mirror of
https://github.com/0xMarcio/cve.git
synced 2026-02-12 18:42:46 +00:00
Update CVE sources 2024-08-24 17:55
This commit is contained in:
@@ -80716,6 +80716,7 @@ CVE-2022-1512 - https://packetstormsecurity.com/files/166820/
|
||||
CVE-2022-1512 - https://wpscan.com/vulnerability/a754a516-07fc-44f1-9c34-31e963460301
|
||||
CVE-2022-1514 - https://huntr.dev/bounties/4ae2a917-843a-4ae4-8197-8425a596761c
|
||||
CVE-2022-1526 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/emlog%3C=pro-1.2.2%20Stored%20Cross-Site%20Scripting(XSS).md
|
||||
CVE-2022-1526 - https://vuldb.com/?id.198705
|
||||
CVE-2022-1527 - https://wpscan.com/vulnerability/0260d5c0-52a9-44ce-b7be-aff642056d16
|
||||
CVE-2022-1528 - https://wpscan.com/vulnerability/d1e59894-382f-4151-8c4c-5608f3d8ac1f
|
||||
CVE-2022-1529 - https://bugzilla.mozilla.org/show_bug.cgi?id=1770048
|
||||
@@ -89195,6 +89196,7 @@ CVE-2023-0916 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20
|
||||
CVE-2023-0916 - https://vuldb.com/?id.221491
|
||||
CVE-2023-0919 - https://huntr.dev/bounties/3c514923-473f-4c50-ae0d-d002a41fe70f
|
||||
CVE-2023-0924 - https://wpscan.com/vulnerability/0fd0d7a5-9263-43b6-9244-7880c3d3e6f4
|
||||
CVE-2023-0926 - https://github.com/samiahmedsiddiqui/custom-permalinks/pull/96
|
||||
CVE-2023-0937 - https://wpscan.com/vulnerability/5110ff02-c721-43eb-b13e-50aca25e1162
|
||||
CVE-2023-0938 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20SQL%20Injection%201.md
|
||||
CVE-2023-0940 - https://wpscan.com/vulnerability/56744f72-2d48-4f42-8195-24b4dd951bb5
|
||||
@@ -91234,6 +91236,7 @@ CVE-2023-27742 - https://github.com/G37SYS73M/CVE-2023-27742
|
||||
CVE-2023-27744 - https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf
|
||||
CVE-2023-27745 - https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf
|
||||
CVE-2023-27754 - https://github.com/10cksYiqiyinHangzhouTechnology/vox2mesh_poc
|
||||
CVE-2023-27772 - https://github.com/mz-automation/libiec61850/issues/442
|
||||
CVE-2023-27775 - https://github.com/marcovntr/CVE/blob/main/2023/CVE-2023-27775/CVE-2023-27775.md
|
||||
CVE-2023-27779 - https://docs.google.com/document/d/1kGzmc6AOCfRzJf9mDz4emkhQj84Y1XemmAMZjYK32-o/edit?usp=sharing
|
||||
CVE-2023-27781 - https://github.com/tjko/jpegoptim/issues/132
|
||||
@@ -94185,6 +94188,7 @@ CVE-2023-44393 - https://github.com/Piwigo/Piwigo/security/advisories/GHSA-qg85-
|
||||
CVE-2023-44398 - https://github.com/Exiv2/exiv2/commit/e884a0955359107f4031c74a07406df7e99929a5
|
||||
CVE-2023-44400 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-g9v2-wqcj-j99g
|
||||
CVE-2023-4441 - https://vuldb.com/?id.237562
|
||||
CVE-2023-4442 - https://vuldb.com/?id.237563
|
||||
CVE-2023-44466 - https://github.com/google/security-research/security/advisories/GHSA-jg27-jx6w-xwph
|
||||
CVE-2023-44467 - https://github.com/langchain-ai/langchain/commit/4c97a10bd0d9385cfee234a63b5bd826a295e483
|
||||
CVE-2023-44469 - https://security.lauritz-holtmann.de/post/sso-security-ssrf/
|
||||
@@ -94223,6 +94227,7 @@ CVE-2023-44487 - https://github.com/tempesta-tech/tempesta/issues/1986
|
||||
CVE-2023-44487 - https://github.com/varnishcache/varnish-cache/issues/3996
|
||||
CVE-2023-44487 - https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/
|
||||
CVE-2023-44487 - https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event
|
||||
CVE-2023-4449 - https://vuldb.com/?id.237570
|
||||
CVE-2023-4451 - https://huntr.dev/bounties/4e111c3e-6cf3-4b4c-b3c1-a540bf30f8fa
|
||||
CVE-2023-4453 - https://huntr.dev/bounties/245a8785-0fc0-4561-b181-fa20f869d993
