mirror of
https://github.com/0xMarcio/cve.git
synced 2026-02-12 18:42:46 +00:00
Update CVE sources 2024-06-07 04:52
This commit is contained in:
@@ -70,6 +70,7 @@ Windows Print Spooler Remote Code Execution Vulnerability
|
||||
- https://github.com/AndrewTrube/CVE-2021-1675
|
||||
- https://github.com/Anonymous-Family/Zero-day-scanning
|
||||
- https://github.com/AshikAhmed007/Active-Directory-Exploitation-Cheat-Sheet
|
||||
- https://github.com/B34MR/zeroscan
|
||||
- https://github.com/BC-SECURITY/Moriarty
|
||||
- https://github.com/BOFs/CobaltStrike
|
||||
- https://github.com/BeetleChunks/SpoolSploit
|
||||
|
||||
@@ -18,6 +18,7 @@ A path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 fi
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/ARPSyndicate/kenzer-templates
|
||||
- https://github.com/ArrestX/--POC
|
||||
- https://github.com/DinoBytes/RVASec-2024-Consumer-Routers-Still-Suck
|
||||
- https://github.com/HimmelAward/Goby_POC
|
||||
- https://github.com/KayCHENvip/vulnerability-poc
|
||||
- https://github.com/Miraitowa70/POC-Notes
|
||||
|
||||
@@ -46,6 +46,7 @@ No PoCs from references.
|
||||
- https://github.com/mintoolkit/mint
|
||||
- https://github.com/mmk-1/kubernetes-poc
|
||||
- https://github.com/n1sh1th/CVE-POC
|
||||
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
|
||||
- https://github.com/slimtoolkit/slim
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/superlink996/chunqiuyunjingbachang
|
||||
|
||||
@@ -126,6 +126,7 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability in a v
|
||||
- https://github.com/oscpname/OSCP_cheat
|
||||
- https://github.com/password520/CVE-2021-21972
|
||||
- https://github.com/password520/LadonGo
|
||||
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
|
||||
- https://github.com/pen4uin/awesome-vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research-list
|
||||
|
||||
@@ -67,6 +67,7 @@ The vCenter Server contains an arbitrary file upload vulnerability in the Analyt
|
||||
- https://github.com/manas3c/CVE-POC
|
||||
- https://github.com/nday-ldgz/ZoomEye-dork
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
|
||||
- https://github.com/pen4uin/awesome-vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research-list
|
||||
|
||||
@@ -95,6 +95,7 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/octane23/CASE-STUDY-1
|
||||
- https://github.com/overgrowncarrot1/DejaVu-CVE-2021-22205
|
||||
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
|
||||
- https://github.com/pen4uin/awesome-vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research-list
|
||||
|
||||
@@ -79,6 +79,7 @@ On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/openx-org/BLEN
|
||||
- https://github.com/papa-anniekey/CustomSignatures
|
||||
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
|
||||
- https://github.com/pen4uin/awesome-vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research-list
|
||||
@@ -101,6 +102,7 @@ On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before
|
||||
- https://github.com/xinyisleep/pocscan
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
- https://github.com/yaunsky/CVE-202122986-EXP
|
||||
- https://github.com/yhy0/ExpDemo-JavaFX
|
||||
- https://github.com/youwizard/CVE-POC
|
||||
- https://github.com/zecool/cve
|
||||
- https://github.com/zmylml/yangzifun
|
||||
|
||||
@@ -27,6 +27,7 @@ No PoCs from references.
|
||||
- https://github.com/developer-guy/awesome-falco
|
||||
- https://github.com/k0mi-tg/CVE-POC
|
||||
- https://github.com/khu-capstone-design/kubernetes-vulnerability-investigation
|
||||
- https://github.com/magnologan/awesome-k8s-security
|
||||
- https://github.com/manas3c/CVE-POC
|
||||
- https://github.com/noirfate/k8s_debug
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
||||
@@ -20,5 +20,6 @@ No PoCs from references.
|
||||
- https://github.com/adavarski/HomeLab-k8s-DevSecOps-playground
|
||||
- https://github.com/atesemre/awesome-cloud-native-security
|
||||
- https://github.com/kajogo777/kubernetes-misconfigured
|
||||
- https://github.com/magnologan/awesome-k8s-security
|
||||
- https://github.com/reni2study/Cloud-Native-Security2
|
||||
|
||||
|
||||
@@ -18,4 +18,5 @@ No PoCs from references.
