Update CVE sources 2024-08-27 19:05

This commit is contained in:
0xMarcio
2024-08-27 19:05:50 +00:00
parent 9997f54ae7
commit 756086a9d1
200 changed files with 4401 additions and 16 deletions
+1
View File
@@ -60,6 +60,7 @@ The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote
- https://github.com/crypticdante/CVE-2007-2447
- https://github.com/gwyomarch/Lame-HTB-Writeup-FR
- https://github.com/hussien-almalki/Hack_lame
- https://github.com/jaydenxjayden/HTB-writeup
- https://github.com/jwardsmith/Penetration-Testing
- https://github.com/k4u5h41/CVE-2007-2447
- https://github.com/macosta-42/Exploit-Development
+1
View File
@@ -56,6 +56,7 @@ The SSL protocol, as used in certain configurations in Microsoft Windows and Mic
- https://github.com/odolezal/D-Link-DIR-655
- https://github.com/orgTestCodacy11KRepos110MB/repo-3654-reg
- https://github.com/pashicop/3.9_1
- https://github.com/password123456/setup-apache-http-server-with-shorts-security-best-practice
- https://github.com/stanmay77/security
- https://github.com/swod00/litecoin_demo
- https://github.com/tzaffi/testssl-report
+1
View File
@@ -102,6 +102,7 @@ The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses
- https://github.com/nikolay480/devops-netology
- https://github.com/odolezal/D-Link-DIR-655
- https://github.com/pashicop/3.9_1
- https://github.com/password123456/setup-apache-http-server-with-shorts-security-best-practice
- https://github.com/puppetlabs/puppetlabs-compliance_profile
- https://github.com/r0metheus/poodle-attack
- https://github.com/r0metheus/poodle-attack-poc
+1
View File
@@ -201,6 +201,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
- https://github.com/chalern/Pentest-Tools
- https://github.com/chandiradeshan12/CVE-Reports-and-TryHackMe-Room-Creation
- https://github.com/ciakim/CVE-2019-0709
- https://github.com/clcert/clcert-web
- https://github.com/clcert/clcert.cl
- https://github.com/closethe/CVE-2019-0708-POC
- https://github.com/codereveryday/Programming-Hacking-Resources
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2019-10894](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10894)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the GSS-API dissector could crash. This was addressed in epan/dissectors/packet-gssapi.c by ensuring that a valid dissector is called.
### POC
#### Reference
- https://usn.ubuntu.com/3986-1/
#### Github
No PoCs found on GitHub currently.
+1 -1
View File
@@ -10,7 +10,7 @@ In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the NetScaler file pars
### POC
#### Reference
No PoCs from references.
- https://usn.ubuntu.com/3986-1/
#### Github
- https://github.com/ARPSyndicate/cvemon
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2019-10896](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10896)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the DOF dissector could crash. This was addressed in epan/dissectors/packet-dof.c by properly handling generated IID and OID bytes.
### POC
#### Reference
- https://usn.ubuntu.com/3986-1/
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2019-10899](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10899)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the SRVLOC dissector could crash. This was addressed in epan/dissectors/packet-srvloc.c by preventing a heap-based buffer under-read.
### POC
#### Reference
- https://usn.ubuntu.com/3986-1/
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2019-10901](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10901)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by handling file digests properly.
### POC
#### Reference
- https://usn.ubuntu.com/3986-1/
#### Github
No PoCs found on GitHub currently.
+1
View File
@@ -11,6 +11,7 @@ In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the DCERPC SPOOLSS diss
#### Reference
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15568
- https://usn.ubuntu.com/3986-1/
#### Github
No PoCs found on GitHub currently.