|
||||
CVE-2023-4454 - https://huntr.dev/bounties/4ee0ef74-e4d4-46e7-a05c-076bce522299
|
||||
@@ -94686,11 +94691,13 @@ CVE-2023-47384 - https://github.com/gpac/gpac/issues/2672
|
||||
CVE-2023-4739 - https://github.com/Meizhi-hua/cve/blob/main/upload_file.md
|
||||
CVE-2023-47397 - https://liotree.github.io/2023/webid.html
|
||||
CVE-2023-4740 - https://vuldb.com/?id.238629
|
||||
CVE-2023-4741 - https://vuldb.com/?id.238630
|
||||
CVE-2023-4744 - https://github.com/GleamingEyes/vul/blob/main/tenda_ac8/ac8_1.md
|
||||
CVE-2023-47444 - https://0xbro.red/disclosures/disclosed-vulnerabilities/opencart-cve-2023-47444/
|
||||
CVE-2023-47445 - https://github.com/termanix/PHPGrukul-Pre-School-Enrollment-System-v1.0/blob/main/CVE-2023-47445%20PHPGurukul-Pre-School-Enrollment-System-v1.0%20SQL%20Injection.md
|
||||
CVE-2023-47446 - https://github.com/termanix/PHPGrukul-Pre-School-Enrollment-System-v1.0/blob/main/CVE-2023-47446%20PHPGurukul-Pre-School-Enrollment-System-v1.0%20Stored%20XSS%20Vulnerability.md
|
||||
CVE-2023-4745 - https://github.com/Jacky-Y/vuls/blob/main/vul6.md
|
||||
CVE-2023-4745 - https://vuldb.com/?id.238634
|
||||
CVE-2023-47452 - https://github.com/xieqiang11/poc-1/tree/main
|
||||
CVE-2023-47453 - https://github.com/xieqiang11/poc-2/tree/main
|
||||
CVE-2023-47454 - https://github.com/xieqiang11/poc-3/tree/main
|
||||
@@ -95064,6 +95071,7 @@ CVE-2023-49468 - https://github.com/strukturag/libde265/issues/432
|
||||
CVE-2023-49471 - https://github.com/zunak/CVE-2023-49471
|
||||
CVE-2023-49473 - https://github.com/Hack404-007/cves-info/blob/main/JF6000-exp
|
||||
CVE-2023-49484 - https://github.com/jiaofj/cms/blob/main/There%20is%20a%20storage%20based%20XSS%20in%20the%20article%20management%20department.md
|
||||
CVE-2023-49485 - https://github.com/Rabb1ter/cms/blob/main/There%20is%20a%20storage%20type%20XSS%20in%20the%20column%20management%20department.md
|
||||
CVE-2023-49486 - https://github.com/Rabb1ter/cms/blob/main/There%20is%20a%20stored%20XSS%20in%20the%20model%20management%20department.md
|
||||
CVE-2023-49487 - https://github.com/Rabb1ter/cms/blob/main/There%20is%20a%20stored%20XSS%20in%20the%20navigation%20management%20office.md
|
||||
CVE-2023-49492 - https://github.com/Hebing123/cve/issues/2
|
||||
@@ -95124,6 +95132,8 @@ CVE-2023-49810 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-
|
||||
CVE-2023-4982 - https://huntr.dev/bounties/d3c2dd8a-883c-400e-a1a7-326c3fd37b9e
|
||||
CVE-2023-49867 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1904
|
||||
CVE-2023-4987 - http://packetstormsecurity.com/files/174760/Taskhub-2.8.7-SQL-Injection.html
|
||||
CVE-2023-4987 - https://vuldb.com/?id.239798
|
||||
CVE-2023-4991 - https://vuldb.com/?id.239804
|
||||
CVE-2023-49923 - https://www.elastic.co/community/security
|
||||
CVE-2023-49950 - https://github.com/shrikeinfosec/cve-2023-49950/blob/main/cve-2023-49950.md
|
||||
CVE-2023-49964 - https://github.com/mbadanoiu/CVE-2023-49964
|
||||
@@ -98635,6 +98645,7 @@ CVE-2024-34058 - https://www.openwall.com/lists/oss-security/2024/05/16/3
|
||||
CVE-2024-3406 - https://wpscan.com/vulnerability/1bfab060-64d2-4c38-8bc8-a8f81c5a6e0d/
|
||||
CVE-2024-34061 - https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-pwgc-w4x9-gw67
|
||||
CVE-2024-34063 - https://github.com/matrix-org/vodozemac/commit/297548cad4016ce448c4b5007c54db7ee39489d9
|
||||
CVE-2024-34065 - https://github.com/strapi/strapi/security/advisories/GHSA-wrvh-rcmr-9qfc
|
||||
CVE-2024-3407 - https://wpscan.com/vulnerability/262348ab-a335-4acf-8e4d-229fc0b4972f/