|
||||
- https://github.com/adavarski/HomeLab-k8s-DevSecOps-playground
|
||||
- https://github.com/hacking-kubernetes/hacking-kubernetes.info
|
||||
- https://github.com/kajogo777/kubernetes-misconfigured
|
||||
- https://github.com/magnologan/awesome-k8s-security
|
||||
|
||||
|
||||
@@ -31,6 +31,7 @@ No PoCs from references.
|
||||
- https://github.com/iridium-soda/container-escape-exploits
|
||||
- https://github.com/k0mi-tg/CVE-POC
|
||||
- https://github.com/khu-capstone-design/kubernetes-vulnerability-investigation
|
||||
- https://github.com/magnologan/awesome-k8s-security
|
||||
- https://github.com/manas3c/CVE-POC
|
||||
- https://github.com/noirfate/k8s_debug
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
||||
@@ -146,6 +146,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
|
||||
- https://github.com/ouwenjin/-
|
||||
- https://github.com/p0nymc1/CVE-2021-26084
|
||||
- https://github.com/pathakabhi24/Pentest-Tools
|
||||
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
|
||||
- https://github.com/pen4uin/awesome-pentest-note
|
||||
- https://github.com/pen4uin/awesome-vulnerability-research
|
||||
- https://github.com/pen4uin/pentest-note
|
||||
|
||||
@@ -58,6 +58,7 @@ Apache OFBiz has unsafe deserialization prior to 17.12.06. An unauthenticated at
|
||||
- https://github.com/manas3c/CVE-POC
|
||||
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
|
||||
- https://github.com/pen4uin/awesome-vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research-list
|
||||
|
||||
@@ -15,4 +15,5 @@ The Bluetooth Classic implementation in Espressif ESP-IDF 4.4 and earlier does n
|
||||
#### Github
|
||||
- https://github.com/JeffroMF/awesome-bluetooth-security321
|
||||
- https://github.com/engn33r/awesome-bluetooth-security
|
||||
- https://github.com/sgxgsx/BlueToolkit
|
||||
|
||||
|
||||
@@ -31,6 +31,7 @@ No PoCs from references.
|
||||
- https://github.com/Rafael-Svechinskaya/IOC_for_CVE-2021-28310
|
||||
- https://github.com/SYRTI/POC_to_review
|
||||
- https://github.com/WhooAmii/POC_to_review
|
||||
- https://github.com/cylaris/awesomekql
|
||||
- https://github.com/k0mi-tg/CVE-POC
|
||||
- https://github.com/manas3c/CVE-POC
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
||||
@@ -28,6 +28,7 @@ No PoCs from references.
|
||||
- https://github.com/Threekiii/Awesome-Exploit
|
||||
- https://github.com/Threekiii/Awesome-POC
|
||||
- https://github.com/Threekiii/Vulhub-Reproduce
|
||||
- https://github.com/Tsojan/TsojanScan
|
||||
- https://github.com/WhooAmii/POC_to_review
|
||||
- https://github.com/Whoopsunix/nacosScan
|
||||
- https://github.com/bakery312/Vulhub-Reproduce
|
||||
|
||||
@@ -35,6 +35,7 @@ No PoCs from references.
|
||||
- https://github.com/daedalus/CVE-2021-30461
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/openx-org/BLEN
|
||||
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
|
||||
- https://github.com/puckiestyle/CVE-2021-30461
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/trhacknon/Pocingit
|
||||
|
||||
@@ -30,6 +30,7 @@ No PoCs from references.
|
||||
- https://github.com/h4ckm310n/Container-Vulnerability-Exploit
|
||||
- https://github.com/iridium-soda/container-escape-exploits
|
||||
- https://github.com/kaosagnt/ansible-everyday
|
||||
- https://github.com/magnologan/awesome-k8s-security
|
||||
- https://github.com/reni2study/Cloud-Native-Security2
|
||||
- https://github.com/superfish9/pt
|
||||
- https://github.com/wllenyj/safe-path-rs
|
||||
|
||||
@@ -13,5 +13,5 @@ An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.36. I
|
||||
- https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1927070
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
- https://github.com/testing-felickz/docker-scout-demo
|
||||
|
||||
|
||||
@@ -14,5 +14,6 @@ Lack of null check while freeing the device information buffer in the Bluetooth
|
||||
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/sgxgsx/BlueToolkit
|
||||
- https://github.com/xmpf/qualcomm-bulletins
|
||||
|
||||
|
||||
@@ -16,4 +16,5 @@ There's a flaw in lz4. An attacker who submits a crafted file to an application
|
||||
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
||||
|
||||
@@ -39,6 +39,7 @@ No PoCs from references.
