From bfcf4be43730dcaf02c96fb26b4112143ed03834 Mon Sep 17 00:00:00 2001 From: 0xMarcio Date: Sat, 27 Sep 2025 23:04:15 +0000 Subject: [PATCH] Update CVE sources 2025-09-27 23:04 --- github.txt | 112 +++ references.txt | 2617 ++++++++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 2729 insertions(+) diff --git a/github.txt b/github.txt index 230cc5552a..4013332ed8 100644 --- a/github.txt +++ b/github.txt @@ -361,6 +361,7 @@ CVE-2000-0653 - https://github.com/GuiMatosInfra/explorer2sectool CVE-2000-0653 - https://github.com/xaitax/SploitScan CVE-2000-0673 - https://github.com/beniah2/Nmap-scanning-project CVE-2000-0678 - https://github.com/hannob/pgpbugs +CVE-2000-0697 - https://github.com/ARPSyndicate/cve-scores CVE-2000-0703 - https://github.com/c-skills/CVEs CVE-2000-0709 - https://github.com/adavarski/DevSecOps-pipeline-python CVE-2000-0709 - https://github.com/carlregencia/DevSecOps-pipeline-python @@ -586,6 +587,7 @@ CVE-2001-1228 - https://github.com/ARPSyndicate/cvemon CVE-2001-1228 - https://github.com/ethoxx/noninvasive-oobw-characterization CVE-2001-1228 - https://github.com/hafklin/noninvasive-oobw-characterization CVE-2001-1228 - https://github.com/utwente-scs/divak +CVE-2001-1280 - https://github.com/ARPSyndicate/cve-scores CVE-2001-1325 - https://github.com/GuiMatosInfra/explorer2sectool CVE-2001-1325 - https://github.com/xaitax/SploitScan CVE-2001-1349 - https://github.com/NSzolnoki/CVEPoisonKnowledgebase @@ -1412,6 +1414,7 @@ CVE-2004-1298 - https://github.com/mudongliang/LinuxFlaw CVE-2004-1298 - https://github.com/oneoy/cve- CVE-2004-1299 - https://github.com/mudongliang/LinuxFlaw CVE-2004-1299 - https://github.com/oneoy/cve- +CVE-2004-1306 - https://github.com/ARPSyndicate/cve-scores CVE-2004-1315 - https://github.com/AnyMaster/EQGRP CVE-2004-1315 - https://github.com/Badbug6/EQGRP CVE-2004-1315 - https://github.com/CKmaenn/EQGRP @@ -2311,6 +2314,7 @@ CVE-2006-5779 - https://github.com/man151098/dagda CVE-2006-5815 - https://github.com/RanDomGuY84/OIBSIP CVE-2006-5815 - https://github.com/mudongliang/LinuxFlaw CVE-2006-5815 - https://github.com/oneoy/cve- +CVE-2006-5820 - https://github.com/ARPSyndicate/cve-scores CVE-2006-5857 - https://github.com/0xCyberY/CVE-T4PDF CVE-2006-5857 - https://github.com/ARPSyndicate/cvemon CVE-2006-6059 - https://github.com/0xd012/wifuzzit @@ -2400,6 +2404,7 @@ CVE-2007-0430 - https://github.com/risesecurity/vulnerabilities CVE-2007-0430 - https://github.com/swarna1010/Vulnerabilities CVE-2007-0450 - https://github.com/ActualSalt/Capstone-Red-vs-Blue-CySec-Report CVE-2007-0450 - https://github.com/MinYoungLeeDev/Capstone-Red-vs-Blue-CySec-Report +CVE-2007-0504 - https://github.com/ARPSyndicate/cve-scores CVE-2007-0626 - https://github.com/sebcat/yans CVE-2007-0750 - https://github.com/0xCyberY/CVE-T4PDF CVE-2007-0750 - https://github.com/ARPSyndicate/cvemon @@ -2702,6 +2707,7 @@ CVE-2007-2768 - https://github.com/phx/cvescan CVE-2007-2768 - https://github.com/siddicky/git-and-crumpets CVE-2007-2768 - https://github.com/vshaliii/DC-4-Vulnhub-Walkthrough CVE-2007-2772 - https://github.com/shirkdog/exploits +CVE-2007-2788 - https://github.com/ARPSyndicate/cve-scores CVE-2007-2821 - https://github.com/llouks/cst312 CVE-2007-2872 - https://github.com/mudongliang/LinuxFlaw CVE-2007-2872 - https://github.com/oneoy/cve- @@ -2930,6 +2936,7 @@ CVE-2007-5659 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detec CVE-2007-5659 - https://github.com/todb-cisa/kev-cwes CVE-2007-5663 - https://github.com/0xCyberY/CVE-T4PDF CVE-2007-5663 - https://github.com/ARPSyndicate/cvemon +CVE-2007-5686 - https://github.com/ARPSyndicate/cve-scores CVE-2007-5686 - https://github.com/ARPSyndicate/cvemon CVE-2007-5686 - https://github.com/Dalifo/wik-dvs-tp02 CVE-2007-5686 - https://github.com/Dariani223/DevOpsFinal @@ -6087,6 +6094,7 @@ CVE-2010-1241 - https://github.com/ARPSyndicate/cvemon CVE-2010-1242 - https://github.com/shameekASC5/AdobePDF CVE-2010-1256 - https://github.com/Romulus968/copycat CVE-2010-1256 - https://github.com/dominicporter/shodan-playing +CVE-2010-1280 - https://github.com/ARPSyndicate/cve-scores CVE-2010-1280 - https://github.com/Live-Hack-CVE/CVE-2010-1280 CVE-2010-1281 - https://github.com/Live-Hack-CVE/CVE-2010-1281 CVE-2010-1295 - https://github.com/0xCyberY/CVE-T4PDF @@ -14721,6 +14729,7 @@ CVE-2014-0160 - https://github.com/ozkanbilge/Payloads CVE-2014-0160 - https://github.com/paolokalvo/Ferramentas-Cyber-Security CVE-2014-0160 - https://github.com/parveshkatoch/Penetration-Testing CVE-2014-0160 - https://github.com/pashicop/3.9_1 +CVE-2014-0160 - https://github.com/passionate-dev219/CyberSecurity CVE-2014-0160 - https://github.com/patricia-gallardo/insecure-cplusplus-dojo CVE-2014-0160 - https://github.com/paultheal1en/auto_pen_bench_web CVE-2014-0160 - https://github.com/paulveillard/cybersecurity @@ -17728,6 +17737,7 @@ CVE-2014-6271 - https://github.com/pacopeng/paco-acs-demo CVE-2014-6271 - https://github.com/paolokalvo/Ferramentas-Cyber-Security CVE-2014-6271 - https://github.com/parth45/cheatsheet CVE-2014-6271 - https://github.com/parveshkatoch/Penetration-Testing +CVE-2014-6271 - https://github.com/passionate-dev219/CyberSecurity CVE-2014-6271 - https://github.com/paulveillard/cybersecurity CVE-2014-6271 - https://github.com/paulveillard/cybersecurity-ethical-hacking CVE-2014-6271 - https://github.com/paulveillard/cybersecurity-hacking @@ -24881,6 +24891,7 @@ CVE-2016-0728 - https://github.com/zyjsuper/linux-kernel-exploits CVE-2016-0729 - https://github.com/mrash/afl-cve CVE-2016-0733 - https://github.com/ARPSyndicate/cvemon CVE-2016-0734 - https://github.com/ARPSyndicate/cvemon +CVE-2016-0736 - https://github.com/ARPSyndicate/cve-scores CVE-2016-0736 - https://github.com/ARPSyndicate/cvemon CVE-2016-0736 - https://github.com/NeoOniX/5ATTACK CVE-2016-0736 - https://github.com/firatesatoglu/shodanSearch @@ -27739,6 +27750,7 @@ CVE-2016-2144 - https://github.com/Live-Hack-CVE/CVE-2016-2144 CVE-2016-2147 - https://github.com/ARPSyndicate/cvemon CVE-2016-2148 - https://github.com/jgsqware/clairctl CVE-2016-2148 - https://github.com/okostine-panw/pc_scripts +CVE-2016-2161 - https://github.com/ARPSyndicate/cve-scores CVE-2016-2161 - https://github.com/ARPSyndicate/cvemon CVE-2016-2161 - https://github.com/NeoOniX/5ATTACK CVE-2016-2161 - https://github.com/firatesatoglu/shodanSearch @@ -28639,6 +28651,7 @@ CVE-2016-3203 - https://github.com/ARPSyndicate/cvemon CVE-2016-3207 - https://github.com/hwiwonl/dayone CVE-2016-3210 - https://github.com/ARPSyndicate/cvemon CVE-2016-3210 - https://github.com/DaramG/IS571-ACSP-Fall-2018 +CVE-2016-3212 - https://github.com/ARPSyndicate/cve-scores CVE-2016-3212 - https://github.com/ARPSyndicate/cvemon CVE-2016-3212 - https://github.com/GULJAR-E-MOSTAFA/XSS CVE-2016-3212 - https://github.com/H4Bittle/payloads_copied @@ -30877,6 +30890,7 @@ CVE-2016-4971 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 CVE-2016-4974 - https://github.com/ARPSyndicate/cvemon CVE-2016-4974 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs CVE-2016-4975 - https://github.com/8ctorres/SIND-Practicas +CVE-2016-4975 - https://github.com/ARPSyndicate/cve-scores CVE-2016-4975 - https://github.com/ARPSyndicate/cvemon CVE-2016-4975 - https://github.com/ARPSyndicate/kenzer-templates CVE-2016-4975 - https://github.com/DButter/whitehat_public @@ -41514,6 +41528,7 @@ CVE-2017-16905 - https://github.com/plancoo/Bugbounty_Writeups CVE-2017-16905 - https://github.com/sreechws/Bou_Bounty_Writeups CVE-2017-16905 - https://github.com/webexplo1t/BugBounty CVE-2017-16905 - https://github.com/xbl3/Awesome-Bugbounty-Writeups_devanshbatham +CVE-2017-16911 - https://github.com/ARPSyndicate/cve-scores CVE-2017-16921 - https://github.com/ARPSyndicate/cvemon CVE-2017-16931 - https://github.com/ARPSyndicate/cvemon CVE-2017-16932 - https://github.com/vincent-deng/veracode-container-security-finding-parser @@ -45844,6 +45859,7 @@ CVE-2017-6884 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detec CVE-2017-6884 - https://github.com/oxMdee/Cybersecurity-Vulnerability-and-Exposure-Report CVE-2017-6888 - https://github.com/ARPSyndicate/cvemon CVE-2017-6888 - https://github.com/andir/nixos-issue-db-example +CVE-2017-6891 - https://github.com/ARPSyndicate/cve-scores CVE-2017-6891 - https://github.com/ARPSyndicate/cvemon CVE-2017-6892 - https://github.com/ARPSyndicate/cvemon CVE-2017-6892 - https://github.com/VGExplainer/VGExplainer @@ -50078,6 +50094,7 @@ CVE-2018-0304 - https://github.com/ARPSyndicate/cvemon CVE-2018-0304 - https://github.com/ferdinandmudjialim/metasploit-cve-search CVE-2018-0304 - https://github.com/tunnelcat/metasploit-cve-search CVE-2018-0324 - https://github.com/s-index/dora +CVE-2018-0360 - https://github.com/ARPSyndicate/cve-scores CVE-2018-0477 - https://github.com/lucabrasi83/vscan CVE-2018-0481 - https://github.com/lucabrasi83/vscan CVE-2018-0487 - https://github.com/PS-RANASINGHE/Crypto-Ex---7 @@ -61408,6 +61425,12 @@ CVE-2018-5783 - https://github.com/wcventure/MemLock_Benchmark CVE-2018-5784 - https://github.com/andir/nixos-issue-db-example CVE-2018-5785 - https://github.com/andir/nixos-issue-db-example CVE-2018-5786 - https://github.com/ARPSyndicate/cvemon +CVE-2018-5805 - https://github.com/ARPSyndicate/cve-scores +CVE-2018-5806 - https://github.com/ARPSyndicate/cve-scores +CVE-2018-5809 - https://github.com/ARPSyndicate/cve-scores +CVE-2018-5811 - https://github.com/ARPSyndicate/cve-scores +CVE-2018-5813 - https://github.com/ARPSyndicate/cve-scores +CVE-2018-5814 - https://github.com/ARPSyndicate/cve-scores CVE-2018-5818 - https://github.com/ARPSyndicate/cvemon CVE-2018-5819 - https://github.com/ARPSyndicate/cvemon CVE-2018-5820 - https://github.com/ARPSyndicate/cvemon @@ -63620,6 +63643,7 @@ CVE-2018-8128 - https://github.com/ARPSyndicate/cvemon CVE-2018-8128 - https://github.com/lnick2023/nicenice CVE-2018-8128 - https://github.com/qazbnm456/awesome-cve-poc CVE-2018-8128 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 +CVE-2018-8133 - https://github.com/ARPSyndicate/cve-scores CVE-2018-8134 - https://github.com/punishell/WindowsLegacyCVE CVE-2018-8137 - https://github.com/ARPSyndicate/cvemon CVE-2018-8137 - https://github.com/lnick2023/nicenice @@ -64261,6 +64285,7 @@ CVE-2018-8527 - https://github.com/ARPSyndicate/cvemon CVE-2018-8527 - https://github.com/lnick2023/nicenice CVE-2018-8527 - https://github.com/qazbnm456/awesome-cve-poc CVE-2018-8527 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 +CVE-2018-8529 - https://github.com/ARPSyndicate/cve-scores CVE-2018-8532 - https://github.com/ARPSyndicate/cvemon CVE-2018-8532 - https://github.com/lnick2023/nicenice CVE-2018-8532 - https://github.com/qazbnm456/awesome-cve-poc @@ -70771,6 +70796,7 @@ CVE-2019-11358 - https://github.com/Jumblebadge/Ftc-team-19823-2022 CVE-2019-11358 - https://github.com/Jumblebadge/Ftc-team-19823-2023 CVE-2019-11358 - https://github.com/Jumblebadge/Ftc-team-19823-2024 CVE-2019-11358 - https://github.com/Jumpypants/FtcRobotController2 +CVE-2019-11358 - https://github.com/Jumpypants/FtcRobotControllerTesting CVE-2019-11358 - https://github.com/Jumpypants/Inferno26 CVE-2019-11358 - https://github.com/JustAnothrPerson/FTCCODE CVE-2019-11358 - https://github.com/JustDimish/FtcRobotController_DimashBaimakhan @@ -71144,6 +71170,7 @@ CVE-2019-11358 - https://github.com/MostlyOperational18119/FreightFrenzy-OpenCV CVE-2019-11358 - https://github.com/MostlyOperational18119/Mostly-Operational-Center-Stage CVE-2019-11358 - https://github.com/MostlyOperational18119/Mostly-Operational-Into-the-Deep CVE-2019-11358 - https://github.com/MostlyOperational18119/Mostly-Operational-Power-Play +CVE-2019-11358 - https://github.com/MostlyOperational18119/Mostly-Operational-Spring-Repository-2025 CVE-2019-11358 - https://github.com/MostlyOperational18119/Mostly-Operational-Summer-Repository CVE-2019-11358 - https://github.com/MostlyOperational18119/Mostly-Operational-Summer-Repository-2023 CVE-2019-11358 - https://github.com/MostlyOperational18119/Mostly-Operational-Summer-Repository-2024 @@ -72419,6 +72446,7 @@ CVE-2019-11358 - https://github.com/Vault-FTC/MgCode2 CVE-2019-11358 - https://github.com/Vault-FTC/MoleMotion CVE-2019-11358 - https://github.com/Vector5233/UltimateGoal2 CVE-2019-11358 - https://github.com/VedaantAdavi/inferno22 +CVE-2019-11358 - https://github.com/VedaantAdavi/inferno26 CVE-2019-11358 - https://github.com/Vedant-Mohapatra/FTC2024 CVE-2019-11358 - https://github.com/Veogner/NEPSRO CVE-2019-11358 - https://github.com/VergeRoboticsFTC-23250/CenterstageCode @@ -72733,6 +72761,7 @@ CVE-2019-11358 - https://github.com/ad25343/LR_FTC_2025_2026 CVE-2019-11358 - https://github.com/adam-the-student/FTC_code_repo CVE-2019-11358 - https://github.com/adam-the-student/MoiCenterStage CVE-2019-11358 - https://github.com/adambiscoe/CENTERSTAGE_9990 +CVE-2019-11358 - https://github.com/adampagot/ftc-11691-decode CVE-2019-11358 - https://github.com/adeelmalik78/FTC_CyberSalam_Autonomous CVE-2019-11358 - https://github.com/adeelmalik78/FTC_CyberSalam_TeleOp CVE-2019-11358 - https://github.com/adevine22/FtcRobotController-10237 @@ -75023,6 +75052,7 @@ CVE-2019-11358 - https://github.com/wataugarobotics/Team5881_2020-2021 CVE-2019-11358 - https://github.com/wataugarobotics/Tungsteel_FreightFrenzy CVE-2019-11358 - https://github.com/watkinsbr27/FTCRobot CVE-2019-11358 - https://github.com/watsh-rajneesh/ultimategoal2020 +CVE-2019-11358 - https://github.com/wbaranano/Metal-Pipe-2025-2026 CVE-2019-11358 - https://github.com/wccarobotics/ftc-decode CVE-2019-11358 - https://github.com/wctran60/Cardinal_Coders_1 CVE-2019-11358 - https://github.com/wctran60/HomePowerPlay9 @@ -80104,6 +80134,7 @@ CVE-2019-16634 - https://github.com/retr0-13/Linux-Privilege-Escalation-Basics CVE-2019-1666 - https://github.com/ExpLangcn/FuYao-Go CVE-2019-1666 - https://github.com/fab1ano/rconfig-cves CVE-2019-16662 - https://github.com/0xT11/CVE-POC +CVE-2019-16662 - https://github.com/ARPSyndicate/cve-scores CVE-2019-16662 - https://github.com/ARPSyndicate/cvemon CVE-2019-16662 - https://github.com/ARPSyndicate/kenzer-templates CVE-2019-16662 - https://github.com/DrAmmarMoustafa/CHASE-LB-Container-IDS-Dataset @@ -88171,6 +88202,7 @@ CVE-2019-9673 - https://github.com/developer3000S/PoC-in-GitHub CVE-2019-9673 - https://github.com/hectorgie/PoC-in-GitHub CVE-2019-9673 - https://github.com/mgrube/CVE-2019-9673 CVE-2019-9674 - https://github.com/ARPSyndicate/cvemon +CVE-2019-9692 - https://github.com/ARPSyndicate/cve-scores CVE-2019-9692 - https://github.com/ARPSyndicate/cvemon CVE-2019-9692 - https://github.com/certimetergroup/metasploit-modules CVE-2019-9704 - https://github.com/devmatic-it/debcvescan @@ -94233,6 +94265,7 @@ CVE-2020-12478 - https://github.com/anonymous364872/Rapier_Tool CVE-2020-12478 - https://github.com/apif-review/APIF_tool_2024 CVE-2020-12478 - https://github.com/youcans896768/APIV_Tool CVE-2020-12480 - https://github.com/ARPSyndicate/cvemon +CVE-2020-12497 - https://github.com/ARPSyndicate/cve-scores CVE-2020-1250 - https://github.com/404notf0und/CVE-Flow CVE-2020-12500 - https://github.com/ARPSyndicate/cvemon CVE-2020-12503 - https://github.com/ARPSyndicate/cvemon @@ -97682,7 +97715,9 @@ CVE-2020-14980 - https://github.com/Live-Hack-CVE/CVE-2020-14980 CVE-2020-14981 - https://github.com/Live-Hack-CVE/CVE-2020-14981 CVE-2020-14983 - https://github.com/Live-Hack-CVE/CVE-2020-14983 CVE-2020-14983 - https://github.com/mmmds/sif +CVE-2020-14987 - https://github.com/ARPSyndicate/cve-scores CVE-2020-14990 - https://github.com/Daniel-itsec/AdvancedSystemCare +CVE-2020-14993 - https://github.com/ARPSyndicate/cve-scores CVE-2020-14993 - https://github.com/peanuts62/IOT_CVE CVE-2020-15002 - https://github.com/ARPSyndicate/cvemon CVE-2020-15002 - https://github.com/developer3000S/PoC-in-GitHub @@ -97709,9 +97744,12 @@ CVE-2020-15048 - https://github.com/0xor0ne/awesome-list CVE-2020-15048 - https://github.com/Jalexander798/JA_Tools-Cybersecurity-Resource-2 CVE-2020-15048 - https://github.com/alphaSeclab/sec-daily-2020 CVE-2020-15048 - https://github.com/bachkhoasoft/awesome-list-ks +CVE-2020-15049 - https://github.com/ARPSyndicate/cve-scores CVE-2020-15049 - https://github.com/ARPSyndicate/cvemon +CVE-2020-15050 - https://github.com/ARPSyndicate/cve-scores CVE-2020-15050 - https://github.com/ARPSyndicate/kenzer-templates CVE-2020-15051 - https://github.com/0xT11/CVE-POC +CVE-2020-15051 - https://github.com/ARPSyndicate/cve-scores CVE-2020-15051 - https://github.com/ARPSyndicate/cvemon CVE-2020-15051 - https://github.com/developer3000S/PoC-in-GitHub CVE-2020-15051 - https://github.com/hectorgie/PoC-in-GitHub @@ -97733,6 +97771,7 @@ CVE-2020-15053 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2020-15053 - https://github.com/pratikshad19/CVE-2020-15053 CVE-2020-15053 - https://github.com/soosmile/POC CVE-2020-1506 - https://github.com/404notf0und/CVE-Flow +CVE-2020-15069 - https://github.com/ARPSyndicate/cve-scores CVE-2020-15069 - https://github.com/packetinside/CISA_BOT CVE-2020-1507 - https://github.com/404notf0und/CVE-Flow CVE-2020-15077 - https://github.com/Live-Hack-CVE/CVE-2020-36382 @@ -105749,6 +105788,7 @@ CVE-2020-3505 - https://github.com/s-index/dora CVE-2020-35124 - https://github.com/nvn1729/advisories CVE-2020-35125 - https://github.com/nvn1729/advisories CVE-2020-35131 - https://github.com/ARPSyndicate/cve-scores +CVE-2020-35136 - https://github.com/ARPSyndicate/cve-scores CVE-2020-35136 - https://github.com/Live-Hack-CVE/CVE-2020-35136 CVE-2020-35151 - https://github.com/ARPSyndicate/cvemon CVE-2020-35151 - https://github.com/fab1ano/omrs-cve @@ -114079,6 +114119,7 @@ CVE-2021-20016 - https://github.com/Ostorlab/KEV CVE-2021-20016 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors CVE-2021-20016 - https://github.com/r0eXpeR/supplier CVE-2021-20016 - https://github.com/triw0lf/Security-Matters-22 +CVE-2021-20021 - https://github.com/ARPSyndicate/cve-scores CVE-2021-20021 - https://github.com/CVEDB/awesome-cve-repo CVE-2021-20021 - https://github.com/Ostorlab/KEV CVE-2021-20021 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors @@ -133375,6 +133416,7 @@ CVE-2021-41773 - https://github.com/GibzB/THM-Captured-Rooms CVE-2021-41773 - https://github.com/H0j3n/EzpzCheatSheet CVE-2021-41773 - https://github.com/H0j3n/EzpzShell CVE-2021-41773 - https://github.com/H4cking2theGate/TraversalHunter +CVE-2021-41773 - https://github.com/HITOUBEN/MSPR3 CVE-2021-41773 - https://github.com/HK4040/ssh_bootcamp CVE-2021-41773 - https://github.com/Habib0x0/CVE-2021-41773 CVE-2021-41773 - https://github.com/Hattan-515/POC-CVE-2021-41773 @@ -136655,6 +136697,7 @@ CVE-2021-44228 - https://github.com/KONNEKTIO/konnekt-docs CVE-2021-44228 - https://github.com/KRookieSec/WebSecurityStudy CVE-2021-44228 - https://github.com/Kadantte/CVE-2021-44228-poc CVE-2021-44228 - https://github.com/KainsRache/anti-jndi +CVE-2021-44228 - https://github.com/KamalideenAK/Microsoft-Defender-for-Endpoint-Deployment-on-Windows-10-11-device CVE-2021-44228 - https://github.com/KatsutoshiOtogawa/log4j2_exploit CVE-2021-44228 - https://github.com/KayCHENvip/vulnerability-poc CVE-2021-44228 - https://github.com/KeysAU/Get-log4j-Windows-local @@ -137221,6 +137264,7 @@ CVE-2021-44228 - https://github.com/cuclizihan/group_wuhuangwansui CVE-2021-44228 - https://github.com/cuijiung/log4j-CVE-2021-44228 CVE-2021-44228 - https://github.com/cuongvdvmo/gbizconnect-node CVE-2021-44228 - https://github.com/curated-intel/Log4Shell-IOCs +CVE-2021-44228 - https://github.com/cyb0rgdoll/wslkalisetup CVE-2021-44228 - https://github.com/cyb3rpeace/log4j-scan CVE-2021-44228 - https://github.com/cyberanand1337x/bug-bounty-2022 CVE-2021-44228 - https://github.com/cyberleelawat/LeelawatX-CVE-Hunter @@ -140293,6 +140337,7 @@ CVE-2021-47156 - https://github.com/NaInSec/CVE-LIST CVE-2021-47157 - https://github.com/NaInSec/CVE-LIST CVE-2021-47178 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2021-47179 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2021-47515 - https://github.com/ARPSyndicate/cve-scores CVE-2021-47560 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2021-47561 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2021-47562 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -155276,6 +155321,7 @@ CVE-2022-29978 - https://github.com/ARPSyndicate/cvemon CVE-2022-29978 - https://github.com/peng-hui/CarpetFuzz CVE-2022-29978 - https://github.com/waugustus/CarpetFuzz CVE-2022-29978 - https://github.com/waugustus/waugustus +CVE-2022-2998 - https://github.com/ARPSyndicate/cve-scores CVE-2022-30006 - https://github.com/ComparedArray/printix-CVE-2022-30006 CVE-2022-30006 - https://github.com/NaInSec/CVE-PoC-in-GitHub CVE-2022-30006 - https://github.com/WhooAmii/POC_to_review @@ -159013,6 +159059,7 @@ CVE-2022-35213 - https://github.com/Xeus-Territory/Robust_Scanner CVE-2022-35213 - https://github.com/Xeus-Territory/robust_scanner CVE-2022-35213 - https://github.com/cuhk-seclab/TChecker CVE-2022-35213 - https://github.com/wouops/Robbr +CVE-2022-3523 - https://github.com/ARPSyndicate/cve-scores CVE-2022-35252 - https://github.com/ARPSyndicate/cvemon CVE-2022-35252 - https://github.com/JtMotoX/docker-trivy CVE-2022-35252 - https://github.com/a23au/awe-base-images @@ -159058,6 +159105,7 @@ CVE-2022-35411 - https://github.com/Mr-Tree-S/POC_EXP CVE-2022-35411 - https://github.com/battleofthebots/system-gateway CVE-2022-35411 - https://github.com/ehtec/rpcpy-exploit CVE-2022-35411 - https://github.com/fuzzlove/CVE-2022-35411 +CVE-2022-35413 - https://github.com/ARPSyndicate/cve-scores CVE-2022-35413 - https://github.com/ARPSyndicate/cvemon CVE-2022-35413 - https://github.com/ARPSyndicate/kenzer-templates CVE-2022-35413 - https://github.com/StarCrossPortal/scalpel @@ -160550,6 +160598,7 @@ CVE-2022-37955 - https://github.com/puckiestyle/SeManageVolumeExploit CVE-2022-37957 - https://github.com/ARPSyndicate/cvemon CVE-2022-37959 - https://github.com/ARPSyndicate/cvemon CVE-2022-37959 - https://github.com/FelixMartel/FelixMartel +CVE-2022-37961 - https://github.com/ARPSyndicate/cve-scores CVE-2022-37964 - https://github.com/ARPSyndicate/cvemon CVE-2022-37966 - https://github.com/ARPSyndicate/cvemon CVE-2022-37966 - https://github.com/sujjanth/cve-api @@ -160771,6 +160820,7 @@ CVE-2022-38533 - https://github.com/ARPSyndicate/cvemon CVE-2022-38533 - https://github.com/fokypoky/places-list CVE-2022-38547 - https://github.com/karimhabush/cyberowl CVE-2022-38553 - https://github.com/4websecurity/CVE-2022-38553 +CVE-2022-38553 - https://github.com/ARPSyndicate/cve-scores CVE-2022-38553 - https://github.com/ARPSyndicate/cvemon CVE-2022-38553 - https://github.com/ARPSyndicate/kenzer-templates CVE-2022-38553 - https://github.com/Henry4E36/POCS @@ -161016,6 +161066,7 @@ CVE-2022-38829 - https://github.com/ARPSyndicate/cvemon CVE-2022-38829 - https://github.com/whiter6666/CVE CVE-2022-38830 - https://github.com/ARPSyndicate/cvemon CVE-2022-38830 - https://github.com/whiter6666/CVE +CVE-2022-38840 - https://github.com/ARPSyndicate/cve-scores CVE-2022-38841 - https://github.com/attilaszia/linux-iot-cves CVE-2022-3885 - https://github.com/ARPSyndicate/cvemon CVE-2022-38870 - https://github.com/ARPSyndicate/cvemon @@ -165463,7 +165514,9 @@ CVE-2022-4899 - https://github.com/kholia/chisel-examples CVE-2022-4899 - https://github.com/marklogic/marklogic-kubernetes CVE-2022-4899 - https://github.com/mmbazm/secure_license_server CVE-2022-4899 - https://github.com/seal-community/patches +CVE-2022-48997 - https://github.com/ARPSyndicate/cve-scores CVE-2022-4901 - https://github.com/scopas1293/SophosConnectUpgradeScript +CVE-2022-49028 - https://github.com/ARPSyndicate/cve-scores CVE-2022-49038 - https://github.com/chnzzh/OpenSSL-CVE-lib CVE-2022-4904 - https://github.com/seal-community/patches CVE-2022-49043 - https://github.com/adegoodyer/kubernetes-admin-toolkit @@ -166087,6 +166140,7 @@ CVE-2023-0578 - https://github.com/karimhabush/cyberowl CVE-2023-0585 - https://github.com/ARPSyndicate/cvemon CVE-2023-0586 - https://github.com/ARPSyndicate/cvemon CVE-2023-0590 - https://github.com/xairy/linux-kernel-exploitation +CVE-2023-0597 - https://github.com/ARPSyndicate/cve-scores CVE-2023-0597 - https://github.com/lrh2000/StackRot CVE-2023-0597 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-0600 - https://github.com/truocphan/VulnBox @@ -166338,6 +166392,8 @@ CVE-2023-1049 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-1057 - https://github.com/10cksYiqiyinHangzhouTechnology/10cksYiqiyinHangzhouTechnology CVE-2023-1057 - https://github.com/ARPSyndicate/cvemon CVE-2023-10608 - https://github.com/abrahim7112/Vulnerability-checking-program-for-Android +CVE-2023-1074 - https://github.com/ARPSyndicate/cve-scores +CVE-2023-1076 - https://github.com/ARPSyndicate/cve-scores CVE-2023-1077 - https://github.com/RenukaSelvar/kernel_rt_CVE_2023_1077 CVE-2023-1080 - https://github.com/ARPSyndicate/cvemon CVE-2023-1091 - https://github.com/karimhabush/cyberowl @@ -168908,6 +168964,7 @@ CVE-2023-23051 - https://github.com/Marsman1996/pocs CVE-2023-23052 - https://github.com/Marsman1996/pocs CVE-2023-23053 - https://github.com/Marsman1996/pocs CVE-2023-23054 - https://github.com/Marsman1996/pocs +CVE-2023-23063 - https://github.com/ARPSyndicate/cve-scores CVE-2023-23080 - https://github.com/ARPSyndicate/cvemon CVE-2023-23080 - https://github.com/fxc233/iot-vul CVE-2023-23082 - https://github.com/dhje0ng/dhje0ng @@ -173085,6 +173142,7 @@ CVE-2023-31434 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-31434 - https://github.com/trustcves/CVE-2023-31434 CVE-2023-31435 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-31435 - https://github.com/trustcves/CVE-2023-31435 +CVE-2023-31437 - https://github.com/ARPSyndicate/cve-scores CVE-2023-31437 - https://github.com/Dariani223/DevOpsFinal CVE-2023-31437 - https://github.com/Giovanni26101982/Grupo4_Docker_Tarea3 CVE-2023-31437 - https://github.com/GrigGM/05-virt-04-docker-hw @@ -173097,6 +173155,7 @@ CVE-2023-31437 - https://github.com/ardhiatno/ubimicro-fluentbit CVE-2023-31437 - https://github.com/fokypoky/places-list CVE-2023-31437 - https://github.com/kastel-security/Journald CVE-2023-31437 - https://github.com/mmbazm/secure_license_server +CVE-2023-31438 - https://github.com/ARPSyndicate/cve-scores CVE-2023-31438 - https://github.com/Dariani223/DevOpsFinal CVE-2023-31438 - https://github.com/Giovanni26101982/Grupo4_Docker_Tarea3 CVE-2023-31438 - https://github.com/GrigGM/05-virt-04-docker-hw @@ -173110,6 +173169,7 @@ CVE-2023-31438 - https://github.com/edemirtoldo/diferentes-formas-criar-imagens- CVE-2023-31438 - https://github.com/fokypoky/places-list CVE-2023-31438 - https://github.com/kastel-security/Journald CVE-2023-31438 - https://github.com/mmbazm/secure_license_server +CVE-2023-31439 - https://github.com/ARPSyndicate/cve-scores CVE-2023-31439 - https://github.com/Dariani223/DevOpsFinal CVE-2023-31439 - https://github.com/Giovanni26101982/Grupo4_Docker_Tarea3 CVE-2023-31439 - https://github.com/GrigGM/05-virt-04-docker-hw @@ -176476,6 +176536,7 @@ CVE-2023-38408 - https://github.com/0xor0ne/awesome-list CVE-2023-38408 - https://github.com/5thphlame/Free-Rooms-TryHackMe CVE-2023-38408 - https://github.com/ARESHAmohanad/THM CVE-2023-38408 - https://github.com/ARESHAmohanad/tryhackme +CVE-2023-38408 - https://github.com/Adel2411/cve-2023-38408 CVE-2023-38408 - https://github.com/Adel2411/cyber-combat CVE-2023-38408 - https://github.com/Aijoo100/Aijoo100 CVE-2023-38408 - https://github.com/AlienTec1908/Magifi_HackMyVM_Hard @@ -177096,6 +177157,7 @@ CVE-2023-39185 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-39186 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-39187 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-39188 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-39191 - https://github.com/ARPSyndicate/cve-scores CVE-2023-39194 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-39196 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-39209 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -177864,6 +177926,7 @@ CVE-2023-40324 - https://github.com/jev770/badmoodle-scan CVE-2023-40325 - https://github.com/jev770/badmoodle-scan CVE-2023-40335 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-4035 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-40355 - https://github.com/ARPSyndicate/cve-scores CVE-2023-40355 - https://github.com/ace-83/CVE-2023-40355 CVE-2023-40355 - https://github.com/plzheheplztrying/cve_monitor CVE-2023-4036 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -181000,6 +181063,7 @@ CVE-2023-46724 - https://github.com/chnzzh/OpenSSL-CVE-lib CVE-2023-46724 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-46728 - https://github.com/MegaManSec/Squid-Security-Audit CVE-2023-46728 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-46728 - https://github.com/w4zu/Debian_security CVE-2023-46729 - https://github.com/aszx87410/blog CVE-2023-46729 - https://github.com/tanjiti/sec_profile CVE-2023-46747 - https://github.com/0day404/HV-2024-POC @@ -183616,6 +183680,7 @@ CVE-2023-52629 - https://github.com/bygregonline/devsec-fastapi-report CVE-2023-52654 - https://github.com/FoxyProxys/CVE-2023-52654 CVE-2023-52709 - https://github.com/KevinMitchell-OSWP-CISSP/CVE-2023-52709-PoC CVE-2023-52729 - https://github.com/Halcy0nic/Trophies +CVE-2023-52735 - https://github.com/ARPSyndicate/cve-scores CVE-2023-52751 - https://github.com/bygregonline/devsec-fastapi-report CVE-2023-52751 - https://github.com/robertsirc/sle-bci-demo CVE-2023-52756 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -183930,6 +183995,7 @@ CVE-2023-5815 - https://github.com/codeb0ss/CVE-2023-5815-PoC CVE-2023-5823 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-5824 - https://github.com/MegaManSec/Squid-Security-Audit CVE-2023-5824 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-5824 - https://github.com/w4zu/Debian_security CVE-2023-5825 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-5831 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-5832 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -191323,6 +191389,7 @@ CVE-2024-13036 - https://github.com/cnetsec/south-america-cve-hall CVE-2024-1304 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1304 - https://github.com/guillermogm4/CVE-2024-1304---Badgermeter-moni-tool-Reflected-Cross-Site-Scripting-XSS CVE-2024-1304 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-13050 - https://github.com/ARPSyndicate/cve-scores CVE-2024-13054 - https://github.com/Sim4n6/Sim4n6 CVE-2024-1306 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1307 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -191632,6 +191699,7 @@ CVE-2024-1673 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1674 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1675 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1676 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-1681 - https://github.com/ARPSyndicate/cve-scores CVE-2024-1682 - https://github.com/Gauravbhatia1211/portfolio CVE-2024-1683 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1685 - https://github.com/NaInSec/CVE-LIST @@ -201736,6 +201804,7 @@ CVE-2024-34145 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-34146 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-34147 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-34148 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-34155 - https://github.com/ARPSyndicate/cve-scores CVE-2024-34155 - https://github.com/adegoodyer/kubernetes-admin-toolkit CVE-2024-34155 - https://github.com/kaisensan/desafio-girus-pick CVE-2024-34156 - https://github.com/NishantPuri99/panic-at-the-gob-decoder @@ -203159,6 +203228,7 @@ CVE-2024-38395 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-38395 - https://github.com/vin01/poc-cve-2024-38396 CVE-2024-38396 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-38396 - https://github.com/vin01/poc-cve-2024-38396 +CVE-2024-38399 - https://github.com/ARPSyndicate/cve-scores CVE-2024-38399 - https://github.com/Shreyas-Penkar/CVE-2024-38399 CVE-2024-3840 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-38402 - https://github.com/xairy/linux-kernel-exploitation @@ -203351,6 +203421,7 @@ CVE-2024-38816 - https://github.com/plbplbp/loudong001 CVE-2024-38816 - https://github.com/plzheheplztrying/cve_monitor CVE-2024-38816 - https://github.com/startsw1th/cve-2024-38816-demo CVE-2024-38816 - https://github.com/swarathesh/AI-Experts +CVE-2024-38816 - https://github.com/tanjiti/sec_profile CVE-2024-38816 - https://github.com/wdragondragon/spring-framework CVE-2024-38819 - https://github.com/GhostS3c/CVE-2024-38819 CVE-2024-38819 - https://github.com/J1ezds/Vulnerability-Wiki-page @@ -204835,12 +204906,14 @@ CVE-2024-4257 - https://github.com/wy876/wiki CVE-2024-42587 - https://github.com/VulnSphere/LLMVulnSphere CVE-2024-42588 - https://github.com/VulnSphere/LLMVulnSphere CVE-2024-4263 - https://github.com/IES-Rafael-Alberti/Proyecto1_CybersecurityConsulting +CVE-2024-42633 - https://github.com/ARPSyndicate/cve-scores CVE-2024-42640 - https://github.com/KTN1990/CVE-2024-42640 CVE-2024-42640 - https://github.com/rvizx/CVE-2024-42640 CVE-2024-42642 - https://github.com/VL4DR/CVE-2024-42642 CVE-2024-4265 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-42657 - https://github.com/baroi-ai/CVE-2024-42657 CVE-2024-42657 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-42658 - https://github.com/ARPSyndicate/cve-scores CVE-2024-42658 - https://github.com/baroi-ai/CVE-2024-42658 CVE-2024-42658 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-42671 - https://github.com/abbisQQ/Appointment-Scheduler-Host-Header-Poisoning-Open-Redirect @@ -204884,6 +204957,7 @@ CVE-2024-42785 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-42786 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-42787 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-42789 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-42812 - https://github.com/ARPSyndicate/cve-scores CVE-2024-42834 - https://github.com/CyberSec-Supra/CVE-2024-42834 CVE-2024-42834 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-42845 - https://github.com/alessio-romano/Sfoffo-Pentesting-Notes @@ -206035,6 +206109,7 @@ CVE-2024-4577 - https://github.com/cisp-pte/POC-20241008-sec-fork CVE-2024-4577 - https://github.com/d3ck4/Shodan-CVE-2024-4577 CVE-2024-4577 - https://github.com/dbyMelina/CVE-2024-4577 CVE-2024-4577 - https://github.com/dcakaric/Homework_RL +CVE-2024-4577 - https://github.com/duggytuxy/Data-Shield_IPv4_Blocklist CVE-2024-4577 - https://github.com/eagerapps/CVE-2024-4577 CVE-2024-4577 - https://github.com/eeeeeeeeee-code/POC CVE-2024-4577 - https://github.com/enomothem/PenTestNote @@ -208583,6 +208658,7 @@ CVE-2024-57841 - https://github.com/oogasawa/Utility-security CVE-2024-57849 - https://github.com/bygregonline/devsec-fastapi-report CVE-2024-5785 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5786 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-57876 - https://github.com/ARPSyndicate/cve-scores CVE-2024-57879 - https://github.com/oogasawa/Utility-security CVE-2024-57882 - https://github.com/oogasawa/Utility-security CVE-2024-57883 - https://github.com/oogasawa/Utility-security @@ -208727,6 +208803,7 @@ CVE-2024-6027 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6028 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-6028 - https://github.com/truonghuuphuc/CVE-2024-6028-Poc CVE-2024-6028 - https://github.com/truonghuuphuc/Poc +CVE-2024-6043 - https://github.com/ARPSyndicate/cve-scores CVE-2024-6043 - https://github.com/lfillaz/CVE-2024-6043 CVE-2024-6043 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-6047 - https://github.com/opendr-io/causality @@ -208813,6 +208890,7 @@ CVE-2024-6323 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6327 - https://github.com/zhanpengliu-tencent/medium-cve CVE-2024-6329 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6330 - https://github.com/20142995/nuclei-templates +CVE-2024-6330 - https://github.com/ARPSyndicate/cve-scores CVE-2024-6330 - https://github.com/RandomRobbieBF/CVE-2024-6330 CVE-2024-6330 - https://github.com/tranphuc2005/Exploit_Wordpress CVE-2024-6331 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -210896,6 +210974,7 @@ CVE-2025-1097 - https://github.com/plzheheplztrying/cve_monitor CVE-2025-1097 - https://github.com/salt318/CVE-2025-1974 CVE-2025-1097 - https://github.com/sandumjacob/IngressNightmare-POCs CVE-2025-1097 - https://github.com/scottymcandrew/ingress-nightmare +CVE-2025-10979 - https://github.com/ARPSyndicate/cve-scores CVE-2025-1098 - https://github.com/B1ack4sh/Blackash-CVE-2025-1974 CVE-2025-1098 - https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps CVE-2025-1098 - https://github.com/GhostTroops/TOP @@ -210918,6 +210997,10 @@ CVE-2025-11053 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2025-11054 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2025-11055 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2025-11056 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2025-11067 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2025-11068 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2025-11069 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2025-11070 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2025-1111 - https://github.com/Lucas66555/Rexterminatoromega CVE-2025-1111 - https://github.com/Moralz-Lang/Agent-ZeroV2 CVE-2025-1122 - https://github.com/FWNavy/RMASmoke @@ -211486,6 +211569,7 @@ CVE-2025-22226 - https://github.com/plzheheplztrying/cve_monitor CVE-2025-22235 - https://github.com/diegopacheco/Smith CVE-2025-22235 - https://github.com/idealzh/cve-2025-22235-demo CVE-2025-22235 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2025-22235 - https://github.com/wh1t3zer/SpringBootVul-GUI CVE-2025-22270 - https://github.com/DojoSecurity/DojoSecurity CVE-2025-22270 - https://github.com/Karmaz95/Credits CVE-2025-22270 - https://github.com/afine-com/research @@ -213050,6 +213134,7 @@ CVE-2025-29927 - https://github.com/ChoiWanyoung/aircon CVE-2025-29927 - https://github.com/Chouvattanak/calltrack CVE-2025-29927 - https://github.com/Cimols/admin-dashboard CVE-2025-29927 - https://github.com/CuongPaul/tailadmin-nextjs +CVE-2025-29927 - https://github.com/DaniloNogueira-Silva/frontend-hackathon CVE-2025-29927 - https://github.com/DaniloNogueira-Silva/tcc-plataforma-ensino-gamificado CVE-2025-29927 - https://github.com/DavidRamirez20/sole-software-v2 CVE-2025-29927 - https://github.com/DenKrishtaf25/3pl-client-front @@ -213996,6 +214081,7 @@ CVE-2025-31486 - https://github.com/nkuty/CVE-2025-30208-31125-31486-32395 CVE-2025-31486 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2025-31486 - https://github.com/plzheheplztrying/cve_monitor CVE-2025-31486 - https://github.com/r0ngy40/CVE-2025-30208-Series +CVE-2025-31489 - https://github.com/ARPSyndicate/cve-scores CVE-2025-31489 - https://github.com/owainkenwayucl/minio-kerfuffle CVE-2025-31492 - https://github.com/EGI-Federation/SVG-advisories CVE-2025-31498 - https://github.com/ReneDiff/TrivyExternImageTest @@ -214278,6 +214364,7 @@ CVE-2025-32463 - https://github.com/cyberpoul/CVE-2025-32463-POC CVE-2025-32463 - https://github.com/daryllundy/CVE-2025-32463 CVE-2025-32463 - https://github.com/dbarquero/cve-2025-32463-lab CVE-2025-32463 - https://github.com/giterlizzi/secdb-feeds +CVE-2025-32463 - https://github.com/gvincenti/Expressway CVE-2025-32463 - https://github.com/hackingyseguridad/root CVE-2025-32463 - https://github.com/ill-deed/CVE-2025-32463_illdeed CVE-2025-32463 - https://github.com/junxian428/CVE-2025-32463 @@ -214461,6 +214548,7 @@ CVE-2025-32988 - https://github.com/GitHubForSnap/ssmtp-gael CVE-2025-32989 - https://github.com/GitHubForSnap/ssmtp-gael CVE-2025-32990 - https://github.com/GitHubForSnap/ssmtp-gael CVE-2025-32994 - https://github.com/quectel-official/Quectel-Security +CVE-2025-32996 - https://github.com/ARPSyndicate/cve-scores CVE-2025-32996 - https://github.com/mathworks/MATLAB-language-server CVE-2025-32996 - https://github.com/olegsuv/react-checkers CVE-2025-32997 - https://github.com/olegsuv/react-checkers @@ -214559,6 +214647,9 @@ CVE-2025-34040 - https://github.com/jisi-001/CVE-2025-34040Exp CVE-2025-34040 - https://github.com/kk12-30/2025hvv CVE-2025-34040 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2025-34041 - https://github.com/kk12-30/2025hvv +CVE-2025-34052 - https://github.com/ARPSyndicate/cve-scores +CVE-2025-34055 - https://github.com/ARPSyndicate/cve-scores +CVE-2025-34056 - https://github.com/ARPSyndicate/cve-scores CVE-2025-34073 - https://github.com/infcodev/pentesting_scripts