|
||||
CVE-2024-34070 - https://github.com/froxlor/Froxlor/security/advisories/GHSA-x525-54hf-xr53
|
||||
CVE-2024-34075 - https://github.com/xiboon/kurwov/security/advisories/GHSA-hfrv-h3q8-9jpr
|
||||
@@ -98678,7 +98689,9 @@ CVE-2024-34252 - https://github.com/wasm3/wasm3/issues/483
|
||||
CVE-2024-34257 - https://github.com/ZackSecurity/VulnerReport/blob/cve/totolink/EX1800T/1.md
|
||||
CVE-2024-34273 - https://github.com/chrisandoryan/vuln-advisory/blob/main/nJwt/CVE-2024-34273.md
|
||||
CVE-2024-34308 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/README.md
|
||||
CVE-2024-34312 - https://github.com/vincentscode/CVE-2024-34312
|
||||
CVE-2024-34313 - https://github.com/vincentscode/CVE-2024-34313
|
||||
CVE-2024-34329 - https://github.com/pamoutaf/CVE-2024-34329/blob/main/README.md
|
||||
CVE-2024-34332 - https://belong2yourself.github.io/vulnerabilities/docs/SANDRA/Elevation-of-Privileges/readme/
|
||||
CVE-2024-34340 - https://github.com/Cacti/cacti/security/advisories/GHSA-37x7-mfjv-mm7m
|
||||
CVE-2024-34345 - https://github.com/CycloneDX/cyclonedx-javascript-library/commit/5e5e1e0b9422f47d2de81c7c4064b803a01e7203
|
||||
@@ -98687,6 +98700,7 @@ CVE-2024-34345 - https://github.com/CycloneDX/cyclonedx-javascript-library/secur
|
||||
CVE-2024-34347 - https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-qmmm-73r2-f8xr
|
||||
CVE-2024-34352 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-f8ch-w75v-c847
|
||||
CVE-2024-34359 - https://github.com/abetlen/llama-cpp-python/security/advisories/GHSA-56xg-wfcc-g829
|
||||
CVE-2024-34361 - https://github.com/pi-hole/pi-hole/security/advisories/GHSA-jg6g-rrj6-xfg6
|
||||
CVE-2024-34362 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-hww5-43gv-35jv
|
||||
CVE-2024-34363 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-g979-ph9j-5gg4
|
||||
CVE-2024-3437 - https://vuldb.com/?id.259631
|
||||
@@ -98705,6 +98719,7 @@ CVE-2024-3442 - https://vuldb.com/?id.259695
|
||||
CVE-2024-3443 - https://github.com/zyairelai/CVE-submissions/blob/main/prison-xss.md
|
||||
CVE-2024-34448 - https://github.com/phulelouch/CVEs/blob/main/CVE-2024-34448.md
|
||||
CVE-2024-3445 - https://vuldb.com/?id.259702
|
||||
CVE-2024-34452 - https://github.com/surajhacx/CVE-2024-34452/
|
||||
CVE-2024-34467 - https://github.com/top-think/framework/issues/2996
|
||||
CVE-2024-34470 - https://github.com/osvaldotenorio/CVE-2024-34470
|
||||
CVE-2024-34471 - https://github.com/osvaldotenorio/CVE-2024-34471
|
||||
@@ -98726,6 +98741,8 @@ CVE-2024-34580 - https://shibboleth.atlassian.net/wiki/spaces/DEV/pages/37266718
|
||||
CVE-2024-34580 - https://www.sonatype.com/blog/the-exploited-ivanti-connect-ssrf-vulnerability-stems-from-xmltooling-oss-library
|
||||
CVE-2024-34582 - https://github.com/silent6trinity/CVE-2024-34582
|
||||
CVE-2024-34694 - https://github.com/lnbits/lnbits/security/advisories/GHSA-3j4h-h3fp-vwww
|
||||
CVE-2024-34702 - https://github.com/randombit/botan/security/advisories/GHSA-5gg9-hqpr-r58j
|
||||
CVE-2024-34703 - https://github.com/randombit/botan/security/advisories/GHSA-w4g2-7m2h-7xj7
|
||||
CVE-2024-3471 - https://wpscan.com/vulnerability/a3c282fb-81b8-48bf-8c18-8366ea8ad9af/
|
||||
CVE-2024-34710 - https://github.com/requarks/wiki/security/advisories/GHSA-xjcj-p2qv-q3rf
|
||||
CVE-2024-34714 - https://github.com/hoppscotch/hoppscotch-extension/security/advisories/GHSA-jjh5-pvqx-gg5v
|
||||
@@ -98804,6 +98821,7 @@ CVE-2024-35236 - https://github.com/advplyr/audiobookshelf/security/advisories/G
|
||||
CVE-2024-3524 - https://vuldb.com/?id.259895