|
||||
- https://github.com/langligelang/langligelang
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
|
||||
- https://github.com/pen4uin/awesome-vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research-list
|
||||
|
||||
24
2021/CVE-2021-3899.md
Normal file
24
2021/CVE-2021-3899.md
Normal file
@@ -0,0 +1,24 @@
|
||||
### [CVE-2021-3899](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3899)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1948376
|
||||
|
||||
#### Github
|
||||
- https://github.com/NaInSec/CVE-PoC-in-GitHub
|
||||
- https://github.com/WhooAmii/POC_to_review
|
||||
- https://github.com/k0mi-tg/CVE-POC
|
||||
- https://github.com/liumuqing/CVE-2021-3899_PoC
|
||||
- https://github.com/manas3c/CVE-POC
|
||||
- https://github.com/whoforget/CVE-POC
|
||||
- https://github.com/youwizard/CVE-POC
|
||||
- https://github.com/zecool/cve
|
||||
|
||||
17
2021/CVE-2021-3942.md
Normal file
17
2021/CVE-2021-3942.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2021-3942](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3942)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Certain HP Print products and Digital Sending products may be vulnerable to potential remote code execution and buffer overflow with use of Link-Local Multicast Name Resolution or LLMNR.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/muchdogesec/cve2stix
|
||||
|
||||
@@ -231,6 +231,7 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility.
|
||||
- https://github.com/darkerego/pwnkit
|
||||
- https://github.com/deathsticksguy/CEHv12Practical
|
||||
- https://github.com/defhacks/cve-2021-4034
|
||||
- https://github.com/dejavudwh/dejavudwh
|
||||
- https://github.com/deoxykev/CVE-2021-4034-Rust
|
||||
- https://github.com/drapl0n/pwnKit
|
||||
- https://github.com/dzonerzy/poc-cve-2021-4034
|
||||
|
||||
@@ -13,5 +13,5 @@ An informtion disclosure issue exists in D-LINK-DIR-605 B2 Firmware Version : 2.
|
||||
- https://www.dlink.com/en/security-bulletin/
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
- https://github.com/Ostorlab/KEV
|
||||
|
||||
|
||||
@@ -248,6 +248,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
|
||||
- https://github.com/numanturle/CVE-2021-41773
|
||||
- https://github.com/orangmuda/CVE-2021-41773
|
||||
- https://github.com/oscpname/OSCP_cheat
|
||||
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
|
||||
- https://github.com/pen4uin/awesome-vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research-list
|
||||
|
||||
@@ -139,6 +139,7 @@ It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was in
|
||||
- https://github.com/nitishbadole/oscp-note-3
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/oscpname/OSCP_cheat
|
||||
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
|
||||
- https://github.com/pen4uin/awesome-vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research-list
|
||||
|
||||
@@ -9,7 +9,7 @@
|
||||
|
||||
### Description
|
||||
|
||||
<p>An information disclosure vulnerability manifests when a user or an application uploads unprotected private key data as part of an authentication certificate <a href="https://docs.microsoft.com/en-us/graph/api/resources/keycredential?view=graph-rest-1.0">keyCredential</a> on an Azure AD <a href="https://docs.microsoft.com/en-us/azure/active-directory/develop/app-objects-and-service-principals">Application or Service Principal</a> (which is not recommended). This vulnerability allows a user or service in the tenant with application read access to read the private key data that was added to the application.</p><p>Azure AD addressed this vulnerability by preventing disclosure of any private key values added to the application.</p><p>Microsoft has identified services that could manifest this vulnerability, and steps that customers should take to be protected. Refer to the FAQ section for more information.</p><p>For more details on this issue, please refer to the <a href="https://aka.ms/CVE-2021-42306-AAD">MSRC Blog Entry</a>.</p>
|
||||
An information disclosure vulnerability manifests when a user or an application uploads unprotected private key data as part of an authentication certificate keyCredential on an Azure AD Application or Service Principal (which is not recommended). This vulnerability allows a user or service in the tenant with application read access to read the private key data that was added to the application.Azure AD addressed this vulnerability by preventing disclosure of any private key values added to the application.Microsoft has identified services that could manifest this vulnerability, and steps that customers should take to be protected. Refer to the FAQ section for more information.For more details on this issue, please refer to the MSRC Blog Entry.