+3
View File
@@ -2495,6 +2495,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan
- https://github.com/WhitmoreLakeRobotics/2020-GameChangers-Club
- https://github.com/WhitmoreLakeRobotics/2022-Mecanum
- https://github.com/WhitmoreLakeRobotics/2022-TSOC
- https://github.com/WhitmoreLakeRobotics/2023-FTC-CenterStage
- https://github.com/Wilke000/FTC-arm_drive-2023
- https://github.com/WillRages/23-24_CenterStage6093
- https://github.com/William-McGonagle/Maincode-2021
@@ -3415,6 +3416,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan
- https://github.com/lakeridgeacademy/2022-power-play
- https://github.com/lancelarsen/PhoenixForceFreightFrenzy
- https://github.com/lancelarsen/PhoenixForceUltimateGoal
- https://github.com/lancelarsen/PhoenixForceUltimateGoal2
- https://github.com/largoftc/Firsttech
- https://github.com/larrytao05/FtcRobotController
- https://github.com/laupetre/FTC-2021
@@ -4145,6 +4147,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan
- https://github.com/zachwaffle4/InvictaCode-21-22
- https://github.com/zaheersufi/power-play-16911
- https://github.com/zandersmall/Robotics2020Code
- https://github.com/zedaes/PG-Odometry
- https://github.com/zeitlerquintet/jquery-2.2.4-patched
- https://github.com/zeitlersensetence/jquery-2.2.4-patched
- https://github.com/zema1/oracle-vuln-crawler
+1
View File
@@ -10,6 +10,7 @@ In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the TCAP dissector could crash.
### POC
#### Reference
- https://usn.ubuntu.com/3986-1/
- https://www.oracle.com/security-alerts/cpujan2020.html
#### Github
+1
View File
@@ -11,6 +11,7 @@ In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the ASN.1 BER and related disse
#### Reference
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15447
- https://usn.ubuntu.com/3986-1/
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2019-9214](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9214)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the RPCAP dissector could crash. This was addressed in epan/dissectors/packet-rpcap.c by avoiding an attempted dereference of a NULL conversation.
### POC
#### Reference
- https://usn.ubuntu.com/3986-1/
#### Github
No PoCs found on GitHub currently.
+1
View File
@@ -104,6 +104,7 @@ It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was in
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/cybfar/cve-2021-42013-httpd
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/defronixpro/Defronix-Cybersecurity-Roadmap
- https://github.com/dial25sd/arf-vulnerable-vm
- https://github.com/e-hakson/OSCP
- https://github.com/eljosep/OSCP-Guide
+1 -1
View File
@@ -13,5 +13,5 @@ A vulnerability was found in novel-plus 3.6.2 and classified as critical. Affect
- https://github.com/OYyunshen/Poc/blob/main/Novel-PlusSqli1.pdf
#### Github
No PoCs found on GitHub currently.
- https://github.com/N0boy-0/vulenv
+1
View File
@@ -21,6 +21,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- https://github.com/BrittanyKuhn/javascript-tutorial
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/FeatherStark/GIOP-Protocol-Analysis
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
- https://github.com/KimJun1010/WeblogicTool
- https://github.com/MMarch7/weblogic_CVE-2023-21931_POC-EXP
+18
View File
@@ -0,0 +1,18 @@
### [CVE-2023-26315](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26315)
![](https://img.shields.io/static/v1?label=Product&message=Router%20AX9000&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The Xiaomi router AX9000 has a post-authentication command injection vulnerability. This vulnerability is caused by the lack of input filtering, allowing an attacker to exploit it to obtain root access to the device.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/winmt/winmt
+1
View File
@@ -13,6 +13,7 @@ An issue was discovered in cPanel before 11.109.9999.116. XSS can occur on the c
- https://blog.assetnote.io/2023/04/26/xss-million-websites-cpanel/
#### Github
- https://github.com/0-d3y/CVE-2023-29489
- https://github.com/0-d3y/XSS_1915
- https://github.com/1337r0j4n/CVE-2023-29489
- https://github.com/Abdullah7-ma/CVE-2023-29489
+1
View File
@@ -13,6 +13,7 @@ Ghost before 5.42.1 allows remote attackers to read arbitrary files within the a
No PoCs from references.
#### Github
- https://github.com/AXRoux/Ghost-Path-Traversal-CVE-2023-32235-
- https://github.com/VEEXH/Ghost-Path-Traversal-CVE-2023-32235-
- https://github.com/nomi-sec/PoC-in-GitHub
+1
View File
@@ -13,5 +13,6 @@ social-media-skeleton is an uncompleted social media project. A SQL injection vu
No PoCs from references.