CVE-2025-34077 - https://github.com/0xgh057r3c0n/CVE-2025-34077 CVE-2025-34077 - https://github.com/MrjHaxcore/CVE-2025-34077 @@ -214655,6 +214746,7 @@ CVE-2025-3680 - https://github.com/cnetsec/south-america-cve-hall CVE-2025-3681 - https://github.com/cnetsec/south-america-cve-hall CVE-2025-3682 - https://github.com/cnetsec/south-america-cve-hall CVE-2025-3683 - https://github.com/cnetsec/south-america-cve-hall +CVE-2025-36846 - https://github.com/ARPSyndicate/cve-scores CVE-2025-36852 - https://github.com/NiklasPor/nx-remotecache-azure CVE-2025-36852 - https://github.com/NiklasPor/nx-remotecache-custom CVE-2025-36852 - https://github.com/NiklasPor/nx-remotecache-minio @@ -214963,12 +215055,14 @@ CVE-2025-4123 - https://github.com/oLy0/Vulnerability CVE-2025-4123 - https://github.com/plzheheplztrying/cve_monitor CVE-2025-4123 - https://github.com/punitdarji/Grafana-cve-2025-4123 CVE-2025-4123 - https://github.com/ynsmroztas/CVE-2025-4123-Exploit-Tool-Grafana- +CVE-2025-41234 - https://github.com/wh1t3zer/SpringBootVul-GUI CVE-2025-41236 - https://github.com/ascii42/check_vmware_cve CVE-2025-41237 - https://github.com/ascii42/check_vmware_cve CVE-2025-41239 - https://github.com/ascii42/check_vmware_cve CVE-2025-41240 - https://github.com/nagsept/helmdrupal CVE-2025-41242 - https://github.com/bhagyahosur18/banking-app CVE-2025-41243 - https://github.com/tanjiti/sec_profile +CVE-2025-41243 - https://github.com/wh1t3zer/SpringBootVul-GUI CVE-2025-41249 - https://github.com/Kinley-pal8/cicd-demo CVE-2025-4126 - https://github.com/Slow-Mist/CVE-2025-4126 CVE-2025-4126 - https://github.com/nomi-sec/PoC-in-GitHub @@ -215421,6 +215515,7 @@ CVE-2025-46724 - https://github.com/SCH227/own-research CVE-2025-46725 - https://github.com/SCH227/own-research CVE-2025-46726 - https://github.com/SCH227/own-research CVE-2025-46727 - https://github.com/swamy-2006/BASIC-VUNLNURABILITY-SCAN-GUIDE +CVE-2025-4673 - https://github.com/ARPSyndicate/cve-scores CVE-2025-4673 - https://github.com/straubt1/tf-provider-scanning CVE-2025-46731 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2025-46731 - https://github.com/plzheheplztrying/cve_monitor @@ -215941,12 +216036,15 @@ CVE-2025-50422 - https://github.com/Landw-hub/CVE-2025-50422 CVE-2025-50422 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2025-50428 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2025-50428 - https://github.com/security-smarttecs/cve-2025-50428 +CVE-2025-5046 - https://github.com/ARPSyndicate/cve-scores CVE-2025-50460 - https://github.com/Anchor0221/CVE-2025-50460 CVE-2025-50460 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2025-50461 - https://github.com/Anchor0221/CVE-2025-50461 CVE-2025-50461 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2025-5047 - https://github.com/ARPSyndicate/cve-scores CVE-2025-50472 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2025-50472 - https://github.com/xhjy2020/CVE-2025-50472 +CVE-2025-5048 - https://github.com/ARPSyndicate/cve-scores CVE-2025-50481 - https://github.com/kevinpdicks/Mezzanine-CMS-6.1.0-XSS CVE-2025-50481 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2025-5049 - https://github.com/cnetsec/south-america-cve-hall @@ -216517,6 +216615,7 @@ CVE-2025-54554 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2025-54572 - https://github.com/SAML-Toolkits/ruby-saml CVE-2025-54574 - https://github.com/B1ack4sh/Blackash-CVE-2025-54574 CVE-2025-54574 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2025-54574 - https://github.com/w4zu/Debian_security CVE-2025-54589 - https://github.com/byteReaper77/CVE-2025-54589 CVE-2025-54589 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2025-5466 - https://github.com/hackermexico/chacal @@ -216553,6 +216652,7 @@ CVE-2025-54988 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2025-54988 - https://github.com/righettod/toolbox-pentest-web CVE-2025-55004 - https://github.com/Yuri08loveElaina/imagemagick-2025-poc CVE-2025-55005 - https://github.com/Yuri08loveElaina/imagemagick-2025-poc +CVE-2025-55009 - https://github.com/ARPSyndicate/cve-scores CVE-2025-55150 - https://github.com/zast-ai/vulnerability-reports CVE-2025-55151 - https://github.com/zast-ai/vulnerability-reports CVE-2025-55152 - https://github.com/dellalibera/dellalibera @@ -216650,6 +216750,7 @@ CVE-2025-5615 - https://github.com/YZS17/CVE CVE-2025-5616 - https://github.com/YZS17/CVE CVE-2025-5617 - https://github.com/YZS17/CVE CVE-2025-5618 - https://github.com/YZS17/CVE +CVE-2025-56241 - https://github.com/ARPSyndicate/cve-scores CVE-2025-56241 - https://github.com/amirhosseinjamshidi64/Aztech-POC CVE-2025-56263 - https://github.com/echo0d/vulnerability CVE-2025-56264 - https://github.com/echo0d/vulnerability @@ -216682,9 +216783,13 @@ CVE-2025-5666 - https://github.com/cnetsec/south-america-cve-hall CVE-2025-5667 - https://github.com/cnetsec/south-america-cve-hall CVE-2025-56676 - https://github.com/securitycipher/daily-bugbounty-writeups CVE-2025-56676 - https://github.com/thexnumb/thexwriteup +CVE-2025-56713 - https://github.com/carlosalbertotuma/Cloud-Classroom-PHP-1.0---Poc2 +CVE-2025-56714 - https://github.com/carlosalbertotuma/Cloud-Classroom-PHP-1.0---Poc2 CVE-2025-56762 - https://github.com/ARPSyndicate/cve-scores CVE-2025-56762 - https://github.com/Shaunak-Chatterjee/CVE-2025-56762 CVE-2025-56762 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2025-56764 - https://github.com/Remenis/CVE-2025-56764-trivision-nc227wf +CVE-2025-56764 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2025-56771 - https://github.com/RRespxwnss/CVE-2025-56771 CVE-2025-56771 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2025-56772 - https://github.com/RRespxwnss/CVE-2025-56772 @@ -216859,6 +216964,7 @@ CVE-2025-59413 - https://github.com/adityaax/adityaax CVE-2025-59424 - https://github.com/JOOJIII/CVE-2025-59424 CVE-2025-59424 - https://github.com/PuddinCat/GithubRepoSpider CVE-2025-59424 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2025-59426 - https://github.com/ARPSyndicate/cve-scores CVE-2025-5959 - https://github.com/leesh3288/leesh3288 CVE-2025-5959 - https://github.com/mwlik/v8-resources CVE-2025-5961 - https://github.com/Nxploited/CVE-2025-5961 @@ -216869,6 +216975,9 @@ CVE-2025-5963 - https://github.com/Karmaz95/Credits CVE-2025-5963 - https://github.com/afine-com/research CVE-2025-5964 - https://github.com/byteReaper77/CVE-2025-5964- CVE-2025-5964 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2025-59831 - https://github.com/ARPSyndicate/cve-scores +CVE-2025-59834 - https://github.com/ARPSyndicate/cve-scores +CVE-2025-59839 - https://github.com/ARPSyndicate/cve-scores CVE-2025-59843 - https://github.com/At0mXploit/CVE-2025-59843-CVE-2025-59932 CVE-2025-59843 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2025-59932 - https://github.com/At0mXploit/CVE-2025-59843-CVE-2025-59932 @@ -217144,6 +217253,7 @@ CVE-2025-7606 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2025-7606 - https://github.com/sunhuiHi666/CVE-2025-7606 CVE-2025-7620 - https://github.com/Yuri08loveElaina/cve_2025_7620 CVE-2025-7639 - https://github.com/BigD-Code/BigD-Code +CVE-2025-7647 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2025-7700 - https://github.com/w4zu/Debian_security CVE-2025-7709 - https://github.com/CKA-codespace/cg-compare CVE-2025-7728 - https://github.com/CVE-Hunters/cve-hunters @@ -217234,6 +217344,7 @@ CVE-2025-7949 - https://github.com/zast-ai/vulnerability-reports CVE-2025-7953 - https://github.com/zast-ai/vulnerability-reports CVE-2025-7955 - https://github.com/Nxploited/CVE-2025-7955 CVE-2025-7955 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2025-8014 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2025-8018 - https://github.com/drackyjr/CVE-2025-8018 CVE-2025-8018 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2025-8067 - https://github.com/born0monday/CVE-2025-8067 @@ -217423,6 +217534,7 @@ CVE-2025-8814 - https://github.com/zast-ai/vulnerability-reports CVE-2025-8834 - https://github.com/cnetsec/south-america-cve-hall CVE-2025-8841 - https://github.com/zast-ai/vulnerability-reports CVE-2025-88588 - https://github.com/baaaaadr/IOT-Cybersecurity-DB +CVE-2025-8869 - https://github.com/ARPSyndicate/cve-scores CVE-2025-8875 - https://github.com/Rozenbyrg/Vulnezer-Prioritization_of_vulnerabilities CVE-2025-8875 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2025-8875 - https://github.com/rxerium/CVE-2025-8875-CVE-2025-8876 diff --git a/references.txt b/references.txt index 00222526b3..0022adce34 100644 --- a/references.txt +++ b/references.txt @@ -65247,10 +65247,15 @@ CVE-2020-11457 - http://packetstormsecurity.com/files/157104/pfSense-2.4.4-P3-Us CVE-2020-11457 - https://www.exploit-db.com/exploits/48300 CVE-2020-11458 - https://matthias.sdfeu.org/misp-poc.py CVE-2020-11463 - https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro/ +CVE-2020-11463 - https://support.deskpro.com/en/news/posts/deskpro-v2019-8-0-released-security-update CVE-2020-11464 - https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro/ +CVE-2020-11464 - https://support.deskpro.com/en/news/posts/deskpro-v2019-8-0-released-security-update CVE-2020-11465 - https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro/ +CVE-2020-11465 - https://support.deskpro.com/en/news/posts/deskpro-v2019-8-0-released-security-update CVE-2020-11466 - https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro/ +CVE-2020-11466 - https://support.deskpro.com/en/news/posts/deskpro-v2019-8-0-released-security-update CVE-2020-11467 - https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro/ +CVE-2020-11467 - https://support.deskpro.com/en/news/posts/deskpro-v2019-8-0-released-security-update CVE-2020-1147 - http://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html CVE-2020-1147 - http://packetstormsecurity.com/files/158876/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html CVE-2020-1147 - http://packetstormsecurity.com/files/163644/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html @@ -67087,6 +67092,7 @@ CVE-2020-15714 - https://www.rconfig.com/downloads/v3-release-notes CVE-2020-15715 - https://www.rconfig.com/downloads/v3-release-notes CVE-2020-15716 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/291 CVE-2020-15717 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/291 +CVE-2020-15718 - https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2020-15718.md CVE-2020-15718 - https://gitlab.com/francoisjacquet/rosariosis/-/issues/291 CVE-2020-15719 - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 CVE-2020-15719 - https://www.oracle.com/security-alerts/cpuapr2022.html @@ -67481,6 +67487,7 @@ CVE-2020-18659 - https://www.seebug.org/vuldb/ssvid-97931 CVE-2020-18660 - https://www.seebug.org/vuldb/ssvid-97928 CVE-2020-18661 - https://www.seebug.org/vuldb/ssvid-97925 CVE-2020-18662 - https://www.seebug.org/vuldb/ssvid-97927 +CVE-2020-18663 - https://www.seebug.org/vuldb/ssvid-97926 CVE-2020-18665 - https://www.seebug.org/vuldb/ssvid-97995 CVE-2020-18668 - https://www.seebug.org/vuldb/ssvid-97996 CVE-2020-18694 - https://github.com/ignitedcms/ignitedcms/issues/5 @@ -67502,6 +67509,7 @@ CVE-2020-18757 - https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE CVE-2020-18758 - https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_upload.md CVE-2020-18759 - https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_leak2.md CVE-2020-18766 - https://github.com/AntSwordProject/antSword/issues/147 +CVE-2020-18768 - http://bugzilla.maptools.org/show_bug.cgi?id=2848 CVE-2020-18770 - https://github.com/gdraheim/zziplib/issues/69 CVE-2020-18771 - https://github.com/Exiv2/exiv2/issues/756 CVE-2020-18773 - https://github.com/Exiv2/exiv2/issues/760 @@ -68007,6 +68015,7 @@ CVE-2020-21883 - https://s3curityb3ast.github.io/KSA-Dev-009.txt CVE-2020-21883 - https://www.mail-archive.com/fulldisclosure%40seclists.org/msg07140.html CVE-2020-21883 - https://www.mail-archive.com/fulldisclosure@seclists.org/msg07140.html CVE-2020-21884 - https://s3curityb3ast.github.io/KSA-Dev-008.txt +CVE-2020-21884 - https://www.mail-archive.com/fulldisclosure%40seclists.org/msg07139.html CVE-2020-21884 - https://www.mail-archive.com/fulldisclosure@seclists.org/msg07139.html CVE-2020-21890 - https://bugs.ghostscript.com/show_bug.cgi?id=701846 CVE-2020-21896 - https://bugs.ghostscript.com/show_bug.cgi?id=701294 @@ -70353,6 +70362,7 @@ CVE-2020-29603 - https://mantisbt.org/bugs/view.php?id=27357 CVE-2020-29604 - https://mantisbt.org/bugs/view.php?id=27357 CVE-2020-29605 - https://mantisbt.org/bugs/view.php?id=27357 CVE-2020-29607 - http://packetstormsecurity.com/files/162785/Pluck-CMS-4.7.13-Remote-Shell-Upload.html +CVE-2020-29607 - https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2020-29607.md CVE-2020-2961 - https://www.oracle.com/security-alerts/cpuapr2020.html CVE-2020-2963 - https://www.oracle.com/security-alerts/cpuapr2020.html CVE-2020-2964 - https://www.oracle.com/security-alerts/cpuapr2020.html @@ -76644,7 +76654,9 @@ CVE-2021-29921 - https://www.oracle.com/security-alerts/cpuapr2022.html CVE-2021-29921 - https://www.oracle.com/security-alerts/cpujan2022.html CVE-2021-29921 - https://www.oracle.com/security-alerts/cpujul2022.html CVE-2021-29921 - https://www.oracle.com/security-alerts/cpuoct2021.html +CVE-2021-29922 - https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis CVE-2021-29922 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-015.md +CVE-2021-29923 - https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis CVE-2021-29923 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md CVE-2021-29923 - https://www.oracle.com/security-alerts/cpujan2022.html CVE-2021-29944 - https://bugzilla.mozilla.org/show_bug.cgi?id=1697604 @@ -78805,6 +78817,7 @@ CVE-2021-38094 - https://trac.ffmpeg.org/ticket/8263 CVE-2021-38095 - https://github.com/FlaviuPopescu/Spigit-PoC CVE-2021-3810 - https://huntr.dev/bounties/38888513-30fc-4d8f-805d-34070d60e223 CVE-2021-3811 - https://huntr.dev/bounties/fa38c61f-4043-4872-bc85-7fe5ae5cc2e8 +CVE-2021-38111 - https://defcon.org/html/defcon-29/dc-29-speakers.html#kintigh CVE-2021-38112 - https://rhinosecuritylabs.com/aws/cve-2021-38112-aws-workspaces-rce/ CVE-2021-38113 - https://github.com/E2OpenPlugins/e2openplugin-OpenWebif/issues/1387 CVE-2021-3812 - https://huntr.dev/bounties/875a6885-9a64-46f3-94ad-92f40f989200 @@ -81389,6 +81402,7 @@ CVE-2022-0274 - https://huntr.dev/bounties/a82a714a-9b71-475e-bfc3-43326fcaf764 CVE-2022-0277 - https://huntr.dev/bounties/0e776f3d-35b1-4a9e-8fe8-91e46c0d6316 CVE-2022-0278 - https://huntr.dev/bounties/64495d0f-d5ec-4542-9693-32372c18d030 CVE-2022-0279 - https://wpscan.com/vulnerability/43a4b2d3-1bd5-490c-982c-bb7120595865 +CVE-2022-0280 - https://service.mcafee.com/?articleId=TS103271&page=shell&shell=article-view CVE-2022-0281 - https://huntr.dev/bounties/315f5ac6-1b5e-4444-ad8f-802371da3505 CVE-2022-0282 - https://huntr.dev/bounties/8815b642-bd9b-4737-951b-bde7319faedd CVE-2022-0284 - https://github.com/ImageMagick/ImageMagick/issues/4729 @@ -88551,6 +88565,7 @@ CVE-2022-41396 - https://boschko.ca/tenda_ac1200_router/ CVE-2022-4140 - https://wpscan.com/vulnerability/0d649a7e-3334-48f7-abca-fff0856e12c7 CVE-2022-41401 - https://github.com/ixSly/CVE-2022-41401 CVE-2022-41403 - https://packetstormsecurity.com/files/168412/OpenCart-3.x-Newsletter-Custom-Popup-4.0-SQL-Injection.html +CVE-2022-41404 - https://github.com/Checkmarx/Vulnerabilities-Proofs-of-Concept/tree/main/2022/CVE-2022-41404 CVE-2022-41404 - https://sourceforge.net/p/ini4j/bugs/56/ CVE-2022-4141 - https://huntr.dev/bounties/20ece512-c600-45ac-8a84-d0931e05541f CVE-2022-41412 - http://packetstormsecurity.com/files/170069/perfSONAR-4.4.4-Open-Proxy-Relay.html @@ -90551,6 +90566,7 @@ CVE-2023-0156 - https://wpscan.com/vulnerability/caf1dbb5-197e-41e9-8f48-ba1f236 CVE-2023-0157 - https://wpscan.com/vulnerability/8248b550-6485-4108-a701-8446ffa35f06 CVE-2023-0159 - https://wpscan.com/vulnerability/239ea870-66e5-4754-952e-74d4dd60b809 CVE-2023-0160 - https://lore.kernel.org/all/CABcoxUayum5oOqFMMqAeWuS8+EzojquSOSyDA3J_2omY=2EeAg@mail.gmail.com/ +CVE-2023-0163 - https://github.com/mozilla/node-convict/issues/410 CVE-2023-0164 - https://fluidattacks.com/advisories/queen/ CVE-2023-0165 - https://wpscan.com/vulnerability/f00b82f7-d8ad-4f6b-b791-81cc16b6336b CVE-2023-0166 - https://wpscan.com/vulnerability/f5d43062-4ef3-4dd1-b916-0127f0016f5c @@ -91883,6 +91899,7 @@ CVE-2023-2283 - http://packetstormsecurity.com/files/172861/libssh-0.9.6-0.10.4- CVE-2023-22833 - https://palantir.safebase.us/?tcuUid=7f1fd834-805d-4679-85d0-9d779fa064ae CVE-2023-22834 - https://palantir.safebase.us/?tcuUid=14874400-e9c9-4ac4-a8a6-9f4c48a56ff8 CVE-2023-22835 - https://palantir.safebase.us/?tcuUid=0e2e79bd-cc03-42a8-92c2-c0e68a1ea53d +CVE-2023-22836 - https://palantir.safebase.us/?tcuUid=f9bf67ef-be15-4f87-a526-bf6064e8f682 CVE-2023-22844 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1700 CVE-2023-22845 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1708 CVE-2023-22855 - http://packetstormsecurity.com/files/171046/Kardex-Mlog-MCC-5.7.12-0-a203c2a213-master-File-Inclusion-Remote-Code-Execution.html @@ -93403,6 +93420,7 @@ CVE-2023-29517 - https://jira.xwiki.org/browse/XWIKI-20324 CVE-2023-29519 - https://jira.xwiki.org/browse/XWIKI-20364 CVE-2023-29523 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x764-ff8r-9hpx CVE-2023-29528 - https://jira.xwiki.org/browse/XWIKI-20348 +CVE-2023-29531 - https://bugzilla.mozilla.org/show_bug.cgi?id=1794292 CVE-2023-29532 - https://bugzilla.mozilla.org/show_bug.cgi?id=1806394 CVE-2023-29534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1816007 CVE-2023-29534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1816059 @@ -93465,6 +93483,7 @@ CVE-2023-29681 - https://www.youtube.com/watch?v=Xy9_hmpvvA4&ab_channel=0ta CVE-2023-29689 - http://packetstormsecurity.com/files/174088/Pyro-CMS-3.9-Server-Side-Template-Injection.html CVE-2023-29693 - https://github.com/Stevenbaga/fengsha/blob/main/H3C/GR-1200W/SetTftpUpgrad.md CVE-2023-29696 - https://github.com/Stevenbaga/fengsha/blob/main/H3C/GR-1200W/aVersionSet.md +CVE-2023-2970 - https://gitee.com/mindspore/mindspore/issues/I73DOS CVE-2023-2971 - https://starlabs.sg/advisories/23/23-2971/ CVE-2023-29712 - https://info.vadesecure.com/hubfs/Ressource%20Marketing%20Website/Datasheet/EN/Vade_Secure_DS_Gateway_EN.pdf CVE-2023-29712 - https://labs.yarix.com/2023/05/vade-secure-gateway-multiple-xss-cve-2023-29712-cve-2023-29713-cve-2023-29714/ @@ -93748,6 +93767,7 @@ CVE-2023-3095 - https://huntr.dev/bounties/35c899a9-40a0-4e17-bfb5-2a1430bc83c4 CVE-2023-30950 - https://palantir.safebase.us/?tcuUid=d839709d-c50f-4a37-8faa-b0c35054418a CVE-2023-30951 - https://palantir.safebase.us/?tcuUid=fe021f28-9e25-42c4-acd8-772cd8006ced CVE-2023-30952 - https://palantir.safebase.us/?tcuUid=42bdb7fa-9a6d-4462-b89d-cabc62f281f4 +CVE-2023-30954 - https://palantir.safebase.us/?tcuUid=d2366a3e-a92c-476e-8a7a-7db60e4be567 CVE-2023-30955 - https://palantir.safebase.us/?tcuUid=0c3f6c33-4eb0-48b5-ab87-fe48c46a4170 CVE-2023-30956 - https://palantir.safebase.us/?tcuUid=40367943-738c-4e69-b852-4a503c77478a CVE-2023-30958 - https://palantir.safebase.us/?tcuUid=5764b094-d3c0-4380-90f2-234f36116c9b @@ -96170,6 +96190,7 @@ CVE-2023-4407 - http://packetstormsecurity.com/files/174244/Credit-Lite-1.5.4-SQ CVE-2023-44077 - https://support.studionetworksolutions.com/hc/en-us/articles/22494658980244-ShareBrowser-v-7-0-Released CVE-2023-4409 - https://vuldb.com/?id.237512 CVE-2023-4414 - https://github.com/RCEraser/cve/blob/main/S85F.md +CVE-2023-4414 - https://vuldb.com/?id.237517 CVE-2023-4417 - https://devolutions.net/security/advisories/DEVO-2023-0015 CVE-2023-44216 - https://arstechnica.com/security/2023/09/gpus-from-all-major-suppliers-are-vulnerable-to-new-pixel-stealing-attack/ CVE-2023-44216 - https://github.com/UT-Security/gpu-zip @@ -96282,6 +96303,7 @@ CVE-2023-44846 - https://blog.csdn.net/2301_79997870/article/details/133365547?s CVE-2023-44846 - https://blog.csdn.net/2301_79997870/article/details/133661890?spm=1001.2014.3001.5502 CVE-2023-44847 - https://blog.csdn.net/2301_79997870/article/details/133661890?spm=1001.2014.3001.5502 CVE-2023-44848 - https://blog.csdn.net/2301_79997870/article/details/133661890?spm=1001.2014.3001.5502 +CVE-2023-44860 - https://github.com/adhikara13/CVE/blob/main/netis_N3/Improper%20Authentication%20Mechanism%20Leading%20to%20Denial-of-Service%20%28DoS%29.md CVE-2023-44860 - https://github.com/adhikara13/CVE/blob/main/netis_N3/Improper%20Authentication%20Mechanism%20Leading%20to%20Denial-of-Service%20(DoS).md CVE-2023-4490 - https://wpscan.com/vulnerability/986024f0-3c8d-44d8-a9c9-1dd284d7db0d CVE-2023-44954 - https://github.com/Ciber-Mike/BigTree_CMS-Stored_XSS-Developer_Settings/blob/main/README.md @@ -96387,6 +96409,7 @@ CVE-2023-45540 - https://github.com/soundarkutty/HTML-Injection/blob/main/POC.md CVE-2023-45542 - https://github.com/ahrixia/CVE-2023-45542 CVE-2023-45554 - https://github.com/96xiaopang/Vulnerabilities/blob/main/zzzcms%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0_en.md CVE-2023-45555 - https://github.com/96xiaopang/Vulnerabilities/blob/main/zzzcms%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0_en.md +CVE-2023-4558 - https://vuldb.com/?id.238159 CVE-2023-4560 - https://huntr.dev/bounties/86f06e28-ed8d-4f96-b4ad-e47f2fe94ba6 CVE-2023-4561 - https://huntr.dev/bounties/d4302a0d-db62-4d76-93dd-e6e6473e057a CVE-2023-45659 - https://github.com/engelsystem/engelsystem/security/advisories/GHSA-f6mm-3v2h-jm6x @@ -97216,6 +97239,7 @@ CVE-2023-50128 - https://www.secura.com/services/iot/consumer-products/security- CVE-2023-50129 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices CVE-2023-50136 - https://github.com/yukino-hiki/CVE/blob/main/2/There%20is%20a%20stored%20xss%20at%20the%20custom%20table.md CVE-2023-50137 - https://github.com/yukino-hiki/CVE/blob/main/3/There%20is%20a%20storage%20type%20xss%20in%20the%20site%20management%20office.md +CVE-2023-5016 - https://vuldb.com/?id.239857 CVE-2023-50164 - http://packetstormsecurity.com/files/176157/Struts-S2-066-File-Upload-Remote-Code-Execution.html CVE-2023-50172 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1897 CVE-2023-5019 - https://github.com/ggg48966/cve/blob/main/sql.md @@ -97753,6 +97777,7 @@ CVE-2023-5796 - https://vuldb.com/?id.243602 CVE-2023-5798 - https://wpscan.com/vulnerability/bbb4c98c-4dd7-421e-9666-98f15acde761 CVE-2023-5799 - https://wpscan.com/vulnerability/3061f85e-a70e-49e5-bccf-ae9240f51178 CVE-2023-5809 - https://wpscan.com/vulnerability/f1eb05e8-1b7c-45b1-912d-f668bd68e265 +CVE-2023-5815 - https://www.leavesongs.com/PENETRATION/docker-php-include-getshell.html#0x06-pearcmdphp CVE-2023-5817 - https://drive.google.com/file/d/125xS3GVMr7_qo5HjWvXaXixuE_R-q_u3/view?usp=sharing CVE-2023-5826 - https://github.com/Cubi123123123/cve/blob/main/NS-ASG-sql-list_onlineuser.md CVE-2023-5826 - https://vuldb.com/?id.243716 @@ -98020,6 +98045,7 @@ CVE-2023-6571 - https://huntr.com/bounties/f02781e7-2a53-4c66-aa32-babb16434632 CVE-2023-6574 - https://github.com/flyyue2001/cve/blob/main/smart_sql_updateos.md CVE-2023-6575 - https://github.com/houhuidong/cve/blob/main/rce.md CVE-2023-6576 - https://github.com/willchen0011/cve/blob/main/upload.md +CVE-2023-6576 - https://vuldb.com/?id.247156 CVE-2023-6577 - https://github.com/kpz-wm/cve/blob/main/Any_file_read.md CVE-2023-6579 - http://packetstormsecurity.com/files/176124/osCommerce-4-SQL-Injection.html CVE-2023-6580 - https://github.com/c2dc/cve-reported/blob/main/CVE-2023-6580/CVE-2023-6580.md @@ -98135,6 +98161,7 @@ CVE-2023-7050 - https://vuldb.com/?id.248737 CVE-2023-7051 - https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/csrf_delete_notes.md CVE-2023-7052 - https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/csrf_profile_notes.md CVE-2023-7054 - https://vuldb.com/?id.248741 +CVE-2023-7056 - https://vuldb.com/?id.248743 CVE-2023-7059 - https://github.com/will121351/wenqin.webray.com.cn/blob/main/CVE-project/school-visitors-log-e-book.md CVE-2023-7060 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fjc8-223c-qgqr CVE-2023-7074 - https://wpscan.com/vulnerability/7906c349-97b0-4d82-aef0-97a1175ae88e/ @@ -98212,10 +98239,13 @@ CVE-2023-7175 - https://medium.com/@heishou/libsystem-sql-injection-bb74915175fe CVE-2023-7176 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-3-d02f0ce78fe3 CVE-2023-7176 - https://vuldb.com/?id.249363 CVE-2023-7177 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-4-cadc2983eb5e +CVE-2023-7177 - https://vuldb.com/?id.249364 CVE-2023-7178 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-5-5a761e5b73b8 CVE-2023-7179 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-a98949964faf CVE-2023-7180 - https://github.com/Bobjones7/cve/blob/main/sql.md +CVE-2023-7180 - https://vuldb.com/?id.249367 CVE-2023-7181 - https://vuldb.com/?id.249368 +CVE-2023-7186 - https://vuldb.com/?id.249388 CVE-2023-7193 - https://vuldb.com/?id.249395 CVE-2023-7194 - https://wpscan.com/vulnerability/e20292af-939a-4cb1-91e4-5ff6aa0c7fbe CVE-2023-7195 - https://wpscan.com/vulnerability/72279ca0-6365-4c83-adca-4d8e5808a8c5/ @@ -98230,6 +98260,7 @@ CVE-2023-7202 - https://wpscan.com/vulnerability/d923ba5b-1c20-40ee-ac69-cd0bb65 CVE-2023-7203 - https://wpscan.com/vulnerability/b514b631-c3e3-4793-ab5d-35ed0c38b011/ CVE-2023-7204 - https://wpscan.com/vulnerability/65a8cf83-d6cc-4d4c-a482-288a83a69879/ CVE-2023-7208 - https://github.com/unpWn4bL3/iot-security/blob/main/13.md +CVE-2023-7214 - https://vuldb.com/?id.249770 CVE-2023-7215 - https://github.com/Chanzhaoyu/chatgpt-web/issues/2001 CVE-2023-7215 - https://vuldb.com/?id.249779 CVE-2023-7216 - https://bugzilla.redhat.com/show_bug.cgi?id=2249901 @@ -98256,6 +98287,7 @@ CVE-2023-7286 - https://wpscan.com/vulnerability/3538e80e-c2c5-4e7b-97c3-b7debad CVE-2023-7297 - https://wpscan.com/vulnerability/3632dfa1-2948-4622-a8fd-31edb8b22383/ CVE-2023-7307 - https://www.cnblogs.com/pursue-security/p/17666126.html CVE-2023-7308 - https://www.vulncheck.com/advisories/secgate3600-firewall-info-disc +CVE-2023-7309 - https://developer.aliyun.com/article/1333161 CVE-2023-7309 - https://www.vulncheck.com/advisories/dahua-smart-park-integrated-management-platform-front-end-arbitrary-file-upload CVE-2024-0023 - https://android.googlesource.com/platform/frameworks/av/+/30b1b34cfd5abfcfee759e7d13167d368ac6c268 CVE-2024-0044 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-m7fh-f3w4-r6v2 @@ -98384,6 +98416,7 @@ CVE-2024-0736 - https://0day.today/exploit/39249 CVE-2024-0737 - https://packetstormsecurity.com/files/176553/LightFTP-1.1-Denial-Of-Service.html CVE-2024-0741 - https://bugzilla.mozilla.org/show_bug.cgi?id=1864587 CVE-2024-0745 - https://bugzilla.mozilla.org/show_bug.cgi?id=1871838 +CVE-2024-0748 - https://bugzilla.mozilla.org/show_bug.cgi?id=1783504 CVE-2024-0749 - https://bugzilla.mozilla.org/show_bug.cgi?id=1813463 CVE-2024-0750 - https://bugzilla.mozilla.org/show_bug.cgi?id=1863083 CVE-2024-0756 - https://wpscan.com/vulnerability/9130a42d-fca3-4f9c-ab97-d5e0a7a5cef2/ @@ -98517,6 +98550,7 @@ CVE-2024-10167 - https://github.com/ppp-src/CVE/issues/16 CVE-2024-10169 - https://github.com/RainFo666/cve/issues/1 CVE-2024-1017 - https://packetstormsecurity.com/files/176714/Gabriels-FTP-Server-1.2-Denial-Of-Service.html CVE-2024-1017 - https://www.youtube.com/watch?v=wwHuXfYS8yQ +CVE-2024-10171 - https://github.com/cdl00/cve/blob/main/sql8-message-book.md CVE-2024-10173 - https://github.com/didi/DDMQ/issues/37 CVE-2024-10173 - https://github.com/didi/DDMQ/issues/37#issue-2577905007 CVE-2024-1019 - https://owasp.org/www-project-modsecurity/tab_cves#cve-2024-1019-2024-01-30 @@ -98560,6 +98594,7 @@ CVE-2024-10426 - https://github.com/ppp-src/CVE/issues/21 CVE-2024-10427 - https://github.com/ppp-src/CVE/issues/22 CVE-2024-10430 - https://github.com/ppp-src/CVE/issues/23 CVE-2024-10431 - https://github.com/ppp-src/CVE/issues/24 +CVE-2024-10434 - https://vuldb.com/?id.281985 CVE-2024-10435 - https://github.com/didi/super-jacoco/issues/48 CVE-2024-10448 - https://github.com/bevennyamande/bloodbank_delete_csrf_attack CVE-2024-10449 - https://github.com/ppp-src/CVE/issues/25 @@ -98636,10 +98671,12 @@ CVE-2024-10737 - https://github.com/Scholar-XD/CVE/issues/1 CVE-2024-10738 - https://github.com/Nightmaremassacre/cve/issues/3 CVE-2024-10739 - https://github.com/UnrealdDei/cve/blob/main/sql11.md CVE-2024-10740 - https://github.com/1270512529/cve/blob/main/sql.md +CVE-2024-10741 - https://github.com/maxihongtatum/cve/blob/main/sql14.md CVE-2024-10742 - https://github.com/xiaokka/cve/blob/main/sql.md CVE-2024-10750 - https://github.com/xiaobor123/tenda-vul-i22 CVE-2024-10751 - https://github.com/JiangJiangCC/CVE/issues/1 CVE-2024-10752 - https://github.com/primaryboy/CVE/issues/1 +CVE-2024-10758 - https://github.com/EmilGallajov/zero-day/blob/main/content_management_system_sqli.md CVE-2024-10759 - https://github.com/liujiaquan1122/cve/issues/2 CVE-2024-1076 - https://wpscan.com/vulnerability/9c3e9c72-3d6c-4e2c-bb8a-f4efce1371d5/ CVE-2024-10764 - https://github.com/xiaobsss/CVE/issues/1 @@ -98684,6 +98721,7 @@ CVE-2024-10971 - https://devolutions.net/security/advisories/DEVO-2024-0015/ CVE-2024-1098 - https://vuldb.com/?id.252455 CVE-2024-1098 - https://www.yuque.com/mailemonyeyongjuan/tha8tr/ouiw375l0m8mw5ls CVE-2024-10980 - https://wpscan.com/vulnerability/915daad8-d14c-4457-a3a0-aa21744f4ae0/ +CVE-2024-10987 - https://github.com/qqqbalabala/cve/blob/main/sql20.md CVE-2024-10989 - https://github.com/miaoyum/cve/blob/main/sql21.md CVE-2024-1099 - https://www.yuque.com/mailemonyeyongjuan/tha8tr/dcilugg0htp973nx CVE-2024-10991 - https://github.com/ppp-src/CVE/issues/30 @@ -98692,6 +98730,8 @@ CVE-2024-10994 - https://github.com/Hacker0xone/CVE/issues/1 CVE-2024-10995 - https://github.com/Hacker0xone/CVE/issues/2 CVE-2024-10996 - https://github.com/ppp-src/CVE/issues/32 CVE-2024-10998 - https://github.com/090913/CVE/issues/1 +CVE-2024-10999 - https://github.com/EmilGallajov/zero-day/blob/main/codeastro_real_estate_ms_authenticated_rce.md +CVE-2024-11000 - https://github.com/EmilGallajov/zero-day/blob/main/codeastro_real_estate_ms_authenticated_rce.md CVE-2024-11022 - https://www.first.org/cvss/calculator/3.1 CVE-2024-11026 - https://vuldb.com/?id.283544 CVE-2024-1103 - https://docs.google.com/document/d/18M55HRrxHQ9Jhph6CwWF-d5epAKtOSHt/edit?usp=drive_link&ouid=105609487033659389545&rtpof=true&sd=true @@ -99060,10 +99100,12 @@ CVE-2024-13966 - https://krashconsulting.com/fury-of-fingers-biotime-rce/ CVE-2024-13979 - https://blog.csdn.net/qq_41904294/article/details/144240396 CVE-2024-13979 - https://www.vulncheck.com/advisories/st-joes-erp-system-sqli CVE-2024-13980 - https://blog.csdn.net/nnn2188185/article/details/141065540 +CVE-2024-13980 - https://blog.csdn.net/weixin_48539059/article/details/141033966 CVE-2024-13981 - https://blog.csdn.net/jingke666/article/details/140855251 CVE-2024-13981 - https://blog.csdn.net/weixin_53009585/article/details/140853891 CVE-2024-13981 - https://cn-sec.com/archives/3041179.html CVE-2024-13981 - https://www.vulncheck.com/advisories/livebos-uploadfile-arbitrary-file-upload +CVE-2024-13984 - https://blog.csdn.net/maxiluo/article/details/135865584 CVE-2024-13985 - https://blog.csdn.net/weixin_43567873/article/details/136636198 CVE-2024-13985 - https://cn-sec.com/archives/2554372.html CVE-2024-13985 - https://pentest-tools.com/vulnerabilities-exploits/dahua-eims-remote-command-execution_23961 @@ -99087,6 +99129,7 @@ CVE-2024-1563 - https://bugzilla.mozilla.org/show_bug.cgi?id=1863831 CVE-2024-1564 - https://wpscan.com/vulnerability/ecb1e36f-9c6e-4754-8878-03c97194644d/ CVE-2024-1588 - https://wpscan.com/vulnerability/2772c921-d977-4150-b207-ae5ba5e2a6db/ CVE-2024-1589 - https://wpscan.com/vulnerability/5cfbbddd-d941-4665-be8b-a54454527571/ +CVE-2024-1621 - https://ntware.atlassian.net/wiki/spaces/SA/pages/12113215492/2024+Security+Advisory+Device+registration+susceptible+to+compromise CVE-2024-1638 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-p6f3-f63q-5mc2 CVE-2024-1658 - https://wpscan.com/vulnerability/9489925e-5a47-4608-90a2-0139c5e1c43c/ CVE-2024-1660 - https://wpscan.com/vulnerability/5bd16f84-22bf-4170-b65c-08caf67d0005/ @@ -100341,6 +100384,7 @@ CVE-2024-26798 - https://git.kernel.org/stable/c/20a4b5214f7bee13c897477168c77bb CVE-2024-26798 - https://git.kernel.org/stable/c/2f91a96b892fab2f2543b4a55740c5bee36b1a6b CVE-2024-26798 - https://git.kernel.org/stable/c/73a6bd68a1342f3a44cac9dffad81ad6a003e520 CVE-2024-26798 - https://git.kernel.org/stable/c/a2c881413dcc5d801bdc9535e51270cc88cb9cd8 +CVE-2024-2682 - https://vuldb.com/?id.257382 CVE-2024-2690 - https://github.com/wkeyi0x1/vul-report/issues/2 CVE-2024-2696 - https://wpscan.com/vulnerability/b6e64af0-adeb-4e28-9a81-f4024b0446ee/ CVE-2024-2697 - https://wpscan.com/vulnerability/c430b30d-61db-45f5-8499-91b491503b9c/ @@ -100652,6 +100696,7 @@ CVE-2024-2837 - https://wpscan.com/vulnerability/91058c48-f262-4fcc-9390-472d59d CVE-2024-28383 - https://github.com/cvdyfbwa/IoT-Tenda-Router/blob/main/sub_431CF0.md CVE-2024-28397 - https://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape CVE-2024-28417 - https://gitee.com/shavchen214/pwn/issues/I94VFH +CVE-2024-28418 - https://gitee.com/shavchen214/pwn/issues/I94VI3 CVE-2024-28421 - https://gist.github.com/LioTree/003202727a61c0fb3ec3c948ab5e38f9 CVE-2024-28421 - https://github.com/cobub/razor/issues/178 CVE-2024-28429 - https://github.com/itsqian797/cms/blob/main/2.md @@ -101295,6 +101340,7 @@ CVE-2024-3255 - https://vuldb.com/?id.259104 CVE-2024-3261 - https://wpscan.com/vulnerability/5a0d5922-eefc-48e1-9681-b63e420bb8b3/ CVE-2024-32640 - https://github.com/Stuub/CVE-2024-32640-SQLI-MuraCMS CVE-2024-32640 - https://projectdiscovery.io/blog/hacking-apple-with-sql-injection?ref=projectdiscovery-io-blog-newsletter +CVE-2024-32640 - https://www.seebug.org/vuldb/ssvid-99835 CVE-2024-32645 - https://github.com/vyperlang/vyper/security/advisories/GHSA-xchq-w5r3-4wg3 CVE-2024-32646 - https://github.com/vyperlang/vyper/security/advisories/GHSA-r56x-j438-vw5m CVE-2024-32647 - https://github.com/vyperlang/vyper/security/advisories/GHSA-3whq-64q2-qfj6 @@ -101375,6 +101421,7 @@ CVE-2024-33350 - https://github.com/majic-banana/vulnerability/blob/main/POC/tao CVE-2024-33365 - https://github.com/johnathanhuutri/CVE_report/blob/master/CVE-2024-33365/README.md CVE-2024-33365 - https://hackmd.io/%40JohnathanHuuTri/rJNbEItJC CVE-2024-33365 - https://hackmd.io/@JohnathanHuuTri/rJNbEItJC +CVE-2024-33371 - https://gitee.com/zchuanwen/cve/issues/I9HQRY CVE-2024-33373 - https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Password-Policy-Bypass--%7C--Inconsistent-Password-Policy-(CVE%E2%80%902024%E2%80%9033373) CVE-2024-33373 - https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-lb-link-bl-w1210m-router/ CVE-2024-33374 - https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Incorrect-Access-Control-(CVE%E2%80%902024%E2%80%9033374) @@ -101384,6 +101431,7 @@ CVE-2024-33377 - https://github.com/ShravanSinghRathore/Security-Advisory-Multip CVE-2024-33377 - https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-lb-link-bl-w1210m-router/ CVE-2024-33383 - https://juvl1ne.github.io/2024/04/18/novel-plus-vulnerability/ CVE-2024-33398 - https://github.com/HouqiyuA/k8s-rbac-poc +CVE-2024-33401 - https://gitee.com/zchuanwen/cve123/issues/I9I18D CVE-2024-33423 - https://github.com/adiapera/xss_language_cmsimple_5.15 CVE-2024-33424 - https://github.com/adiapera/xss_language_cmsimple_5.15 CVE-2024-33427 - https://github.com/squid-cache/squid/pull/1763 @@ -101503,7 +101551,9 @@ CVE-2024-34102 - https://www.vicarius.io/vsociety/posts/cosmicsting-critical-una CVE-2024-3414 - https://vuldb.com/?id.259583 CVE-2024-3416 - https://vuldb.com/?id.259588 CVE-2024-34162 - https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html +CVE-2024-34195 - https://gist.github.com/Swind1er/84161b607d06d060fba5adcdd92bceb4 CVE-2024-34196 - https://gist.github.com/Swind1er/1ec2fde42254598a72f1d716f9cfe2a1 +CVE-2024-34198 - https://gist.github.com/Swind1er/02f6cb414e440c34878f20fef756e286 CVE-2024-34199 - https://github.com/DMCERTCE/PoC_Tiny_Overflow CVE-2024-34200 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setIpQosRules CVE-2024-34201 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/getSaveConfig @@ -101541,10 +101591,13 @@ CVE-2024-34273 - https://github.com/chrisandoryan/vuln-advisory/blob/main/nJwt/C CVE-2024-34308 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/README.md CVE-2024-34312 - https://github.com/vincentscode/CVE-2024-34312 CVE-2024-34313 - https://github.com/vincentscode/CVE-2024-34313 +CVE-2024-34327 - https://github.com/0xsu3ks/CVE-2024-34327 +CVE-2024-34328 - https://github.com/0xsu3ks/CVE-2024-34328 CVE-2024-34329 - https://github.com/pamoutaf/CVE-2024-34329/blob/main/README.md CVE-2024-34331 - https://khronokernel.com/macos/2024/05/30/CVE-2024-34331.html CVE-2024-34332 - https://belong2yourself.github.io/vulnerabilities/docs/SANDRA/Elevation-of-Privileges/readme/ CVE-2024-34340 - https://github.com/Cacti/cacti/security/advisories/GHSA-37x7-mfjv-mm7m +CVE-2024-34343 - https://github.com/nuxt/nuxt/security/advisories/GHSA-vf6r-87q4-2vjf CVE-2024-34345 - https://github.com/CycloneDX/cyclonedx-javascript-library/commit/5e5e1e0b9422f47d2de81c7c4064b803a01e7203 CVE-2024-34345 - https://github.com/CycloneDX/cyclonedx-javascript-library/pull/1063 CVE-2024-34345 - https://github.com/CycloneDX/cyclonedx-javascript-library/security/advisories/GHSA-38gf-rh2w-gmj7 @@ -101611,6 +101664,7 @@ CVE-2024-3476 - https://wpscan.com/vulnerability/46f74493-9082-48b2-90bc-2c1d1db CVE-2024-3477 - https://wpscan.com/vulnerability/ca5e59e6-c500-4129-997b-391cdf9aa9c7/ CVE-2024-3478 - https://wpscan.com/vulnerability/09f1a696-86ee-47cc-99de-57cfd2a3219d/ CVE-2024-3481 - https://wpscan.com/vulnerability/0c441293-e7f9-4634-8f3a-09925cd2b696/ +CVE-2024-34831 - https://github.com/enzored/CVE-2024-34831 CVE-2024-34833 - https://github.com/ShellUnease/payroll-management-system-rce CVE-2024-34833 - https://packetstormsecurity.com/files/179106/Payroll-Management-System-1.0-Remote-Code-Execution.html CVE-2024-34852 - https://github.com/Yang-Nankai/Vulnerabilities/blob/main/DataCube3%20Shell%20Code%20Injection.md @@ -101642,6 +101696,7 @@ CVE-2024-34974 - https://github.com/hunzi0/Vullnfo/tree/main/Tenda/AC18/formSetP CVE-2024-34987 - https://github.com/MarkLee131/PoCs/blob/main/CVE-2024-34987.md CVE-2024-34987 - https://www.exploit-db.com/exploits/51989 CVE-2024-34989 - https://security.friendsofpresta.org/modules/2024/06/20/prestapdf.html +CVE-2024-34990 - https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-06-18-helpdesk.md CVE-2024-34997 - https://github.com/joblib/joblib/issues/1582 CVE-2024-35009 - https://github.com/Thirtypenny77/cms/blob/main/5.md CVE-2024-35010 - https://github.com/Thirtypenny77/cms/blob/main/6.md @@ -102056,6 +102111,7 @@ CVE-2024-38353 - https://github.com/hackmdio/codimd/security/advisories/GHSA-276 CVE-2024-38354 - https://github.com/hackmdio/codimd/security/advisories/GHSA-22jv-vch8-2vp9 CVE-2024-38358 - https://github.com/wasmerio/wasmer/security/advisories/GHSA-55f3-3qvg-8pv5 CVE-2024-38359 - https://delvingbitcoin.org/t/dos-disclosure-lnd-onion-bomb/979 +CVE-2024-38365 - https://delvingbitcoin.org/t/cve-2024-38365-public-disclosure-btcd-findanddelete-bug/1184 CVE-2024-3837 - https://issues.chromium.org/issues/41491379 CVE-2024-38374 - https://github.com/CycloneDX/cyclonedx-core-java/security/advisories/GHSA-683x-4444-jxh8 CVE-2024-38394 - https://gitlab.gnome.org/GNOME/gnome-settings-daemon/-/issues/780 @@ -102513,6 +102569,7 @@ CVE-2024-41118 - https://securitylab.github.com/advisories/GHSL-2024-100_GHSL-20 CVE-2024-41119 - https://securitylab.github.com/advisories/GHSL-2024-100_GHSL-2024-108_streamlit-geospatial/ CVE-2024-4112 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/formSetVirtualSer.md CVE-2024-41120 - https://securitylab.github.com/advisories/GHSL-2024-100_GHSL-2024-108_streamlit-geospatial/ +CVE-2024-41121 - https://github.com/woodpecker-ci/woodpecker/issues/3924 CVE-2024-41127 - https://github.com/monkeytypegame/monkeytype/security/advisories/GHSA-wcjf-5464-4wq9 CVE-2024-41127 - https://securitylab.github.com/advisories/GHSL-2024-167_monkeytype CVE-2024-41129 - https://github.com/canonical/operator/security/advisories/GHSA-hcmv-jmqh-fjgm @@ -102533,6 +102590,7 @@ CVE-2024-41199 - https://gist.githubusercontent.com/john0x186/1d9cc7fcc8386480d2 CVE-2024-4120 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formIPMacBindModify.md CVE-2024-41209 - https://ricercasecurity.blogspot.com/2024/10/rezzuf0-day-cve-2024-41209.html CVE-2024-4121 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formQOSRuleDel.md +CVE-2024-41217 - https://github.com/justdan96/tsMuxer/issues/846 CVE-2024-4122 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetDebugCfg.md CVE-2024-41226 - https://medium.com/%40aksalsalimi/cve-2024-41226-response-manipulation-led-to-csv-injection-9ae3182dcc02 CVE-2024-41226 - https://medium.com/@aksalsalimi/cve-2024-41226-response-manipulation-led-to-csv-injection-9ae3182dcc02 @@ -102544,15 +102602,21 @@ CVE-2024-4127 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W1 CVE-2024-41281 - https://github.com/BuaaIOTTeam/Iot_Linksys/blob/main/Linksys_WRT54G_get_merge_mac.md CVE-2024-41332 - https://packetstormsecurity.com/files/179890/Computer-Laboratory-Management-System-1.0-Privilege-Escalation.html CVE-2024-41333 - https://packetstormsecurity.com/files/179891/Tourism-Management-System-2.0-Cross-Site-Scripting.html +CVE-2024-41344 - https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/264 +CVE-2024-41348 - https://github.com/jpatokal/openflights/issues/1478 CVE-2024-41353 - https://github.com/phpipam/phpipam/issues/4147 CVE-2024-41354 - https://github.com/phpipam/phpipam/issues/4150 CVE-2024-41355 - https://github.com/phpipam/phpipam/issues/4151 CVE-2024-41356 - https://github.com/phpipam/phpipam/issues/4146 +CVE-2024-41357 - https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2024-41357.md CVE-2024-41357 - https://github.com/phpipam/phpipam/issues/4149 CVE-2024-41358 - https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2024-41358.md CVE-2024-41358 - https://github.com/phpipam/phpipam/issues/4148 CVE-2024-41361 - https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2398 +CVE-2024-41366 - https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2399 +CVE-2024-41368 - https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2396 CVE-2024-41371 - https://github.com/causefx/Organizr/issues/1997 +CVE-2024-41372 - https://github.com/causefx/Organizr/issues/1999 CVE-2024-41373 - https://github.com/xjzzzxx/vulFound/blob/main/icecoder/icecoder8.1_PT.md CVE-2024-41374 - https://github.com/xjzzzxx/vulFound/blob/main/icecoder/icecoder8.1_xss2.md CVE-2024-41375 - https://github.com/xjzzzxx/vulFound/blob/main/icecoder/icecoder8.1_xss1.md @@ -102851,6 +102915,7 @@ CVE-2024-43403 - https://github.com/kanisterio/kanister/security/advisories/GHSA CVE-2024-43406 - https://github.com/lf-edge/ekuiper/security/advisories/GHSA-r5ph-4jxm-6j9p CVE-2024-43410 - https://github.com/Eugeny/russh/security/advisories/GHSA-vgvv-x7xg-6cqg CVE-2024-43415 - https://pentest.ait.ac.at/security-advisory/decidim-awesome-sql-injection-in-adminaccountability +CVE-2024-4348 - https://vuldb.com/?id.262488 CVE-2024-4348 - https://vuldb.com/?submit.320855 CVE-2024-4349 - https://github.com/CveSecLook/cve/issues/19 CVE-2024-4367 - https://bugzilla.mozilla.org/show_bug.cgi?id=1893645 @@ -102915,6 +102980,7 @@ CVE-2024-45052 - https://github.com/ethyca/fides/security/advisories/GHSA-2h46-8 CVE-2024-45057 - https://github.com/portabilis/i-educar/security/advisories/GHSA-fqwh-c3c8-7gwj CVE-2024-45058 - https://github.com/portabilis/i-educar/security/advisories/GHSA-53vj-fq8x-2mvg CVE-2024-45062 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-2071 +CVE-2024-4511 - https://vuldb.com/?id.263115 CVE-2024-4512 - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss.md CVE-2024-4512 - https://vuldb.com/?id.263116 CVE-2024-45163 - https://cypressthatkid.medium.com/remote-dos-exploit-found-in-mirai-botnet-source-code-27a1aad284f1 @@ -103001,6 +103067,7 @@ CVE-2024-4588 - https://github.com/Hckwzh/cms/blob/main/19.md CVE-2024-4589 - https://github.com/Hckwzh/cms/blob/main/20.md CVE-2024-4590 - https://github.com/Hckwzh/cms/blob/main/21.md CVE-2024-4591 - https://github.com/Hckwzh/cms/blob/main/22.md +CVE-2024-4591 - https://vuldb.com/?id.263313 CVE-2024-45918 - https://www.kirisun.com/ CVE-2024-4592 - https://github.com/Hckwzh/cms/blob/main/23.md CVE-2024-4593 - https://github.com/Hckwzh/cms/blob/main/24.md @@ -103080,6 +103147,7 @@ CVE-2024-47179 - https://securitylab.github.com/advisories/GHSL-2024-178_RSSHub CVE-2024-47182 - https://github.com/amir20/dozzle/security/advisories/GHSA-w7qr-q9fh-fj35 CVE-2024-47184 - https://github.com/ampache/ampache/security/advisories/GHSA-f99r-gv34-v46f CVE-2024-47186 - https://github.com/filamentphp/filament/security/advisories/GHSA-9h9q-qhxg-89xr +CVE-2024-47187 - https://redmine.openinfosecfoundation.org/issues/7209 CVE-2024-47212 - https://support.snowplow.io/hc/en-us/articles/26318139354909-Update-Critical-Snowplow-Security-Updates-Impact-on-Open-Source-Software-Users CVE-2024-47213 - https://support.snowplow.io/hc/en-us/articles/26318139354909-Update-Critical-Snowplow-Security-Updates-Impact-on-Open-Source-Software-Users CVE-2024-47214 - https://support.snowplow.io/hc/en-us/articles/26318139354909-Update-Critical-Snowplow-Security-Updates-Impact-on-Open-Source-Software-Users @@ -103094,6 +103162,7 @@ CVE-2024-4727 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management CVE-2024-4728 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_court.md CVE-2024-4729 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_expense-type.md CVE-2024-4730 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_judge.md +CVE-2024-4730 - https://vuldb.com/?id.263808 CVE-2024-4731 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_role.md CVE-2024-4732 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_service.md CVE-2024-4735 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_tasks.md @@ -103195,6 +103264,7 @@ CVE-2024-48605 - https://www.exploit-db.com/exploits/51461 CVE-2024-48655 - https://medium.com/%400x0d0x0a/cve-2024-48655-server-side-javascript-code-injection-in-total-js-cms-c5fc18359bdc CVE-2024-48766 - https://rhinosecuritylabs.com/research/cve-2024-46506-rce-in-netalertx/ CVE-2024-4879 - https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit +CVE-2024-48813 - https://gitee.com/lssrain/taskmatic/issues/IAUXOL CVE-2024-4886 - https://wpscan.com/vulnerability/76e8591f-120c-4cd7-b9a2-79f8d4d98aa8/ CVE-2024-48877 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-2128 CVE-2024-48905 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-082.txt @@ -103242,7 +103312,9 @@ CVE-2024-4950 - https://issues.chromium.org/issues/40065403 CVE-2024-49504 - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2024-49504 CVE-2024-4956 - https://support.sonatype.com/hc/en-us/articles/29416509323923 CVE-2024-4957 - https://wpscan.com/vulnerability/0a560ed4-7dec-4274-b4a4-39dea0c0d67e/ +CVE-2024-49576 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-2093 CVE-2024-49581 - https://palantir.safebase.us/?tcuUid=b60db1ee-4b1a-475d-848e-c5a670a0da16 +CVE-2024-49588 - https://palantir.safebase.us/?tcuUid=b5724367-8b86-436a-8ef2-4480ec41cc2c CVE-2024-49589 - https://palantir.safebase.us/?tcuUid=ad6b08b1-2f79-4e32-b125-406dd2b9b1c3 CVE-2024-4959 - https://wpscan.com/vulnerability/449e4da8-beae-4ff6-9ddc-0e17781c0391/ CVE-2024-49592 - https://www.mcafee.com/support/s/article/000002516?language=en_US @@ -103456,6 +103528,7 @@ CVE-2024-51997 - https://github.com/confidential-containers/trustee/security/adv CVE-2024-51998 - https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-6jrf-rcjf-245r CVE-2024-52035 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-2131 CVE-2024-5217 - https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit +CVE-2024-52293 - https://github.com/craftcms/cms/security/advisories/GHSA-f3cw-hg6r-chfv CVE-2024-52333 - https://git.dcmtk.org/?p=dcmtk.git;a=commit;h=03e851b0586d05057c3268988e180ffb426b2e03 CVE-2024-52336 - https://security.opensuse.org/2024/11/26/tuned-instance-create.html CVE-2024-52336 - https://www.openwall.com/lists/oss-security/2024/11/28/1 @@ -103469,6 +103542,7 @@ CVE-2024-52602 - https://learn.snyk.io/lesson/ssrf-server-side-request-forgery CVE-2024-5274 - https://issues.chromium.org/issues/341663589 CVE-2024-5276 - https://www.tenable.com/security/research/tra-2024-25 CVE-2024-52765 - http://tjr181.com/2024/11/08/H3C%20GR-1800AX/ +CVE-2024-52786 - https://gitee.com/fushuling/cve/blob/master/CVE-2024-52786.md CVE-2024-5280 - https://wpscan.com/vulnerability/bbc214ba-4e97-4b3a-a21b-2931a9e36973/ CVE-2024-5281 - https://wpscan.com/vulnerability/3c0bdb0f-a06a-47a8-9198-a2bf2678b8f1/ CVE-2024-5282 - https://wpscan.com/vulnerability/bf3fb97e-12fa-4b37-b28b-1771ddb5ceb1/ @@ -103489,6 +103563,7 @@ CVE-2024-5290 - https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/2067613 CVE-2024-5290 - https://snyk.io/blog/abusing-ubuntu-root-privilege-escalation/ CVE-2024-52917 - https://bitcoincore.org/en/2024/07/31/disclose-upnp-oom/ CVE-2024-52918 - https://bitcoincore.org/en/2024/07/03/disclose-bip70-crash/ +CVE-2024-52951 - https://r.sec-consult.com/omada CVE-2024-52951 - https://sec-consult.com/vulnerability-lab/advisory/stored-cross-site-scripting-in-omada-identity/ CVE-2024-5310 - https://gitee.com/heyewei/JFinalcms/issues/I8VHM2 CVE-2024-5318 - https://gitlab.com/gitlab-org/gitlab/-/issues/427526 @@ -103502,6 +103577,7 @@ CVE-2024-53376 - https://thottysploity.github.io/posts/cve-2024-53376 CVE-2024-53408 - https://cosmosofcyberspace.github.io/ave-system-cve.html CVE-2024-53442 - https://1d8.github.io/cves/cve_2024_53442/ CVE-2024-53499 - https://gitee.com/erzhongxmu/JEEWMS/issues/IB2XZG +CVE-2024-53499 - https://gitee.com/fushuling/cve/blob/master/CVE-2024-53499.md CVE-2024-5350 - https://github.com/anji-plus/report/files/15363269/aj-report.pdf CVE-2024-5351 - https://github.com/anji-plus/report/files/15363269/aj-report.pdf CVE-2024-5352 - https://github.com/anji-plus/report/files/15363269/aj-report.pdf @@ -103580,6 +103656,7 @@ CVE-2024-54808 - https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-ju CVE-2024-54809 - https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#809 CVE-2024-54879 - https://blog.csdn.net/weixin_46686336/article/details/144797242 CVE-2024-5488 - https://wpscan.com/vulnerability/28507376-ded0-4e1a-b2fc-2182895aa14c/ +CVE-2024-54954 - https://gitee.com/yadong.zhang/DBlog/issues/IB6552 CVE-2024-5499 - https://issues.chromium.org/issues/339877167 CVE-2024-55009 - https://medium.com/@r3dd1t/poc-cve-0b3ad0535631 CVE-2024-55074 - https://m10x.de/posts/2024/11/all-your-recipe-are-belong-to-us-part-1/3-stored-xss-csrf-and-broken-access-control-vulnerabilities-in-grocy/ @@ -103698,8 +103775,14 @@ CVE-2024-5772 - https://github.com/charliecatsec/cve1/blob/main/NS-ASG-sql-delet CVE-2024-5773 - https://github.com/L1OudFd8cl09/CVE/issues/3 CVE-2024-5774 - https://github.com/CveSecLook/cve/issues/43 CVE-2024-5775 - https://github.com/CveSecLook/cve/issues/44 +CVE-2024-57757 - https://gitee.com/erzhongxmu/JEEWMS/issues/IBFKBM +CVE-2024-57764 - https://gitee.com/wanglingxiao/mysiteforme/issues/IBFVCZ CVE-2024-57766 - https://gitee.com/wanglingxiao/mysiteforme/issues/IBFVHR +CVE-2024-57770 - https://gitee.com/r1bbit/JFinalOA/issues/IBHUP1 CVE-2024-57773 - https://gitee.com/r1bbit/JFinalOA/issues/IBHUQ9 +CVE-2024-57774 - https://gitee.com/r1bbit/JFinalOA/issues/IBHUQQ +CVE-2024-57822 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067896 +CVE-2024-57823 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067896 CVE-2024-5792 - https://favethemes.zendesk.com/hc/en-us/articles/360041639432-Changelog CVE-2024-5793 - https://favethemes.zendesk.com/hc/en-us/articles/360041639432-Changelog CVE-2024-5799 - https://wpscan.com/vulnerability/3ee3023a-541c-40e6-8d62-24b4b110633c/ @@ -103739,6 +103822,7 @@ CVE-2024-5984 - https://github.com/LiuYongXiang-git/cve/issues/3 CVE-2024-5985 - https://github.com/CveSecLook/cve/issues/45 CVE-2024-6006 - https://vuldb.com/?submit.351403 CVE-2024-6007 - https://github.com/SecureF1sh/findings/blob/main/ns_sqli.md +CVE-2024-6007 - https://vuldb.com/?id.268695 CVE-2024-6008 - https://github.com/1902zdq/cve/issues/1 CVE-2024-6009 - https://github.com/AutoZhou1/cve/issues/1 CVE-2024-6011 - https://drive.google.com/file/d/1SFQXlRUQw7THm_Vay_pFH3pIX1cjH4AY/view?usp=sharing @@ -103759,6 +103843,7 @@ CVE-2024-6026 - https://wpscan.com/vulnerability/01609d84-e9eb-46a9-b2cc-fe7e0c9 CVE-2024-6041 - https://github.com/ssiicckk/cve/issues/1 CVE-2024-6042 - https://github.com/Cormac315/cve/issues/1 CVE-2024-6043 - https://github.com/yezzzo/y3/blob/main/SourceCodester%20Best%20house%20rental%20management%20system%20project%20in%20php%201.0%20SQL%20Injection.md +CVE-2024-6049 - https://r.sec-consult.com/lawo CVE-2024-6055 - https://devolutions.net/security/advisories/DEVO-2024-0008 CVE-2024-6057 - https://devolutions.net/security/advisories/DEVO-2024-0008 CVE-2024-6061 - https://github.com/gpac/gpac/issues/2871 @@ -103827,6 +103912,7 @@ CVE-2024-6271 - https://wpscan.com/vulnerability/44d9d085-34cb-490f-a3f5-f9eafae CVE-2024-6272 - https://wpscan.com/vulnerability/146b94df-7fc6-4da3-9ef1-d2875ae3fa9e/ CVE-2024-6273 - https://docs.google.com/document/d/14ExrgXqPQlgvjw2poqNzYzAOi-C5tda-XBJF513yzag/edit?usp=sharing CVE-2024-6273 - https://github.com/sgr-xd/CVEs/blob/main/CVE-2024-6273.md +CVE-2024-6274 - https://vuldb.com/?id.269487 CVE-2024-6289 - https://wpscan.com/vulnerability/fd6d0362-df1d-4416-b8b5-6e5d0ce84793/ CVE-2024-6291 - https://issues.chromium.org/issues/40942995 CVE-2024-6308 - https://github.com/L1OudFd8cl09/CVE/blob/main/25_06_2024_a.md @@ -103838,6 +103924,7 @@ CVE-2024-6362 - https://wpscan.com/vulnerability/d2e2d06b-0f07-40b9-9b87-3373f62 CVE-2024-6366 - https://wpscan.com/vulnerability/5b90cbdd-52cc-4e7b-bf39-bea0dd59e19e/ CVE-2024-6371 - https://github.com/L1OudFd8cl09/CVE/blob/main/25_06_2024_b.md CVE-2024-6372 - https://github.com/Galaxy-lrc/cve/issues/1 +CVE-2024-6372 - https://vuldb.com/?id.269805 CVE-2024-6373 - https://github.com/Abyssun/abyssun-/issues/1 CVE-2024-6386 - https://sec.stealthcopter.com/wpml-rce-via-twig-ssti/ CVE-2024-6387 - http://seclists.org/fulldisclosure/2024/Jul/18 @@ -103890,6 +103977,7 @@ CVE-2024-6531 - https://www.herodevs.com/vulnerability-directory/cve-2024-6531 CVE-2024-6533 - https://fluidattacks.com/advisories/bocelli CVE-2024-6534 - https://fluidattacks.com/advisories/capaldi CVE-2024-6536 - https://wpscan.com/vulnerability/ee40c1c6-4186-4b97-866c-fb0e76cedeb8/ +CVE-2024-6539 - https://gitee.com/heyewei/SpringBootCMS/issues/IA9D7F CVE-2024-6584 - https://wpscan.com/vulnerability/eaa57c8c-1cac-4903-9763-79f7f84469fa/ CVE-2024-6600 - https://bugzilla.mozilla.org/show_bug.cgi?id=1888340 CVE-2024-6602 - https://bugzilla.mozilla.org/show_bug.cgi?id=1895032 @@ -103944,6 +104032,7 @@ CVE-2024-6732 - https://vuldb.com/?submit.374370 CVE-2024-6733 - https://github.com/jiaoyanshuai/cve/issues/1 CVE-2024-6734 - https://github.com/jiaoyanshuai/cve/issues/2 CVE-2024-6735 - https://github.com/xzyxiaohaha/cve/issues/1 +CVE-2024-6736 - https://vuldb.com/?id.271457 CVE-2024-6745 - https://github.com/xzyxiaohaha/cve/issues/2 CVE-2024-6746 - https://github.com/NaiboWang/EasySpider/issues/466 CVE-2024-6766 - https://wpscan.com/vulnerability/77bb1dcf-4e84-497a-955e-f3c0b649ad1c/ @@ -104500,6 +104589,11 @@ CVE-2024-8245 - https://wpscan.com/vulnerability/3fb6292c-502c-481a-8223-ecda03d CVE-2024-8283 - https://wpscan.com/vulnerability/a60aed55-c0a2-4912-8844-cdddf31d90b6/ CVE-2024-8284 - https://wpscan.com/vulnerability/93e38b8c-8a2e-4264-b520-ebdbe995d61e/ CVE-2024-8286 - https://wpscan.com/vulnerability/628bbac0-76b1-4666-9c00-bae84b48f85c/ +CVE-2024-8294 - https://gitee.com/A0kooo/cve_article/blob/master/feehi_cms/Fichkems%20Friendley-Link%20file%20upload%20vulnerability.md +CVE-2024-8295 - https://gitee.com/A0kooo/cve_article/blob/master/feehi_cms/file_upload2/Fichkems%20banner%20file%20upload%20vulnerability.md +CVE-2024-8296 - https://gitee.com/A0kooo/cve_article/blob/master/feehi_cms/file_upload3/Fichkems%20user%20file%20upload%20vulnerability.md +CVE-2024-8331 - https://gitee.com/A0kooo/cve_article/blob/master/RapidCMS/SQL%20injection1/rapidcms%20user-move-run.php%20SQL%20injection.md +CVE-2024-8335 - https://gitee.com/A0kooo/cve_article/blob/master/RapidCMS/SQL%20injection2/rapidcms%20runlogon.php%20SQL%20injection.md CVE-2024-8362 - https://issues.chromium.org/issues/357391257 CVE-2024-8372 - https://www.herodevs.com/vulnerability-directory/cve-2024-8372 CVE-2024-8373 - https://www.herodevs.com/vulnerability-directory/cve-2024-8373 @@ -104560,6 +104654,7 @@ CVE-2024-8909 - https://issues.chromium.org/issues/341353783 CVE-2024-8945 - https://bytium.com/sql-injection-vulnerability-identified-in-rise-crm/ CVE-2024-8968 - https://wpscan.com/vulnerability/cab4d23e-e857-4b2f-b1ca-fbafd37524e0/ CVE-2024-8983 - https://wpscan.com/vulnerability/29194dde-8d11-4096-a5ae-1d69c2c5dc33/ +CVE-2024-9001 - https://github.com/C9Y57/TOTOLINK_setTracerouteCfg/blob/main/setTracerouteCfg.md CVE-2024-9006 - https://github.com/jeanmarc77/123solar/issues/74 CVE-2024-9006 - https://github.com/jeanmarc77/123solar/issues/74#issuecomment-2357653441 CVE-2024-9007 - https://github.com/jeanmarc77/123solar/issues/73 @@ -104569,6 +104664,7 @@ CVE-2024-9011 - https://github.com/ppp-src/a/issues/14 CVE-2024-9020 - https://wpscan.com/vulnerability/6caa4e5d-8112-4d00-8e97-b41df611a071/ CVE-2024-9021 - https://wpscan.com/vulnerability/5f25646d-b80b-40b1-bcaf-3b860ddc4059/ CVE-2024-9026 - https://github.com/php/php-src/security/advisories/GHSA-865w-9rf3-2wh5 +CVE-2024-9033 - https://github.com/para-paradise/webray.com.cn/blob/main/Best%20house%20rental%20management%20system%20project%20in%20php/Best%20house%20rental%20management%20system%20project%20in%20php%20Stored%20Cross-Site%20Scripting(XSS)%20vulnerability.md CVE-2024-9034 - https://github.com/keepgoing2077/cve/issues/1 CVE-2024-9036 - https://github.com/Kinsomnia/cve/blob/main/upload/upload.md CVE-2024-9037 - https://github.com/L1OudFd8cl09/CVE/blob/main/20_09_2024_a.md @@ -104614,6 +104710,7 @@ CVE-2024-9294 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/dingfan CVE-2024-9295 - https://github.com/para-paradise/webray.com.cn/blob/main/Advocate%20office%20management%20system/Advocate%20office%20management%20system%20login.php%20time-based%20SQL%20Injection%20Vulnerability.md CVE-2024-9296 - https://github.com/para-paradise/webray.com.cn/blob/main/Advocate%20office%20management%20system/Advocate%20office%20management%20system%20forgot_pass.php%20time-based%20SQL%20Injection%20Vulnerability.md CVE-2024-9316 - https://github.com/cookie5201314/CVE/blob/main/sql2.md +CVE-2024-9318 - https://github.com/para-paradise/webray.com.cn/blob/main/Advocate%20office%20management%20system/Advocate%20office%20management%20system%20activate.php%20error-based%20SQL%20Injection%20Vulnerability.md CVE-2024-9327 - https://github.com/Lynn1236-cell/cve1/blob/main/sql3.md CVE-2024-9328 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/2024/Advocate%20office%20management%20system%20-%20edit_client.php%20sql%20injection%20vulnerability.md CVE-2024-9329 - https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/232 @@ -104690,6 +104787,7 @@ CVE-2024-9831 - https://wpscan.com/vulnerability/390baaf8-a162-43e5-9367-0d2e979 CVE-2024-9835 - https://wpscan.com/vulnerability/0277b060-805d-4b85-b5a4-fa93a731cd8d/ CVE-2024-9836 - https://wpscan.com/vulnerability/f87af54e-3e58-4c29-8a30-e7d52234c9d4/ CVE-2024-9838 - https://wpscan.com/vulnerability/3cc0ff78-b310-40a4-899c-15fecbb345c5/ +CVE-2024-9855 - https://github.com/DeepMountains/zzz/blob/main/CVE6-1.md CVE-2024-9856 - https://github.com/DeepMountains/zzz/blob/main/CVE6-2.md CVE-2024-9875 - https://help.okta.com/asa/en-us/content/topics/releasenotes/advanced-server-access-release-notes.htm CVE-2024-9879 - https://wpscan.com/vulnerability/cda54097-4aec-472e-a73f-31ecb76ebb23/ @@ -104697,6 +104795,7 @@ CVE-2024-9881 - https://wpscan.com/vulnerability/ec76f73a-7ad4-432d-8216-7cdb560 CVE-2024-9882 - https://wpscan.com/vulnerability/7f7667fd-6ac6-4c90-aaf0-c7862bd8e9bd/ CVE-2024-9883 - https://wpscan.com/vulnerability/ea4b277e-ef47-4e38-bd82-c5a54a95372f/ CVE-2024-9894 - https://github.com/siyuancn-hub/cve/blob/main/sql7-.md +CVE-2024-9903 - https://github.com/DeepMountains/Mirage/blob/main/CVE19-1.md CVE-2024-9904 - https://github.com/DeepMountains/Mirage/blob/main/CVE19-2.md CVE-2024-9905 - https://gist.github.com/higordiego/8679961c9d732e4068aaa37fd8d01439 CVE-2024-9906 - https://gist.github.com/higordiego/1c1e1709a6832cb63bbe9e9328f55ff9 @@ -104734,6 +104833,9 @@ CVE-2025-0289 - https://paragon-software.zendesk.com/hc/en-us/articles/329939027 CVE-2025-0291 - https://issues.chromium.org/issues/383356864 CVE-2025-0329 - https://wpscan.com/vulnerability/db101819-4404-46c9-a02e-b1b1b7ace11e/ CVE-2025-0368 - https://wpscan.com/vulnerability/6a4f7097-082b-4375-9582-945928d765b8/ +CVE-2025-0390 - https://gitee.com/erzhongxmu/JEEWMS/issues/IBFKBM +CVE-2025-0391 - https://gitee.com/erzhongxmu/JEEWMS/issues/IBFKA8 +CVE-2025-0392 - https://gitee.com/erzhongxmu/JEEWMS/issues/IBFK93 CVE-2025-0395 - https://www.openwall.com/lists/oss-security/2025/01/22/4 CVE-2025-0396 - https://winslow1984.com/books/cve-collection/page/stats-v21122-local-privilege-escalation CVE-2025-0432 - https://support.hms-networks.com/hc/en-us/articles/19393244940818-How-to-block-all-the-unused-Ewon-Flexy-Cosy131-services-on-the-LAN-WAN-and-or-VPN-interface @@ -104773,6 +104875,7 @@ CVE-2025-0867 - https://www.first.org/cvss/calculator/3.1 CVE-2025-0995 - https://issues.chromium.org/issues/391907159 CVE-2025-10011 - https://github.com/marcelomulder/CVE/blob/main/i-educar/SQL%20Injection%20(Blind%20Time-Based)%20Vulnerability%20in%20%60id%60%20Parameter%20on%20%60.module.TabelaArredondamento.edit%60%20Endpoint.md CVE-2025-10012 - https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10012.md +CVE-2025-10012 - https://github.com/marcelomulder/CVE/blob/main/i-educar/SQL%20Injection%20(Blind%20Time-Based)%20Vulnerability%20in%20ref_cod_aluno%20Parameter%20on%20educar_historico_escolar_lst.php%20Endpoint.md CVE-2025-10013 - https://github.com/marcelomulder/CVE/blob/main/i-educar/Broken%20Access%20Control%20Vulnerability%20%20in%20%60exportacao-para-o-seb%60%20Endpoint.md CVE-2025-10013 - https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10013.md CVE-2025-10014 - https://www.cnblogs.com/aibot/p/19063332 @@ -104788,6 +104891,7 @@ CVE-2025-10062 - https://github.com/hjsjbsg/record-for-own/issues/3 CVE-2025-10068 - https://github.com/JunGu-W/cve/issues/13 CVE-2025-10070 - https://github.com/marcelomulder/CVE/blob/main/i-educar/Broken%20Access%20Control%20Vulnerability%20%20in%20%60.enturmacao-em-lote.