|
||||
CVE-2024-3529 - https://vuldb.com/?id.259899
|
||||
CVE-2024-35324 - https://github.com/w0x68y/cve-lists/blob/main/CMS/Douchat/Douchat%204.0.5%20arbitrary%20file%20upload%20vulnerability.md
|
||||
CVE-2024-35325 - https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35325.c
|
||||
CVE-2024-35326 - https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35326.c
|
||||
CVE-2024-35328 - https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35328.c
|
||||
CVE-2024-35333 - https://github.com/momo1239/CVE-2024-35333
|
||||
@@ -99761,6 +99779,7 @@ CVE-2024-42849 - https://github.com/njmbb8/CVE-2024-42849/tree/main
|
||||
CVE-2024-4289 - https://wpscan.com/vulnerability/072785de-0ce5-42a4-a3fd-4eb1d1a2f1be/
|
||||
CVE-2024-4290 - https://wpscan.com/vulnerability/a9a10d0f-d8f2-4f3e-92bf-94fc08416d87/
|
||||
CVE-2024-4291 - https://github.com/L1ziang/Vulnerability/blob/main/formAddMacfilterRule.md
|
||||
CVE-2024-42918 - https://packetstormsecurity.com
|
||||
CVE-2024-4293 - https://github.com/Sospiro014/zday1/blob/main/doctor_appointment_management_system_xss.md
|
||||
CVE-2024-4294 - https://github.com/Sospiro014/zday1/blob/main/doctor_appointment_management_system_idor.md
|
||||
CVE-2024-42940 - https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1201/fromP2pListFilter.md
|
||||
@@ -99806,9 +99825,11 @@ CVE-2024-43360 - https://github.com/ZoneMinder/zoneminder/security/advisories/GH
|
||||
CVE-2024-43373 - https://github.com/j4k0xb/webcrack/security/advisories/GHSA-ccqh-278p-xq6w
|
||||
CVE-2024-43374 - https://github.com/vim/vim/security/advisories/GHSA-2w8m-443v-cgvw
|
||||
CVE-2024-43381 - https://github.com/yogeshojha/rengine/security/advisories/GHSA-96q4-fj2m-jqf7
|
||||
CVE-2024-43396 - https://github.com/khoj-ai/khoj/security/advisories/GHSA-cf72-vg59-4j4h
|
||||
CVE-2024-4340 - https://github.com/advisories/GHSA-2m57-hf25-phgg
|
||||
CVE-2024-4340 - https://research.jfrog.com/vulnerabilities/sqlparse-stack-exhaustion-dos-jfsa-2024-001031292/
|
||||
CVE-2024-43401 - https://jira.xwiki.org/browse/XWIKI-20331
|
||||
CVE-2024-43403 - https://github.com/kanisterio/kanister/security/advisories/GHSA-h27c-6xm3-mcqp
|
||||
CVE-2024-4348 - https://vuldb.com/?submit.320855
|
||||
CVE-2024-4349 - https://github.com/CveSecLook/cve/issues/19
|
||||
CVE-2024-4372 - https://wpscan.com/vulnerability/13dcfd8a-e378-44b4-af6f-940bc41539a4/
|
||||
@@ -99844,6 +99865,10 @@ CVE-2024-45167 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisorie
|
||||
CVE-2024-45167 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-051.txt
|
||||
CVE-2024-45168 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-049.txt
|
||||
CVE-2024-45169 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-052.txt
|
||||
CVE-2024-45187 - https://research.jfrog.com/vulnerabilities/mage-ai-deleted-users-rce-jfsa-2024-001039602/
|
||||
CVE-2024-45188 - https://research.jfrog.com/vulnerabilities/mage-ai-file-content-request-remote-arbitrary-file-leak-jfsa-2024-001039603/
|
||||
CVE-2024-45189 - https://research.jfrog.com/vulnerabilities/mage-ai-git-content-request-remote-arbitrary-file-leak-jfsa-2024-001039604/
|
||||
CVE-2024-45190 - https://research.jfrog.com/vulnerabilities/mage-ai-pipeline-interaction-request-remote-arbitrary-file-leak-jfsa-2024-001039605/
|
||||
CVE-2024-4528 - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss2.md
|
||||
CVE-2024-4529 - https://wpscan.com/vulnerability/082ff0b8-2ecd-4292-832d-0a79e1ba8cb3/
|
||||
CVE-2024-4530 - https://wpscan.com/vulnerability/952f6b5c-7728-4c87-8826-6b493f51a979/
|
||||