#### Github
- https://github.com/N0boy-0/vulenv
- https://github.com/fkie-cad/nvd-json-data-feeds
+1
View File
@@ -14,6 +14,7 @@ A vulnerability was found in D-Link DAR-8000-10 up to 20230809. It has been clas
#### Github
- https://github.com/20142995/sectool
- https://github.com/PumpkinBridge/CVE-2023-4542
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/tanjiti/sec_profile
- https://github.com/wjlin0/poc-doc
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2023-4545](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4545)
![](https://img.shields.io/static/v1?label=Product&message=OA&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%204.5.5%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen)
### Description
A vulnerability was found in IBOS OA 4.5.5. It has been classified as critical. Affected is an unknown function of the file ?r=recruit/bgchecks/export&checkids=x. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-238056. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### POC
#### Reference
- https://github.com/siyu15/cve/blob/main/sql.md
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2023-49582](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49582)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20Portable%20Runtime%20(APR)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0.9.0%3C%3D%201.7.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource&color=brighgreen)
### Description
Lax permissions set by the Apache Portable Runtime library on Unix platforms would allow local users read access to named shared memory segments, potentially revealing sensitive application data. This issue does not affect non-Unix platforms, or builds with APR_USE_SHMEM_SHMGET=1 (apr.h)Users are recommended to upgrade to APR version 1.7.5, which fixes this issue.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+1 -1
View File
@@ -1,7 +1,7 @@
### [CVE-2023-4993](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4993)
![](https://img.shields.io/static/v1?label=Product&message=SoliPay%20Mobile%20App&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%205.0.8%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-269%20Improper%20Privilege%20Management&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-648%20Incorrect%20Use%20of%20Privileged%20APIs&color=brighgreen)
### Description
+1 -1
View File
@@ -1,7 +1,7 @@
### [CVE-2023-5983](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5983)
![](https://img.shields.io/static/v1?label=Product&message=Pharmacy%20Automation&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.1.133.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
### Description
+1 -1
View File
@@ -1,7 +1,7 @@
### [CVE-2023-6190](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6190)
![](https://img.shields.io/static/v1?label=Product&message=University%20Information%20Management%20System&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%2030.11.2023%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20Improper%20Input%20Validation&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen)
### Description
+1 -1
View File
@@ -1,7 +1,7 @@
### [CVE-2024-0563](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0563)
![](https://img.shields.io/static/v1?label=Product&message=M-Files%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-400%20Uncontrolled%20Resource%20Consumption&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&color=brighgreen)
### Description
+1
View File
@@ -18,6 +18,7 @@ No PoCs from references.
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/k3ppf0r/2024-PocLib
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/nvn1729/advisories
- https://github.com/tanjiti/sec_profile
- https://github.com/wjlin0/poc-doc
- https://github.com/wy876/POC
+1
View File
@@ -26,5 +26,6 @@ Windows USB Print Driver Elevation of Privilege Vulnerability
No PoCs from references.
#### Github
- https://github.com/5angjun/5angjun
- https://github.com/NaInSec/CVE-LIST
+1
View File
@@ -26,5 +26,6 @@ Windows USB Print Driver Elevation of Privilege Vulnerability
No PoCs from references.
#### Github
- https://github.com/5angjun/5angjun
- https://github.com/NaInSec/CVE-LIST
+1
View File
@@ -13,5 +13,6 @@ Cacti provides an operational monitoring and fault management framework. Prior t
- https://github.com/Cacti/cacti/security/advisories/GHSA-7cmj-g5qc-pj88
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/tanjiti/sec_profile
+1 -1
View File
@@ -10,7 +10,7 @@ An issue in the component js2py.disable_pyimport() of js2py up to v0.74 allows a
### POC
#### Reference
No PoCs from references.
- https://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape
#### Github
- https://github.com/Marven11/CVE-2024-28397
+1
View File
@@ -15,6 +15,7 @@ XWiki Platform is a generic wiki platform. Starting in version 2.4-milestone-1 a
#### Github
- https://github.com/Ostorlab/KEV
- https://github.com/bigb0x/CVE-2024-31982
- https://github.com/defronixpro/Defronix-Cybersecurity-Roadmap
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/tanjiti/sec_profile
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-34087](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34087)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An SEH-based buffer overflow in the BPQ32 HTTP Server in BPQ32 6.0.24.1 allows remote attackers with access to the Web Terminal to achieve remote code execution via an HTTP POST /TermInput request.