(ID)%60%20Endpoint.md CVE-2025-10070 - https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10070.md +CVE-2025-10071 - https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10071.md CVE-2025-10072 - https://github.com/marcelomulder/CVE/blob/main/i-educar/Broken%20Access%20Control%20%20in%20.matricula.(ID_STUDENT).enturmar.(ID_CLASS)%60%20Endpoint.md CVE-2025-10072 - https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10072.md CVE-2025-10073 - https://github.com/marcelomulder/CVE/blob/main/i-educar/Broken%20Object%20Level%20Authorization%20(BOLA)%20allows%20enumeration%20of%20classes%20informations%20via%20.module.Api.turma.md @@ -104844,13 +104948,17 @@ CVE-2025-10155 - https://github.com/mmaitre314/picklescan/security/advisories/GH CVE-2025-10156 - https://github.com/mmaitre314/picklescan/security/advisories/GHSA-mjqp-26hc-grxg CVE-2025-10157 - https://github.com/mmaitre314/picklescan/security/advisories/GHSA-f7qq-56ww-84cr CVE-2025-10169 - https://github.com/lin-3-start/lin-cve/blob/main/UTT%201200GW-1/UTT%201200GW-1.md +CVE-2025-10170 - https://github.com/lin-3-start/lin-cve/blob/main/UTT%201200GW-2/UTT%201200GW-2.md +CVE-2025-10172 - https://github.com/cymiao1978/cve/blob/main/1.md CVE-2025-10184 - https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/bltd4b7439a28b6c866/68d168a6930d015d43a6b588/CVE-2025-10184_PoC.zip CVE-2025-10184 - https://www.rapid7.com/blog/post/cve-2025-10184-oneplus-oxygenos-telephony-provider-permission-bypass-not-fixed/ CVE-2025-10195 - https://github.com/KMov-g/androidapps/blob/main/com.seismic.doccenter.md CVE-2025-10195 - https://github.com/KMov-g/androidapps/blob/main/com.seismic.doccenter.md#steps-to-reproduce +CVE-2025-10197 - https://github.com/eeeeeekkkkkkkk/POC/blob/main/%E5%AE%8F%E6%99%AFHCM%20%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fdownlawbase%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md CVE-2025-1022 - https://security.snyk.io/vuln/SNYK-PHP-SPATIEBROWSERSHOT-8496747 CVE-2025-10234 - https://medium.com/@warlleyfreire/stored-xss-in-scada-lts-data-point-edit-42c7383402f0 CVE-2025-10235 - https://medium.com/@warlleyfreire/stored-xss-in-scada-lts-reports-module-colour-field-4d7e6633d298 +CVE-2025-10236 - https://github.com/d3do-23/cvelist/blob/main/gpt_academic/Plugins_LFI.md CVE-2025-10245 - https://github.com/lfparizzi/CVE-TGA-7.1.41/tree/main CVE-2025-1025 - https://security.snyk.io/vuln/SNYK-PHP-COCKPITHQCOCKPIT-8516320 CVE-2025-10253 - https://github.com/lam-sec/openDCIMpoc @@ -104876,6 +104984,8 @@ CVE-2025-1033 - https://wpscan.com/vulnerability/cbb63e80-92aa-4e85-9d47-dc68211 CVE-2025-10330 - https://github.com/YZS17/CVE/blob/main/unmark/xss1.md#poc CVE-2025-10331 - https://github.com/YZS17/CVE/blob/main/unmark/xss2.md CVE-2025-10332 - https://github.com/YZS17/CVE/blob/main/unmark/xss2.md +CVE-2025-10340 - https://github.com/YZS17/CVE/blob/main/Gazelle/xss1.md +CVE-2025-10340 - https://github.com/YZS17/CVE/blob/main/Gazelle/xss1.md#poc CVE-2025-10358 - https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/wireless.cgi/DeleteMac CVE-2025-10358 - https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/wireless.cgi/DeleteMac#proof-of-concept-poc CVE-2025-10359 - https://github.com/ZZ2266/.github.io/blob/main/WAVLINK/WL-WN578W2/wireless.cgi/add_mac/ @@ -104883,6 +104993,8 @@ CVE-2025-10359 - https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578 CVE-2025-10360 - https://portal.perforce.com/s/cve/a91PA000001Smp7YAC/insufficiently-protected-credentials-in-puppet-enterprise-20254-and-20255 CVE-2025-10366 - https://github.com/YZS17/CVE/blob/main/RPi-Jukebox-RFID/xss1.md CVE-2025-10366 - https://github.com/YZS17/CVE/blob/main/RPi-Jukebox-RFID/xss1.md#poc +CVE-2025-10367 - https://github.com/YZS17/CVE/blob/main/RPi-Jukebox-RFID/xss2.md +CVE-2025-10367 - https://github.com/YZS17/CVE/blob/main/RPi-Jukebox-RFID/xss2.md#poc CVE-2025-10368 - https://github.com/YZS17/CVE/blob/main/RPi-Jukebox-RFID/xss3.md CVE-2025-10368 - https://github.com/YZS17/CVE/blob/main/RPi-Jukebox-RFID/xss3.md#poc CVE-2025-10369 - https://github.com/YZS17/CVE/blob/main/RPi-Jukebox-RFID/xss4.md @@ -104892,6 +105004,7 @@ CVE-2025-10370 - https://github.com/YZS17/CVE/blob/main/RPi-Jukebox-RFID/xss6.md CVE-2025-10371 - https://github.com/YZS17/CVE/blob/main/Salia_PLCC/file-write-api.php.md CVE-2025-10371 - https://github.com/YZS17/CVE/blob/main/Salia_PLCC/file-write-api.php.md#poc CVE-2025-10386 - https://github.com/1276486/CVE/issues/10 +CVE-2025-10387 - https://github.com/YZS17/CVE/blob/main/Jasmin-Ransomware/sqli_handshake.php.md CVE-2025-10388 - https://gist.github.com/KhanMarshaI/584ae9d7ba8578ac040a0f89597fc3c1 CVE-2025-10393 - https://github.com/miurla/morphic/issues/670 CVE-2025-10394 - https://github.com/Yyjccc/CVE/issues/1 @@ -104921,12 +105034,14 @@ CVE-2025-10424 - https://github.com/lan041221/cvec/issues/22 CVE-2025-10425 - https://github.com/lan041221/cvec/issues/23 CVE-2025-10426 - https://github.com/HAO-RAY/HCR-CVE/issues/3 CVE-2025-10427 - https://github.com/joinia/webray.com.cn/blob/main/Pet-grooming-management-software/petgrooming-upload-user.md +CVE-2025-10429 - https://github.com/joinia/webray.com.cn/blob/main/Pet-grooming-management-software/petgrooming-sql-ajaxpro.md CVE-2025-10430 - https://github.com/joinia/webray.com.cn/blob/main/Pet-grooming-management-software/petgrooming-sql-barcode.md CVE-2025-10431 - https://github.com/joinia/webray.com.cn/blob/main/Pet-grooming-management-software/petgrooming-sql-ajaxrepresent.md CVE-2025-10432 - https://github.com/M4st3rYi/IoTVulPocs/blob/main/Tenda/AC1206/fromAdvSetMacMtuWan.md CVE-2025-10435 - https://github.com/ldz23/cve/issues/1 CVE-2025-10436 - https://github.com/ldz23/cve/issues/2 CVE-2025-1044 - https://support.logsign.net/hc/en-us/articles/22076844908946-18-10-2024-Version-6-4-32-Release-Notes +CVE-2025-10440 - https://github.com/2664521593/mycve/blob/main/D-Link/D-Link_CJ_1.md CVE-2025-10440 - https://github.com/2664521593/mycve/blob/main/D-Link/D-Link_CJ_1.md#exp CVE-2025-10441 - https://github.com/2664521593/mycve/blob/main/D-Link/D-Link_CJ_2.md CVE-2025-10441 - https://github.com/2664521593/mycve/blob/main/D-Link/D-Link_CJ_2.md#poc @@ -104966,8 +105081,11 @@ CVE-2025-10601 - https://github.com/qcycop0101-hash/CVE/issues/19 CVE-2025-10602 - https://github.com/qcycop0101-hash/CVE/issues/20 CVE-2025-10603 - https://github.com/maximdevere/cve/issues/1 CVE-2025-10604 - https://github.com/maximdevere/cve/issues/2 +CVE-2025-10605 - https://github.com/marcelomulder/CVE/blob/main/i-educar/Cross-Site%20Scripting%20(XSS)%20Reflected%20endpoint%20%60agenda_preferencias.php%60%20parameter%20%60tipoacao%60.md CVE-2025-10606 - https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10606.md +CVE-2025-10606 - https://github.com/marcelomulder/CVE/blob/main/i-educar/Cross-Site%20Scripting%20(XSS)%20Reflected%20endpoint%20%60.module.Configuracao.ConfiguracaoMovimentoGeral%60%20parameter%20%60tipoacao%60.md CVE-2025-10607 - https://github.com/marcelomulder/CVE/blob/main/i-educar/Broken%20Object%20Level%20Authorization%20(BOLA)%20allows%20enumeration%20of%20classes%20informations%20via%20.module.Avaliacao.diarioApi.md +CVE-2025-10607 - https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10607.md CVE-2025-10608 - https://github.com/marcelomulder/CVE/blob/main/i-educar/Broken%20Access%20Control%20Vulnerability%20%20in%20%60.enrollment-history.(ID)%60%20Endpoint.md CVE-2025-10613 - https://github.com/jianx0i/CVE/issues/1 CVE-2025-10614 - https://github.com/yihaofuweng/cve/issues/22 @@ -104992,6 +105110,8 @@ CVE-2025-10665 - https://github.com/qi-wm/cve/issues/1 CVE-2025-10667 - https://github.com/S77code/CVE1/issues/1 CVE-2025-10668 - https://github.com/S77code/CVE1/issues/3 CVE-2025-10670 - https://github.com/yihaofuweng/cve/issues/25 +CVE-2025-10672 - https://github.com/SwayZGl1tZyyy/n-days/blob/main/AIBattery-Charge-Limiter/README.md +CVE-2025-10672 - https://github.com/SwayZGl1tZyyy/n-days/blob/main/AIBattery-Charge-Limiter/README.md#proof-of-concept CVE-2025-10673 - https://github.com/windhxy/CVE-my/issues/1 CVE-2025-10674 - https://www.cnblogs.com/aibot/p/19063429 CVE-2025-10675 - https://www.cnblogs.com/aibot/p/19063430 @@ -105010,6 +105130,7 @@ CVE-2025-10717 - https://github.com/KMov-g/androidapps/blob/main/com.intsig.cams CVE-2025-10718 - https://github.com/KMov-g/androidapps/blob/main/com.ooma.office2.md CVE-2025-10721 - https://github.com/KMov-g/androidapps/blob/main/org.dayup.stocks.md CVE-2025-10721 - https://github.com/KMov-g/androidapps/blob/main/org.dayup.stocks.md#steps-to-reproduce +CVE-2025-10722 - https://github.com/KMov-g/androidapps/blob/main/com.dw.android.mukbee.md CVE-2025-10722 - https://github.com/KMov-g/androidapps/blob/main/com.dw.android.mukbee.md#steps-to-reproduce CVE-2025-10741 - https://gist.github.com/KhanMarshaI/7a2e74fcb194f7d6ee7e60da4a14af7b CVE-2025-10741 - https://gist.github.com/KhanMarshaI/ba3e74b331ce4ab602a5a22a59aaf819 @@ -105041,6 +105162,7 @@ CVE-2025-10784 - https://github.com/zzb1388/cve/issues/85 CVE-2025-10785 - https://github.com/zzb1388/cve/issues/84 CVE-2025-10785 - https://github.com/zzb1388/cve/issues/89 CVE-2025-10786 - https://github.com/zzb1388/cve/issues/83 +CVE-2025-10788 - https://github.com/peri0d/my_cve/blob/main/Online-Hotel-Reservation-System-In-PHP-With-Source-Code-deleteroominventory.php-sql-injection.md CVE-2025-1079 - https://balintmagyar.com/articles/google-web-designer-symlink-client-side-rce-cve-2025-1079 CVE-2025-10790 - https://github.com/qcycop0101-hash/CVE/issues/26 CVE-2025-10791 - https://github.com/K1nakoo/cve/blob/main/26/report.md @@ -105114,7 +105236,9 @@ CVE-2025-10960 - https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/ CVE-2025-10961 - https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/Delete_Mac_list.md CVE-2025-10962 - https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/SetName.md CVE-2025-10962 - https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/SetName.md#poc +CVE-2025-10963 - https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/singlePortForwardDelete.md CVE-2025-10963 - https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/singlePortForwardDelete.md#poc +CVE-2025-10964 - https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/websSysFirewall.md CVE-2025-10964 - https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/websSysFirewall.md#poc CVE-2025-10965 - https://github.com/LazyAGI/LazyLLM/issues/764 CVE-2025-10967 - https://github.com/Miker132/CVE-/issues/3 @@ -105148,6 +105272,7 @@ CVE-2025-10999 - https://github.com/user-attachments/files/22318503/poc.zip CVE-2025-11015 - https://vuldb.com/?id.325958 CVE-2025-11039 - https://vuldb.com/?id.325986 CVE-2025-11053 - https://vuldb.com/?id.326093 +CVE-2025-11055 - https://vuldb.com/?id.326095 CVE-2025-1113 - https://gitee.com/taisan/tarzan-cms/issues/IBHZ0J CVE-2025-1122 - https://issuetracker.google.com/issues/324336238 CVE-2025-1193 - https://devolutions.net/security/advisories/DEVO-2025-0001/ @@ -105296,6 +105421,7 @@ CVE-2025-1939 - https://bugzilla.mozilla.org/show_bug.cgi?id=1928334 CVE-2025-1940 - https://bugzilla.mozilla.org/show_bug.cgi?id=1908488 CVE-2025-1944 - https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1944 CVE-2025-1945 - https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1945 +CVE-2025-1964 - https://vuldb.com/?submit.511471 CVE-2025-1986 - https://wpscan.com/vulnerability/f1414750-19ee-4a5d-b255-a9c20168b716/ CVE-2025-2003 - https://devolutions.net/security/advisories/DEVO-2025-0003/ CVE-2025-20128 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA @@ -105309,15 +105435,18 @@ CVE-2025-20188 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSe CVE-2025-20221 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-bypass-HHUVujdn CVE-2025-20240 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-xss-VWyDgjOU CVE-2025-20286 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-aws-static-cred-FPMjUcm7 +CVE-2025-2033 - https://github.com/intercpt/XSS1/blob/main/SQL.md CVE-2025-2037 - https://github.com/intercpt/XSS1/blob/main/SQL1.md CVE-2025-2038 - https://github.com/intercpt/XSS1/blob/main/Directorylisting.md CVE-2025-2040 - https://github.com/uglory-gll/javasec/blob/main/ruoyi-vue-pro.md +CVE-2025-2044 - https://github.com/intercpt/XSS1/blob/main/SQL5.md CVE-2025-2048 - https://wpscan.com/vulnerability/05c664e8-110e-4a31-8377-41a0422508a7/ CVE-2025-2049 - https://github.com/ABC-YOLO/cve/blob/main/xss45.md CVE-2025-2050 - https://github.com/guttlefish/vul/issues/8 CVE-2025-2051 - https://github.com/guttlefish/vul/issues/9 CVE-2025-2052 - https://github.com/guttlefish/vul/issues/10 CVE-2025-2053 - https://github.com/guttlefish/vul/issues/11 +CVE-2025-2054 - https://github.com/intercpt/XSS1/blob/main/SQL6.md CVE-2025-2055 - https://wpscan.com/vulnerability/a8bfdbbf-6963-4fab-826a-6be770ac72c3/ CVE-2025-2060 - https://github.com/siznwaa/CVE/issues/3 CVE-2025-2062 - https://github.com/akjedfha/cve/issues/1 @@ -105327,9 +105456,11 @@ CVE-2025-2066 - https://github.com/ubfbuz3/cve/issues/8 CVE-2025-2067 - https://github.com/ubfbuz3/cve/issues/9 CVE-2025-2073 - https://issuetracker.google.com/issues/380043638 CVE-2025-2090 - https://github.com/SECWG/cve/issues/3 +CVE-2025-2115 - https://github.com/heiheixz/report/blob/main/sk_1.md CVE-2025-2123 - https://github.com/GeSHi/geshi-1.0/issues/159 CVE-2025-2123 - https://github.com/GeSHi/geshi-1.0/issues/159#issue-2880408694 CVE-2025-2129 - https://github.com/zn9988/publications/blob/main/2.Mage-AI%20-%20Insecure%20Default%20Authentication%20Setup%20Leading%20to%20Zero-Click%20RCE/README.md +CVE-2025-2130 - https://github.com/janssensjelle/published-pocs/blob/main/openxe-xss-ticket.md CVE-2025-2135 - https://issues.chromium.org/issues/400052777 CVE-2025-2151 - https://github.com/assimp/assimp/issues/6016 CVE-2025-2151 - https://github.com/assimp/assimp/issues/6026 @@ -105381,12 +105512,15 @@ CVE-2025-2295 - https://github.com/tianocore/edk2/security/advisories/GHSA-8522- CVE-2025-23001 - https://codetoanbug.com/poc-cve-2025-23001-ctfd-english/ CVE-2025-23049 - https://www.materialise.com/en/healthcare/orthoview CVE-2025-23049 - https://www.materialise.com/en/healthcare/orthoview/security-vulnerability +CVE-2025-2308 - https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc2.md +CVE-2025-2310 - https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc4.md CVE-2025-2320 - https://www.cnblogs.com/aibot/p/18732226 CVE-2025-2321 - https://www.cnblogs.com/aibot/p/18732250 CVE-2025-2322 - https://www.cnblogs.com/aibot/p/18732299 CVE-2025-2323 - https://www.cnblogs.com/aibot/p/18732309 CVE-2025-2334 - https://www.cnblogs.com/aibot/p/18732182 CVE-2025-2336 - https://www.herodevs.com/vulnerability-directory/cve-2025-2336 +CVE-2025-2337 - https://github.com/tbeu/matio/issues/267#issue-2883856488 CVE-2025-23386 - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-23386 CVE-2025-2357 - https://support.dcmtk.org/redmine/issues/1155 CVE-2025-2357 - https://support.dcmtk.org/redmine/issues/1155?tab=history#note-1 @@ -105396,11 +105530,13 @@ CVE-2025-2368 - https://github.com/WebAssembly/wabt/issues/2556#issue-2899598349 CVE-2025-2378 - https://github.com/chenyihao-cyber/CVE/issues/4 CVE-2025-2382 - https://github.com/aionman/cve/issues/5 CVE-2025-2383 - https://github.com/aionman/cve/issues/6 +CVE-2025-2385 - https://github.com/MiniSweetBeen/src/issues/2 CVE-2025-2386 - https://github.com/aionman/cve/issues/7 CVE-2025-2387 - https://github.com/aionman/cve/issues/9 CVE-2025-2389 - https://github.com/intercpt/XSS1/blob/main/SQL7.md CVE-2025-2391 - https://github.com/intercpt/XSS1/blob/main/SQL10.md CVE-2025-2392 - https://github.com/intercpt/XSS1/blob/main/SQL11.md +CVE-2025-2393 - https://github.com/intercpt/XSS1/blob/main/SQL12.md CVE-2025-23968 - https://ryankozak.com/posts/cve-2025-23968/ CVE-2025-24010 - https://github.com/vitejs/vite/security/advisories/GHSA-vg6x-rcgg-rjx6 CVE-2025-24014 - https://github.com/vim/vim/security/advisories/GHSA-j3g9-wg22-v955 @@ -105408,6 +105544,7 @@ CVE-2025-24015 - https://github.com/denoland/deno/security/advisories/GHSA-2x3r- CVE-2025-24016 - https://github.com/wazuh/wazuh/security/advisories/GHSA-hcrc-79hj-m3qh CVE-2025-24017 - https://github.com/YesWiki/yeswiki/security/advisories/GHSA-wphc-5f2j-jhvg CVE-2025-24018 - https://github.com/YesWiki/yeswiki/security/advisories/GHSA-w59h-3x3q-3p6j +CVE-2025-24020 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-27g8-5q48-xmw6 CVE-2025-24028 - https://github.com/laurent22/joplin/security/advisories/GHSA-5w3c-wph9-hq92 CVE-2025-24031 - https://github.com/OpenSC/pam_pkcs11/security/advisories/GHSA-wvr3-c9x3-9mff CVE-2025-2419 - https://github.com/heiheiworld/cve/blob/main/cve-h.md @@ -105421,6 +105558,7 @@ CVE-2025-24360 - https://github.com/nuxt/nuxt/security/advisories/GHSA-2452-6xj8 CVE-2025-24360 - https://github.com/vitejs/vite/security/advisories/GHSA-vg6x-rcgg-rjx6 CVE-2025-24361 - https://github.com/nuxt/nuxt/security/advisories/GHSA-4gf7-ff8x-hq99 CVE-2025-24362 - https://github.com/github/codeql-action/security/advisories/GHSA-vqf5-2xx6-9wfm +CVE-2025-24364 - https://github.com/dani-garcia/vaultwarden/security/advisories/GHSA-h6cc-rc6q-23j4 CVE-2025-24365 - https://github.com/dani-garcia/vaultwarden/security/advisories/GHSA-j4h8-vch3-f797 CVE-2025-24367 - https://github.com/Cacti/cacti/security/advisories/GHSA-fxrq-fr7h-9rqq CVE-2025-24368 - https://github.com/Cacti/cacti/security/advisories/GHSA-f9c7-7rc3-574c @@ -105431,20 +105569,28 @@ CVE-2025-24787 - https://github.com/clidey/whodb/security/advisories/GHSA-c7w4-9 CVE-2025-24798 - https://github.com/meshtastic/firmware/security/advisories/GHSA-4q84-546j-3mf5 CVE-2025-24807 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-w33g-jmm2-8983 CVE-2025-24864 - https://help.rview.com/hc/ja/articles/38287019277843-%E7%B7%8A%E6%80%A5%E3%83%91%E3%83%83%E3%83%81%E4%BD%9C%E6%A5%AD%E3%81%AE%E3%81%94%E6%A1%88%E5%86%85-2025-02-13-%E5%AE%8C%E4%BA%86 +CVE-2025-24885 - https://github.com/pwncollege/dojo/security/advisories/GHSA-8m79-rmhw-rg84 +CVE-2025-24886 - https://github.com/pwncollege/dojo/security/advisories/GHSA-fcq8-jqq5-9xmh