@@ -100177,9 +100202,11 @@ CVE-2024-5984 - https://github.com/LiuYongXiang-git/cve/issues/3
|
||||
CVE-2024-5985 - https://github.com/CveSecLook/cve/issues/45
|
||||
CVE-2024-6006 - https://vuldb.com/?submit.351403
|
||||
CVE-2024-6007 - https://github.com/SecureF1sh/findings/blob/main/ns_sqli.md
|
||||
CVE-2024-6008 - https://github.com/1902zdq/cve/issues/1
|
||||
CVE-2024-6009 - https://github.com/AutoZhou1/cve/issues/1
|
||||
CVE-2024-6011 - https://drive.google.com/file/d/1SFQXlRUQw7THm_Vay_pFH3pIX1cjH4AY/view?usp=sharing
|
||||
CVE-2024-6013 - https://github.com/gabriel202212/cve/issues/1
|
||||
CVE-2024-6014 - https://github.com/gabriel202212/cve/issues/2
|
||||
CVE-2024-6015 - https://github.com/chenwulin-bit/cve/issues/1
|
||||
CVE-2024-6016 - https://github.com/chenwulin-bit/cve/issues/2
|
||||
CVE-2024-6021 - https://wpscan.com/vulnerability/9d83cffd-7dcd-4301-8d4d-3043b14e05b5/
|
||||
@@ -100192,7 +100219,10 @@ CVE-2024-6041 - https://github.com/ssiicckk/cve/issues/1
|
||||
CVE-2024-6042 - https://github.com/Cormac315/cve/issues/1
|
||||
CVE-2024-6043 - https://github.com/yezzzo/y3/blob/main/SourceCodester%20Best%20house%20rental%20management%20system%20project%20in%20php%201.0%20SQL%20Injection.md
|
||||
CVE-2024-6061 - https://github.com/gpac/gpac/issues/2871
|
||||
CVE-2024-6062 - https://github.com/gpac/gpac/issues/2872
|
||||
CVE-2024-6063 - https://github.com/gpac/gpac/issues/2873
|
||||
CVE-2024-6064 - https://github.com/gpac/gpac/issues/2874
|
||||
CVE-2024-6065 - https://github.com/ppp-src/CVE/issues/4
|
||||
CVE-2024-6070 - https://wpscan.com/vulnerability/97bab6cf-011c-4df4-976c-1f3252082f8f/
|
||||
CVE-2024-6072 - https://wpscan.com/vulnerability/1d8a344b-37e9-41e8-9de0-c67b7ca8e21b/
|
||||
CVE-2024-6073 - https://wpscan.com/vulnerability/f04994bc-9eef-46de-995b-8598f7a749c4/
|
||||
@@ -100201,9 +100231,15 @@ CVE-2024-6075 - https://wpscan.com/vulnerability/b0e2658a-b075-48b6-a9d9-e141194
|
||||
CVE-2024-6076 - https://wpscan.com/vulnerability/8369a2d8-1780-40c3-90ff-a826b9e9afd4/
|
||||
CVE-2024-6084 - https://github.com/Laster-dev/CVE/issues/2
|
||||
CVE-2024-6094 - https://wpscan.com/vulnerability/019b3f34-7b85-4728-8dd7-ca472d6b2d06/
|
||||
CVE-2024-6109 - https://github.com/PHJ-doit/cve/issues/1
|
||||
CVE-2024-6110 - https://github.com/Laster-dev/CVE/issues/1
|
||||
CVE-2024-6111 - https://github.com/wangyuan-ui/CVE/issues/1
|
||||
CVE-2024-6112 - https://github.com/wangyuan-ui/CVE/issues/2
|
||||
CVE-2024-6113 - https://github.com/wangyuan-ui/CVE/issues/3
|
||||
CVE-2024-6114 - https://github.com/wangyuan-ui/CVE/issues/4
|
||||
CVE-2024-6115 - https://github.com/wangyuan-ui/CVE/issues/5
|
||||
CVE-2024-6116 - https://github.com/wangyuan-ui/CVE/issues/6
|
||||
CVE-2024-6127 - https://github.com/ACE-Responder/Empire-C2-RCE-PoC
|
||||
CVE-2024-6127 - https://vulncheck.com/advisories/empire-unauth-rce
|
||||
CVE-2024-6130 - https://wpscan.com/vulnerability/bbed2968-4bd6-49ae-bd61-8a1f751e7041/
|
||||
CVE-2024-6133 - https://wpscan.com/vulnerability/fd613e1e-557c-4383-a3e9-4c14bc0be0c5/
|
||||
@@ -100214,6 +100250,7 @@ CVE-2024-6158 - https://wpscan.com/vulnerability/8adb219f-f0a6-4e87-8626-db26e30
|
||||
CVE-2024-6164 - https://wpscan.com/vulnerability/40bd880e-67a1-4180-b197-8dcadaa0ace4/
|
||||
CVE-2024-6165 - https://wpscan.com/vulnerability/b9e6648a-9d19-4e73-ad6c-f727802d8dd5/
|
||||
CVE-2024-6184 - https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_a.md
|
||||
CVE-2024-6185 - https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_b.md
|
||||