### POC
#### Reference
- https://themodernham.com/bbs-hacking-discovering-rce-within-bpq32-seh-based-buffer-overflow/
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-34510](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34510)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Gradio before 4.20 allows credential leakage on Windows.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/nvn1729/advisories
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-35178](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35178)
![](https://img.shields.io/static/v1?label=Product&message=jupyter_server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%202.14.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
### Description
The Jupyter Server provides the backend for Jupyter web applications. Jupyter Server on Windows has a vulnerability that lets unauthenticated attackers leak the NTLMv2 password hash of the Windows user running the Jupyter server. An attacker can crack this password to gain access to the Windows machine hosting the Jupyter server, or access other network-accessible machines or 3rd party services using that credential. Or an attacker perform an NTLM relay attack without cracking the credential to gain access to other network-accessible machines. This vulnerability is fixed in 2.14.1.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/nvn1729/advisories
+1
View File
@@ -52,6 +52,7 @@ Windows TCP/IP Remote Code Execution Vulnerability
No PoCs from references.
#### Github
- https://github.com/0xMarcio/cve
- https://github.com/being1943/my_rss_reader
- https://github.com/kherrick/hacker-news
- https://github.com/nomi-sec/PoC-in-GitHub
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-38859](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38859)
![](https://img.shields.io/static/v1?label=Product&message=Checkmk&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.3.0%3C%202.3.0p14%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)&color=brighgreen)
### Description
XSS in the view page with the SLA column configured in Checkmk versions prior to 2.3.0p14, 2.2.0p33, 2.1.0p47 and 2.0.0 (EOL) allowed malicious users to execute arbitrary scripts by injecting HTML elements into the SLA column title. These scripts could be executed when the view page was cloned by other users.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-39097](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39097)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
There is an Open Redirect vulnerability in Gnuboard v6.0.4 and below via the `url` parameter in login path.
### POC
#### Reference
- https://github.com/gnuboard/g6/issues/582
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-39641](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39641)
![](https://img.shields.io/static/v1?label=Product&message=LearnPress&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen)
### Description
Cross-Site Request Forgery (CSRF) vulnerability in ThimPress LearnPress.This issue affects LearnPress: from n/a through 4.2.6.8.2.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-39645](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39645)
![](https://img.shields.io/static/v1?label=Product&message=Tutor%20LMS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen)
### Description
Cross-Site Request Forgery (CSRF) vulnerability in Themeum Tutor LMS.This issue affects Tutor LMS: from n/a through 2.7.2.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-39657](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39657)
![](https://img.shields.io/static/v1?label=Product&message=Sender%20%E2%80%93%20Newsletter%2C%20SMS%20and%20Email%20Marketing%20Automation%20for%20WooCommerce&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen)
### Description
Cross-Site Request Forgery (CSRF) vulnerability in Sender Sender Newsletter, SMS and Email Marketing Automation for WooCommerce.This issue affects Sender Newsletter, SMS and Email Marketing Automation for WooCommerce: from n/a through 2.6.18.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates
+19
View File
@@ -0,0 +1,19 @@
### [CVE-2024-41173](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41173)
![](https://img.shields.io/static/v1?label=Product&message=IPC%20Diagnostics%20package&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=TwinCAT%2FBSD&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%2014.1.2.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.0.0.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel&color=brighgreen)
### Description
The IPC-Diagnostics package included in TwinCAT/BSD is vulnerable to a local authentication bypass by a low privileged attacker.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+19
View File
@@ -0,0 +1,19 @@
### [CVE-2024-41174](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41174)
![](https://img.shields.io/static/v1?label=Product&message=IPC%20Diagnostics%20package&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=TwinCAT%2FBSD&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%2014.1.2.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.0.0.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen)
### Description
The IPC-Diagnostics package in TwinCAT/BSD is susceptible to improper input neutralization by a low-privileged local attacker.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+19
View File
@@ -0,0 +1,19 @@
### [CVE-2024-41175](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41175)
![](https://img.shields.io/static/v1?label=Product&message=IPC%20Diagnostics%20package&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=TwinCAT%2FBSD&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%2014.1.2.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.0.0.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&color=brighgreen)
### Description
The IPC-Diagnostics package included in TwinCAT/BSD is vulnerable to a local denial-of-service attack by a low privileged attacker.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+19
View File
@@ -0,0 +1,19 @@
### [CVE-2024-41176](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41176)
![](https://img.shields.io/static/v1?label=Product&message=MDP%20package&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=TwinCAT%2FBSD&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%201.2.7.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%2014.1.2.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20('Classic%20Buffer%20Overflow')&color=brighgreen)
### Description
The MPD package included in TwinCAT/BSD allows an authenticated, low-privileged localattacker to induce a Denial-of-Service (DoS) condition on the daemon and execute code inthe context of user “root” via a crafted HTTP request.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42008](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42008)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A Cross-Site Scripting vulnerability in rcmail_action_mail_get->run() in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a malicious e-mail attachment served with a dangerous Content-Type header.
