/CKmaenn/EQGRP CVE-2001-0550 - https://github.com/CVEDB/PoC-List +CVE-2001-0550 - https://github.com/CVEDB/awesome-cve-repo CVE-2001-0550 - https://github.com/CybernetiX-S3C/EQGRP_Linux CVE-2001-0550 - https://github.com/Drift-Security/Shadow_Brokers-Vs-NSA CVE-2001-0550 - https://github.com/IHA114/EQGRP @@ -326,6 +333,7 @@ CVE-2001-0554 - https://github.com/vshaliii/DC-4-Vulnhub-Walkthrough CVE-2001-0561 - https://github.com/jubram/es_tpf CVE-2001-0680 - https://github.com/ARPSyndicate/cvemon CVE-2001-0680 - https://github.com/CVEDB/PoC-List +CVE-2001-0680 - https://github.com/CVEDB/awesome-cve-repo CVE-2001-0690 - https://github.com/AnyMaster/EQGRP CVE-2001-0690 - https://github.com/Badbug6/EQGRP CVE-2001-0690 - https://github.com/CKmaenn/EQGRP @@ -361,18 +369,23 @@ CVE-2001-0690 - https://github.com/wuvuw/EQGR CVE-2001-0690 - https://github.com/x0rz/EQGRP CVE-2001-0758 - https://github.com/ARPSyndicate/cvemon CVE-2001-0758 - https://github.com/CVEDB/PoC-List +CVE-2001-0758 - https://github.com/CVEDB/awesome-cve-repo CVE-2001-0797 - https://github.com/0xdea/exploits CVE-2001-0797 - https://github.com/Kicksecure/security-misc CVE-2001-0797 - https://github.com/Whonix/security-misc CVE-2001-0845 - https://github.com/jhswartz/cvrfdb CVE-2001-0931 - https://github.com/ARPSyndicate/cvemon CVE-2001-0931 - https://github.com/CVEDB/PoC-List +CVE-2001-0931 - https://github.com/CVEDB/awesome-cve-repo CVE-2001-0932 - https://github.com/ARPSyndicate/cvemon CVE-2001-0932 - https://github.com/CVEDB/PoC-List +CVE-2001-0932 - https://github.com/CVEDB/awesome-cve-repo CVE-2001-0933 - https://github.com/ARPSyndicate/cvemon CVE-2001-0933 - https://github.com/CVEDB/PoC-List +CVE-2001-0933 - https://github.com/CVEDB/awesome-cve-repo CVE-2001-0934 - https://github.com/ARPSyndicate/cvemon CVE-2001-0934 - https://github.com/CVEDB/PoC-List +CVE-2001-0934 - https://github.com/CVEDB/awesome-cve-repo CVE-2001-1002 - https://github.com/Xiol/CVEChecker CVE-2001-1092 - https://github.com/truefinder/truefinder CVE-2001-1093 - https://github.com/truefinder/truefinder @@ -386,9 +399,11 @@ CVE-2001-1382 - https://github.com/phx/cvescan CVE-2001-1432 - https://github.com/SamanShafigh/vulBERT CVE-2001-1442 - https://github.com/ARPSyndicate/cvemon CVE-2001-1442 - https://github.com/CVEDB/PoC-List +CVE-2001-1442 - https://github.com/CVEDB/awesome-cve-repo CVE-2001-1451 - https://github.com/clearbluejar/cve-markdown-charts CVE-2001-1473 - https://github.com/0xget/cve-2001-1473 CVE-2001-1473 - https://github.com/ARPSyndicate/kenzer-templates +CVE-2001-1473 - https://github.com/CVEDB/awesome-cve-repo CVE-2001-1473 - https://github.com/codine7/Hacking_Automated CVE-2001-1473 - https://github.com/codine7/fox CVE-2001-1473 - https://github.com/codine7/jungle @@ -398,6 +413,7 @@ CVE-2001-1494 - https://github.com/jaydenaung/CloudGuard-ShiftLeft-CICD-AWS CVE-2001-1494 - https://github.com/tp1-SpZIaPvBD/testprojekt CVE-2001-1583 - https://github.com/Live-Hack-CVE/CVE-2001-1583 CVE-2001-1594 - https://github.com/wsbespalov/vmengine +CVE-2001-3389 - https://github.com/CVEDB/awesome-cve-repo CVE-2001-3389 - https://github.com/becrevex/Gaston CVE-2002-0029 - https://github.com/C4ssif3r/nmap-scripts CVE-2002-0029 - https://github.com/stran0s/stran0s @@ -408,18 +424,25 @@ CVE-2002-0082 - https://github.com/piyush-saurabh/exploits CVE-2002-0082 - https://github.com/rosonsec/Exploits CVE-2002-0200 - https://github.com/ARPSyndicate/cvemon CVE-2002-0200 - https://github.com/CVEDB/PoC-List +CVE-2002-0200 - https://github.com/CVEDB/awesome-cve-repo CVE-2002-0201 - https://github.com/ARPSyndicate/cvemon CVE-2002-0201 - https://github.com/CVEDB/PoC-List +CVE-2002-0201 - https://github.com/CVEDB/awesome-cve-repo CVE-2002-0288 - https://github.com/ARPSyndicate/cvemon CVE-2002-0288 - https://github.com/CVEDB/PoC-List +CVE-2002-0288 - https://github.com/CVEDB/awesome-cve-repo CVE-2002-0289 - https://github.com/ARPSyndicate/cvemon CVE-2002-0289 - https://github.com/CVEDB/PoC-List +CVE-2002-0289 - https://github.com/CVEDB/awesome-cve-repo CVE-2002-0346 - https://github.com/ARPSyndicate/cvemon CVE-2002-0346 - https://github.com/CVEDB/PoC-List +CVE-2002-0346 - https://github.com/CVEDB/awesome-cve-repo CVE-2002-0347 - https://github.com/ARPSyndicate/cvemon CVE-2002-0347 - https://github.com/CVEDB/PoC-List +CVE-2002-0347 - https://github.com/CVEDB/awesome-cve-repo CVE-2002-0348 - https://github.com/ARPSyndicate/cvemon CVE-2002-0348 - https://github.com/CVEDB/PoC-List +CVE-2002-0348 - https://github.com/CVEDB/awesome-cve-repo CVE-2002-0367 - https://github.com/Ostorlab/KEV CVE-2002-0367 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors CVE-2002-0367 - https://github.com/todb-cisa/kev-cwes @@ -431,6 +454,7 @@ CVE-2002-0422 - https://github.com/ARPSyndicate/cvemon CVE-2002-0422 - https://github.com/k0pak4/k0pak4 CVE-2002-0448 - https://github.com/ARPSyndicate/cvemon CVE-2002-0448 - https://github.com/CVEDB/PoC-List +CVE-2002-0448 - https://github.com/CVEDB/awesome-cve-repo CVE-2002-0526 - https://github.com/bcoles/local-exploits CVE-2002-0649 - https://github.com/rewardone/MS02-039-Port CVE-2002-0651 - https://github.com/C4ssif3r/nmap-scripts @@ -449,12 +473,15 @@ CVE-2002-0680 - https://github.com/alt3kx/alt3kx.github.io CVE-2002-0685 - https://github.com/hannob/pgpbugs CVE-2002-0740 - https://github.com/ARPSyndicate/cvemon CVE-2002-0740 - https://github.com/CVEDB/PoC-List +CVE-2002-0740 - https://github.com/CVEDB/awesome-cve-repo +CVE-2002-0748 - https://github.com/CVEDB/awesome-cve-repo CVE-2002-0748 - https://github.com/fauzanwijaya/CVE-2002-0748 CVE-2002-0839 - https://github.com/Live-Hack-CVE/CVE-2002-0839 CVE-2002-0970 - https://github.com/ARPSyndicate/cvemon CVE-2002-0970 - https://github.com/chnzzh/OpenSSL-CVE-lib CVE-2002-0991 - https://github.com/ARPSyndicate/cvemon CVE-2002-0991 - https://github.com/CVEDB/PoC-List +CVE-2002-0991 - https://github.com/CVEDB/awesome-cve-repo CVE-2002-1024 - https://github.com/phx/cvescan CVE-2002-1120 - https://github.com/ret2eax/exploits CVE-2002-1131 - https://github.com/0xget/cve-2001-1473 @@ -489,6 +516,7 @@ CVE-2002-1569 - https://github.com/0xCyberY/CVE-T4PDF CVE-2002-1569 - https://github.com/ARPSyndicate/cvemon CVE-2002-1614 - https://github.com/ARPSyndicate/cvemon CVE-2002-1614 - https://github.com/CVEDB/PoC-List +CVE-2002-1614 - https://github.com/CVEDB/awesome-cve-repo CVE-2002-1614 - https://github.com/DrewSC13/Linpeas CVE-2002-1614 - https://github.com/cedelasen/htb-laboratory CVE-2002-1614 - https://github.com/chorankates/Irked @@ -507,6 +535,7 @@ CVE-2002-1904 - https://github.com/Hanc1999/System-Security-Exploit-Practice CVE-2002-20001 - https://github.com/ARPSyndicate/cvemon CVE-2002-20001 - https://github.com/Balasys/dheater CVE-2002-20001 - https://github.com/CVEDB/PoC-List +CVE-2002-20001 - https://github.com/CVEDB/awesome-cve-repo CVE-2002-20001 - https://github.com/Live-Hack-CVE/CVE-2002-20001 CVE-2002-20001 - https://github.com/Live-Hack-CVE/CVE-2022-40735 CVE-2002-20001 - https://github.com/anquanscan/sec-tools @@ -518,6 +547,7 @@ CVE-2002-2086 - https://github.com/tawrid/the-game-changer CVE-2002-2268 - https://github.com/cherry-wb/monalisa CVE-2002-2420 - https://github.com/ARPSyndicate/cvemon CVE-2002-2420 - https://github.com/CVEDB/PoC-List +CVE-2002-2420 - https://github.com/CVEDB/awesome-cve-repo CVE-2002-2420 - https://github.com/krdsploit/CVE-2002-2420 CVE-2002-2443 - https://github.com/ARPSyndicate/cvemon CVE-2003-0001 - https://github.com/ARPSyndicate/cvemon @@ -844,6 +874,7 @@ CVE-2004-0077 - https://github.com/C0dak/linux-kernel-exploits CVE-2004-0077 - https://github.com/C0dak/local-root-exploit- CVE-2004-0077 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2004-0077 - https://github.com/Feng4/linux-kernel-exploits +CVE-2004-0077 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2004-0077 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2004-0077 - https://github.com/Micr067/linux-kernel-exploits CVE-2004-0077 - https://github.com/QChiLan/linux-exp @@ -882,6 +913,7 @@ CVE-2004-0077 - https://github.com/qiantu88/Linux--exp CVE-2004-0077 - https://github.com/rakjong/LinuxElevation CVE-2004-0077 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2004-0077 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2004-0077 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2004-0077 - https://github.com/xairy/linux-kernel-exploitation CVE-2004-0077 - https://github.com/xfinest/linux-kernel-exploits CVE-2004-0077 - https://github.com/xssfile/linux-kernel-exploits @@ -964,6 +996,7 @@ CVE-2004-1235 - https://github.com/C0dak/linux-kernel-exploits CVE-2004-1235 - https://github.com/C0dak/local-root-exploit- CVE-2004-1235 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2004-1235 - https://github.com/Feng4/linux-kernel-exploits +CVE-2004-1235 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2004-1235 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2004-1235 - https://github.com/Micr067/linux-kernel-exploits CVE-2004-1235 - https://github.com/QChiLan/linux-exp @@ -1202,6 +1235,7 @@ CVE-2005-0736 - https://github.com/C0dak/linux-kernel-exploits CVE-2005-0736 - https://github.com/C0dak/local-root-exploit- CVE-2005-0736 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2005-0736 - https://github.com/Feng4/linux-kernel-exploits +CVE-2005-0736 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2005-0736 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2005-0736 - https://github.com/Micr067/linux-kernel-exploits CVE-2005-0736 - https://github.com/QChiLan/linux-exp @@ -1250,6 +1284,7 @@ CVE-2005-1263 - https://github.com/C0dak/linux-kernel-exploits CVE-2005-1263 - https://github.com/C0dak/local-root-exploit- CVE-2005-1263 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2005-1263 - https://github.com/Feng4/linux-kernel-exploits +CVE-2005-1263 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2005-1263 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2005-1263 - https://github.com/Micr067/linux-kernel-exploits CVE-2005-1263 - https://github.com/QChiLan/linux-exp @@ -1290,6 +1325,7 @@ CVE-2005-1794 - https://github.com/CVEDB/PoC-List CVE-2005-1794 - https://github.com/CVEDB/awesome-cve-repo CVE-2005-1794 - https://github.com/InitRoot/CVE-2005-1794Scanner CVE-2005-1794 - https://github.com/Ressurect0/fluffyLogic +CVE-2005-1794 - https://github.com/anvithalolla/Tesla_PenTest CVE-2005-1915 - https://github.com/mirac7/codegraph CVE-2005-1983 - https://github.com/ARPSyndicate/cvemon CVE-2005-1983 - https://github.com/Al1ex/WindowsElevation @@ -1318,6 +1354,7 @@ CVE-2005-2428 - https://github.com/Elsfa7-110/kenzer-templates CVE-2005-2428 - https://github.com/POORVAJA-195/Nuclei-Analysis-main CVE-2005-2428 - https://github.com/d4n-sec/d4n-sec.github.io CVE-2005-2428 - https://github.com/gojhonny/Pentesting-Scripts +CVE-2005-2428 - https://github.com/jobroche/Pentesting-Scripts CVE-2005-2428 - https://github.com/merlinepedra/nuclei-templates CVE-2005-2428 - https://github.com/merlinepedra25/nuclei-templates CVE-2005-2428 - https://github.com/schwankner/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit @@ -1450,6 +1487,7 @@ CVE-2006-20001 - https://github.com/ARPSyndicate/cvemon CVE-2006-20001 - https://github.com/ByteXenon/IP-Security-Database CVE-2006-20001 - https://github.com/CVEDB/PoC-List CVE-2006-20001 - https://github.com/CVEDB/awesome-cve-repo +CVE-2006-20001 - https://github.com/EzeTauil/Maquina-Upload CVE-2006-20001 - https://github.com/Live-Hack-CVE/CVE-2006-20001 CVE-2006-20001 - https://github.com/Saksham2002/CVE-2006-20001 CVE-2006-20001 - https://github.com/bioly230/THM_Skynet @@ -1478,6 +1516,7 @@ CVE-2006-2451 - https://github.com/C0dak/linux-kernel-exploits CVE-2006-2451 - https://github.com/C0dak/local-root-exploit- CVE-2006-2451 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2006-2451 - https://github.com/Feng4/linux-kernel-exploits +CVE-2006-2451 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2006-2451 - https://github.com/Jasut1n/CVE CVE-2006-2451 - https://github.com/Jasut1n/c-exploits CVE-2006-2451 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits @@ -1602,6 +1641,7 @@ CVE-2006-3626 - https://github.com/C0dak/linux-kernel-exploits CVE-2006-3626 - https://github.com/C0dak/local-root-exploit- CVE-2006-3626 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2006-3626 - https://github.com/Feng4/linux-kernel-exploits +CVE-2006-3626 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2006-3626 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2006-3626 - https://github.com/Micr067/linux-kernel-exploits CVE-2006-3626 - https://github.com/QChiLan/linux-exp @@ -2146,6 +2186,7 @@ CVE-2007-4573 - https://github.com/knd06/linux-kernel-exploitation CVE-2007-4573 - https://github.com/ndk191/linux-kernel-exploitation CVE-2007-4573 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2007-4573 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2007-4573 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2007-4573 - https://github.com/xairy/linux-kernel-exploitation CVE-2007-4607 - https://github.com/ARPSyndicate/cvemon CVE-2007-4607 - https://github.com/CVEDB/PoC-List @@ -2398,6 +2439,7 @@ CVE-2008-0009 - https://github.com/knd06/linux-kernel-exploitation CVE-2008-0009 - https://github.com/ndk191/linux-kernel-exploitation CVE-2008-0009 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2008-0009 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2008-0009 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2008-0009 - https://github.com/xairy/linux-kernel-exploitation CVE-2008-0010 - https://github.com/ARPSyndicate/cvemon CVE-2008-0010 - https://github.com/R0B1NL1N/linux-kernel-exploitation @@ -2413,6 +2455,7 @@ CVE-2008-0010 - https://github.com/knd06/linux-kernel-exploitation CVE-2008-0010 - https://github.com/ndk191/linux-kernel-exploitation CVE-2008-0010 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2008-0010 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2008-0010 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2008-0010 - https://github.com/xairy/linux-kernel-exploitation CVE-2008-0116 - https://github.com/defensahacker/debian-weak-ssh CVE-2008-0122 - https://github.com/Heshamshaban001/Kioptix-level-1-walk-through @@ -2515,6 +2558,7 @@ CVE-2008-0600 - https://github.com/C0dak/linux-kernel-exploits CVE-2008-0600 - https://github.com/C0dak/local-root-exploit- CVE-2008-0600 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2008-0600 - https://github.com/Feng4/linux-kernel-exploits +CVE-2008-0600 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2008-0600 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2008-0600 - https://github.com/Micr067/linux-kernel-exploits CVE-2008-0600 - https://github.com/QChiLan/linux-exp @@ -2553,6 +2597,7 @@ CVE-2008-0600 - https://github.com/qiantu88/Linux--exp CVE-2008-0600 - https://github.com/rakjong/LinuxElevation CVE-2008-0600 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2008-0600 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2008-0600 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2008-0600 - https://github.com/xairy/linux-kernel-exploitation CVE-2008-0600 - https://github.com/xfinest/linux-kernel-exploits CVE-2008-0600 - https://github.com/xssfile/linux-kernel-exploits @@ -2567,6 +2612,7 @@ CVE-2008-0888 - https://github.com/phonito/phonito-vulnerable-container CVE-2008-0891 - https://github.com/ARPSyndicate/cvemon CVE-2008-0891 - https://github.com/chnzzh/OpenSSL-CVE-lib CVE-2008-0900 - https://github.com/Al1ex/LinuxEelvation +CVE-2008-0900 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2008-0900 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2008-0900 - https://github.com/Snoopy-Sec/Localroot-ALL-CVE CVE-2008-0900 - https://github.com/fei9747/LinuxEelvation @@ -2934,6 +2980,7 @@ CVE-2008-4210 - https://github.com/C0dak/linux-kernel-exploits CVE-2008-4210 - https://github.com/C0dak/local-root-exploit- CVE-2008-4210 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2008-4210 - https://github.com/Feng4/linux-kernel-exploits +CVE-2008-4210 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2008-4210 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2008-4210 - https://github.com/Micr067/linux-kernel-exploits CVE-2008-4210 - https://github.com/QChiLan/linux-exp @@ -3272,6 +3319,7 @@ CVE-2009-0065 - https://github.com/knd06/linux-kernel-exploitation CVE-2009-0065 - https://github.com/ndk191/linux-kernel-exploitation CVE-2009-0065 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2009-0065 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2009-0065 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2009-0065 - https://github.com/xairy/linux-kernel-exploitation CVE-2009-0075 - https://github.com/Shenal01/SNP_CVE_RESEARCH CVE-2009-0079 - https://github.com/Al1ex/WindowsElevation @@ -3474,6 +3522,7 @@ CVE-2009-1046 - https://github.com/knd06/linux-kernel-exploitation CVE-2009-1046 - https://github.com/ndk191/linux-kernel-exploitation CVE-2009-1046 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2009-1046 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2009-1046 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2009-1046 - https://github.com/xairy/linux-kernel-exploitation CVE-2009-1061 - https://github.com/0xCyberY/CVE-T4PDF CVE-2009-1061 - https://github.com/ARPSyndicate/cvemon @@ -3516,6 +3565,7 @@ CVE-2009-1185 - https://github.com/C0dak/linux-kernel-exploits CVE-2009-1185 - https://github.com/C0dak/local-root-exploit- CVE-2009-1185 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2009-1185 - https://github.com/Feng4/linux-kernel-exploits +CVE-2009-1185 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2009-1185 - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester CVE-2009-1185 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2009-1185 - https://github.com/Micr067/linux-kernel-exploits @@ -3613,6 +3663,7 @@ CVE-2009-1337 - https://github.com/C0dak/linux-kernel-exploits CVE-2009-1337 - https://github.com/C0dak/local-root-exploit- CVE-2009-1337 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2009-1337 - https://github.com/Feng4/linux-kernel-exploits +CVE-2009-1337 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2009-1337 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2009-1337 - https://github.com/Micr067/linux-kernel-exploits CVE-2009-1337 - https://github.com/QChiLan/linux-exp @@ -3838,6 +3889,7 @@ CVE-2009-2692 - https://github.com/CVEDB/PoC-List CVE-2009-2692 - https://github.com/CVEDB/awesome-cve-repo CVE-2009-2692 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2009-2692 - https://github.com/Feng4/linux-kernel-exploits +CVE-2009-2692 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2009-2692 - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester CVE-2009-2692 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2009-2692 - https://github.com/Micr067/linux-kernel-exploits @@ -3888,6 +3940,7 @@ CVE-2009-2692 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2009-2692 - https://github.com/talent-x90c/cve_list CVE-2009-2692 - https://github.com/tangsilian/android-vuln CVE-2009-2692 - https://github.com/taviso/iknowthis +CVE-2009-2692 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2009-2692 - https://github.com/x90hack/vulnerabilty_lab CVE-2009-2692 - https://github.com/xairy/linux-kernel-exploitation CVE-2009-2692 - https://github.com/xfinest/linux-kernel-exploits @@ -3903,6 +3956,7 @@ CVE-2009-2698 - https://github.com/CVEDB/PoC-List CVE-2009-2698 - https://github.com/CVEDB/awesome-cve-repo CVE-2009-2698 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2009-2698 - https://github.com/Feng4/linux-kernel-exploits +CVE-2009-2698 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2009-2698 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2009-2698 - https://github.com/Micr067/linux-kernel-exploits CVE-2009-2698 - https://github.com/QChiLan/linux-exp @@ -3987,6 +4041,7 @@ CVE-2009-2910 - https://github.com/knd06/linux-kernel-exploitation CVE-2009-2910 - https://github.com/ndk191/linux-kernel-exploitation CVE-2009-2910 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2009-2910 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2009-2910 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2009-2910 - https://github.com/xairy/linux-kernel-exploitation CVE-2009-2942 - https://github.com/scmanjarrez/CVEScannerV2 CVE-2009-2948 - https://github.com/Live-Hack-CVE/CVE-2009-2948 @@ -4008,6 +4063,7 @@ CVE-2009-3001 - https://github.com/knd06/linux-kernel-exploitation CVE-2009-3001 - https://github.com/ndk191/linux-kernel-exploitation CVE-2009-3001 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2009-3001 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2009-3001 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2009-3001 - https://github.com/xairy/linux-kernel-exploitation CVE-2009-3036 - https://github.com/ARPSyndicate/cvemon CVE-2009-3036 - https://github.com/CVEDB/awesome-cve-repo @@ -4101,6 +4157,7 @@ CVE-2009-3547 - https://github.com/C0dak/linux-kernel-exploits CVE-2009-3547 - https://github.com/C0dak/local-root-exploit- CVE-2009-3547 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2009-3547 - https://github.com/Feng4/linux-kernel-exploits +CVE-2009-3547 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2009-3547 - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester CVE-2009-3547 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2009-3547 - https://github.com/Micr067/linux-kernel-exploits @@ -4215,6 +4272,7 @@ CVE-2009-3843 - https://github.com/oneplus-x/Sn1per CVE-2009-3843 - https://github.com/samba234/Sniper CVE-2009-3843 - https://github.com/twekkis/cybersecuritybase-project2 CVE-2009-3843 - https://github.com/unusualwork/Sn1per +CVE-2009-3895 - https://github.com/ch1hyun/fuzzing-class CVE-2009-3938 - https://github.com/0xCyberY/CVE-T4PDF CVE-2009-3938 - https://github.com/ARPSyndicate/cvemon CVE-2009-3941 - https://github.com/ARPSyndicate/cvemon @@ -4679,6 +4737,7 @@ CVE-2010-1146 - https://github.com/C0dak/linux-kernel-exploits CVE-2010-1146 - https://github.com/C0dak/local-root-exploit- CVE-2010-1146 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2010-1146 - https://github.com/Feng4/linux-kernel-exploits +CVE-2010-1146 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2010-1146 - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester CVE-2010-1146 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2010-1146 - https://github.com/Micr067/linux-kernel-exploits @@ -5099,6 +5158,7 @@ CVE-2010-2240 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2010-2240 - https://github.com/knd06/linux-kernel-exploitation CVE-2010-2240 - https://github.com/ndk191/linux-kernel-exploitation CVE-2010-2240 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2010-2240 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2010-2240 - https://github.com/xairy/linux-kernel-exploitation CVE-2010-2259 - https://github.com/ARPSyndicate/kenzer-templates CVE-2010-2307 - https://github.com/ARPSyndicate/kenzer-templates @@ -5368,6 +5428,7 @@ CVE-2010-2554 - https://github.com/fei9747/WindowsElevation CVE-2010-2554 - https://github.com/ycdxsb/WindowsPrivilegeEscalation CVE-2010-2568 - https://github.com/ARPSyndicate/cvemon CVE-2010-2568 - https://github.com/Kuromesi/Py4CSKG +CVE-2010-2568 - https://github.com/MN439/bingduziyuan CVE-2010-2568 - https://github.com/Ostorlab/KEV CVE-2010-2568 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors CVE-2010-2568 - https://github.com/jisosomppi/pentesting @@ -5485,6 +5546,7 @@ CVE-2010-2883 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detec CVE-2010-2883 - https://github.com/ThunderJie/CVE CVE-2010-2883 - https://github.com/Zhouyi827/myblog CVE-2010-2883 - https://github.com/amliaW4/amliaW4.github.io +CVE-2010-2883 - https://github.com/fangdada/ctf CVE-2010-2883 - https://github.com/int0/pdfexplorer CVE-2010-2883 - https://github.com/season-lab/rop-collection CVE-2010-2883 - https://github.com/xinali/articles @@ -5510,6 +5572,7 @@ CVE-2010-2959 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2010-2959 - https://github.com/DhivaKD/OSCP-Notes CVE-2010-2959 - https://github.com/Elinpf/OSCP-survival-guide CVE-2010-2959 - https://github.com/Feng4/linux-kernel-exploits +CVE-2010-2959 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2010-2959 - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester CVE-2010-2959 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2010-2959 - https://github.com/MLGBSec/os-survival @@ -5585,6 +5648,7 @@ CVE-2010-2959 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2010-2959 - https://github.com/spencerdodd/kernelpop CVE-2010-2959 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2010-2959 - https://github.com/whackmanic/OSCP_Found +CVE-2010-2959 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2010-2959 - https://github.com/xairy/linux-kernel-exploitation CVE-2010-2959 - https://github.com/xfinest/linux-kernel-exploits CVE-2010-2959 - https://github.com/xssfile/linux-kernel-exploits @@ -5606,6 +5670,7 @@ CVE-2010-2963 - https://github.com/knd06/linux-kernel-exploitation CVE-2010-2963 - https://github.com/ndk191/linux-kernel-exploitation CVE-2010-2963 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2010-2963 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2010-2963 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2010-2963 - https://github.com/xairy/linux-kernel-exploitation CVE-2010-3035 - https://github.com/Ostorlab/KEV CVE-2010-3035 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors @@ -5618,6 +5683,7 @@ CVE-2010-3081 - https://github.com/C0dak/linux-kernel-exploits CVE-2010-3081 - https://github.com/C0dak/local-root-exploit- CVE-2010-3081 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2010-3081 - https://github.com/Feng4/linux-kernel-exploits +CVE-2010-3081 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2010-3081 - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester CVE-2010-3081 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2010-3081 - https://github.com/Micr067/linux-kernel-exploits @@ -5661,6 +5727,7 @@ CVE-2010-3081 - https://github.com/rakjong/LinuxElevation CVE-2010-3081 - https://github.com/ram4u/Linux_Exploit_Suggester CVE-2010-3081 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2010-3081 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2010-3081 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2010-3081 - https://github.com/xairy/linux-kernel-exploitation CVE-2010-3081 - https://github.com/xfinest/linux-kernel-exploits CVE-2010-3081 - https://github.com/xssfile/linux-kernel-exploits @@ -5687,6 +5754,7 @@ CVE-2010-3301 - https://github.com/C0dak/linux-kernel-exploits CVE-2010-3301 - https://github.com/C0dak/local-root-exploit- CVE-2010-3301 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2010-3301 - https://github.com/Feng4/linux-kernel-exploits +CVE-2010-3301 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2010-3301 - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester CVE-2010-3301 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2010-3301 - https://github.com/Micr067/linux-kernel-exploits @@ -5729,6 +5797,7 @@ CVE-2010-3301 - https://github.com/rakjong/LinuxElevation CVE-2010-3301 - https://github.com/ram4u/Linux_Exploit_Suggester CVE-2010-3301 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2010-3301 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2010-3301 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2010-3301 - https://github.com/xairy/linux-kernel-exploitation CVE-2010-3301 - https://github.com/xfinest/linux-kernel-exploits CVE-2010-3301 - https://github.com/xssfile/linux-kernel-exploits @@ -5754,6 +5823,7 @@ CVE-2010-3333 - https://github.com/djschleen/ash CVE-2010-3333 - https://github.com/doshyt/cve-monitor CVE-2010-3333 - https://github.com/enthought/cve-search CVE-2010-3333 - https://github.com/extremenetworks/cve-search-src +CVE-2010-3333 - https://github.com/fangdada/ctf CVE-2010-3333 - https://github.com/jerfinj/cve-search CVE-2010-3333 - https://github.com/miradam/cve-search CVE-2010-3333 - https://github.com/pandazheng/Threat-Intelligence-Analyst @@ -5832,6 +5902,7 @@ CVE-2010-3437 - https://github.com/rakjong/LinuxElevation CVE-2010-3437 - https://github.com/ram4u/Linux_Exploit_Suggester CVE-2010-3437 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2010-3437 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2010-3437 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2010-3437 - https://github.com/xairy/linux-kernel-exploitation CVE-2010-3437 - https://github.com/xfinest/linux-kernel-exploits CVE-2010-3437 - https://github.com/xssfile/linux-kernel-exploits @@ -6007,6 +6078,7 @@ CVE-2010-3904 - https://github.com/DictionaryHouse/The-Security-Handbook-Kali-Li CVE-2010-3904 - https://github.com/Elinpf/OSCP-survival-guide CVE-2010-3904 - https://github.com/Feng4/linux-kernel-exploits CVE-2010-3904 - https://github.com/Gajasurve/The-Security-Handbook +CVE-2010-3904 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2010-3904 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2010-3904 - https://github.com/MLGBSec/os-survival CVE-2010-3904 - https://github.com/Micr067/linux-kernel-exploits @@ -6128,6 +6200,7 @@ CVE-2010-4073 - https://github.com/C0dak/linux-kernel-exploits CVE-2010-4073 - https://github.com/C0dak/local-root-exploit- CVE-2010-4073 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2010-4073 - https://github.com/Feng4/linux-kernel-exploits +CVE-2010-4073 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2010-4073 - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester CVE-2010-4073 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2010-4073 - https://github.com/Micr067/linux-kernel-exploits @@ -6199,6 +6272,7 @@ CVE-2010-4258 - https://github.com/C0dak/local-root-exploit- CVE-2010-4258 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2010-4258 - https://github.com/Feng4/linux-kernel-exploits CVE-2010-4258 - https://github.com/HUSTSeclab/Kernel-Exploits +CVE-2010-4258 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2010-4258 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2010-4258 - https://github.com/Micr067/linux-kernel-exploits CVE-2010-4258 - https://github.com/QChiLan/linux-exp @@ -6243,6 +6317,7 @@ CVE-2010-4258 - https://github.com/sonu7519/linux-priv-Esc CVE-2010-4258 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2010-4258 - https://github.com/tranquac/Linux-Privilege-Escalation CVE-2010-4258 - https://github.com/usamaelshazly/Linux-Privilege-Escalation +CVE-2010-4258 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2010-4258 - https://github.com/xairy/linux-kernel-exploitation CVE-2010-4258 - https://github.com/xfinest/linux-kernel-exploits CVE-2010-4258 - https://github.com/xssfile/linux-kernel-exploits @@ -6269,6 +6344,7 @@ CVE-2010-4347 - https://github.com/C0dak/linux-kernel-exploits CVE-2010-4347 - https://github.com/C0dak/local-root-exploit- CVE-2010-4347 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2010-4347 - https://github.com/Feng4/linux-kernel-exploits +CVE-2010-4347 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2010-4347 - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester CVE-2010-4347 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2010-4347 - https://github.com/Micr067/linux-kernel-exploits @@ -6428,6 +6504,7 @@ CVE-2010-5107 - https://github.com/zzzWTF/db-13-01 CVE-2010-5110 - https://github.com/0xCyberY/CVE-T4PDF CVE-2010-5110 - https://github.com/ARPSyndicate/cvemon CVE-2010-5137 - https://github.com/ARPSyndicate/cvemon +CVE-2010-5137 - https://github.com/cryptoquick/ossification CVE-2010-5137 - https://github.com/uvhw/conchimgiangnang CVE-2010-5137 - https://github.com/uvhw/wallet.cpp CVE-2010-5138 - https://github.com/ARPSyndicate/cvemon @@ -6625,6 +6702,7 @@ CVE-2011-0762 - https://github.com/Okarn/TP_securite_EDOU_JACQUEMONT CVE-2011-0762 - https://github.com/hack-parthsharma/Vision CVE-2011-0807 - https://github.com/ACIC-Africa/metasploitable3 CVE-2011-0865 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs +CVE-2011-0923 - https://github.com/marcocarolasec/CVE-2016-2004-Exploit CVE-2011-10001 - https://github.com/Live-Hack-CVE/CVE-2011-10001 CVE-2011-10001 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2011-10002 - https://github.com/Live-Hack-CVE/CVE-2011-10002 @@ -6775,6 +6853,7 @@ CVE-2011-1493 - https://github.com/knd06/linux-kernel-exploitation CVE-2011-1493 - https://github.com/ndk191/linux-kernel-exploitation CVE-2011-1493 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2011-1493 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2011-1493 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2011-1493 - https://github.com/xairy/linux-kernel-exploitation CVE-2011-1502 - https://github.com/starnightcyber/vul-info-collect CVE-2011-1503 - https://github.com/starnightcyber/vul-info-collect @@ -6960,6 +7039,7 @@ CVE-2011-2523 - https://github.com/sanskar30/vsftpd_2.3.4_Exploit CVE-2011-2523 - https://github.com/shamsulchowdhury/Unit-16-Homework-Penetration-Testing1 CVE-2011-2523 - https://github.com/slxwzk/slxwzkBotnet CVE-2011-2523 - https://github.com/sponkmonk/Ladon_english_update +CVE-2011-2523 - https://github.com/sug4r-wr41th/CVE-2011-2523 CVE-2011-2523 - https://github.com/sunzu94/vsftpd_2.3.4_Exploit CVE-2011-2523 - https://github.com/tarikemal/exploit-ftp-samba CVE-2011-2523 - https://github.com/thanawut2903/Port-21-tcp-vsftpd-2.3.4-exploit @@ -7153,6 +7233,7 @@ CVE-2011-3374 - https://github.com/garethr/findcve CVE-2011-3374 - https://github.com/garethr/snykout CVE-2011-3374 - https://github.com/goharbor/pluggable-scanner-spec CVE-2011-3374 - https://github.com/jnsgruk/trivy-cvss-tools +CVE-2011-3374 - https://github.com/m-pasima/CI-CD-Security-image-scan CVE-2011-3374 - https://github.com/mauraneh/WIK-DPS-TP02 CVE-2011-3374 - https://github.com/sharmapravin1001/Kubernetes-cks CVE-2011-3374 - https://github.com/siddharthraopotukuchi/trivy @@ -7182,6 +7263,7 @@ CVE-2011-3389 - https://github.com/WiktorMysz/devops-netology CVE-2011-3389 - https://github.com/alexandrburyakov/Rep2 CVE-2011-3389 - https://github.com/alexgro1982/devops-netology CVE-2011-3389 - https://github.com/bysart/devops-netology +CVE-2011-3389 - https://github.com/catsploit/catsploit CVE-2011-3389 - https://github.com/cdupuis/image-api CVE-2011-3389 - https://github.com/daniel1302/litecoin CVE-2011-3389 - https://github.com/dmitrii1312/03-sysadmin-09 @@ -7213,6 +7295,7 @@ CVE-2011-3544 - https://github.com/yasuobgg/crawl_daily_ioc_using_OTXv2 CVE-2011-3545 - https://github.com/dyjakan/exploit-development-case-studies CVE-2011-3556 - https://github.com/20142995/Goby CVE-2011-3556 - https://github.com/ARPSyndicate/cvemon +CVE-2011-3556 - https://github.com/CVEDB/awesome-cve-repo CVE-2011-3556 - https://github.com/HimmelAward/Goby_POC CVE-2011-3556 - https://github.com/MelanyRoob/Goby CVE-2011-3556 - https://github.com/Z0fhack/Goby_POC @@ -7262,6 +7345,7 @@ CVE-2011-3654 - https://github.com/sambacha/mirror-radamsa CVE-2011-3654 - https://github.com/sunzu94/radamsa-Fuzzer CVE-2011-3659 - https://github.com/nyimol/AttributeChildRemoved_UAF CVE-2011-3659 - https://github.com/rakwaht/FirefoxExploits +CVE-2011-3730 - https://github.com/catsploit/catsploit CVE-2011-3796 - https://github.com/zapalm/prestashop-security-vulnerability-checker CVE-2011-3872 - https://github.com/ARPSyndicate/cvemon CVE-2011-3872 - https://github.com/CVEDB/PoC-List @@ -7491,6 +7575,7 @@ CVE-2011-4447 - https://github.com/ARPSyndicate/cvemon CVE-2011-4447 - https://github.com/uvhw/conchimgiangnang CVE-2011-4461 - https://github.com/Anonymous-Phunter/PHunter CVE-2011-4461 - https://github.com/CGCL-codes/PHunter +CVE-2011-4461 - https://github.com/LibHunter/LibHunter CVE-2011-4461 - https://github.com/javirodriguezzz/Shodan-Browser CVE-2011-4544 - https://github.com/zapalm/prestashop-security-vulnerability-checker CVE-2011-4545 - https://github.com/zapalm/prestashop-security-vulnerability-checker @@ -7538,6 +7623,7 @@ CVE-2011-4926 - https://github.com/ARPSyndicate/kenzer-templates CVE-2011-4926 - https://github.com/d4n-sec/d4n-sec.github.io CVE-2011-4968 - https://github.com/lukeber4/usn-search CVE-2011-4969 - https://github.com/FallibleInc/retirejslib +CVE-2011-4969 - https://github.com/catsploit/catsploit CVE-2011-4969 - https://github.com/ctcpip/jquery-security CVE-2011-4969 - https://github.com/eliasgranderubio/4depcheck CVE-2011-4971 - https://github.com/secure-rewind-and-discard/sdrad_utils @@ -7686,6 +7772,7 @@ CVE-2012-0056 - https://github.com/DotSight7/Cheatsheet CVE-2012-0056 - https://github.com/Elinpf/OSCP-survival-guide CVE-2012-0056 - https://github.com/Feng4/linux-kernel-exploits CVE-2012-0056 - https://github.com/Gajasurve/The-Security-Handbook +CVE-2012-0056 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2012-0056 - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester CVE-2012-0056 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2012-0056 - https://github.com/MLGBSec/os-survival @@ -7792,6 +7879,7 @@ CVE-2012-0056 - https://github.com/tangsilian/android-vuln CVE-2012-0056 - https://github.com/tranquac/Linux-Privilege-Escalation CVE-2012-0056 - https://github.com/usamaelshazly/Linux-Privilege-Escalation CVE-2012-0056 - https://github.com/whackmanic/OSCP_Found +CVE-2012-0056 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2012-0056 - https://github.com/xairy/linux-kernel-exploitation CVE-2012-0056 - https://github.com/xcsrf/OSCP-PWK-Notes-Public CVE-2012-0056 - https://github.com/xfinest/linux-kernel-exploits @@ -7877,6 +7965,7 @@ CVE-2012-0158 - https://github.com/Ygodsec/- CVE-2012-0158 - https://github.com/amliaW4/amliaW4.github.io CVE-2012-0158 - https://github.com/cnhouzi/APTNotes CVE-2012-0158 - https://github.com/czq945659538/-study +CVE-2012-0158 - https://github.com/fangdada/ctf CVE-2012-0158 - https://github.com/havocykp/Vulnerability-analysis CVE-2012-0158 - https://github.com/helloandrewpaul/Mandiant---APT CVE-2012-0158 - https://github.com/houjingyi233/office-exploit-case-study @@ -8247,9 +8336,11 @@ CVE-2012-1823 - https://github.com/SexyBeast233/SecBooks CVE-2012-1823 - https://github.com/Soundaryakambhampati/test-6 CVE-2012-1823 - https://github.com/Unix13/metasploitable2 CVE-2012-1823 - https://github.com/Vibragence/Dockersploit +CVE-2012-1823 - https://github.com/XiangDongCJC/CVE-2024-4577-PHP-CGI-RCE CVE-2012-1823 - https://github.com/ajread4/cve_pull CVE-2012-1823 - https://github.com/alex14324/Eagel CVE-2012-1823 - https://github.com/beched/libpywebhack +CVE-2012-1823 - https://github.com/bl4cksku11/CVE-2024-4577 CVE-2012-1823 - https://github.com/cyberdeception/deepdig CVE-2012-1823 - https://github.com/cyberharsh/PHP_CVE-2012-1823 CVE-2012-1823 - https://github.com/daai1/CVE-2012-1823 @@ -8312,6 +8403,7 @@ CVE-2012-2034 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detec CVE-2012-2098 - https://github.com/Anonymous-Phunter/PHunter CVE-2012-2098 - https://github.com/BrunoBonacci/lein-binplus CVE-2012-2098 - https://github.com/CGCL-codes/PHunter +CVE-2012-2098 - https://github.com/LibHunter/LibHunter CVE-2012-2098 - https://github.com/markus-wa/clj-bin CVE-2012-2110 - https://github.com/ARPSyndicate/cvemon CVE-2012-2110 - https://github.com/chnzzh/OpenSSL-CVE-lib @@ -8471,6 +8563,7 @@ CVE-2012-2825 - https://github.com/sambacha/mirror-radamsa CVE-2012-2825 - https://github.com/sunzu94/radamsa-Fuzzer CVE-2012-2836 - https://github.com/ARPSyndicate/cvemon CVE-2012-2836 - https://github.com/asur4s/fuzzing +CVE-2012-2836 - https://github.com/ch1hyun/fuzzing-class CVE-2012-2836 - https://github.com/chiehw/fuzzing CVE-2012-2849 - https://github.com/Hwangtaewon/radamsa CVE-2012-2849 - https://github.com/StephenHaruna/RADAMSA @@ -8509,6 +8602,7 @@ CVE-2012-2982 - https://github.com/LeDucKhiem/CVE-2012-2982 CVE-2012-2982 - https://github.com/Mithlonde/Mithlonde CVE-2012-2982 - https://github.com/OstojaOfficial/CVE-2012-2982 CVE-2012-2982 - https://github.com/R00tendo/CVE-2012-2982 +CVE-2012-2982 - https://github.com/Shadow-Spinner/CVE-2012-2982_python CVE-2012-2982 - https://github.com/SlizBinksman/CVE_2012-2982 CVE-2012-2982 - https://github.com/Will-Banksy/My-Exploits CVE-2012-2982 - https://github.com/alien-keric/webmin-v1.580-exploit @@ -8562,6 +8656,7 @@ CVE-2012-3167 - https://github.com/Live-Hack-CVE/CVE-2012-3167 CVE-2012-3173 - https://github.com/Live-Hack-CVE/CVE-2012-3173 CVE-2012-3174 - https://github.com/ARPSyndicate/cvemon CVE-2012-3174 - https://github.com/ferdinandmudjialim/metasploit-cve-search +CVE-2012-3174 - https://github.com/tunnelcat/metasploit-cve-search CVE-2012-3177 - https://github.com/tomwillfixit/alpine-cvecheck CVE-2012-3180 - https://github.com/Live-Hack-CVE/CVE-2012-3180 CVE-2012-3197 - https://github.com/Live-Hack-CVE/CVE-2012-3197 @@ -8978,6 +9073,7 @@ CVE-2012-5204 - https://github.com/CERTCC/git_vul_driller CVE-2012-5221 - https://github.com/ARPSyndicate/cvemon CVE-2012-5221 - https://github.com/aredspy/HPCredDumper CVE-2012-5306 - https://github.com/anima1111/DLink-DCS-5009L +CVE-2012-5321 - https://github.com/Cappricio-Securities/CVE-2012-5321 CVE-2012-5475 - https://github.com/Live-Hack-CVE/CVE-2012-5475 CVE-2012-5510 - https://github.com/hinj/hInjector CVE-2012-5513 - https://github.com/hinj/hInjector @@ -9131,6 +9227,7 @@ CVE-2012-6706 - https://github.com/ARPSyndicate/cvemon CVE-2012-6706 - https://github.com/abge0386/Final-Project CVE-2012-6708 - https://github.com/ARPSyndicate/cvemon CVE-2012-6708 - https://github.com/catdever/watchdog +CVE-2012-6708 - https://github.com/catsploit/catsploit CVE-2012-6708 - https://github.com/ctcpip/jquery-security CVE-2012-6708 - https://github.com/flipkart-incubator/watchdog CVE-2012-6708 - https://github.com/rohankumardubey/watchdog @@ -9277,6 +9374,7 @@ CVE-2013-0268 - https://github.com/C0dak/linux-kernel-exploits CVE-2013-0268 - https://github.com/C0dak/local-root-exploit- CVE-2013-0268 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2013-0268 - https://github.com/Feng4/linux-kernel-exploits +CVE-2013-0268 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2013-0268 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2013-0268 - https://github.com/Micr067/linux-kernel-exploits CVE-2013-0268 - https://github.com/QChiLan/linux-exp @@ -9635,6 +9733,7 @@ CVE-2013-1763 - https://github.com/C0dak/linux-kernel-exploits CVE-2013-1763 - https://github.com/C0dak/local-root-exploit- CVE-2013-1763 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2013-1763 - https://github.com/Feng4/linux-kernel-exploits +CVE-2013-1763 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2013-1763 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2013-1763 - https://github.com/Micr067/linux-kernel-exploits CVE-2013-1763 - https://github.com/QChiLan/linux-exp @@ -9675,6 +9774,7 @@ CVE-2013-1763 - https://github.com/qkrtjsrbs315/CVE-2013-1763 CVE-2013-1763 - https://github.com/rakjong/LinuxElevation CVE-2013-1763 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2013-1763 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2013-1763 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2013-1763 - https://github.com/xairy/linux-kernel-exploitation CVE-2013-1763 - https://github.com/xfinest/linux-kernel-exploits CVE-2013-1763 - https://github.com/xssfile/linux-kernel-exploits @@ -9685,6 +9785,7 @@ CVE-2013-1768 - https://github.com/Anonymous-Phunter/PHunter CVE-2013-1768 - https://github.com/BrittanyKuhn/javascript-tutorial CVE-2013-1768 - https://github.com/CGCL-codes/PHunter CVE-2013-1768 - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet +CVE-2013-1768 - https://github.com/LibHunter/LibHunter CVE-2013-1768 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs CVE-2013-1768 - https://github.com/klausware/Java-Deserialization-Cheat-Sheet CVE-2013-1768 - https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet @@ -9703,6 +9804,7 @@ CVE-2013-1858 - https://github.com/C0dak/linux-kernel-exploits CVE-2013-1858 - https://github.com/C0dak/local-root-exploit- CVE-2013-1858 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2013-1858 - https://github.com/Feng4/linux-kernel-exploits +CVE-2013-1858 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2013-1858 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2013-1858 - https://github.com/Micr067/linux-kernel-exploits CVE-2013-1858 - https://github.com/QChiLan/linux-exp @@ -9813,6 +9915,7 @@ CVE-2013-1933 - https://github.com/ARPSyndicate/cvemon CVE-2013-1937 - https://github.com/spiegel-im-spiegel/cvss3 CVE-2013-1950 - https://github.com/Live-Hack-CVE/CVE-2013-1950 CVE-2013-1956 - https://github.com/ARPSyndicate/cvemon +CVE-2013-1959 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2013-1959 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2013-1965 - https://github.com/0day666/Vulnerability-verification CVE-2013-1965 - https://github.com/20142995/pocsuite3 @@ -9899,6 +10002,7 @@ CVE-2013-2094 - https://github.com/CVEDB/PoC-List CVE-2013-2094 - https://github.com/CVEDB/awesome-cve-repo CVE-2013-2094 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2013-2094 - https://github.com/Feng4/linux-kernel-exploits +CVE-2013-2094 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2013-2094 - https://github.com/I-Prashanth-S/CybersecurityTIFAC CVE-2013-2094 - https://github.com/IMCG/awesome-c CVE-2013-2094 - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester @@ -9970,6 +10074,7 @@ CVE-2013-2094 - https://github.com/tarunyadav/fix-cve-2013-2094 CVE-2013-2094 - https://github.com/timhsutw/cve-2013-2094 CVE-2013-2094 - https://github.com/vnik5287/CVE-2013-2094 CVE-2013-2094 - https://github.com/weeka10/-hktalent-TOP +CVE-2013-2094 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2013-2094 - https://github.com/xairy/linux-kernel-exploitation CVE-2013-2094 - https://github.com/xfinest/linux-kernel-exploits CVE-2013-2094 - https://github.com/xssfile/linux-kernel-exploits @@ -10873,6 +10978,7 @@ CVE-2013-7240 - https://github.com/JNado/CST312-WordPressExploits CVE-2013-7285 - https://github.com/ARPSyndicate/cvemon CVE-2013-7285 - https://github.com/Anonymous-Phunter/PHunter CVE-2013-7285 - https://github.com/CGCL-codes/PHunter +CVE-2013-7285 - https://github.com/LibHunter/LibHunter CVE-2013-7285 - https://github.com/Live-Hack-CVE/CVE-2019-10173 CVE-2013-7285 - https://github.com/OWASP/www-project-ide-vulscanner CVE-2013-7285 - https://github.com/Whoopsunix/PPPVULNS @@ -10941,6 +11047,7 @@ CVE-2014-0038 - https://github.com/CVEDB/top CVE-2014-0038 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2014-0038 - https://github.com/Feng4/linux-kernel-exploits CVE-2014-0038 - https://github.com/GhostTroops/TOP +CVE-2014-0038 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2014-0038 - https://github.com/IMCG/awesome-c CVE-2014-0038 - https://github.com/JERRY123S/all-poc CVE-2014-0038 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits @@ -10994,6 +11101,7 @@ CVE-2014-0038 - https://github.com/spencerdodd/kernelpop CVE-2014-0038 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2014-0038 - https://github.com/sujayadkesar/Linux-Privilege-Escalation CVE-2014-0038 - https://github.com/weeka10/-hktalent-TOP +CVE-2014-0038 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2014-0038 - https://github.com/xairy/linux-kernel-exploitation CVE-2014-0038 - https://github.com/xfinest/linux-kernel-exploits CVE-2014-0038 - https://github.com/xssfile/linux-kernel-exploits @@ -11761,6 +11869,7 @@ CVE-2014-0181 - https://github.com/ARPSyndicate/cvemon CVE-2014-0181 - https://github.com/lrh2000/CVE-2023-2002 CVE-2014-0193 - https://github.com/Anonymous-Phunter/PHunter CVE-2014-0193 - https://github.com/CGCL-codes/PHunter +CVE-2014-0193 - https://github.com/LibHunter/LibHunter CVE-2014-0193 - https://github.com/ian4hu/super-pom CVE-2014-0195 - https://github.com/ARPSyndicate/cvemon CVE-2014-0195 - https://github.com/PotterXma/linux-deployment-standard @@ -11777,6 +11886,7 @@ CVE-2014-0196 - https://github.com/C0dak/linux-kernel-exploits CVE-2014-0196 - https://github.com/C0dak/local-root-exploit- CVE-2014-0196 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2014-0196 - https://github.com/Feng4/linux-kernel-exploits +CVE-2014-0196 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2014-0196 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2014-0196 - https://github.com/Micr067/linux-kernel-exploits CVE-2014-0196 - https://github.com/Ostorlab/KEV @@ -11825,6 +11935,7 @@ CVE-2014-0196 - https://github.com/spencerdodd/kernelpop CVE-2014-0196 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2014-0196 - https://github.com/tangsilian/android-vuln CVE-2014-0196 - https://github.com/tempbottle/CVE-2014-0196 +CVE-2014-0196 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2014-0196 - https://github.com/xairy/linux-kernel-exploitation CVE-2014-0196 - https://github.com/xfinest/linux-kernel-exploits CVE-2014-0196 - https://github.com/xssfile/linux-kernel-exploits @@ -12440,6 +12551,7 @@ CVE-2014-2851 - https://github.com/oneoy/cve- CVE-2014-2851 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2014-2851 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2014-2851 - https://github.com/thomaxxl/group_info +CVE-2014-2851 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2014-2851 - https://github.com/xairy/linux-kernel-exploitation CVE-2014-2886 - https://github.com/andir/nixos-issue-db-example CVE-2014-2908 - https://github.com/ARPSyndicate/kenzer-templates @@ -12447,6 +12559,7 @@ CVE-2014-2913 - https://github.com/bootc/nrpe-ng CVE-2014-2913 - https://github.com/ohsawa0515/ec2-vuls-config CVE-2014-2917 - https://github.com/Ch4p34uN0iR/mongoaudit CVE-2014-2917 - https://github.com/gold1029/mongoaudit +CVE-2014-2917 - https://github.com/stampery/mongoaudit CVE-2014-2962 - https://github.com/ARPSyndicate/kenzer-templates CVE-2014-3068 - https://github.com/ARPSyndicate/cvemon CVE-2014-3068 - https://github.com/r-wisniewski/Vulnerability-Check @@ -12544,6 +12657,7 @@ CVE-2014-3153 - https://github.com/CVEDB/top CVE-2014-3153 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2014-3153 - https://github.com/Feng4/linux-kernel-exploits CVE-2014-3153 - https://github.com/GhostTroops/TOP +CVE-2014-3153 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2014-3153 - https://github.com/I-Prashanth-S/CybersecurityTIFAC CVE-2014-3153 - https://github.com/IMCG/awesome-c CVE-2014-3153 - https://github.com/JERRY123S/all-poc @@ -12615,6 +12729,7 @@ CVE-2014-3153 - https://github.com/tangsilian/android-vuln CVE-2014-3153 - https://github.com/timwr/CVE-2014-3153 CVE-2014-3153 - https://github.com/tymat/android_futex_root CVE-2014-3153 - https://github.com/weeka10/-hktalent-TOP +CVE-2014-3153 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2014-3153 - https://github.com/xairy/linux-kernel-exploitation CVE-2014-3153 - https://github.com/xfinest/linux-kernel-exploits CVE-2014-3153 - https://github.com/xssfile/linux-kernel-exploits @@ -12659,6 +12774,7 @@ CVE-2014-3480 - https://github.com/Live-Hack-CVE/CVE-2014-3480 CVE-2014-3487 - https://github.com/Live-Hack-CVE/CVE-2014-3487 CVE-2014-3488 - https://github.com/Anonymous-Phunter/PHunter CVE-2014-3488 - https://github.com/CGCL-codes/PHunter +CVE-2014-3488 - https://github.com/LibHunter/LibHunter CVE-2014-3488 - https://github.com/cezapata/appconfiguration-sample CVE-2014-3488 - https://github.com/ian4hu/super-pom CVE-2014-3498 - https://github.com/OSAS/ansible-role-ansible_bastion @@ -12843,6 +12959,7 @@ CVE-2014-3572 - https://github.com/neominds/JPN_RIC13351-2 CVE-2014-3577 - https://github.com/ARPSyndicate/cvemon CVE-2014-3577 - https://github.com/Anonymous-Phunter/PHunter CVE-2014-3577 - https://github.com/CGCL-codes/PHunter +CVE-2014-3577 - https://github.com/LibHunter/LibHunter CVE-2014-3577 - https://github.com/albfernandez/commons-httpclient-3 CVE-2014-3577 - https://github.com/argon-gh-demo/clojure-sample CVE-2014-3577 - https://github.com/rm-hull/nvd-clojure @@ -12944,6 +13061,7 @@ CVE-2014-3704 - https://github.com/Threekiii/Awesome-POC CVE-2014-3704 - https://github.com/Threekiii/Vulhub-Reproduce CVE-2014-3704 - https://github.com/Z0fhack/Goby_POC CVE-2014-3704 - https://github.com/bakery312/Vulhub-Reproduce +CVE-2014-3704 - https://github.com/catsploit/catsploit CVE-2014-3704 - https://github.com/enomothem/PenTestNote CVE-2014-3704 - https://github.com/happynote3966/CVE-2014-3704 CVE-2014-3704 - https://github.com/hxysaury/saury-vulnhub @@ -12971,6 +13089,7 @@ CVE-2014-3744 - https://github.com/ARPSyndicate/kenzer-templates CVE-2014-3744 - https://github.com/Elsfa7-110/kenzer-templates CVE-2014-3791 - https://github.com/0xT11/CVE-POC CVE-2014-3791 - https://github.com/Parist0nH1ll/Vulnerabilities-Write-Ups +CVE-2014-3791 - https://github.com/fangdada/ctf CVE-2014-3791 - https://github.com/hectorgie/PoC-in-GitHub CVE-2014-3852 - https://github.com/Whamo12/fetch-cwe-list CVE-2014-3852 - https://github.com/aemon1407/KWSPZapTest @@ -12987,6 +13106,7 @@ CVE-2014-4014 - https://github.com/C0dak/linux-kernel-exploits CVE-2014-4014 - https://github.com/C0dak/local-root-exploit- CVE-2014-4014 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2014-4014 - https://github.com/Feng4/linux-kernel-exploits +CVE-2014-4014 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2014-4014 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2014-4014 - https://github.com/Micr067/linux-kernel-exploits CVE-2014-4014 - https://github.com/QChiLan/linux-exp @@ -13028,6 +13148,7 @@ CVE-2014-4014 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2014-4014 - https://github.com/spencerdodd/kernelpop CVE-2014-4014 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2014-4014 - https://github.com/vnik5287/cve-2014-4014-privesc +CVE-2014-4014 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2014-4014 - https://github.com/xairy/linux-kernel-exploitation CVE-2014-4014 - https://github.com/xfinest/linux-kernel-exploits CVE-2014-4014 - https://github.com/xssfile/linux-kernel-exploits @@ -13344,6 +13465,7 @@ CVE-2014-4322 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2014-4322 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2014-4322 - https://github.com/tangsilian/android-vuln CVE-2014-4322 - https://github.com/weeka10/-hktalent-TOP +CVE-2014-4322 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2014-4322 - https://github.com/xairy/linux-kernel-exploitation CVE-2014-4323 - https://github.com/ARPSyndicate/cvemon CVE-2014-4323 - https://github.com/CVEDB/PoC-List @@ -13457,6 +13579,7 @@ CVE-2014-4699 - https://github.com/C0dak/linux-kernel-exploits CVE-2014-4699 - https://github.com/C0dak/local-root-exploit- CVE-2014-4699 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2014-4699 - https://github.com/Feng4/linux-kernel-exploits +CVE-2014-4699 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2014-4699 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2014-4699 - https://github.com/Micr067/linux-kernel-exploits CVE-2014-4699 - https://github.com/QChiLan/linux-exp @@ -13500,6 +13623,7 @@ CVE-2014-4699 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2014-4699 - https://github.com/spencerdodd/kernelpop CVE-2014-4699 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2014-4699 - https://github.com/vnik5287/cve-2014-4699-ptrace +CVE-2014-4699 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2014-4699 - https://github.com/xairy/linux-kernel-exploitation CVE-2014-4699 - https://github.com/xfinest/linux-kernel-exploits CVE-2014-4699 - https://github.com/xssfile/linux-kernel-exploits @@ -13535,6 +13659,7 @@ CVE-2014-4943 - https://github.com/ndk191/linux-kernel-exploitation CVE-2014-4943 - https://github.com/redes-2015/l2tp-socket-bug CVE-2014-4943 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2014-4943 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2014-4943 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2014-4943 - https://github.com/xairy/linux-kernel-exploitation CVE-2014-4966 - https://github.com/clhlc/ansible-2.0 CVE-2014-4967 - https://github.com/clhlc/ansible-2.0 @@ -14928,6 +15053,7 @@ CVE-2014-9295 - https://github.com/sous-chefs/ntp CVE-2014-9301 - https://github.com/ottimo/burp-alfresco-referer-proxy-cve-2014-9301 CVE-2014-9322 - https://github.com/ARPSyndicate/cvemon CVE-2014-9322 - https://github.com/Flerov/WindowsExploitDev +CVE-2014-9322 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2014-9322 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2014-9322 - https://github.com/R0B1NL1N/linux-kernel-exploitation CVE-2014-9322 - https://github.com/RKX1209/CVE-2014-9322 @@ -14947,6 +15073,7 @@ CVE-2014-9322 - https://github.com/paulveillard/cybersecurity-exploit-developmen CVE-2014-9322 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2014-9322 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2014-9322 - https://github.com/tangsilian/android-vuln +CVE-2014-9322 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2014-9322 - https://github.com/xairy/linux-kernel-exploitation CVE-2014-9328 - https://github.com/ARPSyndicate/cvemon CVE-2014-9328 - https://github.com/SRVRS094ADM/ClamAV @@ -14971,6 +15098,7 @@ CVE-2014-9390 - https://github.com/testingfly/xcode CVE-2014-9390 - https://github.com/timcharper/git_osx_installer CVE-2014-9402 - https://github.com/ARPSyndicate/cvemon CVE-2014-9410 - https://github.com/betalphafai/CVE-2015-0568 +CVE-2014-9418 - https://github.com/javierparadadev/python-value-objects CVE-2014-9418 - https://github.com/jparadadev/python-value-objects CVE-2014-9428 - https://github.com/Live-Hack-CVE/CVE-2014-9428 CVE-2014-9439 - https://github.com/Parist0nH1ll/Vulnerabilities-Write-Ups @@ -15192,6 +15320,7 @@ CVE-2015-0204 - https://github.com/alexoslabs/HTTPSScan CVE-2015-0204 - https://github.com/anthophilee/A2SV--SSL-VUL-Scan CVE-2015-0204 - https://github.com/bysart/devops-netology CVE-2015-0204 - https://github.com/camel-clarkson/non-controlflow-hijacking-datasets +CVE-2015-0204 - https://github.com/catsploit/catsploit CVE-2015-0204 - https://github.com/chnzzh/OpenSSL-CVE-lib CVE-2015-0204 - https://github.com/clic-kbait/A2SV--SSL-VUL-Scan CVE-2015-0204 - https://github.com/clino-mania/A2SV--SSL-VUL-Scan @@ -15527,6 +15656,7 @@ CVE-2015-0568 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2015-0568 - https://github.com/knd06/linux-kernel-exploitation CVE-2015-0568 - https://github.com/ndk191/linux-kernel-exploitation CVE-2015-0568 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2015-0568 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2015-0568 - https://github.com/xairy/linux-kernel-exploitation CVE-2015-0569 - https://github.com/tangsilian/android-vuln CVE-2015-0570 - https://github.com/ARPSyndicate/cvemon @@ -15543,6 +15673,7 @@ CVE-2015-0570 - https://github.com/knd06/linux-kernel-exploitation CVE-2015-0570 - https://github.com/ndk191/linux-kernel-exploitation CVE-2015-0570 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2015-0570 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2015-0570 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2015-0570 - https://github.com/xairy/linux-kernel-exploitation CVE-2015-0571 - https://github.com/thdusdl1219/CVE-Study CVE-2015-0572 - https://github.com/thdusdl1219/CVE-Study @@ -15782,6 +15913,7 @@ CVE-2015-1328 - https://github.com/C0dak/local-root-exploit- CVE-2015-1328 - https://github.com/DarkenCode/PoC CVE-2015-1328 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2015-1328 - https://github.com/Feng4/linux-kernel-exploits +CVE-2015-1328 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2015-1328 - https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups CVE-2015-1328 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2015-1328 - https://github.com/Micr067/linux-kernel-exploits @@ -16279,6 +16411,7 @@ CVE-2015-1805 - https://github.com/snorez/exploits CVE-2015-1805 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2015-1805 - https://github.com/tangsilian/android-vuln CVE-2015-1805 - https://github.com/weeka10/-hktalent-TOP +CVE-2015-1805 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2015-1805 - https://github.com/xairy/linux-kernel-exploitation CVE-2015-1817 - https://github.com/ARPSyndicate/cvemon CVE-2015-1819 - https://github.com/ARPSyndicate/cvemon @@ -16300,6 +16433,7 @@ CVE-2015-1833 - https://github.com/0ang3el/aem-hacker CVE-2015-1833 - https://github.com/ARPSyndicate/cvemon CVE-2015-1833 - https://github.com/Anonymous-Phunter/PHunter CVE-2015-1833 - https://github.com/CGCL-codes/PHunter +CVE-2015-1833 - https://github.com/LibHunter/LibHunter CVE-2015-1833 - https://github.com/Raz0r/aemscan CVE-2015-1833 - https://github.com/TheRipperJhon/AEMVS CVE-2015-1833 - https://github.com/amarnathadapa-sec/aem @@ -16376,6 +16510,7 @@ CVE-2015-2080 - https://github.com/ARPSyndicate/kenzer-templates CVE-2015-2080 - https://github.com/Anonymous-Phunter/PHunter CVE-2015-2080 - https://github.com/CGCL-codes/PHunter CVE-2015-2080 - https://github.com/Elsfa7-110/kenzer-templates +CVE-2015-2080 - https://github.com/LibHunter/LibHunter CVE-2015-2080 - https://github.com/albinowax/ActiveScanPlusPlus CVE-2015-2080 - https://github.com/cranelab/webapp-tech CVE-2015-2080 - https://github.com/ilmila/J2EEScan @@ -16389,6 +16524,7 @@ CVE-2015-2153 - https://github.com/arntsonl/CVE-2015-2153 CVE-2015-2156 - https://github.com/ARPSyndicate/cvemon CVE-2015-2156 - https://github.com/Anonymous-Phunter/PHunter CVE-2015-2156 - https://github.com/CGCL-codes/PHunter +CVE-2015-2156 - https://github.com/LibHunter/LibHunter CVE-2015-2156 - https://github.com/cezapata/appconfiguration-sample CVE-2015-2158 - https://github.com/mrash/afl-cve CVE-2015-2166 - https://github.com/ARPSyndicate/cvemon @@ -16675,6 +16811,7 @@ CVE-2015-2697 - https://github.com/ARPSyndicate/cvemon CVE-2015-2704 - https://github.com/ARPSyndicate/cvemon CVE-2015-2705 - https://github.com/Ch4p34uN0iR/mongoaudit CVE-2015-2705 - https://github.com/gold1029/mongoaudit +CVE-2015-2705 - https://github.com/stampery/mongoaudit CVE-2015-2712 - https://github.com/pyllyukko/user.js CVE-2015-2716 - https://github.com/ARPSyndicate/cvemon CVE-2015-2716 - https://github.com/fokypoky/places-list @@ -16997,6 +17134,7 @@ CVE-2015-3253 - https://github.com/CGCL-codes/PHunter CVE-2015-3253 - https://github.com/CodeIntelligenceTesting/java-demo CVE-2015-3253 - https://github.com/CodeIntelligenceTesting/java-demo-old CVE-2015-3253 - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet +CVE-2015-3253 - https://github.com/LibHunter/LibHunter CVE-2015-3253 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs CVE-2015-3253 - https://github.com/TheGrinch/elastic CVE-2015-3253 - https://github.com/angelwhu/XStream_unserialization @@ -17239,6 +17377,7 @@ CVE-2015-3636 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2015-3636 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2015-3636 - https://github.com/tangsilian/android-vuln CVE-2015-3636 - https://github.com/weeka10/-hktalent-TOP +CVE-2015-3636 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2015-3636 - https://github.com/xairy/linux-kernel-exploitation CVE-2015-3641 - https://github.com/ARPSyndicate/cvemon CVE-2015-3641 - https://github.com/uvhw/conchimgiangnang @@ -17809,10 +17948,12 @@ CVE-2015-5254 - https://github.com/t0m4too/t0m4to CVE-2015-5254 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 CVE-2015-5256 - https://github.com/Anonymous-Phunter/PHunter CVE-2015-5256 - https://github.com/CGCL-codes/PHunter +CVE-2015-5256 - https://github.com/LibHunter/LibHunter CVE-2015-5257 - https://github.com/Live-Hack-CVE/CVE-2015-5275 CVE-2015-5262 - https://github.com/ARPSyndicate/cvemon CVE-2015-5262 - https://github.com/Anonymous-Phunter/PHunter CVE-2015-5262 - https://github.com/CGCL-codes/PHunter +CVE-2015-5262 - https://github.com/LibHunter/LibHunter CVE-2015-5262 - https://github.com/albfernandez/commons-httpclient-3 CVE-2015-5262 - https://github.com/argon-gh-demo/clojure-sample CVE-2015-5262 - https://github.com/dotanuki-labs/android-oss-cves-research @@ -18441,6 +18582,7 @@ CVE-2015-6644 - https://github.com/ARPSyndicate/cvemon CVE-2015-6644 - https://github.com/Anonymous-Phunter/PHunter CVE-2015-6644 - https://github.com/CGCL-codes/PHunter CVE-2015-6644 - https://github.com/IkerSaint/VULNAPP-vulnerable-app +CVE-2015-6644 - https://github.com/LibHunter/LibHunter CVE-2015-6644 - https://github.com/brianhigh/us-cert-bulletins CVE-2015-6644 - https://github.com/pctF/vulnerable-app CVE-2015-6645 - https://github.com/ARPSyndicate/cvemon @@ -18463,6 +18605,7 @@ CVE-2015-6673 - https://github.com/andir/nixos-issue-db-example CVE-2015-6748 - https://github.com/ARPSyndicate/cvemon CVE-2015-6748 - https://github.com/Anonymous-Phunter/PHunter CVE-2015-6748 - https://github.com/CGCL-codes/PHunter +CVE-2015-6748 - https://github.com/LibHunter/LibHunter CVE-2015-6748 - https://github.com/epicosy/VUL4J-59 CVE-2015-6749 - https://github.com/andir/nixos-issue-db-example CVE-2015-6755 - https://github.com/ARPSyndicate/cvemon @@ -19329,6 +19472,7 @@ CVE-2015-8317 - https://github.com/mrash/afl-cve CVE-2015-8317 - https://github.com/satbekmyrza/repo-afl-a2 CVE-2015-8320 - https://github.com/Anonymous-Phunter/PHunter CVE-2015-8320 - https://github.com/CGCL-codes/PHunter +CVE-2015-8320 - https://github.com/LibHunter/LibHunter CVE-2015-8324 - https://github.com/Live-Hack-CVE/CVE-2015-8324 CVE-2015-8325 - https://github.com/Live-Hack-CVE/CVE-2015-8325 CVE-2015-8325 - https://github.com/bioly230/THM_Skynet @@ -19408,6 +19552,7 @@ CVE-2015-8399 - https://github.com/CLincat/vulcat CVE-2015-8399 - https://github.com/Elsfa7-110/kenzer-templates CVE-2015-8399 - https://github.com/HimmelAward/Goby_POC CVE-2015-8399 - https://github.com/Z0fhack/Goby_POC +CVE-2015-8399 - https://github.com/enomothem/PenTestNote CVE-2015-8399 - https://github.com/jweny/pocassistdb CVE-2015-8400 - https://github.com/ARPSyndicate/cvemon CVE-2015-8401 - https://github.com/thdusdl1219/CVE-Study @@ -19462,6 +19607,7 @@ CVE-2015-8548 - https://github.com/qazbnm456/awesome-cve-poc CVE-2015-8548 - https://github.com/tunz/js-vuln-db CVE-2015-8548 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 CVE-2015-8550 - https://github.com/Al1ex/LinuxEelvation +CVE-2015-8550 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2015-8550 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2015-8550 - https://github.com/bsauce/kernel-exploit-factory CVE-2015-8550 - https://github.com/jfbastien/no-sane-compiler @@ -19543,6 +19689,7 @@ CVE-2015-8656 - https://github.com/thdusdl1219/CVE-Study CVE-2015-8657 - https://github.com/thdusdl1219/CVE-Study CVE-2015-8658 - https://github.com/thdusdl1219/CVE-Study CVE-2015-8660 - https://github.com/ARPSyndicate/cvemon +CVE-2015-8660 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2015-8660 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2015-8660 - https://github.com/Live-Hack-CVE/CVE-2015-8660 CVE-2015-8660 - https://github.com/chorankates/Irked @@ -20227,6 +20374,7 @@ CVE-2016-0701 - https://github.com/Live-Hack-CVE/CVE-2017-3738 CVE-2016-0701 - https://github.com/RClueX/Hackerone-Reports CVE-2016-0701 - https://github.com/chnzzh/OpenSSL-CVE-lib CVE-2016-0701 - https://github.com/erwinchang/utility-library +CVE-2016-0701 - https://github.com/forget-eve/NSP CVE-2016-0701 - https://github.com/imhunterand/hackerone-publicy-disclosed CVE-2016-0701 - https://github.com/luanjampa/cve-2016-0701 CVE-2016-0702 - https://github.com/ARPSyndicate/cvemon @@ -20291,6 +20439,7 @@ CVE-2016-0728 - https://github.com/C0dak/local-root-exploit- CVE-2016-0728 - https://github.com/De30/zabbix_community-templates CVE-2016-0728 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2016-0728 - https://github.com/Feng4/linux-kernel-exploits +CVE-2016-0728 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2016-0728 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2016-0728 - https://github.com/Michael-Git-Web/templateszbx CVE-2016-0728 - https://github.com/Micr067/linux-kernel-exploits @@ -20361,6 +20510,7 @@ CVE-2016-0728 - https://github.com/sunnyjiang/cve_2016_0728 CVE-2016-0728 - https://github.com/th30d00r/Linux-Vulnerability-CVE-2016-0728-and-Exploit CVE-2016-0728 - https://github.com/tndud042713/cve CVE-2016-0728 - https://github.com/whiteHat001/Kernel-Security +CVE-2016-0728 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2016-0728 - https://github.com/xairy/linux-kernel-exploitation CVE-2016-0728 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 CVE-2016-0728 - https://github.com/xfinest/linux-kernel-exploits @@ -20638,6 +20788,7 @@ CVE-2016-0819 - https://github.com/knd06/linux-kernel-exploitation CVE-2016-0819 - https://github.com/ndk191/linux-kernel-exploitation CVE-2016-0819 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2016-0819 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2016-0819 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2016-0819 - https://github.com/xairy/linux-kernel-exploitation CVE-2016-0820 - https://github.com/ARPSyndicate/cvemon CVE-2016-0820 - https://github.com/R0B1NL1N/linux-kernel-exploitation @@ -20653,6 +20804,7 @@ CVE-2016-0820 - https://github.com/knd06/linux-kernel-exploitation CVE-2016-0820 - https://github.com/ndk191/linux-kernel-exploitation CVE-2016-0820 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2016-0820 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2016-0820 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2016-0820 - https://github.com/xairy/linux-kernel-exploitation CVE-2016-0844 - https://github.com/jiayy/android_vuln_poc-exp CVE-2016-0846 - https://github.com/ARPSyndicate/cvemon @@ -21100,6 +21252,7 @@ CVE-2016-1000339 - https://github.com/ARPSyndicate/cvemon CVE-2016-1000339 - https://github.com/Anonymous-Phunter/PHunter CVE-2016-1000339 - https://github.com/CGCL-codes/PHunter CVE-2016-1000339 - https://github.com/IkerSaint/VULNAPP-vulnerable-app +CVE-2016-1000339 - https://github.com/LibHunter/LibHunter CVE-2016-1000339 - https://github.com/pctF/vulnerable-app CVE-2016-1000339 - https://github.com/wolpert/crypto CVE-2016-1000340 - https://github.com/ARPSyndicate/cvemon @@ -21108,37 +21261,44 @@ CVE-2016-1000341 - https://github.com/ARPSyndicate/cvemon CVE-2016-1000341 - https://github.com/Anonymous-Phunter/PHunter CVE-2016-1000341 - https://github.com/CGCL-codes/PHunter CVE-2016-1000341 - https://github.com/IkerSaint/VULNAPP-vulnerable-app +CVE-2016-1000341 - https://github.com/LibHunter/LibHunter CVE-2016-1000341 - https://github.com/pctF/vulnerable-app CVE-2016-1000342 - https://github.com/ARPSyndicate/cvemon CVE-2016-1000342 - https://github.com/Anonymous-Phunter/PHunter CVE-2016-1000342 - https://github.com/CGCL-codes/PHunter CVE-2016-1000342 - https://github.com/IkerSaint/VULNAPP-vulnerable-app +CVE-2016-1000342 - https://github.com/LibHunter/LibHunter CVE-2016-1000342 - https://github.com/pctF/vulnerable-app CVE-2016-1000343 - https://github.com/ARPSyndicate/cvemon CVE-2016-1000343 - https://github.com/Anonymous-Phunter/PHunter CVE-2016-1000343 - https://github.com/CGCL-codes/PHunter CVE-2016-1000343 - https://github.com/CyberSource/cybersource-sdk-java CVE-2016-1000343 - https://github.com/IkerSaint/VULNAPP-vulnerable-app +CVE-2016-1000343 - https://github.com/LibHunter/LibHunter CVE-2016-1000343 - https://github.com/pctF/vulnerable-app CVE-2016-1000344 - https://github.com/ARPSyndicate/cvemon CVE-2016-1000344 - https://github.com/Anonymous-Phunter/PHunter CVE-2016-1000344 - https://github.com/CGCL-codes/PHunter CVE-2016-1000344 - https://github.com/IkerSaint/VULNAPP-vulnerable-app +CVE-2016-1000344 - https://github.com/LibHunter/LibHunter CVE-2016-1000344 - https://github.com/pctF/vulnerable-app CVE-2016-1000345 - https://github.com/ARPSyndicate/cvemon CVE-2016-1000345 - https://github.com/Anonymous-Phunter/PHunter CVE-2016-1000345 - https://github.com/CGCL-codes/PHunter CVE-2016-1000345 - https://github.com/IkerSaint/VULNAPP-vulnerable-app +CVE-2016-1000345 - https://github.com/LibHunter/LibHunter CVE-2016-1000345 - https://github.com/pctF/vulnerable-app CVE-2016-1000346 - https://github.com/ARPSyndicate/cvemon CVE-2016-1000346 - https://github.com/Anonymous-Phunter/PHunter CVE-2016-1000346 - https://github.com/CGCL-codes/PHunter CVE-2016-1000346 - https://github.com/IkerSaint/VULNAPP-vulnerable-app +CVE-2016-1000346 - https://github.com/LibHunter/LibHunter CVE-2016-1000346 - https://github.com/pctF/vulnerable-app CVE-2016-1000352 - https://github.com/ARPSyndicate/cvemon CVE-2016-1000352 - https://github.com/Anonymous-Phunter/PHunter CVE-2016-1000352 - https://github.com/CGCL-codes/PHunter CVE-2016-1000352 - https://github.com/IkerSaint/VULNAPP-vulnerable-app +CVE-2016-1000352 - https://github.com/LibHunter/LibHunter CVE-2016-1000352 - https://github.com/pctF/vulnerable-app CVE-2016-10005 - https://github.com/ARPSyndicate/cvemon CVE-2016-10006 - https://github.com/ARPSyndicate/cvemon @@ -21175,6 +21335,7 @@ CVE-2016-1002 - https://github.com/Live-Hack-CVE/CVE-2016-1002 CVE-2016-1002 - https://github.com/Live-Hack-CVE/CVE-2016-1005 CVE-2016-10027 - https://github.com/Anonymous-Phunter/PHunter CVE-2016-10027 - https://github.com/CGCL-codes/PHunter +CVE-2016-10027 - https://github.com/LibHunter/LibHunter CVE-2016-10027 - https://github.com/tintinweb/striptls CVE-2016-10028 - https://github.com/ARPSyndicate/cvemon CVE-2016-1003 - https://github.com/ARPSyndicate/cvemon @@ -21356,6 +21517,7 @@ CVE-2016-10033 - https://github.com/sccontroltotal/phpmailer CVE-2016-10033 - https://github.com/sliani/PHPMailer-File-Attachments-FTP-to-Mail CVE-2016-10033 - https://github.com/superfish9/pt CVE-2016-10033 - https://github.com/supreethsk/rental +CVE-2016-10033 - https://github.com/sweta-web/Online-Registration-System CVE-2016-10033 - https://github.com/trganda/dockerv CVE-2016-10033 - https://github.com/tvirus-01/PHP_mail CVE-2016-10033 - https://github.com/vaartjesd/test @@ -21505,6 +21667,7 @@ CVE-2016-10045 - https://github.com/sashasimulik/integration-1 CVE-2016-10045 - https://github.com/sccontroltotal/phpmailer CVE-2016-10045 - https://github.com/sliani/PHPMailer-File-Attachments-FTP-to-Mail CVE-2016-10045 - https://github.com/supreethsk/rental +CVE-2016-10045 - https://github.com/sweta-web/Online-Registration-System CVE-2016-10045 - https://github.com/tvirus-01/PHP_mail CVE-2016-10045 - https://github.com/vaartjesd/test CVE-2016-10045 - https://github.com/vatann07/BloodConnect @@ -21586,6 +21749,7 @@ CVE-2016-10134 - https://github.com/1N3/Exploits CVE-2016-10134 - https://github.com/ARPSyndicate/cvemon CVE-2016-10134 - https://github.com/ARPSyndicate/kenzer-templates CVE-2016-10134 - https://github.com/Awrrays/FrameVul +CVE-2016-10134 - https://github.com/CLincat/vulcat CVE-2016-10134 - https://github.com/HimmelAward/Goby_POC CVE-2016-10134 - https://github.com/SexyBeast233/SecBooks CVE-2016-10134 - https://github.com/TesterCC/exp_poc_library @@ -21779,6 +21943,7 @@ CVE-2016-10277 - https://github.com/lnick2023/nicenice CVE-2016-10277 - https://github.com/ndk191/linux-kernel-exploitation CVE-2016-10277 - https://github.com/qazbnm456/awesome-cve-poc CVE-2016-10277 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2016-10277 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2016-10277 - https://github.com/xairy/linux-kernel-exploitation CVE-2016-10277 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 CVE-2016-1028 - https://github.com/Live-Hack-CVE/CVE-2016-1025 @@ -22220,6 +22385,7 @@ CVE-2016-1247 - https://github.com/ZeusBanda/Linux_Priv-Esc_Cheatsheet CVE-2016-1247 - https://github.com/hungslab/awd-tools CVE-2016-1247 - https://github.com/lukeber4/usn-search CVE-2016-1247 - https://github.com/notnue/Linux-Privilege-Escalation +CVE-2016-1247 - https://github.com/redcountryroad/OSCP-shortsheet CVE-2016-1247 - https://github.com/superfish9/pt CVE-2016-1247 - https://github.com/txuswashere/Pentesting-Linux CVE-2016-1247 - https://github.com/woods-sega/woodswiki @@ -22385,6 +22551,7 @@ CVE-2016-1583 - https://github.com/knd06/linux-kernel-exploitation CVE-2016-1583 - https://github.com/ndk191/linux-kernel-exploitation CVE-2016-1583 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2016-1583 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2016-1583 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2016-1583 - https://github.com/xairy/linux-kernel-exploitation CVE-2016-1585 - https://github.com/adegoodyer/kubernetes-admin-toolkit CVE-2016-1585 - https://github.com/aws-samples/amazon-ecr-continuous-scan @@ -22738,6 +22905,8 @@ CVE-2016-2003 - https://github.com/klausware/Java-Deserialization-Cheat-Sheet CVE-2016-2003 - https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet CVE-2016-2004 - https://github.com/ARPSyndicate/cvemon CVE-2016-2004 - https://github.com/ARPSyndicate/kenzer-templates +CVE-2016-2004 - https://github.com/CVEDB/awesome-cve-repo +CVE-2016-2004 - https://github.com/marcocarolasec/CVE-2016-2004-Exploit CVE-2016-2009 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs CVE-2016-2017 - https://github.com/ARPSyndicate/cvemon CVE-2016-2031 - https://github.com/ARPSyndicate/cvemon @@ -22757,6 +22926,7 @@ CVE-2016-2059 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2016-2059 - https://github.com/knd06/linux-kernel-exploitation CVE-2016-2059 - https://github.com/ndk191/linux-kernel-exploitation CVE-2016-2059 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2016-2059 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2016-2059 - https://github.com/xairy/linux-kernel-exploitation CVE-2016-2061 - https://github.com/thdusdl1219/CVE-Study CVE-2016-2062 - https://github.com/thdusdl1219/CVE-Study @@ -22901,6 +23071,7 @@ CVE-2016-2175 - https://github.com/0xCyberY/CVE-T4PDF CVE-2016-2175 - https://github.com/ARPSyndicate/cvemon CVE-2016-2175 - https://github.com/Anonymous-Phunter/PHunter CVE-2016-2175 - https://github.com/CGCL-codes/PHunter +CVE-2016-2175 - https://github.com/LibHunter/LibHunter CVE-2016-2176 - https://github.com/ARPSyndicate/cvemon CVE-2016-2176 - https://github.com/RClueX/Hackerone-Reports CVE-2016-2176 - https://github.com/chnzzh/OpenSSL-CVE-lib @@ -22948,6 +23119,7 @@ CVE-2016-2183 - https://github.com/alexgro1982/devops-netology CVE-2016-2183 - https://github.com/aous-al-salek/crypto CVE-2016-2183 - https://github.com/biswajitde/dsm_ips CVE-2016-2183 - https://github.com/bysart/devops-netology +CVE-2016-2183 - https://github.com/catsploit/catsploit CVE-2016-2183 - https://github.com/dmitrii1312/03-sysadmin-09 CVE-2016-2183 - https://github.com/gabrieljcs/ips-assessment-reports CVE-2016-2183 - https://github.com/geon071/netolofy_12 @@ -23066,6 +23238,7 @@ CVE-2016-2324 - https://github.com/ARPSyndicate/cvemon CVE-2016-2331 - https://github.com/ivision-research/disclosures CVE-2016-2332 - https://github.com/ivision-research/disclosures CVE-2016-2333 - https://github.com/ivision-research/disclosures +CVE-2016-2334 - https://github.com/ch1hyun/fuzzing-class CVE-2016-2334 - https://github.com/icewall/CVE-2016-2334 CVE-2016-2334 - https://github.com/integeruser/on-pwning CVE-2016-2334 - https://github.com/litneet64/containerized-bomb-disposal @@ -23087,6 +23260,7 @@ CVE-2016-2384 - https://github.com/CKmaenn/kernel-exploits CVE-2016-2384 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2016-2384 - https://github.com/Feng4/linux-kernel-exploits CVE-2016-2384 - https://github.com/HackOvert/awesome-bugs +CVE-2016-2384 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2016-2384 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2016-2384 - https://github.com/Micr067/linux-kernel-exploits CVE-2016-2384 - https://github.com/QChiLan/linux-exp @@ -23129,6 +23303,7 @@ CVE-2016-2384 - https://github.com/rakjong/LinuxElevation CVE-2016-2384 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2016-2384 - https://github.com/spencerdodd/kernelpop CVE-2016-2384 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2016-2384 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2016-2384 - https://github.com/xairy/kernel-exploits CVE-2016-2384 - https://github.com/xairy/linux-kernel-exploitation CVE-2016-2384 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 @@ -23189,6 +23364,7 @@ CVE-2016-2411 - https://github.com/knd06/linux-kernel-exploitation CVE-2016-2411 - https://github.com/ndk191/linux-kernel-exploitation CVE-2016-2411 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2016-2411 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2016-2411 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2016-2411 - https://github.com/xairy/linux-kernel-exploitation CVE-2016-2428 - https://github.com/ARPSyndicate/cvemon CVE-2016-2431 - https://github.com/ABCIncs/personal-security-checklist @@ -23255,6 +23431,7 @@ CVE-2016-2434 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2016-2434 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2016-2434 - https://github.com/tangsilian/android-vuln CVE-2016-2434 - https://github.com/weeka10/-hktalent-TOP +CVE-2016-2434 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2016-2434 - https://github.com/xairy/linux-kernel-exploitation CVE-2016-2435 - https://github.com/ARPSyndicate/cvemon CVE-2016-2435 - https://github.com/R0B1NL1N/linux-kernel-exploitation @@ -23271,6 +23448,7 @@ CVE-2016-2435 - https://github.com/knd06/linux-kernel-exploitation CVE-2016-2435 - https://github.com/ndk191/linux-kernel-exploitation CVE-2016-2435 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2016-2435 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2016-2435 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2016-2435 - https://github.com/xairy/linux-kernel-exploitation CVE-2016-2443 - https://github.com/tangsilian/android-vuln CVE-2016-2461 - https://github.com/ARPSyndicate/cvemon @@ -23292,6 +23470,7 @@ CVE-2016-2475 - https://github.com/knd06/linux-kernel-exploitation CVE-2016-2475 - https://github.com/ndk191/linux-kernel-exploitation CVE-2016-2475 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2016-2475 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2016-2475 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2016-2475 - https://github.com/xairy/linux-kernel-exploitation CVE-2016-2503 - https://github.com/ARPSyndicate/cvemon CVE-2016-2503 - https://github.com/kdn111/linux-kernel-exploitation @@ -23304,6 +23483,7 @@ CVE-2016-2503 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2016-2503 - https://github.com/knd06/linux-kernel-exploitation CVE-2016-2503 - https://github.com/ndk191/linux-kernel-exploitation CVE-2016-2503 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2016-2503 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2016-2503 - https://github.com/xairy/linux-kernel-exploitation CVE-2016-2510 - https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet CVE-2016-2510 - https://github.com/BrittanyKuhn/javascript-tutorial @@ -23413,6 +23593,7 @@ CVE-2016-2781 - https://github.com/gp47/xef-scan-ex02 CVE-2016-2781 - https://github.com/hartwork/antijack CVE-2016-2781 - https://github.com/khulnasoft-lab/vulnlist CVE-2016-2781 - https://github.com/khulnasoft-labs/griffon +CVE-2016-2781 - https://github.com/m-pasima/CI-CD-Security-image-scan CVE-2016-2781 - https://github.com/metapull/attackfinder CVE-2016-2781 - https://github.com/nedenwalker/spring-boot-app-using-gradle CVE-2016-2781 - https://github.com/nedenwalker/spring-boot-app-with-log4j-vuln @@ -24112,6 +24293,7 @@ CVE-2016-3720 - https://github.com/0ang3el/Unsafe-JAX-RS-Burp CVE-2016-3720 - https://github.com/ARPSyndicate/cvemon CVE-2016-3720 - https://github.com/Anonymous-Phunter/PHunter CVE-2016-3720 - https://github.com/CGCL-codes/PHunter +CVE-2016-3720 - https://github.com/LibHunter/LibHunter CVE-2016-3720 - https://github.com/argon-gh-demo/clojure-sample CVE-2016-3720 - https://github.com/developer3000S/PoC-in-GitHub CVE-2016-3720 - https://github.com/gitrobtest/Java-Security @@ -24140,6 +24322,7 @@ CVE-2016-3857 - https://github.com/knd06/linux-kernel-exploitation CVE-2016-3857 - https://github.com/ndk191/linux-kernel-exploitation CVE-2016-3857 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2016-3857 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2016-3857 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2016-3857 - https://github.com/xairy/linux-kernel-exploitation CVE-2016-3861 - https://github.com/ARPSyndicate/cvemon CVE-2016-3861 - https://github.com/dropk1ck/CVE-2016-3861 @@ -24172,6 +24355,7 @@ CVE-2016-3873 - https://github.com/knd06/linux-kernel-exploitation CVE-2016-3873 - https://github.com/ndk191/linux-kernel-exploitation CVE-2016-3873 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2016-3873 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2016-3873 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2016-3873 - https://github.com/xairy/linux-kernel-exploitation CVE-2016-3901 - https://github.com/jiayy/android_vuln_poc-exp CVE-2016-3906 - https://github.com/jiayy/android_vuln_poc-exp @@ -25497,6 +25681,7 @@ CVE-2016-4544 - https://github.com/mrhacker51/FileUploadScanner CVE-2016-4544 - https://github.com/navervn/modified_uploadscanner CVE-2016-4544 - https://github.com/tagua-vm/tagua-vm CVE-2016-4557 - https://github.com/ARPSyndicate/cvemon +CVE-2016-4557 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2016-4557 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2016-4557 - https://github.com/chreniuc/CTF CVE-2016-4557 - https://github.com/dylandreimerink/gobpfld @@ -25700,6 +25885,7 @@ CVE-2016-4780 - https://github.com/sweetchipsw/vulnerability CVE-2016-4800 - https://github.com/ARPSyndicate/cvemon CVE-2016-4800 - https://github.com/Anonymous-Phunter/PHunter CVE-2016-4800 - https://github.com/CGCL-codes/PHunter +CVE-2016-4800 - https://github.com/LibHunter/LibHunter CVE-2016-4800 - https://github.com/saidramirezh/Elvis-DAM CVE-2016-4802 - https://github.com/Ananya-0306/vuln-finder CVE-2016-4802 - https://github.com/cve-search/git-vuln-finder @@ -25721,6 +25907,7 @@ CVE-2016-4952 - https://github.com/qianfei11/QEMU-CVES CVE-2016-4970 - https://github.com/ARPSyndicate/cvemon CVE-2016-4970 - https://github.com/Anonymous-Phunter/PHunter CVE-2016-4970 - https://github.com/CGCL-codes/PHunter +CVE-2016-4970 - https://github.com/LibHunter/LibHunter CVE-2016-4970 - https://github.com/chnzzh/OpenSSL-CVE-lib CVE-2016-4970 - https://github.com/eliasgranderubio/4depcheck CVE-2016-4971 - https://github.com/ARPSyndicate/cvemon @@ -25796,6 +25983,8 @@ CVE-2016-4979 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrou CVE-2016-4979 - https://github.com/vshaliii/DC-3-Vulnhub-Walkthrough CVE-2016-4984 - https://github.com/ARPSyndicate/cvemon CVE-2016-4986 - https://github.com/HotDB-Community/HotDB-Engine +CVE-2016-4994 - https://github.com/ch1hyun/fuzzing-class +CVE-2016-4997 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2016-4997 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2016-4999 - https://github.com/shanika04/dashbuilder CVE-2016-5003 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs @@ -25875,6 +26064,7 @@ CVE-2016-5184 - https://github.com/0xCyberY/CVE-T4PDF CVE-2016-5184 - https://github.com/ARPSyndicate/cvemon CVE-2016-5186 - https://github.com/0xCyberY/CVE-T4PDF CVE-2016-5186 - https://github.com/ARPSyndicate/cvemon +CVE-2016-5195 - https://github.com/0xMarcio/cve CVE-2016-5195 - https://github.com/0xS3rgI0/OSCP CVE-2016-5195 - https://github.com/0xStrygwyr/OSCP-Guide CVE-2016-5195 - https://github.com/0xZipp0/OSCP @@ -25935,6 +26125,7 @@ CVE-2016-5195 - https://github.com/GhostScreaming/os-experiment-4 CVE-2016-5195 - https://github.com/GhostTroops/TOP CVE-2016-5195 - https://github.com/GiorgosXou/Our-Xiaomi-Redmi-5A-riva-debloating-list CVE-2016-5195 - https://github.com/Greetdawn/CVE-2022-0847-DirtyPipe +CVE-2016-5195 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2016-5195 - https://github.com/Hellnino18/ansible-dirty-cow CVE-2016-5195 - https://github.com/Hellnino18/ansible-dirty-cow-2 CVE-2016-5195 - https://github.com/Hetti/PoC-Exploitchain-GS-VBox-DirtyCow- @@ -26250,6 +26441,7 @@ CVE-2016-5195 - https://github.com/weeka10/-hktalent-TOP CVE-2016-5195 - https://github.com/whackmanic/OSCP_Found CVE-2016-5195 - https://github.com/whitephone/farm-root CVE-2016-5195 - https://github.com/whu-enjoy/CVE-2016-5195 +CVE-2016-5195 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2016-5195 - https://github.com/www-glasswall-nl/UT-DirtyCow CVE-2016-5195 - https://github.com/x90hack/vulnerabilty_lab CVE-2016-5195 - https://github.com/xXxhagenxXx/OSCP_Cheat_sheet @@ -26365,6 +26557,7 @@ CVE-2016-5340 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2016-5340 - https://github.com/knd06/linux-kernel-exploitation CVE-2016-5340 - https://github.com/ndk191/linux-kernel-exploitation CVE-2016-5340 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2016-5340 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2016-5340 - https://github.com/xairy/linux-kernel-exploitation CVE-2016-5342 - https://github.com/SeaJae/exploitPlayground CVE-2016-5342 - https://github.com/externalist/exploit_playground @@ -26581,6 +26774,7 @@ CVE-2016-5420 - https://github.com/ARPSyndicate/cvemon CVE-2016-5423 - https://github.com/digoal/blog CVE-2016-5425 - https://github.com/ARPSyndicate/cvemon CVE-2016-5425 - https://github.com/starnightcyber/vul-info-collect +CVE-2016-5425 - https://github.com/versio-io/product-lifecycle-security-api CVE-2016-5431 - https://github.com/ARPSyndicate/cvemon CVE-2016-5431 - https://github.com/Nucleware/powershell-jwt CVE-2016-5431 - https://github.com/d3ck9/HTB-Under-Construction @@ -26821,6 +27015,7 @@ CVE-2016-6187 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2016-6187 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2016-6187 - https://github.com/vnik5287/cve-2016-6187-poc CVE-2016-6187 - https://github.com/whiteHat001/Kernel-Security +CVE-2016-6187 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2016-6187 - https://github.com/xairy/linux-kernel-exploitation CVE-2016-6189 - https://github.com/Live-Hack-CVE/CVE-2016-6189 CVE-2016-6195 - https://github.com/ARPSyndicate/cvemon @@ -26994,6 +27189,7 @@ CVE-2016-6318 - https://github.com/fokypoky/places-list CVE-2016-6321 - https://github.com/tomwillfixit/alpine-cvecheck CVE-2016-6323 - https://github.com/ARPSyndicate/cvemon CVE-2016-6325 - https://github.com/ARPSyndicate/cvemon +CVE-2016-6325 - https://github.com/versio-io/product-lifecycle-security-api CVE-2016-6327 - https://github.com/thdusdl1219/CVE-Study CVE-2016-6328 - https://github.com/TinyNiko/android_bulletin_notes CVE-2016-6329 - https://github.com/ARPSyndicate/cvemon @@ -27008,6 +27204,7 @@ CVE-2016-6329 - https://github.com/WiktorMysz/devops-netology CVE-2016-6329 - https://github.com/alexandrburyakov/Rep2 CVE-2016-6329 - https://github.com/alexgro1982/devops-netology CVE-2016-6329 - https://github.com/bysart/devops-netology +CVE-2016-6329 - https://github.com/catsploit/catsploit CVE-2016-6329 - https://github.com/dmitrii1312/03-sysadmin-09 CVE-2016-6329 - https://github.com/geon071/netolofy_12 CVE-2016-6329 - https://github.com/ilya-starchikov/devops-netology @@ -27219,6 +27416,7 @@ CVE-2016-6787 - https://github.com/ndk191/linux-kernel-exploitation CVE-2016-6787 - https://github.com/qazbnm456/awesome-cve-poc CVE-2016-6787 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2016-6787 - https://github.com/whiteHat001/Kernel-Security +CVE-2016-6787 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2016-6787 - https://github.com/xairy/linux-kernel-exploitation CVE-2016-6787 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 CVE-2016-6789 - https://github.com/thdusdl1219/CVE-Study @@ -27235,6 +27433,7 @@ CVE-2016-6797 - https://github.com/ARPSyndicate/cvemon CVE-2016-6798 - https://github.com/tafamace/CVE-2016-6798 CVE-2016-6801 - https://github.com/Anonymous-Phunter/PHunter CVE-2016-6801 - https://github.com/CGCL-codes/PHunter +CVE-2016-6801 - https://github.com/LibHunter/LibHunter CVE-2016-6801 - https://github.com/TSNGL21/CVE-2016-6801 CVE-2016-6802 - https://github.com/ARPSyndicate/cvemon CVE-2016-6802 - https://github.com/HackJava/HackShiro @@ -27262,6 +27461,7 @@ CVE-2016-6811 - https://github.com/yahoo/cubed CVE-2016-6814 - https://github.com/ARPSyndicate/cvemon CVE-2016-6814 - https://github.com/Anonymous-Phunter/PHunter CVE-2016-6814 - https://github.com/CGCL-codes/PHunter +CVE-2016-6814 - https://github.com/LibHunter/LibHunter CVE-2016-6814 - https://github.com/OWASP/www-project-ide-vulscanner CVE-2016-6814 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs CVE-2016-6814 - https://github.com/ilmari666/cybsec @@ -27572,6 +27772,7 @@ CVE-2016-7117 - https://github.com/knd06/linux-kernel-exploitation CVE-2016-7117 - https://github.com/ndk191/linux-kernel-exploitation CVE-2016-7117 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2016-7117 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2016-7117 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2016-7117 - https://github.com/xairy/linux-kernel-exploitation CVE-2016-7119 - https://github.com/ARPSyndicate/cvemon CVE-2016-7124 - https://github.com/ARPSyndicate/cvemon @@ -28173,6 +28374,7 @@ CVE-2016-8453 - https://github.com/knd06/linux-kernel-exploitation CVE-2016-8453 - https://github.com/ndk191/linux-kernel-exploitation CVE-2016-8453 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2016-8453 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2016-8453 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2016-8453 - https://github.com/xairy/linux-kernel-exploitation CVE-2016-8454 - https://github.com/thdusdl1219/CVE-Study CVE-2016-8455 - https://github.com/thdusdl1219/CVE-Study @@ -28326,6 +28528,7 @@ CVE-2016-8633 - https://github.com/knd06/linux-kernel-exploitation CVE-2016-8633 - https://github.com/ndk191/linux-kernel-exploitation CVE-2016-8633 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2016-8633 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2016-8633 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2016-8633 - https://github.com/xairy/linux-kernel-exploitation CVE-2016-8635 - https://github.com/getupcloud/openshift-clair-controller CVE-2016-8636 - https://github.com/ARPSyndicate/cvemon @@ -28341,6 +28544,7 @@ CVE-2016-8655 - https://github.com/84KaliPleXon3/linux-exploit-suggester CVE-2016-8655 - https://github.com/ARPSyndicate/cvemon CVE-2016-8655 - https://github.com/AabyssZG/AWD-Guide CVE-2016-8655 - https://github.com/Aneesh-Satla/Linux-Kernel-Exploitation-Suggester +CVE-2016-8655 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2016-8655 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2016-8655 - https://github.com/KosukeShimofuji/CVE-2016-8655 CVE-2016-8655 - https://github.com/LakshmiDesai/CVE-2016-8655 @@ -28388,6 +28592,7 @@ CVE-2016-8655 - https://github.com/scarvell/cve-2016-8655 CVE-2016-8655 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2016-8655 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2016-8655 - https://github.com/stefanocutelle/linux-exploit-suggester +CVE-2016-8655 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2016-8655 - https://github.com/xairy/linux-kernel-exploitation CVE-2016-8655 - https://github.com/xyongcn/exploit CVE-2016-8656 - https://github.com/ARPSyndicate/cvemon @@ -28793,6 +28998,7 @@ CVE-2016-9276 - https://github.com/mrash/afl-cve CVE-2016-9296 - https://github.com/andir/nixos-issue-db-example CVE-2016-9296 - https://github.com/yangke/7zip-null-pointer-dereference CVE-2016-9297 - https://github.com/RClueX/Hackerone-Reports +CVE-2016-9297 - https://github.com/ch1hyun/fuzzing-class CVE-2016-9297 - https://github.com/geeknik/cve-fuzzing-poc CVE-2016-9297 - https://github.com/imhunterand/hackerone-publicy-disclosed CVE-2016-9299 - https://github.com/ARPSyndicate/cvemon @@ -28993,6 +29199,7 @@ CVE-2016-9793 - https://github.com/C0dak/local-root-exploit- CVE-2016-9793 - https://github.com/CKmaenn/kernel-exploits CVE-2016-9793 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2016-9793 - https://github.com/Feng4/linux-kernel-exploits +CVE-2016-9793 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2016-9793 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2016-9793 - https://github.com/Micr067/linux-kernel-exploits CVE-2016-9793 - https://github.com/QChiLan/linux-exp @@ -29779,6 +29986,7 @@ CVE-2017-0146 - https://github.com/cb4cb4/EternalBlue-EK-Auto-Mode CVE-2017-0146 - https://github.com/cb4cb4/EternalBlue-EK-Manual-Mode CVE-2017-0146 - https://github.com/ceskillets/DCV-Predefined-Log-Filter-of-Specific-CVE-of-EternalBlue-and-BlueKeep-with-Auto-Tag- CVE-2017-0146 - https://github.com/chaao195/EBEKv2.0 +CVE-2017-0146 - https://github.com/enomothem/PenTestNote CVE-2017-0146 - https://github.com/ericjiang97/SecScripts CVE-2017-0146 - https://github.com/geeksniper/active-directory-pentest CVE-2017-0146 - https://github.com/ginapalomo/ScanAll @@ -30430,6 +30638,7 @@ CVE-2017-0403 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2017-0403 - https://github.com/knd06/linux-kernel-exploitation CVE-2017-0403 - https://github.com/ndk191/linux-kernel-exploitation CVE-2017-0403 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2017-0403 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2017-0403 - https://github.com/xairy/linux-kernel-exploitation CVE-2017-0404 - https://github.com/ThomasKing2014/android-Vulnerability-PoC CVE-2017-0411 - https://github.com/lulusudoku/PoC @@ -30454,6 +30663,7 @@ CVE-2017-0437 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2017-0437 - https://github.com/knd06/linux-kernel-exploitation CVE-2017-0437 - https://github.com/ndk191/linux-kernel-exploitation CVE-2017-0437 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2017-0437 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2017-0437 - https://github.com/xairy/linux-kernel-exploitation CVE-2017-0438 - https://github.com/flankersky/android_wifi_pocs CVE-2017-0439 - https://github.com/flankersky/android_wifi_pocs @@ -30554,6 +30764,7 @@ CVE-2017-0569 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2017-0569 - https://github.com/knd06/linux-kernel-exploitation CVE-2017-0569 - https://github.com/ndk191/linux-kernel-exploitation CVE-2017-0569 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2017-0569 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2017-0569 - https://github.com/xairy/linux-kernel-exploitation CVE-2017-0570 - https://github.com/thdusdl1219/CVE-Study CVE-2017-0571 - https://github.com/thdusdl1219/CVE-Study @@ -30970,6 +31181,7 @@ CVE-2017-1000112 - https://github.com/spencerdodd/kernelpop CVE-2017-1000112 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2017-1000112 - https://github.com/stefanocutelle/linux-exploit-suggester CVE-2017-1000112 - https://github.com/teamssix/container-escape-check +CVE-2017-1000112 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2017-1000112 - https://github.com/xairy/kernel-exploits CVE-2017-1000112 - https://github.com/xairy/linux-kernel-exploitation CVE-2017-1000112 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 @@ -31041,6 +31253,7 @@ CVE-2017-1000207 - https://github.com/ARPSyndicate/cvemon CVE-2017-1000208 - https://github.com/ARPSyndicate/cvemon CVE-2017-1000209 - https://github.com/Anonymous-Phunter/PHunter CVE-2017-1000209 - https://github.com/CGCL-codes/PHunter +CVE-2017-1000209 - https://github.com/LibHunter/LibHunter CVE-2017-1000219 - https://github.com/ossf-cve-benchmark/CVE-2017-1000219 CVE-2017-1000227 - https://github.com/ARPSyndicate/cvemon CVE-2017-1000228 - https://github.com/ARPSyndicate/cvemon @@ -31095,10 +31308,12 @@ CVE-2017-1000251 - https://github.com/qazbnm456/awesome-cve-poc CVE-2017-1000251 - https://github.com/sgxgsx/BlueToolkit CVE-2017-1000251 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2017-1000251 - https://github.com/tlatkdgus1/blueborne-CVE-2017-1000251 +CVE-2017-1000251 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2017-1000251 - https://github.com/xairy/linux-kernel-exploitation CVE-2017-1000251 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 CVE-2017-1000252 - https://github.com/ARPSyndicate/cvemon CVE-2017-1000253 - https://github.com/ARPSyndicate/cvemon +CVE-2017-1000253 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2017-1000253 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2017-1000253 - https://github.com/RicterZ/PIE-Stack-Clash-CVE-2017-1000253 CVE-2017-1000253 - https://github.com/kaosagnt/ansible-everyday @@ -31179,6 +31394,7 @@ CVE-2017-1000363 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2017-1000363 - https://github.com/knd06/linux-kernel-exploitation CVE-2017-1000363 - https://github.com/ndk191/linux-kernel-exploitation CVE-2017-1000363 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2017-1000363 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2017-1000363 - https://github.com/xairy/linux-kernel-exploitation CVE-2017-1000364 - https://github.com/ARPSyndicate/cvemon CVE-2017-1000364 - https://github.com/lnick2023/nicenice @@ -31323,6 +31539,7 @@ CVE-2017-1000380 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2017-1000380 - https://github.com/knd06/linux-kernel-exploitation CVE-2017-1000380 - https://github.com/ndk191/linux-kernel-exploitation CVE-2017-1000380 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2017-1000380 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2017-1000380 - https://github.com/xairy/linux-kernel-exploitation CVE-2017-1000382 - https://github.com/ARPSyndicate/cvemon CVE-2017-1000394 - https://github.com/speedyfriend67/Experiments @@ -31393,6 +31610,7 @@ CVE-2017-1000493 - https://github.com/ARPSyndicate/cvemon CVE-2017-1000494 - https://github.com/panctf/Router CVE-2017-1000498 - https://github.com/Anonymous-Phunter/PHunter CVE-2017-1000498 - https://github.com/CGCL-codes/PHunter +CVE-2017-1000498 - https://github.com/LibHunter/LibHunter CVE-2017-1000499 - https://github.com/ARPSyndicate/cvemon CVE-2017-1000499 - https://github.com/Villaquiranm/5MMISSI-CVE-2017-1000499 CVE-2017-1000500 - https://github.com/ARPSyndicate/cvemon @@ -31802,6 +32020,7 @@ CVE-2017-10661 - https://github.com/ostrichxyz7/kexps CVE-2017-10661 - https://github.com/qazbnm456/awesome-cve-poc CVE-2017-10661 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2017-10661 - https://github.com/tangsilian/android-vuln +CVE-2017-10661 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2017-10661 - https://github.com/xairy/linux-kernel-exploitation CVE-2017-10661 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 CVE-2017-10662 - https://github.com/thdusdl1219/CVE-Study @@ -31940,6 +32159,7 @@ CVE-2017-11176 - https://github.com/CERTCC/Linux-Kernel-Analysis-Environment CVE-2017-11176 - https://github.com/DoubleMice/cve-2017-11176 CVE-2017-11176 - https://github.com/Flerov/WindowsExploitDev CVE-2017-11176 - https://github.com/Gobinath-B/Exploit-Developement +CVE-2017-11176 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2017-11176 - https://github.com/HckEX/CVE-2017-11176 CVE-2017-11176 - https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation CVE-2017-11176 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits @@ -31972,6 +32192,7 @@ CVE-2017-11176 - https://github.com/paulveillard/cybersecurity-exploit-developme CVE-2017-11176 - https://github.com/pjlantz/optee-qemu CVE-2017-11176 - https://github.com/prince-stark/Exploit-Developement CVE-2017-11176 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2017-11176 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2017-11176 - https://github.com/xairy/linux-kernel-exploitation CVE-2017-11178 - https://github.com/ARPSyndicate/cvemon CVE-2017-11178 - https://github.com/LoRexxar/LoRexxar @@ -33572,6 +33793,7 @@ CVE-2017-13010 - https://github.com/RClueX/Hackerone-Reports CVE-2017-13010 - https://github.com/geeknik/cve-fuzzing-poc CVE-2017-13010 - https://github.com/imhunterand/hackerone-publicy-disclosed CVE-2017-13019 - https://github.com/ARPSyndicate/cvemon +CVE-2017-13028 - https://github.com/ch1hyun/fuzzing-class CVE-2017-13028 - https://github.com/paras98/AFL_Fuzzing CVE-2017-13038 - https://github.com/ARPSyndicate/cvemon CVE-2017-13038 - https://github.com/RClueX/Hackerone-Reports @@ -33663,6 +33885,7 @@ CVE-2017-13098 - https://github.com/ARPSyndicate/cvemon CVE-2017-13098 - https://github.com/Anonymous-Phunter/PHunter CVE-2017-13098 - https://github.com/CGCL-codes/PHunter CVE-2017-13098 - https://github.com/IkerSaint/VULNAPP-vulnerable-app +CVE-2017-13098 - https://github.com/LibHunter/LibHunter CVE-2017-13098 - https://github.com/dotanuki-labs/android-oss-cves-research CVE-2017-13098 - https://github.com/pctF/vulnerable-app CVE-2017-13130 - https://github.com/itm4n/CVEs @@ -33744,6 +33967,7 @@ CVE-2017-13306 - https://github.com/ARPSyndicate/cvemon CVE-2017-13307 - https://github.com/ARPSyndicate/cvemon CVE-2017-13309 - https://github.com/Anonymous-Phunter/PHunter CVE-2017-13309 - https://github.com/CGCL-codes/PHunter +CVE-2017-13309 - https://github.com/LibHunter/LibHunter CVE-2017-13669 - https://github.com/ARPSyndicate/cvemon CVE-2017-13669 - https://github.com/burpheart/NexusPHP_safe CVE-2017-13672 - https://github.com/DavidBuchanan314/CVE-2017-13672 @@ -35075,6 +35299,7 @@ CVE-2017-16695 - https://github.com/chorankates/Help CVE-2017-16695 - https://github.com/gameFace22/vulnmachine-walkthrough CVE-2017-16695 - https://github.com/jondonas/linux-exploit-suggester-2 CVE-2017-16695 - https://github.com/ndk191/linux-kernel-exploitation +CVE-2017-16695 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2017-16695 - https://github.com/xairy/linux-kernel-exploitation CVE-2017-16709 - https://github.com/ARPSyndicate/cvemon CVE-2017-16711 - https://github.com/andir/nixos-issue-db-example @@ -35192,6 +35417,7 @@ CVE-2017-16932 - https://github.com/vincent-deng/veracode-container-security-fin CVE-2017-16939 - https://github.com/ARPSyndicate/cvemon CVE-2017-16939 - https://github.com/Al1ex/LinuxEelvation CVE-2017-16939 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp +CVE-2017-16939 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2017-16939 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2017-16939 - https://github.com/Micr067/linux-kernel-exploits CVE-2017-16939 - https://github.com/QChiLan/linux-exp @@ -35244,6 +35470,7 @@ CVE-2017-16995 - https://github.com/DanielShmu/OSCP-Cheat-Sheet CVE-2017-16995 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2017-16995 - https://github.com/Dk0n9/linux_exploit CVE-2017-16995 - https://github.com/Getshell/LinuxTQ +CVE-2017-16995 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2017-16995 - https://github.com/JMontRod/Pruebecita CVE-2017-16995 - https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups CVE-2017-16995 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits @@ -35337,6 +35564,7 @@ CVE-2017-16995 - https://github.com/thelostvoice/global-takeover CVE-2017-16995 - https://github.com/thelostvoice/inept-us-military CVE-2017-16995 - https://github.com/tninh27/Lab CVE-2017-16995 - https://github.com/vnik5287/CVE-2017-16995 +CVE-2017-16995 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2017-16995 - https://github.com/xairy/linux-kernel-exploitation CVE-2017-16995 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 CVE-2017-16995 - https://github.com/xfinest/linux-kernel-exploits @@ -35523,6 +35751,7 @@ CVE-2017-17485 - https://github.com/CrackerCat/myhktools CVE-2017-17485 - https://github.com/Drun1baby/JavaSecurityLearning CVE-2017-17485 - https://github.com/GhostTroops/myhktools CVE-2017-17485 - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet +CVE-2017-17485 - https://github.com/LibHunter/LibHunter CVE-2017-17485 - https://github.com/OWASP/www-project-ide-vulscanner CVE-2017-17485 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs CVE-2017-17485 - https://github.com/Pear1y/Vuln-Env @@ -35933,6 +36162,7 @@ CVE-2017-18344 - https://github.com/lnick2023/nicenice CVE-2017-18344 - https://github.com/ndk191/linux-kernel-exploitation CVE-2017-18344 - https://github.com/qazbnm456/awesome-cve-poc CVE-2017-18344 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2017-18344 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2017-18344 - https://github.com/xairy/kernel-exploits CVE-2017-18344 - https://github.com/xairy/linux-kernel-exploitation CVE-2017-18344 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 @@ -36390,6 +36620,7 @@ CVE-2017-2636 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2017-2636 - https://github.com/snorez/blog CVE-2017-2636 - https://github.com/snorez/exploits CVE-2017-2636 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2017-2636 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2017-2636 - https://github.com/xairy/linux-kernel-exploitation CVE-2017-2636 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 CVE-2017-2636 - https://github.com/xyongcn/exploit @@ -36803,6 +37034,7 @@ CVE-2017-3506 - https://github.com/Kamiya767/CVE-2019-2725 CVE-2017-3506 - https://github.com/MacAsure/WL_Scan_GO CVE-2017-3506 - https://github.com/Maskhe/javasec CVE-2017-3506 - https://github.com/Micr067/CMS-Hunter +CVE-2017-3506 - https://github.com/Ostorlab/KEV CVE-2017-3506 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs CVE-2017-3506 - https://github.com/ParrotSec-CN/ParrotSecCN_Community_QQbot CVE-2017-3506 - https://github.com/SecWiki/CMS-Hunter @@ -37250,6 +37482,7 @@ CVE-2017-5123 - https://github.com/ARPSyndicate/cvemon CVE-2017-5123 - https://github.com/Al1ex/LinuxEelvation CVE-2017-5123 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2017-5123 - https://github.com/FloatingGuy/CVE-2017-5123 +CVE-2017-5123 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2017-5123 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2017-5123 - https://github.com/Metarget/awesome-cloud-native-security CVE-2017-5123 - https://github.com/Micr067/linux-kernel-exploits @@ -37318,6 +37551,7 @@ CVE-2017-5123 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2017-5123 - https://github.com/teawater/CVE-2017-5123 CVE-2017-5123 - https://github.com/txuswashere/Privilege-Escalation CVE-2017-5123 - https://github.com/whiteHat001/Kernel-Security +CVE-2017-5123 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2017-5123 - https://github.com/xairy/linux-kernel-exploitation CVE-2017-5123 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 CVE-2017-5123 - https://github.com/xfinest/linux-kernel-exploits @@ -37498,6 +37732,7 @@ CVE-2017-5223 - https://github.com/sashasimulik/integration-1 CVE-2017-5223 - https://github.com/sccontroltotal/phpmailer CVE-2017-5223 - https://github.com/sliani/PHPMailer-File-Attachments-FTP-to-Mail CVE-2017-5223 - https://github.com/supreethsk/rental +CVE-2017-5223 - https://github.com/sweta-web/Online-Registration-System CVE-2017-5223 - https://github.com/tvirus-01/PHP_mail CVE-2017-5223 - https://github.com/vaartjesd/test CVE-2017-5223 - https://github.com/vatann07/BloodConnect @@ -38076,6 +38311,7 @@ CVE-2017-5645 - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet CVE-2017-5645 - https://github.com/HackJava/HackLog4j2 CVE-2017-5645 - https://github.com/HackJava/Log4j2 CVE-2017-5645 - https://github.com/HynekPetrak/log4shell-finder +CVE-2017-5645 - https://github.com/LibHunter/LibHunter CVE-2017-5645 - https://github.com/Marcelektro/Log4J-RCE-Implementation CVE-2017-5645 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs CVE-2017-5645 - https://github.com/SexyBeast233/SecBooks @@ -38586,6 +38822,7 @@ CVE-2017-5924 - https://github.com/SZU-SE/UAF-Fuzzer-TestSuite CVE-2017-5924 - https://github.com/wcventure/UAF-Fuzzer-TestSuite CVE-2017-5929 - https://github.com/Anonymous-Phunter/PHunter CVE-2017-5929 - https://github.com/CGCL-codes/PHunter +CVE-2017-5929 - https://github.com/LibHunter/LibHunter CVE-2017-5929 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs CVE-2017-5929 - https://github.com/fergarrui/exploits CVE-2017-5929 - https://github.com/hinat0y/Dataset1 @@ -38713,6 +38950,7 @@ CVE-2017-6074 - https://github.com/CKmaenn/kernel-exploits CVE-2017-6074 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2017-6074 - https://github.com/Dk0n9/linux_exploit CVE-2017-6074 - https://github.com/Feng4/linux-kernel-exploits +CVE-2017-6074 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2017-6074 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2017-6074 - https://github.com/Metarget/metarget CVE-2017-6074 - https://github.com/Micr067/linux-kernel-exploits @@ -38770,6 +39008,7 @@ CVE-2017-6074 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2017-6074 - https://github.com/spencerdodd/kernelpop CVE-2017-6074 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2017-6074 - https://github.com/toanthang1842002/CVE-2017-6074 +CVE-2017-6074 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2017-6074 - https://github.com/xairy/kernel-exploits CVE-2017-6074 - https://github.com/xairy/linux-kernel-exploitation CVE-2017-6074 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 @@ -39251,6 +39490,7 @@ CVE-2017-7184 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2017-7184 - https://github.com/snorez/blog CVE-2017-7184 - https://github.com/snorez/exploits CVE-2017-7184 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2017-7184 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2017-7184 - https://github.com/xairy/linux-kernel-exploitation CVE-2017-7184 - https://github.com/xyongcn/exploit CVE-2017-7185 - https://github.com/ARPSyndicate/cvemon @@ -39512,6 +39752,7 @@ CVE-2017-7308 - https://github.com/C0dak/local-root-exploit- CVE-2017-7308 - https://github.com/CKmaenn/kernel-exploits CVE-2017-7308 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2017-7308 - https://github.com/Feng4/linux-kernel-exploits +CVE-2017-7308 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2017-7308 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2017-7308 - https://github.com/Mecyu/googlecontainers CVE-2017-7308 - https://github.com/Metarget/metarget @@ -39575,6 +39816,7 @@ CVE-2017-7308 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2017-7308 - https://github.com/spencerdodd/kernelpop CVE-2017-7308 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2017-7308 - https://github.com/vusec/blindside +CVE-2017-7308 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2017-7308 - https://github.com/xairy/kernel-exploits CVE-2017-7308 - https://github.com/xairy/linux-kernel-exploitation CVE-2017-7308 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 @@ -40240,6 +40482,7 @@ CVE-2017-7616 - https://github.com/knd06/linux-kernel-exploitation CVE-2017-7616 - https://github.com/ndk191/linux-kernel-exploitation CVE-2017-7616 - https://github.com/skbasava/Linux-Kernel-exploit CVE-2017-7616 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2017-7616 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2017-7616 - https://github.com/xairy/linux-kernel-exploitation CVE-2017-7618 - https://github.com/thdusdl1219/CVE-Study CVE-2017-7620 - https://github.com/ARPSyndicate/cvemon @@ -40262,10 +40505,12 @@ CVE-2017-7656 - https://github.com/ARPSyndicate/cvemon CVE-2017-7656 - https://github.com/Anonymous-Phunter/PHunter CVE-2017-7656 - https://github.com/CGCL-codes/PHunter CVE-2017-7656 - https://github.com/DonnumS/inf226Inchat +CVE-2017-7656 - https://github.com/LibHunter/LibHunter CVE-2017-7657 - https://github.com/ARPSyndicate/cvemon CVE-2017-7657 - https://github.com/Anonymous-Phunter/PHunter CVE-2017-7657 - https://github.com/CGCL-codes/PHunter CVE-2017-7657 - https://github.com/DonnumS/inf226Inchat +CVE-2017-7657 - https://github.com/LibHunter/LibHunter CVE-2017-7657 - https://github.com/yahoo/cubed CVE-2017-7658 - https://github.com/ARPSyndicate/cvemon CVE-2017-7658 - https://github.com/DonnumS/inf226Inchat @@ -40454,6 +40699,7 @@ CVE-2017-7943 - https://github.com/ARPSyndicate/cvemon CVE-2017-7957 - https://github.com/ARPSyndicate/cvemon CVE-2017-7957 - https://github.com/Anonymous-Phunter/PHunter CVE-2017-7957 - https://github.com/CGCL-codes/PHunter +CVE-2017-7957 - https://github.com/LibHunter/LibHunter CVE-2017-7957 - https://github.com/Whoopsunix/PPPVULNS CVE-2017-7957 - https://github.com/dotanuki-labs/android-oss-cves-research CVE-2017-7957 - https://github.com/lmarso-asapp/kotlin-unsecure @@ -41136,6 +41382,7 @@ CVE-2017-8625 - https://github.com/Ashadowkhan/PENTESTINGBIBLE CVE-2017-8625 - https://github.com/Digit4lBytes/RedTeam CVE-2017-8625 - https://github.com/DigitalQuinn/InfosecCompilation CVE-2017-8625 - https://github.com/Fa1c0n35/Awesome-Red-Teaming. +CVE-2017-8625 - https://github.com/GoVanguard/list-infosec-encyclopedia CVE-2017-8625 - https://github.com/H4CK3RT3CH/Awesome-Red-Teaming CVE-2017-8625 - https://github.com/Hemanthraju02/Red-team CVE-2017-8625 - https://github.com/HildeTeamTNT/Awesome-Red-Teaming @@ -41654,6 +41901,7 @@ CVE-2017-8878 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 CVE-2017-8890 - https://github.com/7043mcgeep/cve-2017-8890-msf CVE-2017-8890 - https://github.com/ARPSyndicate/cvemon CVE-2017-8890 - https://github.com/Al1ex/LinuxEelvation +CVE-2017-8890 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2017-8890 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2017-8890 - https://github.com/beraphin/CVE-2017-8890 CVE-2017-8890 - https://github.com/bsauce/kernel-exploit-factory @@ -41688,6 +41936,7 @@ CVE-2017-8917 - https://github.com/AkuCyberSec/CVE-2017-8917-Joomla-370-SQL-Inje CVE-2017-8917 - https://github.com/Aukaii/notes CVE-2017-8917 - https://github.com/Awrrays/FrameVul CVE-2017-8917 - https://github.com/BaptisteContreras/CVE-2017-8917-Joomla +CVE-2017-8917 - https://github.com/CLincat/vulcat CVE-2017-8917 - https://github.com/Elsfa7-110/kenzer-templates CVE-2017-8917 - https://github.com/HattMobb/TryHackMe-Bugle-Machine-Writeup-Walkthrough CVE-2017-8917 - https://github.com/HimmelAward/Goby_POC @@ -41768,6 +42017,7 @@ CVE-2017-9044 - https://github.com/fokypoky/places-list CVE-2017-9047 - https://github.com/introspection-libc/safe-libc CVE-2017-9047 - https://github.com/pekd/safe-libc CVE-2017-9048 - https://github.com/ARPSyndicate/cvemon +CVE-2017-9048 - https://github.com/ch1hyun/fuzzing-class CVE-2017-9049 - https://github.com/ARPSyndicate/cvemon CVE-2017-9050 - https://github.com/ARPSyndicate/cvemon CVE-2017-9050 - https://github.com/jason44406/Depot @@ -41829,6 +42079,7 @@ CVE-2017-9096 - https://github.com/0xCyberY/CVE-T4PDF CVE-2017-9096 - https://github.com/ARPSyndicate/cvemon CVE-2017-9096 - https://github.com/Anonymous-Phunter/PHunter CVE-2017-9096 - https://github.com/CGCL-codes/PHunter +CVE-2017-9096 - https://github.com/LibHunter/LibHunter CVE-2017-9096 - https://github.com/jakabakos/CVE-2017-9096 CVE-2017-9096 - https://github.com/jakabakos/CVE-2017-9096-iText-XXE CVE-2017-9097 - https://github.com/MDudek-ICS/AntiWeb_testing-Suite @@ -42100,6 +42351,7 @@ CVE-2017-9732 - https://github.com/irsl/knc-memory-exhaustion CVE-2017-9735 - https://github.com/ARPSyndicate/cvemon CVE-2017-9735 - https://github.com/Anonymous-Phunter/PHunter CVE-2017-9735 - https://github.com/CGCL-codes/PHunter +CVE-2017-9735 - https://github.com/LibHunter/LibHunter CVE-2017-9735 - https://github.com/fredfeng/Themis-taint CVE-2017-9742 - https://github.com/fokypoky/places-list CVE-2017-9743 - https://github.com/ARPSyndicate/cvemon @@ -42709,6 +42961,7 @@ CVE-2018-0151 - https://github.com/ARPSyndicate/cvemon CVE-2018-0151 - https://github.com/Ostorlab/KEV CVE-2018-0151 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors CVE-2018-0151 - https://github.com/ferdinandmudjialim/metasploit-cve-search +CVE-2018-0151 - https://github.com/tunnelcat/metasploit-cve-search CVE-2018-0153 - https://github.com/Ostorlab/KEV CVE-2018-0153 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors CVE-2018-0154 - https://github.com/Ostorlab/KEV @@ -42737,6 +42990,7 @@ CVE-2018-0171 - https://github.com/lnick2023/nicenice CVE-2018-0171 - https://github.com/qazbnm456/awesome-cve-poc CVE-2018-0171 - https://github.com/rikosintie/SmartInstall CVE-2018-0171 - https://github.com/tomoyamachi/gocarts +CVE-2018-0171 - https://github.com/tunnelcat/metasploit-cve-search CVE-2018-0171 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 CVE-2018-0172 - https://github.com/Ostorlab/KEV CVE-2018-0172 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors @@ -42829,6 +43083,7 @@ CVE-2018-0296 - https://github.com/yassineaboukir/CVE-2018-0296 CVE-2018-0296 - https://github.com/yut0u/RedTeam-BlackBox CVE-2018-0304 - https://github.com/ARPSyndicate/cvemon CVE-2018-0304 - https://github.com/ferdinandmudjialim/metasploit-cve-search +CVE-2018-0304 - https://github.com/tunnelcat/metasploit-cve-search CVE-2018-0324 - https://github.com/s-index/dora CVE-2018-0477 - https://github.com/lucabrasi83/vscan CVE-2018-0481 - https://github.com/lucabrasi83/vscan @@ -43657,6 +43912,7 @@ CVE-2018-1000132 - https://github.com/andir/nixos-issue-db-example CVE-2018-1000134 - https://github.com/0xT11/CVE-POC CVE-2018-1000134 - https://github.com/Anonymous-Phunter/PHunter CVE-2018-1000134 - https://github.com/CGCL-codes/PHunter +CVE-2018-1000134 - https://github.com/LibHunter/LibHunter CVE-2018-1000136 - https://github.com/ARPSyndicate/cvemon CVE-2018-1000136 - https://github.com/andir/nixos-issue-db-example CVE-2018-1000136 - https://github.com/doyensec/awesome-electronjs-hacking @@ -43697,6 +43953,7 @@ CVE-2018-1000180 - https://github.com/ARPSyndicate/cvemon CVE-2018-1000180 - https://github.com/Anonymous-Phunter/PHunter CVE-2018-1000180 - https://github.com/CGCL-codes/PHunter CVE-2018-1000180 - https://github.com/CyberSource/cybersource-sdk-java +CVE-2018-1000180 - https://github.com/LibHunter/LibHunter CVE-2018-1000182 - https://github.com/ARPSyndicate/cvemon CVE-2018-1000195 - https://github.com/ARPSyndicate/cvemon CVE-2018-1000199 - https://github.com/0xT11/CVE-POC @@ -43743,6 +44000,7 @@ CVE-2018-1000613 - https://github.com/ARPSyndicate/cvemon CVE-2018-1000613 - https://github.com/Anonymous-Phunter/PHunter CVE-2018-1000613 - https://github.com/CGCL-codes/PHunter CVE-2018-1000613 - https://github.com/IkerSaint/VULNAPP-vulnerable-app +CVE-2018-1000613 - https://github.com/LibHunter/LibHunter CVE-2018-1000613 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs CVE-2018-1000613 - https://github.com/dotanuki-labs/android-oss-cves-research CVE-2018-1000613 - https://github.com/pctF/vulnerable-app @@ -43752,6 +44010,7 @@ CVE-2018-1000622 - https://github.com/Artisan-Lab/Rust-memory-safety-bugs CVE-2018-1000622 - https://github.com/xxg1413/rust-security CVE-2018-1000632 - https://github.com/Anonymous-Phunter/PHunter CVE-2018-1000632 - https://github.com/CGCL-codes/PHunter +CVE-2018-1000632 - https://github.com/LibHunter/LibHunter CVE-2018-1000632 - https://github.com/ilmari666/cybsec CVE-2018-1000654 - https://github.com/PajakAlexandre/wik-dps-tp02 CVE-2018-1000654 - https://github.com/brandoncamenisch/release-the-code-litecoin @@ -43797,6 +44056,7 @@ CVE-2018-1000810 - https://github.com/saaramar/Publications CVE-2018-1000810 - https://github.com/xxg1413/rust-security CVE-2018-1000850 - https://github.com/Anonymous-Phunter/PHunter CVE-2018-1000850 - https://github.com/CGCL-codes/PHunter +CVE-2018-1000850 - https://github.com/LibHunter/LibHunter CVE-2018-1000850 - https://github.com/hinat0y/Dataset1 CVE-2018-1000850 - https://github.com/hinat0y/Dataset10 CVE-2018-1000850 - https://github.com/hinat0y/Dataset11 @@ -43902,6 +44162,7 @@ CVE-2018-1000886 - https://github.com/tzf-omkey/MemLock_Benchmark CVE-2018-1000886 - https://github.com/wcventure/MemLock_Benchmark CVE-2018-10016 - https://github.com/junxzm1990/afl-pt CVE-2018-1002009 - https://github.com/ARPSyndicate/cvemon +CVE-2018-1002015 - https://github.com/CLincat/vulcat CVE-2018-10021 - https://github.com/ARPSyndicate/cvemon CVE-2018-1002100 - https://github.com/43622283/awesome-cloud-native-security CVE-2018-1002100 - https://github.com/Metarget/awesome-cloud-native-security @@ -43981,6 +44242,7 @@ CVE-2018-1002200 - https://github.com/mile9299/zip-slip-vulnerability CVE-2018-1002200 - https://github.com/snyk/zip-slip-vulnerability CVE-2018-1002201 - https://github.com/Anonymous-Phunter/PHunter CVE-2018-1002201 - https://github.com/CGCL-codes/PHunter +CVE-2018-1002201 - https://github.com/LibHunter/LibHunter CVE-2018-1002201 - https://github.com/jpbprakash/vuln CVE-2018-1002201 - https://github.com/mile9299/zip-slip-vulnerability CVE-2018-1002201 - https://github.com/snyk/zip-slip-vulnerability @@ -44115,6 +44377,7 @@ CVE-2018-10237 - https://github.com/ARPSyndicate/cvemon CVE-2018-10237 - https://github.com/Anonymous-Phunter/PHunter CVE-2018-10237 - https://github.com/CGCL-codes/PHunter CVE-2018-10237 - https://github.com/IkerSaint/VULNAPP-vulnerable-app +CVE-2018-10237 - https://github.com/LibHunter/LibHunter CVE-2018-10237 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs CVE-2018-10237 - https://github.com/diakogiannis/moviebook CVE-2018-10237 - https://github.com/dotanuki-labs/android-oss-cves-research @@ -44802,6 +45065,7 @@ CVE-2018-11247 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs CVE-2018-11247 - https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet CVE-2018-11248 - https://github.com/Anonymous-Phunter/PHunter CVE-2018-11248 - https://github.com/CGCL-codes/PHunter +CVE-2018-11248 - https://github.com/LibHunter/LibHunter CVE-2018-1125 - https://github.com/ARPSyndicate/cvemon CVE-2018-11254 - https://github.com/0xCyberY/CVE-T4PDF CVE-2018-11254 - https://github.com/ARPSyndicate/cvemon @@ -44831,6 +45095,7 @@ CVE-2018-11305 - https://github.com/ARPSyndicate/cvemon CVE-2018-11307 - https://github.com/ARPSyndicate/cvemon CVE-2018-11307 - https://github.com/Anonymous-Phunter/PHunter CVE-2018-11307 - https://github.com/CGCL-codes/PHunter +CVE-2018-11307 - https://github.com/LibHunter/LibHunter CVE-2018-11307 - https://github.com/OWASP/www-project-ide-vulscanner CVE-2018-11307 - https://github.com/ilmari666/cybsec CVE-2018-11307 - https://github.com/seal-community/patches @@ -45086,6 +45351,7 @@ CVE-2018-11771 - https://github.com/Anonymous-Phunter/PHunter CVE-2018-11771 - https://github.com/CGCL-codes/PHunter CVE-2018-11771 - https://github.com/DennisFeldbusch/Fuzz CVE-2018-11771 - https://github.com/GCFuzzer/SP2023 +CVE-2018-11771 - https://github.com/LibHunter/LibHunter CVE-2018-11771 - https://github.com/hwen020/JQF CVE-2018-11771 - https://github.com/jyi/JQF CVE-2018-11771 - https://github.com/mfatima1/CS182 @@ -45293,6 +45559,7 @@ CVE-2018-11797 - https://github.com/0xCyberY/CVE-T4PDF CVE-2018-11797 - https://github.com/ARPSyndicate/cvemon CVE-2018-11797 - https://github.com/Anonymous-Phunter/PHunter CVE-2018-11797 - https://github.com/CGCL-codes/PHunter +CVE-2018-11797 - https://github.com/LibHunter/LibHunter CVE-2018-11798 - https://github.com/ossf-cve-benchmark/CVE-2018-11798 CVE-2018-11805 - https://github.com/Live-Hack-CVE/CVE-2019-19920 CVE-2018-11808 - https://github.com/kactrosN/publicdisclosures @@ -45369,6 +45636,7 @@ CVE-2018-12021 - https://github.com/ARPSyndicate/cvemon CVE-2018-12022 - https://github.com/ARPSyndicate/cvemon CVE-2018-12022 - https://github.com/Anonymous-Phunter/PHunter CVE-2018-12022 - https://github.com/CGCL-codes/PHunter +CVE-2018-12022 - https://github.com/LibHunter/LibHunter CVE-2018-12022 - https://github.com/ilmari666/cybsec CVE-2018-12022 - https://github.com/seal-community/patches CVE-2018-12023 - https://github.com/ilmari666/cybsec @@ -45595,6 +45863,7 @@ CVE-2018-12418 - https://github.com/Anonymous-Phunter/PHunter CVE-2018-12418 - https://github.com/CGCL-codes/PHunter CVE-2018-12418 - https://github.com/DennisFeldbusch/Fuzz CVE-2018-12418 - https://github.com/GCFuzzer/SP2023 +CVE-2018-12418 - https://github.com/LibHunter/LibHunter CVE-2018-12418 - https://github.com/hwen020/JQF CVE-2018-12418 - https://github.com/jyi/JQF CVE-2018-12418 - https://github.com/mfatima1/CS182 @@ -45652,6 +45921,7 @@ CVE-2018-12537 - https://github.com/0xT11/CVE-POC CVE-2018-12537 - https://github.com/tafamace/CVE-2018-12537 CVE-2018-12538 - https://github.com/Anonymous-Phunter/PHunter CVE-2018-12538 - https://github.com/CGCL-codes/PHunter +CVE-2018-12538 - https://github.com/LibHunter/LibHunter CVE-2018-12539 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs CVE-2018-12540 - https://github.com/0xT11/CVE-POC CVE-2018-12540 - https://github.com/bernard-wagner/vertx-web-xsrf @@ -45683,6 +45953,7 @@ CVE-2018-1260 - https://github.com/Cryin/Paper CVE-2018-1260 - https://github.com/Drun1baby/CVE-Reproduction-And-Analysis CVE-2018-1260 - https://github.com/SexyBeast233/SecBooks CVE-2018-1260 - https://github.com/ax1sX/SpringSecurity +CVE-2018-1260 - https://github.com/enomothem/PenTestNote CVE-2018-1260 - https://github.com/gyyyy/footprint CVE-2018-1260 - https://github.com/langu-xyz/JavaVulnMap CVE-2018-12601 - https://github.com/xiaoqx/pocs @@ -45806,6 +46077,7 @@ CVE-2018-1270 - https://github.com/bkhablenko/CVE-2017-8046 CVE-2018-1270 - https://github.com/cybersecsi/docker-vuln-runner CVE-2018-1270 - https://github.com/developer3000S/PoC-in-GitHub CVE-2018-1270 - https://github.com/do0dl3/myhktools +CVE-2018-1270 - https://github.com/enomothem/PenTestNote CVE-2018-1270 - https://github.com/genxor/CVE-2018-1270_EXP CVE-2018-1270 - https://github.com/hectorgie/PoC-in-GitHub CVE-2018-1270 - https://github.com/hktalent/myhktools @@ -46636,6 +46908,7 @@ CVE-2018-1323 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 CVE-2018-1324 - https://github.com/0xT11/CVE-POC CVE-2018-1324 - https://github.com/Anonymous-Phunter/PHunter CVE-2018-1324 - https://github.com/CGCL-codes/PHunter +CVE-2018-1324 - https://github.com/LibHunter/LibHunter CVE-2018-1324 - https://github.com/developer3000S/PoC-in-GitHub CVE-2018-1324 - https://github.com/dotanuki-labs/android-oss-cves-research CVE-2018-1324 - https://github.com/hectorgie/PoC-in-GitHub @@ -46751,6 +47024,7 @@ CVE-2018-13379 - https://github.com/Legadro/Legadro-Forti-Scanner CVE-2018-13379 - https://github.com/MelanyRoob/Goby CVE-2018-13379 - https://github.com/Ostorlab/KEV CVE-2018-13379 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors +CVE-2018-13379 - https://github.com/RedcentricCyber/Fortigate CVE-2018-13379 - https://github.com/SexyBeast233/SecBooks CVE-2018-13379 - https://github.com/TebbaaX/Vault6 CVE-2018-13379 - https://github.com/W01fh4cker/Serein @@ -47171,6 +47445,7 @@ CVE-2018-14634 - https://github.com/luan0ap/cve-2018-14634 CVE-2018-14634 - https://github.com/ndk191/linux-kernel-exploitation CVE-2018-14634 - https://github.com/qazbnm456/awesome-cve-poc CVE-2018-14634 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2018-14634 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2018-14634 - https://github.com/xairy/linux-kernel-exploitation CVE-2018-14634 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 CVE-2018-14647 - https://github.com/revl-ca/scan-docker-image @@ -48737,6 +49012,7 @@ CVE-2018-17182 - https://github.com/CVEDB/awesome-cve-repo CVE-2018-17182 - https://github.com/CVEDB/top CVE-2018-17182 - https://github.com/Echocipher/Resource-list CVE-2018-17182 - https://github.com/GhostTroops/TOP +CVE-2018-17182 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2018-17182 - https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation CVE-2018-17182 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2018-17182 - https://github.com/Ondrik8/RED-Team @@ -48770,6 +49046,7 @@ CVE-2018-17182 - https://github.com/slimdaddy/RedTeam CVE-2018-17182 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2018-17182 - https://github.com/svbjdbk123/- CVE-2018-17182 - https://github.com/twensoo/PersistentThreat +CVE-2018-17182 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2018-17182 - https://github.com/xairy/linux-kernel-exploitation CVE-2018-17182 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 CVE-2018-17182 - https://github.com/xiaoZ-hc/redtool @@ -49079,6 +49356,7 @@ CVE-2018-18281 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2018-18281 - https://github.com/knd06/linux-kernel-exploitation CVE-2018-18281 - https://github.com/ndk191/linux-kernel-exploitation CVE-2018-18281 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2018-18281 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2018-18281 - https://github.com/xairy/linux-kernel-exploitation CVE-2018-18282 - https://github.com/ossf-cve-benchmark/CVE-2018-18282 CVE-2018-18287 - https://github.com/syrex1013/AsusLeak @@ -49350,6 +49628,7 @@ CVE-2018-18955 - https://github.com/ARPSyndicate/cvemon CVE-2018-18955 - https://github.com/Al1ex/LinuxEelvation CVE-2018-18955 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2018-18955 - https://github.com/HaleyWei/POC-available +CVE-2018-18955 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2018-18955 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2018-18955 - https://github.com/Metarget/metarget CVE-2018-18955 - https://github.com/Micr067/linux-kernel-exploits @@ -49485,6 +49764,7 @@ CVE-2018-19320 - https://github.com/Ostorlab/KEV CVE-2018-19320 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors CVE-2018-19320 - https://github.com/cmd-theo/RobbinHood-attack CVE-2018-19320 - https://github.com/cygnosic/Gigabyte_Disable_DSE +CVE-2018-19320 - https://github.com/gmh5225/RobbinHood-attack CVE-2018-19320 - https://github.com/gmh5225/awesome-game-security CVE-2018-19320 - https://github.com/h4rmy/KDU CVE-2018-19320 - https://github.com/hfiref0x/KDU @@ -49523,6 +49803,7 @@ CVE-2018-19358 - https://github.com/swiesend/secret-service CVE-2018-19360 - https://github.com/ARPSyndicate/cvemon CVE-2018-19360 - https://github.com/Anonymous-Phunter/PHunter CVE-2018-19360 - https://github.com/CGCL-codes/PHunter +CVE-2018-19360 - https://github.com/LibHunter/LibHunter CVE-2018-19360 - https://github.com/OWASP/www-project-ide-vulscanner CVE-2018-19360 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs CVE-2018-19360 - https://github.com/aaronm-sysdig/risk-accept @@ -49530,6 +49811,7 @@ CVE-2018-19360 - https://github.com/ilmari666/cybsec CVE-2018-19361 - https://github.com/ARPSyndicate/cvemon CVE-2018-19361 - https://github.com/Anonymous-Phunter/PHunter CVE-2018-19361 - https://github.com/CGCL-codes/PHunter +CVE-2018-19361 - https://github.com/LibHunter/LibHunter CVE-2018-19361 - https://github.com/OWASP/www-project-ide-vulscanner CVE-2018-19361 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs CVE-2018-19361 - https://github.com/aaronm-sysdig/risk-accept @@ -49537,6 +49819,7 @@ CVE-2018-19361 - https://github.com/ilmari666/cybsec CVE-2018-19362 - https://github.com/ARPSyndicate/cvemon CVE-2018-19362 - https://github.com/Anonymous-Phunter/PHunter CVE-2018-19362 - https://github.com/CGCL-codes/PHunter +CVE-2018-19362 - https://github.com/LibHunter/LibHunter CVE-2018-19362 - https://github.com/OWASP/www-project-ide-vulscanner CVE-2018-19362 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs CVE-2018-19362 - https://github.com/aaronm-sysdig/risk-accept @@ -51559,6 +51842,7 @@ CVE-2018-3639 - https://github.com/v-lavrentikov/meltdown-spectre CVE-2018-3639 - https://github.com/vintagesucks/awesome-stars CVE-2018-3639 - https://github.com/vurtne/specter---meltdown--checker CVE-2018-3639 - https://github.com/willyb321/willyb321-stars +CVE-2018-3639 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2018-3639 - https://github.com/xairy/linux-kernel-exploitation CVE-2018-3639 - https://github.com/yardenshafir/MitigationFlagsCliTool CVE-2018-3640 - https://github.com/ARPSyndicate/cvemon @@ -52796,6 +53080,7 @@ CVE-2018-5318 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 CVE-2018-5333 - https://github.com/ARPSyndicate/cvemon CVE-2018-5333 - https://github.com/Al1ex/LinuxEelvation CVE-2018-5333 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp +CVE-2018-5333 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2018-5333 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2018-5333 - https://github.com/bcoles/kernel-exploits CVE-2018-5333 - https://github.com/bsauce/kernel-exploit-factory @@ -53125,6 +53410,7 @@ CVE-2018-5968 - https://github.com/ARPSyndicate/cvemon CVE-2018-5968 - https://github.com/Anonymous-Phunter/PHunter CVE-2018-5968 - https://github.com/CGCL-codes/PHunter CVE-2018-5968 - https://github.com/FHGZS/jackson-rce-via-two-new-gadgets +CVE-2018-5968 - https://github.com/LibHunter/LibHunter CVE-2018-5968 - https://github.com/OneSourceCat/jackson-rce-via-two-new-gadgets CVE-2018-5968 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs CVE-2018-5968 - https://github.com/ilmari666/cybsec @@ -53637,6 +53923,7 @@ CVE-2018-6554 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2018-6554 - https://github.com/knd06/linux-kernel-exploitation CVE-2018-6554 - https://github.com/ndk191/linux-kernel-exploitation CVE-2018-6554 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2018-6554 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2018-6554 - https://github.com/xairy/linux-kernel-exploitation CVE-2018-6555 - https://github.com/ARPSyndicate/cvemon CVE-2018-6555 - https://github.com/kdn111/linux-kernel-exploitation @@ -53650,6 +53937,7 @@ CVE-2018-6555 - https://github.com/knd06/linux-kernel-exploitation CVE-2018-6555 - https://github.com/ndk191/linux-kernel-exploitation CVE-2018-6555 - https://github.com/ostrichxyz7/kexps CVE-2018-6555 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2018-6555 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2018-6555 - https://github.com/xairy/linux-kernel-exploitation CVE-2018-6556 - https://github.com/MaherAzzouzi/CVE-2022-47952 CVE-2018-6556 - https://github.com/k0mi-tg/CVE-POC @@ -54241,6 +54529,7 @@ CVE-2018-7489 - https://github.com/zema1/oracle-vuln-crawler CVE-2018-7490 - https://github.com/0ps/pocassistdb CVE-2018-7490 - https://github.com/ARPSyndicate/cvemon CVE-2018-7490 - https://github.com/ARPSyndicate/kenzer-templates +CVE-2018-7490 - https://github.com/CLincat/vulcat CVE-2018-7490 - https://github.com/Elsfa7-110/kenzer-templates CVE-2018-7490 - https://github.com/H4cking2theGate/TraversalHunter CVE-2018-7490 - https://github.com/SexyBeast233/SecBooks @@ -54784,6 +55073,7 @@ CVE-2018-8036 - https://github.com/Anonymous-Phunter/PHunter CVE-2018-8036 - https://github.com/CGCL-codes/PHunter CVE-2018-8036 - https://github.com/DennisFeldbusch/Fuzz CVE-2018-8036 - https://github.com/GCFuzzer/SP2023 +CVE-2018-8036 - https://github.com/LibHunter/LibHunter CVE-2018-8036 - https://github.com/hwen020/JQF CVE-2018-8036 - https://github.com/jyi/JQF CVE-2018-8036 - https://github.com/mfatima1/CS182 @@ -54794,6 +55084,7 @@ CVE-2018-8036 - https://github.com/rohanpadhye/JQF CVE-2018-8036 - https://github.com/sarahc7/jqf-gson CVE-2018-8037 - https://github.com/ilmari666/cybsec CVE-2018-8037 - https://github.com/tomoyamachi/gocarts +CVE-2018-8037 - https://github.com/versio-io/product-lifecycle-security-api CVE-2018-8037 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough CVE-2018-8038 - https://github.com/0xT11/CVE-POC CVE-2018-8038 - https://github.com/hectorgie/PoC-in-GitHub @@ -55094,6 +55385,7 @@ CVE-2018-8174 - https://github.com/HacTF/poc--exp CVE-2018-8174 - https://github.com/InQuest/yara-rules CVE-2018-8174 - https://github.com/JERRY123S/all-poc CVE-2018-8174 - https://github.com/KasperskyLab/VBscriptInternals +CVE-2018-8174 - https://github.com/MN439/bingduziyuan CVE-2018-8174 - https://github.com/MrTcsy/Exploit CVE-2018-8174 - https://github.com/Ondrik8/RED-Team CVE-2018-8174 - https://github.com/Ostorlab/KEV @@ -55898,6 +56190,7 @@ CVE-2018-8781 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2018-8781 - https://github.com/knd06/linux-kernel-exploitation CVE-2018-8781 - https://github.com/ndk191/linux-kernel-exploitation CVE-2018-8781 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2018-8781 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2018-8781 - https://github.com/xairy/linux-kernel-exploitation CVE-2018-8792 - https://github.com/ARPSyndicate/cvemon CVE-2018-8796 - https://github.com/ARPSyndicate/cvemon @@ -56216,6 +56509,7 @@ CVE-2018-9427 - https://github.com/ARPSyndicate/cvemon CVE-2018-9436 - https://github.com/ARPSyndicate/cvemon CVE-2018-9437 - https://github.com/ARPSyndicate/cvemon CVE-2018-9438 - https://github.com/ARPSyndicate/cvemon +CVE-2018-9442 - https://github.com/codexlynx/hardware-attacks-state-of-the-art CVE-2018-9444 - https://github.com/ARPSyndicate/cvemon CVE-2018-9445 - https://github.com/ARPSyndicate/cvemon CVE-2018-9445 - https://github.com/lnick2023/nicenice @@ -56304,6 +56598,7 @@ CVE-2018-9568 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2018-9568 - https://github.com/knd06/linux-kernel-exploitation CVE-2018-9568 - https://github.com/ndk191/linux-kernel-exploitation CVE-2018-9568 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2018-9568 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2018-9568 - https://github.com/xairy/linux-kernel-exploitation CVE-2018-9582 - https://github.com/ARPSyndicate/cvemon CVE-2018-9582 - https://github.com/virtualpatch/virtualpatch_evaluation @@ -56719,6 +57014,7 @@ CVE-2019-0227 - https://github.com/pen4uin/vulnerability-research-list CVE-2019-0227 - https://github.com/sunzu94/AWS-CVEs CVE-2019-0228 - https://github.com/Anonymous-Phunter/PHunter CVE-2019-0228 - https://github.com/CGCL-codes/PHunter +CVE-2019-0228 - https://github.com/LibHunter/LibHunter CVE-2019-0228 - https://github.com/bluesNbrews/SkillSearchEngine CVE-2019-0228 - https://github.com/swilliams9671/SkillSearchEngine CVE-2019-0229 - https://github.com/ARPSyndicate/cvemon @@ -57424,6 +57720,7 @@ CVE-2019-0708 - https://github.com/password520/Penetration_PoC CVE-2019-0708 - https://github.com/password520/RedTeamer CVE-2019-0708 - https://github.com/pengusec/awesome-netsec-articles CVE-2019-0708 - https://github.com/pentest-a2p2v/pentest-a2p2v-core +CVE-2019-0708 - https://github.com/pg001001/deception-tech CVE-2019-0708 - https://github.com/phant0n/PENTESTING-BIBLE CVE-2019-0708 - https://github.com/pikpikcu/Pentest-Tools-Framework CVE-2019-0708 - https://github.com/pravinsrc/NOTES-windows-kernel-links @@ -58207,6 +58504,7 @@ CVE-2019-10086 - https://github.com/ARPSyndicate/cvemon CVE-2019-10086 - https://github.com/Anonymous-Phunter/PHunter CVE-2019-10086 - https://github.com/CGCL-codes/PHunter CVE-2019-10086 - https://github.com/IkerSaint/VULNAPP-vulnerable-app +CVE-2019-10086 - https://github.com/LibHunter/LibHunter CVE-2019-10086 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs CVE-2019-10086 - https://github.com/developer3000S/PoC-in-GitHub CVE-2019-10086 - https://github.com/hectorgie/PoC-in-GitHub @@ -58505,11 +58803,14 @@ CVE-2019-10232 - https://github.com/youcans896768/APIV_Tool CVE-2019-10241 - https://github.com/Anonymous-Phunter/PHunter CVE-2019-10241 - https://github.com/CGCL-codes/PHunter CVE-2019-10241 - https://github.com/DonnumS/inf226Inchat +CVE-2019-10241 - https://github.com/LibHunter/LibHunter CVE-2019-10246 - https://github.com/Anonymous-Phunter/PHunter CVE-2019-10246 - https://github.com/CGCL-codes/PHunter +CVE-2019-10246 - https://github.com/LibHunter/LibHunter CVE-2019-10247 - https://github.com/Anonymous-Phunter/PHunter CVE-2019-10247 - https://github.com/CGCL-codes/PHunter CVE-2019-10247 - https://github.com/DonnumS/inf226Inchat +CVE-2019-10247 - https://github.com/LibHunter/LibHunter CVE-2019-10255 - https://github.com/ARPSyndicate/cvemon CVE-2019-10255 - https://github.com/RonenDabach/python-tda-bug-hunt-2 CVE-2019-10261 - https://github.com/ARPSyndicate/cvemon @@ -58695,6 +58996,7 @@ CVE-2019-10567 - https://github.com/knd06/linux-kernel-exploitation CVE-2019-10567 - https://github.com/ndk191/linux-kernel-exploitation CVE-2019-10567 - https://github.com/secmob/TiYunZong-An-Exploit-Chain-to-Remotely-Root-Modern-Android-Devices CVE-2019-10567 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2019-10567 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2019-10567 - https://github.com/xairy/linux-kernel-exploitation CVE-2019-10584 - https://github.com/jiayy/android_vuln_poc-exp CVE-2019-10596 - https://github.com/404notf0und/CVE-Flow @@ -59237,6 +59539,7 @@ CVE-2019-11190 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2019-11190 - https://github.com/knd06/linux-kernel-exploitation CVE-2019-11190 - https://github.com/ndk191/linux-kernel-exploitation CVE-2019-11190 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2019-11190 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2019-11190 - https://github.com/xairy/linux-kernel-exploitation CVE-2019-11193 - https://github.com/ARPSyndicate/cvemon CVE-2019-11223 - https://github.com/0xT11/CVE-POC @@ -59559,6 +59862,7 @@ CVE-2019-11358 - https://github.com/6165-MSET-CuttleFish/FtcRobotController CVE-2019-11358 - https://github.com/6165-MSET-CuttleFish/PowerPlay CVE-2019-11358 - https://github.com/6165-MSET-CuttleFish/SHS_Swerve_Offseason CVE-2019-11358 - https://github.com/6369Designosars/Summer_Software_6.2 +CVE-2019-11358 - https://github.com/6427FTCRobotics/centerstage6427 CVE-2019-11358 - https://github.com/731WannabeeStrange/FTC-731-Powerplay CVE-2019-11358 - https://github.com/731WannabeeStrange/centerstage-731 CVE-2019-11358 - https://github.com/7390jellyfish/software @@ -60431,6 +60735,7 @@ CVE-2019-11358 - https://github.com/FTCTeam11531/TechnoTrojanTraining_Drivetrain CVE-2019-11358 - https://github.com/FTCTeam21217/AutonomousWorkshop CVE-2019-11358 - https://github.com/FTCTeam7610-Software/7610-Software-Version-7.1 CVE-2019-11358 - https://github.com/FTCTeam7610-Software/7610Software-7.1 +CVE-2019-11358 - https://github.com/FTCclueless/Centerstage CVE-2019-11358 - https://github.com/FUTURE-FTC10366/FTCFreightFrenzy-2021-22 CVE-2019-11358 - https://github.com/FaltechFTC/FtcRobotController2122 CVE-2019-11358 - https://github.com/Feyorsh/PASC-FTC-robotCode @@ -60643,6 +60948,7 @@ CVE-2019-11358 - https://github.com/InduGadi/example-repository CVE-2019-11358 - https://github.com/Indubitably8/Bot24Update CVE-2019-11358 - https://github.com/Indubitably8/JakeBot CVE-2019-11358 - https://github.com/Indubitably8/JakeBot24 +CVE-2019-11358 - https://github.com/Infernal-Industries/AprilTagTesting CVE-2019-11358 - https://github.com/Infidge/LeagueMeetsBot CVE-2019-11358 - https://github.com/InfinityTechRobotics/IT_2022_Summer_Learning CVE-2019-11358 - https://github.com/Infinitybeond1/RobotCode @@ -60838,6 +61144,7 @@ CVE-2019-11358 - https://github.com/LenickTan/FtcRobotController-7.0 CVE-2019-11358 - https://github.com/LenickTan/UltimateGoalCode CVE-2019-11358 - https://github.com/LenickTan/ultgoal CVE-2019-11358 - https://github.com/LeoMavri/RO109-Homosapiens +CVE-2019-11358 - https://github.com/LeozinDaProgramacao/TechZeusCenterstage2023-2024 CVE-2019-11358 - https://github.com/LiBaoJake/ftcrobotcontrol CVE-2019-11358 - https://github.com/LiamWalker01/CrowForce22-23 CVE-2019-11358 - https://github.com/LiamWalker01/CrowForce22-23-RobotController8.1.1 @@ -61130,6 +61437,7 @@ CVE-2019-11358 - https://github.com/OverlakeRobotics/FtcRobotController2021 CVE-2019-11358 - https://github.com/OverlakeRobotics/Nocturnal-2020-Ultimate-Goal CVE-2019-11358 - https://github.com/OverlakeRobotics/OverlakeFTC-2023-7330 CVE-2019-11358 - https://github.com/OverripeBanana/9894_Robolions +CVE-2019-11358 - https://github.com/Overture-7421/Hayabusa-2024 CVE-2019-11358 - https://github.com/Overture-7421/HayabusaRobotCode_23619 CVE-2019-11358 - https://github.com/Owen-Pryga/FtcRobotController_UltamateGoal CVE-2019-11358 - https://github.com/Owen383/WM20 @@ -61471,6 +61779,7 @@ CVE-2019-11358 - https://github.com/SittingDucks23507/SD CVE-2019-11358 - https://github.com/Skywalker934/PowerPlay CVE-2019-11358 - https://github.com/Skywalker934/video-tutorial CVE-2019-11358 - https://github.com/Slipperee-CODE/4625---FTC---POWERPLAY +CVE-2019-11358 - https://github.com/Slipperee-CODE/4625-FTC-CenterStage CVE-2019-11358 - https://github.com/Slipperee-CODE/4625-FTC-CenterStage2023-2024 CVE-2019-11358 - https://github.com/Slipperee-CODE/4625-FTC-Offseason CVE-2019-11358 - https://github.com/Slipshodleaf74/Freight-Frenzy @@ -61625,6 +61934,7 @@ CVE-2019-11358 - https://github.com/The-Founders-Academy/2023-Powerplay CVE-2019-11358 - https://github.com/The-Founders-Academy/2023-Test-Robot CVE-2019-11358 - https://github.com/The-Founders-Academy/2024-Centerstage CVE-2019-11358 - https://github.com/The-Founders-Academy/2024-Centerstage-Archived +CVE-2019-11358 - https://github.com/The-Founders-Academy/shared-code CVE-2019-11358 - https://github.com/The-Innovation-Story/FreightFrenzy_FTC CVE-2019-11358 - https://github.com/The-Knights-of-Ni/Skystone2020 CVE-2019-11358 - https://github.com/The-Knights-of-Ni/UltimateGoal2021_6.2 @@ -62371,6 +62681,7 @@ CVE-2019-11358 - https://github.com/frc4039/ftc2023 CVE-2019-11358 - https://github.com/frc4039/ftc2024 CVE-2019-11358 - https://github.com/frc5050/FTC7901-2021 CVE-2019-11358 - https://github.com/frc5050/FTC7902-2021 +CVE-2019-11358 - https://github.com/frc6606/ftc-2024 CVE-2019-11358 - https://github.com/frc7787/FTC-2023-Robot CVE-2019-11358 - https://github.com/frc7787/FTC-Centerstage CVE-2019-11358 - https://github.com/frc7787/FTC_AndroidStudio2023 @@ -63643,6 +63954,7 @@ CVE-2019-11510 - https://github.com/developer3000S/PoC-in-GitHub CVE-2019-11510 - https://github.com/dnif/content CVE-2019-11510 - https://github.com/es0/CVE-2019-11510_poc CVE-2019-11510 - https://github.com/fengjixuchui/RedTeamer +CVE-2019-11510 - https://github.com/fierceoj/ShonyDanza CVE-2019-11510 - https://github.com/gquere/PulseSecure_session_hijacking CVE-2019-11510 - https://github.com/hasee2018/Penetration_Testing_POC CVE-2019-11510 - https://github.com/hectorgie/PoC-in-GitHub @@ -64066,6 +64378,7 @@ CVE-2019-12086 - https://github.com/ARPSyndicate/cvemon CVE-2019-12086 - https://github.com/Al1ex/CVE-2019-12086 CVE-2019-12086 - https://github.com/Anonymous-Phunter/PHunter CVE-2019-12086 - https://github.com/CGCL-codes/PHunter +CVE-2019-12086 - https://github.com/LibHunter/LibHunter CVE-2019-12086 - https://github.com/SimoLin/CVE-2019-12086-jackson-databind-file-read CVE-2019-12086 - https://github.com/SugarP1g/LearningSecurity CVE-2019-12086 - https://github.com/codeplutos/CVE-2019-12086-jackson-databind-file-read @@ -64282,6 +64595,7 @@ CVE-2019-12400 - https://github.com/onelogin/java-saml CVE-2019-12400 - https://github.com/umeshnagori/java-saml-os CVE-2019-12402 - https://github.com/Anonymous-Phunter/PHunter CVE-2019-12402 - https://github.com/CGCL-codes/PHunter +CVE-2019-12402 - https://github.com/LibHunter/LibHunter CVE-2019-12409 - https://github.com/0day404/vulnerability-poc CVE-2019-12409 - https://github.com/0xT11/CVE-POC CVE-2019-12409 - https://github.com/20142995/pocsuite3 @@ -64331,6 +64645,7 @@ CVE-2019-12415 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 CVE-2019-12417 - https://github.com/fruh/security-bulletins CVE-2019-12418 - https://github.com/ARPSyndicate/cvemon CVE-2019-12418 - https://github.com/raner/projo +CVE-2019-12418 - https://github.com/versio-io/product-lifecycle-security-api CVE-2019-12418 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough CVE-2019-12422 - https://github.com/ARPSyndicate/cvemon CVE-2019-12422 - https://github.com/SugarP1g/LearningSecurity @@ -64697,6 +65012,7 @@ CVE-2019-12814 - https://github.com/Al1ex/CVE-2019-12814 CVE-2019-12814 - https://github.com/Anonymous-Phunter/PHunter CVE-2019-12814 - https://github.com/BorderTech/java-common CVE-2019-12814 - https://github.com/CGCL-codes/PHunter +CVE-2019-12814 - https://github.com/LibHunter/LibHunter CVE-2019-12814 - https://github.com/SexyBeast233/SecBooks CVE-2019-12814 - https://github.com/SugarP1g/LearningSecurity CVE-2019-12814 - https://github.com/developer3000S/PoC-in-GitHub @@ -65363,6 +65679,7 @@ CVE-2019-13272 - https://github.com/GhostTroops/TOP CVE-2019-13272 - https://github.com/H0j3n/EzpzCheatSheet CVE-2019-13272 - https://github.com/H1CH444MREB0RN/PenTest-free-tools CVE-2019-13272 - https://github.com/HaleyWei/POC-available +CVE-2019-13272 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2019-13272 - https://github.com/Huandtx/CVE-2019-13272 CVE-2019-13272 - https://github.com/ImranTheThirdEye/AD-Pentesting-Tools CVE-2019-13272 - https://github.com/JERRY123S/all-poc @@ -65467,6 +65784,7 @@ CVE-2019-13288 - https://github.com/EsharkyTheGreat/Xpdf-4.04-InfiniteStackRecur CVE-2019-13288 - https://github.com/Fineas/CVE-2019-13288-POC CVE-2019-13288 - https://github.com/asur4s/blog CVE-2019-13288 - https://github.com/asur4s/fuzzing +CVE-2019-13288 - https://github.com/ch1hyun/fuzzing-class CVE-2019-13288 - https://github.com/chiehw/fuzzing CVE-2019-13288 - https://github.com/gleaming0/CVE-2019-13288 CVE-2019-13289 - https://github.com/0xCyberY/CVE-T4PDF @@ -65950,6 +66268,7 @@ CVE-2019-14040 - https://github.com/knd06/linux-kernel-exploitation CVE-2019-14040 - https://github.com/ndk191/linux-kernel-exploitation CVE-2019-14040 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2019-14040 - https://github.com/tamirzb/CVE-2019-14040 +CVE-2019-14040 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2019-14040 - https://github.com/xairy/linux-kernel-exploitation CVE-2019-14041 - https://github.com/0xT11/CVE-POC CVE-2019-14041 - https://github.com/ARPSyndicate/cvemon @@ -65966,6 +66285,7 @@ CVE-2019-14041 - https://github.com/knd06/linux-kernel-exploitation CVE-2019-14041 - https://github.com/ndk191/linux-kernel-exploitation CVE-2019-14041 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2019-14041 - https://github.com/tamirzb/CVE-2019-14041 +CVE-2019-14041 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2019-14041 - https://github.com/xairy/linux-kernel-exploitation CVE-2019-1405 - https://github.com/0xT11/CVE-POC CVE-2019-1405 - https://github.com/65df4s/Erebusw @@ -66330,6 +66650,7 @@ CVE-2019-14431 - https://github.com/Samsung/cotopaxi CVE-2019-14439 - https://github.com/0xT11/CVE-POC CVE-2019-14439 - https://github.com/Anonymous-Phunter/PHunter CVE-2019-14439 - https://github.com/CGCL-codes/PHunter +CVE-2019-14439 - https://github.com/LibHunter/LibHunter CVE-2019-14439 - https://github.com/developer3000S/PoC-in-GitHub CVE-2019-14439 - https://github.com/diakogiannis/moviebook CVE-2019-14439 - https://github.com/galimba/Jackson-deserialization-PoC @@ -66525,6 +66846,7 @@ CVE-2019-1477 - https://github.com/ycdxsb/WindowsPrivilegeEscalation CVE-2019-14772 - https://github.com/ossf-cve-benchmark/CVE-2019-14772 CVE-2019-14773 - https://github.com/ARPSyndicate/cvemon CVE-2019-14775 - https://github.com/lukaspustina/cve-scorer +CVE-2019-14776 - https://github.com/ch1hyun/fuzzing-class CVE-2019-14795 - https://github.com/ARPSyndicate/cvemon CVE-2019-14799 - https://github.com/ARPSyndicate/cvemon CVE-2019-1481 - https://github.com/barrracud4/image-upload-exploits @@ -66581,6 +66903,7 @@ CVE-2019-14891 - https://github.com/cibvetr2/crio_research CVE-2019-14892 - https://github.com/ARPSyndicate/cvemon CVE-2019-14892 - https://github.com/Anonymous-Phunter/PHunter CVE-2019-14892 - https://github.com/CGCL-codes/PHunter +CVE-2019-14892 - https://github.com/LibHunter/LibHunter CVE-2019-14892 - https://github.com/Live-Hack-CVE/CVE-2019-14892 CVE-2019-14892 - https://github.com/OWASP/www-project-ide-vulscanner CVE-2019-14892 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs @@ -66589,6 +66912,7 @@ CVE-2019-14892 - https://github.com/seal-community/patches CVE-2019-14893 - https://github.com/ARPSyndicate/cvemon CVE-2019-14893 - https://github.com/Anonymous-Phunter/PHunter CVE-2019-14893 - https://github.com/CGCL-codes/PHunter +CVE-2019-14893 - https://github.com/LibHunter/LibHunter CVE-2019-14893 - https://github.com/OWASP/www-project-ide-vulscanner CVE-2019-14893 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs CVE-2019-14893 - https://github.com/seal-community/patches @@ -67141,6 +67465,7 @@ CVE-2019-15658 - https://github.com/ossf-cve-benchmark/CVE-2019-15658 CVE-2019-15666 - https://github.com/Al1ex/LinuxEelvation CVE-2019-15666 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp CVE-2019-15666 - https://github.com/DrewSC13/Linpeas +CVE-2019-15666 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2019-15666 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2019-15666 - https://github.com/bsauce/kernel-exploit-factory CVE-2019-15666 - https://github.com/bsauce/kernel-security-learning @@ -67352,7 +67677,10 @@ CVE-2019-16098 - https://github.com/0xT11/CVE-POC CVE-2019-16098 - https://github.com/474172261/KDU CVE-2019-16098 - https://github.com/ARPSyndicate/cvemon CVE-2019-16098 - https://github.com/Barakat/CVE-2019-16098 +CVE-2019-16098 - https://github.com/CVEDB/awesome-cve-repo +CVE-2019-16098 - https://github.com/CVEDB/top CVE-2019-16098 - https://github.com/ExpLife0011/awesome-windows-kernel-security-development +CVE-2019-16098 - https://github.com/GhostTroops/TOP CVE-2019-16098 - https://github.com/JustaT3ch/Kernel-Snooping CVE-2019-16098 - https://github.com/Ondrik8/exploit CVE-2019-16098 - https://github.com/developer3000S/PoC-in-GitHub @@ -67763,6 +68091,7 @@ CVE-2019-16508 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2019-16508 - https://github.com/knd06/linux-kernel-exploitation CVE-2019-16508 - https://github.com/ndk191/linux-kernel-exploitation CVE-2019-16508 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2019-16508 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2019-16508 - https://github.com/xairy/linux-kernel-exploitation CVE-2019-16511 - https://github.com/GitHubAssessments/CVE_Assessments_09_2019 CVE-2019-16511 - https://github.com/jpbprakash/vuln @@ -68022,6 +68351,7 @@ CVE-2019-16865 - https://github.com/ARPSyndicate/cvemon CVE-2019-16869 - https://github.com/ARPSyndicate/cvemon CVE-2019-16869 - https://github.com/Anonymous-Phunter/PHunter CVE-2019-16869 - https://github.com/CGCL-codes/PHunter +CVE-2019-16869 - https://github.com/LibHunter/LibHunter CVE-2019-16869 - https://github.com/cezapata/appconfiguration-sample CVE-2019-16880 - https://github.com/Artisan-Lab/Rust-memory-safety-bugs CVE-2019-16881 - https://github.com/Artisan-Lab/Rust-memory-safety-bugs @@ -68375,6 +68705,7 @@ CVE-2019-17262 - https://github.com/linhlhq/research CVE-2019-17267 - https://github.com/ARPSyndicate/cvemon CVE-2019-17267 - https://github.com/Anonymous-Phunter/PHunter CVE-2019-17267 - https://github.com/CGCL-codes/PHunter +CVE-2019-17267 - https://github.com/LibHunter/LibHunter CVE-2019-17267 - https://github.com/OWASP/www-project-ide-vulscanner CVE-2019-17267 - https://github.com/ilmari666/cybsec CVE-2019-17267 - https://github.com/seal-community/patches @@ -68389,6 +68720,7 @@ CVE-2019-17359 - https://github.com/Anonymous-Phunter/PHunter CVE-2019-17359 - https://github.com/CGCL-codes/PHunter CVE-2019-17359 - https://github.com/DennisFeldbusch/Fuzz CVE-2019-17359 - https://github.com/GCFuzzer/SP2023 +CVE-2019-17359 - https://github.com/LibHunter/LibHunter CVE-2019-17359 - https://github.com/hwen020/JQF CVE-2019-17359 - https://github.com/mfatima1/CS182 CVE-2019-17359 - https://github.com/moudemans/GFuzz @@ -68645,6 +68977,7 @@ CVE-2019-17559 - https://github.com/Live-Hack-CVE/CVE-2019-17559 CVE-2019-17563 - https://github.com/Live-Hack-CVE/CVE-2019-17563 CVE-2019-17563 - https://github.com/raner/projo CVE-2019-17563 - https://github.com/rootameen/vulpine +CVE-2019-17563 - https://github.com/versio-io/product-lifecycle-security-api CVE-2019-17563 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough CVE-2019-17564 - https://github.com/0xT11/CVE-POC CVE-2019-17564 - https://github.com/ARPSyndicate/cvemon @@ -68860,6 +69193,7 @@ CVE-2019-17625 - https://github.com/hectorgie/PoC-in-GitHub CVE-2019-17626 - https://github.com/asa1997/topgear_test CVE-2019-17632 - https://github.com/Anonymous-Phunter/PHunter CVE-2019-17632 - https://github.com/CGCL-codes/PHunter +CVE-2019-17632 - https://github.com/LibHunter/LibHunter CVE-2019-17633 - https://github.com/0xT11/CVE-POC CVE-2019-17633 - https://github.com/developer3000S/PoC-in-GitHub CVE-2019-17633 - https://github.com/hectorgie/PoC-in-GitHub @@ -69220,6 +69554,7 @@ CVE-2019-18675 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2019-18675 - https://github.com/knd06/linux-kernel-exploitation CVE-2019-18675 - https://github.com/ndk191/linux-kernel-exploitation CVE-2019-18675 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2019-18675 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2019-18675 - https://github.com/xairy/linux-kernel-exploitation CVE-2019-18679 - https://github.com/SexyBeast233/SecBooks CVE-2019-18683 - https://github.com/0xT11/CVE-POC @@ -69243,6 +69578,7 @@ CVE-2019-18683 - https://github.com/ndk191/linux-kernel-exploitation CVE-2019-18683 - https://github.com/qazbnm456/awesome-cve-poc CVE-2019-18683 - https://github.com/sanjana123-cloud/CVE-2019-18683 CVE-2019-18683 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2019-18683 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2019-18683 - https://github.com/xairy/linux-kernel-exploitation CVE-2019-18683 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 CVE-2019-18775 - https://github.com/sjmini/icse2020-Solidity @@ -69676,6 +70012,7 @@ CVE-2019-19377 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2019-19377 - https://github.com/knd06/linux-kernel-exploitation CVE-2019-19377 - https://github.com/ndk191/linux-kernel-exploitation CVE-2019-19377 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2019-19377 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2019-19377 - https://github.com/xairy/linux-kernel-exploitation CVE-2019-19378 - https://github.com/ARPSyndicate/cvemon CVE-2019-19383 - https://github.com/0xT11/CVE-POC @@ -70003,6 +70340,7 @@ CVE-2019-19781 - https://github.com/emtee40/win-pentest-tools CVE-2019-19781 - https://github.com/faisal6me/DFIR-Note CVE-2019-19781 - https://github.com/fcp999/centos CVE-2019-19781 - https://github.com/fengjixuchui/RedTeamer +CVE-2019-19781 - https://github.com/fierceoj/ShonyDanza CVE-2019-19781 - https://github.com/gobysec/Goby CVE-2019-19781 - https://github.com/hack-parthsharma/Pentest-Tools CVE-2019-19781 - https://github.com/hackingyseguridad/nmap @@ -70253,6 +70591,7 @@ CVE-2019-2000 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2019-2000 - https://github.com/knd06/linux-kernel-exploitation CVE-2019-2000 - https://github.com/ndk191/linux-kernel-exploitation CVE-2019-2000 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2019-2000 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2019-2000 - https://github.com/xairy/linux-kernel-exploitation CVE-2019-20002 - https://github.com/ARPSyndicate/cvemon CVE-2019-2003 - https://github.com/ARPSyndicate/cvemon @@ -70397,6 +70736,7 @@ CVE-2019-2025 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2019-2025 - https://github.com/knd06/linux-kernel-exploitation CVE-2019-2025 - https://github.com/ndk191/linux-kernel-exploitation CVE-2019-2025 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2019-2025 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2019-2025 - https://github.com/xairy/linux-kernel-exploitation CVE-2019-2027 - https://github.com/ARPSyndicate/cvemon CVE-2019-2027 - https://github.com/hyrathon/trophies @@ -70443,6 +70783,7 @@ CVE-2019-20414 - https://github.com/ARPSyndicate/cvemon CVE-2019-20443 - https://github.com/cybersecurityworks553/Security-Advisories CVE-2019-20444 - https://github.com/Anonymous-Phunter/PHunter CVE-2019-20444 - https://github.com/CGCL-codes/PHunter +CVE-2019-20444 - https://github.com/LibHunter/LibHunter CVE-2019-20444 - https://github.com/cezapata/appconfiguration-sample CVE-2019-20444 - https://github.com/yahoo/cubed CVE-2019-20445 - https://github.com/cezapata/appconfiguration-sample @@ -70570,6 +70911,7 @@ CVE-2019-2107 - https://github.com/CVEDB/PoC-List CVE-2019-2107 - https://github.com/CVEDB/awesome-cve-repo CVE-2019-2107 - https://github.com/CVEDB/top CVE-2019-2107 - https://github.com/CnHack3r/Penetration_PoC +CVE-2019-2107 - https://github.com/CrackerCat/CVE-2019-2107 CVE-2019-2107 - https://github.com/EchoGin404/- CVE-2019-2107 - https://github.com/EchoGin404/gongkaishouji CVE-2019-2107 - https://github.com/GhostTroops/TOP @@ -70620,6 +70962,7 @@ CVE-2019-2181 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2019-2181 - https://github.com/knd06/linux-kernel-exploitation CVE-2019-2181 - https://github.com/ndk191/linux-kernel-exploitation CVE-2019-2181 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2019-2181 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2019-2181 - https://github.com/xairy/linux-kernel-exploitation CVE-2019-2187 - https://github.com/ARPSyndicate/cvemon CVE-2019-2187 - https://github.com/hyrathon/trophies @@ -70653,9 +70996,11 @@ CVE-2019-2214 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2019-2214 - https://github.com/knd06/linux-kernel-exploitation CVE-2019-2214 - https://github.com/ndk191/linux-kernel-exploitation CVE-2019-2214 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2019-2214 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2019-2214 - https://github.com/xairy/linux-kernel-exploitation CVE-2019-2215 - https://github.com/0xT11/CVE-POC CVE-2019-2215 - https://github.com/ARPSyndicate/cvemon +CVE-2019-2215 - https://github.com/ATorNinja/CVE-2019-2215 CVE-2019-2215 - https://github.com/Al1ex/LinuxEelvation CVE-2019-2215 - https://github.com/Byte-Master-101/CVE-2019-2215 CVE-2019-2215 - https://github.com/CrackerCat/Rootsmart-v2.0 @@ -70720,6 +71065,7 @@ CVE-2019-2215 - https://github.com/themmokhtar/CVE-2020-0022 CVE-2019-2215 - https://github.com/timwr/CVE-2019-2215 CVE-2019-2215 - https://github.com/wateroot/poc-exp CVE-2019-2215 - https://github.com/willboka/CVE-2019-2215-HuaweiP20Lite +CVE-2019-2215 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2019-2215 - https://github.com/wrlu/Vulnerabilities CVE-2019-2215 - https://github.com/xairy/linux-kernel-exploitation CVE-2019-2215 - https://github.com/yud121212/Linux_Privilege_Escalation @@ -70875,6 +71221,7 @@ CVE-2019-2618 - https://github.com/lp008/Hack-readme CVE-2019-2618 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2019-2618 - https://github.com/pyn3rd/CVE-2019-2618 CVE-2019-2618 - https://github.com/qazbnm456/awesome-cve-poc +CVE-2019-2618 - https://github.com/qtgavc/list CVE-2019-2618 - https://github.com/r0eXpeR/redteam_vul CVE-2019-2618 - https://github.com/reph0r/poc-exp CVE-2019-2618 - https://github.com/reph0r/poc-exp-tools @@ -70904,6 +71251,7 @@ CVE-2019-2684 - https://github.com/Live-Hack-CVE/CVE-2019-2684 CVE-2019-2684 - https://github.com/Live-Hack-CVE/CVE-2020-13946 CVE-2019-2684 - https://github.com/psifertex/ctf-vs-the-real-world CVE-2019-2684 - https://github.com/qtc-de/remote-method-guesser +CVE-2019-2684 - https://github.com/versio-io/product-lifecycle-security-api CVE-2019-2692 - https://github.com/ARPSyndicate/cvemon CVE-2019-2692 - https://github.com/hinat0y/Dataset1 CVE-2019-2692 - https://github.com/hinat0y/Dataset10 @@ -71158,6 +71506,7 @@ CVE-2019-2729 - https://github.com/pizza-power/weblogic-CVE-2019-2729-POC CVE-2019-2729 - https://github.com/pwnagelabs/VEF CVE-2019-2729 - https://github.com/qi4L/WeblogicScan.go CVE-2019-2729 - https://github.com/qianxiao996/FrameScan +CVE-2019-2729 - https://github.com/qtgavc/list CVE-2019-2729 - https://github.com/rabbitmask/WeblogicScan CVE-2019-2729 - https://github.com/rabbitmask/WeblogicScanLot CVE-2019-2729 - https://github.com/rockmelodies/rocComExpRce @@ -72447,6 +72796,7 @@ CVE-2019-5844 - https://github.com/Live-Hack-CVE/CVE-2019-5844 CVE-2019-5845 - https://github.com/Live-Hack-CVE/CVE-2019-5845 CVE-2019-5846 - https://github.com/Live-Hack-CVE/CVE-2019-5846 CVE-2019-5847 - https://github.com/RUB-SysSec/JIT-Picker +CVE-2019-5847 - https://github.com/ch1hyun/fuzzing-class CVE-2019-5847 - https://github.com/googleprojectzero/fuzzilli CVE-2019-5847 - https://github.com/zhangjiahui-buaa/MasterThesis CVE-2019-5850 - https://github.com/allpaca/chrome-sbx-db @@ -72736,6 +73086,7 @@ CVE-2019-6340 - https://github.com/nobodyatall648/CVE-2019-6340 CVE-2019-6340 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2019-6340 - https://github.com/opflep/Drupalgeddon-Toolkit CVE-2019-6340 - https://github.com/oways/CVE-2019-6340 +CVE-2019-6340 - https://github.com/pg001001/deception-tech CVE-2019-6340 - https://github.com/pinkieli/GitHub-Chinese-Top-Charts CVE-2019-6340 - https://github.com/qingyuanfeiniao/Chinese-Top-Charts CVE-2019-6340 - https://github.com/resistezauxhackeurs/outils_audit_cms @@ -73321,6 +73672,7 @@ CVE-2019-7308 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2019-7308 - https://github.com/knd06/linux-kernel-exploitation CVE-2019-7308 - https://github.com/ndk191/linux-kernel-exploitation CVE-2019-7308 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2019-7308 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2019-7308 - https://github.com/xairy/linux-kernel-exploitation CVE-2019-7309 - https://github.com/flyrev/security-scan-ci-presentation CVE-2019-7310 - https://github.com/0xCyberY/CVE-T4PDF @@ -74459,6 +74811,7 @@ CVE-2019-9213 - https://github.com/qazbnm456/awesome-cve-poc CVE-2019-9213 - https://github.com/shizhongpwn/Skr_StudyEveryday CVE-2019-9213 - https://github.com/soh0ro0t/HappyHackingOnLinux CVE-2019-9213 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2019-9213 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2019-9213 - https://github.com/xairy/linux-kernel-exploitation CVE-2019-9213 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 CVE-2019-9215 - https://github.com/0n3m4ns4rmy/WhatTheBug @@ -74524,6 +74877,7 @@ CVE-2019-9500 - https://github.com/lnick2023/nicenice CVE-2019-9500 - https://github.com/ndk191/linux-kernel-exploitation CVE-2019-9500 - https://github.com/qazbnm456/awesome-cve-poc CVE-2019-9500 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2019-9500 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2019-9500 - https://github.com/xairy/linux-kernel-exploitation CVE-2019-9500 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 CVE-2019-9501 - https://github.com/0xT11/CVE-POC @@ -74556,6 +74910,7 @@ CVE-2019-9503 - https://github.com/lnick2023/nicenice CVE-2019-9503 - https://github.com/ndk191/linux-kernel-exploitation CVE-2019-9503 - https://github.com/qazbnm456/awesome-cve-poc CVE-2019-9503 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2019-9503 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2019-9503 - https://github.com/xairy/linux-kernel-exploitation CVE-2019-9503 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 CVE-2019-9506 - https://github.com/0xT11/CVE-POC @@ -75041,6 +75396,7 @@ CVE-2020-0018 - https://github.com/he1m4n6a/cve-db CVE-2020-0019 - https://github.com/TinyNiko/android_bulletin_notes CVE-2020-0022 - https://github.com/0xT11/CVE-POC CVE-2020-0022 - https://github.com/2lambda123/CVE-mitre +CVE-2020-0022 - https://github.com/362902755/CVE-2020-0023 CVE-2020-0022 - https://github.com/5k1l/cve-2020-0022 CVE-2020-0022 - https://github.com/ARPSyndicate/cvemon CVE-2020-0022 - https://github.com/JeffroMF/awesome-bluetooth-security321 @@ -75069,6 +75425,7 @@ CVE-2020-0022 - https://github.com/themmokhtar/CVE-2020-0022 CVE-2020-0022 - https://github.com/trhacknon/Pocingit CVE-2020-0022 - https://github.com/wrlu/Vulnerabilities CVE-2020-0022 - https://github.com/zecool/cve +CVE-2020-0023 - https://github.com/362902755/CVE-2020-0023 CVE-2020-0026 - https://github.com/he1m4n6a/cve-db CVE-2020-0027 - https://github.com/he1m4n6a/cve-db CVE-2020-0032 - https://github.com/he1m4n6a/cve-db @@ -75079,6 +75436,7 @@ CVE-2020-0036 - https://github.com/he1m4n6a/cve-db CVE-2020-0037 - https://github.com/he1m4n6a/cve-db CVE-2020-0038 - https://github.com/he1m4n6a/cve-db CVE-2020-0039 - https://github.com/he1m4n6a/cve-db +CVE-2020-0041 - https://github.com/0xMarcio/cve CVE-2020-0041 - https://github.com/0xT11/CVE-POC CVE-2020-0041 - https://github.com/0xZipp0/BIBLE CVE-2020-0041 - https://github.com/ARPSyndicate/cvemon @@ -75142,6 +75500,7 @@ CVE-2020-0041 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2020-0041 - https://github.com/trhacknon/Pocingit CVE-2020-0041 - https://github.com/vaginessa/CVE-2020-0041-Pixel-3a CVE-2020-0041 - https://github.com/weeka10/-hktalent-TOP +CVE-2020-0041 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2020-0041 - https://github.com/xairy/linux-kernel-exploitation CVE-2020-0041 - https://github.com/yeyintminthuhtut/Awesome-Advanced-Windows-Exploitation-References CVE-2020-0041 - https://github.com/yusufazizmustofa/BIBLE @@ -75419,6 +75778,7 @@ CVE-2020-0423 - https://github.com/knd06/linux-kernel-exploitation CVE-2020-0423 - https://github.com/ndk191/linux-kernel-exploitation CVE-2020-0423 - https://github.com/sparrow-labz/CVE-2020-0423 CVE-2020-0423 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2020-0423 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2020-0423 - https://github.com/xairy/linux-kernel-exploitation CVE-2020-0424 - https://github.com/TinyNiko/android_bulletin_notes CVE-2020-0427 - https://github.com/ARPSyndicate/cvemon @@ -77325,6 +77685,7 @@ CVE-2020-10135 - https://github.com/WinMin/Protocol-Vul CVE-2020-10135 - https://github.com/developer3000S/PoC-in-GitHub CVE-2020-10135 - https://github.com/engn33r/awesome-bluetooth-security CVE-2020-10135 - https://github.com/hectorgie/PoC-in-GitHub +CVE-2020-10135 - https://github.com/m4rm0k/CVE-2020-10135-BIAS CVE-2020-10135 - https://github.com/marcinguy/CVE-2020-10135-BIAS CVE-2020-10135 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2020-10135 - https://github.com/sgxgsx/BlueToolkit @@ -78288,6 +78649,7 @@ CVE-2020-10682 - https://github.com/JoshuaProvoste/joshuaprovoste CVE-2020-10683 - https://github.com/ARPSyndicate/cvemon CVE-2020-10683 - https://github.com/Anonymous-Phunter/PHunter CVE-2020-10683 - https://github.com/CGCL-codes/PHunter +CVE-2020-10683 - https://github.com/LibHunter/LibHunter CVE-2020-10683 - https://github.com/OWASP/www-project-ide-vulscanner CVE-2020-10684 - https://github.com/ARPSyndicate/cvemon CVE-2020-10684 - https://github.com/Live-Hack-CVE/CVE-2020-10684 @@ -78921,6 +79283,7 @@ CVE-2020-11179 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2020-11179 - https://github.com/knd06/linux-kernel-exploitation CVE-2020-11179 - https://github.com/ndk191/linux-kernel-exploitation CVE-2020-11179 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2020-11179 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2020-11179 - https://github.com/xairy/linux-kernel-exploitation CVE-2020-11180 - https://github.com/TinyNiko/android_bulletin_notes CVE-2020-11181 - https://github.com/TinyNiko/android_bulletin_notes @@ -79772,6 +80135,7 @@ CVE-2020-11996 - https://github.com/hectorgie/PoC-in-GitHub CVE-2020-11996 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2020-11996 - https://github.com/rusakovichma/tomcat-embed-core-9.0.31-CVE-2020-11996 CVE-2020-11996 - https://github.com/soosmile/POC +CVE-2020-11996 - https://github.com/versio-io/product-lifecycle-security-api CVE-2020-11996 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough CVE-2020-11998 - https://github.com/404notf0und/CVE-Flow CVE-2020-11998 - https://github.com/zhzhdoai/JAVA_Env-Poc @@ -79860,6 +80224,7 @@ CVE-2020-12078 - https://github.com/tdtc7/qps CVE-2020-12079 - https://github.com/Live-Hack-CVE/CVE-2020-12079 CVE-2020-1208 - https://github.com/ARPSyndicate/cvemon CVE-2020-1208 - https://github.com/ferdinandmudjialim/metasploit-cve-search +CVE-2020-1208 - https://github.com/tunnelcat/metasploit-cve-search CVE-2020-1210 - https://github.com/404notf0und/CVE-Flow CVE-2020-1210 - https://github.com/Cheroxx/Patch-Tuesday-Updates CVE-2020-12100 - https://github.com/Live-Hack-CVE/CVE-2020-12100 @@ -79967,11 +80332,14 @@ CVE-2020-1234 - https://github.com/influxdata/sedg CVE-2020-1234 - https://github.com/ivanid22/NVD-scraper CVE-2020-1234 - https://github.com/strobes-co/ql-documentation CVE-2020-1234 - https://github.com/tahtaciburak/CyAnnuaire +CVE-2020-1234 - https://github.com/tunnelcat/metasploit-cve-search CVE-2020-12340 - https://github.com/ARPSyndicate/cvemon CVE-2020-12340 - https://github.com/ferdinandmudjialim/metasploit-cve-search +CVE-2020-12340 - https://github.com/tunnelcat/metasploit-cve-search CVE-2020-1234567 - https://github.com/DataSurgeon-ds/ds-cve-plugin CVE-2020-1234567 - https://github.com/seifrajhi/aws-devops-pro-notes CVE-2020-123477 - https://github.com/ferdinandmudjialim/metasploit-cve-search +CVE-2020-123477 - https://github.com/tunnelcat/metasploit-cve-search CVE-2020-12351 - https://github.com/ARPSyndicate/cvemon CVE-2020-12351 - https://github.com/Charmve/BLE-Security-Attack-Defence CVE-2020-12351 - https://github.com/Dikens88/hopp @@ -80001,6 +80369,7 @@ CVE-2020-12351 - https://github.com/sgxgsx/BlueToolkit CVE-2020-12351 - https://github.com/shannonmullins/hopp CVE-2020-12351 - https://github.com/soosmile/POC CVE-2020-12351 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2020-12351 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2020-12351 - https://github.com/xairy/linux-kernel-exploitation CVE-2020-12352 - https://github.com/ARPSyndicate/cvemon CVE-2020-12352 - https://github.com/Charmve/BLE-Security-Attack-Defence @@ -80026,6 +80395,7 @@ CVE-2020-12352 - https://github.com/ndk191/linux-kernel-exploitation CVE-2020-12352 - https://github.com/sgxgsx/BlueToolkit CVE-2020-12352 - https://github.com/shannonmullins/hopp CVE-2020-12352 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2020-12352 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2020-12352 - https://github.com/xairy/linux-kernel-exploitation CVE-2020-12362 - https://github.com/ARPSyndicate/cvemon CVE-2020-12363 - https://github.com/ARPSyndicate/cvemon @@ -80360,6 +80730,7 @@ CVE-2020-12865 - https://github.com/Live-Hack-CVE/CVE-2020-12865 CVE-2020-12866 - https://github.com/Live-Hack-CVE/CVE-2020-12866 CVE-2020-12867 - https://github.com/Live-Hack-CVE/CVE-2020-12867 CVE-2020-12872 - https://github.com/Live-Hack-CVE/CVE-2020-12872 +CVE-2020-12872 - https://github.com/catsploit/catsploit CVE-2020-12873 - https://github.com/mbadanoiu/CVE-2023-49964 CVE-2020-12873 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2020-12882 - https://github.com/ARPSyndicate/cvemon @@ -80735,6 +81106,7 @@ CVE-2020-13493 - https://github.com/Live-Hack-CVE/CVE-2020-13493 CVE-2020-13494 - https://github.com/Live-Hack-CVE/CVE-2020-13494 CVE-2020-13497 - https://github.com/Live-Hack-CVE/CVE-2020-13497 CVE-2020-13498 - https://github.com/Live-Hack-CVE/CVE-2020-13498 +CVE-2020-1350 - https://github.com/0xMarcio/cve CVE-2020-1350 - https://github.com/0xT11/CVE-POC CVE-2020-1350 - https://github.com/20142995/sectool CVE-2020-1350 - https://github.com/2lambda123/diaphora @@ -80794,6 +81166,7 @@ CVE-2020-1350 - https://github.com/maxpl0it/CVE-2020-1350-DoS CVE-2020-1350 - https://github.com/mr-r3b00t/CVE-2020-1350 CVE-2020-1350 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2020-1350 - https://github.com/password520/Penetration_PoC +CVE-2020-1350 - https://github.com/pg001001/deception-tech CVE-2020-1350 - https://github.com/psc4re/NSE-scripts CVE-2020-1350 - https://github.com/rudraimmunefi/source-code-review CVE-2020-1350 - https://github.com/rudrapwn/source-code-review @@ -80983,6 +81356,7 @@ CVE-2020-13753 - https://github.com/ARPSyndicate/cvemon CVE-2020-13753 - https://github.com/hartwork/antijack CVE-2020-13757 - https://github.com/ARPSyndicate/cvemon CVE-2020-13757 - https://github.com/AdiRashkes/python-tda-bug-hunt-0 +CVE-2020-13757 - https://github.com/seal-community/patches CVE-2020-13759 - https://github.com/Artisan-Lab/Rust-memory-safety-bugs CVE-2020-1376 - https://github.com/404notf0und/CVE-Flow CVE-2020-13765 - https://github.com/Live-Hack-CVE/CVE-2020-13765 @@ -81159,8 +81533,10 @@ CVE-2020-13933 - https://github.com/soosmile/POC CVE-2020-13933 - https://github.com/superlink996/chunqiuyunjingbachang CVE-2020-13933 - https://github.com/woods-sega/woodswiki CVE-2020-13933 - https://github.com/xhycccc/Shiro-Vuln-Demo +CVE-2020-13934 - https://github.com/versio-io/product-lifecycle-security-api CVE-2020-13934 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough CVE-2020-13935 - https://github.com/0day404/vulnerability-poc +CVE-2020-13935 - https://github.com/0xMarcio/cve CVE-2020-13935 - https://github.com/20142995/sectool CVE-2020-13935 - https://github.com/2lambda123/CVE-mitre CVE-2020-13935 - https://github.com/404notf0und/CVE-Flow @@ -81193,6 +81569,7 @@ CVE-2020-13935 - https://github.com/taielab/awesome-hacking-lists CVE-2020-13935 - https://github.com/trganda/dockerv CVE-2020-13935 - https://github.com/trganda/starrlist CVE-2020-13935 - https://github.com/tzwlhack/Vulnerability +CVE-2020-13935 - https://github.com/versio-io/product-lifecycle-security-api CVE-2020-13935 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough CVE-2020-13935 - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC- CVE-2020-13935 - https://github.com/xuetusummer/Penetration_Testing_POC @@ -81248,6 +81625,7 @@ CVE-2020-1394 - https://github.com/hyjun0407/COMRaceConditionSeeker CVE-2020-13942 - https://github.com/1135/unomi_exploit CVE-2020-13942 - https://github.com/ARPSyndicate/cvemon CVE-2020-13942 - https://github.com/ARPSyndicate/kenzer-templates +CVE-2020-13942 - https://github.com/CLincat/vulcat CVE-2020-13942 - https://github.com/EdgeSecurityTeam/Vulnerability CVE-2020-13942 - https://github.com/Elsfa7-110/kenzer-templates CVE-2020-13942 - https://github.com/HimmelAward/Goby_POC @@ -81284,6 +81662,7 @@ CVE-2020-13942 - https://github.com/yaunsky/Unomi-CVE-2020-13942 CVE-2020-13942 - https://github.com/zhzyker/vulmap CVE-2020-13943 - https://github.com/ARPSyndicate/cvemon CVE-2020-13943 - https://github.com/Live-Hack-CVE/CVE-2020-13943 +CVE-2020-13943 - https://github.com/versio-io/product-lifecycle-security-api CVE-2020-13943 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough CVE-2020-13945 - https://github.com/ARPSyndicate/cvemon CVE-2020-13945 - https://github.com/ARPSyndicate/kenzer-templates @@ -81794,6 +82173,7 @@ CVE-2020-14356 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2020-14356 - https://github.com/knd06/linux-kernel-exploitation CVE-2020-14356 - https://github.com/ndk191/linux-kernel-exploitation CVE-2020-14356 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2020-14356 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2020-14356 - https://github.com/xairy/linux-kernel-exploitation CVE-2020-14361 - https://github.com/Live-Hack-CVE/CVE-2020-14361 CVE-2020-14362 - https://github.com/Live-Hack-CVE/CVE-2020-14362 @@ -81871,6 +82251,7 @@ CVE-2020-14381 - https://github.com/nanopathi/linux-4.19.72_CVE-2020-14381 CVE-2020-14381 - https://github.com/ndk191/linux-kernel-exploitation CVE-2020-14381 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2020-14381 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2020-14381 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2020-14381 - https://github.com/xairy/linux-kernel-exploitation CVE-2020-14383 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2020-14384 - https://github.com/404notf0und/CVE-Flow @@ -81911,6 +82292,7 @@ CVE-2020-14386 - https://github.com/source-xu/docker-vuls CVE-2020-14386 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2020-14386 - https://github.com/taielab/awesome-hacking-lists CVE-2020-14386 - https://github.com/teamssix/container-escape-check +CVE-2020-14386 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2020-14386 - https://github.com/xairy/linux-kernel-exploitation CVE-2020-14389 - https://github.com/Live-Hack-CVE/CVE-2020-14389 CVE-2020-14390 - https://github.com/ZIllR0/Routers @@ -82708,6 +83090,7 @@ CVE-2020-14882 - https://github.com/Singhsanjeev617/A-Red-Teamer-diaries CVE-2020-14882 - https://github.com/SouthWind0/southwind0.github.io CVE-2020-14882 - https://github.com/Threekiii/Awesome-Exploit CVE-2020-14882 - https://github.com/Threekiii/Awesome-POC +CVE-2020-14882 - https://github.com/Threekiii/Awesome-Redteam CVE-2020-14882 - https://github.com/Threekiii/Vulhub-Reproduce CVE-2020-14882 - https://github.com/Umarovm/-Patched-McMaster-University-Blind-Command-Injection CVE-2020-14882 - https://github.com/Weik1/Artillery @@ -83849,6 +84232,7 @@ CVE-2020-16119 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2020-16119 - https://github.com/knd06/linux-kernel-exploitation CVE-2020-16119 - https://github.com/ndk191/linux-kernel-exploitation CVE-2020-16119 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2020-16119 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2020-16119 - https://github.com/xairy/linux-kernel-exploitation CVE-2020-1612 - https://github.com/zev3n/Ubuntu-Gnome-privilege-escalation CVE-2020-16122 - https://github.com/Live-Hack-CVE/CVE-2020-16122 @@ -84791,6 +85175,7 @@ CVE-2020-17527 - https://github.com/forse01/CVE-2020-17527-Tomcat CVE-2020-17527 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2020-17527 - https://github.com/pctF/vulnerable-app CVE-2020-17527 - https://github.com/scordero1234/java_sec_demo-main +CVE-2020-17527 - https://github.com/versio-io/product-lifecycle-security-api CVE-2020-17527 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough CVE-2020-1753 - https://github.com/20142995/pocsuite3 CVE-2020-1753 - https://github.com/Live-Hack-CVE/CVE-2020-1753 @@ -85019,6 +85404,7 @@ CVE-2020-1934 - https://github.com/vshaliii/Vegeta1-Vulhub-Walkthrough CVE-2020-1935 - https://github.com/mklmfane/betvictor CVE-2020-1935 - https://github.com/mo-xiaoxi/HDiff CVE-2020-1935 - https://github.com/raner/projo +CVE-2020-1935 - https://github.com/versio-io/product-lifecycle-security-api CVE-2020-1935 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough CVE-2020-19360 - https://github.com/0day404/vulnerability-poc CVE-2020-19360 - https://github.com/20142995/Goby @@ -85219,6 +85605,7 @@ CVE-2020-1938 - https://github.com/threedr3am/learnjavabug CVE-2020-1938 - https://github.com/tpt11fb/AttackTomcat CVE-2020-1938 - https://github.com/uuuuuuuzi/BugRepairsuggestions CVE-2020-1938 - https://github.com/veo/vscan +CVE-2020-1938 - https://github.com/versio-io/product-lifecycle-security-api CVE-2020-1938 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough CVE-2020-1938 - https://github.com/w4fz5uck5/CVE-2020-1938-Clean-Version CVE-2020-1938 - https://github.com/weeka10/-hktalent-TOP @@ -85720,6 +86107,7 @@ CVE-2020-21534 - https://github.com/ARPSyndicate/cvemon CVE-2020-21535 - https://github.com/Live-Hack-CVE/CVE-2020-21535 CVE-2020-21551 - https://github.com/Creamy-Chicken-Soup/writeups-about-analysis-CVEs-and-Exploits-on-the-Windows CVE-2020-21551 - https://github.com/SpikySabra/Kernel-Cactus +CVE-2020-21551 - https://github.com/TheMalwareGuardian/Awesome-Bootkits-Rootkits-Development CVE-2020-21585 - https://github.com/EdgeSecurityTeam/Vulnerability CVE-2020-21585 - https://github.com/tzwlhack/Vulnerability CVE-2020-2159 - https://github.com/Live-Hack-CVE/CVE-2020-2159 @@ -86247,6 +86635,7 @@ CVE-2020-24490 - https://github.com/sereok3/buffer-overflow-writeups CVE-2020-24490 - https://github.com/sgxgsx/BlueToolkit CVE-2020-24490 - https://github.com/shannonmullins/hopp CVE-2020-24490 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2020-24490 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2020-24490 - https://github.com/xairy/linux-kernel-exploitation CVE-2020-24492 - https://github.com/DNTYO/F5_Vulnerability CVE-2020-24493 - https://github.com/DNTYO/F5_Vulnerability @@ -86793,6 +87182,7 @@ CVE-2020-25220 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2020-25220 - https://github.com/knd06/linux-kernel-exploitation CVE-2020-25220 - https://github.com/ndk191/linux-kernel-exploitation CVE-2020-25220 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2020-25220 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2020-25220 - https://github.com/xairy/linux-kernel-exploitation CVE-2020-25221 - https://github.com/404notf0und/CVE-Flow CVE-2020-25221 - https://github.com/ARPSyndicate/cvemon @@ -87210,6 +87600,7 @@ CVE-2020-25540 - https://github.com/superlink996/chunqiuyunjingbachang CVE-2020-25540 - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC- CVE-2020-25540 - https://github.com/xuetusummer/Penetration_Testing_POC CVE-2020-2555 - https://github.com/0x727/JNDIExploit +CVE-2020-2555 - https://github.com/0xMarcio/cve CVE-2020-2555 - https://github.com/0xT11/CVE-POC CVE-2020-2555 - https://github.com/0xn0ne/weblogicScanner CVE-2020-2555 - https://github.com/20142995/Goby @@ -87480,6 +87871,7 @@ CVE-2020-25657 - https://github.com/ARPSyndicate/cvemon CVE-2020-25657 - https://github.com/alexcowperthwaite/PasskeyScanner CVE-2020-25658 - https://github.com/ARPSyndicate/cvemon CVE-2020-25658 - https://github.com/AdiRashkes/python-tda-bug-hunt-0 +CVE-2020-25658 - https://github.com/seal-community/patches CVE-2020-25659 - https://github.com/ARPSyndicate/cvemon CVE-2020-25659 - https://github.com/AdiRashkes/python-tda-bug-hunt-2 CVE-2020-25659 - https://github.com/alexcowperthwaite/PasskeyScanner @@ -88091,6 +88483,7 @@ CVE-2020-26939 - https://github.com/ARPSyndicate/cvemon CVE-2020-26939 - https://github.com/Anonymous-Phunter/PHunter CVE-2020-26939 - https://github.com/CGCL-codes/PHunter CVE-2020-26939 - https://github.com/IkerSaint/VULNAPP-vulnerable-app +CVE-2020-26939 - https://github.com/LibHunter/LibHunter CVE-2020-26939 - https://github.com/box/box-java-sdk CVE-2020-26939 - https://github.com/pctF/vulnerable-app CVE-2020-2694 - https://github.com/20142995/Goby @@ -88167,6 +88560,7 @@ CVE-2020-27193 - https://github.com/deepakdba/cve_checklist CVE-2020-27193 - https://github.com/radtek/cve_checklist CVE-2020-27194 - https://github.com/ARPSyndicate/cvemon CVE-2020-27194 - https://github.com/Al1ex/LinuxEelvation +CVE-2020-27194 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2020-27194 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2020-27194 - https://github.com/OrangeGzY/security-research-learning CVE-2020-27194 - https://github.com/XiaozaYa/CVE-Recording @@ -88189,6 +88583,7 @@ CVE-2020-27194 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2020-27194 - https://github.com/scannells/exploits CVE-2020-27194 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2020-27194 - https://github.com/willinin/CVE-2020-27194-exp +CVE-2020-27194 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2020-27194 - https://github.com/xairy/linux-kernel-exploitation CVE-2020-27194 - https://github.com/xmzyshypnc/CVE-2020-27194 CVE-2020-27199 - https://github.com/9lyph/CVE-2020-27199 @@ -88444,6 +88839,7 @@ CVE-2020-27786 - https://github.com/kiks7/CVE-2020-27786-Kernel-Exploit CVE-2020-27786 - https://github.com/knd06/linux-kernel-exploitation CVE-2020-27786 - https://github.com/ndk191/linux-kernel-exploitation CVE-2020-27786 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2020-27786 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2020-27786 - https://github.com/xairy/linux-kernel-exploitation CVE-2020-27787 - https://github.com/Live-Hack-CVE/CVE-2020-27787 CVE-2020-27788 - https://github.com/Live-Hack-CVE/CVE-2020-27788 @@ -88783,6 +89179,7 @@ CVE-2020-2805 - https://github.com/alphaSeclab/sec-daily-2020 CVE-2020-28052 - https://github.com/ARPSyndicate/cvemon CVE-2020-28052 - https://github.com/Anonymous-Phunter/PHunter CVE-2020-28052 - https://github.com/CGCL-codes/PHunter +CVE-2020-28052 - https://github.com/LibHunter/LibHunter CVE-2020-28052 - https://github.com/Live-Hack-CVE/CVE-2020-2805 CVE-2020-28052 - https://github.com/Live-Hack-CVE/CVE-2020-28052 CVE-2020-28052 - https://github.com/alphaSeclab/sec-daily-2020 @@ -88910,6 +89307,7 @@ CVE-2020-28343 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2020-28343 - https://github.com/knd06/linux-kernel-exploitation CVE-2020-28343 - https://github.com/ndk191/linux-kernel-exploitation CVE-2020-28343 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2020-28343 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2020-28343 - https://github.com/xairy/linux-kernel-exploitation CVE-2020-28347 - https://github.com/ARPSyndicate/cvemon CVE-2020-28347 - https://github.com/rdomanski/Exploits_and_Advisories @@ -89043,6 +89441,7 @@ CVE-2020-28588 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2020-28588 - https://github.com/knd06/linux-kernel-exploitation CVE-2020-28588 - https://github.com/ndk191/linux-kernel-exploitation CVE-2020-28588 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2020-28588 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2020-28588 - https://github.com/xairy/linux-kernel-exploitation CVE-2020-28589 - https://github.com/Live-Hack-CVE/CVE-2020-28589 CVE-2020-28590 - https://github.com/Live-Hack-CVE/CVE-2020-28590 @@ -89171,6 +89570,7 @@ CVE-2020-2880 - https://github.com/MrTuxracer/advisories CVE-2020-2881 - https://github.com/ARPSyndicate/cvemon CVE-2020-2881 - https://github.com/MrTuxracer/advisories CVE-2020-2883 - https://github.com/0x727/JNDIExploit +CVE-2020-2883 - https://github.com/0xMarcio/cve CVE-2020-2883 - https://github.com/0xT11/CVE-POC CVE-2020-2883 - https://github.com/0xdu/WLExploit CVE-2020-2883 - https://github.com/0xn0ne/weblogicScanner @@ -89934,6 +90334,7 @@ CVE-2020-3452 - https://github.com/drizzt-do-urden-da-drow/CISCO CVE-2020-3452 - https://github.com/dwisiswant0/awesome-oneliner-bugbounty CVE-2020-3452 - https://github.com/faisalfs10x/Cisco-CVE-2020-3452-shodan-scanner CVE-2020-3452 - https://github.com/faisalfs10x/dirty-scripts +CVE-2020-3452 - https://github.com/fierceoj/ShonyDanza CVE-2020-3452 - https://github.com/foulenzer/CVE-2020-3452 CVE-2020-3452 - https://github.com/fuzzlove/Cisco-ASA-FTD-Web-Services-Traversal CVE-2020-3452 - https://github.com/grim3/CVE-2020-3452 @@ -90576,6 +90977,7 @@ CVE-2020-36180 - https://github.com/ARPSyndicate/cvemon CVE-2020-36180 - https://github.com/Al1ex/Al1ex CVE-2020-36180 - https://github.com/Al1ex/CVE-2020-36179 CVE-2020-36180 - https://github.com/Live-Hack-CVE/CVE-2020-36180 +CVE-2020-36180 - https://github.com/enomothem/PenTestNote CVE-2020-36180 - https://github.com/seal-community/patches CVE-2020-36181 - https://github.com/Al1ex/Al1ex CVE-2020-36181 - https://github.com/Al1ex/CVE-2020-36179 @@ -90586,6 +90988,7 @@ CVE-2020-36182 - https://github.com/Al1ex/Al1ex CVE-2020-36182 - https://github.com/Al1ex/CVE-2020-36179 CVE-2020-36182 - https://github.com/Anonymous-Phunter/PHunter CVE-2020-36182 - https://github.com/CGCL-codes/PHunter +CVE-2020-36182 - https://github.com/LibHunter/LibHunter CVE-2020-36182 - https://github.com/Live-Hack-CVE/CVE-2020-36182 CVE-2020-36182 - https://github.com/seal-community/patches CVE-2020-36183 - https://github.com/Live-Hack-CVE/CVE-2020-36183 @@ -90917,6 +91320,7 @@ CVE-2020-3680 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2020-3680 - https://github.com/knd06/linux-kernel-exploitation CVE-2020-3680 - https://github.com/ndk191/linux-kernel-exploitation CVE-2020-3680 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2020-3680 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2020-3680 - https://github.com/xairy/linux-kernel-exploitation CVE-2020-36825 - https://github.com/NaInSec/CVE-LIST CVE-2020-36825 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -91010,6 +91414,7 @@ CVE-2020-3950 - https://github.com/lnick2023/nicenice CVE-2020-3950 - https://github.com/mirchr/security-research CVE-2020-3950 - https://github.com/qazbnm456/awesome-cve-poc CVE-2020-3950 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 +CVE-2020-3952 - https://github.com/0xMarcio/cve CVE-2020-3952 - https://github.com/0xMrNiko/Awesome-Red-Teaming CVE-2020-3952 - https://github.com/0xT11/CVE-POC CVE-2020-3952 - https://github.com/20142995/sectool @@ -91925,6 +92330,7 @@ CVE-2020-5902 - https://github.com/elinakrmova/RedTeam-Tools CVE-2020-5902 - https://github.com/emtee40/win-pentest-tools CVE-2020-5902 - https://github.com/f5devcentral/cve-2020-5902-ioc-bigip-checker CVE-2020-5902 - https://github.com/faisalfs10x/F5-BIG-IP-CVE-2020-5902-shodan-scanner +CVE-2020-5902 - https://github.com/fierceoj/ShonyDanza CVE-2020-5902 - https://github.com/freeFV/CVE-2020-5902-fofa-scan CVE-2020-5902 - https://github.com/freeFV/CVE-2020-6308-mass-exploiter CVE-2020-5902 - https://github.com/gaahrdner/starred @@ -92392,6 +92798,7 @@ CVE-2020-6425 - https://github.com/Live-Hack-CVE/CVE-2020-6425 CVE-2020-6425 - https://github.com/allpaca/chrome-sbx-db CVE-2020-6427 - https://github.com/ARPSyndicate/cvemon CVE-2020-6427 - https://github.com/ferdinandmudjialim/metasploit-cve-search +CVE-2020-6427 - https://github.com/tunnelcat/metasploit-cve-search CVE-2020-6431 - https://github.com/Live-Hack-CVE/CVE-2020-6431 CVE-2020-6432 - https://github.com/Live-Hack-CVE/CVE-2020-6432 CVE-2020-6433 - https://github.com/Live-Hack-CVE/CVE-2020-6433 @@ -93395,6 +93802,7 @@ CVE-2020-8012 - https://github.com/wetw0rk/Exploit-Development CVE-2020-8013 - https://github.com/Live-Hack-CVE/CVE-2020-8013 CVE-2020-8016 - https://github.com/Live-Hack-CVE/CVE-2020-8016 CVE-2020-8017 - https://github.com/Live-Hack-CVE/CVE-2020-8017 +CVE-2020-8022 - https://github.com/versio-io/product-lifecycle-security-api CVE-2020-8022 - https://github.com/vincent-deng/veracode-container-security-finding-parser CVE-2020-8023 - https://github.com/404notf0und/CVE-Flow CVE-2020-8023 - https://github.com/ARPSyndicate/cvemon @@ -93430,6 +93838,7 @@ CVE-2020-8116 - https://github.com/AleBekk/DependencyCheckParser CVE-2020-8116 - https://github.com/ossf-cve-benchmark/CVE-2020-8116 CVE-2020-8124 - https://github.com/seal-community/patches CVE-2020-8130 - https://github.com/ARPSyndicate/cvemon +CVE-2020-8130 - https://github.com/m-mizutani/octovy CVE-2020-8130 - https://github.com/m-mizutani/triview CVE-2020-8130 - https://github.com/wxianfeng/hanzi_to_pinyin CVE-2020-8135 - https://github.com/ossf-cve-benchmark/CVE-2020-8135 @@ -94109,6 +94518,7 @@ CVE-2020-8597 - https://github.com/WinMin/Protocol-Vul CVE-2020-8597 - https://github.com/YIXINSHUWU/Penetration_Testing_POC CVE-2020-8597 - https://github.com/ZTK-009/Penetration_PoC CVE-2020-8597 - https://github.com/developer3000S/PoC-in-GitHub +CVE-2020-8597 - https://github.com/dointisme/CVE-2020-8597 CVE-2020-8597 - https://github.com/hasee2018/Penetration_Testing_POC CVE-2020-8597 - https://github.com/hectorgie/PoC-in-GitHub CVE-2020-8597 - https://github.com/hktalent/bug-bounty @@ -94426,6 +94836,7 @@ CVE-2020-8835 - https://github.com/0xT11/CVE-POC CVE-2020-8835 - https://github.com/ARPSyndicate/cvemon CVE-2020-8835 - https://github.com/Al1ex/LinuxEelvation CVE-2020-8835 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp +CVE-2020-8835 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2020-8835 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2020-8835 - https://github.com/KatsuragiCSL/Presentations-Blogs-Papers-Tutorials-Books CVE-2020-8835 - https://github.com/OrangeGzY/security-research-learning @@ -94455,6 +94866,7 @@ CVE-2020-8835 - https://github.com/snappyJack/Rick_write_exp_CVE-2020-8835 CVE-2020-8835 - https://github.com/snorez/ebpf-fuzzer CVE-2020-8835 - https://github.com/soosmile/POC CVE-2020-8835 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2020-8835 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2020-8835 - https://github.com/xairy/linux-kernel-exploitation CVE-2020-8835 - https://github.com/xmzyshypnc/CVE-2020-27194 CVE-2020-8835 - https://github.com/yoniko/gctf21_ebpf @@ -94475,6 +94887,7 @@ CVE-2020-8840 - https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh CVE-2020-8840 - https://github.com/EchoGin404/- CVE-2020-8840 - https://github.com/EchoGin404/gongkaishouji CVE-2020-8840 - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet +CVE-2020-8840 - https://github.com/LibHunter/LibHunter CVE-2020-8840 - https://github.com/Mr-xn/Penetration_Testing_POC CVE-2020-8840 - https://github.com/NetW0rK1le3r/awesome-hacking-lists CVE-2020-8840 - https://github.com/OWASP/www-project-ide-vulscanner @@ -95122,6 +95535,7 @@ CVE-2020-9484 - https://github.com/soosmile/POC CVE-2020-9484 - https://github.com/taielab/awesome-hacking-lists CVE-2020-9484 - https://github.com/tdtc7/qps CVE-2020-9484 - https://github.com/threedr3am/tomcat-cluster-session-sync-exp +CVE-2020-9484 - https://github.com/versio-io/product-lifecycle-security-api CVE-2020-9484 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough CVE-2020-9484 - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC- CVE-2020-9484 - https://github.com/woods-sega/woodswiki @@ -95238,6 +95652,7 @@ CVE-2020-9546 - https://github.com/ARPSyndicate/cvemon CVE-2020-9546 - https://github.com/Anonymous-Phunter/PHunter CVE-2020-9546 - https://github.com/CGCL-codes/PHunter CVE-2020-9546 - https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh +CVE-2020-9546 - https://github.com/LibHunter/LibHunter CVE-2020-9546 - https://github.com/OWASP/www-project-ide-vulscanner CVE-2020-9546 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs CVE-2020-9546 - https://github.com/lnick2023/nicenice @@ -95908,6 +96323,7 @@ CVE-2021-0340 - https://github.com/zecool/cve CVE-2021-0341 - https://github.com/ARPSyndicate/cvemon CVE-2021-0341 - https://github.com/Anonymous-Phunter/PHunter CVE-2021-0341 - https://github.com/CGCL-codes/PHunter +CVE-2021-0341 - https://github.com/LibHunter/LibHunter CVE-2021-0341 - https://github.com/NicheToolkit/rest-toolkit CVE-2021-0341 - https://github.com/TinyNiko/android_bulletin_notes CVE-2021-0341 - https://github.com/au-abd/python-stuff @@ -96017,6 +96433,7 @@ CVE-2021-0399 - https://github.com/ndk191/linux-kernel-exploitation CVE-2021-0399 - https://github.com/nipund513/Exploiting-UAF-by-Ret2bpf-in-Android-Kernel-CVE-2021-0399- CVE-2021-0399 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2021-0399 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2021-0399 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-0399 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-0404 - https://github.com/ARPSyndicate/cvemon CVE-2021-0404 - https://github.com/pokerfacett/MY_CVE_CREDIT @@ -96441,6 +96858,7 @@ CVE-2021-0920 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2021-0920 - https://github.com/knd06/linux-kernel-exploitation CVE-2021-0920 - https://github.com/ndk191/linux-kernel-exploitation CVE-2021-0920 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2021-0920 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-0920 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-0928 - https://github.com/ARPSyndicate/cvemon CVE-2021-0928 - https://github.com/NaInSec/CVE-PoC-in-GitHub @@ -96494,6 +96912,7 @@ CVE-2021-1048 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2021-1048 - https://github.com/knd06/linux-kernel-exploitation CVE-2021-1048 - https://github.com/ndk191/linux-kernel-exploitation CVE-2021-1048 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2021-1048 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-1048 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-1049 - https://github.com/ARPSyndicate/cvemon CVE-2021-1049 - https://github.com/pokerfacett/MY_CVE_CREDIT @@ -97266,6 +97685,7 @@ CVE-2021-1905 - https://github.com/soosmile/POC CVE-2021-1905 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2021-1905 - https://github.com/trhacknon/Pocingit CVE-2021-1905 - https://github.com/whoforget/CVE-POC +CVE-2021-1905 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-1905 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-1905 - https://github.com/youwizard/CVE-POC CVE-2021-1905 - https://github.com/zecool/cve @@ -97297,6 +97717,7 @@ CVE-2021-1940 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2021-1940 - https://github.com/knd06/linux-kernel-exploitation CVE-2021-1940 - https://github.com/ndk191/linux-kernel-exploitation CVE-2021-1940 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2021-1940 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-1940 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-1961 - https://github.com/ARPSyndicate/cvemon CVE-2021-1961 - https://github.com/NaInSec/CVE-PoC-in-GitHub @@ -97320,6 +97741,7 @@ CVE-2021-1961 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2021-1961 - https://github.com/tamirzb/CVE-2021-1961 CVE-2021-1961 - https://github.com/trhacknon/Pocingit CVE-2021-1961 - https://github.com/whoforget/CVE-POC +CVE-2021-1961 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-1961 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-1961 - https://github.com/youwizard/CVE-POC CVE-2021-1961 - https://github.com/zecool/cve @@ -97350,6 +97772,7 @@ CVE-2021-1968 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2021-1968 - https://github.com/knd06/linux-kernel-exploitation CVE-2021-1968 - https://github.com/ndk191/linux-kernel-exploitation CVE-2021-1968 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2021-1968 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-1968 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-1969 - https://github.com/ARPSyndicate/cvemon CVE-2021-1969 - https://github.com/kdn111/linux-kernel-exploitation @@ -97362,6 +97785,7 @@ CVE-2021-1969 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2021-1969 - https://github.com/knd06/linux-kernel-exploitation CVE-2021-1969 - https://github.com/ndk191/linux-kernel-exploitation CVE-2021-1969 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2021-1969 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-1969 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-1994 - https://github.com/ARPSyndicate/cvemon CVE-2021-1994 - https://github.com/CVEDB/PoC-List @@ -97382,6 +97806,7 @@ CVE-2021-20016 - https://github.com/Ostorlab/KEV CVE-2021-20016 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors CVE-2021-20016 - https://github.com/r0eXpeR/supplier CVE-2021-20016 - https://github.com/triw0lf/Security-Matters-22 +CVE-2021-20021 - https://github.com/CVEDB/awesome-cve-repo CVE-2021-20021 - https://github.com/Ostorlab/KEV CVE-2021-20021 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors CVE-2021-20021 - https://github.com/SUPRAAA-1337/CVE-2021-20021 @@ -97515,6 +97940,7 @@ CVE-2021-20167 - https://github.com/ARPSyndicate/kenzer-templates CVE-2021-20173 - https://github.com/ARPSyndicate/cvemon CVE-2021-20190 - https://github.com/Anonymous-Phunter/PHunter CVE-2021-20190 - https://github.com/CGCL-codes/PHunter +CVE-2021-20190 - https://github.com/LibHunter/LibHunter CVE-2021-20190 - https://github.com/seal-community/patches CVE-2021-20191 - https://github.com/ARPSyndicate/cvemon CVE-2021-20193 - https://github.com/ARPSyndicate/cvemon @@ -97580,6 +98006,7 @@ CVE-2021-20226 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2021-20226 - https://github.com/knd06/linux-kernel-exploitation CVE-2021-20226 - https://github.com/ndk191/linux-kernel-exploitation CVE-2021-20226 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2021-20226 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-20226 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-20227 - https://github.com/ARPSyndicate/cvemon CVE-2021-20228 - https://github.com/equinor/appsec-owasptop10wrkshp @@ -97882,6 +98309,7 @@ CVE-2021-2109 - https://github.com/Astrogeorgeonethree/Starred CVE-2021-2109 - https://github.com/Astrogeorgeonethree/Starred2 CVE-2021-2109 - https://github.com/Atem1988/Starred CVE-2021-2109 - https://github.com/BrittanyKuhn/javascript-tutorial +CVE-2021-2109 - https://github.com/CLincat/vulcat CVE-2021-2109 - https://github.com/CVEDB/PoC-List CVE-2021-2109 - https://github.com/Drun1baby/JavaSecurityLearning CVE-2021-2109 - https://github.com/EdgeSecurityTeam/Vulnerability @@ -98293,6 +98721,7 @@ CVE-2021-21315 - https://github.com/20142995/pocsuite3 CVE-2021-21315 - https://github.com/ARPSyndicate/cvemon CVE-2021-21315 - https://github.com/ARPSyndicate/kenzer-templates CVE-2021-21315 - https://github.com/CITIZENDOT/CS547-CVEs +CVE-2021-21315 - https://github.com/CLincat/vulcat CVE-2021-21315 - https://github.com/Elsfa7-110/kenzer-templates CVE-2021-21315 - https://github.com/FB-Sec/exploits CVE-2021-21315 - https://github.com/ForbiddenProgrammer/CVE-2021-21315-PoC @@ -98611,6 +99040,7 @@ CVE-2021-21551 - https://github.com/PwnAwan/EXP-401-OSEE CVE-2021-21551 - https://github.com/SYRTI/POC_to_review CVE-2021-21551 - https://github.com/SpikySabra/Kernel-Cactus CVE-2021-21551 - https://github.com/SyncroScripting/Artichoke_Consulting +CVE-2021-21551 - https://github.com/TheMalwareGuardian/Awesome-Bootkits-Rootkits-Development CVE-2021-21551 - https://github.com/WhooAmii/POC_to_review CVE-2021-21551 - https://github.com/alfarom256/MCP-PoC CVE-2021-21551 - https://github.com/anquanscan/sec-tools @@ -98809,6 +99239,7 @@ CVE-2021-21972 - https://github.com/Awrrays/FrameVul CVE-2021-21972 - https://github.com/B1anda0/CVE-2021-21972 CVE-2021-21972 - https://github.com/BugBlocker/lotus-scripts CVE-2021-21972 - https://github.com/ByZain/CVE-2021-21972 +CVE-2021-21972 - https://github.com/CLincat/vulcat CVE-2021-21972 - https://github.com/CVEDB/PoC-List CVE-2021-21972 - https://github.com/CVEDB/awesome-cve-repo CVE-2021-21972 - https://github.com/CVEDB/top @@ -99591,6 +100022,7 @@ CVE-2021-22204 - https://github.com/xhref/OSCP CVE-2021-22204 - https://github.com/youwizard/CVE-POC CVE-2021-22204 - https://github.com/zecool/cve CVE-2021-22205 - https://github.com/0x0021h/expbox +CVE-2021-22205 - https://github.com/0xMarcio/cve CVE-2021-22205 - https://github.com/0xget/cve-2001-1473 CVE-2021-22205 - https://github.com/0xn0ne/simple-scanner CVE-2021-22205 - https://github.com/20142995/Goby @@ -99630,6 +100062,7 @@ CVE-2021-22205 - https://github.com/Seals6/CVE-2021-22205 CVE-2021-22205 - https://github.com/SexyBeast233/SecBooks CVE-2021-22205 - https://github.com/Threekiii/Awesome-Exploit CVE-2021-22205 - https://github.com/Threekiii/Awesome-POC +CVE-2021-22205 - https://github.com/Threekiii/Awesome-Redteam CVE-2021-22205 - https://github.com/Threekiii/Vulhub-Reproduce CVE-2021-22205 - https://github.com/WhooAmii/POC_to_review CVE-2021-22205 - https://github.com/X1pe0/Automated-Gitlab-RCE @@ -99778,6 +100211,7 @@ CVE-2021-22555 - https://github.com/DrewSC13/Linpeas CVE-2021-22555 - https://github.com/EGI-Federation/SVG-advisories CVE-2021-22555 - https://github.com/Ha0-Y/LinuxKernelExploits CVE-2021-22555 - https://github.com/Ha0-Y/kernel-exploit-cve +CVE-2021-22555 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2021-22555 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2021-22555 - https://github.com/JoneyJunior/cve-2021-22555 CVE-2021-22555 - https://github.com/Metarget/awesome-cloud-native-security @@ -99842,6 +100276,7 @@ CVE-2021-22555 - https://github.com/veritas501/CVE-2021-22555-PipeVersion CVE-2021-22555 - https://github.com/veritas501/pipe-primitive CVE-2021-22555 - https://github.com/whoforget/CVE-POC CVE-2021-22555 - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC- +CVE-2021-22555 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-22555 - https://github.com/x90hack/vulnerabilty_lab CVE-2021-22555 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-22555 - https://github.com/xuetusummer/Penetration_Testing_POC @@ -100269,6 +100704,7 @@ CVE-2021-23134 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2021-23134 - https://github.com/knd06/linux-kernel-exploitation CVE-2021-23134 - https://github.com/ndk191/linux-kernel-exploitation CVE-2021-23134 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2021-23134 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-23134 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-23166 - https://github.com/ARPSyndicate/cvemon CVE-2021-23169 - https://github.com/ARPSyndicate/cvemon @@ -100712,6 +101148,7 @@ CVE-2021-24122 - https://github.com/SexyBeast233/SecBooks CVE-2021-24122 - https://github.com/Threekiii/Awesome-POC CVE-2021-24122 - https://github.com/d4n-sec/d4n-sec.github.io CVE-2021-24122 - https://github.com/mklmfane/betvictor +CVE-2021-24122 - https://github.com/versio-io/product-lifecycle-security-api CVE-2021-24122 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough CVE-2021-24139 - https://github.com/El-Palomo/EVM1 CVE-2021-2414 - https://github.com/20142995/sectool @@ -101300,6 +101737,7 @@ CVE-2021-25120 - https://github.com/ARPSyndicate/cvemon CVE-2021-25120 - https://github.com/ARPSyndicate/kenzer-templates CVE-2021-25122 - https://github.com/ARPSyndicate/cvemon CVE-2021-25122 - https://github.com/DNTYO/F5_Vulnerability +CVE-2021-25122 - https://github.com/versio-io/product-lifecycle-security-api CVE-2021-25122 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough CVE-2021-25155 - https://github.com/ARPSyndicate/cvemon CVE-2021-25162 - https://github.com/k0mi-tg/CVE-POC @@ -101430,6 +101868,7 @@ CVE-2021-25329 - https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh CVE-2021-25329 - https://github.com/Live-Hack-CVE/CVE-2021-25329 CVE-2021-25329 - https://github.com/mklmfane/betvictor CVE-2021-25329 - https://github.com/raner/projo +CVE-2021-25329 - https://github.com/versio-io/product-lifecycle-security-api CVE-2021-25329 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough CVE-2021-25337 - https://github.com/Ostorlab/KEV CVE-2021-25337 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors @@ -101446,6 +101885,7 @@ CVE-2021-25369 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2021-25369 - https://github.com/knd06/linux-kernel-exploitation CVE-2021-25369 - https://github.com/ndk191/linux-kernel-exploitation CVE-2021-25369 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2021-25369 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-25369 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-25370 - https://github.com/ARPSyndicate/cvemon CVE-2021-25370 - https://github.com/Ostorlab/KEV @@ -101460,6 +101900,7 @@ CVE-2021-25370 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2021-25370 - https://github.com/knd06/linux-kernel-exploitation CVE-2021-25370 - https://github.com/ndk191/linux-kernel-exploitation CVE-2021-25370 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2021-25370 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-25370 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-25371 - https://github.com/Ostorlab/KEV CVE-2021-25371 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors @@ -101560,6 +102001,7 @@ CVE-2021-25646 - https://github.com/Astrogeorgeonethree/Starred CVE-2021-25646 - https://github.com/Astrogeorgeonethree/Starred2 CVE-2021-25646 - https://github.com/Atem1988/Starred CVE-2021-25646 - https://github.com/Awrrays/FrameVul +CVE-2021-25646 - https://github.com/CLincat/vulcat CVE-2021-25646 - https://github.com/EdgeSecurityTeam/Vulnerability CVE-2021-25646 - https://github.com/Elsfa7-110/kenzer-templates CVE-2021-25646 - https://github.com/FDlucifer/firece-fish @@ -101816,6 +102258,7 @@ CVE-2021-2608 - https://github.com/20142995/Goby CVE-2021-2608 - https://github.com/ExpLangcn/FuYao-Go CVE-2021-26084 - https://github.com/0day404/vulnerability-poc CVE-2021-26084 - https://github.com/0x727/ShuiZe_0x727 +CVE-2021-26084 - https://github.com/0xMarcio/cve CVE-2021-26084 - https://github.com/0xMrNiko/Awesome-Red-Teaming CVE-2021-26084 - https://github.com/0xf4n9x/CVE-2021-26084 CVE-2021-26084 - https://github.com/0xsyr0/OSCP @@ -101908,6 +102351,7 @@ CVE-2021-26084 - https://github.com/dock0d1/CVE-2021-26084_Confluence CVE-2021-26084 - https://github.com/dorkerdevil/CVE-2021-26084 CVE-2021-26084 - https://github.com/elinakrmova/RedTeam-Tools CVE-2021-26084 - https://github.com/emtee40/win-pentest-tools +CVE-2021-26084 - https://github.com/enomothem/PenTestNote CVE-2021-26084 - https://github.com/fardeen-ahmed/Bug-bounty-Writeups CVE-2021-26084 - https://github.com/h3v0x/CVE-2021-26084_Confluence CVE-2021-26084 - https://github.com/hack-parthsharma/Pentest-Tools @@ -102002,6 +102446,7 @@ CVE-2021-26085 - https://github.com/d4n-sec/d4n-sec.github.io CVE-2021-26085 - https://github.com/e-hakson/OSCP CVE-2021-26085 - https://github.com/eljosep/OSCP-Guide CVE-2021-26085 - https://github.com/emadshanab/Some-BugBounty-Tips-from-my-Twitter-feed +CVE-2021-26085 - https://github.com/enomothem/PenTestNote CVE-2021-26085 - https://github.com/k0mi-tg/CVE-POC CVE-2021-26085 - https://github.com/kgwanjala/oscp-cheatsheet CVE-2021-26085 - https://github.com/manas3c/CVE-POC @@ -102229,6 +102674,7 @@ CVE-2021-26341 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2021-26341 - https://github.com/knd06/linux-kernel-exploitation CVE-2021-26341 - https://github.com/ndk191/linux-kernel-exploitation CVE-2021-26341 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2021-26341 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-26341 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-26401 - https://github.com/ARPSyndicate/cvemon CVE-2021-26411 - https://github.com/ARPSyndicate/cvemon @@ -102384,6 +102830,7 @@ CVE-2021-26708 - https://github.com/soosmile/POC CVE-2021-26708 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2021-26708 - https://github.com/trhacknon/Pocingit CVE-2021-26708 - https://github.com/whoforget/CVE-POC +CVE-2021-26708 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-26708 - https://github.com/x90hack/vulnerabilty_lab CVE-2021-26708 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-26708 - https://github.com/xuetusummer/Penetration_Testing_POC @@ -103446,6 +103893,7 @@ CVE-2021-27363 - https://github.com/knd06/linux-kernel-exploitation CVE-2021-27363 - https://github.com/ndk191/linux-kernel-exploitation CVE-2021-27363 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2021-27363 - https://github.com/teresaweber685/book_list +CVE-2021-27363 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-27363 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-27364 - https://github.com/ARPSyndicate/cvemon CVE-2021-27364 - https://github.com/aaronxie55/Presentation2_Markdown @@ -103463,9 +103911,11 @@ CVE-2021-27364 - https://github.com/knd06/linux-kernel-exploitation CVE-2021-27364 - https://github.com/ndk191/linux-kernel-exploitation CVE-2021-27364 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2021-27364 - https://github.com/teresaweber685/book_list +CVE-2021-27364 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-27364 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-27365 - https://github.com/ARPSyndicate/cvemon CVE-2021-27365 - https://github.com/EGI-Federation/SVG-advisories +CVE-2021-27365 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2021-27365 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2021-27365 - https://github.com/aaronxie55/Presentation2_Markdown CVE-2021-27365 - https://github.com/bollwarm/SecToolSet @@ -103484,6 +103934,7 @@ CVE-2021-27365 - https://github.com/knd06/linux-kernel-exploitation CVE-2021-27365 - https://github.com/ndk191/linux-kernel-exploitation CVE-2021-27365 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2021-27365 - https://github.com/teresaweber685/book_list +CVE-2021-27365 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-27365 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-27370 - https://github.com/ajmalabubakkr/CVE CVE-2021-27403 - https://github.com/ARPSyndicate/cvemon @@ -104239,6 +104690,7 @@ CVE-2021-28663 - https://github.com/soosmile/POC CVE-2021-28663 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2021-28663 - https://github.com/trhacknon/Pocingit CVE-2021-28663 - https://github.com/whoforget/CVE-POC +CVE-2021-28663 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-28663 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-28663 - https://github.com/youwizard/CVE-POC CVE-2021-28663 - https://github.com/zecool/cve @@ -104685,6 +105137,7 @@ CVE-2021-29657 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2021-29657 - https://github.com/knd06/linux-kernel-exploitation CVE-2021-29657 - https://github.com/ndk191/linux-kernel-exploitation CVE-2021-29657 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2021-29657 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-29657 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-29663 - https://github.com/cptsticky/A-0day-Per-Day-Keeps-The-Cope-Away CVE-2021-29752 - https://github.com/p1ay8y3ar/cve_monitor @@ -105198,6 +105651,7 @@ CVE-2021-3064 - https://github.com/Lazykakarot1/Learn-365 CVE-2021-3064 - https://github.com/PwnAwan/MindMaps2 CVE-2021-3064 - https://github.com/fardeen-ahmed/Bug-bounty-Writeups CVE-2021-3064 - https://github.com/harsh-bothra/learn365 +CVE-2021-30640 - https://github.com/versio-io/product-lifecycle-security-api CVE-2021-30641 - https://github.com/ARPSyndicate/cvemon CVE-2021-30641 - https://github.com/PierreChrd/py-projet-tut CVE-2021-30641 - https://github.com/Totes5706/TotesHTB @@ -105797,6 +106251,7 @@ CVE-2021-31267 - https://github.com/RNBBarrett/CrewAI-examples CVE-2021-3129 - https://github.com/0day404/vulnerability-poc CVE-2021-3129 - https://github.com/0day666/Vulnerability-verification CVE-2021-3129 - https://github.com/0nion1/CVE-2021-3129 +CVE-2021-3129 - https://github.com/0xMarcio/cve CVE-2021-3129 - https://github.com/0xStrygwyr/OSCP-Guide CVE-2021-3129 - https://github.com/0xZipp0/OSCP CVE-2021-3129 - https://github.com/0xaniketB/HackTheBox-Horizontall @@ -105966,6 +106421,7 @@ CVE-2021-31439 - https://github.com/WinMin/Protocol-Vul CVE-2021-31440 - https://github.com/ARPSyndicate/cvemon CVE-2021-31440 - https://github.com/Al1ex/LinuxEelvation CVE-2021-31440 - https://github.com/ChoKyuWon/exploit_articles +CVE-2021-31440 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2021-31440 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2021-31440 - https://github.com/XiaozaYa/CVE-Recording CVE-2021-31440 - https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground @@ -106935,6 +107391,7 @@ CVE-2021-32606 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2021-32606 - https://github.com/knd06/linux-kernel-exploitation CVE-2021-32606 - https://github.com/ndk191/linux-kernel-exploitation CVE-2021-32606 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2021-32606 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-32606 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-32615 - https://github.com/2lambda123/CVE-mitre CVE-2021-32615 - https://github.com/2lambda123/Windows10Exploits @@ -107215,6 +107672,7 @@ CVE-2021-33034 - https://github.com/zecool/cve CVE-2021-33035 - https://github.com/ARPSyndicate/cvemon CVE-2021-33036 - https://github.com/ARPSyndicate/cvemon CVE-2021-33037 - https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh +CVE-2021-33037 - https://github.com/versio-io/product-lifecycle-security-api CVE-2021-3304 - https://github.com/ExpLangcn/FuYao-Go CVE-2021-33044 - https://github.com/20142995/Goby CVE-2021-33044 - https://github.com/APPHIK/cam @@ -107723,6 +108181,7 @@ CVE-2021-33909 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2021-33909 - https://github.com/sfowl/deep-directory CVE-2021-33909 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2021-33909 - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC- +CVE-2021-33909 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-33909 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-33909 - https://github.com/xuetusummer/Penetration_Testing_POC CVE-2021-33910 - https://github.com/ARPSyndicate/cvemon @@ -108199,6 +108658,7 @@ CVE-2021-34523 - https://github.com/triw0lf/Security-Matters-22 CVE-2021-34523 - https://github.com/weeka10/-hktalent-TOP CVE-2021-34527 - https://github.com/0x6d69636b/windows_hardening CVE-2021-34527 - https://github.com/0x727/usefull-elevation-of-privilege +CVE-2021-34527 - https://github.com/0xMarcio/cve CVE-2021-34527 - https://github.com/0xStrygwyr/OSCP-Guide CVE-2021-34527 - https://github.com/0xZipp0/OSCP CVE-2021-34527 - https://github.com/0xaniketB/HackTheBox-Driver @@ -108517,6 +108977,7 @@ CVE-2021-34866 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2021-34866 - https://github.com/knd06/linux-kernel-exploitation CVE-2021-34866 - https://github.com/ndk191/linux-kernel-exploitation CVE-2021-34866 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2021-34866 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-34866 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-3487 - https://github.com/ARPSyndicate/cvemon CVE-2021-3487 - https://github.com/fluidattacks/makes @@ -108530,6 +108991,7 @@ CVE-2021-3490 - https://github.com/0xsyr0/OSCP CVE-2021-3490 - https://github.com/20142995/sectool CVE-2021-3490 - https://github.com/ARPSyndicate/cvemon CVE-2021-3490 - https://github.com/Al1ex/LinuxEelvation +CVE-2021-3490 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2021-3490 - https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation CVE-2021-3490 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2021-3490 - https://github.com/Mr-xn/Penetration_Testing_POC @@ -108566,6 +109028,7 @@ CVE-2021-3490 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2021-3490 - https://github.com/trhacknon/Pocingit CVE-2021-3490 - https://github.com/whoforget/CVE-POC CVE-2021-3490 - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC- +CVE-2021-3490 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-3490 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-3490 - https://github.com/xuetusummer/Penetration_Testing_POC CVE-2021-3490 - https://github.com/youwizard/CVE-POC @@ -108593,10 +109056,12 @@ CVE-2021-3492 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2021-3492 - https://github.com/synacktiv/CVE-2021-3492 CVE-2021-3492 - https://github.com/trhacknon/Pocingit CVE-2021-3492 - https://github.com/whoforget/CVE-POC +CVE-2021-3492 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-3492 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-3492 - https://github.com/youwizard/CVE-POC CVE-2021-3492 - https://github.com/zecool/cve CVE-2021-3493 - https://github.com/0day404/vulnerability-poc +CVE-2021-3493 - https://github.com/0xMarcio/cve CVE-2021-3493 - https://github.com/0xMat10/eJPT_Prep CVE-2021-3493 - https://github.com/0xWhoami35/root-kernel CVE-2021-3493 - https://github.com/0xsyr0/OSCP @@ -108615,6 +109080,7 @@ CVE-2021-3493 - https://github.com/EdgeSecurityTeam/Vulnerability CVE-2021-3493 - https://github.com/GhostTroops/TOP CVE-2021-3493 - https://github.com/GibzB/THM-Captured-Rooms CVE-2021-3493 - https://github.com/H0j3n/EzpzCheatSheet +CVE-2021-3493 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2021-3493 - https://github.com/Ishan3011/CVE-2021-3493 CVE-2021-3493 - https://github.com/JERRY123S/all-poc CVE-2021-3493 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits @@ -108689,6 +109155,7 @@ CVE-2021-3493 - https://github.com/txuswashere/OSCP CVE-2021-3493 - https://github.com/tzwlhack/Vulnerability CVE-2021-3493 - https://github.com/weeka10/-hktalent-TOP CVE-2021-3493 - https://github.com/whoforget/CVE-POC +CVE-2021-3493 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-3493 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-3493 - https://github.com/xhref/OSCP CVE-2021-3493 - https://github.com/xuetusummer/Penetration_Testing_POC @@ -109174,6 +109641,7 @@ CVE-2021-3573 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2021-3573 - https://github.com/knd06/linux-kernel-exploitation CVE-2021-3573 - https://github.com/ndk191/linux-kernel-exploitation CVE-2021-3573 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2021-3573 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-3573 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-3574 - https://github.com/ARPSyndicate/cvemon CVE-2021-3574 - https://github.com/ZhanyongTang/NISL-BugDetection @@ -109278,6 +109746,7 @@ CVE-2021-3609 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2021-3609 - https://github.com/knd06/linux-kernel-exploitation CVE-2021-3609 - https://github.com/ndk191/linux-kernel-exploitation CVE-2021-3609 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2021-3609 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-3609 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-36090 - https://github.com/ARPSyndicate/cvemon CVE-2021-36090 - https://github.com/CodeIntelligenceTesting/jazzer @@ -109342,6 +109811,7 @@ CVE-2021-3625 - https://github.com/whoforget/CVE-POC CVE-2021-3625 - https://github.com/youwizard/CVE-POC CVE-2021-3626 - https://github.com/ExpLangcn/FuYao-Go CVE-2021-36260 - https://github.com/0day404/vulnerability-poc +CVE-2021-36260 - https://github.com/0xMarcio/cve CVE-2021-36260 - https://github.com/1f3lse/taiE CVE-2021-36260 - https://github.com/20142995/Goby CVE-2021-36260 - https://github.com/20142995/sectool @@ -109579,6 +110049,7 @@ CVE-2021-36749 - https://github.com/ARPSyndicate/kenzer-templates CVE-2021-36749 - https://github.com/ArrestX/--POC CVE-2021-36749 - https://github.com/Awrrays/FrameVul CVE-2021-36749 - https://github.com/BrucessKING/CVE-2021-36749 +CVE-2021-36749 - https://github.com/CLincat/vulcat CVE-2021-36749 - https://github.com/HimmelAward/Goby_POC CVE-2021-36749 - https://github.com/Ilovewomen/db_script_v2 CVE-2021-36749 - https://github.com/Ilovewomen/db_script_v2_2 @@ -109980,6 +110451,7 @@ CVE-2021-3715 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2021-3715 - https://github.com/knd06/linux-kernel-exploitation CVE-2021-3715 - https://github.com/ndk191/linux-kernel-exploitation CVE-2021-3715 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2021-3715 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-3715 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-37152 - https://github.com/ARPSyndicate/cvemon CVE-2021-37152 - https://github.com/SecurityAnalysts/CVE-2021-37152 @@ -110561,6 +111033,7 @@ CVE-2021-38646 - https://github.com/ARPSyndicate/cvemon CVE-2021-38646 - https://github.com/Ostorlab/KEV CVE-2021-38646 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors CVE-2021-38646 - https://github.com/Spacial/awesome-csirt +CVE-2021-38647 - https://github.com/0xMarcio/cve CVE-2021-38647 - https://github.com/ARPSyndicate/cvemon CVE-2021-38647 - https://github.com/ARPSyndicate/kenzer-templates CVE-2021-38647 - https://github.com/AlteredSecurity/CVE-2021-38647 @@ -111135,6 +111608,7 @@ CVE-2021-39815 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2021-39815 - https://github.com/knd06/linux-kernel-exploitation CVE-2021-39815 - https://github.com/ndk191/linux-kernel-exploitation CVE-2021-39815 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2021-39815 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-39815 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-39823 - https://github.com/ARPSyndicate/cvemon CVE-2021-39829 - https://github.com/0xCyberY/CVE-T4PDF @@ -111359,6 +111833,7 @@ CVE-2021-4034 - https://github.com/GibzB/THM-Captured-Rooms CVE-2021-4034 - https://github.com/H3arn/hackergame-2022-writeup CVE-2021-4034 - https://github.com/HadessCS/Awesome-Privilege-Escalation CVE-2021-4034 - https://github.com/HattMobb/TryHackMe-Bugle-Machine-Writeup-Walkthrough +CVE-2021-4034 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2021-4034 - https://github.com/HellGateCorp/pwnkit CVE-2021-4034 - https://github.com/HrishitJoshi/CVE-2021-4034 CVE-2021-4034 - https://github.com/IBM-Cloud/vpc-ha-iac @@ -112433,6 +112908,7 @@ CVE-2021-41073 - https://github.com/0ptyx/cve-2024-0582 CVE-2021-41073 - https://github.com/ARPSyndicate/cvemon CVE-2021-41073 - https://github.com/Ch4nc3n/PublicExploitation CVE-2021-41073 - https://github.com/DarkFunct/CVE_Exploits +CVE-2021-41073 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2021-41073 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2021-41073 - https://github.com/NaInSec/CVE-PoC-in-GitHub CVE-2021-41073 - https://github.com/SYRTI/POC_to_review @@ -112457,6 +112933,7 @@ CVE-2021-41073 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2021-41073 - https://github.com/star-sg/CVE CVE-2021-41073 - https://github.com/trhacknon/CVE2 CVE-2021-41073 - https://github.com/trhacknon/Pocingit +CVE-2021-41073 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-41073 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-41073 - https://github.com/zecool/cve CVE-2021-41073 - https://github.com/zzcentury/PublicExploitation @@ -112472,6 +112949,7 @@ CVE-2021-41078 - https://github.com/trhacknon/Pocingit CVE-2021-41078 - https://github.com/zecool/cve CVE-2021-41079 - https://github.com/ARPSyndicate/cvemon CVE-2021-41079 - https://github.com/chnzzh/OpenSSL-CVE-lib +CVE-2021-41079 - https://github.com/versio-io/product-lifecycle-security-api CVE-2021-41081 - https://github.com/ARPSyndicate/cvemon CVE-2021-41081 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2021-41081 - https://github.com/soosmile/POC @@ -112917,6 +113395,7 @@ CVE-2021-41511 - https://github.com/vidvansh/CVE-2021-41511 CVE-2021-41526 - https://github.com/RonnieSalomonsen/My-CVEs CVE-2021-41526 - https://github.com/pawlokk/mindmanager-poc CVE-2021-4154 - https://github.com/ARPSyndicate/cvemon +CVE-2021-4154 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2021-4154 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2021-4154 - https://github.com/Markakd/CVE-2021-4154 CVE-2021-4154 - https://github.com/Markakd/DirtyCred @@ -113515,6 +113994,7 @@ CVE-2021-42008 - https://github.com/0xdevil/CVE-2021-42008 CVE-2021-42008 - https://github.com/ARPSyndicate/cvemon CVE-2021-42008 - https://github.com/Al1ex/LinuxEelvation CVE-2021-42008 - https://github.com/BachoSeven/stellestelline +CVE-2021-42008 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2021-42008 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2021-42008 - https://github.com/NaInSec/CVE-PoC-in-GitHub CVE-2021-42008 - https://github.com/SYRTI/POC_to_review @@ -113537,6 +114017,7 @@ CVE-2021-42008 - https://github.com/numanturle/CVE-2021-42008 CVE-2021-42008 - https://github.com/soosmile/POC CVE-2021-42008 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2021-42008 - https://github.com/trhacknon/Pocingit +CVE-2021-42008 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-42008 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-42008 - https://github.com/zecool/cve CVE-2021-42013 - https://github.com/0day404/vulnerability-poc @@ -113721,6 +114202,7 @@ CVE-2021-4204 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2021-4204 - https://github.com/tr3ee/CVE-2021-4204 CVE-2021-4204 - https://github.com/trhacknon/Pocingit CVE-2021-4204 - https://github.com/whoforget/CVE-POC +CVE-2021-4204 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-4204 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-4204 - https://github.com/xuetusummer/Penetration_Testing_POC CVE-2021-4204 - https://github.com/youwizard/CVE-POC @@ -114269,6 +114751,7 @@ CVE-2021-42327 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2021-42327 - https://github.com/soosmile/POC CVE-2021-42327 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2021-42327 - https://github.com/trhacknon/Pocingit +CVE-2021-42327 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-42327 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-42327 - https://github.com/zecool/cve CVE-2021-42337 - https://github.com/aalexpereira/pipelines-tricks @@ -114820,6 +115303,7 @@ CVE-2021-43267 - https://github.com/0x0021h/expbox CVE-2021-43267 - https://github.com/ARPSyndicate/cvemon CVE-2021-43267 - https://github.com/Al1ex/LinuxEelvation CVE-2021-43267 - https://github.com/DarkSprings/CVE-2021-43267-POC +CVE-2021-43267 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2021-43267 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2021-43267 - https://github.com/aixcc-public/challenge-001-exemplar CVE-2021-43267 - https://github.com/bcoles/kasld @@ -114840,6 +115324,7 @@ CVE-2021-43267 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2021-43267 - https://github.com/ohnonoyesyes/CVE-2021-43267 CVE-2021-43267 - https://github.com/soosmile/POC CVE-2021-43267 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2021-43267 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-43267 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-43267 - https://github.com/zzhacked/CVE-2021-43267 CVE-2021-4328 - https://github.com/ExpLangcn/FuYao-Go @@ -114849,6 +115334,7 @@ CVE-2021-43287 - https://github.com/20142995/pocsuite3 CVE-2021-43287 - https://github.com/ARPSyndicate/cvemon CVE-2021-43287 - https://github.com/ARPSyndicate/kenzer-templates CVE-2021-43287 - https://github.com/ArrestX/--POC +CVE-2021-43287 - https://github.com/CLincat/vulcat CVE-2021-43287 - https://github.com/HimmelAward/Goby_POC CVE-2021-43287 - https://github.com/KayCHENvip/vulnerability-poc CVE-2021-43287 - https://github.com/Miraitowa70/POC-Notes @@ -115112,6 +115598,7 @@ CVE-2021-43797 - https://github.com/cezapata/appconfiguration-sample CVE-2021-43798 - https://github.com/0day404/vulnerability-poc CVE-2021-43798 - https://github.com/0x783kb/Security-operation-book CVE-2021-43798 - https://github.com/0xAwali/Virtual-Host +CVE-2021-43798 - https://github.com/0xMarcio/cve CVE-2021-43798 - https://github.com/20142995/Goby CVE-2021-43798 - https://github.com/20142995/pocsuite3 CVE-2021-43798 - https://github.com/20142995/sectool @@ -115428,6 +115915,7 @@ CVE-2021-43975 - https://github.com/ARPSyndicate/cvemon CVE-2021-43976 - https://github.com/ARPSyndicate/cvemon CVE-2021-43980 - https://github.com/ARPSyndicate/cvemon CVE-2021-43980 - https://github.com/sr-monika/sprint-rest +CVE-2021-43980 - https://github.com/versio-io/product-lifecycle-security-api CVE-2021-43997 - https://github.com/espressif/esp-idf-sbom CVE-2021-44001 - https://github.com/0xCyberY/CVE-T4PDF CVE-2021-44001 - https://github.com/ARPSyndicate/cvemon @@ -115811,6 +116299,7 @@ CVE-2021-44228 - https://github.com/Lejeremiah/docker_images CVE-2021-44228 - https://github.com/LemonCraftRu/JndiRemover CVE-2021-44228 - https://github.com/LeonardoE95/yt-it CVE-2021-44228 - https://github.com/Lercas/CVE_scoring +CVE-2021-44228 - https://github.com/LibHunter/LibHunter CVE-2021-44228 - https://github.com/Liderbord/Log4j-Security CVE-2021-44228 - https://github.com/LinkMJB/log4shell_scanner CVE-2021-44228 - https://github.com/Live-Hack-CVE/CVE-2021-4104 @@ -116293,6 +116782,7 @@ CVE-2021-44228 - https://github.com/eljosep/OSCP-Guide CVE-2021-44228 - https://github.com/emadshanab/Nuclei-Templates-Collection CVE-2021-44228 - https://github.com/emilywang0/CVE_testing_VULN CVE-2021-44228 - https://github.com/emilywang0/MergeBase_test_vuln +CVE-2021-44228 - https://github.com/enomothem/PenTestNote CVE-2021-44228 - https://github.com/erickrr-bd/TekiumLog4jApp CVE-2021-44228 - https://github.com/ericmedina024/JndiLookupRemover CVE-2021-44228 - https://github.com/erikschippers/Log4J-Hyper-V-Script @@ -117348,6 +117838,7 @@ CVE-2021-44733 - https://github.com/pjlantz/optee-qemu CVE-2021-44733 - https://github.com/soosmile/POC CVE-2021-44733 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2021-44733 - https://github.com/trhacknon/Pocingit +CVE-2021-44733 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-44733 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-44733 - https://github.com/zecool/cve CVE-2021-44735 - https://github.com/defensor/CVE-2021-44735 @@ -117500,6 +117991,7 @@ CVE-2021-44906 - https://github.com/seal-community/patches CVE-2021-44906 - https://github.com/trong0dn/eth-todo-list CVE-2021-44909 - https://github.com/g1thub3r1st4/CVE-2021-44909 CVE-2021-44910 - https://github.com/dockererr/CVE-2021-44910_SpringBlade +CVE-2021-44910 - https://github.com/enomothem/PenTestNote CVE-2021-44915 - https://github.com/superlink996/chunqiuyunjingbachang CVE-2021-44916 - https://github.com/ARPSyndicate/cvemon CVE-2021-44956 - https://github.com/ARPSyndicate/cvemon @@ -117633,6 +118125,7 @@ CVE-2021-45046 - https://github.com/HackJava/Log4j2 CVE-2021-45046 - https://github.com/HynekPetrak/log4shell-finder CVE-2021-45046 - https://github.com/ITninja04/awesome-stars CVE-2021-45046 - https://github.com/JERRY123S/all-poc +CVE-2021-45046 - https://github.com/LibHunter/LibHunter CVE-2021-45046 - https://github.com/LoliKingdom/NukeJndiLookupFromLog4j CVE-2021-45046 - https://github.com/MLX15/log4j-scan CVE-2021-45046 - https://github.com/Maelstromage/Log4jSherlock @@ -118163,6 +118656,7 @@ CVE-2021-45608 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2021-45608 - https://github.com/knd06/linux-kernel-exploitation CVE-2021-45608 - https://github.com/ndk191/linux-kernel-exploitation CVE-2021-45608 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2021-45608 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2021-45608 - https://github.com/xairy/linux-kernel-exploitation CVE-2021-45733 - https://github.com/ARPSyndicate/cvemon CVE-2021-45733 - https://github.com/pjqwudi/my_vuln @@ -118974,6 +119468,7 @@ CVE-2022-0185 - https://github.com/EGI-Federation/SVG-advisories CVE-2022-0185 - https://github.com/GhostTroops/TOP CVE-2022-0185 - https://github.com/Ha0-Y/LinuxKernelExploits CVE-2022-0185 - https://github.com/Ha0-Y/kernel-exploit-cve +CVE-2022-0185 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2022-0185 - https://github.com/JERRY123S/all-poc CVE-2022-0185 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2022-0185 - https://github.com/Metarget/metarget @@ -119035,6 +119530,7 @@ CVE-2022-0185 - https://github.com/veritas501/CVE-2022-0185-PipeVersion CVE-2022-0185 - https://github.com/veritas501/pipe-primitive CVE-2022-0185 - https://github.com/weeka10/-hktalent-TOP CVE-2022-0185 - https://github.com/whoforget/CVE-POC +CVE-2022-0185 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-0185 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-0185 - https://github.com/xuetusummer/Penetration_Testing_POC CVE-2022-0185 - https://github.com/youwizard/CVE-POC @@ -119329,6 +119825,7 @@ CVE-2022-0435 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2022-0435 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2022-0435 - https://github.com/teresaweber685/book_list CVE-2022-0435 - https://github.com/whoforget/CVE-POC +CVE-2022-0435 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-0435 - https://github.com/wlswotmd/CVE-2022-0435 CVE-2022-0435 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-0435 - https://github.com/youwizard/CVE-POC @@ -119587,6 +120084,7 @@ CVE-2022-0543 - https://github.com/zyylhn/zscan CVE-2022-0547 - https://github.com/ARPSyndicate/cvemon CVE-2022-0554 - https://github.com/ARPSyndicate/cvemon CVE-2022-0557 - https://github.com/ARPSyndicate/cvemon +CVE-2022-0557 - https://github.com/AggressiveUser/AggressiveUser CVE-2022-0557 - https://github.com/Enes4xd/Enes4xd CVE-2022-0557 - https://github.com/cr0ss2018/cr0ss2018 CVE-2022-0557 - https://github.com/enesamaafkolan/enesamaafkolan @@ -119604,6 +120102,7 @@ CVE-2022-0563 - https://github.com/amartingarcia/kubernetes-cks-training CVE-2022-0563 - https://github.com/cdupuis/image-api CVE-2022-0563 - https://github.com/denoslab/ensf400-lab10-ssc CVE-2022-0563 - https://github.com/fokypoky/places-list +CVE-2022-0563 - https://github.com/m-pasima/CI-CD-Security-image-scan CVE-2022-0563 - https://github.com/mauraneh/WIK-DPS-TP02 CVE-2022-0563 - https://github.com/testing-felickz/docker-scout-demo CVE-2022-0563 - https://github.com/toyhoshi/helm @@ -120029,6 +120528,7 @@ CVE-2022-0847 - https://github.com/Gustavo-Nogueira/Dirty-Pipe-Exploits CVE-2022-0847 - https://github.com/Ha0-Y/LinuxKernelExploits CVE-2022-0847 - https://github.com/Ha0-Y/kernel-exploit-cve CVE-2022-0847 - https://github.com/HadessCS/Awesome-Privilege-Escalation +CVE-2022-0847 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2022-0847 - https://github.com/IHenakaarachchi/debian11-dirty_pipe-patcher CVE-2022-0847 - https://github.com/ITMarcin2211/CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 - https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation @@ -120287,6 +120787,7 @@ CVE-2022-0847 - https://github.com/wechicken456/Linux-kernel CVE-2022-0847 - https://github.com/weeka10/-hktalent-TOP CVE-2022-0847 - https://github.com/whoami-chmod777/Hacking-Articles-Linux-Privilege-Escalation- CVE-2022-0847 - https://github.com/whoforget/CVE-POC +CVE-2022-0847 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-0847 - https://github.com/wpressly/exploitations CVE-2022-0847 - https://github.com/x90hack/vulnerabilty_lab CVE-2022-0847 - https://github.com/xairy/linux-kernel-exploitation @@ -120448,6 +120949,7 @@ CVE-2022-0995 - https://github.com/CVEDB/awesome-cve-repo CVE-2022-0995 - https://github.com/CVEDB/top CVE-2022-0995 - https://github.com/Ch4nc3n/PublicExploitation CVE-2022-0995 - https://github.com/GhostTroops/TOP +CVE-2022-0995 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2022-0995 - https://github.com/JERRY123S/all-poc CVE-2022-0995 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2022-0995 - https://github.com/Metarget/metarget @@ -120483,6 +120985,7 @@ CVE-2022-0995 - https://github.com/tanjiti/sec_profile CVE-2022-0995 - https://github.com/trhacknon/Pocingit CVE-2022-0995 - https://github.com/weeka10/-hktalent-TOP CVE-2022-0995 - https://github.com/whoforget/CVE-POC +CVE-2022-0995 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-0995 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-0995 - https://github.com/xuetusummer/Penetration_Testing_POC CVE-2022-0995 - https://github.com/youwizard/CVE-POC @@ -120537,6 +121040,7 @@ CVE-2022-1015 - https://github.com/0range1337/CVE-2022-1015 CVE-2022-1015 - https://github.com/ARPSyndicate/cvemon CVE-2022-1015 - https://github.com/EGI-Federation/SVG-advisories CVE-2022-1015 - https://github.com/H4K6/CVE-2023-0179-PoC +CVE-2022-1015 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2022-1015 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2022-1015 - https://github.com/Mr-xn/Penetration_Testing_POC CVE-2022-1015 - https://github.com/NaInSec/CVE-PoC-in-GitHub @@ -120576,6 +121080,7 @@ CVE-2022-1015 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2022-1015 - https://github.com/trhacknon/Pocingit CVE-2022-1015 - https://github.com/wechicken456/Linux-kernel CVE-2022-1015 - https://github.com/whoforget/CVE-POC +CVE-2022-1015 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-1015 - https://github.com/wlswotmd/CVE-2022-1015 CVE-2022-1015 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-1015 - https://github.com/xuetusummer/Penetration_Testing_POC @@ -120596,6 +121101,7 @@ CVE-2022-1016 - https://github.com/knd06/linux-kernel-exploitation CVE-2022-1016 - https://github.com/ndk191/linux-kernel-exploitation CVE-2022-1016 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2022-1016 - https://github.com/wechicken456/Linux-kernel +CVE-2022-1016 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-1016 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-1016 - https://github.com/yaobinwen/robin_on_rails CVE-2022-1016 - https://github.com/zanezhub/CVE-2022-1015-1016 @@ -120796,6 +121302,7 @@ CVE-2022-1163 - https://github.com/AggressiveUser/AggressiveUser.github.io CVE-2022-1166 - https://github.com/ARPSyndicate/cvemon CVE-2022-1168 - https://github.com/ARPSyndicate/cvemon CVE-2022-1168 - https://github.com/ARPSyndicate/kenzer-templates +CVE-2022-1172 - https://github.com/Joe1sn/Joe1sn CVE-2022-1175 - https://github.com/ARPSyndicate/cvemon CVE-2022-1175 - https://github.com/Greenwolf/CVE-2022-1175 CVE-2022-1175 - https://github.com/NaInSec/CVE-PoC-in-GitHub @@ -120995,6 +121502,7 @@ CVE-2022-1388 - https://github.com/0day404/vulnerability-poc CVE-2022-1388 - https://github.com/0x783kb/Security-operation-book CVE-2022-1388 - https://github.com/0x7eTeam/CVE-2022-1388-PocExp CVE-2022-1388 - https://github.com/0xAgun/CVE-2022-1388 +CVE-2022-1388 - https://github.com/0xMarcio/cve CVE-2022-1388 - https://github.com/0xf4n9x/CVE-2022-1388 CVE-2022-1388 - https://github.com/20142995/Goby CVE-2022-1388 - https://github.com/20142995/pocsuite3 @@ -121272,6 +121780,7 @@ CVE-2022-1527 - https://github.com/ARPSyndicate/cvemon CVE-2022-1527 - https://github.com/agrawalsmart7/scodescanner CVE-2022-1528 - https://github.com/ARPSyndicate/cvemon CVE-2022-1529 - https://github.com/mistymntncop/CVE-2022-1802 +CVE-2022-1530 - https://github.com/AggressiveUser/AggressiveUser CVE-2022-1532 - https://github.com/ARPSyndicate/cvemon CVE-2022-1532 - https://github.com/agrawalsmart7/scodescanner CVE-2022-1537 - https://github.com/ARPSyndicate/cvemon @@ -121297,6 +121806,7 @@ CVE-2022-1586 - https://github.com/vulnersCom/vulners-sbom-parser CVE-2022-1587 - https://github.com/ARPSyndicate/cvemon CVE-2022-1587 - https://github.com/vulnersCom/vulners-sbom-parser CVE-2022-1588 - https://github.com/ARPSyndicate/cvemon +CVE-2022-1588 - https://github.com/AggressiveUser/AggressiveUser CVE-2022-1590 - https://github.com/karimhabush/cyberowl CVE-2022-1591 - https://github.com/ARPSyndicate/cvemon CVE-2022-1592 - https://github.com/ARPSyndicate/cvemon @@ -121458,6 +121968,7 @@ CVE-2022-1786 - https://github.com/knd06/linux-kernel-exploitation CVE-2022-1786 - https://github.com/ndk191/linux-kernel-exploitation CVE-2022-1786 - https://github.com/scratchadams/Heap-Resources CVE-2022-1786 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2022-1786 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-1786 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-1787 - https://github.com/ARPSyndicate/cvemon CVE-2022-1793 - https://github.com/ARPSyndicate/cvemon @@ -121646,6 +122157,7 @@ CVE-2022-1972 - https://github.com/randorisec/CVE-2022-1972-infoleak-PoC CVE-2022-1972 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2022-1972 - https://github.com/trhacknon/Pocingit CVE-2022-1972 - https://github.com/whoforget/CVE-POC +CVE-2022-1972 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-1972 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-1972 - https://github.com/xuetusummer/Penetration_Testing_POC CVE-2022-1972 - https://github.com/youwizard/CVE-POC @@ -121664,6 +122176,7 @@ CVE-2022-2000000 - https://github.com/clj-holmes/clj-watson CVE-2022-20001 - https://github.com/Live-Hack-CVE/CVE-2022-20001 CVE-2022-20004 - https://github.com/ARPSyndicate/cvemon CVE-2022-20004 - https://github.com/CVEDB/PoC-List +CVE-2022-20004 - https://github.com/CVEDB/awesome-cve-repo CVE-2022-20004 - https://github.com/Live-Hack-CVE/CVE-2022-2000 CVE-2022-20004 - https://github.com/NaInSec/CVE-PoC-in-GitHub CVE-2022-20004 - https://github.com/SYRTI/POC_to_review @@ -121679,6 +122192,7 @@ CVE-2022-20004 - https://github.com/youwizard/CVE-POC CVE-2022-20004 - https://github.com/zecool/cve CVE-2022-20005 - https://github.com/ARPSyndicate/cvemon CVE-2022-20005 - https://github.com/CVEDB/PoC-List +CVE-2022-20005 - https://github.com/CVEDB/awesome-cve-repo CVE-2022-20005 - https://github.com/Live-Hack-CVE/CVE-2022-2000 CVE-2022-20005 - https://github.com/NaInSec/CVE-PoC-in-GitHub CVE-2022-20005 - https://github.com/SYRTI/POC_to_review @@ -121701,6 +122215,7 @@ CVE-2022-20006 - https://github.com/rajbhx/Awesome-Android-Security-Clone CVE-2022-20006 - https://github.com/saeidshirazi/awesome-android-security CVE-2022-20007 - https://github.com/ARPSyndicate/cvemon CVE-2022-20007 - https://github.com/CVEDB/PoC-List +CVE-2022-20007 - https://github.com/CVEDB/awesome-cve-repo CVE-2022-20007 - https://github.com/Live-Hack-CVE/CVE-2022-2000 CVE-2022-20007 - https://github.com/NaInSec/CVE-PoC-in-GitHub CVE-2022-20007 - https://github.com/SYRTI/POC_to_review @@ -121781,6 +122296,7 @@ CVE-2022-20122 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2022-20122 - https://github.com/knd06/linux-kernel-exploitation CVE-2022-20122 - https://github.com/ndk191/linux-kernel-exploitation CVE-2022-20122 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2022-20122 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-20122 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-20124 - https://github.com/ARPSyndicate/cvemon CVE-2022-20124 - https://github.com/Live-Hack-CVE/CVE-2022-20124 @@ -121911,6 +122427,7 @@ CVE-2022-20186 - https://github.com/s1204-inspect/CVE-2022-20186_CTXZ CVE-2022-20186 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2022-20186 - https://github.com/trhacknon/Pocingit CVE-2022-20186 - https://github.com/whoforget/CVE-POC +CVE-2022-20186 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-20186 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-20186 - https://github.com/youwizard/CVE-POC CVE-2022-20186 - https://github.com/zecool/cve @@ -122201,6 +122718,7 @@ CVE-2022-2068 - https://github.com/tianocore-docs/ThirdPartySecurityAdvisories CVE-2022-20685 - https://github.com/T-JN/Research-the-Model-of-Increasing-Reliability-of-the-Intrusion-Detection-System CVE-2022-20698 - https://github.com/ARPSyndicate/cvemon CVE-2022-20698 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2022-20699 - https://github.com/0xMarcio/cve CVE-2022-20699 - https://github.com/ARPSyndicate/cvemon CVE-2022-20699 - https://github.com/Audiobahn/CVE-2022-20699 CVE-2022-20699 - https://github.com/CVEDB/awesome-cve-repo @@ -122275,6 +122793,7 @@ CVE-2022-2078 - https://github.com/knd06/linux-kernel-exploitation CVE-2022-2078 - https://github.com/ndk191/linux-kernel-exploitation CVE-2022-2078 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2022-2078 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2022-2078 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-2078 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-20784 - https://github.com/karimhabush/cyberowl CVE-2022-20785 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -123030,6 +123549,7 @@ CVE-2022-21887 - https://github.com/trhacknon/Pocingit CVE-2022-21887 - https://github.com/whoforget/CVE-POC CVE-2022-21887 - https://github.com/youwizard/CVE-POC CVE-2022-21887 - https://github.com/zecool/cve +CVE-2022-21894 - https://github.com/0xMarcio/cve CVE-2022-21894 - https://github.com/ARPSyndicate/cvemon CVE-2022-21894 - https://github.com/ASkyeye/CVE-2022-21894-Payload CVE-2022-21894 - https://github.com/CVEDB/awesome-cve-repo @@ -123083,6 +123603,7 @@ CVE-2022-21906 - https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of CVE-2022-21906 - https://github.com/nu11secur1ty/CVE-mitre CVE-2022-21906 - https://github.com/nu11secur1ty/CVE-nu11secur1ty CVE-2022-21906 - https://github.com/nu11secur1ty/Windows10Exploits +CVE-2022-21907 - https://github.com/0xMarcio/cve CVE-2022-21907 - https://github.com/0xmaximus/Home-Demolisher CVE-2022-21907 - https://github.com/20142995/sectool CVE-2022-21907 - https://github.com/2lambda123/CVE-mitre @@ -123339,6 +123860,7 @@ CVE-2022-22005 - https://github.com/Creamy-Chicken-Soup/writeups-about-analysis- CVE-2022-22012 - https://github.com/ARPSyndicate/cvemon CVE-2022-22017 - https://github.com/ARPSyndicate/cvemon CVE-2022-2202 - https://github.com/CrossC2/CrossC2Kit +CVE-2022-2202 - https://github.com/m-mizutani/octovy CVE-2022-22022 - https://github.com/ARPSyndicate/cvemon CVE-2022-22022 - https://github.com/Cruxer8Mech/Idk CVE-2022-22022 - https://github.com/NaInSec/CVE-PoC-in-GitHub @@ -123412,6 +123934,7 @@ CVE-2022-22057 - https://github.com/knd06/linux-kernel-exploitation CVE-2022-22057 - https://github.com/ndk191/linux-kernel-exploitation CVE-2022-22057 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2022-22057 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2022-22057 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-22057 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-2206 - https://github.com/ARPSyndicate/cvemon CVE-2022-22063 - https://github.com/k0mi-tg/CVE-POC @@ -123745,6 +124268,7 @@ CVE-2022-22718 - https://github.com/youwizard/CVE-POC CVE-2022-22718 - https://github.com/zecool/cve CVE-2022-22719 - https://github.com/8ctorres/SIND-Practicas CVE-2022-22719 - https://github.com/ARPSyndicate/cvemon +CVE-2022-22719 - https://github.com/EzeTauil/Maquina-Upload CVE-2022-22719 - https://github.com/PierreChrd/py-projet-tut CVE-2022-22719 - https://github.com/Totes5706/TotesHTB CVE-2022-22719 - https://github.com/bioly230/THM_Skynet @@ -123753,6 +124277,7 @@ CVE-2022-22719 - https://github.com/kasem545/vulnsearch CVE-2022-22720 - https://github.com/8ctorres/SIND-Practicas CVE-2022-22720 - https://github.com/ARPSyndicate/cvemon CVE-2022-22720 - https://github.com/Benasin/CVE-2022-22720 +CVE-2022-22720 - https://github.com/EzeTauil/Maquina-Upload CVE-2022-22720 - https://github.com/PierreChrd/py-projet-tut CVE-2022-22720 - https://github.com/Totes5706/TotesHTB CVE-2022-22720 - https://github.com/bioly230/THM_Skynet @@ -123761,6 +124286,7 @@ CVE-2022-22720 - https://github.com/kasem545/vulnsearch CVE-2022-22720 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2022-22721 - https://github.com/8ctorres/SIND-Practicas CVE-2022-22721 - https://github.com/ARPSyndicate/cvemon +CVE-2022-22721 - https://github.com/EzeTauil/Maquina-Upload CVE-2022-22721 - https://github.com/PierreChrd/py-projet-tut CVE-2022-22721 - https://github.com/Totes5706/TotesHTB CVE-2022-22721 - https://github.com/bioly230/THM_Skynet @@ -124176,6 +124702,7 @@ CVE-2022-22947 - https://github.com/dbgee/CVE-2022-22947 CVE-2022-22947 - https://github.com/debug4you/CVE-2022-22947 CVE-2022-22947 - https://github.com/dingxiao77/-cve-2022-22947- CVE-2022-22947 - https://github.com/dravenww/curated-article +CVE-2022-22947 - https://github.com/enomothem/PenTestNote CVE-2022-22947 - https://github.com/expzhizhuo/Burp_VulPscan CVE-2022-22947 - https://github.com/fbion/CVE-2022-22947 CVE-2022-22947 - https://github.com/flying0er/CVE-2022-22947-goby @@ -125399,6 +125926,7 @@ CVE-2022-23222 - https://github.com/CVEDB/top CVE-2022-23222 - https://github.com/Ch4nc3n/PublicExploitation CVE-2022-23222 - https://github.com/FridayOrtiz/CVE-2022-23222 CVE-2022-23222 - https://github.com/GhostTroops/TOP +CVE-2022-23222 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2022-23222 - https://github.com/JERRY123S/all-poc CVE-2022-23222 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2022-23222 - https://github.com/KayCHENvip/vulnerability-poc @@ -125443,6 +125971,7 @@ CVE-2022-23222 - https://github.com/tr3ee/CVE-2022-23222 CVE-2022-23222 - https://github.com/trhacknon/Pocingit CVE-2022-23222 - https://github.com/weeka10/-hktalent-TOP CVE-2022-23222 - https://github.com/whoforget/CVE-POC +CVE-2022-23222 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-23222 - https://github.com/wxrdnx/bpf_exploit_template CVE-2022-23222 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-23222 - https://github.com/xuetusummer/Penetration_Testing_POC @@ -126044,6 +126573,7 @@ CVE-2022-23940 - https://github.com/youwizard/CVE-POC CVE-2022-23940 - https://github.com/zecool/cve CVE-2022-23942 - https://github.com/karimhabush/cyberowl CVE-2022-23943 - https://github.com/ARPSyndicate/cvemon +CVE-2022-23943 - https://github.com/EzeTauil/Maquina-Upload CVE-2022-23943 - https://github.com/PierreChrd/py-projet-tut CVE-2022-23943 - https://github.com/Totes5706/TotesHTB CVE-2022-23943 - https://github.com/bioly230/THM_Skynet @@ -126543,6 +127073,7 @@ CVE-2022-24354 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2022-24354 - https://github.com/knd06/linux-kernel-exploitation CVE-2022-24354 - https://github.com/ndk191/linux-kernel-exploitation CVE-2022-24354 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2022-24354 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-24354 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-24355 - https://github.com/ARPSyndicate/cvemon CVE-2022-24355 - https://github.com/Tig3rHu/Awesome_IOT_Vul_lib @@ -127132,6 +127663,7 @@ CVE-2022-24891 - https://github.com/razermuse/enum_cvss CVE-2022-24893 - https://github.com/ARPSyndicate/cvemon CVE-2022-24893 - https://github.com/pokerfacett/MY_CVE_CREDIT CVE-2022-24899 - https://github.com/ARPSyndicate/kenzer-templates +CVE-2022-24899 - https://github.com/AggressiveUser/AggressiveUser CVE-2022-24900 - https://github.com/ARPSyndicate/kenzer-templates CVE-2022-24903 - https://github.com/ARPSyndicate/cvemon CVE-2022-24903 - https://github.com/EGI-Federation/SVG-advisories @@ -127908,6 +128440,7 @@ CVE-2022-25636 - https://github.com/CVEDB/top CVE-2022-25636 - https://github.com/Ch4nc3n/PublicExploitation CVE-2022-25636 - https://github.com/EGI-Federation/SVG-advisories CVE-2022-25636 - https://github.com/GhostTroops/TOP +CVE-2022-25636 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2022-25636 - https://github.com/JERRY123S/all-poc CVE-2022-25636 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2022-25636 - https://github.com/Meowmycks/OSCPprep-Cute @@ -127955,6 +128488,7 @@ CVE-2022-25636 - https://github.com/veritas501/CVE-2022-25636-PipeVersion CVE-2022-25636 - https://github.com/veritas501/pipe-primitive CVE-2022-25636 - https://github.com/weeka10/-hktalent-TOP CVE-2022-25636 - https://github.com/whoforget/CVE-POC +CVE-2022-25636 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-25636 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-25636 - https://github.com/xuetusummer/Penetration_Testing_POC CVE-2022-25636 - https://github.com/yaobinwen/robin_on_rails @@ -127979,6 +128513,7 @@ CVE-2022-25640 - https://github.com/youwizard/CVE-POC CVE-2022-25640 - https://github.com/zecool/cve CVE-2022-25647 - https://github.com/ARPSyndicate/cvemon CVE-2022-25647 - https://github.com/CGCL-codes/PHunter +CVE-2022-25647 - https://github.com/LibHunter/LibHunter CVE-2022-25647 - https://github.com/hinat0y/Dataset1 CVE-2022-25647 - https://github.com/hinat0y/Dataset10 CVE-2022-25647 - https://github.com/hinat0y/Dataset11 @@ -128005,6 +128540,7 @@ CVE-2022-25757 - https://github.com/ARPSyndicate/cvemon CVE-2022-25757 - https://github.com/leveryd/go-sec-code CVE-2022-25758 - https://github.com/seal-community/patches CVE-2022-25761 - https://github.com/claroty/opcua-exploit-framework +CVE-2022-25762 - https://github.com/versio-io/product-lifecycle-security-api CVE-2022-25765 - https://github.com/ARPSyndicate/cvemon CVE-2022-25765 - https://github.com/Anogota/Precious- CVE-2022-25765 - https://github.com/Atsukoro1/PDFKitExploit @@ -128086,6 +128622,7 @@ CVE-2022-25845 - https://github.com/trhacknon/Pocingit CVE-2022-25845 - https://github.com/whoforget/CVE-POC CVE-2022-25845 - https://github.com/youwizard/CVE-POC CVE-2022-25845 - https://github.com/zecool/cve +CVE-2022-2585 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2022-2585 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2022-2585 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2022-2585 - https://github.com/greek0x0/2022-LPE-UAF @@ -128104,6 +128641,7 @@ CVE-2022-25858 - https://github.com/ARPSyndicate/cvemon CVE-2022-25858 - https://github.com/Naruse-developer/Miku_Theme CVE-2022-25858 - https://github.com/Naruse-developer/Warframe_theme CVE-2022-2586 - https://github.com/ARPSyndicate/cvemon +CVE-2022-2586 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2022-2586 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2022-2586 - https://github.com/NaInSec/CVE-PoC-in-GitHub CVE-2022-2586 - https://github.com/Snoopy-Sec/Localroot-ALL-CVE @@ -128129,6 +128667,7 @@ CVE-2022-2586 - https://github.com/sniper404ghostxploit/CVE-2022-2586 CVE-2022-2586 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2022-2586 - https://github.com/substing/internal_ctf CVE-2022-2586 - https://github.com/whoforget/CVE-POC +CVE-2022-2586 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-2586 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-2586 - https://github.com/youwizard/CVE-POC CVE-2022-2586 - https://github.com/zecool/cve @@ -128160,6 +128699,7 @@ CVE-2022-2588 - https://github.com/Etoile1024/Pentest-Common-Knowledge CVE-2022-2588 - https://github.com/GhostTroops/TOP CVE-2022-2588 - https://github.com/Ha0-Y/LinuxKernelExploits CVE-2022-2588 - https://github.com/Ha0-Y/kernel-exploit-cve +CVE-2022-2588 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2022-2588 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2022-2588 - https://github.com/Markakd/CVE-2022-2588 CVE-2022-2588 - https://github.com/Markakd/DirtyCred @@ -128285,6 +128825,7 @@ CVE-2022-2601 - https://github.com/rhboot/shim-review CVE-2022-2601 - https://github.com/seal-community/patches CVE-2022-2601 - https://github.com/vathpela/shim-review CVE-2022-2602 - https://github.com/ARPSyndicate/cvemon +CVE-2022-2602 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2022-2602 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2022-2602 - https://github.com/LukeGix/CVE-2022-2602 CVE-2022-2602 - https://github.com/Mr-xn/Penetration_Testing_POC @@ -128309,6 +128850,7 @@ CVE-2022-2602 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2022-2602 - https://github.com/th3-5had0w/CVE-2022-2602-Study CVE-2022-2602 - https://github.com/wechicken456/Linux-kernel CVE-2022-2602 - https://github.com/whoforget/CVE-POC +CVE-2022-2602 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-2602 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-2602 - https://github.com/youwizard/CVE-POC CVE-2022-26049 - https://github.com/ARPSyndicate/cvemon @@ -128470,6 +129012,7 @@ CVE-2022-26134 - https://github.com/dabaibuai/dabai CVE-2022-26134 - https://github.com/demining/Log4j-Vulnerability CVE-2022-26134 - https://github.com/e-hakson/OSCP CVE-2022-26134 - https://github.com/eljosep/OSCP-Guide +CVE-2022-26134 - https://github.com/enomothem/PenTestNote CVE-2022-26134 - https://github.com/f4yd4-s3c/cve-2022-26134 CVE-2022-26134 - https://github.com/getastra/hypejab CVE-2022-26134 - https://github.com/getdrive/PoC @@ -128702,6 +129245,7 @@ CVE-2022-26171 - https://github.com/nu11secur1ty/CVE-nu11secur1ty CVE-2022-26171 - https://github.com/nu11secur1ty/Windows10Exploits CVE-2022-2618 - https://github.com/ARPSyndicate/cvemon CVE-2022-26180 - https://github.com/ARPSyndicate/cvemon +CVE-2022-26180 - https://github.com/AggressiveUser/AggressiveUser CVE-2022-26186 - https://github.com/ARPSyndicate/cvemon CVE-2022-26186 - https://github.com/ExploitPwner/Totolink-CVE-2022-Exploits CVE-2022-26201 - https://github.com/ARPSyndicate/cvemon @@ -128843,6 +129387,7 @@ CVE-2022-26373 - https://github.com/ARPSyndicate/cvemon CVE-2022-26377 - https://github.com/ARPSyndicate/cvemon CVE-2022-26377 - https://github.com/Awrrays/FrameVul CVE-2022-26377 - https://github.com/ByteXenon/IP-Security-Database +CVE-2022-26377 - https://github.com/EzeTauil/Maquina-Upload CVE-2022-26377 - https://github.com/Totes5706/TotesHTB CVE-2022-26377 - https://github.com/bioly230/THM_Skynet CVE-2022-26377 - https://github.com/firatesatoglu/shodanSearch @@ -128854,6 +129399,7 @@ CVE-2022-2639 - https://github.com/0day404/vulnerability-poc CVE-2022-2639 - https://github.com/20142995/sectool CVE-2022-2639 - https://github.com/ARPSyndicate/cvemon CVE-2022-2639 - https://github.com/EkamSinghWalia/Detection-and-Mitigation-for-CVE-2022-2639 +CVE-2022-2639 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2022-2639 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2022-2639 - https://github.com/KayCHENvip/vulnerability-poc CVE-2022-2639 - https://github.com/Miraitowa70/POC-Notes @@ -129575,6 +130121,7 @@ CVE-2022-27254 - https://github.com/weeka10/-hktalent-TOP CVE-2022-27254 - https://github.com/whoforget/CVE-POC CVE-2022-27254 - https://github.com/youwizard/CVE-POC CVE-2022-27254 - https://github.com/zecool/cve +CVE-2022-27255 - https://github.com/0xMarcio/cve CVE-2022-27255 - https://github.com/ARPSyndicate/cvemon CVE-2022-27255 - https://github.com/CVEDB/PoC-List CVE-2022-27255 - https://github.com/CVEDB/awesome-cve-repo @@ -129845,6 +130392,7 @@ CVE-2022-27666 - https://github.com/CVEDB/awesome-cve-repo CVE-2022-27666 - https://github.com/CVEDB/top CVE-2022-27666 - https://github.com/Ch4nc3n/PublicExploitation CVE-2022-27666 - https://github.com/GhostTroops/TOP +CVE-2022-27666 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2022-27666 - https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation CVE-2022-27666 - https://github.com/JERRY123S/all-poc CVE-2022-27666 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits @@ -129878,6 +130426,7 @@ CVE-2022-27666 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2022-27666 - https://github.com/trhacknon/Pocingit CVE-2022-27666 - https://github.com/weeka10/-hktalent-TOP CVE-2022-27666 - https://github.com/whoforget/CVE-POC +CVE-2022-27666 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-27666 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-27666 - https://github.com/xuetusummer/Penetration_Testing_POC CVE-2022-27666 - https://github.com/youwizard/CVE-POC @@ -130330,6 +130879,7 @@ CVE-2022-2833 - https://github.com/5angjun/5angjun CVE-2022-2833 - https://github.com/ARPSyndicate/cvemon CVE-2022-28330 - https://github.com/8ctorres/SIND-Practicas CVE-2022-28330 - https://github.com/ARPSyndicate/cvemon +CVE-2022-28330 - https://github.com/EzeTauil/Maquina-Upload CVE-2022-28330 - https://github.com/firatesatoglu/shodanSearch CVE-2022-28330 - https://github.com/kasem545/vulnsearch CVE-2022-28331 - https://github.com/ARPSyndicate/cvemon @@ -130636,12 +131186,14 @@ CVE-2022-28607 - https://github.com/k0imet/pyfetch CVE-2022-2861 - https://github.com/karimhabush/cyberowl CVE-2022-28614 - https://github.com/8ctorres/SIND-Practicas CVE-2022-28614 - https://github.com/ARPSyndicate/cvemon +CVE-2022-28614 - https://github.com/EzeTauil/Maquina-Upload CVE-2022-28614 - https://github.com/Totes5706/TotesHTB CVE-2022-28614 - https://github.com/bioly230/THM_Skynet CVE-2022-28614 - https://github.com/firatesatoglu/shodanSearch CVE-2022-28614 - https://github.com/kasem545/vulnsearch CVE-2022-28615 - https://github.com/8ctorres/SIND-Practicas CVE-2022-28615 - https://github.com/ARPSyndicate/cvemon +CVE-2022-28615 - https://github.com/EzeTauil/Maquina-Upload CVE-2022-28615 - https://github.com/Totes5706/TotesHTB CVE-2022-28615 - https://github.com/bioly230/THM_Skynet CVE-2022-28615 - https://github.com/firatesatoglu/shodanSearch @@ -131318,6 +131870,7 @@ CVE-2022-29399 - https://github.com/ARPSyndicate/cvemon CVE-2022-29399 - https://github.com/d1tto/IoT-vuln CVE-2022-29404 - https://github.com/8ctorres/SIND-Practicas CVE-2022-29404 - https://github.com/ARPSyndicate/cvemon +CVE-2022-29404 - https://github.com/EzeTauil/Maquina-Upload CVE-2022-29404 - https://github.com/Totes5706/TotesHTB CVE-2022-29404 - https://github.com/bioly230/THM_Skynet CVE-2022-29404 - https://github.com/firatesatoglu/shodanSearch @@ -131367,6 +131920,7 @@ CVE-2022-2946 - https://github.com/ARPSyndicate/cvemon CVE-2022-2946 - https://github.com/ExpLangcn/FuYao-Go CVE-2022-29464 - https://github.com/0day404/vulnerability-poc CVE-2022-29464 - https://github.com/0xAgun/CVE-2022-29464 +CVE-2022-29464 - https://github.com/0xMarcio/cve CVE-2022-29464 - https://github.com/20142995/Goby CVE-2022-29464 - https://github.com/20142995/pocsuite3 CVE-2022-29464 - https://github.com/2lambda123/panopticon-unattributed @@ -131585,6 +132139,7 @@ CVE-2022-29582 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2022-29582 - https://github.com/tr3ss/gofetch CVE-2022-29582 - https://github.com/trhacknon/Pocingit CVE-2022-29582 - https://github.com/whoforget/CVE-POC +CVE-2022-29582 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-29582 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-29582 - https://github.com/youwizard/CVE-POC CVE-2022-29582 - https://github.com/zecool/cve @@ -131877,6 +132432,7 @@ CVE-2022-30065 - https://github.com/stkcat/awe-base-images CVE-2022-30067 - https://github.com/ARPSyndicate/cvemon CVE-2022-30067 - https://github.com/Tonaram/DSS-BufferOverflow CVE-2022-30073 - https://github.com/ARPSyndicate/kenzer-templates +CVE-2022-30075 - https://github.com/0xMarcio/cve CVE-2022-30075 - https://github.com/ARPSyndicate/cvemon CVE-2022-30075 - https://github.com/CVEDB/awesome-cve-repo CVE-2022-30075 - https://github.com/CVEDB/top @@ -132456,6 +133012,7 @@ CVE-2022-30552 - https://github.com/ARPSyndicate/cvemon CVE-2022-30552 - https://github.com/H4lo/awesome-IoT-security-article CVE-2022-30556 - https://github.com/8ctorres/SIND-Practicas CVE-2022-30556 - https://github.com/ARPSyndicate/cvemon +CVE-2022-30556 - https://github.com/EzeTauil/Maquina-Upload CVE-2022-30556 - https://github.com/Totes5706/TotesHTB CVE-2022-30556 - https://github.com/bioly230/THM_Skynet CVE-2022-30556 - https://github.com/firatesatoglu/shodanSearch @@ -133364,6 +133921,7 @@ CVE-2022-31806 - https://github.com/ARPSyndicate/cvemon CVE-2022-31806 - https://github.com/ic3sw0rd/Codesys_V2_Vulnerability CVE-2022-31813 - https://github.com/8ctorres/SIND-Practicas CVE-2022-31813 - https://github.com/ARPSyndicate/cvemon +CVE-2022-31813 - https://github.com/EzeTauil/Maquina-Upload CVE-2022-31813 - https://github.com/Totes5706/TotesHTB CVE-2022-31813 - https://github.com/bioly230/THM_Skynet CVE-2022-31813 - https://github.com/firatesatoglu/shodanSearch @@ -133700,6 +134258,7 @@ CVE-2022-32239 - https://github.com/Live-Hack-CVE/CVE-2022-32239 CVE-2022-32250 - https://github.com/ARPSyndicate/cvemon CVE-2022-32250 - https://github.com/Decstor5/2022-32250LPE CVE-2022-32250 - https://github.com/EGI-Federation/SVG-advisories +CVE-2022-32250 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2022-32250 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2022-32250 - https://github.com/Mr-xn/Penetration_Testing_POC CVE-2022-32250 - https://github.com/NaInSec/CVE-PoC-in-GitHub @@ -133728,6 +134287,7 @@ CVE-2022-32250 - https://github.com/substing/internal_ctf CVE-2022-32250 - https://github.com/theori-io/CVE-2022-32250-exploit CVE-2022-32250 - https://github.com/trhacknon/Pocingit CVE-2022-32250 - https://github.com/whoforget/CVE-POC +CVE-2022-32250 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-32250 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-32250 - https://github.com/xuetusummer/Penetration_Testing_POC CVE-2022-32250 - https://github.com/youwizard/CVE-POC @@ -134427,6 +134987,7 @@ CVE-2022-34265 - https://github.com/lions2012/Penetration_Testing_POC CVE-2022-34265 - https://github.com/manas3c/CVE-POC CVE-2022-34265 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2022-34265 - https://github.com/qwqoro/GPN-Hackathon +CVE-2022-34265 - https://github.com/seal-community/patches CVE-2022-34265 - https://github.com/simonepetruzzi/WebSecurityProject CVE-2022-34265 - https://github.com/t0m4too/t0m4to CVE-2022-34265 - https://github.com/traumatising/CVE-2022-34265 @@ -134703,11 +135264,13 @@ CVE-2022-34913 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2022-34913 - https://github.com/skinnyrad/Trophies CVE-2022-34913 - https://github.com/whoforget/CVE-POC CVE-2022-34913 - https://github.com/youwizard/CVE-POC +CVE-2022-34918 - https://github.com/0xMarcio/cve CVE-2022-34918 - https://github.com/0xStrygwyr/OSCP-Guide CVE-2022-34918 - https://github.com/0xZipp0/OSCP CVE-2022-34918 - https://github.com/0xsyr0/OSCP CVE-2022-34918 - https://github.com/20142995/sectool CVE-2022-34918 - https://github.com/ARPSyndicate/cvemon +CVE-2022-34918 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2022-34918 - https://github.com/IdanBanani/ELF-Injection-Shellcode-Bridgehead CVE-2022-34918 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits CVE-2022-34918 - https://github.com/Ly0nt4r/OSCP @@ -134757,6 +135320,7 @@ CVE-2022-34918 - https://github.com/trhacknon/Pocingit CVE-2022-34918 - https://github.com/txuswashere/OSCP CVE-2022-34918 - https://github.com/veritas501/CVE-2022-34918 CVE-2022-34918 - https://github.com/whoforget/CVE-POC +CVE-2022-34918 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-34918 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-34918 - https://github.com/xhref/OSCP CVE-2022-34918 - https://github.com/xuetusummer/Penetration_Testing_POC @@ -135673,6 +136237,7 @@ CVE-2022-36350 - https://github.com/karimhabush/cyberowl CVE-2022-36358 - https://github.com/karimhabush/cyberowl CVE-2022-36359 - https://github.com/ARPSyndicate/cvemon CVE-2022-36359 - https://github.com/motoyasu-saburi/reported_vulnerability +CVE-2022-36359 - https://github.com/seal-community/patches CVE-2022-36361 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2022-36362 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2022-36363 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -135822,6 +136387,7 @@ CVE-2022-36752 - https://github.com/skinnyrad/Trophies CVE-2022-36752 - https://github.com/whoforget/CVE-POC CVE-2022-36752 - https://github.com/youwizard/CVE-POC CVE-2022-36760 - https://github.com/ARPSyndicate/cvemon +CVE-2022-36760 - https://github.com/EzeTauil/Maquina-Upload CVE-2022-36760 - https://github.com/bioly230/THM_Skynet CVE-2022-36760 - https://github.com/firatesatoglu/shodanSearch CVE-2022-36760 - https://github.com/karimhabush/cyberowl @@ -136269,6 +136835,7 @@ CVE-2022-37434 - https://github.com/youwizard/CVE-POC CVE-2022-37434 - https://github.com/zecool/cve CVE-2022-37436 - https://github.com/8ctorres/SIND-Practicas CVE-2022-37436 - https://github.com/ARPSyndicate/cvemon +CVE-2022-37436 - https://github.com/EzeTauil/Maquina-Upload CVE-2022-37436 - https://github.com/bioly230/THM_Skynet CVE-2022-37436 - https://github.com/firatesatoglu/shodanSearch CVE-2022-37436 - https://github.com/karimhabush/cyberowl @@ -137201,6 +137768,7 @@ CVE-2022-39944 - https://github.com/yycunhua/4ra1n CVE-2022-39947 - https://github.com/Threekiii/CVE CVE-2022-39950 - https://github.com/Live-Hack-CVE/CVE-2022-39950 CVE-2022-39951 - https://github.com/karimhabush/cyberowl +CVE-2022-39952 - https://github.com/0xMarcio/cve CVE-2022-39952 - https://github.com/1f3lse/taiE CVE-2022-39952 - https://github.com/ARPSyndicate/cvemon CVE-2022-39952 - https://github.com/ARPSyndicate/kenzer-templates @@ -137552,6 +138120,7 @@ CVE-2022-40674 - https://github.com/whoforget/CVE-POC CVE-2022-40674 - https://github.com/youwizard/CVE-POC CVE-2022-40676 - https://github.com/karimhabush/cyberowl CVE-2022-40684 - https://github.com/0day404/vulnerability-poc +CVE-2022-40684 - https://github.com/0xMarcio/cve CVE-2022-40684 - https://github.com/20142995/sectool CVE-2022-40684 - https://github.com/ARPSyndicate/cvemon CVE-2022-40684 - https://github.com/ARPSyndicate/kenzer-templates @@ -137744,6 +138313,7 @@ CVE-2022-4096 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2022-40975 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2022-40982 - https://github.com/EGI-Federation/SVG-advisories CVE-2022-40982 - https://github.com/bcoles/kasld +CVE-2022-40982 - https://github.com/codexlynx/hardware-attacks-state-of-the-art CVE-2022-40982 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2022-40982 - https://github.com/giterlizzi/secdb-feeds CVE-2022-40982 - https://github.com/hughsie/python-uswid @@ -137978,6 +138548,7 @@ CVE-2022-41218 - https://github.com/ndk191/linux-kernel-exploitation CVE-2022-41218 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2022-41218 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2022-41218 - https://github.com/whoforget/CVE-POC +CVE-2022-41218 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-41218 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-41218 - https://github.com/youwizard/CVE-POC CVE-2022-41218 - https://github.com/zecool/cve @@ -138496,6 +139067,7 @@ CVE-2022-42252 - https://github.com/ARPSyndicate/cvemon CVE-2022-42252 - https://github.com/fernandoreb/dependency-check-springboot CVE-2022-42252 - https://github.com/sr-monika/sprint-rest CVE-2022-42252 - https://github.com/tanjiti/sec_profile +CVE-2022-42252 - https://github.com/versio-io/product-lifecycle-security-api CVE-2022-4230 - https://github.com/ARPSyndicate/cvemon CVE-2022-42330 - https://github.com/karimhabush/cyberowl CVE-2022-42331 - https://github.com/ARPSyndicate/cvemon @@ -138579,6 +139151,7 @@ CVE-2022-42703 - https://github.com/pray77/CVE-2023-3640 CVE-2022-42703 - https://github.com/pray77/SCTF2023_kernelpwn CVE-2022-42703 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2022-42703 - https://github.com/veritas501/hbp_attack_demo +CVE-2022-42703 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-42703 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-42710 - https://github.com/fardeen-ahmed/Bug-bounty-Writeups CVE-2022-42710 - https://github.com/rootxyash/learn365days @@ -138708,6 +139281,7 @@ CVE-2022-42889 - https://github.com/Threekiii/Awesome-POC CVE-2022-42889 - https://github.com/Vamckis/Container-Security CVE-2022-42889 - https://github.com/Vulnmachines/text4shell-CVE-2022-42889 CVE-2022-42889 - https://github.com/WFS-Mend/vtrade-common +CVE-2022-42889 - https://github.com/Whoopsunix/PPPVULNS CVE-2022-42889 - https://github.com/XRSec/AWVS-Update CVE-2022-42889 - https://github.com/Y4tacker/JavaSec CVE-2022-42889 - https://github.com/aaronm-sysdig/text4shell-docker @@ -138795,6 +139369,7 @@ CVE-2022-42895 - https://github.com/khanhnd123/linux-kernel-exploitation CVE-2022-42895 - https://github.com/knd06/linux-kernel-exploitation CVE-2022-42895 - https://github.com/ndk191/linux-kernel-exploitation CVE-2022-42895 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2022-42895 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-42895 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-42896 - https://github.com/ARPSyndicate/cvemon CVE-2022-42896 - https://github.com/Satheesh575555/linux-4.19.72_CVE-2022-42896 @@ -138813,6 +139388,7 @@ CVE-2022-42896 - https://github.com/ndk191/linux-kernel-exploitation CVE-2022-42896 - https://github.com/nidhi7598/linux-4.1.15_CVE-2022-42896 CVE-2022-42896 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2022-42896 - https://github.com/ssr-111/linux-kernel-exploitation +CVE-2022-42896 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-42896 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-42898 - https://github.com/ARPSyndicate/cvemon CVE-2022-42898 - https://github.com/VeerMuchandi/s3c-springboot-demo @@ -139194,6 +139770,7 @@ CVE-2022-44268 - https://github.com/dai5z/LBAS CVE-2022-44268 - https://github.com/daniellemonika/CSCE-5552-Prying-Eyes CVE-2022-44268 - https://github.com/doyensec/imagemagick-security-policy-evaluator CVE-2022-44268 - https://github.com/duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC +CVE-2022-44268 - https://github.com/enomothem/PenTestNote CVE-2022-44268 - https://github.com/entr0pie/CVE-2022-44268 CVE-2022-44268 - https://github.com/fanbyprinciple/ImageMagick-lfi-poc CVE-2022-44268 - https://github.com/jnschaeffer/cve-2022-44268-detector @@ -139543,6 +140120,7 @@ CVE-2022-4543 - https://github.com/ndk191/linux-kernel-exploitation CVE-2022-4543 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2022-4543 - https://github.com/ssr-111/linux-kernel-exploitation CVE-2022-4543 - https://github.com/sunichi/cve-2022-4543-wrapper +CVE-2022-4543 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2022-4543 - https://github.com/xairy/linux-kernel-exploitation CVE-2022-45436 - https://github.com/ARPSyndicate/cvemon CVE-2022-45436 - https://github.com/damodarnaik/CVE-2022-45436 @@ -141475,6 +142053,7 @@ CVE-2023-2002 - https://github.com/hktalent/TOP CVE-2023-2002 - https://github.com/lrh2000/CVE-2023-2002 CVE-2023-2002 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-20020 - https://github.com/Live-Hack-CVE/CVE-2023-20020 +CVE-2023-20025 - https://github.com/CVEDB/awesome-cve-repo CVE-2023-20025 - https://github.com/lnversed/CVE-2023-20025 CVE-2023-20025 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-20028 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -141569,6 +142148,7 @@ CVE-2023-20198 - https://github.com/W01fh4cker/CVE-2023-20198-RCE CVE-2023-20198 - https://github.com/XRSec/AWVS-Update CVE-2023-20198 - https://github.com/ZephrFish/CVE-2023-20198-Checker CVE-2023-20198 - https://github.com/ZephrFish/Cisco-IOS-XE-Scanner +CVE-2023-20198 - https://github.com/aleff-github/aleff-github CVE-2023-20198 - https://github.com/aleff-github/my-flipper-shits CVE-2023-20198 - https://github.com/alekos3/CVE_2023_20198_Detector CVE-2023-20198 - https://github.com/alekos3/CVE_2023_20198_Remediator @@ -141636,6 +142216,7 @@ CVE-2023-20273 - https://github.com/H4lo/awesome-IoT-security-article CVE-2023-20273 - https://github.com/Ostorlab/KEV CVE-2023-20273 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors CVE-2023-20273 - https://github.com/Shadow0ps/CVE-2023-20198-Scanner +CVE-2023-20273 - https://github.com/aleff-github/aleff-github CVE-2023-20273 - https://github.com/aleff-github/my-flipper-shits CVE-2023-20273 - https://github.com/cadencejames/Check-HttpServerStatus CVE-2023-20273 - https://github.com/f1tao/awesome-iot-security-resource @@ -141688,6 +142269,7 @@ CVE-2023-20593 - https://github.com/sbaresearch/stop-zenbleed-win CVE-2023-20593 - https://github.com/speed47/spectre-meltdown-checker CVE-2023-20593 - https://github.com/w1redch4d/windowz2-bleed CVE-2023-20598 - https://github.com/hfiref0x/KDU +CVE-2023-20598 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-20634 - https://github.com/ARPSyndicate/cvemon CVE-2023-20634 - https://github.com/Resery/Resery CVE-2023-20635 - https://github.com/ARPSyndicate/cvemon @@ -142333,6 +142915,7 @@ CVE-2023-21837 - https://github.com/hktalent/CVE-2023-21837 CVE-2023-21837 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-21837 - https://github.com/thiscodecc/thiscodecc CVE-2023-21838 - https://github.com/r00t4dm/r00t4dm +CVE-2023-21839 - https://github.com/0xMarcio/cve CVE-2023-21839 - https://github.com/0xn0ne/simple-scanner CVE-2023-21839 - https://github.com/20142995/pocsuite3 CVE-2023-21839 - https://github.com/20142995/sectool @@ -142432,7 +143015,9 @@ CVE-2023-21979 - https://github.com/hktalent/TOP CVE-2023-21979 - https://github.com/trganda/starrlist CVE-2023-21980 - https://github.com/scmanjarrez/CVEScannerV2 CVE-2023-21987 - https://github.com/AtonceInventions/Hypervisor +CVE-2023-21987 - https://github.com/husseinmuhaisen/Hypervisor CVE-2023-21991 - https://github.com/AtonceInventions/Hypervisor +CVE-2023-21991 - https://github.com/husseinmuhaisen/Hypervisor CVE-2023-22006 - https://github.com/motoyasu-saburi/reported_vulnerability CVE-2023-2203 - https://github.com/em1ga3l/cve-publicationdate-extractor CVE-2023-2203222 - https://github.com/em1ga3l/cve-publicationdate-extractor @@ -142644,6 +143229,7 @@ CVE-2023-22527 - https://github.com/ReAbout/web-sec CVE-2023-22527 - https://github.com/RevoltSecurities/CVE-2023-22527 CVE-2023-22527 - https://github.com/Sudistark/patch-diff-CVE-2023-22527 CVE-2023-22527 - https://github.com/Threekiii/Awesome-POC +CVE-2023-22527 - https://github.com/Threekiii/Awesome-Redteam CVE-2023-22527 - https://github.com/Threekiii/CVE CVE-2023-22527 - https://github.com/Threekiii/Vulhub-Reproduce CVE-2023-22527 - https://github.com/Tropinene/Yscanner @@ -142968,6 +143554,7 @@ CVE-2023-23397 - https://github.com/abrahim7112/Vulnerability-checking-program-f CVE-2023-23397 - https://github.com/ahmedkhlief/CVE-2023-23397-POC CVE-2023-23397 - https://github.com/ahmedkhlief/CVE-2023-23397-POC-Using-Interop-Outlook CVE-2023-23397 - https://github.com/alecdhuse/Lantern-Shark +CVE-2023-23397 - https://github.com/aleff-github/aleff-github CVE-2023-23397 - https://github.com/aleff-github/my-flipper-shits CVE-2023-23397 - https://github.com/alicangnll/CVE-2023-23397 CVE-2023-23397 - https://github.com/alsaeroth/CVE-2023-23397-POC @@ -143128,6 +143715,7 @@ CVE-2023-23576 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-23583 - https://github.com/EGI-Federation/SVG-advisories CVE-2023-23583 - https://github.com/Mav3r1ck0x1/CVE-2023-23583-Reptar- CVE-2023-23583 - https://github.com/blazcode/INTEL-SA-00950 +CVE-2023-23583 - https://github.com/codexlynx/hardware-attacks-state-of-the-art CVE-2023-23583 - https://github.com/giterlizzi/secdb-feeds CVE-2023-23583 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-23583 - https://github.com/speed47/spectre-meltdown-checker @@ -143138,6 +143726,7 @@ CVE-2023-23590 - https://github.com/VulnTotal-Team/Vehicle-Security CVE-2023-23590 - https://github.com/VulnTotal-Team/vehicle_cves CVE-2023-23595 - https://github.com/ARPSyndicate/cvemon CVE-2023-23595 - https://github.com/colemanjp/XXE-Vulnerability-in-Bluecat-Device-Registration-Portal-DRP +CVE-2023-23607 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-23614 - https://github.com/4n4nk3/4n4nk3 CVE-2023-23614 - https://github.com/ARPSyndicate/cvemon CVE-2023-23618 - https://github.com/9069332997/session-1-full-stack @@ -143203,6 +143792,7 @@ CVE-2023-23752 - https://github.com/Archan6el/Devvortex-Writeup-HackTheBox CVE-2023-23752 - https://github.com/BearClaw96/Joomla-v4.x-Unauthenticated-information-disclosure CVE-2023-23752 - https://github.com/BugBlocker/lotus-scripts CVE-2023-23752 - https://github.com/C1ph3rX13/CVE-2023-23752 +CVE-2023-23752 - https://github.com/CLincat/vulcat CVE-2023-23752 - https://github.com/CVEDB/PoC-List CVE-2023-23752 - https://github.com/CVEDB/awesome-cve-repo CVE-2023-23752 - https://github.com/CVEDB/top @@ -143554,6 +144144,7 @@ CVE-2023-24573 - https://github.com/ARPSyndicate/cvemon CVE-2023-24573 - https://github.com/ycdxsb/ycdxsb CVE-2023-2458 - https://github.com/zhchbin/zhchbin CVE-2023-24580 - https://github.com/ARPSyndicate/cvemon +CVE-2023-24580 - https://github.com/seal-community/patches CVE-2023-24609 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-24610 - https://github.com/abbisQQ/CVE-2023-24610 CVE-2023-24610 - https://github.com/hktalent/TOP @@ -143710,6 +144301,7 @@ CVE-2023-25143 - https://github.com/dlehgus1023/dlehgus1023 CVE-2023-25152 - https://github.com/ARPSyndicate/cvemon CVE-2023-25157 - https://github.com/0x2458bughunt/CVE-2023-25157 CVE-2023-25157 - https://github.com/0x783kb/Security-operation-book +CVE-2023-25157 - https://github.com/0xMarcio/cve CVE-2023-25157 - https://github.com/20142995/sectool CVE-2023-25157 - https://github.com/7imbitz/CVE-2023-25157-checker CVE-2023-25157 - https://github.com/Awrrays/FrameVul @@ -143872,6 +144464,7 @@ CVE-2023-25690 - https://github.com/ARPSyndicate/cvemon CVE-2023-25690 - https://github.com/CVEDB/awesome-cve-repo CVE-2023-25690 - https://github.com/CVEDB/top CVE-2023-25690 - https://github.com/EGI-Federation/SVG-advisories +CVE-2023-25690 - https://github.com/EzeTauil/Maquina-Upload CVE-2023-25690 - https://github.com/GGontijo/CTF-s CVE-2023-25690 - https://github.com/GhostTroops/TOP CVE-2023-25690 - https://github.com/H4lo/awesome-IoT-security-article @@ -144157,6 +144750,7 @@ CVE-2023-26396 - https://github.com/kohnakagawa/kohnakagawa CVE-2023-2640 - https://github.com/0xWhoami35/root-kernel CVE-2023-2640 - https://github.com/0xsyr0/OSCP CVE-2023-2640 - https://github.com/Ev3rPalestine/Analytics-HTB-Walkthrough +CVE-2023-2640 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2023-2640 - https://github.com/K5LK/CVE-2023-2640-32629 CVE-2023-2640 - https://github.com/Kiosec/Linux-Exploitation CVE-2023-2640 - https://github.com/Nkipohcs/CVE-2023-2640-CVE-2023-32629 @@ -144553,6 +145147,7 @@ CVE-2023-27502 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-2752 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-27520 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-27522 - https://github.com/ARPSyndicate/cvemon +CVE-2023-27522 - https://github.com/EzeTauil/Maquina-Upload CVE-2023-27522 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-27522 - https://github.com/xonoxitron/cpe2cve CVE-2023-27524 - https://github.com/0day404/vulnerability-poc @@ -144920,6 +145515,7 @@ CVE-2023-2825 - https://github.com/johe123qwe/github-trending CVE-2023-2825 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-28250 - https://github.com/BenjiTrapp/cisa-known-vuln-scraper CVE-2023-28250 - https://github.com/BenjiTrapp/cve-prio-marble +CVE-2023-28252 - https://github.com/0xMarcio/cve CVE-2023-28252 - https://github.com/726232111/CVE-2023-28252 CVE-2023-28252 - https://github.com/ARPSyndicate/cvemon CVE-2023-28252 - https://github.com/CVEDB/awesome-cve-repo @@ -145179,6 +145775,7 @@ CVE-2023-28708 - https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh CVE-2023-28708 - https://github.com/fernandoreb/dependency-check-springboot CVE-2023-28708 - https://github.com/scordero1234/java_sec_demo-main CVE-2023-28708 - https://github.com/trganda/dockerv +CVE-2023-28708 - https://github.com/versio-io/product-lifecycle-security-api CVE-2023-28709 - https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh CVE-2023-28709 - https://github.com/seal-community/patches CVE-2023-2871 - https://github.com/zeze-zeze/WindowsKernelVuln @@ -145388,6 +145985,7 @@ CVE-2023-29343 - https://github.com/johe123qwe/github-trending CVE-2023-29343 - https://github.com/lions2012/Penetration_Testing_POC CVE-2023-29343 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-29345 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-29357 - https://github.com/0xMarcio/cve CVE-2023-29357 - https://github.com/CVEDB/awesome-cve-repo CVE-2023-29357 - https://github.com/CVEDB/top CVE-2023-29357 - https://github.com/Chocapikk/CVE-2023-29357 @@ -145406,6 +146004,9 @@ CVE-2023-29357 - https://github.com/netlas-io/netlas-dorks CVE-2023-29357 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-29357 - https://github.com/tanjiti/sec_profile CVE-2023-29357 - https://github.com/whitfieldsdad/cisa_kev +CVE-2023-29360 - https://github.com/CVEDB/awesome-cve-repo +CVE-2023-29360 - https://github.com/CVEDB/top +CVE-2023-29360 - https://github.com/GhostTroops/TOP CVE-2023-29360 - https://github.com/Nero22k/cve-2023-29360 CVE-2023-29360 - https://github.com/Ostorlab/KEV CVE-2023-29360 - https://github.com/cvefeed/cvefeed.io @@ -145854,6 +146455,7 @@ CVE-2023-31070 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-31071 - https://github.com/hackintoanetwork/hackintoanetwork CVE-2023-31072 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-31099 - https://github.com/tanjiti/sec_profile +CVE-2023-31122 - https://github.com/EzeTauil/Maquina-Upload CVE-2023-31122 - https://github.com/arsenalzp/apch-operator CVE-2023-31122 - https://github.com/klemakle/audit-pentest-BOX CVE-2023-31122 - https://github.com/xonoxitron/cpe2cve @@ -146139,6 +146741,7 @@ CVE-2023-32173 - https://github.com/0vercl0k/pwn2own2023-miami CVE-2023-32174 - https://github.com/0vercl0k/pwn2own2023-miami CVE-2023-32175 - https://github.com/dhn/dhn CVE-2023-32183 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-32191 - https://github.com/tanjiti/sec_profile CVE-2023-3221 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-32219 - https://github.com/1-tong/vehicle_cves CVE-2023-32219 - https://github.com/Vu1nT0tal/Vehicle-Security @@ -146378,6 +146981,7 @@ CVE-2023-32623 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-32629 - https://github.com/0xWhoami35/root-kernel CVE-2023-32629 - https://github.com/0xsyr0/OSCP CVE-2023-32629 - https://github.com/Ev3rPalestine/Analytics-HTB-Walkthrough +CVE-2023-32629 - https://github.com/HaxorSecInfec/autoroot.sh CVE-2023-32629 - https://github.com/K5LK/CVE-2023-2640-32629 CVE-2023-32629 - https://github.com/Kiosec/Linux-Exploitation CVE-2023-32629 - https://github.com/Nkipohcs/CVE-2023-2640-CVE-2023-32629 @@ -146581,6 +147185,7 @@ CVE-2023-33101 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-33103 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-33104 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-33105 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-33105 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-33106 - https://github.com/Ostorlab/KEV CVE-2023-33106 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors CVE-2023-33106 - https://github.com/RENANZG/My-Forensics @@ -146818,6 +147423,7 @@ CVE-2023-33676 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-33677 - https://github.com/ASR511-OO7/CVE-2023-33677 CVE-2023-33677 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-33677 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2023-33693 - https://github.com/ernestang98/win-exploits CVE-2023-33725 - https://github.com/Contrast-Security-OSS/Burptrast CVE-2023-33725 - https://github.com/demomm/burptrast CVE-2023-33730 - https://github.com/nomi-sec/PoC-in-GitHub @@ -147095,6 +147701,7 @@ CVE-2023-34330 - https://github.com/chnzzh/Redfish-CVE-lib CVE-2023-3434 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-34349 - https://github.com/another1024/another1024 CVE-2023-34355 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-34362 - https://github.com/0xMarcio/cve CVE-2023-34362 - https://github.com/0xdead8ead-randori/cve_search_msf CVE-2023-34362 - https://github.com/ARPSyndicate/cvemon CVE-2023-34362 - https://github.com/BenjiTrapp/cisa-known-vuln-scraper @@ -147387,6 +147994,7 @@ CVE-2023-35132 - https://github.com/kip93/kip93 CVE-2023-35133 - https://github.com/kip93/kip93 CVE-2023-3514 - https://github.com/star-sg/CVE CVE-2023-3515 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-3519 - https://github.com/0xMarcio/cve CVE-2023-3519 - https://github.com/Aicks/Citrix-CVE-2023-3519 CVE-2023-3519 - https://github.com/BishopFox/CVE-2023-3519 CVE-2023-3519 - https://github.com/CVEDB/awesome-cve-repo @@ -147849,6 +148457,7 @@ CVE-2023-36728 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-3673 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-36735 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-36741 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-36745 - https://github.com/0xMarcio/cve CVE-2023-36745 - https://github.com/CVEDB/awesome-cve-repo CVE-2023-36745 - https://github.com/CVEDB/top CVE-2023-36745 - https://github.com/GhostTroops/TOP @@ -148000,6 +148609,7 @@ CVE-2023-36884 - https://github.com/Maxwitat/CVE-2023-36884-Scripts-for-Intune-R CVE-2023-36884 - https://github.com/Ostorlab/KEV CVE-2023-36884 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors CVE-2023-36884 - https://github.com/ToddMaxey/CVE-2023-36884 +CVE-2023-36884 - https://github.com/aleff-github/aleff-github CVE-2023-36884 - https://github.com/aleff-github/my-flipper-shits CVE-2023-36884 - https://github.com/bkzk/cisco-email-filters CVE-2023-36884 - https://github.com/deepinstinct/Storm0978-RomCom-Campaign @@ -148562,6 +149172,7 @@ CVE-2023-38545 - https://github.com/dbrugman/CVE-2023-38545-POC CVE-2023-38545 - https://github.com/fatmo666/CVE-2023-38545-libcurl-SOCKS5-heap-buffer-overflow CVE-2023-38545 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-38545 - https://github.com/imfht/CVE-2023-38545 +CVE-2023-38545 - https://github.com/industrial-edge/iih-essentials-development-kit CVE-2023-38545 - https://github.com/izj007/wechat CVE-2023-38545 - https://github.com/kherrick/lobsters CVE-2023-38545 - https://github.com/malinkamedok/devops_sandbox @@ -148573,6 +149184,7 @@ CVE-2023-38545 - https://github.com/vanigori/CVE-2023-38545-sample CVE-2023-38545 - https://github.com/whoami13apt/files2 CVE-2023-38546 - https://github.com/alex-grandson/docker-python-example CVE-2023-38546 - https://github.com/fokypoky/places-list +CVE-2023-38546 - https://github.com/industrial-edge/iih-essentials-development-kit CVE-2023-38546 - https://github.com/malinkamedok/devops_sandbox CVE-2023-38546 - https://github.com/testing-felickz/docker-scout-demo CVE-2023-3855 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -149037,6 +149649,7 @@ CVE-2023-39807 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-39808 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-39809 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-39848 - https://github.com/AS-Mend-RenovateEE/RenovateEEDVWA +CVE-2023-39848 - https://github.com/Abhitejabodapati/DVWA-SAST CVE-2023-39848 - https://github.com/Blake384/DVWA CVE-2023-39848 - https://github.com/BrunoiMesquita/DAMN-VULNERABLE-PHP-WEB-APPLICATION CVE-2023-39848 - https://github.com/Bulnick/SCode @@ -149048,6 +149661,7 @@ CVE-2023-39848 - https://github.com/HMPDocker/hmpdockertp CVE-2023-39848 - https://github.com/HowAreYouChristian/crs CVE-2023-39848 - https://github.com/HycCodeQL/DVWA CVE-2023-39848 - https://github.com/Iamishfaq07/DVWA +CVE-2023-39848 - https://github.com/Jackbling/DVWA CVE-2023-39848 - https://github.com/Jun1u2/TestGR CVE-2023-39848 - https://github.com/Kir-Scheluh/SSDLC-lab4-test CVE-2023-39848 - https://github.com/LenninPeren/PruebaDVWA @@ -149066,6 +149680,8 @@ CVE-2023-39848 - https://github.com/SCMOnboard100/Synergistic-Steel-Table CVE-2023-39848 - https://github.com/Security-Test-Account/DVWA CVE-2023-39848 - https://github.com/ShrutikaNakhale/DVWA2 CVE-2023-39848 - https://github.com/Slon12jr/DVWA +CVE-2023-39848 - https://github.com/TINNI-Lal/DVWA +CVE-2023-39848 - https://github.com/Yahyazaizi/application-test-security CVE-2023-39848 - https://github.com/Zahidkhan1221/DWVA CVE-2023-39848 - https://github.com/andersongodoy/DVWA-CORRIGIDO CVE-2023-39848 - https://github.com/asmendio/RenovateEETest @@ -149293,6 +149909,7 @@ CVE-2023-40370 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-4039 - https://github.com/GrigGM/05-virt-04-docker-hw CVE-2023-4039 - https://github.com/bollwarm/SecToolSet CVE-2023-4039 - https://github.com/fokypoky/places-list +CVE-2023-4039 - https://github.com/m-pasima/CI-CD-Security-image-scan CVE-2023-40403 - https://github.com/dlehgus1023/dlehgus1023 CVE-2023-4041 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-4042 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -149318,11 +149935,16 @@ CVE-2023-40537 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-40542 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-40544 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-40546 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-40546 - https://github.com/seal-community/patches CVE-2023-40547 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-40547 - https://github.com/seal-community/patches CVE-2023-40548 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-40549 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-40549 - https://github.com/seal-community/patches CVE-2023-40550 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-40550 - https://github.com/seal-community/patches CVE-2023-40551 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-40551 - https://github.com/seal-community/patches CVE-2023-40556 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-40570 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-40571 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -149518,6 +150140,7 @@ CVE-2023-41128 - https://github.com/parkttule/parkttule CVE-2023-41131 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-41136 - https://github.com/parkttule/parkttule CVE-2023-41164 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-41164 - https://github.com/seal-community/patches CVE-2023-41174 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-41179 - https://github.com/MiracleAnameke/Cybersecurity-Vulnerability-and-Exposure-Report CVE-2023-41179 - https://github.com/Ostorlab/KEV @@ -149904,9 +150527,11 @@ CVE-2023-42308 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-42320 - https://github.com/aixiao0621/Tenda CVE-2023-42362 - https://github.com/Mr-n0b3dy/CVE-2023-42362 CVE-2023-42362 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2023-42363 - https://github.com/bcgov/jag-cdds CVE-2023-42363 - https://github.com/cdupuis/aspnetapp CVE-2023-42364 - https://github.com/cdupuis/aspnetapp CVE-2023-42365 - https://github.com/cdupuis/aspnetapp +CVE-2023-42366 - https://github.com/bcgov/jag-cdds CVE-2023-42366 - https://github.com/cdupuis/aspnetapp CVE-2023-4237 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-42374 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -150359,6 +150984,7 @@ CVE-2023-43655 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-43656 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-43659 - https://github.com/kip93/kip93 CVE-2023-43660 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-43662 - https://github.com/wy876/POC CVE-2023-43665 - https://github.com/1wc/1wc CVE-2023-43666 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-43667 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -150606,6 +151232,7 @@ CVE-2023-44309 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-4431 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-44310 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-44311 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-44313 - https://github.com/tanjiti/sec_profile CVE-2023-44315 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-44324 - https://github.com/NaInSec/CVE-LIST CVE-2023-44325 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -150659,6 +151286,7 @@ CVE-2023-44483 - https://github.com/phax/ph-xmldsig CVE-2023-44484 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-44485 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-44486 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-44487 - https://github.com/0xMarcio/cve CVE-2023-44487 - https://github.com/AlexRogalskiy/AlexRogalskiy CVE-2023-44487 - https://github.com/Austnez/tools CVE-2023-44487 - https://github.com/ByteHackr/CVE-2023-44487 @@ -150720,6 +151348,7 @@ CVE-2023-44487 - https://github.com/zhaohuabing/cve-agent CVE-2023-44487 - https://github.com/zhaoolee/garss CVE-2023-44488 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-4450 - https://github.com/Threekiii/Awesome-POC +CVE-2023-4450 - https://github.com/bigblackhat/oFx CVE-2023-4450 - https://github.com/chennbnbnb/JDoop-release CVE-2023-4450 - https://github.com/hxysaury/saury-vulnhub CVE-2023-4450 - https://github.com/ilikeoyt/CVE-2023-4450-Attack @@ -151061,6 +151690,7 @@ CVE-2023-45664 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-45666 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-45667 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-4567 - https://github.com/chinocchio/EthicalHacking +CVE-2023-45674 - https://github.com/OrenGitHub/dhscanner CVE-2023-45675 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-45678 - https://github.com/runwuf/clickhouse-test CVE-2023-4568 - https://github.com/nomi-sec/PoC-in-GitHub @@ -151100,6 +151730,7 @@ CVE-2023-45797 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-45798 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-45799 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-45801 - https://github.com/karimhabush/cyberowl +CVE-2023-45802 - https://github.com/EzeTauil/Maquina-Upload CVE-2023-45802 - https://github.com/arsenalzp/apch-operator CVE-2023-45802 - https://github.com/karimhabush/cyberowl CVE-2023-45802 - https://github.com/xonoxitron/cpe2cve @@ -151466,6 +152097,7 @@ CVE-2023-46728 - https://github.com/MegaManSec/Squid-Security-Audit CVE-2023-46728 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-46729 - https://github.com/aszx87410/blog CVE-2023-46729 - https://github.com/tanjiti/sec_profile +CVE-2023-46747 - https://github.com/0xMarcio/cve CVE-2023-46747 - https://github.com/AliBrTab/CVE-2023-46747-POC CVE-2023-46747 - https://github.com/CVEDB/awesome-cve-repo CVE-2023-46747 - https://github.com/CVEDB/top @@ -152367,6 +152999,7 @@ CVE-2023-4966 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detec CVE-2023-4966 - https://github.com/RevoltSecurities/CVE-2023-4966 CVE-2023-4966 - https://github.com/Threekiii/Awesome-POC CVE-2023-4966 - https://github.com/Threekiii/CVE +CVE-2023-4966 - https://github.com/aleff-github/aleff-github CVE-2023-4966 - https://github.com/aleff-github/my-flipper-shits CVE-2023-4966 - https://github.com/byte4RR4Y/CVE-2023-4966 CVE-2023-4966 - https://github.com/certat/citrix-logchecker @@ -152532,6 +153165,7 @@ CVE-2023-50131 - https://github.com/sajaljat/CVE-2023-50131 CVE-2023-50132 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-50132 - https://github.com/sajaljat/CVE-2023-50132 CVE-2023-5016 - https://github.com/20142995/pocsuite3 +CVE-2023-5016 - https://github.com/bayuncao/bayuncao CVE-2023-50164 - https://github.com/AsfandAliMemon25/CVE-2023-50164Analysis- CVE-2023-50164 - https://github.com/Marco-zcl/POC CVE-2023-50164 - https://github.com/Thirukrishnan/CVE-2023-50164-Apache-Struts-RCE @@ -152560,6 +153194,7 @@ CVE-2023-50168 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-50175 - https://github.com/a-zara-n/a-zara-n CVE-2023-50175 - https://github.com/mute1008/mute1008 CVE-2023-50175 - https://github.com/mute1997/mute1997 +CVE-2023-5022 - https://github.com/bayuncao/bayuncao CVE-2023-50220 - https://github.com/neutrinoguy/awesome-ics-writeups CVE-2023-50220 - https://github.com/tanjiti/sec_profile CVE-2023-50226 - https://github.com/jiayy/android_vuln_poc-exp @@ -153256,6 +153891,7 @@ CVE-2023-52425 - https://github.com/TimoTielens/httpd-security CVE-2023-52425 - https://github.com/egorvozhzhov/docker-test CVE-2023-52425 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-52425 - https://github.com/fokypoky/places-list +CVE-2023-52425 - https://github.com/m-pasima/CI-CD-Security-image-scan CVE-2023-52426 - https://github.com/GrigGM/05-virt-04-docker-hw CVE-2023-52426 - https://github.com/Murken-0/docker-vulnerabilities CVE-2023-52426 - https://github.com/PaulZtx/docker_practice @@ -153893,6 +154529,7 @@ CVE-2023-6654 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-6654 - https://github.com/qfmy1024/CVE-2023-6654 CVE-2023-6654 - https://github.com/tanjiti/sec_profile CVE-2023-6655 - https://github.com/20142995/sectool +CVE-2023-6656 - https://github.com/bayuncao/bayuncao CVE-2023-6656 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-6660 - https://github.com/NaInSec/CVE-LIST CVE-2023-6660 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -158924,6 +159561,8 @@ CVE-2024-0039 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-0040 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-0041 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-0043 - https://github.com/cisagov/vulnrichment +CVE-2024-0044 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-0044 - https://github.com/tanjiti/sec_profile CVE-2024-0054 - https://github.com/NaInSec/CVE-LIST CVE-2024-0055 - https://github.com/NaInSec/CVE-LIST CVE-2024-0056 - https://github.com/NaInSec/CVE-LIST @@ -158960,6 +159599,7 @@ CVE-2024-0194 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-0195 - https://github.com/Marco-zcl/POC CVE-2024-0195 - https://github.com/Tropinene/Yscanner CVE-2024-0195 - https://github.com/d4n-sec/d4n-sec.github.io +CVE-2024-0195 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-0195 - https://github.com/tanjiti/sec_profile CVE-2024-0195 - https://github.com/wjlin0/poc-doc CVE-2024-0195 - https://github.com/wy876/POC @@ -159097,6 +159737,7 @@ CVE-2024-0349 - https://github.com/ahmedvienna/CVEs-and-Vulnerabilities CVE-2024-0350 - https://github.com/ahmedvienna/CVEs-and-Vulnerabilities CVE-2024-0351 - https://github.com/ahmedvienna/CVEs-and-Vulnerabilities CVE-2024-0352 - https://github.com/Tropinene/Yscanner +CVE-2024-0352 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-0352 - https://github.com/tanjiti/sec_profile CVE-2024-0365 - https://github.com/NaInSec/CVE-LIST CVE-2024-0370 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -159220,6 +159861,7 @@ CVE-2024-0652 - https://github.com/Agampreet-Singh/CVE-2024-0652 CVE-2024-0652 - https://github.com/Agampreet-Singh/CVE-2024-25202 CVE-2024-0652 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-0652 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-0654 - https://github.com/bayuncao/bayuncao CVE-2024-0654 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-0655 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-0657 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -159280,6 +159922,7 @@ CVE-2024-0750 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-0751 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-0753 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-0755 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-0757 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-0759 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-0765 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-0769 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -159356,6 +159999,8 @@ CVE-2024-0930 - https://github.com/yaoyue123/iot CVE-2024-0931 - https://github.com/yaoyue123/iot CVE-2024-0932 - https://github.com/yaoyue123/iot CVE-2024-0935 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-0936 - https://github.com/bayuncao/bayuncao +CVE-2024-0937 - https://github.com/bayuncao/bayuncao CVE-2024-0939 - https://github.com/tanjiti/sec_profile CVE-2024-0948 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-0951 - https://github.com/NaInSec/CVE-LIST @@ -159363,7 +160008,9 @@ CVE-2024-0953 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-0953 - https://github.com/securitycipher/daily-bugbounty-writeups CVE-2024-0957 - https://github.com/NaInSec/CVE-LIST CVE-2024-0957 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-0959 - https://github.com/bayuncao/bayuncao CVE-2024-0959 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-0960 - https://github.com/bayuncao/bayuncao CVE-2024-0960 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-0962 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-0963 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -159653,6 +160300,7 @@ CVE-2024-1417 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1420 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1423 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1431 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-1432 - https://github.com/bayuncao/bayuncao CVE-2024-1432 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1433 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1441 - https://github.com/NaInSec/CVE-LIST @@ -159839,6 +160487,7 @@ CVE-2024-1733 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1742 - https://github.com/NaInSec/CVE-LIST CVE-2024-1743 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1746 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-1748 - https://github.com/bayuncao/bayuncao CVE-2024-1748 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1749 - https://github.com/Srivishnu-p/CVEs-and-Vulnerabilities CVE-2024-1749 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -159914,6 +160563,7 @@ CVE-2024-1871 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1874 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1874 - https://github.com/michalsvoboda76/batbadbut CVE-2024-1874 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-1874 - https://github.com/tianstcht/tianstcht CVE-2024-1875 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1876 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1877 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -160002,6 +160652,7 @@ CVE-2024-20029 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-20030 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-20031 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-20032 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-20032 - https://github.com/tf2spi/dumpshell CVE-2024-20033 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-20034 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-20036 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -160060,6 +160711,7 @@ CVE-2024-20337 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-20337 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-20337 - https://github.com/swagcraftedd/CVE-2024-20337-POC CVE-2024-20338 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-20338 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-20345 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-20346 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-20353 - https://github.com/Spl0stus/CVE-2024-20353-CiscoASAandFTD @@ -160098,6 +160750,7 @@ CVE-2024-2052 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-2054 - https://github.com/Madan301/CVE-2024-2054 CVE-2024-2054 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-2054 - https://github.com/tanjiti/sec_profile +CVE-2024-2057 - https://github.com/bayuncao/bayuncao CVE-2024-2057 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-2060 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-2061 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -160465,6 +161118,7 @@ CVE-2024-2134 - https://github.com/Srivishnu-p/CVEs-and-Vulnerabilities CVE-2024-2134 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-21341 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-21342 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-21345 - https://github.com/0xMarcio/cve CVE-2024-21345 - https://github.com/FoxyProxys/CVE-2024-21345 CVE-2024-21345 - https://github.com/GhostTroops/TOP CVE-2024-21345 - https://github.com/aneasystone/github-trending @@ -160733,6 +161387,7 @@ CVE-2024-21672 - https://github.com/swagcrafted/CVE-2024-21672-POC CVE-2024-21673 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-21674 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-21677 - https://github.com/NaInSec/CVE-LIST +CVE-2024-21677 - https://github.com/enomothem/PenTestNote CVE-2024-21677 - https://github.com/netlas-io/netlas-dorks CVE-2024-21677 - https://github.com/tanjiti/sec_profile CVE-2024-21683 - https://github.com/0xMarcio/cve @@ -160743,6 +161398,7 @@ CVE-2024-21683 - https://github.com/W01fh4cker/CVE-2024-21683-RCE CVE-2024-21683 - https://github.com/ZonghaoLi777/githubTrending CVE-2024-21683 - https://github.com/absholi7ly/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server CVE-2024-21683 - https://github.com/aneasystone/github-trending +CVE-2024-21683 - https://github.com/enomothem/PenTestNote CVE-2024-21683 - https://github.com/fireinrain/github-trending CVE-2024-21683 - https://github.com/jafshare/GithubTrending CVE-2024-21683 - https://github.com/johe123qwe/github-trending @@ -160767,6 +161423,7 @@ CVE-2024-21733 - https://github.com/1N3/1N3 CVE-2024-21733 - https://github.com/Marco-zcl/POC CVE-2024-21733 - https://github.com/Ostorlab/KEV CVE-2024-21733 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-21733 - https://github.com/versio-io/product-lifecycle-security-api CVE-2024-21733 - https://github.com/wjlin0/poc-doc CVE-2024-21733 - https://github.com/wy876/POC CVE-2024-21734 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -160935,6 +161592,7 @@ CVE-2024-21911 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-21919 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-21920 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-2193 - https://github.com/NaInSec/CVE-LIST +CVE-2024-2193 - https://github.com/codexlynx/hardware-attacks-state-of-the-art CVE-2024-2193 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-2193 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-2193 - https://github.com/uthrasri/CVE-2024-2193 @@ -161016,6 +161674,7 @@ CVE-2024-22120 - https://github.com/Threekiii/CVE CVE-2024-22120 - https://github.com/W01fh4cker/CVE-2024-22120-RCE CVE-2024-22120 - https://github.com/ZonghaoLi777/githubTrending CVE-2024-22120 - https://github.com/aneasystone/github-trending +CVE-2024-22120 - https://github.com/enomothem/PenTestNote CVE-2024-22120 - https://github.com/fireinrain/github-trending CVE-2024-22120 - https://github.com/johe123qwe/github-trending CVE-2024-22120 - https://github.com/nomi-sec/PoC-in-GitHub @@ -161269,6 +161928,7 @@ CVE-2024-22551 - https://github.com/capture0x/My-CVE CVE-2024-22567 - https://github.com/labesterOct/CVE-2024-22567 CVE-2024-22567 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-22569 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-2257 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-2258 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-22588 - https://github.com/QUICTester/QUICTester CVE-2024-22588 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -161291,6 +161951,7 @@ CVE-2024-22640 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-22640 - https://github.com/zunak/CVE-2024-22640 CVE-2024-22641 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-22641 - https://github.com/zunak/CVE-2024-22641 +CVE-2024-22663 - https://github.com/Joe1sn/Joe1sn CVE-2024-22667 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-22675 - https://github.com/l00neyhacker/CVE-2024-22675 CVE-2024-22676 - https://github.com/l00neyhacker/CVE-2024-22676 @@ -161510,6 +162171,7 @@ CVE-2024-23279 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-23280 - https://github.com/NaInSec/CVE-LIST CVE-2024-23280 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-23281 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-23282 - https://github.com/dlehgus1023/dlehgus1023 CVE-2024-23283 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-23284 - https://github.com/NaInSec/CVE-LIST CVE-2024-23284 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -161653,6 +162315,12 @@ CVE-2024-23672 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-23673 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-23689 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-2369 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-2369 - https://github.com/tanjiti/sec_profile +CVE-2024-23692 - https://github.com/Threekiii/CVE +CVE-2024-23692 - https://github.com/enomothem/PenTestNote +CVE-2024-23692 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-23692 - https://github.com/tanjiti/sec_profile +CVE-2024-23692 - https://github.com/wy876/POC CVE-2024-2370 - https://github.com/NaInSec/CVE-LIST CVE-2024-2370 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-23721 - https://github.com/NaInSec/CVE-LIST @@ -161806,6 +162474,7 @@ CVE-2024-2389 - https://github.com/Ostorlab/KEV CVE-2024-2389 - https://github.com/RhinoSecurityLabs/CVEs CVE-2024-2389 - https://github.com/YN1337/exploit CVE-2024-2389 - https://github.com/adhikara13/CVE-2024-2389 +CVE-2024-2389 - https://github.com/enomothem/PenTestNote CVE-2024-2389 - https://github.com/getdrive/PoC CVE-2024-2389 - https://github.com/mayur-esh/vuln-liners CVE-2024-2389 - https://github.com/nomi-sec/PoC-in-GitHub @@ -162160,6 +162829,7 @@ CVE-2024-24578 - https://github.com/NaInSec/CVE-LIST CVE-2024-24579 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-2459 - https://github.com/NaInSec/CVE-LIST CVE-2024-24590 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-24590 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-24591 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-24592 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-24593 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -162269,6 +162939,7 @@ CVE-2024-24835 - https://github.com/NaInSec/CVE-LIST CVE-2024-24835 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-24836 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-24838 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-2484 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-24840 - https://github.com/NaInSec/CVE-LIST CVE-2024-24840 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-24845 - https://github.com/NaInSec/CVE-LIST @@ -162329,6 +163000,7 @@ CVE-2024-24919 - https://github.com/Ostorlab/KEV CVE-2024-24919 - https://github.com/Praison001/CVE-2024-24919-Check-Point-Remote-Access-VPN CVE-2024-24919 - https://github.com/RevoltSecurities/CVE-2024-24919 CVE-2024-24919 - https://github.com/Rug4lo/CVE-2024-24919-Exploit +CVE-2024-24919 - https://github.com/Threekiii/CVE CVE-2024-24919 - https://github.com/Tim-Hoekstra/CVE-2024-24919 CVE-2024-24919 - https://github.com/Vulnpire/CVE-2024-24919 CVE-2024-24919 - https://github.com/YN1337/CVE-2024-24919 @@ -162336,7 +163008,9 @@ CVE-2024-24919 - https://github.com/am-eid/CVE-2024-24919 CVE-2024-24919 - https://github.com/bigb0x/CVE-2024-24919-Sniper CVE-2024-24919 - https://github.com/birdlex/cve-2024-24919-checker CVE-2024-24919 - https://github.com/c3rrberu5/CVE-2024-24919 +CVE-2024-24919 - https://github.com/defronixpro/Defronix-Cybersecurity-Roadmap CVE-2024-24919 - https://github.com/emanueldosreis/CVE-2024-24919 +CVE-2024-24919 - https://github.com/enomothem/PenTestNote CVE-2024-24919 - https://github.com/eoslvs/CVE-2024-24919 CVE-2024-24919 - https://github.com/fernandobortotti/CVE-2024-24919 CVE-2024-24919 - https://github.com/gurudattch/CVE-2024-24919 @@ -162422,9 +163096,11 @@ CVE-2024-25101 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-25102 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-25103 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-2511 - https://github.com/GrigGM/05-virt-04-docker-hw +CVE-2024-2511 - https://github.com/bcgov/jag-cdds CVE-2024-2511 - https://github.com/chnzzh/OpenSSL-CVE-lib CVE-2024-2511 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-25110 - https://github.com/0xdea/advisories +CVE-2024-25111 - https://github.com/MegaManSec/Squid-Security-Audit CVE-2024-25118 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-25119 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-25120 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -162594,6 +163270,7 @@ CVE-2024-2535 - https://github.com/NaInSec/CVE-LIST CVE-2024-2535 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-25350 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-25351 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-25359 - https://github.com/bayuncao/bayuncao CVE-2024-25360 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-25366 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-25369 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -162753,6 +163430,7 @@ CVE-2024-25603 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-2561 - https://github.com/NaInSec/CVE-LIST CVE-2024-2561 - https://github.com/tanjiti/sec_profile CVE-2024-25610 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-25617 - https://github.com/MegaManSec/Squid-Security-Audit CVE-2024-25617 - https://github.com/NaInSec/CVE-LIST CVE-2024-2562 - https://github.com/NaInSec/CVE-LIST CVE-2024-25620 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -162827,6 +163505,7 @@ CVE-2024-25731 - https://github.com/actuator/com.cn.dq.ipc CVE-2024-25731 - https://github.com/actuator/cve CVE-2024-25731 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-25733 - https://github.com/hackintoanetwork/ARC-Browser-Address-Bar-Spoofing-PoC +CVE-2024-25733 - https://github.com/hackintoanetwork/hackintoanetwork CVE-2024-25733 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-25734 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-25735 - https://github.com/codeb0ss/CVE-2024-25735-PoC @@ -162991,6 +163670,7 @@ CVE-2024-25993 - https://github.com/NaInSec/CVE-LIST CVE-2024-26019 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-26026 - https://github.com/GRTMALDET/Big-IP-Next-CVE-2024-26026 CVE-2024-26026 - https://github.com/Threekiii/CVE +CVE-2024-26026 - https://github.com/enomothem/PenTestNote CVE-2024-26026 - https://github.com/netlas-io/netlas-dorks CVE-2024-26026 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-26026 - https://github.com/passwa11/CVE-2024-26026 @@ -163129,6 +163809,11 @@ CVE-2024-26218 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-26218 - https://github.com/tanjiti/sec_profile CVE-2024-2622 - https://github.com/NaInSec/CVE-LIST CVE-2024-2622 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-26229 - https://github.com/0xMarcio/cve +CVE-2024-26229 - https://github.com/GhostTroops/TOP +CVE-2024-26229 - https://github.com/michredteam/PoC-26229 +CVE-2024-26229 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-26229 - https://github.com/tanjiti/sec_profile CVE-2024-26246 - https://github.com/NaInSec/CVE-LIST CVE-2024-26247 - https://github.com/NaInSec/CVE-LIST CVE-2024-26247 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -163303,6 +163988,7 @@ CVE-2024-26598 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-26599 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-26600 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-26601 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-26602 - https://github.com/codexlynx/hardware-attacks-state-of-the-art CVE-2024-26602 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-26603 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-26604 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -163510,6 +164196,7 @@ CVE-2024-27140 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-2715 - https://github.com/NaInSec/CVE-LIST CVE-2024-2716 - https://github.com/NaInSec/CVE-LIST CVE-2024-2717 - https://github.com/NaInSec/CVE-LIST +CVE-2024-27173 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-2718 - https://github.com/NaInSec/CVE-LIST CVE-2024-27189 - https://github.com/NaInSec/CVE-LIST CVE-2024-27189 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -163647,6 +164334,7 @@ CVE-2024-2728 - https://github.com/NaInSec/CVE-LIST CVE-2024-27280 - https://github.com/lifeparticle/Ruby-Cheatsheet CVE-2024-27281 - https://github.com/lifeparticle/Ruby-Cheatsheet CVE-2024-27282 - https://github.com/lifeparticle/Ruby-Cheatsheet +CVE-2024-27282 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-27283 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-27284 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-27285 - https://github.com/NaInSec/CVE-LIST @@ -163664,6 +164352,7 @@ CVE-2024-27306 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-27310 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-27316 - https://github.com/Ampferl/poc_http2-continuation-flood CVE-2024-27316 - https://github.com/DrewskyDev/H2Flood +CVE-2024-27316 - https://github.com/EzeTauil/Maquina-Upload CVE-2024-27316 - https://github.com/Vos68/HTTP2-Continuation-Flood-PoC CVE-2024-27316 - https://github.com/aeyesec/CVE-2024-27316_poc CVE-2024-27316 - https://github.com/lockness-Ko/CVE-2024-27316 @@ -163861,8 +164550,11 @@ CVE-2024-27804 - https://github.com/GhostTroops/TOP CVE-2024-27804 - https://github.com/R00tkitSMM/CVE-2024-27804 CVE-2024-27804 - https://github.com/SnoopyTools/Rootkit-cve2024 CVE-2024-27804 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-27815 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-27822 - https://github.com/houjingyi233/macOS-iOS-system-security CVE-2024-27830 - https://github.com/Joe12387/Joe12387 +CVE-2024-27830 - https://github.com/Joe12387/safari-canvas-fingerprinting-exploit +CVE-2024-27834 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-27842 - https://github.com/tanjiti/sec_profile CVE-2024-27900 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-27902 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -164221,6 +164913,9 @@ CVE-2024-28404 - https://github.com/NaInSec/CVE-LIST CVE-2024-28404 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-28417 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-28418 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-28423 - https://github.com/bayuncao/bayuncao +CVE-2024-28424 - https://github.com/bayuncao/bayuncao +CVE-2024-28425 - https://github.com/bayuncao/bayuncao CVE-2024-28429 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-28430 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-28431 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -164391,6 +165086,7 @@ CVE-2024-28834 - https://github.com/GitHubForSnap/ssmtp-gael CVE-2024-28834 - https://github.com/GrigGM/05-virt-04-docker-hw CVE-2024-28834 - https://github.com/NaInSec/CVE-LIST CVE-2024-28834 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-28834 - https://github.com/m-pasima/CI-CD-Security-image-scan CVE-2024-28835 - https://github.com/GitHubForSnap/ssmtp-gael CVE-2024-28835 - https://github.com/GrigGM/05-virt-04-docker-hw CVE-2024-28835 - https://github.com/NaInSec/CVE-LIST @@ -164444,6 +165140,10 @@ CVE-2024-2896 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-28971 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-28978 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-28979 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-28995 - https://github.com/enomothem/PenTestNote +CVE-2024-28995 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-28995 - https://github.com/tanjiti/sec_profile +CVE-2024-28995 - https://github.com/wy876/POC CVE-2024-29003 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-29009 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-29018 - https://github.com/NaInSec/CVE-LIST @@ -164585,11 +165285,13 @@ CVE-2024-29197 - https://github.com/mansploit/CVE-2024-29197-exploit CVE-2024-29197 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-29199 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-29200 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-29201 - https://github.com/Threekiii/Awesome-POC CVE-2024-29201 - https://github.com/enomothem/PenTestNote CVE-2024-29201 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-29201 - https://github.com/tanjiti/sec_profile CVE-2024-29201 - https://github.com/wjlin0/poc-doc CVE-2024-29201 - https://github.com/wy876/POC +CVE-2024-29202 - https://github.com/Threekiii/Awesome-POC CVE-2024-29202 - https://github.com/enomothem/PenTestNote CVE-2024-29202 - https://github.com/tanjiti/sec_profile CVE-2024-29202 - https://github.com/wjlin0/poc-doc @@ -164657,6 +165359,7 @@ CVE-2024-29272 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-29273 - https://github.com/NaInSec/CVE-LIST CVE-2024-29273 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-29275 - https://github.com/NaInSec/CVE-LIST +CVE-2024-29275 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-29278 - https://github.com/QDming/cve CVE-2024-29278 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-29278 - https://github.com/nomi-sec/PoC-in-GitHub @@ -164815,6 +165518,9 @@ CVE-2024-29810 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-29811 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-29812 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-2982 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-29824 - https://github.com/enomothem/PenTestNote +CVE-2024-29824 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-29824 - https://github.com/wy876/POC CVE-2024-2983 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-29832 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-29833 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -164822,6 +165528,7 @@ CVE-2024-2984 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-29844 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-29849 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-29849 - https://github.com/sinsinology/CVE-2024-29849 +CVE-2024-29855 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-29857 - https://github.com/cdupuis/aspnetapp CVE-2024-29858 - https://github.com/NaInSec/CVE-LIST CVE-2024-29859 - https://github.com/NaInSec/CVE-LIST @@ -164900,6 +165607,9 @@ CVE-2024-2996 - https://github.com/Srivishnu-p/CVEs-and-Vulnerabilities CVE-2024-2996 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-2997 - https://github.com/Srivishnu-p/CVEs-and-Vulnerabilities CVE-2024-2997 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-29972 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-29973 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-29973 - https://github.com/wy876/POC CVE-2024-2998 - https://github.com/Srivishnu-p/CVEs-and-Vulnerabilities CVE-2024-2998 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-29981 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -164938,7 +165648,13 @@ CVE-2024-30056 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-30056 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-3006 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3007 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-30078 - https://github.com/0xMarcio/cve +CVE-2024-30078 - https://github.com/GhostTroops/TOP +CVE-2024-30078 - https://github.com/enomothem/PenTestNote +CVE-2024-30078 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-30078 - https://github.com/stryngs/edgedressing CVE-2024-3008 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-30080 - https://github.com/tanjiti/sec_profile CVE-2024-3009 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3010 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3011 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -164961,6 +165677,7 @@ CVE-2024-30203 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-30204 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-30205 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-30210 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-30212 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-3022 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-30221 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-30222 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -164997,6 +165714,7 @@ CVE-2024-30255 - https://github.com/Vos68/HTTP2-Continuation-Flood-PoC CVE-2024-30255 - https://github.com/blackmagic2023/Envoy-CPU-Exhaustion-Vulnerability-PoC CVE-2024-30255 - https://github.com/lockness-Ko/CVE-2024-27316 CVE-2024-30255 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-30256 - https://github.com/OrenGitHub/dhscanner CVE-2024-30260 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-30261 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-30262 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -165004,6 +165722,7 @@ CVE-2024-30263 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-30266 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-30269 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3027 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-30270 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-3030 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3032 - https://github.com/Chocapikk/My-CVEs CVE-2024-3034 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -165309,6 +166028,7 @@ CVE-2024-3094 - https://github.com/dparksports/detect_intrusion CVE-2024-3094 - https://github.com/drdry2/CVE-2024-3094-EXPLOIT CVE-2024-3094 - https://github.com/duytruongpham/duytruongpham CVE-2024-3094 - https://github.com/emirkmo/xz-backdoor-github +CVE-2024-3094 - https://github.com/enomothem/PenTestNote CVE-2024-3094 - https://github.com/felipecosta09/cve-2024-3094 CVE-2024-3094 - https://github.com/fevar54/Detectar-Backdoor-en-liblzma-de-XZ-utils-CVE-2024-3094- CVE-2024-3094 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -165419,6 +166139,7 @@ CVE-2024-31142 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-31156 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3116 - https://github.com/FoxyProxys/CVE-2024-3116 CVE-2024-3116 - https://github.com/TechieNeurons/CVE-2024-3116_RCE_in_pgadmin_8.4 +CVE-2024-3116 - https://github.com/enomothem/PenTestNote CVE-2024-3116 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3116 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-3116 - https://github.com/tanjiti/sec_profile @@ -165430,6 +166151,7 @@ CVE-2024-31205 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-31207 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-31208 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-31209 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-31210 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-31213 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-31214 - https://github.com/nvn1729/advisories CVE-2024-31215 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -165496,6 +166218,7 @@ CVE-2024-31492 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-31497 - https://github.com/HugoBond/CVE-2024-31497-POC CVE-2024-31497 - https://github.com/PazDak/LoonSecurity CVE-2024-31497 - https://github.com/ViktorNaum/CVE-2024-31497-POC +CVE-2024-31497 - https://github.com/daedalus/BreakingECDSAwithLLL CVE-2024-31497 - https://github.com/edutko/cve-2024-31497 CVE-2024-31497 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-31497 - https://github.com/nomi-sec/PoC-in-GitHub @@ -165558,6 +166281,7 @@ CVE-2024-31851 - https://github.com/Stuub/CVE-2024-31848-PoC CVE-2024-31851 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-31852 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-31857 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-31861 - https://github.com/enomothem/PenTestNote CVE-2024-31861 - https://github.com/tanjiti/sec_profile CVE-2024-31864 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-31865 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -165589,6 +166313,9 @@ CVE-2024-31974 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-31975 - https://github.com/actuator/cve CVE-2024-31976 - https://github.com/actuator/cve CVE-2024-31977 - https://github.com/actuator/cve +CVE-2024-31982 - https://github.com/tanjiti/sec_profile +CVE-2024-320002 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-32002 - https://github.com/0xMarcio/cve CVE-2024-32002 - https://github.com/10cks/CVE-2024-32002-EXP CVE-2024-32002 - https://github.com/10cks/CVE-2024-32002-POC CVE-2024-32002 - https://github.com/10cks/CVE-2024-32002-hulk @@ -165648,6 +166375,7 @@ CVE-2024-32002 - https://github.com/kun-g/Scraping-Github-trending CVE-2024-32002 - https://github.com/markuta/CVE-2024-32002 CVE-2024-32002 - https://github.com/markuta/hooky CVE-2024-32002 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-32002 - https://github.com/p1tsi/misc CVE-2024-32002 - https://github.com/pkjmesra/PKScreener CVE-2024-32002 - https://github.com/safebuffer/CVE-2024-32002 CVE-2024-32002 - https://github.com/sampsonv/github-trending @@ -165677,6 +166405,7 @@ CVE-2024-32018 - https://github.com/0xdea/advisories CVE-2024-32018 - https://github.com/hnsecurity/vulns CVE-2024-32020 - https://github.com/testing-felickz/docker-scout-demo CVE-2024-32021 - https://github.com/testing-felickz/docker-scout-demo +CVE-2024-32022 - https://github.com/OrenGitHub/dhscanner CVE-2024-3203 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3204 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-32049 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -165689,10 +166418,12 @@ CVE-2024-32113 - https://github.com/Mr-xn/CVE-2024-32113 CVE-2024-32113 - https://github.com/Ostorlab/KEV CVE-2024-32113 - https://github.com/Threekiii/CVE CVE-2024-32113 - https://github.com/absholi7ly/Apache-OFBiz-Directory-Traversal-exploit +CVE-2024-32113 - https://github.com/enomothem/PenTestNote CVE-2024-32113 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-32113 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-32113 - https://github.com/tanjiti/sec_profile CVE-2024-32114 - https://github.com/Threekiii/CVE +CVE-2024-32114 - https://github.com/enomothem/PenTestNote CVE-2024-32114 - https://github.com/tanjiti/sec_profile CVE-2024-3213 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-32136 - https://github.com/nomi-sec/PoC-in-GitHub @@ -165757,6 +166488,7 @@ CVE-2024-32638 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-32640 - https://github.com/0x3f3c/CVE-2024-32640-SQLI-MuraCMS CVE-2024-32640 - https://github.com/Stuub/CVE-2024-32640-SQLI-MuraCMS CVE-2024-32640 - https://github.com/Threekiii/CVE +CVE-2024-32640 - https://github.com/enomothem/PenTestNote CVE-2024-32640 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-32640 - https://github.com/sammings/CVE-2024-32640 CVE-2024-32640 - https://github.com/tanjiti/sec_profile @@ -165789,6 +166521,7 @@ CVE-2024-3272 - https://github.com/wy876/POC CVE-2024-3272 - https://github.com/wy876/wiki CVE-2024-32725 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-32728 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-3273 - https://github.com/0xMarcio/cve CVE-2024-3273 - https://github.com/Chocapikk/CVE-2024-3273 CVE-2024-3273 - https://github.com/GhostTroops/TOP CVE-2024-3273 - https://github.com/K3ysTr0K3R/CVE-2024-3273-EXPLOIT @@ -166040,6 +166773,7 @@ CVE-2024-33905 - https://github.com/tanjiti/sec_profile CVE-2024-33911 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-33911 - https://github.com/xbz0n/CVE-2024-33911 CVE-2024-3400 - https://github.com/0x0d3ad/CVE-2024-3400 +CVE-2024-3400 - https://github.com/0xMarcio/cve CVE-2024-3400 - https://github.com/0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection CVE-2024-3400 - https://github.com/AdaniKamal/CVE-2024-3400 CVE-2024-3400 - https://github.com/CONDITIONBLACK/CVE-2024-3400-POC @@ -166065,6 +166799,7 @@ CVE-2024-3400 - https://github.com/ak1t4/CVE-2024-3400 CVE-2024-3400 - https://github.com/andrelia-hacks/CVE-2024-3400 CVE-2024-3400 - https://github.com/aneasystone/github-trending CVE-2024-3400 - https://github.com/codeblueprint/CVE-2024-3400 +CVE-2024-3400 - https://github.com/enomothem/PenTestNote CVE-2024-3400 - https://github.com/fatguru/dorks CVE-2024-3400 - https://github.com/fireinrain/github-trending CVE-2024-3400 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -166181,6 +166916,8 @@ CVE-2024-34447 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-34448 - https://github.com/phulelouch/CVEs CVE-2024-34449 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3445 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-34452 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-34452 - https://github.com/surajhacx/CVE-2024-34452 CVE-2024-34454 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3446 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-34460 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -166437,6 +167174,10 @@ CVE-2024-36079 - https://github.com/DxRvs/vaultize_CVE-2024-36079 CVE-2024-36079 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-36104 - https://github.com/Co5mos/nuclei-tps CVE-2024-36104 - https://github.com/Mr-xn/CVE-2024-32113 +CVE-2024-36104 - https://github.com/Threekiii/Awesome-POC +CVE-2024-36104 - https://github.com/Threekiii/CVE +CVE-2024-36104 - https://github.com/enomothem/PenTestNote +CVE-2024-36104 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-36104 - https://github.com/tanjiti/sec_profile CVE-2024-36104 - https://github.com/wy876/POC CVE-2024-36104 - https://github.com/wy876/wiki @@ -166452,6 +167193,7 @@ CVE-2024-3628 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3634 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3640 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-36405 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-36416 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-36426 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-36428 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-36428 - https://github.com/tanjiti/sec_profile @@ -166460,10 +167202,14 @@ CVE-2024-36428 - https://github.com/wy876/wiki CVE-2024-36437 - https://github.com/actuator/cve CVE-2024-3645 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3652 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-36522 - https://github.com/Threekiii/CVE +CVE-2024-36522 - https://github.com/enomothem/PenTestNote +CVE-2024-36527 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-36586 - https://github.com/go-compile/security-advisories CVE-2024-36587 - https://github.com/go-compile/security-advisories CVE-2024-36588 - https://github.com/go-compile/security-advisories CVE-2024-36589 - https://github.com/go-compile/security-advisories +CVE-2024-36597 - https://github.com/wy876/POC CVE-2024-3661 - https://github.com/a1xbit/DecloakingVPN CVE-2024-3661 - https://github.com/apiverve/news-API CVE-2024-3661 - https://github.com/bollwarm/SecToolSet @@ -166474,7 +167220,15 @@ CVE-2024-3661 - https://github.com/leviathansecurity/TunnelVision CVE-2024-3661 - https://github.com/tanjiti/sec_profile CVE-2024-36673 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3668 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-36755 - https://github.com/YjjNJUPT/AsiaCCS2024_vul_report +CVE-2024-36756 - https://github.com/YjjNJUPT/AsiaCCS2024_vul_report +CVE-2024-36757 - https://github.com/YjjNJUPT/AsiaCCS2024_vul_report +CVE-2024-36758 - https://github.com/YjjNJUPT/AsiaCCS2024_vul_report +CVE-2024-36759 - https://github.com/YjjNJUPT/AsiaCCS2024_vul_report CVE-2024-36795 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-36821 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-36837 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-36837 - https://github.com/tanjiti/sec_profile CVE-2024-3686 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3687 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3688 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -166498,12 +167252,19 @@ CVE-2024-3699 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3700 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3704 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3705 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-37051 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-3706 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3707 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-37079 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-37079 - https://github.com/tanjiti/sec_profile +CVE-2024-37080 - https://github.com/tanjiti/sec_profile CVE-2024-3714 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3729 - https://github.com/chnzzh/OpenSSL-CVE-lib +CVE-2024-37305 - https://github.com/chnzzh/OpenSSL-CVE-lib +CVE-2024-37309 - https://github.com/chnzzh/OpenSSL-CVE-lib CVE-2024-3735 - https://github.com/ahmedvienna/CVEs-and-Vulnerabilities CVE-2024-3737 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-37393 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-37407 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3744 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3745 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -166527,17 +167288,26 @@ CVE-2024-3770 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3772 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3772 - https://github.com/seal-community/patches CVE-2024-3774 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-37742 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-3775 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-37759 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-3776 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3777 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3778 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-37791 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-3781 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3782 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3783 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3784 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-37843 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-3785 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3786 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-37880 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-37885 - https://github.com/LOURC0D3/LOURC0D3 +CVE-2024-37888 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-37889 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-37891 - https://github.com/PBorocz/raindrop-io-py +CVE-2024-37894 - https://github.com/MegaManSec/Squid-Security-Audit CVE-2024-3797 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3806 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-3806 - https://github.com/tanjiti/sec_profile @@ -166549,12 +167319,17 @@ CVE-2024-3817 - https://github.com/otms61/vex_dir CVE-2024-3822 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3823 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3824 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-38276 - https://github.com/cli-ish/cli-ish CVE-2024-3832 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3833 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3834 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-38355 - https://github.com/Y0ursTruly/Y0ursTruly CVE-2024-3837 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-38379 - https://github.com/waspthebughunter/waspthebughunter CVE-2024-3838 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3839 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-38395 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-38396 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-3840 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3841 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3843 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -166581,6 +167356,7 @@ CVE-2024-3892 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3895 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3897 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3914 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-3922 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-3928 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3931 - https://github.com/2lambda123/cisagov-vulnrichment CVE-2024-3931 - https://github.com/cisagov/vulnrichment @@ -166618,6 +167394,7 @@ CVE-2024-4040 - https://github.com/Stuub/CVE-2024-4040-SSTI-LFI-PoC CVE-2024-4040 - https://github.com/Y4tacker/JavaSec CVE-2024-4040 - https://github.com/absholi7ly/absholi7ly CVE-2024-4040 - https://github.com/airbus-cert/CVE-2024-4040 +CVE-2024-4040 - https://github.com/enomothem/PenTestNote CVE-2024-4040 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4040 - https://github.com/getdrive/PoC CVE-2024-4040 - https://github.com/gotr00t0day/CVE-2024-4040 @@ -166638,6 +167415,7 @@ CVE-2024-4058 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4059 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4060 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4064 - https://github.com/helloyhrr/IoT_vulnerability +CVE-2024-4068 - https://github.com/seal-community/patches CVE-2024-4083 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4085 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4086 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -166668,6 +167446,8 @@ CVE-2024-4202 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4203 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4208 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4226 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-4231 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-4232 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-4233 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4234 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4235 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -166692,6 +167472,7 @@ CVE-2024-4298 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4299 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4300 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4301 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-4313 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4317 - https://github.com/wiltondb/wiltondb CVE-2024-4323 - https://github.com/d0rb/CVE-2024-4323 CVE-2024-4323 - https://github.com/nomi-sec/PoC-in-GitHub @@ -166714,6 +167495,7 @@ CVE-2024-4354 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4357 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4358 - https://github.com/GhostTroops/TOP CVE-2024-4358 - https://github.com/Harydhk7/CVE-2024-4358 +CVE-2024-4358 - https://github.com/Ostorlab/KEV CVE-2024-4358 - https://github.com/RevoltSecurities/CVE-2024-4358 CVE-2024-4358 - https://github.com/Sk1dr0wz/CVE-2024-4358_Mass_Exploit CVE-2024-4358 - https://github.com/nomi-sec/PoC-in-GitHub @@ -166764,6 +167546,7 @@ CVE-2024-4445 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4451 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4468 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4473 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-4484 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-4488 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4489 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4493 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -166798,6 +167581,7 @@ CVE-2024-4561 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4562 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4568 - https://github.com/bladchan/bladchan CVE-2024-4577 - https://github.com/0x20c/CVE-2024-4577-nuclei +CVE-2024-4577 - https://github.com/0xMarcio/cve CVE-2024-4577 - https://github.com/0xsyr0/OSCP CVE-2024-4577 - https://github.com/11whoami99/CVE-2024-4577 CVE-2024-4577 - https://github.com/Chocapikk/CVE-2024-4577 @@ -166805,13 +167589,19 @@ CVE-2024-4577 - https://github.com/GhostTroops/TOP CVE-2024-4577 - https://github.com/Junp0/CVE-2024-4577 CVE-2024-4577 - https://github.com/K3ysTr0K3R/CVE-2024-4577-EXPLOIT CVE-2024-4577 - https://github.com/K3ysTr0K3R/K3ysTr0K3R +CVE-2024-4577 - https://github.com/Ostorlab/KEV CVE-2024-4577 - https://github.com/Sysc4ll3r/CVE-2024-4577 CVE-2024-4577 - https://github.com/TAM-K592/CVE-2024-4577 +CVE-2024-4577 - https://github.com/Threekiii/Awesome-POC +CVE-2024-4577 - https://github.com/Threekiii/CVE CVE-2024-4577 - https://github.com/WanLiChangChengWanLiChang/CVE-2024-4577-RCE-EXP CVE-2024-4577 - https://github.com/Wh02m1/CVE-2024-4577 +CVE-2024-4577 - https://github.com/XiangDongCJC/CVE-2024-4577-PHP-CGI-RCE CVE-2024-4577 - https://github.com/Yukiioz/CVE-2024-4577 CVE-2024-4577 - https://github.com/ZephrFish/CVE-2024-4577-PHP-RCE +CVE-2024-4577 - https://github.com/bl4cksku11/CVE-2024-4577 CVE-2024-4577 - https://github.com/dbyMelina/CVE-2024-4577 +CVE-2024-4577 - https://github.com/enomothem/PenTestNote CVE-2024-4577 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4577 - https://github.com/huseyinstif/CVE-2024-4577-Nuclei-Template CVE-2024-4577 - https://github.com/it-t4mpan/check_cve_2024_4577.sh @@ -166845,6 +167635,7 @@ CVE-2024-4596 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4599 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4600 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4601 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-4603 - https://github.com/bcgov/jag-cdds CVE-2024-4603 - https://github.com/chnzzh/OpenSSL-CVE-lib CVE-2024-4603 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4609 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -166923,7 +167714,9 @@ CVE-2024-4853 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4854 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4855 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4858 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-4859 - https://github.com/JoshuaMart/JoshuaMart CVE-2024-4859 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-4860 - https://github.com/JoshuaMart/JoshuaMart CVE-2024-4860 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4865 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4871 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -166933,6 +167726,7 @@ CVE-2024-48788 - https://github.com/mrobsidian1/CVE-2023-48788-Proof-of-concept- CVE-2024-4891 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4893 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4894 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-4898 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-4903 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4923 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4925 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -166957,6 +167751,7 @@ CVE-2024-4956 - https://github.com/TypicalModMaker/CVE-2024-4956 CVE-2024-4956 - https://github.com/X1r0z/JettyFuzz CVE-2024-4956 - https://github.com/banditzCyber0x/CVE-2024-4956 CVE-2024-4956 - https://github.com/codeb0ss/CVE-2024-4956-PoC +CVE-2024-4956 - https://github.com/enomothem/PenTestNote CVE-2024-4956 - https://github.com/erickfernandox/CVE-2024-4956 CVE-2024-4956 - https://github.com/fin3ss3g0d/CVE-2024-4956 CVE-2024-4956 - https://github.com/fin3ss3g0d/Shiro1Extractor @@ -166974,6 +167769,8 @@ CVE-2024-4956 - https://github.com/wjlin0/poc-doc CVE-2024-4956 - https://github.com/wy876/POC CVE-2024-4956 - https://github.com/wy876/wiki CVE-2024-4956 - https://github.com/xungzzz/CVE-2024-4956 +CVE-2024-4959 - https://github.com/JoshuaMart/JoshuaMart +CVE-2024-4960 - https://github.com/JoshuaMart/JoshuaMart CVE-2024-49606 - https://github.com/netlas-io/netlas-dorks CVE-2024-4966 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4978 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -167010,6 +167807,7 @@ CVE-2024-5112 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5113 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5114 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5187 - https://github.com/sunriseXu/sunriseXu +CVE-2024-5208 - https://github.com/sev-hack/sev-hack CVE-2024-5218 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5220 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5229 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -167017,6 +167815,7 @@ CVE-2024-5273 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5274 - https://github.com/kip93/kip93 CVE-2024-5326 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-5326 - https://github.com/truonghuuphuc/CVE-2024-5326-Poc +CVE-2024-5346 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5359 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5360 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5361 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -167040,6 +167839,7 @@ CVE-2024-5542 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5555 - https://github.com/JohnnyBradvo/CVE-2024-5555 CVE-2024-5555 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-5585 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-5585 - https://github.com/tianstcht/tianstcht CVE-2024-5599 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5613 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5637 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -167061,6 +167861,8 @@ CVE-2024-5774 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5775 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5785 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5786 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-5791 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-6120 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6271 - https://github.com/Jokergazaa/zero-click-exploits CVE-2024-65230 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-6666 - https://github.com/JohnnyBradvo/CVE-2024-6666 @@ -167077,6 +167879,7 @@ CVE-2104-4114 - https://github.com/likescam/APT_CyberCriminal_Campagin_Collectio CVE-2104-4114 - https://github.com/likescam/CyberMonitor-APT_CyberCriminal_Campagin_Collections CVE-2104-4114 - https://github.com/sumas/APT_CyberCriminal_Campagin_Collections CVE-2106-2504 - https://github.com/ndk191/linux-kernel-exploitation +CVE-2106-2504 - https://github.com/wkhnh06/linux-kernel-exploitation CVE-2106-2504 - https://github.com/xairy/linux-kernel-exploitation CVE-2121-44228 - https://github.com/NaInSec/CVE-PoC-in-GitHub CVE-2121-44228 - https://github.com/WhooAmii/POC_to_review diff --git a/references.txt b/references.txt index b4b783e261..ac8651d659 100644 --- a/references.txt +++ b/references.txt @@ -2546,6 +2546,7 @@ CVE-2005-4874 - https://bugzilla.mozilla.org/show_bug.cgi?id=297078 CVE-2005-4890 - http://www.openwall.com/lists/oss-security/2014/10/20/9 CVE-2005-4890 - http://www.openwall.com/lists/oss-security/2014/10/21/1 CVE-2005-4900 - https://kc.mcafee.com/corporate/index?page=content&id=SB10340 +CVE-2006-0001 - http://www.computerterrorism.com/research/ct12-09-2006-2.htm CVE-2006-0001 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-054 CVE-2006-0002 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-003 CVE-2006-0003 - https://www.exploit-db.com/exploits/2052 @@ -3801,6 +3802,7 @@ CVE-2006-3300 - https://www.exploit-db.com/exploits/1948 CVE-2006-3304 - https://www.exploit-db.com/exploits/1953 CVE-2006-3309 - https://www.exploit-db.com/exploits/1957 CVE-2006-3311 - http://securityreason.com/securityalert/1546 +CVE-2006-3311 - http://www.computerterrorism.com/research/ct12-09-2006.htm CVE-2006-3313 - http://securityreason.com/securityalert/1168 CVE-2006-3315 - http://securityreason.com/securityalert/1176 CVE-2006-3317 - http://securityreason.com/securityalert/1173 @@ -5751,6 +5753,7 @@ CVE-2007-0029 - https://docs.microsoft.com/en-us/security-updates/securitybullet CVE-2007-0030 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-002 CVE-2007-0031 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-002 CVE-2007-0033 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-003 +CVE-2007-0034 - http://www.computerterrorism.com/research/ct09-01-2007.htm CVE-2007-0034 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-003 CVE-2007-0035 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-024 CVE-2007-0038 - http://securityreason.com/securityalert/2542 @@ -22495,6 +22498,7 @@ CVE-2012-6643 - http://packetstormsecurity.org/files/108489/clipbucket-sqlxss.tx CVE-2012-6644 - http://packetstormsecurity.org/files/108489/clipbucket-sqlxss.txt CVE-2012-6645 - http://drupal.org/node/1432318 CVE-2012-6658 - http://www.exploit-db.com/exploits/20063 +CVE-2012-6664 - https://www.exploit-db.com/exploits/41714 CVE-2012-6666 - https://www.exploit-db.com/exploits/37944 CVE-2012-6684 - http://co3k.org/blog/redcloth-unfixed-xss-en CVE-2012-6684 - http://seclists.org/fulldisclosure/2014/Dec/50 @@ -25239,6 +25243,7 @@ CVE-2014-125035 - https://github.com/mrbobbybryant/Jobs-Plugin/commit/b8a56718b1 CVE-2014-125049 - https://vuldb.com/?id.217560 CVE-2014-125082 - https://github.com/nivit/redports/commit/fc2c1ea1b8d795094abb15ac73cab90830534e04 CVE-2014-125087 - https://github.com/jmurty/java-xmlbuilder/issues/6 +CVE-2014-125093 - https://vuldb.com/?id.222610 CVE-2014-1359 - http://packetstormsecurity.com/files/167630/launchd-Heap-Corruption.html CVE-2014-1372 - https://code.google.com/p/google-security-research/issues/detail?id=18 CVE-2014-1401 - http://packetstormsecurity.com/files/125079 @@ -27160,6 +27165,7 @@ CVE-2014-5465 - http://packetstormsecurity.com/files/128024/WordPress-ShortCode- CVE-2014-5465 - http://www.exploit-db.com/exploits/34436 CVE-2014-5468 - http://packetstormsecurity.com/files/128234/Railo-4.2.1-Remote-File-Inclusion.html CVE-2014-5468 - http://www.exploit-db.com/exploits/34669 +CVE-2014-5470 - https://www.exploit-db.com/exploits/35549 CVE-2014-5471 - http://www.ubuntu.com/usn/USN-2358-1 CVE-2014-5472 - http://www.ubuntu.com/usn/USN-2358-1 CVE-2014-5507 - http://packetstormsecurity.com/files/128806/iBackup-10.0.0.32-Local-Privilege-Escalation.html @@ -48257,6 +48263,7 @@ CVE-2018-10049 - https://pastebin.com/QbhRJp4q CVE-2018-10050 - https://pastebin.com/UDEsFq3u CVE-2018-10051 - https://pastebin.com/aQn3Cr2G CVE-2018-10052 - https://pastebin.com/aeqYLK9u +CVE-2018-10054 - https://github.com/h2database/h2database/issues/1225 CVE-2018-10054 - https://mthbernardes.github.io/rce/2018/03/14/abusing-h2-database-alias.html CVE-2018-10054 - https://www.exploit-db.com/exploits/44422/ CVE-2018-10057 - http://www.openwall.com/lists/oss-security/2018/06/03/1 @@ -60439,6 +60446,7 @@ CVE-2019-25138 - https://blog.nintechnet.com/arbitrary-file-upload-vulnerability CVE-2019-25139 - https://blog.nintechnet.com/unauthenticated-stored-xss-in-wordpress-coming-soon-page-and-maintenance-mode-plugin/ CVE-2019-25140 - https://blog.nintechnet.com/unauthenticated-stored-xss-in-wordpress-coming-soon-page-and-maintenance-mode-plugin/ CVE-2019-25141 - https://blog.nintechnet.com/critical-0day-vulnerability-fixed-in-wordpress-easy-wp-smtp-plugin/ +CVE-2019-25156 - https://vuldb.com/?id.244495 CVE-2019-2516 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html CVE-2019-2517 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html CVE-2019-2518 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html @@ -62461,16 +62469,19 @@ CVE-2019-9506 - https://usn.ubuntu.com/4115-1/ CVE-2019-9506 - https://usn.ubuntu.com/4118-1/ CVE-2019-9510 - https://www.kb.cert.org/vuls/id/576688/ CVE-2019-9511 - https://kb.cert.org/vuls/id/605641/ +CVE-2019-9511 - https://usn.ubuntu.com/4099-1/ CVE-2019-9511 - https://www.oracle.com/security-alerts/cpujan2021.html CVE-2019-9511 - https://www.oracle.com/security-alerts/cpuoct2020.html CVE-2019-9511 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html CVE-2019-9512 - https://kb.cert.org/vuls/id/605641/ CVE-2019-9513 - https://kb.cert.org/vuls/id/605641/ +CVE-2019-9513 - https://usn.ubuntu.com/4099-1/ CVE-2019-9513 - https://www.oracle.com/security-alerts/cpujan2021.html CVE-2019-9513 - https://www.oracle.com/security-alerts/cpuoct2020.html CVE-2019-9514 - https://kb.cert.org/vuls/id/605641/ CVE-2019-9515 - https://kb.cert.org/vuls/id/605641/ CVE-2019-9516 - https://kb.cert.org/vuls/id/605641/ +CVE-2019-9516 - https://usn.ubuntu.com/4099-1/ CVE-2019-9517 - https://kb.cert.org/vuls/id/605641/ CVE-2019-9517 - https://www.oracle.com/security-alerts/cpuapr2020.html CVE-2019-9517 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html @@ -67583,6 +67594,7 @@ CVE-2020-27349 - https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1899193 CVE-2020-2735 - https://www.oracle.com/security-alerts/cpuapr2020.html CVE-2020-27350 - https://bugs.launchpad.net/bugs/1899193 CVE-2020-27351 - https://bugs.launchpad.net/bugs/1899193 +CVE-2020-27352 - https://bugs.launchpad.net/snapd/+bug/1910456 CVE-2020-27368 - https://github.com/swzhouu/CVE-2020-27368 CVE-2020-2737 - https://www.oracle.com/security-alerts/cpuapr2020.html CVE-2020-27373 - https://nvermaa.medium.com/cve-on-radio-technology-d-4b65efa1ba5c @@ -77037,6 +77049,7 @@ CVE-2021-3931 - https://huntr.dev/bounties/03b21d69-3bf5-4b2f-a2cf-872dd677a68f CVE-2021-39312 - http://packetstormsecurity.com/files/165434/WordPress-The-True-Ranker-2.2.2-Arbitrary-File-Read.html CVE-2021-39316 - http://packetstormsecurity.com/files/165146/WordPress-DZS-Zoomsounds-6.45-Arbitrary-File-Read.html CVE-2021-39320 - https://wpscan.com/vulnerability/49ae1df0-d6d2-4cbb-9a9d-bf3599429875 +CVE-2021-39322 - https://wpvulndb.com/vulnerabilities/5e0bf0b6-9809-426b-b1d4-1fb653083b58 CVE-2021-39327 - http://packetstormsecurity.com/files/164420/WordPress-BulletProof-Security-5.1-Information-Disclosure.html CVE-2021-39327 - https://www.exploit-db.com/exploits/50382 CVE-2021-39352 - http://packetstormsecurity.com/files/165207/WordPress-Catch-Themes-Demo-Import-1.6.1-Shell-Upload.html @@ -85442,6 +85455,7 @@ CVE-2022-37771 - https://packetstormsecurity.com/files/167913/IObit-Malware-Figh CVE-2022-37775 - http://genesys.com CVE-2022-37775 - http://packetstormsecurity.com/files/168410/Genesys-PureConnect-Cross-Site-Scripting.html CVE-2022-37781 - https://github.com/nu774/fdkaac/issues/54 +CVE-2022-37783 - http://www.openwall.com/lists/oss-security/2024/06/06/1 CVE-2022-37794 - https://github.com/anx0ing/CVE_demo/blob/main/2022/Library%20Management%20System%20with%20QR%20code%20Attendance%20and%20Auto%20Generate%20Library%20Card%20-%20SQL%20injections.md CVE-2022-37797 - https://redmine.lighttpd.net/issues/3165 CVE-2022-37798 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/5 @@ -87191,6 +87205,7 @@ CVE-2022-45045 - https://vulncheck.com/blog/xiongmai-iot-exploitation CVE-2022-4505 - https://huntr.dev/bounties/e36ca754-bb9f-4686-ad72-7fb849e97d92 CVE-2022-4506 - https://huntr.dev/bounties/f423d193-4ab0-4f03-ad90-25e4f02e7942 CVE-2022-45062 - https://gitlab.xfce.org/xfce/xfce4-settings/-/issues/390 +CVE-2022-45063 - http://www.openwall.com/lists/oss-security/2024/06/17/1 CVE-2022-4507 - https://wpscan.com/vulnerability/93c61a70-5624-4c4d-ac3a-c598aec4f8b6 CVE-2022-4508 - https://wpscan.com/vulnerability/5101a979-7a53-40bf-8988-6347ef851eab CVE-2022-4509 - https://wpscan.com/vulnerability/90baba2e-a64f-4725-b76c-3aed94b18910 @@ -87205,6 +87220,7 @@ CVE-2022-45132 - https://podalirius.net/en/articles/python-vulnerabilities-code- CVE-2022-45144 - https://herolab.usd.de/security-advisories/usd-2022-0048/ CVE-2022-45163 - https://research.nccgroup.com/2022/11/17/cve-2022-45163/ CVE-2022-45163 - https://research.nccgroup.com/category/technical-advisory/ +CVE-2022-45168 - https://www.gruppotim.it/it/footer/red-team.html CVE-2022-45169 - https://www.gruppotim.it/it/footer/red-team.html CVE-2022-45170 - https://www.gruppotim.it/it/footer/red-team.html CVE-2022-45171 - https://www.gruppotim.it/it/footer/red-team.html @@ -87212,6 +87228,7 @@ CVE-2022-45172 - https://www.gruppotim.it/it/footer/red-team.html CVE-2022-45173 - https://www.gruppotim.it/it/footer/red-team.html CVE-2022-45174 - https://www.gruppotim.it/it/footer/red-team.html CVE-2022-45175 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2022-45176 - https://www.gruppotim.it/it/footer/red-team.html CVE-2022-45177 - https://www.gruppotim.it/it/footer/red-team.html CVE-2022-45178 - https://www.gruppotim.it/it/footer/red-team.html CVE-2022-45179 - https://www.gruppotim.it/it/footer/red-team.html @@ -90535,6 +90552,8 @@ CVE-2023-2765 - https://github.com/eckert-lcc/cve/blob/main/Weaver%20oa.md CVE-2023-2765 - https://vuldb.com/?id.229270 CVE-2023-27651 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27651/CVE%20detail.md CVE-2023-27652 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27652/CVE%20detail.md +CVE-2023-27653 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27653/CVE%20detail.md +CVE-2023-27654 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27654/CVE%20detail.md CVE-2023-27655 - https://forum.xpdfreader.com/viewtopic.php?t=42398 CVE-2023-27655 - https://github.com/keepinggg/poc/blob/main/poc_of_xpdf/id2 CVE-2023-27655 - https://github.com/keepinggg/poc/tree/main/poc_of_xpdf @@ -91314,6 +91333,7 @@ CVE-2023-3148 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com. CVE-2023-31483 - https://github.com/CauldronDevelopmentLLC/cbang/issues/115 CVE-2023-31489 - https://github.com/FRRouting/frr/issues/13098 CVE-2023-3149 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-adminusermanage_userphp +CVE-2023-3149 - https://vuldb.com/?id.231018 CVE-2023-31490 - https://github.com/FRRouting/frr/issues/13099 CVE-2023-31492 - http://packetstormsecurity.com/files/177091/ManageEngine-ADManager-Plus-Recovery-Password-Disclosure.html CVE-2023-31492 - https://github.com/passtheticket/vulnerability-research/blob/main/manage-engine-apps/admanager-recovery-password-disclosure.md @@ -91789,6 +91809,7 @@ CVE-2023-33921 - http://seclists.org/fulldisclosure/2023/Jul/14 CVE-2023-3393 - https://huntr.dev/bounties/e4df9280-900a-407a-a07e-e7fef3345914 CVE-2023-3394 - https://huntr.dev/bounties/84bf3e85-cdeb-4b8d-9ea4-74156dbda83f CVE-2023-33956 - https://github.com/kanboard/kanboard/security/advisories/GHSA-r36m-44gg-wxg2 +CVE-2023-3396 - https://vuldb.com/?id.232351 CVE-2023-33968 - https://github.com/kanboard/kanboard/security/advisories/GHSA-gf8r-4p6m-v8vr CVE-2023-33969 - https://github.com/kanboard/kanboard/security/advisories/GHSA-8qvf-9847-gpc9 CVE-2023-33970 - https://github.com/kanboard/kanboard/security/advisories/GHSA-wfch-8rhv-v286 @@ -91996,6 +92017,7 @@ CVE-2023-35002 - https://talosintelligence.com/vulnerability_reports/TALOS-2023- CVE-2023-3501 - https://wpscan.com/vulnerability/d3fb4a2b-ed51-4654-b7c1-4b0f59cd1ecf CVE-2023-35016 - https://www.ibm.com/support/pages/node/7014397 CVE-2023-35019 - https://www.ibm.com/support/pages/node/7014397 +CVE-2023-3505 - https://vuldb.com/?id.232953 CVE-2023-35055 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761 CVE-2023-35056 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761 CVE-2023-35057 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1821 @@ -92237,6 +92259,7 @@ CVE-2023-36820 - https://github.com/micronaut-projects/micronaut-security/securi CVE-2023-36821 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-7grx-f945-mj96 CVE-2023-36822 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-vr8x-74pm-6vj7 CVE-2023-36828 - https://github.com/statamic/cms/security/advisories/GHSA-6r5g-cq4q-327g +CVE-2023-3684 - https://vuldb.com/?id.234230 CVE-2023-36844 - http://packetstormsecurity.com/files/174397/Juniper-JunOS-SRX-EX-Remote-Code-Execution.html CVE-2023-36844 - http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html CVE-2023-36845 - http://packetstormsecurity.com/files/174397/Juniper-JunOS-SRX-EX-Remote-Code-Execution.html @@ -92347,6 +92370,7 @@ CVE-2023-37475 - https://github.com/hamba/avro/security/advisories/GHSA-9x44-9pg CVE-2023-37477 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-p9xf-74xh-mhw5 CVE-2023-37478 - https://github.com/pnpm/pnpm/security/advisories/GHSA-5r98-f33j-g8h7 CVE-2023-3752 - https://vuldb.com/?id.234422 +CVE-2023-3753 - https://vuldb.com/?id.234423 CVE-2023-37543 - https://medium.com/@hussainfathy99/exciting-news-my-first-cve-discovery-cve-2023-37543-idor-vulnerability-in-cacti-bbb6c386afed CVE-2023-37569 - http://packetstormsecurity.com/files/174084/Emagic-Data-Center-Management-Suite-6.0-Remote-Command-Execution.html CVE-2023-37581 - http://seclists.org/fulldisclosure/2023/Jul/43 @@ -92430,6 +92454,7 @@ CVE-2023-37833 - https://github.com/strik3r0x1/Vulns/blob/main/BAC%20leads%20to% CVE-2023-37836 - https://github.com/thorfdbg/libjpeg/issues/87#BUG1 CVE-2023-37837 - https://github.com/thorfdbg/libjpeg/issues/87#BUG0 CVE-2023-3784 - https://seclists.org/fulldisclosure/2023/Jul/37 +CVE-2023-3784 - https://vuldb.com/?id.235051 CVE-2023-3784 - https://www.vulnerability-lab.com/get_content.php?id=2317 CVE-2023-37849 - https://heegong.github.io/posts/Local-privilege-escalation-in-Panda-Dome-VPN-for-Windows-Installer/ CVE-2023-3785 - https://seclists.org/fulldisclosure/2023/Jul/39 @@ -92499,6 +92524,7 @@ CVE-2023-38253 - https://github.com/tats/w3m/issues/271 CVE-2023-38286 - https://github.com/p1n93r/SpringBootAdmin-thymeleaf-SSTI CVE-2023-3830 - https://vuldb.com/?id.235151 CVE-2023-38328 - https://www.gruppotim.it/it/footer/red-team.html +CVE-2023-3833 - https://vuldb.com/?id.235159 CVE-2023-38334 - http://packetstormsecurity.com/files/173696/Omnis-Studio-10.22.00-Library-Unlock.html CVE-2023-38334 - http://seclists.org/fulldisclosure/2023/Jul/42 CVE-2023-38334 - http://seclists.org/fulldisclosure/2023/Jul/43 @@ -94225,6 +94251,10 @@ CVE-2023-4911 - http://packetstormsecurity.com/files/176288/Glibc-Tunables-Privi CVE-2023-4911 - http://seclists.org/fulldisclosure/2023/Oct/11 CVE-2023-4911 - http://www.openwall.com/lists/oss-security/2023/10/03/2 CVE-2023-4911 - https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt +CVE-2023-49110 - https://r.sec-consult.com/kiuwan +CVE-2023-49111 - https://r.sec-consult.com/kiuwan +CVE-2023-49112 - https://r.sec-consult.com/kiuwan +CVE-2023-49113 - https://r.sec-consult.com/kiuwan CVE-2023-49114 - http://seclists.org/fulldisclosure/2024/Mar/10 CVE-2023-49114 - https://r.sec-consult.com/qognify CVE-2023-4912 - https://gitlab.com/gitlab-org/gitlab/-/issues/424882 @@ -94440,6 +94470,7 @@ CVE-2023-5030 - https://github.com/husterdjx/cve/blob/main/sql1.md CVE-2023-5033 - https://vuldb.com/?id.239877 CVE-2023-50358 - https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2024/2024-213941-1032 CVE-2023-5036 - https://huntr.dev/bounties/46881df7-eb41-4ce2-a78f-82de9bc4fc2d +CVE-2023-50387 - https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/ CVE-2023-5041 - https://wpscan.com/vulnerability/45194442-6eea-4e07-85a5-4a1e2fde3523 CVE-2023-50422 - https://blogs.sap.com/2023/12/12/unveiling-critical-security-updates-sap-btp-security-note-3411067/ CVE-2023-50423 - https://blogs.sap.com/2023/12/12/unveiling-critical-security-updates-sap-btp-security-note-3411067/ @@ -95150,6 +95181,7 @@ CVE-2023-6576 - https://github.com/willchen0011/cve/blob/main/upload.md CVE-2023-6577 - https://github.com/kpz-wm/cve/blob/main/Any_file_read.md CVE-2023-6579 - http://packetstormsecurity.com/files/176124/osCommerce-4-SQL-Injection.html CVE-2023-6580 - https://github.com/c2dc/cve-reported/blob/main/CVE-2023-6580/CVE-2023-6580.md +CVE-2023-6581 - https://github.com/flyyue2001/cve/blob/main/D-LINK%20-DAR-7000_sql_workidajax.md CVE-2023-6584 - https://wpscan.com/vulnerability/e528e3cd-a45c-4bf7-a37a-101f5c257acd/ CVE-2023-6585 - https://wpscan.com/vulnerability/757412f4-e4f8-4007-8e3b-639a72b33180/ CVE-2023-6591 - https://wpscan.com/vulnerability/f296de1c-b70b-4829-aba7-4afa24f64c51/ @@ -95399,6 +95431,7 @@ CVE-2024-0420 - https://wpscan.com/vulnerability/b6187ef8-70f4-4911-abd7-42bf6b7 CVE-2024-0421 - https://wpscan.com/vulnerability/587acc47-1966-4baf-a380-6aa479a97c82/ CVE-2024-0425 - https://github.com/mi2acle/forucmsvuln/blob/master/passwordreset.md CVE-2024-0426 - https://github.com/mi2acle/forucmsvuln/blob/master/sqli.md +CVE-2024-0427 - https://wpscan.com/vulnerability/1806fef3-d774-46e0-aa48-7a101495f4eb/ CVE-2024-0439 - https://huntr.com/bounties/7fc1b78e-7faf-4f40-961d-61e53dac81ce CVE-2024-0440 - https://huntr.com/bounties/263fd7eb-f9a9-4578-9655-0e28c609272f CVE-2024-0455 - https://huntr.com/bounties/07d83b49-7ebb-40d2-83fc-78381e3c5c9c @@ -95592,6 +95625,7 @@ CVE-2024-1274 - https://wpscan.com/vulnerability/91dba45b-9930-4bfb-a7bf-903c468 CVE-2024-1279 - https://wpscan.com/vulnerability/4c537264-0c23-428e-9a11-7a9e74fb6b69/ CVE-2024-1290 - https://wpscan.com/vulnerability/a60187d4-9491-435a-bc36-8dd348a1ffa3/ CVE-2024-1292 - https://wpscan.com/vulnerability/56d4fc48-d0dc-4ac6-93cd-f64d4c3c5c07/ +CVE-2024-1295 - https://wpscan.com/vulnerability/3cffbeb0-545a-4002-b02c-0fa38cada1db/ CVE-2024-1306 - https://wpscan.com/vulnerability/c7ce2649-b2b0-43f4-994d-07b1023405e9/ CVE-2024-1307 - https://wpscan.com/vulnerability/bbc6cebd-e9bf-4b08-a474-f9312b3c0947/ CVE-2024-1309 - https://www.honeywell.com/us/en/product-security @@ -95686,6 +95720,7 @@ CVE-2024-1928 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.c CVE-2024-1929 - https://www.openwall.com/lists/oss-security/2024/03/04/2 CVE-2024-1930 - https://www.openwall.com/lists/oss-security/2024/03/04/2 CVE-2024-1932 - https://huntr.com/bounties/fefd711e-3bf0-4884-9acc-167649c1f9a2 +CVE-2024-1938 - https://issues.chromium.org/issues/324596281 CVE-2024-1956 - https://wpscan.com/vulnerability/d7034ac2-0098-48d2-9ba9-87e09b178f7d/ CVE-2024-1958 - https://wpscan.com/vulnerability/8be4ebcf-2b42-4b88-89a0-2df6dbf00b55/ CVE-2024-1962 - https://wpscan.com/vulnerability/469486d4-7677-4d66-83c0-a6b9ac7c503b/ @@ -95955,6 +95990,7 @@ CVE-2024-2189 - https://wpscan.com/vulnerability/b8661fbe-78b9-4d29-90bf-5b68af4 CVE-2024-21907 - https://alephsecurity.com/vulns/aleph-2018004 CVE-2024-21907 - https://security.snyk.io/vuln/SNYK-DOTNET-NEWTONSOFTJSON-2774678 CVE-2024-2193 - https://www.vusec.net/projects/ghostrace/ +CVE-2024-22002 - https://github.com/0xkickit/iCUE_DllHijack_LPE-CVE-2024-22002 CVE-2024-22049 - https://github.com/advisories/GHSA-5pq7-52mg-hr42 CVE-2024-22049 - https://github.com/jnunemaker/httparty/security/advisories/GHSA-5pq7-52mg-hr42 CVE-2024-22086 - https://github.com/hayyp/cherry/issues/1 @@ -95966,6 +96002,7 @@ CVE-2024-22108 - https://adepts.of0x.cc/gtbcc-pwned/ CVE-2024-22108 - https://x-c3ll.github.io/cves.html CVE-2024-22120 - https://support.zabbix.com/browse/ZBX-24505 CVE-2024-22144 - https://patchstack.com/articles/critical-vulnerability-found-in-gotmls-plugin?