CVE-2024-6186 - https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_c.md
|
||||
CVE-2024-6187 - https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_d.md
|
||||
CVE-2024-6188 - https://kiwiyumi.com/post/tracksys-export-source-code/
|
||||
@@ -100223,6 +100260,7 @@ CVE-2024-6191 - https://github.com/HryspaHodor/CVE/issues/3
|
||||
CVE-2024-6192 - https://github.com/HryspaHodor/CVE/issues/4
|
||||
CVE-2024-6193 - https://github.com/HryspaHodor/CVE/issues/5
|
||||
CVE-2024-6194 - https://github.com/HryspaHodor/CVE/issues/6
|
||||
CVE-2024-6195 - https://github.com/2768210355/cve/issues/2
|
||||
CVE-2024-6196 - https://github.com/2768210355/cve/issues/1
|
||||
CVE-2024-6205 - https://wpscan.com/vulnerability/7e2c5032-2917-418c-aee3-092bdb78a087/
|
||||
CVE-2024-6212 - https://docs.google.com/document/d/1tl9-EAxUR64Og9zS-nyUx3YtG1V32Monkvq-h39tjpw/edit?usp=sharing
|
||||
@@ -100234,7 +100272,9 @@ CVE-2024-6230 - https://wpscan.com/vulnerability/311e3c15-0f58-4f3b-91f8-0c62c0e
|
||||
CVE-2024-6231 - https://wpscan.com/vulnerability/75ad1d8f-edc3-4eb3-b4c0-73832c0a4ca0/
|
||||
CVE-2024-6243 - https://wpscan.com/vulnerability/f4097877-ba19-4738-a994-9593b9a5a635/
|
||||
CVE-2024-6244 - https://wpscan.com/vulnerability/73ba55a5-6cff-40fc-9686-30c50f060732/
|
||||
CVE-2024-6253 - https://github.com/Desenchanted/cve/issues/1
|
||||
CVE-2024-6267 - https://docs.google.com/document/d/1upC4101Ob9UW7fGC_valsEa45Q5xuBgcKZhs1Q-WoBM/edit?usp=sharing
|
||||
CVE-2024-6267 - https://github.com/sgr-xd/CVEs/blob/main/CVE-2024-6267.md
|
||||
CVE-2024-6270 - https://wpscan.com/vulnerability/3d0a6edc-61e8-42fb-8b93-ef083146bd9c/
|
||||
CVE-2024-6271 - https://wpscan.com/vulnerability/44d9d085-34cb-490f-a3f5-f9eafae85ab8/
|
||||
CVE-2024-6272 - https://wpscan.com/vulnerability/146b94df-7fc6-4da3-9ef1-d2875ae3fa9e/
|
||||
@@ -100246,6 +100286,8 @@ CVE-2024-6330 - https://wpscan.com/vulnerability/95b532e0-1ffb-421e-b9c0-de03f89
|
||||
CVE-2024-6334 - https://wpscan.com/vulnerability/6c09083c-6960-4369-8c5c-ad20e34aaa8b/
|
||||
CVE-2024-6362 - https://wpscan.com/vulnerability/d2e2d06b-0f07-40b9-9b87-3373f62ae1a9/
|
||||
CVE-2024-6366 - https://wpscan.com/vulnerability/5b90cbdd-52cc-4e7b-bf39-bea0dd59e19e/
|
||||
CVE-2024-6371 - https://github.com/L1OudFd8cl09/CVE/blob/main/25_06_2024_b.md
|
||||
CVE-2024-6372 - https://github.com/Galaxy-lrc/cve/issues/1
|
||||
CVE-2024-6373 - https://github.com/Abyssun/abyssun-/issues/1
|
||||
CVE-2024-6386 - https://sec.stealthcopter.com/wpml-rce-via-twig-ssti/
|
||||
CVE-2024-6387 - http://seclists.org/fulldisclosure/2024/Jul/18
|
||||
@@ -100253,6 +100295,7 @@ CVE-2024-6387 - http://seclists.org/fulldisclosure/2024/Jul/19
|
||||
CVE-2024-6387 - http://www.openwall.com/lists/oss-security/2024/07/03/5
|
||||
CVE-2024-6387 - http://www.openwall.com/lists/oss-security/2024/07/28/2
|
||||
CVE-2024-6387 - https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server
|
||||
CVE-2024-6387 - https://github.com/zgzhang/cve-2024-6387-poc
|
||||
CVE-2024-6387 - https://news.ycombinator.com/item?id=40843778
|
||||
CVE-2024-6387 - https://santandersecurityresearch.github.io/blog/sshing_the_masses.html
|
||||
CVE-2024-6387 - https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html
|
||||
@@ -100263,6 +100306,7 @@ CVE-2024-6408 - https://wpscan.com/vulnerability/31aaeffb-a752-4941-9d0f-1b374fb
|
||||
CVE-2024-6412 - https://wpscan.com/vulnerability/9eb0dad6-3c19-4fe4-a20d-d45b51410444/
|
||||
CVE-2024-6417 - https://github.com/xyj123a/cve/blob/main/sql.md
|
||||
CVE-2024-6420 - https://wpscan.com/vulnerability/dfda6577-81aa-4397-a2d6-1d736f9ebd44/