### POC
#### Reference
- https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42009](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42009)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A Cross-Site Scripting vulnerability in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php.
### POC
#### Reference
- https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/
#### Github
No PoCs found on GitHub currently.
+1 -1
View File
@@ -10,7 +10,7 @@ mod_css_styles in Roundcube through 1.5.7 and 1.6.x through 1.6.7 insufficiently
### POC
#### Reference
No PoCs from references.
- https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42474](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42474)
![](https://img.shields.io/static/v1?label=Product&message=streamlit&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.37.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen)
### Description
Streamlit is a data oriented application development framework for python. Snowflake Streamlit open source addressed a security vulnerability via the static file sharing feature. Users of hosted Streamlit app(s) on Windows were vulnerable to a path traversal vulnerability when the static file sharing feature is enabled. An attacker could utilize the vulnerability to leak the password hash of the Windows user running Streamlit. The vulnerability was patched on Jul 25, 2024, as part of Streamlit open source version 1.37.0. The vulnerability only affects Windows.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/nvn1729/advisories
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42554](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42554)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Hotel Management System commit 91caab8 was discovered to contain a SQL injection vulnerability via the room_type parameter at admin_room_added.php.
### POC
#### Reference
- https://gist.github.com/topsky979/7d2ebfe6dfa87eecf8f3e6d4eefc48ba
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42555](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42555)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A Cross-Site Request Forgery (CSRF) in the component admin_room_removed.php of Hotel Management System commit 91caab8 allows attackers to escalate privileges.
### POC
#### Reference
- https://gist.github.com/topsky979/afd445b90e13a27a6422cea2f5ff0f64
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42556](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42556)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Hotel Management System commit 91caab8 was discovered to contain a SQL injection vulnerability via the room_type parameter at admin_room_removed.php.
### POC
#### Reference
- https://gist.github.com/topsky979/9688bcdd3e05ba79ebf4ff1042609b20
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42557](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42557)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A Cross-Site Request Forgery (CSRF) in the component admin_modify_room.php of Hotel Management System commit 91caab8 allows attackers to escalate privileges.
### POC
#### Reference
- https://gist.github.com/topsky979/0785597ae7abc8f10cd5c5537f5467b5
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42560](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42560)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A cross-site scripting (XSS) vulnerability in the component update_page_details.php of Blood Bank And Donation Management System commit dc9e039 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Page Details parameter.
### POC
#### Reference
- https://gist.github.com/topsky979/4c05ee72ab4b365ef81c199aaa0558d0
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42562](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42562)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Pharmacy Management System commit a2efc8 was discovered to contain a SQL injection vulnerability via the invoice_number parameter at preview.php.
### POC
#### Reference
- https://gist.github.com/topsky979/2dcca275bcc18e8058cefef714a2f61b
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42567](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42567)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the sid parameter at /search.php?action=2.
### POC
#### Reference
- https://gist.github.com/topsky979/96ba3f6ccd333480aa86e7078c4886d7
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42568](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42568)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the transport parameter at vehicle.php.
### POC
#### Reference
- https://gist.github.com/topsky979/38a30275374ef796ab860795f5df4dac
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42569](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42569)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at paidclass.php.
### POC
#### Reference
- https://gist.github.com/topsky979/20a81dbf47d371e1dabe08f350c8185d
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42571](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42571)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at insertattendance.php.
### POC
#### Reference
- https://gist.github.com/topsky979/5c8e289fa66702fd3acbed558ee449dd
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42574](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42574)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at attendance.php.
### POC
#### Reference
- https://gist.github.com/topsky979/7064f8bbd3977ee665a098efcd0170c0
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42575](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42575)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at substaff.php.
### POC
#### Reference
- https://gist.github.com/topsky979/2fddc00b33b038cd778c1e4fb1936a15
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42576](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42576)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A Cross-Site Request Forgery (CSRF) in the component edit_categorie.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges.
### POC
#### Reference
- https://gist.github.com/topsky979/50a1d8ad7effd9ccd089952602c831d3
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42578](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42578)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A Cross-Site Request Forgery (CSRF) in the component edit_product.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges.
