Update CVE sources 2024-06-07 04:52

This commit is contained in:
0xMarcio
2024-06-07 04:52:01 +00:00
parent 3f662cff1f
commit bc4580b779
878 changed files with 7144 additions and 379 deletions

View File

@@ -70,6 +70,7 @@ Windows Print Spooler Remote Code Execution Vulnerability
- https://github.com/AndrewTrube/CVE-2021-1675
- https://github.com/Anonymous-Family/Zero-day-scanning
- https://github.com/AshikAhmed007/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/B34MR/zeroscan
- https://github.com/BC-SECURITY/Moriarty
- https://github.com/BOFs/CobaltStrike
- https://github.com/BeetleChunks/SpoolSploit

View File

@@ -18,6 +18,7 @@ A path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 fi
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/ArrestX/--POC
- https://github.com/DinoBytes/RVASec-2024-Consumer-Routers-Still-Suck
- https://github.com/HimmelAward/Goby_POC
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/Miraitowa70/POC-Notes

View File

@@ -46,6 +46,7 @@ No PoCs from references.
- https://github.com/mintoolkit/mint
- https://github.com/mmk-1/kubernetes-poc
- https://github.com/n1sh1th/CVE-POC
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
- https://github.com/slimtoolkit/slim
- https://github.com/soosmile/POC
- https://github.com/superlink996/chunqiuyunjingbachang

View File

@@ -126,6 +126,7 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability in a v
- https://github.com/oscpname/OSCP_cheat
- https://github.com/password520/CVE-2021-21972
- https://github.com/password520/LadonGo
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list

View File

@@ -67,6 +67,7 @@ The vCenter Server contains an arbitrary file upload vulnerability in the Analyt
- https://github.com/manas3c/CVE-POC
- https://github.com/nday-ldgz/ZoomEye-dork
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list

View File

@@ -95,6 +95,7 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/octane23/CASE-STUDY-1
- https://github.com/overgrowncarrot1/DejaVu-CVE-2021-22205
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list

View File

@@ -79,6 +79,7 @@ On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/openx-org/BLEN
- https://github.com/papa-anniekey/CustomSignatures
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list
@@ -101,6 +102,7 @@ On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before
- https://github.com/xinyisleep/pocscan
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yaunsky/CVE-202122986-EXP
- https://github.com/yhy0/ExpDemo-JavaFX
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve
- https://github.com/zmylml/yangzifun

View File

@@ -27,6 +27,7 @@ No PoCs from references.
- https://github.com/developer-guy/awesome-falco
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/khu-capstone-design/kubernetes-vulnerability-investigation
- https://github.com/magnologan/awesome-k8s-security
- https://github.com/manas3c/CVE-POC
- https://github.com/noirfate/k8s_debug
- https://github.com/nomi-sec/PoC-in-GitHub

View File

@@ -20,5 +20,6 @@ No PoCs from references.
- https://github.com/adavarski/HomeLab-k8s-DevSecOps-playground
- https://github.com/atesemre/awesome-cloud-native-security
- https://github.com/kajogo777/kubernetes-misconfigured
- https://github.com/magnologan/awesome-k8s-security
- https://github.com/reni2study/Cloud-Native-Security2

View File

@@ -18,4 +18,5 @@ No PoCs from references.
- https://github.com/adavarski/HomeLab-k8s-DevSecOps-playground
- https://github.com/hacking-kubernetes/hacking-kubernetes.info
- https://github.com/kajogo777/kubernetes-misconfigured
- https://github.com/magnologan/awesome-k8s-security

View File

@@ -31,6 +31,7 @@ No PoCs from references.
- https://github.com/iridium-soda/container-escape-exploits
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/khu-capstone-design/kubernetes-vulnerability-investigation
- https://github.com/magnologan/awesome-k8s-security
- https://github.com/manas3c/CVE-POC
- https://github.com/noirfate/k8s_debug
- https://github.com/nomi-sec/PoC-in-GitHub

View File

@@ -146,6 +146,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
- https://github.com/ouwenjin/-
- https://github.com/p0nymc1/CVE-2021-26084
- https://github.com/pathakabhi24/Pentest-Tools
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
- https://github.com/pen4uin/awesome-pentest-note
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/pentest-note

View File

@@ -58,6 +58,7 @@ Apache OFBiz has unsafe deserialization prior to 17.12.06. An unauthenticated at
- https://github.com/manas3c/CVE-POC
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list

View File

@@ -15,4 +15,5 @@ The Bluetooth Classic implementation in Espressif ESP-IDF 4.4 and earlier does n
#### Github
- https://github.com/JeffroMF/awesome-bluetooth-security321
- https://github.com/engn33r/awesome-bluetooth-security
- https://github.com/sgxgsx/BlueToolkit