|
||||
CVE-2024-6439 - https://github.com/GAO-UNO/cve/blob/main/upload.md
|
||||
CVE-2024-6451 - https://wpscan.com/vulnerability/fc06d413-a227-470c-a5b7-cdab57aeab34/
|
||||
CVE-2024-6453 - https://github.com/7u7777/cve/issues/3
|
||||
CVE-2024-6459 - https://wpscan.com/vulnerability/330359fa-d085-4923-b5a8-c0e2e5267247/
|
||||
@@ -100287,8 +100331,11 @@ CVE-2024-6531 - https://www.herodevs.com/vulnerability-directory/cve-2024-6531
|
||||
CVE-2024-6533 - https://fluidattacks.com/advisories/bocelli
|
||||
CVE-2024-6534 - https://fluidattacks.com/advisories/capaldi
|
||||
CVE-2024-6536 - https://wpscan.com/vulnerability/ee40c1c6-4186-4b97-866c-fb0e76cedeb8/
|
||||
CVE-2024-6649 - https://github.com/Xu-Mingming/cve/blob/main/csrf1.md
|
||||
CVE-2024-6650 - https://github.com/Xu-Mingming/cve/blob/main/xss1.md
|
||||
CVE-2024-6651 - https://wpscan.com/vulnerability/65e2c77d-09bd-4a44-81d9-d7a5db0e0f84/
|
||||
CVE-2024-6652 - https://github.com/littletree7/cve/issues/1
|
||||
CVE-2024-6653 - https://github.com/hantianj/cve/issues/1
|
||||
CVE-2024-6695 - https://wpscan.com/vulnerability/4afa5c85-ce27-4ca7-bba2-61fb39c53a5b/
|
||||
CVE-2024-6706 - https://korelogic.com/Resources/Advisories/KL-001-2024-005.txt
|
||||
CVE-2024-6707 - https://korelogic.com/Resources/Advisories/KL-001-2024-006.txt
|
||||
@@ -100297,6 +100344,7 @@ CVE-2024-6715 - https://wpscan.com/vulnerability/19406acc-3441-4d4a-9163-ace8f1d
|
||||
CVE-2024-6716 - https://gitlab.com/libtiff/libtiff/-/issues/620
|
||||
CVE-2024-6720 - https://wpscan.com/vulnerability/d1449be1-ae85-46f4-b5ba-390d25b87723/
|
||||
CVE-2024-6724 - https://wpscan.com/vulnerability/0cb3158a-263d-4c4a-8029-62b453c281cb/
|
||||
CVE-2024-6728 - https://github.com/jeery0/cve/issues/1
|
||||
CVE-2024-6729 - https://reports-kunull.vercel.app/CVE%20research/2024/cve-2024-6729
|
||||
CVE-2024-6729 - https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6729
|
||||
CVE-2024-6731 - https://reports-kunull.vercel.app/CVE%20research/2024/cve-2024-6731
|
||||
@@ -100304,19 +100352,26 @@ CVE-2024-6731 - https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6731
|
||||
CVE-2024-6732 - https://reports-kunull.vercel.app/CVE%20research/2024/cve-2024-6732
|
||||
CVE-2024-6732 - https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6732
|
||||
CVE-2024-6732 - https://vuldb.com/?submit.374370
|
||||
CVE-2024-6733 - https://github.com/jiaoyanshuai/cve/issues/1
|
||||
CVE-2024-6734 - https://github.com/jiaoyanshuai/cve/issues/2
|
||||
CVE-2024-6735 - https://github.com/xzyxiaohaha/cve/issues/1
|
||||
CVE-2024-6745 - https://github.com/xzyxiaohaha/cve/issues/2
|
||||
CVE-2024-6746 - https://github.com/NaiboWang/EasySpider/issues/466
|
||||
CVE-2024-6766 - https://wpscan.com/vulnerability/77bb1dcf-4e84-497a-955e-f3c0b649ad1c/
|
||||
CVE-2024-6768 - https://www.fortra.com/security/advisories/research/fr-2024-001
|
||||
CVE-2024-6781 - https://starlabs.sg/advisories/24/24-6781/
|
||||
CVE-2024-6782 - https://starlabs.sg/advisories/24/24-6782/
|
||||
CVE-2024-6783 - https://www.herodevs.com/vulnerability-directory/cve-2024-6783---vue-client-side-xss
|
||||
CVE-2024-6801 - https://github.com/aaajuna/demo/issues/1
|
||||
CVE-2024-6802 - https://reports-kunull.vercel.app/CVE%20research/2024/cve-2024-6802
|
||||
CVE-2024-6802 - https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6802
|
||||
CVE-2024-6803 - https://github.com/hzy11111111/cve/issues/3
|
||||
CVE-2024-6807 - https://reports-kunull.vercel.app/CVE%20research/2024/cve-2024-6807
|
||||