### POC
#### Reference
- https://gist.github.com/topsky979/5eacc7e418e3b73b7ad1fa05d1a72aeb
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42579](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42579)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A Cross-Site Request Forgery (CSRF) in the component add_group.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges.
### POC
#### Reference
- https://gist.github.com/topsky979/ed59fb8b35a220dfa064a3a3cb1ecb1b
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42580](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42580)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A Cross-Site Request Forgery (CSRF) in the component edit_group.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges.
### POC
#### Reference
- https://gist.github.com/topsky979/8a05309486637d8c6ce8c6624ec1e897
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42581](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42581)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A Cross-Site Request Forgery (CSRF) in the component delete_group.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges.
### POC
#### Reference
- https://gist.github.com/topsky979/2bd26343ccdff7c759f62d332c8caff6
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42582](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42582)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A Cross-Site Request Forgery (CSRF) in the component delete_categorie.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges.
### POC
#### Reference
- https://gist.github.com/topsky979/c0d78b257ce1e661be30de1ce9551d27
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42583](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42583)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A Cross-Site Request Forgery (CSRF) in the component delete_user.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges.
### POC
#### Reference
- https://gist.github.com/topsky979/dac0206b8de14763bdbe2b6bb7020cdc
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42585)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A Cross-Site Request Forgery (CSRF) in the component delete_media.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges.
### POC
#### Reference
- https://gist.github.com/topsky979/33de7a4bd7a4517a26fa4e4911b7fb1d
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42604](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42604)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_group.php?mode=delete&group_id=3
### POC
#### Reference
- https://github.com/jinwu1234567890/cms2/tree/main/1/readme.md
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42605](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42605)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/edit_page.php?link_id=1
### POC
#### Reference
- https://github.com/jinwu1234567890/cms2/tree/main/3/readme.md
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42607](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42607)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_backup.php?dobackup=database
### POC
#### Reference
- https://github.com/jinwu1234567890/cms2/tree/main/9/readme.md
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42609](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42609)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_backup.php?dobackup=avatars
### POC
#### Reference
- https://github.com/jinwu1234567890/cms2/tree/main/8/readme.md
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42611](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42611)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) via admin/admin_page.php?link_id=1&mode=delete
### POC
#### Reference
- https://github.com/jinwu1234567890/cms2/tree/main/4/readme.md
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42613](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42613)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_widgets.php?action=install&widget=akismet
### POC
#### Reference
- https://github.com/jinwu1234567890/cms2/tree/main/14/readme.md
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42616](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42616)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_widgets.php?action=remove&widget=Statistics
### POC
#### Reference
- https://github.com/jinwu1234567890/cms2/tree/main/13/readme.md
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42617](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42617)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_config.php?action=save&var_id=32
### POC
#### Reference
- https://github.com/jinwu1234567890/cms2/tree/main/11/readme.md
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42619](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42619)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/domain_management.php?id=0&list=whitelist&remove=pligg.com
### POC
#### Reference
- https://github.com/jinwu1234567890/cms2/tree/main/17/readme.md
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42621](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42621)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_editor.php
### POC
#### Reference
- https://github.com/jinwu1234567890/cms2/tree/main/12/readme.md
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42636](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42636)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
DedeCMS V5.7.115 has a command execution vulnerability via file_manage_view.php?fmdo=newfile&activepath.
### POC
#### Reference
- https://github.com/iami233/cve/issues/1
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42787](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42787)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A Stored Cross Site Scripting (XSS) vulnerability was found in "/music/ajax.php?action=save_playlist" in Kashipara Music Management System v1.0. This vulnerability allows remote attackers to execute arbitrary code via "title" & "description" parameter fields.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42789](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42789)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A Reflected Cross Site Scripting (XSS) vulnerability was found in "/music/controller.php?page=test" in Kashipara Music Management System v1.0. This vulnerability allows remote attackers to execute arbitrary code via the "page" parameter.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42815](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42815)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
In the TP-Link RE365 V1_180213, there is a buffer overflow vulnerability due to the lack of length verification for the USER_AGENT field in /usr/bin/httpd. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.
### POC
#### Reference
- https://gist.github.com/XiaoCurry/14d46e0becd79d9bb9907f2fbe147cfe
#### Github
No PoCs found on GitHub currently.