CVE-2025-24891 - https://github.com/DumbWareio/DumbDrop/security/advisories/GHSA-24f2-fv38-3274 CVE-2025-24893 - https://jira.xwiki.org/browse/XWIKI-22149 CVE-2025-24894 - https://github.com/italia/spid-aspnetcore/security/advisories/GHSA-36h8-r92j-w9vw CVE-2025-24895 - https://github.com/italia/cie-aspnetcore/security/advisories/GHSA-vq63-8f72-f486 +CVE-2025-24899 - https://github.com/yogeshojha/rengine/security/advisories/GHSA-r3fp-xr9f-wv38 +CVE-2025-24901 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-jp48-94wm-3gmc CVE-2025-24902 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-pg73-w9vx-8mgp CVE-2025-24905 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-qjc6-5qv6-fr8m +CVE-2025-24906 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-jpph-g9p7-9jrm CVE-2025-24907 - https://support.pentaho.com/hc/en-us/articles/35781624069005--Resolved-Hitachi-Vantara-Pentaho-Data-Integration-Analytics-Path-Traversal-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24907 CVE-2025-24908 - https://support.pentaho.com/hc/en-us/articles/35783399569421--Resolved-Hitachi-Vantara-Pentaho-Data-Integration-Analytics-Path-Traversal-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24908 CVE-2025-24909 - https://support.pentaho.com/hc/en-us/articles/35782541484045--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Neutralization-of-Input-During-Web-Page-Generation-Cross-site-Scripting-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24909 CVE-2025-24910 - https://support.pentaho.com/hc/en-us/articles/35782683750541--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Restriction-of-XML-External-Entity-Reference-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24910 CVE-2025-24911 - https://support.pentaho.com/hc/en-us/articles/35783689016589--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Restriction-of-XML-External-Entity-Reference-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24911 +CVE-2025-24957 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-x28g-6228-99p9 +CVE-2025-24958 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-2mhx-5998-46hx CVE-2025-24960 - https://github.com/CyferShepard/Jellystat/security/advisories/GHSA-6x46-6w9f-ffv6 CVE-2025-24962 - https://github.com/yogeshojha/rengine/security/advisories/GHSA-cg75-ph7x-5rr9 CVE-2025-24963 - https://github.com/vitest-dev/vitest/security/advisories/GHSA-8gvc-j273-4wm5 +CVE-2025-24964 - https://github.com/vitest-dev/vitest/security/advisories/GHSA-9crc-q9x8-hgqq CVE-2025-24966 - https://github.com/yogeshojha/rengine/security/advisories/GHSA-4phc-m2wm-p8x6 CVE-2025-24967 - https://github.com/yogeshojha/rengine/security/advisories/GHSA-23wx-5q5w-334w CVE-2025-24971 - https://github.com/DumbWareio/DumbDrop/security/advisories/GHSA-rx8m-jqm7-vcgp @@ -105478,6 +105624,7 @@ CVE-2025-25650 - https://media.blackhat.com/us-13/US-13-Brown-RFID-Hacking-Live- CVE-2025-25758 - https://pastebin.com/0cb0KsGS CVE-2025-2582 - https://github.com/Fewword/Poc/blob/main/smf/smf-poc3.md CVE-2025-2582 - https://github.com/Fewword/Poc/blob/main/smf/smf-poc4.md +CVE-2025-2583 - https://github.com/Fewword/Poc/blob/main/smf/smf-poc5.md CVE-2025-2583 - https://github.com/Fewword/Poc/blob/main/smf/smf-poc6.md CVE-2025-2584 - https://github.com/WebAssembly/wabt/issues/2557 CVE-2025-2584 - https://github.com/WebAssembly/wabt/issues/2557#issue-2900405517 @@ -105487,21 +105634,50 @@ CVE-2025-2591 - https://github.com/assimp/assimp/issues/6009 CVE-2025-2591 - https://github.com/assimp/assimp/issues/6009#issue-2877367021 CVE-2025-2594 - https://wpscan.com/vulnerability/1c1be47a-d5c0-4ac1-b9fd-475b382a7d8f/ CVE-2025-2600 - https://devolutions.net/security/advisories/DEVO-2025-0005/ +CVE-2025-2601 - https://github.com/Hefei-Coffee/cve/issues/10 CVE-2025-2603 - https://github.com/Hefei-Coffee/cve/issues/12 CVE-2025-2604 - https://github.com/Hefei-Coffee/cve/issues/14 CVE-2025-2604 - https://vuldb.com/?id.300588 +CVE-2025-26042 - https://github.com/louislam/uptime-kuma/issues/5574 CVE-2025-2605 - https://www.honeywell.com/us/en/product-security#security-notices +CVE-2025-26054 - https://github.com/rohan-pt/CVE-2025-26054 +CVE-2025-26055 - https://github.com/rohan-pt/CVE-2025-26055 +CVE-2025-26056 - https://github.com/rohan-pt/CVE-2025-26056 +CVE-2025-26058 - https://github.com/mano257200/QloApps-VUL CVE-2025-2606 - https://github.com/Hefei-Coffee/cve/issues/15 CVE-2025-26074 - https://medium.com/@mrcnry/cve-2025-26074-remote-code-execution-in-conductor-oss-via-inline-javascript-injection-5ce3cb651cfb CVE-2025-2609 - https://chocapikk.com/posts/2025/magnusbilling/ CVE-2025-2610 - https://chocapikk.com/posts/2025/magnusbilling/ +CVE-2025-26125 - https://github.com/ZeroMemoryEx/CVE-2025-26125 +CVE-2025-26125 - https://github.com/ZeroMemoryEx/IObit-EoP +CVE-2025-26127 - https://github.com/pentesttoolscom/vulnerability-research/tree/master/CVE-2025-26127 +CVE-2025-26153 - https://gist.github.com/NoSpaceAvailable/234acdf57b5d7b29b2f39090c1686bc8 CVE-2025-26159 - https://godbadtry.github.io/posts/CVE-2025-26159/ +CVE-2025-26167 - https://github.com/SpikeReply/advisories/blob/0f15f5aefb959fbaff049da7cc3e36733e25b580/cve/buffalo/cve-2025-26167.md +CVE-2025-26198 - https://gist.github.com/tansique-17/0776791b8edd4931216be452a6971f5e +CVE-2025-26198 - https://github.com/tansique-17/CVE-2025-26198/ +CVE-2025-26206 - https://github.com/xibhi/CVE-2025-26206 CVE-2025-26210 - https://hackmd.io/@MrqrFIlhQFi7vUwkqbrXDw/deepseek CVE-2025-2622 - https://gitee.com/aizuda/snail-job/issues/IBSQ24 CVE-2025-2622 - https://gitee.com/aizuda/snail-job/issues/IBSQ24#note_38500450_link CVE-2025-26241 - https://members.backbox.org/osticket-sql-injection-bypass/ +CVE-2025-26258 - https://github.com/oye-ujjwal/CVEs/blob/main/Employee%20Management%20System%20App/CVE-2025-26258 CVE-2025-2626 - https://github.com/Hefei-Coffee/cve/issues/16 +CVE-2025-26260 - https://github.com/ahmetak4n/vulnerability-playground/tree/main/vulnerability-research/CVE-2025-26260 +CVE-2025-26260 - https://github.com/plentico/plenti/security/advisories/GHSA-mj4v-hp69-27x5 +CVE-2025-26263 - https://github.com/DRAGOWN/CVE-2025-26263 +CVE-2025-26264 - https://github.com/DRAGOWN/CVE-2025-26264 +CVE-2025-26278 - https://gist.github.com/tariqhawis/ad92d5e683f3a5d83e0629955ff42ad7 CVE-2025-2628 - https://github.com/ydnd/cve/issues/3 +CVE-2025-26304 - https://github.com/libming/libming/issues/323 +CVE-2025-26305 - https://github.com/libming/libming/issues/322 +CVE-2025-26306 - https://github.com/libming/libming/issues/324 +CVE-2025-26307 - https://github.com/libming/libming/issues/325 +CVE-2025-26308 - https://github.com/libming/libming/issues/326 +CVE-2025-26309 - https://github.com/libming/libming/issues/327 +CVE-2025-26310 - https://github.com/libming/libming/issues/328 +CVE-2025-26311 - https://github.com/libming/libming/issues/329 +CVE-2025-26318 - https://github.com/Frozenka/CVE-2025-26318 CVE-2025-26408 - https://r.sec-consult.com/wattsense CVE-2025-26408 - https://support.wattsense.com/hc/en-150/articles/13366066529437-Release-Notes CVE-2025-26409 - https://r.sec-consult.com/wattsense @@ -105511,10 +105687,27 @@ CVE-2025-26410 - https://support.wattsense.com/hc/en-150/articles/13366066529437 CVE-2025-26411 - https://r.sec-consult.com/wattsense CVE-2025-26411 - https://support.wattsense.com/hc/en-150/articles/13366066529437-Release-Notes CVE-2025-26412 - https://r.sec-consult.com/simcom +CVE-2025-26429 - https://android.googlesource.com/platform/frameworks/base/+/0f3c01c326b6966590c652adec5baa61351756e4 CVE-2025-26466 - https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt CVE-2025-2656 - https://github.com/ydnd/cve/issues/4 +CVE-2025-2658 - https://github.com/zyb26252/CVE/issues/1 CVE-2025-2659 - https://github.com/ydnd/cve/issues/7 CVE-2025-2660 - https://github.com/ydnd/cve/issues/8 +CVE-2025-26603 - https://github.com/vim/vim/security/advisories/GHSA-63p5-mwg2-787v +CVE-2025-26605 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-6gv7-4j8g-cvgp +CVE-2025-26606 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-rxjr-cw9q-cwwg +CVE-2025-26607 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-g6wj-3vm2-c59m +CVE-2025-26608 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-65h2-7484-2pww +CVE-2025-26609 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-h7jx-ggv8-v2rh +CVE-2025-26610 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-6p7c-9hcx-jpqj +CVE-2025-26611 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-q273-4vcj-qqp4 +CVE-2025-26612 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-9cwj-p4x6-pp88 +CVE-2025-26613 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-g3w6-m6w8-p6r2 +CVE-2025-26614 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-3qhx-gfqj-vm2j +CVE-2025-26615 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-p5wx-pv8j-f96h +CVE-2025-26616 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xxqg-p22h-3f32 +CVE-2025-26617 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-f654-c5r5-jx77 +CVE-2025-26623 - https://github.com/Exiv2/exiv2/issues/3168 CVE-2025-2663 - https://github.com/ARPANET-cyber/CVE/issues/2 CVE-2025-2672 - https://github.com/FoLaJJ/cve/blob/main/sqlcve.md CVE-2025-2673 - https://github.com/FoLaJJ/cve/blob/main/xsscve.md @@ -105528,6 +105721,7 @@ CVE-2025-26791 - https://nsysean.github.io/posts/dompurify-323-bypass/ CVE-2025-2680 - https://github.com/ARPANET-cyber/CVE/issues/9 CVE-2025-2681 - https://github.com/ARPANET-cyber/CVE/issues/10 CVE-2025-26817 - https://www.8com.de/cyber-security-blog/authenticated-remote-code-execution-in-netwrix-password-secure-cve-2025-26817 +CVE-2025-2682 - https://github.com/ARPANET-cyber/CVE/issues/11 CVE-2025-2683 - https://github.com/ARPANET-cyber/CVE/issues/12 CVE-2025-26849 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2024-012/ CVE-2025-2691 - https://security.snyk.io/vuln/SNYK-JS-NOSSRF-9510842 @@ -105536,10 +105730,13 @@ CVE-2025-2708 - https://github.com/uglory-gll/javasec/blob/main/ruoyi-vue-pro.md CVE-2025-27088 - https://github.com/oxyno-zeta/s3-proxy/security/advisories/GHSA-pp9m-qf39-hxjc CVE-2025-2709 - https://vuldb.com/?submit.517305 CVE-2025-27090 - https://github.com/BishopFox/sliver/security/advisories/GHSA-fh4v-v779-4g2w +CVE-2025-27096 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-j856-wh9m-9vpm CVE-2025-2710 - https://github.com/Hebing123/cve/issues/85 CVE-2025-2710 - https://vuldb.com/?id.300731 CVE-2025-27101 - https://github.com/obiba/opal/security/advisories/GHSA-rxmx-gqjj-vhv8 +CVE-2025-27102 - https://github.com/obiba/agate/security/advisories/GHSA-v3wj-7vj5-xj5v CVE-2025-27105 - https://github.com/vyperlang/vyper/security/advisories/GHSA-4w26-8p97-f4jp +CVE-2025-27107 - https://github.com/CyclopsMC/IntegratedScripting/security/advisories/GHSA-2v5x-4823-hq77 CVE-2025-2711 - https://github.com/Hebing123/cve/issues/86 CVE-2025-27112 - https://github.com/navidrome/navidrome/security/advisories/GHSA-c3p4-vm8f-386p CVE-2025-2712 - https://github.com/Hebing123/cve/issues/86 @@ -105547,10 +105744,12 @@ CVE-2025-27133 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GH CVE-2025-27134 - https://github.com/laurent22/joplin/security/advisories/GHSA-xj67-649m-3p8x CVE-2025-27135 - https://github.com/infiniflow/ragflow/security/advisories/GHSA-3gqj-66qm-25jq CVE-2025-27137 - https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-p75g-cxfj-7wrx +CVE-2025-27140 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xw6w-x28r-2p5c CVE-2025-27145 - https://github.com/9001/copyparty/security/advisories/GHSA-m2jw-cj8v-937r CVE-2025-27147 - https://github.com/glpi-project/glpi-inventory-plugin/security/advisories/GHSA-h6x9-jm98-cw7c CVE-2025-2715 - https://github.com/janssensjelle/published-pocs/blob/main/weberp-xss-confirm-dispatch.md CVE-2025-27152 - https://github.com/axios/axios/security/advisories/GHSA-jr5f-v2jv-69x6 +CVE-2025-27154 - https://github.com/spotipy-dev/spotipy/security/advisories/GHSA-pwhh-q4h6-w599 CVE-2025-2734 - https://github.com/0xabandon/CVE/issues/1 CVE-2025-27364 - https://github.com/mitre/caldera/security CVE-2025-27364 - https://medium.com/@mitrecaldera/mitre-caldera-security-advisory-remote-code-execution-cve-2025-27364-5f679e2e2a0e @@ -105559,10 +105758,18 @@ CVE-2025-27370 - https://openid.net/notice-of-a-security-vulnerability/ CVE-2025-27370 - https://openid.net/wp-content/uploads/2025/01/OIDF-Responsible-Disclosure-Notice-on-Security-Vulnerability-for-private_key_jwt.pdf CVE-2025-27371 - https://openid.net/notice-of-a-security-vulnerability/ CVE-2025-27371 - https://openid.net/wp-content/uploads/2025/01/OIDF-Responsible-Disclosure-Notice-on-Security-Vulnerability-for-private_key_jwt.pdf +CVE-2025-2739 - https://github.com/silent1189/Phpgurukul-Old-Age-Home-Management-System-V1.0-SQL-injection/issues/1 CVE-2025-27408 - https://github.com/mnfst/manifest/security/advisories/GHSA-h8h6-7752-g28c +CVE-2025-27409 - https://github.com/laurent22/joplin/security/advisories/GHSA-5xv6-7jm3-fmg5 +CVE-2025-27410 - https://github.com/pwndoc/pwndoc/security/advisories/GHSA-mxw8-vgvx-89hx CVE-2025-27411 - https://github.com/redaxo/redaxo/security/advisories/GHSA-wppf-gqj5-fc4f +CVE-2025-27412 - https://github.com/redaxo/redaxo/security/advisories/GHSA-8366-xmgf-334f +CVE-2025-27413 - https://github.com/pwndoc/pwndoc/security/advisories/GHSA-r3vj-47cf-4672 CVE-2025-27417 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-j3p8-xww6-wvqh +CVE-2025-27418 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-ffcg-qr75-98mg +CVE-2025-27419 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-9rp6-4mqp-g4p8 CVE-2025-2742 - https://github.com/uglory-gll/javasec/blob/main/ruoyi-vue-pro.md#5arbitrary-file-deletion-vulnerability---uploadpermanentmaterial +CVE-2025-27420 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-x3wr-75qx-55cw CVE-2025-27421 - https://github.com/JasonLovesDoggo/abacus/security/advisories/GHSA-vh64-54px-qgf8 CVE-2025-27422 - https://github.com/factionsecurity/faction/security/advisories/GHSA-97cv-f342-v2jc CVE-2025-2743 - https://github.com/uglory-gll/javasec/blob/main/ruoyi-vue-pro.md#6arbitrary-file-deletion-vulnerability---uploadtemporarymaterial @@ -105584,9 +105791,11 @@ CVE-2025-27459 - https://www.first.org/cvss/calculator/3.1 CVE-2025-27460 - https://www.first.org/cvss/calculator/3.1 CVE-2025-27461 - https://www.first.org/cvss/calculator/3.1 CVE-2025-27497 - https://github.com/OpenIdentityPlatform/OpenDJ/security/advisories/GHSA-93qr-h8pr-4593 +CVE-2025-27498 - https://github.com/RustCrypto/AEADs/security/advisories/GHSA-r38m-44fw-h886 CVE-2025-27499 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-v248-mr5r-87pf CVE-2025-2750 - https://github.com/assimp/assimp/issues/6011 CVE-2025-2750 - https://github.com/assimp/assimp/issues/6011#issue-2877369004 +CVE-2025-27506 - https://github.com/nocodb/nocodb/security/advisories/GHSA-wf6c-hrhf-86cw CVE-2025-27508 - https://github.com/NationalSecurityAgency/emissary/security/advisories/GHSA-hw43-fcmm-3m5g CVE-2025-2751 - https://github.com/assimp/assimp/issues/6012 CVE-2025-2751 - https://github.com/assimp/assimp/issues/6012#issue-2877369817 @@ -105601,6 +105810,7 @@ CVE-2025-2754 - https://github.com/assimp/assimp/issues/6015#issue-2877373501 CVE-2025-2755 - https://github.com/assimp/assimp/issues/6017 CVE-2025-2755 - https://github.com/assimp/assimp/issues/6017#issue-2877374161 CVE-2025-27554 - https://news.ycombinator.com/item?id=43210858 +CVE-2025-27558 - https://github.com/vanhoefm/fragattacks-survey-public/blob/main/README.md CVE-2025-2756 - https://github.com/assimp/assimp/issues/6018 CVE-2025-2756 - https://github.com/assimp/assimp/issues/6018#issue-2877375815 CVE-2025-2757 - https://github.com/assimp/assimp/issues/6019 @@ -105611,6 +105821,8 @@ CVE-2025-27593 - https://www.first.org/cvss/calculator/3.1 CVE-2025-27594 - https://www.first.org/cvss/calculator/3.1 CVE-2025-27595 - https://www.first.org/cvss/calculator/3.1 CVE-2025-27597 - https://github.com/intlify/vue-i18n/security/advisories/GHSA-p2ph-7g93-hw3m +CVE-2025-27607 - https://github.com/nhairs/python-json-logger/security/advisories/GHSA-wmxh-pxcx-9w24 +CVE-2025-27617 - https://github.com/pimcore/pimcore/security/advisories/GHSA-qjpx-5m2p-5pgh CVE-2025-27637 - https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html CVE-2025-27638 - https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html CVE-2025-27639 - https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html @@ -105647,6 +105859,7 @@ CVE-2025-2775 - https://labs.watchtowr.com/sysowned-your-friendly-rce-support-ti CVE-2025-2776 - https://labs.watchtowr.com/sysowned-your-friendly-rce-support-ticket/ CVE-2025-2777 - https://labs.watchtowr.com/sysowned-your-friendly-rce-support-ticket/ CVE-2025-27773 - https://github.com/simplesamlphp/saml2/security/advisories/GHSA-46r4-f8gj-xg56 +CVE-2025-27789 - https://github.com/babel/babel/pull/17173 CVE-2025-27792 - https://github.com/obiba/opal/security/advisories/GHSA-27vw-29rq-c358 CVE-2025-27793 - https://github.com/vega/vega/security/advisories/GHSA-963h-3v39-3pqf CVE-2025-27794 - https://github.com/flarum/framework/security/advisories/GHSA-hg9j-64wp-m9px @@ -105667,6 +105880,7 @@ CVE-2025-27889 - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2 CVE-2025-27889 - https://www.rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-2025-47812/ CVE-2025-27892 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2025-001/ CVE-2025-27910 - https://github.com/xujeff/tianti/issues/39 +CVE-2025-27956 - https://github.com/intruderlabs/cvex/blob/main/Pixeon/WebLaudos/Directory-Traversal/README.md CVE-2025-2812 - https://github.com/sahici/CVE-2025-2812/ CVE-2025-2817 - https://bugzilla.mozilla.org/show_bug.cgi?id=1917536 CVE-2025-2819 - https://www.bizerba.com/downloads/global/information-security/2025/bizerba-sa-2025-0001.pdf @@ -105677,6 +105891,7 @@ CVE-2025-2854 - https://github.com/hak0neP/cve/blob/main/sql-fizz.md CVE-2025-2903 - https://portal.perforce.com/s/detail/a91PA000001Sed3YAC CVE-2025-2907 - https://wpscan.com/vulnerability/2e513930-ec01-4dc6-8991-645c5267e14c/ CVE-2025-2912 - https://github.com/HDFGroup/hdf5/issues/5370 +CVE-2025-2913 - https://github.com/HDFGroup/hdf5/issues/5376 CVE-2025-2915 - https://github.com/HDFGroup/hdf5/issues/5380 CVE-2025-29152 - https://medium.com/@worzyus/poc-2fd1d2ec1eb9 CVE-2025-29152 - https://wellington-almeida.medium.com/poc-2fd1d2ec1eb9 @@ -105686,6 +105901,7 @@ CVE-2025-29154 - https://wellington-almeida.medium.com/poc-html-injection-0f27e6 CVE-2025-29154 - https://worzyus.medium.com/0f27e657c962 CVE-2025-2916 - https://github.com/ZOKEYE/CVE/blob/main/CVE_1.md CVE-2025-2923 - https://github.com/HDFGroup/hdf5/issues/5381 +CVE-2025-2925 - https://github.com/HDFGroup/hdf5/issues/5383 CVE-2025-2926 - https://github.com/HDFGroup/hdf5/issues/5384 CVE-2025-2929 - https://wpscan.com/vulnerability/e9299d8f-900b-4487-b135-b82946825e61/ CVE-2025-29410 - https://www.simonjuguna.com/cve-2025-29410-hospital-management-system-xss-vulnerability/ @@ -105705,12 +105921,18 @@ CVE-2025-2958 - https://drive.google.com/file/d/1SbZ63uqg6QJYjPFcLY5wBqWrh-NMrnZ CVE-2025-2959 - https://docs.google.com/document/d/1PcJZQ364MQxz1eUt6PLnWIQYTLNuJ5_3/edit#heading=h.gjdgxs CVE-2025-2960 - https://docs.google.com/document/d/17FadWn-UWXjvcYNzDI4JRjag-lGUU9pJ/edit#heading=h.gjdgxs CVE-2025-29625 - https://blog.reodus.com/posts/cve-2025-29625/ +CVE-2025-29647 - https://gitee.com/B00W_NSD/poc/blob/master/seacms13.3-sql/poc.md +CVE-2025-29686 - https://gitee.com/hailey888/oa_system/issues/IBRQWG CVE-2025-29688 - https://gitee.com/hailey888/oa_system/issues/IBRRZX +CVE-2025-29689 - https://gitee.com/hailey888/oa_system/issues/IBRQZ9 CVE-2025-29690 - https://gitee.com/hailey888/oa_system/issues/IBRRX3 +CVE-2025-29691 - https://gitee.com/hailey888/oa_system/issues/IBRQYI CVE-2025-2973 - https://github.com/hak0neP/cve/blob/main/cve-RCE.md CVE-2025-2974 - https://bytium.com/stored-xss-in-perfex-crm-3-2-1-contracts-module/ +CVE-2025-2975 - https://github.com/0xs1ash/poc/blob/main/xss.md#1-stored-xss CVE-2025-2977 - https://github.com/0xs1ash/poc/blob/main/portable_data_exfiltration.md CVE-2025-2980 - https://vuldb.com/?id.302032 +CVE-2025-2985 - https://github.com/LeoWSY-hashblue/cve2/blob/main/cve.md CVE-2025-3002 - https://github.com/Fizz-L/CVE1/blob/main/DCME-520%20Remote%20command%20execution.md