View File

@@ -31,6 +31,7 @@ No PoCs from references.
- https://github.com/Rafael-Svechinskaya/IOC_for_CVE-2021-28310
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
- https://github.com/cylaris/awesomekql
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub

View File

@@ -28,6 +28,7 @@ No PoCs from references.
- https://github.com/Threekiii/Awesome-Exploit
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/Tsojan/TsojanScan
- https://github.com/WhooAmii/POC_to_review
- https://github.com/Whoopsunix/nacosScan
- https://github.com/bakery312/Vulhub-Reproduce

View File

@@ -35,6 +35,7 @@ No PoCs from references.
- https://github.com/daedalus/CVE-2021-30461
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/openx-org/BLEN
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
- https://github.com/puckiestyle/CVE-2021-30461
- https://github.com/soosmile/POC
- https://github.com/trhacknon/Pocingit

View File

@@ -30,6 +30,7 @@ No PoCs from references.
- https://github.com/h4ckm310n/Container-Vulnerability-Exploit
- https://github.com/iridium-soda/container-escape-exploits
- https://github.com/kaosagnt/ansible-everyday
- https://github.com/magnologan/awesome-k8s-security
- https://github.com/reni2study/Cloud-Native-Security2
- https://github.com/superfish9/pt
- https://github.com/wllenyj/safe-path-rs

View File

@@ -13,5 +13,5 @@ An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.36. I
- https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1927070
#### Github
No PoCs found on GitHub currently.
- https://github.com/testing-felickz/docker-scout-demo

View File

@@ -14,5 +14,6 @@ Lack of null check while freeing the device information buffer in the Bluetooth
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/sgxgsx/BlueToolkit
- https://github.com/xmpf/qualcomm-bulletins

View File

@@ -16,4 +16,5 @@ There's a flaw in lz4. An attacker who submits a crafted file to an application
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/fkie-cad/nvd-json-data-feeds

View File

@@ -39,6 +39,7 @@ No PoCs from references.
- https://github.com/langligelang/langligelang
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list

24
2021/CVE-2021-3899.md Normal file
View File

@@ -0,0 +1,24 @@
### [CVE-2021-3899](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3899)
![](https://img.shields.io/static/v1?label=Product&message=Apport&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.21.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
### POC
#### Reference
- https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1948376
#### Github
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/WhooAmii/POC_to_review
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/liumuqing/CVE-2021-3899_PoC
- https://github.com/manas3c/CVE-POC
- https://github.com/whoforget/CVE-POC
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve

17
2021/CVE-2021-3942.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2021-3942](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3942)
![](https://img.shields.io/static/v1?label=Product&message=HP%20Print%20products%20and%20Digital%20Sending%20products&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20See%20HP%20Security%20Bulletin%20reference%20for%20affected%20versions.%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Certain HP Print products and Digital Sending products may be vulnerable to potential remote code execution and buffer overflow with use of Link-Local Multicast Name Resolution or LLMNR.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/muchdogesec/cve2stix

View File

@@ -231,6 +231,7 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility.
- https://github.com/darkerego/pwnkit
- https://github.com/deathsticksguy/CEHv12Practical
- https://github.com/defhacks/cve-2021-4034
- https://github.com/dejavudwh/dejavudwh
- https://github.com/deoxykev/CVE-2021-4034-Rust
- https://github.com/drapl0n/pwnKit
- https://github.com/dzonerzy/poc-cve-2021-4034

View File

@@ -13,5 +13,5 @@ An informtion disclosure issue exists in D-LINK-DIR-605 B2 Firmware Version : 2.
- https://www.dlink.com/en/security-bulletin/
#### Github
No PoCs found on GitHub currently.
- https://github.com/Ostorlab/KEV

View File

@@ -248,6 +248,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
- https://github.com/numanturle/CVE-2021-41773
- https://github.com/orangmuda/CVE-2021-41773
- https://github.com/oscpname/OSCP_cheat
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list

View File

@@ -139,6 +139,7 @@ It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was in
- https://github.com/nitishbadole/oscp-note-3
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/oscpname/OSCP_cheat
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list