_s_id=cve +CVE-2024-2218 - https://wpscan.com/vulnerability/ecd615f7-946e-45af-a610-0654a243b1dc/ CVE-2024-22190 - https://github.com/gitpython-developers/GitPython/pull/1792 CVE-2024-22190 - https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-2mqj-m65w-jghx CVE-2024-22191 - https://github.com/avo-hq/avo/security/advisories/GHSA-ghjv-mh6x-7q6h @@ -96076,6 +96113,7 @@ CVE-2024-22852 - https://github.com/Beckaf/vunl/blob/main/D-Link/AC750/1/1.md CVE-2024-22852 - https://www.dlink.com/en/security-bulletin/ CVE-2024-22853 - https://www.dlink.com/en/security-bulletin/ CVE-2024-22854 - https://tomekwasiak.pl/cve-2024-22854/ +CVE-2024-22855 - https://www.exploit-db.com/exploits/52025 CVE-2024-22856 - https://www.4rth4s.xyz/2024/04/cve-2024-22856-authenticated-blind-sql.html CVE-2024-22857 - https://www.ebryx.com/blogs/arbitrary-code-execution-in-zlog-cve-2024-22857 CVE-2024-22859 - https://github.com/github/advisory-database/pull/3490 @@ -96162,6 +96200,7 @@ CVE-2024-23648 - https://github.com/pimcore/admin-ui-classic-bundle/security/adv CVE-2024-23649 - https://github.com/LemmyNet/lemmy/security/advisories/GHSA-r64r-5h43-26qv CVE-2024-2365 - https://github.com/ctflearner/Android_Findings/blob/main/Musicshelf/Weak_Hashing_Algorithms.md CVE-2024-23655 - https://github.com/tutao/tutanota/security/advisories/GHSA-5h47-g927-629g +CVE-2024-23656 - https://github.com/dexidp/dex/pull/2964 CVE-2024-23656 - https://github.com/dexidp/dex/security/advisories/GHSA-gr79-9v6v-gc9r CVE-2024-23660 - https://secbit.io/blog/en/2024/01/19/trust-wallets-fomo3d-summer-vuln/ CVE-2024-23674 - https://ctrlalt.medium.com/space-attack-spoofing-eids-password-authenticated-connection-establishment-11561e5657b1 @@ -96223,6 +96262,7 @@ CVE-2024-24041 - https://github.com/tubakvgc/CVE/blob/main/Travel_Journal_App.md CVE-2024-24041 - https://portswigger.net/web-security/cross-site-scripting CVE-2024-2405 - https://wpscan.com/vulnerability/c42ffa15-6ebe-4c70-9e51-b95bd05ea04d/ CVE-2024-24050 - https://www.muratcagrialis.com/workout-journal-app-stored-xss-cve-2024-24050 +CVE-2024-24051 - https://github.com/tkruppert/Reported_Vulnerabilities/blob/main/CVE-2024-24051.md CVE-2024-24059 - https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/springboot-manager.md#2-file-upload-vulnerability CVE-2024-24060 - https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/springboot-manager.md#11-stored-cross-site-scripting-sysuser CVE-2024-24061 - https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/springboot-manager.md#13-stored-cross-site-scripting-syscontentadd @@ -96262,6 +96302,7 @@ CVE-2024-24294 - https://gist.github.com/mestrtee/d1eb6e1f7c6dd60d8838c3e56cab63 CVE-2024-24300 - https://github.com/yckuo-sdc/PoC CVE-2024-24301 - https://github.com/yckuo-sdc/PoC CVE-2024-2432 - https://security.paloaltonetworks.com/CVE-2024-2432 +CVE-2024-24320 - https://datack.my/cloudpanel-v2-0-0-v2-4-0-authenticated-user-session-hijacking-cve-2024-24320/ CVE-2024-24321 - https://github.com/dkjiayu/Vul/blob/main/DIR816A2-dir_setWanWifi.md CVE-2024-24321 - https://www.dlink.com/en/security-bulletin/ CVE-2024-24325 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/11/TOTOlink%20A3300R%20setParentalRules.md @@ -96626,8 +96667,11 @@ CVE-2024-25973 - http://seclists.org/fulldisclosure/2024/Feb/23 CVE-2024-25973 - https://r.sec-consult.com/openolat CVE-2024-25974 - http://seclists.org/fulldisclosure/2024/Feb/23 CVE-2024-25974 - https://r.sec-consult.com/openolat +CVE-2024-25975 - http://seclists.org/fulldisclosure/2024/May/34 CVE-2024-25975 - https://r.sec-consult.com/hawki +CVE-2024-25976 - http://seclists.org/fulldisclosure/2024/May/34 CVE-2024-25976 - https://r.sec-consult.com/hawki +CVE-2024-25977 - http://seclists.org/fulldisclosure/2024/May/34 CVE-2024-25977 - https://r.sec-consult.com/hawki CVE-2024-2603 - https://wpscan.com/vulnerability/b4186c03-99ee-4297-85c0-83b7053afc1c/ CVE-2024-2604 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20File%20Manager%20App/Arbitrary%20File%20Upload%20-%20update-file.php.md @@ -96660,6 +96704,7 @@ CVE-2024-26492 - https://packetstormsecurity.com/files/165555/Online-Diagnostic- CVE-2024-26492 - https://www.exploit-db.com/exploits/50660 CVE-2024-26495 - https://github.com/friendica/friendica/issues/13884 CVE-2024-26504 - https://tomiodarim.io/posts/cve-2024-26504/ +CVE-2024-26507 - https://belong2yourself.github.io/vulnerabilities/docs/AIDA/Elevation-of-Privileges/readme/ CVE-2024-26521 - https://github.com/capture0x/Phoenix CVE-2024-26521 - https://github.com/hackervegas001/CVE-2024-26521 CVE-2024-26529 - https://github.com/mz-automation/libiec61850/issues/492 @@ -96768,6 +96813,7 @@ CVE-2024-2760 - https://fluidattacks.com/advisories/kent/ CVE-2024-2761 - https://wpscan.com/vulnerability/e092ccdc-7ea1-4937-97b7-4cdbff5e74e5/ CVE-2024-27619 - https://github.com/ioprojecton/dir-3040_dos CVE-2024-27619 - https://www.dlink.com/en/security-bulletin/ +CVE-2024-2762 - https://wpscan.com/vulnerability/92e0f5ca-0184-4e9c-b01a-7656e05dce69/ CVE-2024-27620 - https://packetstormsecurity.com/files/177506/Ladder-0.0.21-Server-Side-Request-Forgery.html CVE-2024-27622 - https://packetstormsecurity.com/files/177241/CMS-Made-Simple-2.2.19-Remote-Code-Execution.html CVE-2024-27625 - https://packetstormsecurity.com/files/177243/CMS-Made-Simple-2.2.19-Cross-Site-Scripting.html @@ -96820,6 +96866,7 @@ CVE-2024-28066 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisorie CVE-2024-2807 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formExpandDlnaFile.md CVE-2024-2807 - https://vuldb.com/?id.257662 CVE-2024-2808 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formQuickIndex.md +CVE-2024-28085 - http://www.openwall.com/lists/oss-security/2024/03/27/5 CVE-2024-28085 - https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt CVE-2024-28085 - https://www.openwall.com/lists/oss-security/2024/03/27/5 CVE-2024-28088 - https://github.com/PinkDraconian/PoC-Langchain-RCE/blob/main/README.md @@ -96844,6 +96891,7 @@ CVE-2024-28120 - https://securitylab.github.com/advisories/GHSL-2024-027_GHSL-20 CVE-2024-28122 - https://github.com/lestrrat-go/jwx/security/advisories/GHSA-hj3v-m684-v259 CVE-2024-2813 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/form_fast_setting_wifi_set.md CVE-2024-2814 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/fromDhcpListClient_page.md +CVE-2024-28147 - https://r.sec-consult.com/metaventis CVE-2024-2815 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/R7WebsSecurityHandler.md CVE-2024-2816 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromSysToolReboot.md CVE-2024-2817 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromSysToolRestoreSet.md @@ -97109,14 +97157,17 @@ CVE-2024-29974 - https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ CVE-2024-29975 - https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ CVE-2024-29976 - https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ CVE-2024-3000 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Authentication%20Bypass.md +CVE-2024-3000 - https://vuldb.com/?id.258202 CVE-2024-3001 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%203.md CVE-2024-3002 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%204.md CVE-2024-3003 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%205.md +CVE-2024-3003 - https://vuldb.com/?id.258205 CVE-2024-3004 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Cross-Site-Scripting.md CVE-2024-3011 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formQuickIndex.md CVE-2024-3012 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/GetParentControlInfo.md CVE-2024-30162 - http://seclists.org/fulldisclosure/2024/Apr/21 CVE-2024-30163 - http://seclists.org/fulldisclosure/2024/Apr/20 +CVE-2024-30212 - https://github.com/Fehr-GmbH/blackleak CVE-2024-3024 - https://docs.google.com/document/d/1wCIrViAJwGsO5afPBLLjRhO5RClsoUo3J9q1psLs84s/edit?usp=sharing CVE-2024-30248 - https://github.com/piccolo-orm/piccolo_admin/security/advisories/GHSA-pmww-v6c9-7p83 CVE-2024-30252 - https://github.com/nt1m/livemarks/security/advisories/GHSA-3gg9-w4fm-jjcg @@ -97127,6 +97178,8 @@ CVE-2024-30259 - https://drive.google.com/file/d/1Y2bGvP3UIOJCLh_XEURLdhrM2Sznlv CVE-2024-30259 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-qcj9-939p-p662 CVE-2024-30264 - https://github.com/baptisteArno/typebot.io/security/advisories/GHSA-mx2f-9mcr-8j73 CVE-2024-30268 - https://github.com/Cacti/cacti/security/advisories/GHSA-9m3v-whmr-pc2q +CVE-2024-30311 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1946 +CVE-2024-3032 - https://wpscan.com/vulnerability/d130a60c-c36b-4994-9b0e-e52cd7f99387/ CVE-2024-30406 - https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/services-paa-test-agent.html CVE-2024-3048 - https://wpscan.com/vulnerability/e179ff7d-137c-48bf-8b18-e874e3f876f4/ CVE-2024-3050 - https://wpscan.com/vulnerability/04c1581e-fd36-49d4-8463-b49915d4b1ac/ @@ -97192,6 +97245,7 @@ CVE-2024-30809 - https://github.com/axiomatic-systems/Bento4/issues/937 CVE-2024-30840 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromDhcpListClient_list1.md CVE-2024-30845 - https://gist.github.com/Zshan7que/c813f2b52daab08c9fb4f6c6b8178b66 CVE-2024-30845 - https://github.com/netcccyun/pan/issues/6 +CVE-2024-30848 - https://github.com/Excis3/CVE-Disclosure/blob/main/CVE-2024-30848.md CVE-2024-30849 - https://github.com/wkeyi0x1/vul-report/issues/3 CVE-2024-30850 - https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents/ CVE-2024-30851 - https://github.com/chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc @@ -97255,6 +97309,7 @@ CVE-2024-3118 - https://vuldb.com/?id.258779 CVE-2024-31212 - https://github.com/instantsoft/icms2/security/advisories/GHSA-qx95-w566-73fw CVE-2024-31213 - https://github.com/instantsoft/icms2/security/advisories/GHSA-6v3c-p92q-prfq CVE-2024-31214 - https://github.com/traccar/traccar/security/advisories/GHSA-3gxq-f2qj-c8v9 +CVE-2024-31217 - https://github.com/strapi/strapi/security/advisories/GHSA-pm9q-xj9p-96pm CVE-2024-3124 - https://github.com/ctflearner/Android_Findings/blob/main/Smartalarm/Backup.md CVE-2024-3124 - https://vuldb.com/?submit.307752 CVE-2024-3125 - https://github.com/strik3r0x1/Vulns/blob/main/ZTC_GK420d-SXSS.md @@ -97288,6 +97343,8 @@ CVE-2024-3146 - https://github.com/Hckwzh/cms/blob/main/14.md CVE-2024-31460 - https://github.com/Cacti/cacti/security/advisories/GHSA-cx8g-hvq8-p2rv CVE-2024-31460 - https://github.com/Cacti/cacti/security/advisories/GHSA-gj3f-p326-gh8r CVE-2024-3147 - https://github.com/Hckwzh/cms/blob/main/15.md +CVE-2024-3148 - https://vuldb.com/?id.258923 +CVE-2024-31497 - https://github.com/daedalus/BreakingECDSAwithLLL CVE-2024-31497 - https://securityonline.info/cve-2024-31497-critical-putty-vulnerability-exposes-private-keys-immediate-action-required/ CVE-2024-31497 - https://www.bleepingcomputer.com/news/security/putty-ssh-client-flaw-allows-recovery-of-cryptographic-private-keys/ CVE-2024-31502 - https://github.com/sahildari/cve/blob/master/CVE-2024-31502.md @@ -97300,7 +97357,10 @@ CVE-2024-31545 - https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-4-Co CVE-2024-31546 - https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-2-Computer-Laboratory-Management-System-PoC.md CVE-2024-31547 - https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-3-Computer-Laboratory-Management-System-PoC.md CVE-2024-31581 - https://github.com/FFmpeg/FFmpeg/blob/n6.1.1/libavcodec/cbs_h266_syntax_template.c#L2048 +CVE-2024-31586 - https://github.com/CyberSentryX/CVE_Hunting/tree/main/CVE-2024-31586 CVE-2024-31610 - https://github.com/ss122-0ss/School/blob/main/readme.md +CVE-2024-31612 - https://github.com/ss122-0ss/cms/blob/main/emlog-csrf.md +CVE-2024-31613 - https://github.com/ss122-0ss/BOSSCMS/blob/main/bosscms%20csrf.md CVE-2024-31616 - https://gist.github.com/Swind1er/0c50e72428059fb72a4fd4d31c43f883 CVE-2024-31621 - https://www.exploit-db.com/exploits/52001 CVE-2024-31636 - https://github.com/lief-project/LIEF/issues/1038 @@ -97320,6 +97380,7 @@ CVE-2024-31759 - https://gist.github.com/menghaining/8d424faebfe869c80eadaea12bb CVE-2024-31759 - https://github.com/menghaining/PoC/blob/main/PublicCMS/publishCMS--PoC.md CVE-2024-31760 - https://gist.github.com/menghaining/8d424faebfe869c80eadaea12bbdd158 CVE-2024-31760 - https://github.com/menghaining/PoC/blob/main/gin-vue-admin/gin-vue-admin--PoC.md +CVE-2024-31777 - https://github.com/FreySolarEye/Exploit-CVE-2024-31777 CVE-2024-31804 - https://www.exploit-db.com/exploits/51977 CVE-2024-31819 - https://chocapikk.com/posts/2024/cve-2024-31819/ CVE-2024-31819 - https://github.com/Chocapikk/CVE-2024-31819 @@ -97354,8 +97415,10 @@ CVE-2024-3207 - https://vuldb.com/?submit.304572 CVE-2024-3209 - https://vuldb.com/?submit.304575 CVE-2024-32163 - https://github.com/XiLitter/CMS_vulnerability-discovery/blob/main/CMSeasy_7.7.7.9_code_execution.md CVE-2024-32166 - https://github.com/Fewword/Poc/blob/main/webid/webid-poc14.md +CVE-2024-32167 - https://github.com/ss122-0ss/cms/blob/main/omos.md CVE-2024-3218 - https://github.com/garboa/cve_3/blob/main/file_put_content.md CVE-2024-32206 - https://github.com/majic-banana/vulnerability/blob/main/POC/WUZHICMS4.1.0%20Stored%20Xss%20In%20Affiche%20Model.md +CVE-2024-3221 - https://vuldb.com/?id.259066 CVE-2024-32254 - https://github.com/jinhaochan/CVE-POC/blob/main/tms/POC.md CVE-2024-32256 - https://github.com/jinhaochan/CVE-POC/blob/main/tms/POC.md CVE-2024-32258 - https://github.com/TASEmulators/fceux/issues/727 @@ -97399,6 +97462,7 @@ CVE-2024-32343 - https://github.com/adiapera/xss_create2_boidcms_2.1.0 CVE-2024-32344 - https://github.com/adiapera/xss_language_cmsimple_5.15/blob/main/README.md CVE-2024-32345 - https://github.com/adiapera/xss_language_cmsimple_5.15 CVE-2024-32359 - https://github.com/HouqiyuA/k8s-rbac-poc +CVE-2024-3236 - https://wpscan.com/vulnerability/a6c2da28-dc03-4bcc-a6c3-ee55a73861db/ CVE-2024-32369 - https://github.com/chucrutis/CVE-2024-32369 CVE-2024-3239 - https://wpscan.com/vulnerability/dfa1421b-41b0-4b25-95ef-0843103e1f5e/ CVE-2024-32391 - https://github.com/magicblack/maccms10/issues/1133 @@ -97442,6 +97506,7 @@ CVE-2024-32743 - https://github.com/adiapera/xss_security_wondercms_3.4.3 CVE-2024-32744 - https://github.com/adiapera/xss_current_page_wondercms_3.4.3 CVE-2024-32745 - https://github.com/adiapera/xss_current_page_wondercms_3.4.3 CVE-2024-32746 - https://github.com/adiapera/xss_menu_page_wondercms_3.4.3 +CVE-2024-3276 - https://wpscan.com/vulnerability/996d3247-ebdd-49d1-a1a3-ceedcf9f2f95/ CVE-2024-3281 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-003.txt CVE-2024-32866 - https://github.com/edmundhung/conform/security/advisories/GHSA-624g-8qjg-8qxf CVE-2024-32869 - https://github.com/honojs/hono/security/advisories/GHSA-3mpf-rcc7-5347 @@ -97475,6 +97540,7 @@ CVE-2024-33113 - https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC CVE-2024-3322 - https://github.com/parisneo/lollms-webui/commit/1e17df01e01d4d33599db2afaafe91d90b6f0189 CVE-2024-33247 - https://github.com/CveSecLook/cve/issues/11 CVE-2024-33250 - https://github.com/hacker2004/cccccckkkkkk/blob/main/CVE-2024-33250.md +CVE-2024-33253 - https://github.com/FreySolarEye/CVE/blob/master/GUnet%20OpenEclass%20E-learning%20platform%203.15%20-%20'certbadge.php'%20Stored%20Cross%20Site%20Scripting CVE-2024-33255 - https://github.com/jerryscript-project/jerryscript/issues/5135 CVE-2024-33258 - https://github.com/jerryscript-project/jerryscript/issues/5114 CVE-2024-33259 - https://github.com/jerryscript-project/jerryscript/issues/5132 @@ -97494,6 +97560,9 @@ CVE-2024-33332 - https://github.com/wy876/cve/issues/3 CVE-2024-33338 - https://github.com/7akahash1/POC/blob/main/1.md CVE-2024-33345 - https://github.com/n0wstr/IOTVuln/tree/main/DIR-823g/UploadFirmware CVE-2024-33350 - https://github.com/majic-banana/vulnerability/blob/main/POC/taocms-3.0.2%20Arbitrary%20File%20Writing%20Vulnerability.md +CVE-2024-33373 - https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Password-Policy-Bypass--%7C--Inconsistent-Password-Policy-(CVE%E2%80%902024%E2%80%9033373) +CVE-2024-33374 - https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Incorrect-Access-Control-(CVE%E2%80%902024%E2%80%9033374) +CVE-2024-33377 - https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Clickjacking-(CVE%E2%80%902024%E2%80%9033377) CVE-2024-33383 - https://juvl1ne.github.io/2024/04/18/novel-plus-vulnerability/ CVE-2024-33398 - https://github.com/HouqiyuA/k8s-rbac-poc CVE-2024-33423 - https://github.com/adiapera/xss_language_cmsimple_5.15 @@ -97581,6 +97650,7 @@ CVE-2024-3400 - https://unit42.paloaltonetworks.com/cve-2024-3400/ CVE-2024-34020 - https://bugzilla.suse.com/show_bug.cgi?id=1223534 CVE-2024-3405 - https://wpscan.com/vulnerability/6968d43c-16ff-43a9-8451-71aabbe69014/ CVE-2024-34051 - https://blog.smarttecs.com/posts/2024-004-cve-2024-34051/ +CVE-2024-34058 - http://www.openwall.com/lists/oss-security/2024/05/16/3 CVE-2024-34058 - https://www.openwall.com/lists/oss-security/2024/05/16/3 CVE-2024-3406 - https://wpscan.com/vulnerability/1bfab060-64d2-4c38-8bc8-a8f81c5a6e0d/ CVE-2024-34061 - https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-pwgc-w4x9-gw67 @@ -97624,6 +97694,7 @@ CVE-2024-34252 - https://github.com/wasm3/wasm3/issues/483 CVE-2024-34257 - https://github.com/ZackSecurity/VulnerReport/blob/cve/totolink/EX1800T/1.md CVE-2024-34273 - https://github.com/chrisandoryan/vuln-advisory/blob/main/nJwt/CVE-2024-34273.md CVE-2024-34308 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/README.md +CVE-2024-34332 - https://belong2yourself.github.io/vulnerabilities/docs/SANDRA/Elevation-of-Privileges/readme/ CVE-2024-34340 - https://github.com/Cacti/cacti/security/advisories/GHSA-37x7-mfjv-mm7m CVE-2024-34345 - https://github.com/CycloneDX/cyclonedx-javascript-library/commit/5e5e1e0b9422f47d2de81c7c4064b803a01e7203 CVE-2024-34345 - https://github.com/CycloneDX/cyclonedx-javascript-library/pull/1063 @@ -97667,6 +97738,7 @@ CVE-2024-34532 - https://github.com/luvsn/OdZoo/tree/main/exploits/query_deluxe CVE-2024-34533 - https://github.com/luvsn/OdZoo/tree/main/exploits/izi_data CVE-2024-34534 - https://github.com/luvsn/OdZoo/tree/main/exploits/text_commander CVE-2024-34582 - https://github.com/silent6trinity/CVE-2024-34582 +CVE-2024-34694 - https://github.com/lnbits/lnbits/security/advisories/GHSA-3j4h-h3fp-vwww CVE-2024-3471 - https://wpscan.com/vulnerability/a3c282fb-81b8-48bf-8c18-8366ea8ad9af/ CVE-2024-34710 - https://github.com/requarks/wiki/security/advisories/GHSA-xjcj-p2qv-q3rf CVE-2024-34714 - https://github.com/hoppscotch/hoppscotch-extension/security/advisories/GHSA-jjh5-pvqx-gg5v @@ -97678,6 +97750,8 @@ CVE-2024-3476 - https://wpscan.com/vulnerability/46f74493-9082-48b2-90bc-2c1d1db CVE-2024-3477 - https://wpscan.com/vulnerability/ca5e59e6-c500-4129-997b-391cdf9aa9c7/ CVE-2024-3478 - https://wpscan.com/vulnerability/09f1a696-86ee-47cc-99de-57cfd2a3219d/ CVE-2024-3481 - https://wpscan.com/vulnerability/0c441293-e7f9-4634-8f3a-09925cd2b696/ +CVE-2024-34833 - https://github.com/ShellUnease/payroll-management-system-rce +CVE-2024-34833 - https://packetstormsecurity.com/files/179106/Payroll-Management-System-1.0-Remote-Code-Execution.html CVE-2024-34852 - https://github.com/Yang-Nankai/Vulnerabilities/blob/main/DataCube3%20Shell%20Code%20Injection.md CVE-2024-34854 - https://github.com/Yang-Nankai/Vulnerabilities/blob/main/DataCube3%20Shell%20Code%20Injection.md CVE-2024-34899 - https://hackerdna.com/courses/cve/cve-2024-34899 @@ -97704,6 +97778,8 @@ CVE-2024-34957 - https://github.com/Gr-1m/cms/blob/main/1.md CVE-2024-34958 - https://github.com/Gr-1m/cms/blob/main/2.md CVE-2024-34974 - https://github.com/hunzi0/Vullnfo/tree/main/Tenda/AC18/formSetPPTPServer CVE-2024-34987 - https://github.com/MarkLee131/PoCs/blob/main/CVE-2024-34987.md +CVE-2024-34987 - https://www.exploit-db.com/exploits/51989 +CVE-2024-34989 - https://security.friendsofpresta.org/modules/2024/06/20/prestapdf.html CVE-2024-34997 - https://github.com/joblib/joblib/issues/1582 CVE-2024-35009 - https://github.com/Thirtypenny77/cms/blob/main/5.md CVE-2024-35010 - https://github.com/Thirtypenny77/cms/blob/main/6.md @@ -97732,12 +97808,17 @@ CVE-2024-3521 - https://github.com/garboa/cve_3/blob/main/Upload2.md CVE-2024-35222 - https://github.com/tauri-apps/tauri/security/advisories/GHSA-57fm-592m-34r7 CVE-2024-35231 - https://github.com/rack/rack-contrib/security/advisories/GHSA-8c8q-2xw3-j869 CVE-2024-35232 - https://github.com/huandu/facebook/security/advisories/GHSA-3f65-m234-9mxr +CVE-2024-35235 - http://www.openwall.com/lists/oss-security/2024/06/11/1 +CVE-2024-35235 - https://github.com/OpenPrinting/cups/security/advisories/GHSA-vvwp-mv6j-hw6f CVE-2024-35236 - https://github.com/advplyr/audiobookshelf/security/advisories/GHSA-7j99-76cj-q9pg CVE-2024-3529 - https://vuldb.com/?id.259899 CVE-2024-35324 - https://github.com/w0x68y/cve-lists/blob/main/CMS/Douchat/Douchat%204.0.5%20arbitrary%20file%20upload%20vulnerability.md +CVE-2024-35326 - https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35326.c +CVE-2024-35328 - https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35328.c CVE-2024-35333 - https://github.com/momo1239/CVE-2024-35333 CVE-2024-35361 - https://github.com/Hebing123/cve/issues/37 CVE-2024-35362 - https://github.com/shopex/ecshop/issues/6 +CVE-2024-3537 - https://vuldb.com/?id.259907 CVE-2024-35373 - https://chocapikk.com/posts/2024/mocodo-vulnerabilities/ CVE-2024-35374 - https://chocapikk.com/posts/2024/mocodo-vulnerabilities/ CVE-2024-35384 - https://github.com/cesanta/mjs/issues/287 @@ -97763,6 +97844,7 @@ CVE-2024-35475 - https://github.com/carsonchan12345/OpenKM-CSRF-PoC CVE-2024-3548 - https://wpscan.com/vulnerability/9eef8b29-2c62-4daa-ae90-467ff9be18d8/ CVE-2024-35492 - https://github.com/zzh-newlearner/MQTT_Crash/blob/main/Mongoose_null_pointer.md CVE-2024-35511 - https://github.com/efekaanakkar/CVE-2024-35511/blob/main/Men%20Salon%20Management%20System%20Using%20PHP%20and%20MySQL.md +CVE-2024-3552 - https://wpscan.com/vulnerability/34b03ee4-de81-4fec-9f3d-e1bd5b94d136/ CVE-2024-35550 - https://github.com/bearman113/1.md/blob/main/17/csrf.md CVE-2024-35551 - https://github.com/bearman113/1.md/blob/main/16/csrf.md CVE-2024-35552 - https://github.com/bearman113/1.md/blob/main/20/csrf.md @@ -97823,6 +97905,7 @@ CVE-2024-36548 - https://github.com/da271133/cms/blob/main/31/csrf.md CVE-2024-36549 - https://github.com/da271133/cms/blob/main/30/csrf.md CVE-2024-36550 - https://github.com/da271133/cms/blob/main/29/csrf.md CVE-2024-3657 - https://bugzilla.redhat.com/show_bug.cgi?id=2274401 +CVE-2024-36598 - https://github.com/kaliankhe/CVE-Aslam-mahi/blob/9ec0572c68bfd3708a7d6e089181024131f4e927/vendors/projectworlds.in/AEGON%20LIFE%20v1.0%20Life%20Insurance%20Management%20System/CVE-2024-36598 CVE-2024-3660 - https://kb.cert.org/vuls/id/253266 CVE-2024-3660 - https://www.kb.cert.org/vuls/id/253266 CVE-2024-3661 - https://news.ycombinator.com/item?id=40279632 @@ -97835,6 +97918,9 @@ CVE-2024-36670 - https://github.com/sigubbs/cms/blob/main/33/csrf.md CVE-2024-36673 - https://github.com/CveSecLook/cve/issues/39 CVE-2024-36674 - https://github.com/LyLme/lylme_spage/issues/91 CVE-2024-36675 - https://github.com/LyLme/lylme_spage/issues/92 +CVE-2024-36678 - https://security.friendsofpresta.org/modules/2024/06/18/pk_themesettings.html +CVE-2024-36679 - https://security.friendsofpresta.org/modules/2024/06/18/livechatpro.html +CVE-2024-36680 - https://security.friendsofpresta.org/modules/2024/06/18/pkfacebook.html CVE-2024-36773 - https://github.com/OoLs5/VulDiscovery/blob/main/cve-2024-36773.md CVE-2024-36774 - https://github.com/OoLs5/VulDiscovery/blob/main/poc.docx CVE-2024-36775 - https://github.com/OoLs5/VulDiscovery/blob/main/monstra_xss.pdf @@ -97842,6 +97928,10 @@ CVE-2024-36779 - https://github.com/CveSecLook/cve/issues/42 CVE-2024-36783 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/NTPSyncWithHost/README.md CVE-2024-36800 - https://github.com/want1997/SEMCMS_VUL/blob/main/Download_sql_vul.md CVE-2024-36801 - https://github.com/want1997/SEMCMS_VUL/blob/main/Download_sql_vul_2.md +CVE-2024-36821 - https://github.com/IvanGlinkin/CVE-2024-36821 +CVE-2024-36840 - https://infosec-db.github.io/CyberDepot/vuln_boelter_blue/ +CVE-2024-36840 - https://packetstormsecurity.com/files/178978/Boelter-Blue-System-Management-1.3-SQL-Injection.html +CVE-2024-36840 - https://sploitus.com/exploit?id=PACKETSTORM:178978 CVE-2024-36843 - https://github.com/stephane/libmodbus/issues/748 CVE-2024-36844 - https://github.com/stephane/libmodbus/issues/749 CVE-2024-36845 - https://github.com/stephane/libmodbus/issues/750 @@ -97860,31 +97950,84 @@ CVE-2024-3720 - https://github.com/scausoft/cve/blob/main/sql.md CVE-2024-3721 - https://github.com/netsecfish/tbk_dvr_command_injection CVE-2024-3721 - https://vuldb.com/?id.260573 CVE-2024-37273 - https://github.com/HackAllSec/CVEs/tree/main/Jan%20Arbitrary%20File%20Upload%20vulnerability +CVE-2024-37301 - https://github.com/adfinis/document-merge-service/security/advisories/GHSA-v5gf-r78h-55q6 +CVE-2024-37308 - https://github.com/XjSv/Cooked/security/advisories/GHSA-9vfv-c966-jwrv CVE-2024-3735 - https://vuldb.com/?submit.311153 +CVE-2024-37393 - https://www.optistream.io/blogs/tech/securenvoy-cve-2024-37393 CVE-2024-37407 - https://github.com/libarchive/libarchive/pull/2145 CVE-2024-3745 - https://fluidattacks.com/advisories/gershwin/ CVE-2024-3748 - https://wpscan.com/vulnerability/01427cfb-5c51-4524-9b9d-e09a603bc34c/ CVE-2024-3749 - https://wpscan.com/vulnerability/d14bb16e-ce1d-4c31-8791-bc63174897c0/ CVE-2024-3752 - https://wpscan.com/vulnerability/e738540a-2006-4b92-8db1-2476374d35bd/ +CVE-2024-3754 - https://wpscan.com/vulnerability/8c6f3e3e-3047-4446-a190-750a60c29fa3/ CVE-2024-3755 - https://wpscan.com/vulnerability/d34caeaf-2ecf-44a2-b308-e940bafd402c/ CVE-2024-3756 - https://wpscan.com/vulnerability/b28d0dca-2df1-4925-be81-dd9c46859c38/ +CVE-2024-37568 - https://github.com/lepture/authlib/issues/654 CVE-2024-37569 - https://www.youtube.com/watch?v=I9TQqfP5qzM +CVE-2024-37619 - https://github.com/Hebing123/cve/issues/45 +CVE-2024-37620 - https://github.com/Hebing123/cve/issues/46 +CVE-2024-37622 - https://github.com/rainrocka/xinhu/issues/4 +CVE-2024-37623 - https://github.com/rainrocka/xinhu/issues/5 +CVE-2024-37624 - https://github.com/rainrocka/xinhu/issues/6 +CVE-2024-37625 - https://github.com/zhimengzhe/iBarn/issues/20 +CVE-2024-37629 - https://github.com/summernote/summernote/issues/4642 +CVE-2024-37632 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/loginAuth/README.md +CVE-2024-37633 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWiFiGuestCfg/README.md +CVE-2024-37634 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWiFiEasyCfg/README.md +CVE-2024-37637 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWizardCfg/README.md +CVE-2024-37642 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TRENDnet/TEW-814DAP/formSystemCheck/README.md +CVE-2024-37643 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TRENDnet/TEW-814DAP/formPasswordAuth/README.md CVE-2024-3765 - https://github.com/netsecfish/xiongmai_incorrect_access_control CVE-2024-3765 - https://github.com/netsecfish/xiongmai_incorrect_access_control/blob/main/pocCheck3-en.py +CVE-2024-37661 - https://github.com/ouuan/router-vuln-report/blob/master/icmp-redirect/tl-7dr5130-redirect.md +CVE-2024-37662 - https://github.com/ouuan/router-vuln-report/blob/master/nat-rst/tl-7dr5130-nat-rst.md CVE-2024-3767 - https://github.com/BurakSevben/CVEs/blob/main/News%20Portal/News%20Portal%20-%20SQL%20Injection%20-%203.md +CVE-2024-37671 - https://github.com/MohamedAzizMSALLEMI/Docubase_Security/blob/main/CVE-2024-37671.md +CVE-2024-37672 - https://github.com/MohamedAzizMSALLEMI/Docubase_Security/blob/main/CVE-2024-37672.md +CVE-2024-37673 - https://github.com/MohamedAzizMSALLEMI/Docubase_Security/blob/main/CVE-2024-37673.md +CVE-2024-37674 - https://github.com/MohamedAzizMSALLEMI/Moodle_Security/blob/main/CVE-2024-37674.md +CVE-2024-37675 - https://github.com/MohamedAzizMSALLEMI/Docubase_Security/blob/main/CVE-2024-37675.md CVE-2024-3768 - https://github.com/BurakSevben/CVEs/blob/main/News%20Portal/News%20Portal%20-%20SQL%20Injection%20-%204.md +CVE-2024-3768 - https://vuldb.com/?id.260615 CVE-2024-3769 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20Authentication%20Bypass.md CVE-2024-3770 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20SQL%20Injection%20-%203.md CVE-2024-3771 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20SQL%20Injection%20-%204.md +CVE-2024-37791 - https://github.com/duxphp/DuxCMS3/issues/5 +CVE-2024-37799 - https://github.com/himanshubindra/CVEs/blob/main/CVE-2024-37799 +CVE-2024-37803 - https://github.com/himanshubindra/CVEs/blob/main/CVE-2024-37803 +CVE-2024-37840 - https://github.com/ganzhi-qcy/cve/issues/4 +CVE-2024-37848 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/13 +CVE-2024-37849 - https://github.com/ganzhi-qcy/cve/issues/3 +CVE-2024-37877 - https://github.com/f4rs1ght/vuln-research/tree/main/CVE-2024-37877 CVE-2024-37880 - https://github.com/antoonpurnal/clangover CVE-2024-37880 - https://pqshield.com/pqshield-plugs-timing-leaks-in-kyber-ml-kem-to-improve-pqc-implementation-maturity/ +CVE-2024-37889 - https://github.com/TreyWW/MyFinances/security/advisories/GHSA-4884-3gvp-3wj2 +CVE-2024-37890 - https://github.com/websockets/ws/security/advisories/GHSA-3h5v-q93c-6h6q +CVE-2024-37896 - https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gf3r-h744-mqgp +CVE-2024-37904 - https://github.com/stacklok/minder/security/advisories/GHSA-hpcg-xjq5-g666 CVE-2024-3797 - https://github.com/BurakSevben/CVEs/blob/main/QR%20Code%20Bookmark%20System/QR%20Code%20Bookmark%20System%20-%20SQL%20Injection.md CVE-2024-3822 - https://wpscan.com/vulnerability/ff5411b1-9e04-4e72-a502-e431d774642a/ CVE-2024-3823 - https://wpscan.com/vulnerability/a138215c-4b8c-4182-978f-d21ce25070d3/ CVE-2024-3824 - https://wpscan.com/vulnerability/749ae334-b1d1-421e-a04c-35464c961a4a/ +CVE-2024-38347 - https://github.com/SandeepRajauriya/CVEs/blob/main/CVE-2024-38347 +CVE-2024-38348 - https://github.com/SandeepRajauriya/CVEs/blob/main/CVE-2024-38348 +CVE-2024-38358 - https://github.com/wasmerio/wasmer/security/advisories/GHSA-55f3-3qvg-8pv5 CVE-2024-3837 - https://issues.chromium.org/issues/41491379 +CVE-2024-38394 - https://gitlab.gnome.org/GNOME/gnome-settings-daemon/-/issues/780 +CVE-2024-38394 - https://gitlab.gnome.org/GNOME/gnome-settings-daemon/-/issues/780#note_2047914 +CVE-2024-38394 - https://pulsesecurity.co.nz/advisories/usbguard-bypass +CVE-2024-38395 - http://www.openwall.com/lists/oss-security/2024/06/17/1 +CVE-2024-38396 - http://www.openwall.com/lists/oss-security/2024/06/17/1 +CVE-2024-38396 - https://vin01.github.io/piptagole/escape-sequences/iterm2/rce/2024/06/16/iterm2-rce-window-title-tmux-integration.html +CVE-2024-3840 - https://issues.chromium.org/issues/41493458 +CVE-2024-38427 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/66 +CVE-2024-38427 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/66/commits/85ce74ef19fb0751c7e188b06daed22fe74c332c CVE-2024-3844 - https://issues.chromium.org/issues/40058873 +CVE-2024-38449 - https://kasmweb.atlassian.net/servicedesk/customer/portal/3/topic/30ffee7f-4b85-4783-b118-6ae4fd8b0c52 CVE-2024-3846 - https://issues.chromium.org/issues/40064754 +CVE-2024-38460 - https://sonarsource.atlassian.net/browse/SONAR-21559 +CVE-2024-38469 - https://github.com/zhimengzhe/iBarn/issues/20 +CVE-2024-38470 - https://github.com/zhimengzhe/iBarn/issues/20 CVE-2024-3873 - https://vuldb.com/?submit.312623 CVE-2024-3874 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W20E/formSetRemoteWebManage.md CVE-2024-3875 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromNatlimit.md @@ -97895,6 +98038,7 @@ CVE-2024-3879 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W3 CVE-2024-3880 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formWriteFacMac.md CVE-2024-3881 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/frmL7ProtForm.md CVE-2024-3882 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromRouteStatic.md +CVE-2024-3882 - https://vuldb.com/?id.260916 CVE-2024-3903 - https://wpscan.com/vulnerability/0a0e7bd4-948d-47c9-9219-380bda9f3034/ CVE-2024-3905 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/R7WebsSecurityHandler.md CVE-2024-3906 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formQuickIndex.md @@ -97914,8 +98058,17 @@ CVE-2024-3939 - https://wpscan.com/vulnerability/80a9eb3a-2cb1-4844-9004-ba2554b CVE-2024-3940 - https://wpscan.com/vulnerability/bb0245e5-8e94-4f11-9003-d6208945056c/ CVE-2024-3941 - https://wpscan.com/vulnerability/6e09e922-983c-4406-8053-747d839995d1/ CVE-2024-3948 - https://github.com/xuanluansec/vul/issues/5 +CVE-2024-3965 - https://wpscan.com/vulnerability/0e1ba2b3-5849-42f6-b503-8b3b520e4a79/ +CVE-2024-3966 - https://wpscan.com/vulnerability/9f0a575f-862d-4f2e-8d25-82c6f58dd11a/ +CVE-2024-3971 - https://wpscan.com/vulnerability/5dec5719-105d-4989-a97f-bda04d223322/ +CVE-2024-3972 - https://wpscan.com/vulnerability/55dfb9b5-d590-478b-bd1f-d420b79037fa/ +CVE-2024-3977 - https://wpscan.com/vulnerability/25851386-eccf-49cb-afbf-c25286c9b19e/ +CVE-2024-3978 - https://wpscan.com/vulnerability/a9f47d11-47ac-4998-a82a-dc2f3b0decdf/ CVE-2024-3979 - https://github.com/COVESA/vsomeip/files/14904610/details.zip CVE-2024-3979 - https://github.com/COVESA/vsomeip/issues/663 +CVE-2024-3992 - https://wpscan.com/vulnerability/e9fe3101-8033-4eee-8b37-06856872e9ef/ +CVE-2024-3993 - https://wpscan.com/vulnerability/19cd60dd-8599-4af3-99db-c42de504606c/ +CVE-2024-4005 - https://wpscan.com/vulnerability/02ca09f8-4080-4969-992d-0e6afb29bc62/ CVE-2024-4019 - https://github.com/scausoft/cve/blob/main/rce.md CVE-2024-4040 - https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/ CVE-2024-4040 - https://www.rapid7.com/blog/post/2024/04/23/etr-unauthenticated-crushftp-zero-day-enables-complete-server-compromise/ @@ -97927,6 +98080,7 @@ CVE-2024-4066 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC CVE-2024-4067 - https://github.com/micromatch/micromatch/issues/243 CVE-2024-4068 - https://github.com/micromatch/braces/issues/35 CVE-2024-4068 - https://github.com/micromatch/braces/pull/37 +CVE-2024-4094 - https://wpscan.com/vulnerability/04b2feba-e009-4fce-8539-5dfdb4300433/ CVE-2024-4111 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/SetLEDCfg.md CVE-2024-4112 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/formSetVirtualSer.md CVE-2024-4113 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/fromSetSysTime.md @@ -97946,6 +98100,8 @@ CVE-2024-4125 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W1 CVE-2024-4126 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetSysTime.md CVE-2024-4127 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/guestWifiRuleRefresh.md CVE-2024-4140 - https://github.com/rjbs/Email-MIME/issues/66 +CVE-2024-4145 - https://wpscan.com/vulnerability/7d5b8764-c82d-4969-a707-f38b63bcadca/ +CVE-2024-4149 - https://wpscan.com/vulnerability/0256ec2a-f1a9-4110-9978-ee88f9e24237/ CVE-2024-4164 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/G3V15/formModifyPppAuthWhiteMac.md CVE-2024-4165 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/G3V15/modifyDhcpRule.md CVE-2024-4166 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_41E858_GO.md @@ -97974,19 +98130,30 @@ CVE-2024-4250 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/ CVE-2024-4251 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/fromDhcpSetSer.md CVE-2024-4252 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i22/formSetUrlFilterRule.md CVE-2024-4257 - https://github.com/GAO-UNO/cve/blob/main/sql.md +CVE-2024-4270 - https://wpscan.com/vulnerability/7a3b89cc-7a81-448a-94fc-36a7033609d5/ +CVE-2024-4271 - https://wpscan.com/vulnerability/c1fe0bc7-a340-428e-a549-1e37291bea1c/ CVE-2024-4289 - https://wpscan.com/vulnerability/072785de-0ce5-42a4-a3fd-4eb1d1a2f1be/ CVE-2024-4290 - https://wpscan.com/vulnerability/a9a10d0f-d8f2-4f3e-92bf-94fc08416d87/ CVE-2024-4291 - https://github.com/L1ziang/Vulnerability/blob/main/formAddMacfilterRule.md CVE-2024-4293 - https://github.com/Sospiro014/zday1/blob/main/doctor_appointment_management_system_xss.md CVE-2024-4294 - https://github.com/Sospiro014/zday1/blob/main/doctor_appointment_management_system_idor.md +CVE-2024-4305 - https://wpscan.com/vulnerability/635be98d-4c17-4e75-871f-9794d85a2eb1/ CVE-2024-4340 - https://github.com/advisories/GHSA-2m57-hf25-phgg CVE-2024-4340 - https://research.jfrog.com/vulnerabilities/sqlparse-stack-exhaustion-dos-jfsa-2024-001031292/ CVE-2024-4348 - https://vuldb.com/?submit.320855 CVE-2024-4349 - https://github.com/CveSecLook/cve/issues/19 CVE-2024-4372 - https://wpscan.com/vulnerability/13dcfd8a-e378-44b4-af6f-940bc41539a4/ +CVE-2024-4377 - https://wpscan.com/vulnerability/778cebec-bdbb-4538-9518-c5bd50f76961/ +CVE-2024-4381 - https://wpscan.com/vulnerability/9b3cda9a-17a7-4173-93a2-d552a874fae9/ +CVE-2024-4382 - https://wpscan.com/vulnerability/1a67aeab-8145-4c8a-9c18-e6436fa39b63/ +CVE-2024-4384 - https://wpscan.com/vulnerability/ad714196-2590-4dc9-b5b9-50808e9e0d26/ CVE-2024-4388 - https://wpscan.com/vulnerability/5c791747-f60a-40a7-94fd-e4b9bb5ea2b0/ CVE-2024-4399 - https://wpscan.com/vulnerability/0690327e-da60-4d71-8b3c-ac9533d82302/ CVE-2024-4469 - https://wpscan.com/vulnerability/d6b1270b-52c0-471d-a5fb-507e21b46310/ +CVE-2024-4474 - https://wpscan.com/vulnerability/71954c60-6a5b-4cac-9920-6d9b787ead9c/ +CVE-2024-4475 - https://wpscan.com/vulnerability/f0c7fa00-da6e-4f07-875f-7b85759a54b3/ +CVE-2024-4477 - https://wpscan.com/vulnerability/ab551552-944c-4e2a-9355-7011cbe553b0/ +CVE-2024-4480 - https://wpscan.com/vulnerability/c1e5dee9-c540-4cc1-8b94-c6d1650b52d3/ CVE-2024-4491 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formGetDiagnoseInfo.md CVE-2024-4492 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formOfflineSet.md CVE-2024-4493 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formSetAutoPing.md @@ -98010,7 +98177,9 @@ CVE-2024-4542 - https://wpscan.com/vulnerability/9eef8b29-2c62-4daa-ae90-467ff9b CVE-2024-4547 - https://www.tenable.com/security/research/tra-2024-13 CVE-2024-4548 - https://www.tenable.com/security/research/tra-2024-13 CVE-2024-4549 - https://www.tenable.com/security/research/tra-2024-13 +CVE-2024-4565 - https://wpscan.com/vulnerability/430224c4-d6e3-4ca8-b1bc-b2229a9bcf12/ CVE-2024-4577 - https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ +CVE-2024-4577 - https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately CVE-2024-4577 - https://github.com/11whoami99/CVE-2024-4577 CVE-2024-4577 - https://github.com/watchtowrlabs/CVE-2024-4577 CVE-2024-4577 - https://github.com/xcanwin/CVE-2024-4577-PHP-RCE @@ -98025,6 +98194,7 @@ CVE-2024-4591 - https://github.com/Hckwzh/cms/blob/main/22.md CVE-2024-4592 - https://github.com/Hckwzh/cms/blob/main/23.md CVE-2024-4593 - https://github.com/Hckwzh/cms/blob/main/24.md CVE-2024-4594 - https://github.com/Hckwzh/cms/blob/main/25.md +CVE-2024-4616 - https://wpscan.com/vulnerability/d203bf3b-aee9-4755-b429-d6bbdd940890/ CVE-2024-4620 - https://wpscan.com/vulnerability/dc34dc2d-d5a1-4e28-8507-33f659ead647/ CVE-2024-4621 - https://wpscan.com/vulnerability/33a366d9-6c81-4957-a101-768487aae735/ CVE-2024-4644 - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss3.md @@ -98048,6 +98218,8 @@ CVE-2024-4737 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management CVE-2024-4738 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_appointment.md CVE-2024-4749 - https://wpscan.com/vulnerability/6cc05a33-6592-4d35-8e66-9b6a9884df7e/ CVE-2024-4750 - https://wpscan.com/vulnerability/ffbe4034-842b-43b0-97d1-208811376dea/ +CVE-2024-4751 - https://wpscan.com/vulnerability/94f4cc45-4c55-43d4-8ad2-a20c118b589f/ +CVE-2024-4755 - https://wpscan.com/vulnerability/adc6ea6d-29d8-4ad0-b0db-2540e8b3f9a9/ CVE-2024-4756 - https://wpscan.com/vulnerability/ce4688b6-6713-43b5-aa63-8a3b036bd332/ CVE-2024-4792 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_action.md CVE-2024-4793 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_laundry.md @@ -98085,6 +98257,7 @@ CVE-2024-4919 - https://github.com/yylmm/CVE/blob/main/Online%20Examination%20Sy CVE-2024-4920 - https://github.com/CveSecLook/cve/issues/27 CVE-2024-4921 - https://github.com/I-Schnee-I/cev/blob/main/upload.md CVE-2024-4923 - https://github.com/polaris0x1/CVE/issues/1 +CVE-2024-4924 - https://wpscan.com/vulnerability/1867505f-d112-4919-9fd5-01745aa0433e/ CVE-2024-4925 - https://github.com/Hefei-Coffee/cve/blob/main/sql6.md CVE-2024-4926 - https://github.com/Hefei-Coffee/cve/blob/main/sql7.md CVE-2024-4927 - https://github.com/Hefei-Coffee/cve/blob/main/upload2.md @@ -98095,6 +98268,8 @@ CVE-2024-4966 - https://github.com/CveSecLook/cve/issues/30 CVE-2024-4967 - https://github.com/BurakSevben/CVEs/blob/main/Interactive%20Map%20App/Interactive%20Map%20App%20-%20SQL%20Injection.md CVE-2024-4968 - https://github.com/BurakSevben/CVEs/blob/main/Interactive%20Map%20App/Interactive%20Map%20App%20-%20Cross-Site-Scripting.md CVE-2024-4968 - https://vuldb.com/?id.264536 +CVE-2024-4969 - https://wpscan.com/vulnerability/1a7ec5dc-eda4-4fed-9df9-f41d2b937fed/ +CVE-2024-4970 - https://wpscan.com/vulnerability/4a9fc352-7ec2-4992-9cda-7bdca4f42788/ CVE-2024-4972 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%201.md CVE-2024-4973 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%202.md CVE-2024-4974 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20Cross-Site-Scripting-1.md @@ -98118,6 +98293,7 @@ CVE-2024-5098 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20S CVE-2024-5099 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-2.md CVE-2024-5100 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-3.md CVE-2024-5101 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-4.md +CVE-2024-5102 - https://support.norton.com/sp/static/external/tools/security-advisories.html CVE-2024-5116 - https://github.com/polaris0x1/CVE/issues/3 CVE-2024-5117 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%201.md CVE-2024-5118 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%201.md @@ -98134,6 +98310,8 @@ CVE-2024-5138 - https://bugs.launchpad.net/snapd/+bug/2065077 CVE-2024-5145 - https://github.com/CveSecLook/cve/issues/38 CVE-2024-5145 - https://github.com/CveSecLook/cve/issues/38CVE-2005-1275 CVE-2024-5145 - https://github.com/CveSecLook/cve/issues/38CVE-2020-7009 +CVE-2024-5155 - https://wpscan.com/vulnerability/f1e90a8a-d959-4316-a5d4-e183854944bd/ +CVE-2024-5172 - https://wpscan.com/vulnerability/65d84e69-0548-4c7d-bcde-5777d72da555/ CVE-2024-5310 - https://gitee.com/heyewei/JFinalcms/issues/I8VHM2 CVE-2024-5350 - https://github.com/anji-plus/report/files/15363269/aj-report.pdf CVE-2024-5351 - https://github.com/anji-plus/report/files/15363269/aj-report.pdf @@ -98159,19 +98337,28 @@ CVE-2024-5394 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/7 CVE-2024-5395 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/8 CVE-2024-5396 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/9 CVE-2024-5397 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/10 +CVE-2024-5410 - http://seclists.org/fulldisclosure/2024/May/36 CVE-2024-5410 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-oring-iap420/ +CVE-2024-5411 - http://seclists.org/fulldisclosure/2024/May/36 CVE-2024-5411 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-oring-iap420/ +CVE-2024-5420 - http://seclists.org/fulldisclosure/2024/Jun/4 CVE-2024-5420 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-oring-iap420/index.html +CVE-2024-5421 - http://seclists.org/fulldisclosure/2024/Jun/4 CVE-2024-5421 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-seh-untserver-pro/index.html +CVE-2024-5422 - http://seclists.org/fulldisclosure/2024/Jun/4 CVE-2024-5422 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-seh-untserver-pro/index.html CVE-2024-5428 - https://github.com/kaikai145154/CVE-CSRF/blob/main/SourceCodester%20Simple%20Online%20Bidding%20System%20CSRF.md CVE-2024-5437 - https://github.com/pijiawei/CVE/blob/pijiawei-photo/SourceCodester%20Simple%20Online%20Bidding%20System%20XSS.md +CVE-2024-5447 - https://wpscan.com/vulnerability/a692b869-1666-42d1-b56d-dfcccd68ab67/ +CVE-2024-5448 - https://wpscan.com/vulnerability/c482fe19-b643-41ea-8194-22776b388290/ CVE-2024-5458 - https://github.com/php/php-src/security/advisories/GHSA-w8qr-v226-r27w +CVE-2024-5475 - https://wpscan.com/vulnerability/cee66543-b5d6-4205-8f9b-0febd7fee445/ CVE-2024-5515 - https://github.com/HaojianWang/cve/issues/1 CVE-2024-5516 - https://github.com/ppp-src/ha/issues/3 CVE-2024-5517 - https://github.com/ppp-src/ha/issues/4 CVE-2024-5518 - https://github.com/L1OudFd8cl09/CVE/issues/1 CVE-2024-5519 - https://github.com/L1OudFd8cl09/CVE/issues/2 +CVE-2024-5522 - https://wpscan.com/vulnerability/bc76ef95-a2a9-4185-8ed9-1059097a506a/ CVE-2024-5565 - https://research.jfrog.com/vulnerabilities/vanna-prompt-injection-rce-jfsa-2024-001034449/ CVE-2024-5585 - https://github.com/php/php-src/security/advisories/GHSA-9fcc-425m-g385 CVE-2024-5588 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/12 @@ -98179,13 +98366,48 @@ CVE-2024-5590 - https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-uploadisc CVE-2024-5635 - https://github.com/L1OudFd8cl09/CVE/blob/main/03_06_2024_a.md CVE-2024-5636 - https://github.com/L1OudFd8cl09/CVE/blob/main/03_06_2024_b.md CVE-2024-5656 - https://wpscan.com/vulnerability/adc6ea6d-29d8-4ad0-b0db-2540e8b3f9a9/ +CVE-2024-5657 - http://www.openwall.com/lists/oss-security/2024/06/06/1 CVE-2024-5657 - https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20240202-01_CraftCMS_Plugin_Two-Factor_Authentication_Password_Hash_Disclosure +CVE-2024-5658 - http://www.openwall.com/lists/oss-security/2024/06/06/2 CVE-2024-5658 - https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20240202-02_CraftCMS_Plugin_Two-Factor_Authentication_TOTP_Valid_After_Use +CVE-2024-5676 - https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20240321-01_Paradox_Cross_Site_Request_Forgery CVE-2024-5733 - https://github.com/kingshao0312/cve/issues/1 CVE-2024-5734 - https://github.com/kingshao0312/cve/issues/2 CVE-2024-5745 - https://github.com/L1OudFd8cl09/CVE/blob/main/07_06_2024_a.md CVE-2024-5758 - https://research.cleantalk.org/cve-2024-4305/ CVE-2024-5758 - https://wpscan.com/vulnerability/635be98d-4c17-4e75-871f-9794d85a2eb1/ +CVE-2024-5772 - https://github.com/charliecatsec/cve1/blob/main/NS-ASG-sql-deleteiscuser.md CVE-2024-5773 - https://github.com/L1OudFd8cl09/CVE/issues/3 CVE-2024-5774 - https://github.com/CveSecLook/cve/issues/43 CVE-2024-5775 - https://github.com/CveSecLook/cve/issues/44 +CVE-2024-5851 - https://vuldb.com/?submit.347385 +CVE-2024-5894 - https://github.com/Hefei-Coffee/cve/blob/main/sql10.md +CVE-2024-5895 - https://github.com/Hefei-Coffee/cve/blob/main/sql11.md +CVE-2024-5896 - https://github.com/Hefei-Coffee/cve/blob/main/sql12.md +CVE-2024-5898 - https://github.com/guiyxli/cve/issues/1 +CVE-2024-5981 - https://github.com/LiuYongXiang-git/cve/issues/1 +CVE-2024-5983 - https://github.com/LiuYongXiang-git/cve/issues/2 +CVE-2024-5984 - https://github.com/LiuYongXiang-git/cve/issues/3 +CVE-2024-5985 - https://github.com/CveSecLook/cve/issues/45 +CVE-2024-6006 - https://vuldb.com/?submit.351403 +CVE-2024-6007 - https://github.com/SecureF1sh/findings/blob/main/ns_sqli.md +CVE-2024-6009 - https://github.com/AutoZhou1/cve/issues/1 +CVE-2024-6013 - https://github.com/gabriel202212/cve/issues/1 +CVE-2024-6015 - https://github.com/chenwulin-bit/cve/issues/1 +CVE-2024-6016 - https://github.com/chenwulin-bit/cve/issues/2 +CVE-2024-6041 - https://github.com/ssiicckk/cve/issues/1 +CVE-2024-6042 - https://github.com/Cormac315/cve/issues/1 +CVE-2024-6043 - https://github.com/yezzzo/y3/blob/main/SourceCodester%20Best%20house%20rental%20management%20system%20project%20in%20php%201.0%20SQL%20Injection.md +CVE-2024-6061 - https://github.com/gpac/gpac/issues/2871 +CVE-2024-6084 - https://github.com/Laster-dev/CVE/issues/2 +CVE-2024-6111 - https://github.com/wangyuan-ui/CVE/issues/1 +CVE-2024-6113 - https://github.com/wangyuan-ui/CVE/issues/3 +CVE-2024-6114 - https://github.com/wangyuan-ui/CVE/issues/4 +CVE-2024-6184 - https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_a.md +CVE-2024-6187 - https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_d.md +CVE-2024-6188 - https://kiwiyumi.com/post/tracksys-export-source-code/ +CVE-2024-6190 - https://github.com/HryspaHodor/CVE/issues/2 +CVE-2024-6191 - https://github.com/HryspaHodor/CVE/issues/3 +CVE-2024-6192 - https://github.com/HryspaHodor/CVE/issues/4 +CVE-2024-6194 - https://github.com/HryspaHodor/CVE/issues/6 +CVE-2024-6218 - https://github.com/HryspaHodor/CVE/issues/7