CVE-2024-6807 - https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6807
|
||||
CVE-2024-6808 - https://github.com/qianqiusujiu/cve/issues/1
|
||||
CVE-2024-6843 - https://wpscan.com/vulnerability/9a5cb440-065a-445a-9a09-55bd5f782e85/
|
||||
CVE-2024-6847 - https://wpscan.com/vulnerability/baa860bb-3b7d-438a-ad54-92bf8e21e851/
|
||||
CVE-2024-6848 - https://github.com/BoldGrid/post-and-page-builder/issues/612
|
||||
CVE-2024-6884 - https://wpscan.com/vulnerability/1768de0c-e4ea-4c98-abf1-7ac805f214b8/
|
||||
CVE-2024-6890 - https://korelogic.com/Resources/Advisories/KL-001-2024-007.txt
|
||||
CVE-2024-6891 - https://korelogic.com/Resources/Advisories/KL-001-2024-008.txt
|
||||
@@ -100328,9 +100383,11 @@ CVE-2024-6912 - http://seclists.org/fulldisclosure/2024/Jul/13
|
||||
CVE-2024-6912 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-perten-processplus/
|
||||
CVE-2024-6913 - http://seclists.org/fulldisclosure/2024/Jul/13
|
||||
CVE-2024-6913 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-perten-processplus/
|
||||
CVE-2024-6923 - https://github.com/python/cpython/pull/122233
|
||||
CVE-2024-6932 - https://github.com/Hebing123/cve/issues/42
|
||||
CVE-2024-6933 - https://github.com/Hebing123/cve/issues/55
|
||||
CVE-2024-6934 - https://github.com/DeepMountains/Mirage/blob/main/CVE-2.md
|
||||
CVE-2024-6937 - https://github.com/DeepMountains/Mirage/blob/main/CVE2-3.md
|
||||
CVE-2024-6938 - https://github.com/siyuan-note/siyuan/issues/11650
|
||||
CVE-2024-6938 - https://github.com/siyuan-note/siyuan/issues/11949
|
||||
CVE-2024-6939 - https://github.com/rainrocka/xinhu/issues/7
|
||||
@@ -100342,9 +100399,13 @@ CVE-2024-6952 - https://github.com/DeepMountains/Mirage/blob/main/CVE6-1.md
|
||||
CVE-2024-6953 - https://github.com/333-uit/CVE/issues/1
|
||||
CVE-2024-6956 - https://github.com/DeepMountains/Mirage/blob/main/CVE6-2.md
|
||||
CVE-2024-6957 - https://github.com/DeepMountains/Mirage/blob/main/CVE6-3.md
|
||||
CVE-2024-6958 - https://github.com/DeepMountains/Mirage/blob/main/CVE6-4.md
|
||||
CVE-2024-6960 - https://research.jfrog.com/vulnerabilities/h2o-model-deserialization-rce-jfsa-2024-001035518/
|
||||
CVE-2024-6961 - https://research.jfrog.com/vulnerabilities/guardrails-rail-xxe-jfsa-2024-001035519/
|
||||
CVE-2024-6962 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/O3V2.0/formQosSet.md
|
||||
CVE-2024-6963 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/O3V2.0/formexeCommand.md
|
||||
CVE-2024-6964 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/O3V2.0/fromDhcpSetSer.md
|
||||
CVE-2024-6965 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/O3V2.0/fromVirtualSet.md
|
||||
CVE-2024-6966 - https://github.com/HermesCui/CVE/issues/1
|
||||
CVE-2024-6967 - https://github.com/rtsjx-cve/cve/blob/main/sql.md
|
||||
CVE-2024-6984 - https://github.com/juju/juju/security/advisories/GHSA-6vjm-54vp-mxhx
|
||||
@@ -100620,5 +100681,6 @@ CVE-2024-7897 - https://gist.github.com/b0rgch3n/bb47a1ed6f66c1e8c7a80f210f4ac8e
|
||||
CVE-2024-7898 - https://gist.github.com/b0rgch3n/3136cad95b09e42184fb2d78aae33651
|
||||
CVE-2024-7900 - https://github.com/DeepMountains/Mirage/blob/main/CVE16-1.md
|
||||
CVE-2024-7900 - https://github.com/DeepMountains/Mirage/blob/main/CVE16-2.md
|
||||
CVE-2024-7954 - https://thinkloveshare.com/hacking/spip_preauth_rce_2024_part_1_the_feather/
|
||||
CVE-2024-8003 - https://vuldb.com/?submit.393987
|
||||
CVE-2024-8072 - https://research.jfrog.com/vulnerabilities/mage-ai-terminal-server-infoleak-jfsa-2024-001039574/
|
||||
|
||||
Reference in New Issue
Block a user