|
||||
|
||||
### POC
|
||||
|
||||
@@ -18,5 +18,6 @@ No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/Azure/Azure-Sentinel-Notebooks
|
||||
- https://github.com/SummitRoute/csp_security_mistakes
|
||||
|
||||
|
||||
@@ -111,6 +111,7 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver
|
||||
- https://github.com/nuker/CVE-2021-43798
|
||||
- https://github.com/openx-org/BLEN
|
||||
- https://github.com/pedrohavay/exploit-grafana-CVE-2021-43798
|
||||
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
|
||||
- https://github.com/persees/grafana_exploits
|
||||
- https://github.com/rnsss/CVE-2021-43798-poc
|
||||
- https://github.com/rodpwn/CVE-2021-43798-mass_scanner
|
||||
|
||||
@@ -5,7 +5,7 @@
|
||||
|
||||
### Description
|
||||
|
||||
<p>We have investigated reports of a spoofing vulnerability in AppX installer that affects Microsoft Windows. Microsoft is aware of attacks that attempt to exploit this vulnerability by using specially crafted packages that include the malware family known as Emotet/Trickbot/Bazaloader.</p><p>An attacker could craft a malicious attachment to be used in phishing campaigns. The attacker would then have to convince the user to open the specially crafted attachment. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.</p><p>Please see the <strong>Security Updates</strong> table for the link to the updated app. Alternatively you can download and install the Installer using the links provided in the <strong>FAQ</strong> section.</p><p>Please see the <strong>Mitigations</strong> and <strong>Workaround</strong> sections for important information about steps you can take to protect your system from this vulnerability.</p><p><strong>December 27 2023 Update:</strong></p><p>In recent months, Microsoft Threat Intelligence has seen an increase in activity from threat actors leveraging social engineering and phishing techniques to target Windows OS users and utilizing the <a href="https://learn.microsoft.com/en-us/windows/msix/app-installer/installing-windows10-apps-web">ms-appinstaller URI scheme</a>.</p><p>To address this increase in activity, we have updated the App Installer to disable the ms-appinstaller protocol by default and recommend other potential mitigations.</p>
|
||||
We have investigated reports of a spoofing vulnerability in AppX installer that affects Microsoft Windows. Microsoft is aware of attacks that attempt to exploit this vulnerability by using specially crafted packages that include the malware family known as Emotet/Trickbot/Bazaloader.An attacker could craft a malicious attachment to be used in phishing campaigns. The attacker would then have to convince the user to open the specially crafted attachment. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.Please see the Security Updates table for the link to the updated app. Alternatively you can download and install the Installer using the links provided in the FAQ section.Please see the Mitigations and Workaround sections for important information about steps you can take to protect your system from this vulnerability.December 27 2023 Update:In recent months, Microsoft Threat Intelligence has seen an increase in activity from threat actors leveraging social engineering and phishing techniques to target Windows OS users and utilizing the ms-appinstaller URI scheme.To address this increase in activity, we have updated the App Installer to disable the ms-appinstaller protocol by default and recommend other potential mitigations.
|
||||
|
||||
### POC
|
||||
|
||||
|
||||
@@ -717,6 +717,9 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
||||
- https://github.com/defcon250/log4jScanner
|
||||
- https://github.com/dehlirious/LogIPAnalyzer
|
||||
- https://github.com/demilson/Log4Shell
|
||||
- https://github.com/demining/Chinese-version-of-Bitcoin-blockchain-cryptanalysis
|
||||
- https://github.com/demining/Japanese-version-of-Bitcoin-blockchain-cryptanalysis
|
||||
- https://github.com/demining/Korean-version-of-Bitcoin-blockchain-cryptanalysis
|
||||
- https://github.com/demining/Log4j-Vulnerability
|
||||
- https://github.com/demonrvm/Log4ShellRemediation
|
||||
- https://github.com/desquezzee/Jpg-Png-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
|
||||
|
||||
@@ -52,6 +52,7 @@ No PoCs from references.
|
||||
- https://github.com/lions2012/Penetration_Testing_POC
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/openx-org/BLEN
|
||||
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
|
||||
- https://github.com/pen4uin/awesome-vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research-list
|
||||
|
||||
@@ -16,4 +16,5 @@
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/GrigGM/05-virt-04-docker-hw
|
||||
- https://github.com/guyinatuxedo/Beyond_Oblivion
|
||||
- https://github.com/testing-felickz/docker-scout-demo
|
||||
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
### [CVE-2021-46905](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46905)
|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Reference in New Issue
Block a user