View File

@@ -9,7 +9,7 @@
### Description
<p>An information disclosure vulnerability manifests when a user or an application uploads unprotected private key data as part of an authentication certificate <a href="https://docs.microsoft.com/en-us/graph/api/resources/keycredential?view=graph-rest-1.0">keyCredential</a> on an Azure AD <a href="https://docs.microsoft.com/en-us/azure/active-directory/develop/app-objects-and-service-principals">Application or Service Principal</a> (which is not recommended). This vulnerability allows a user or service in the tenant with application read access to read the private key data that was added to the application.</p><p>Azure ADaddressed this vulnerability by preventing disclosure of any private keyvalues addedto the application.</p><p>Microsoft has identified services that could manifest this vulnerability, and steps that customers should take to be protected. Refer to the FAQ section for more information.</p><p>For more details on this issue, please refer to the <a href="https://aka.ms/CVE-2021-42306-AAD">MSRC Blog Entry</a>.</p>
An information disclosure vulnerability manifests when a user or an application uploads unprotected private key data as part of an authentication certificate keyCredential on an Azure AD Application or Service Principal (which is not recommended). This vulnerability allows a user or service in the tenant with application read access to read the private key data that was added to the application.Azure ADaddressed this vulnerability by preventing disclosure of any private keyvalues addedto the application.Microsoft has identified services that could manifest this vulnerability, and steps that customers should take to be protected. Refer to the FAQ section for more information.For more details on this issue, please refer to the MSRC Blog Entry.
### POC
@@ -18,5 +18,6 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Azure/Azure-Sentinel-Notebooks
- https://github.com/SummitRoute/csp_security_mistakes

View File

@@ -111,6 +111,7 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver
- https://github.com/nuker/CVE-2021-43798
- https://github.com/openx-org/BLEN
- https://github.com/pedrohavay/exploit-grafana-CVE-2021-43798
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
- https://github.com/persees/grafana_exploits
- https://github.com/rnsss/CVE-2021-43798-poc
- https://github.com/rodpwn/CVE-2021-43798-mass_scanner

View File

@@ -5,7 +5,7 @@
### Description
<p>We have investigated reports of a spoofing vulnerability in AppX installer that affects Microsoft Windows. Microsoft is aware of attacks that attempt to exploit this vulnerability by using specially crafted packages that include the malware family known as Emotet/Trickbot/Bazaloader.</p><p>An attacker could craft a malicious attachment to be used in phishing campaigns. The attacker would then have to convince the user to open the specially crafted attachment. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.</p><p>Please see the <strong>Security Updates</strong> table for the link to the updated app. Alternatively you can download and install the Installer using the links provided in the <strong>FAQ</strong> section.</p><p>Please see the <strong>Mitigations</strong> and <strong>Workaround</strong> sections for important information about steps you can take to protect your system from this vulnerability.</p><p><strong>December 27 2023 Update:</strong></p><p>In recent months, Microsoft Threat Intelligence has seen an increase in activity from threat actors leveraging social engineering and phishing techniques to target Windows OS users and utilizing the <a href="https://learn.microsoft.com/en-us/windows/msix/app-installer/installing-windows10-apps-web">ms-appinstaller URI scheme</a>.</p><p>To address this increase in activity, we have updated the App Installer to disable the ms-appinstaller protocol by default and recommend other potential mitigations.</p>
We have investigated reports of a spoofing vulnerability in AppX installer that affects Microsoft Windows. Microsoft is aware of attacks that attempt to exploit this vulnerability by using specially crafted packages that include the malware family known as Emotet/Trickbot/Bazaloader.An attacker could craft a malicious attachment to be used in phishing campaigns. The attacker would then have to convince the user to open the specially crafted attachment. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.Please see the Security Updates table for the link to the updated app. Alternatively you can download and install the Installer using the links provided in the FAQ section.Please see the Mitigations and Workaround sections for important information about steps you can take to protect your system from this vulnerability.December 27 2023 Update:In recent months, Microsoft Threat Intelligence has seen an increase in activity from threat actors leveraging social engineering and phishing techniques to target Windows OS users and utilizing the ms-appinstaller URI scheme.To address this increase in activity, we have updated the App Installer to disable the ms-appinstaller protocol by default and recommend other potential mitigations.
### POC

View File

@@ -717,6 +717,9 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- https://github.com/defcon250/log4jScanner
- https://github.com/dehlirious/LogIPAnalyzer
- https://github.com/demilson/Log4Shell
- https://github.com/demining/Chinese-version-of-Bitcoin-blockchain-cryptanalysis
- https://github.com/demining/Japanese-version-of-Bitcoin-blockchain-cryptanalysis
- https://github.com/demining/Korean-version-of-Bitcoin-blockchain-cryptanalysis
- https://github.com/demining/Log4j-Vulnerability
- https://github.com/demonrvm/Log4ShellRemediation
- https://github.com/desquezzee/Jpg-Png-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware

View File

@@ -52,6 +52,7 @@ No PoCs from references.
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/openx-org/BLEN
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list

View File

@@ -16,4 +16,5 @@
- https://github.com/ARPSyndicate/cvemon
- https://github.com/GrigGM/05-virt-04-docker-hw
- https://github.com/guyinatuxedo/Beyond_Oblivion
- https://github.com/testing-felickz/docker-scout-demo

View File

@@ -1,6 +1,6 @@
### [CVE-2021-46905](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46905)
![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=92028d7a31e5%3C%205c17cfe155d2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=a462067d7c8e%3C%205871761c5f0f%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description