+1
View File
@@ -13,6 +13,7 @@ An eval Injection vulnerability in the component invesalius/reader/dicom.py of I
No PoCs from references.
#### Github
- https://github.com/alessio-romano/Sfoffo-Pentesting-Notes
- https://github.com/alessio-romano/alessio-romano
- https://github.com/nomi-sec/PoC-in-GitHub
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42852](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42852)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Cross Site Scripting vulnerability in AcuToWeb server v.10.5.0.7577C8b allows a remote attacker to execute arbitrary code via the index.php component.
### POC
#### Reference
- https://github.com/Hebing123/cve/issues/64
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-42906](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42906)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
TestLink before v.1.9.20 is vulnerable to Cross Site Scripting (XSS) via the pop-up on upload file. When uploading a file, the XSS payload can be entered into the file name.
### POC
#### Reference
- https://github.com/Alkatraz97/CVEs/blob/main/CVE-2024-42906.md
#### Github
No PoCs found on GitHub currently.
+2 -2
View File
@@ -1,11 +1,11 @@
### [CVE-2024-42992](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42992)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue)
### Description
Python Pip Pandas v2.2.2 was discovered to contain an arbitrary file read vulnerability.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
### POC
+1 -1
View File
@@ -10,7 +10,7 @@ An issue in the downloader.php component of TOSEI online store management system
### POC
#### Reference
No PoCs from references.
- https://gist.github.com/b0rgch3n/6ba0b04da7e48ead20f10b15088fd244
#### Github
- https://github.com/b0rgch3n/b0rgch3n
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-43116](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43116)
![](https://img.shields.io/static/v1?label=Product&message=Simple%20Local%20Avatars&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen)
### Description
Cross-Site Request Forgery (CSRF) vulnerability in 10up Simple Local Avatars.This issue affects Simple Local Avatars: from n/a through 2.7.10.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-43117](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43117)
![](https://img.shields.io/static/v1?label=Product&message=Hummingbird&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen)
### Description
Cross-Site Request Forgery (CSRF) vulnerability in WPMU DEV Hummingbird.This issue affects Hummingbird: from n/a through 3.9.1.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-43214](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43214)
![](https://img.shields.io/static/v1?label=Product&message=myCred&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen)
### Description
Missing Authorization vulnerability in myCred.This issue affects myCred: from n/a through 2.7.2.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-43230](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43230)
![](https://img.shields.io/static/v1?label=Product&message=Shared%20Files&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
### Description
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Shared Files File Upload Form Shared Files.This issue affects Shared Files: from n/a through 1.7.28.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-43251](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43251)
![](https://img.shields.io/static/v1?label=Product&message=Bit%20Form%20Pro&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%202.6.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
### Description
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Bit Apps Bit Form Pro.This issue affects Bit Form Pro: from n/a through 2.6.4.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-43255](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43255)
![](https://img.shields.io/static/v1?label=Product&message=MyBookTable%20Bookstore&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%203.3.9%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen)
### Description
Cross-Site Request Forgery (CSRF) vulnerability in Stormhill Media MyBookTable Bookstore allows Cross-Site Scripting (XSS).This issue affects MyBookTable Bookstore: from n/a through 3.3.9.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-43257](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43257)
![](https://img.shields.io/static/v1?label=Product&message=Leopard%20-%20WordPress%20offload%20media&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%202.0.36%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
### Description
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Nouthemes Leopard - WordPress offload media.This issue affects Leopard - WordPress offload media: from n/a through 2.0.36.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-43258](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43258)
![](https://img.shields.io/static/v1?label=Product&message=Store%20Locator%20Plus&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%202311.17.01%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
### Description
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Store Locator Plus.This issue affects Store Locator Plus: from n/a through 2311.17.01.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-43259](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43259)
![](https://img.shields.io/static/v1?label=Product&message=Order%20Export%20for%20WooCommerce&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
### Description
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in JEM Plugins Order Export for WooCommerce.This issue affects Order Export for WooCommerce: from n/a through 3.23.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2024-43264](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43264)
![](https://img.shields.io/static/v1?label=Product&message=Create%20by%20Mediavine&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%201.9.8%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
### Description
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Mediavine Create by Mediavine.This issue affects Create by Mediavine: from n/a through 1.9.8.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates

Some files were not shown because too many files have changed in this diff Show More