CVE-2025-3006 - https://github.com/yasuoz99/CVE-/issues/1 CVE-2025-30066 - https://www.wiz.io/blog/github-action-tj-actions-changed-files-supply-chain-attack-cve-2025-30066 @@ -105749,8 +105971,11 @@ CVE-2025-3123 - https://github.com/WonderCMS/wondercms/issues/330#issuecomment-2 CVE-2025-3134 - https://github.com/Brauchitsch-Wang/cve/blob/main/cve.md CVE-2025-3137 - https://github.com/ARPANET-cybersecurity/vuldb/issues/2 CVE-2025-3138 - https://github.com/ARPANET-cybersecurity/vuldb/issues/3 +CVE-2025-3144 - https://gitee.com/mindspore/mindspore/issues/IBVKM8 +CVE-2025-3145 - https://gitee.com/mindspore/mindspore/issues/IBVKM8 CVE-2025-3146 - https://github.com/nabiland/cve/issues/1 CVE-2025-3147 - https://github.com/nabiland/cve/issues/2 +CVE-2025-3151 - https://github.com/MiniSweetBeen/src/issues/5 CVE-2025-3158 - https://github.com/assimp/assimp/issues/6023 CVE-2025-3158 - https://github.com/assimp/assimp/issues/6023#issue-2877381000 CVE-2025-3159 - https://github.com/assimp/assimp/issues/6024 @@ -105838,6 +106063,7 @@ CVE-2025-3242 - https://github.com/lkncdy/cve/issues/1 CVE-2025-32421 - https://vercel.com/changelog/cve-2025-32421 CVE-2025-3243 - https://github.com/BinBall/cve/blob/master/README.md CVE-2025-32430 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-m9x4-w7p9-mxhx +CVE-2025-32440 - https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-h4x5-vr54-vjrx CVE-2025-32445 - https://github.com/argoproj/argo-events/security/advisories/GHSA-hmp7-x699-cvhq CVE-2025-3245 - https://github.com/wlingze/IRify_scan/issues/1 CVE-2025-32451 - https://talosintelligence.com/vulnerability_reports/TALOS-2025-2202 @@ -105851,6 +106077,8 @@ CVE-2025-3248 - https://www.horizon3.ai/attack-research/disclosures/unsafe-at-an CVE-2025-3257 - https://github.com/caigo8/CVE-md/blob/main/admintwo/CSRF.md CVE-2025-3258 - https://github.com/404heihei/CVE/issues/2 CVE-2025-3265 - https://github.com/yasuoz99/CVE-/issues/2 +CVE-2025-32787 - https://github.com/SoftEtherVPN/SoftEtherVPN/security/advisories/GHSA-xw53-587j-mqh6 +CVE-2025-32789 - https://github.com/espocrm/espocrm/security/advisories/GHSA-3ph3-jcfx-fq53 CVE-2025-32790 - https://github.com/langgenius/dify/security/advisories/GHSA-jp6m-v4gw-5vgp CVE-2025-32794 - https://github.com/openemr/openemr/security/advisories/GHSA-3c27-2m7h-f7rx CVE-2025-32795 - https://github.com/langgenius/dify/security/advisories/GHSA-gg5w-m2vw-vmmj @@ -105880,6 +106108,7 @@ CVE-2025-32947 - https://research.jfrog.com/vulnerabilities/peertube-activitypub CVE-2025-32948 - https://research.jfrog.com/vulnerabilities/peertube-activitypub-playlist-creation-blind-ssrf-dos/ CVE-2025-32949 - https://research.jfrog.com/vulnerabilities/peertube-archive-resource-exhaustion/ CVE-2025-32953 - https://github.com/udo-munk/z80pack/security/advisories/GHSA-gpjj-f76m-9x3q +CVE-2025-32958 - https://github.com/AdeptLanguage/Adept/security/advisories/GHSA-8c7v-vccv-cx4q CVE-2025-32966 - https://github.com/dataease/dataease/security/advisories/GHSA-h7hj-4j78-cvc7 CVE-2025-32967 - https://github.com/openemr/openemr/security/advisories/GHSA-7qj6-jxfc-xw4v CVE-2025-32975 - https://seralys.com/research/CVE-2025-32975.txt @@ -105887,6 +106116,8 @@ CVE-2025-32976 - https://seralys.com/research/CVE-2025-32976.txt CVE-2025-32977 - https://seralys.com/research/CVE-2025-32977.txt CVE-2025-32978 - https://seralys.com/research/CVE-2025-32978.txt CVE-2025-3299 - https://github.com/LaneyYu/cve/issues/1 +CVE-2025-3303 - https://github.com/hyfhacker/cve/blob/main/README.md +CVE-2025-3305 - https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/IKUN_Library-authority.md CVE-2025-3306 - https://github.com/p1026/CVE/issues/22 CVE-2025-3307 - https://github.com/p1026/CVE/issues/24 CVE-2025-3308 - https://github.com/p1026/CVE/issues/25 @@ -105901,6 +106132,7 @@ CVE-2025-3316 - https://github.com/zhaolu33/CVE/issues/3 CVE-2025-3321 - https://www.bbraun.com/productsecurity CVE-2025-3322 - https://www.bbraun.com/productsecurity CVE-2025-3323 - https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/Nimrod-SQL.md +CVE-2025-3324 - https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/Nimrod-fileUpload.md CVE-2025-3330 - https://github.com/p1026/CVE/issues/44 CVE-2025-3331 - https://github.com/p1026/CVE/issues/45 CVE-2025-3332 - https://github.com/p1026/CVE/issues/46 @@ -105923,9 +106155,11 @@ CVE-2025-3353 - https://github.com/LaneyYu/cve/issues/3 CVE-2025-3365 - https://www.bbraun.com/productsecurity CVE-2025-3370 - https://github.com/1SHOTSEC/CVE/issues/1 CVE-2025-3384 - https://github.com/onupset/CVE/issues/7 +CVE-2025-3388 - https://gitee.com/hailey888/oa_system/issues/IBRQYI CVE-2025-3389 - https://gitee.com/hailey888/oa_system/issues/IBRQXH CVE-2025-3390 - https://gitee.com/hailey888/oa_system/issues/IBRRZX CVE-2025-3391 - https://gitee.com/hailey888/oa_system/issues/IBRRX3 +CVE-2025-3392 - https://gitee.com/hailey888/oa_system/issues/IBRQZ9 CVE-2025-34021 - https://www.exploit-db.com/exploits/49457 CVE-2025-34021 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5617.php CVE-2025-34022 - https://www.exploit-db.com/exploits/49456 @@ -106009,6 +106243,7 @@ CVE-2025-34096 - https://www.exploit-db.com/exploits/42186 CVE-2025-34097 - https://www.exploit-db.com/exploits/44399 CVE-2025-34098 - https://www.exploit-db.com/exploits/42101 CVE-2025-34099 - https://www.exploit-db.com/exploits/42370 +CVE-2025-3410 - https://github.com/Tr0e/CVE_Hunter/blob/main/AIAS/AIAS_RCE.md CVE-2025-34100 - https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/builderengine_upload_exec.rb CVE-2025-34100 - https://support.alertlogic.com/hc/en-us/articles/115004703183-BuilderEngine-Content-Management-System-CMS-elFinder-2-0-Arbitrary-File-Upload CVE-2025-34100 - https://www.exploit-db.com/exploits/40390 @@ -106113,6 +106348,7 @@ CVE-2025-35008 - https://takeonme.org/cves/cve-2025-35008/ CVE-2025-35009 - https://takeonme.org/cves/cve-2025-35009/ CVE-2025-35010 - https://takeonme.org/cves/cve-2025-35010/ CVE-2025-3502 - https://wpscan.com/vulnerability/dd436064-e611-4a4b-a873-67ed6029c46f/ +CVE-2025-35027 - https://github.com/Bin4ry/UniPwn CVE-2025-35027 - https://spectrum.ieee.org/unitree-robot-exploit CVE-2025-35027 - https://takeonme.org/cves/cve-2025-35027 CVE-2025-3503 - https://wpscan.com/vulnerability/83ddd432-309f-4ff5-974c-fdc9c67d1051/ @@ -106124,6 +106360,7 @@ CVE-2025-3516 - https://wpscan.com/vulnerability/336a78cd-297b-4f47-a007-e33eac7 CVE-2025-3517 - https://devolutions.net/security/advisories/DEVO-2025-0006/ CVE-2025-3535 - https://github.com/shuanx/BurpAPIFinder/issues/18 CVE-2025-3535 - https://github.com/shuanx/BurpAPIFinder/issues/18#issue-2956026808 +CVE-2025-3538 - https://github.com/Fizz-L/CVE1/blob/main/DI-8100Command%20execution2.md CVE-2025-3548 - https://github.com/assimp/assimp/issues/6068 CVE-2025-3549 - https://github.com/assimp/assimp/issues/6070 CVE-2025-3550 - https://github.com/38279/2/issues/1 @@ -106135,6 +106372,7 @@ CVE-2025-3561 - https://wiki.shikangsi.com/post/share/4ccab5f6-4f54-4bac-b0fc-a4 CVE-2025-3562 - https://wiki.shikangsi.com/post/share/7329f367-dd6e-48fb-b585-e10fbfc63bb2 CVE-2025-3563 - https://wiki.shikangsi.com/post/share/915aeba9-7d7c-4d7f-92e2-bbd5560de1a7 CVE-2025-3568 - https://gist.github.com/shellkraft/a8b1f35d5c3ba313605065889563fb00 +CVE-2025-3569 - https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/db-hospital-drug-authority.md CVE-2025-3570 - https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/db-hospital-drug-xss.md CVE-2025-3571 - https://wiki.shikangsi.com/post/share/c46c50d3-c8d7-46a0-9fed-8d79a64abb44 CVE-2025-3577 - https://github.com/Jiangxiazhe/IOT_Vulnerability/blob/main/README.md @@ -106146,6 +106384,7 @@ CVE-2025-3587 - https://github.com/buluorifu/Vulnerability-recurrence/blob/main/ CVE-2025-3589 - https://github.com/byxs0x0/SQL/blob/main/SQL6.md CVE-2025-3590 - https://gist.github.com/mcdruid/8412cfb55f443a1344ff41af0ce1b215 CVE-2025-3591 - https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/My-Blog-layui-xss-1.md +CVE-2025-3592 - https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/My-Blog-layui-xss-2.md CVE-2025-3593 - https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/My-Blog-layui-fileUpload.md CVE-2025-35940 - https://www.tenable.com/security/research/tra-2025-17 CVE-2025-35966 - https://talosintelligence.com/vulnerability_reports/TALOS-2025-2201 @@ -106170,6 +106409,7 @@ CVE-2025-3687 - https://github.com/misstt123/oasys/issues/11 CVE-2025-3689 - https://github.com/Xiaoyao-i03i/CVE/issues/1 CVE-2025-3690 - https://github.com/Xiaoyao-i03i/CVE/issues/2 CVE-2025-3694 - https://github.com/yaklang/IRifyScanResult/blob/main/Web-based%20Pharmacy%20Product%20Management%20System/sql_inject_in_session_email.md +CVE-2025-3696 - https://github.com/yaklang/IRifyScanResult/blob/main/Web-based%20Pharmacy%20Product%20Management%20System/sql_inject_in_search.md CVE-2025-3697 - https://github.com/yaklang/IRifyScanResult/blob/main/Web-based%20Pharmacy%20Product%20Management%20System/sql_inject_in_edit.md CVE-2025-3704 - https://github.com/dbarproductions/pta-volunteer-sign-up-sheets/archive/refs/tags/5.5.5.zip CVE-2025-3729 - https://github.com/yaklang/IRifyScanResult/blob/main/Web-based%20Pharmacy%20Product%20Management%20System/rce_in_backup.md @@ -106208,6 +106448,7 @@ CVE-2025-3945 - https://honeywell.com/us/en/product-security#security-notices CVE-2025-3951 - https://wpscan.com/vulnerability/220c195f-3df3-4883-8e0b-a0cf019e6323/ CVE-2025-3954 - https://everydaysparkling.com/ssrf-via-referrer-field-in-churchcrm-v5-16-0/ CVE-2025-3959 - https://github.com/caigo8/CVE-md/blob/main/Books-Management-System/CSRF.md +CVE-2025-3968 - https://github.com/zzZxby/Vulnerability-Exploration/blob/main/%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A11.md CVE-2025-3969 - https://github.com/zzZxby/Vulnerability-Exploration/blob/main/%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A12.md CVE-2025-3973 - https://github.com/skyrainoh/CVE/issues/3 CVE-2025-3974 - https://github.com/skyrainoh/CVE/issues/4 @@ -106216,6 +106457,7 @@ CVE-2025-3979 - https://github.com/dtwin88/cve-md/blob/main/lecms%20V3.0.3/lecms CVE-2025-3980 - https://github.com/38279/3/issues/1 CVE-2025-3981 - https://github.com/38279/3/issues/1 CVE-2025-3982 - https://gist.github.com/superboy-zjc/a31b8ea7466f91b437598297bf5cbce8 +CVE-2025-3983 - https://github.com/MichaelZhuang521/cve/blob/main/rce.md CVE-2025-3997 - https://github.com/dtwin88/cve-md/blob/main/lecms%20V3.0.3/lecms_4.md CVE-2025-3998 - https://github.com/lyg986443/cve/issues/4 CVE-2025-4008 - https://www.onekey.com/resource/security-advisory-remote-command-execution-on-smartbedded-meteobridge-cve-2025-4008 @@ -106230,6 +106472,10 @@ CVE-2025-4096 - https://issues.chromium.org/issues/409911705 CVE-2025-4118 - https://www.cnblogs.com/aibot/p/18830907 CVE-2025-4119 - https://www.cnblogs.com/aibot/p/18830908 CVE-2025-41234 - https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N&version=3.1 +CVE-2025-41255 - https://github.com/iterate-ch/cyberduck/security/advisories/GHSA-vjjc-grpp-m655 +CVE-2025-41255 - https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250325-01_Cyberduck_Mountain_Duck_Certificate_Handling +CVE-2025-41256 - https://github.com/iterate-ch/cyberduck/security/advisories/GHSA-688c-vjrc-84rv +CVE-2025-41256 - https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250325-02_Cyberduck_Mountain_Duck_Weak_Hash CVE-2025-4133 - https://wpscan.com/vulnerability/ebd7e5f5-af8d-42ca-b6ff-af92e03d4a3e/ CVE-2025-4134 - https://www.gendigital.com/us/en/contact-us/security-advisories/ CVE-2025-4136 - https://www.cnblogs.com/aibot/p/18830909 @@ -106239,11 +106485,13 @@ CVE-2025-4222 - https://www.guyshavit.com/post/cve-2025-4222 CVE-2025-4302 - https://wpscan.com/vulnerability/19f67d6e-4ffe-4126-ac42-fb23c5017a3e CVE-2025-4316 - https://devolutions.net/security/advisories/DEVO-2025-0007/ CVE-2025-4336 - https://ryankozak.com/posts/cve-2025-4336 +CVE-2025-4360 - https://vuldb.com/?id.307478 CVE-2025-4372 - https://issues.chromium.org/issues/412057896 CVE-2025-43720 - https://www.periculo.co.uk/cyber-security-blog/how-our-pen-tester-found-a-critical-vulnerability-cve-2025-43720 CVE-2025-4375 - https://sparxsystems.com/products/procloudserver/6.1/ CVE-2025-4376 - https://sparxsystems.com/products/procloudserver/6.1/ CVE-2025-4377 - https://sparxsystems.com/products/procloudserver/6.1/ +CVE-2025-43965 - https://github.com/ImageMagick/Website/blob/main/ChangeLog.md#711-44---2025-02-22 CVE-2025-44019 - https://www.aveva.com/en/support-and-success/cyber-security-updates/ CVE-2025-44109 - https://drive.google.com/file/d/12XY2WFBvGJ104gUvyG6YDIEdy4y1gl8i/view CVE-2025-4417 - https://www.aveva.com/en/support-and-success/cyber-security-updates/ @@ -106253,6 +106501,7 @@ CVE-2025-4433 - https://devolutions.net/security/advisories/DEVO-2025-0010/ CVE-2025-44779 - https://a1batr0ss.top/2025/08/06/CVE-2025-44779-Ollama-arbitrary-file-deletion/ CVE-2025-4484 - https://vuldb.com/?id.308199 CVE-2025-4493 - https://devolutions.net/security/advisories/DEVO-2025-0008/ +CVE-2025-4505 - https://vuldb.com/?id.308221 CVE-2025-45055 - https://medium.com/@mingihongkim/privilege-escalation-via-svg-injection-in-silverpeas-6-4-2-b5ab1d5b6955 CVE-2025-45065 - https://docs.google.com/document/d/1Sq08I_eKCY-YOmVOQPIEj4Ui2pW0gIgXHcqD9fcvR7M/edit?usp=sharing CVE-2025-45065 - https://medium.com/@shrutukapoor25/cve-2025-45065-b58a33e65860 @@ -106316,12 +106565,19 @@ CVE-2025-45987 - https://github.com/glkfc/IoT-Vulnerability/blob/main/LB-LINK/LB CVE-2025-45988 - https://github.com/glkfc/IoT-Vulnerability/blob/main/LB-LINK/LB-LINK_cmd%20Indicates%20the%20unauthorized%20command%20injection/The%20LB-LINK_cmd%20command%20is%20used%20to%20inject%20information.md CVE-2025-45994 - https://github.com/spoNge369/CVE/blob/main/CVE-2025-45994/README.md CVE-2025-45997 - https://github.com/litsasuk/CVE-POC/blob/main/CVE-2025-45997.md +CVE-2025-46000 - https://github.com/zakumini/CVE-List/blob/main/CVE-2025-46000/CVE-2025-46000.md CVE-2025-46001 - https://www.exploit-db.com/exploits/38895 CVE-2025-46002 - https://www.exploit-db.com/exploits/38945 +CVE-2025-46011 - https://github.com/kevinroleke/security/tree/main/CVE-2025-46011 +CVE-2025-46014 - https://github.com/Souhardya/Exploit-PoCs/tree/main/HonorPCManager-PrivEsc CVE-2025-4602 - https://ryankozak.com/posts/cve-2025-4602/ CVE-2025-4603 - https://ryankozak.com/posts/cve-2025-4603/ +CVE-2025-46041 - https://github.com/binneko/CVE-2025-46041 +CVE-2025-46047 - https://github.com/J0ey17/Silverpeas-Username-Enumeration-PoC +CVE-2025-46078 - https://github.com/yggcwhat/CVE-2025-46078/ CVE-2025-46093 - https://projectblack.io/blog/liquidfiles-vulnerability-authenticated-rce/ CVE-2025-46094 - https://projectblack.io/blog/liquidfiles-vulnerability-authenticated-rce/ +CVE-2025-46096 - https://github.com/opensolon/solon/issues/357 CVE-2025-46109 - http://cocr.cc/2025/04/17/pbootcms/ CVE-2025-46116 - https://sector7.computest.nl/post/2025-07-ruckus-unleashed/ CVE-2025-46117 - https://sector7.computest.nl/post/2025-07-ruckus-unleashed/ @@ -106332,19 +106588,60 @@ CVE-2025-46121 - https://sector7.computest.nl/post/2025-07-ruckus-unleashed/ CVE-2025-46122 - https://sector7.computest.nl/post/2025-07-ruckus-unleashed/ CVE-2025-46123 - https://sector7.computest.nl/post/2025-07-ruckus-unleashed/ CVE-2025-4613 - https://balintmagyar.com/articles/google-web-designer-path-traversal-client-side-rce-cve-2025-4613 +CVE-2025-46173 - https://github.com/pruthuraut/CVE-2025-46173 CVE-2025-46179 - https://pastebin.com/DGraeWm8 +CVE-2025-46204 - https://github.com/spbavarva/CVE-2025-46204 +CVE-2025-46206 - https://bugs.ghostscript.com/show_bug.cgi?id=708521 +CVE-2025-46206 - https://github.com/Landw-hub/CVE-2025-46206 +CVE-2025-46335 - https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-mwfg-948f-2cc5 +CVE-2025-46338 - https://github.com/advplyr/audiobookshelf/security/advisories/GHSA-47g3-c5hx-2q3w +CVE-2025-46339 - https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-8f79-3q3w-43c4 +CVE-2025-46340 - https://github.com/misskey-dev/misskey/security/advisories/GHSA-3p2w-xmv5-jm95 +CVE-2025-46341 - https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-w3m8-wcf4-h8vm +CVE-2025-46347 - https://github.com/YesWiki/yeswiki/security/advisories/GHSA-88xg-v53p-fpvf +CVE-2025-46348 - https://github.com/YesWiki/yeswiki/security/advisories/GHSA-wc9g-6j9w-hr95 CVE-2025-46354 - https://talosintelligence.com/vulnerability_reports/TALOS-2025-2198 +CVE-2025-46393 - https://github.com/ImageMagick/Website/blob/main/ChangeLog.md#711-44---2025-02-22 CVE-2025-46407 - https://talosintelligence.com/vulnerability_reports/TALOS-2025-2215 CVE-2025-46411 - https://talosintelligence.com/vulnerability_reports/TALOS-2025-2236 CVE-2025-46412 - https://www.vertiv.com/en-us/support/security-support-center/ CVE-2025-46415 - https://labs.snyk.io CVE-2025-46416 - https://labs.snyk.io +CVE-2025-46417 - https://github.com/advisories/GHSA-93mv-x874-956g CVE-2025-4652 - https://wpscan.com/vulnerability/2a18ab96-ba95-4599-824f-df12e4851e6d/ +CVE-2025-46553 - https://github.com/misskey-dev/summaly/security/advisories/GHSA-7899-w6c4-vqc4 +CVE-2025-46560 - https://github.com/vllm-project/vllm/security/advisories/GHSA-vc6m-hm49-g9qg +CVE-2025-46565 - https://github.com/vitejs/vite/security/advisories/GHSA-859w-5945-r5v3 +CVE-2025-46567 - https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-f2f7-gj54-6vpv +CVE-2025-46568 - https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-998c-x8hx-737r CVE-2025-46612 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2025-036.txt +CVE-2025-46653 - https://github.com/zast-ai/vulnerability-reports/blob/main/formidable/file_upload/report.md +CVE-2025-46654 - https://github.com/hackmdio/codimd/issues/1910 +CVE-2025-46654 - https://github.com/zast-ai/vulnerability-reports/blob/main/formidable/file_upload/report.md +CVE-2025-46655 - https://github.com/hackmdio/codimd/issues/1910 +CVE-2025-46655 - https://github.com/zast-ai/vulnerability-reports/blob/main/formidable/file_upload/report.md +CVE-2025-46689 - https://github.com/gozan10/cve/issues/17 +CVE-2025-46714 - https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-c5h5-54gp-xh4q +CVE-2025-46715 - https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-67p9-6h73-ff7x +CVE-2025-46716 - https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-3984-r877-q7xp +CVE-2025-46717 - https://github.com/trifectatechfoundation/sudo-rs/security/advisories/GHSA-98cv-wqjx-wx8f +CVE-2025-46718 - https://github.com/trifectatechfoundation/sudo-rs/security/advisories/GHSA-w9q3-g4p5-5q2r +CVE-2025-46719 - https://github.com/open-webui/open-webui/security/advisories/GHSA-9f4f-jv96-8766 +CVE-2025-46721 - https://github.com/advisories/GHSA-rq77-p4h8-4crw +CVE-2025-46721 - https://github.com/justinas/nosurf-cve-2025-46721 +CVE-2025-46726 - https://github.com/langroid/langroid/security/advisories/GHSA-pw95-88fg-3j6f +CVE-2025-46728 - https://github.com/yhirose/cpp-httplib/security/advisories/GHSA-px83-72rx-v57c +CVE-2025-46731 - https://github.com/craftcms/cms/security/advisories/GHSA-f3cw-hg6r-chfv CVE-2025-4680 - https://support.upkeeper.se/hc/en-us/articles/20159822847900-CVE-2025-4680-Improper-Input-Validation CVE-2025-4681 - https://support.upkeeper.se/hc/en-us/articles/20159882527772-CVE-2025-4681-Improper-Privilege-Management CVE-2025-46810 - https://bugzilla.suse.com/show_bug.cgi?id=1245204 CVE-2025-46811 - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46811 +CVE-2025-46814 - https://github.com/rennf93/fastapi-guard/security/advisories/GHSA-77q8-qmj7-x7pp +CVE-2025-46816 - https://github.com/patrickhener/goshs/security/advisories/GHSA-rwj2-w85g-5cmm +CVE-2025-46820 - https://github.com/phpgt/Dom/security/advisories/GHSA-cwj7-6v67-2cm4 +CVE-2025-46822 - https://github.com/OsamaTaher/Java-springboot-codebase/security/advisories/GHSA-q6mm-cm37-w637 +CVE-2025-46825 - https://github.com/kanboard/kanboard/security/advisories/GHSA-5wj3-c9v4-pj9v +CVE-2025-46828 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-5qw5-q55h-6qg7 CVE-2025-4690 - https://www.herodevs.com/vulnerability-directory/cve-2025-4690 CVE-2025-47154 - https://jessie.cafe/posts/pwning-ladybirds-libjs/ CVE-2025-47184 - https://www.exagrid.com/exagrid-products/exagrid-product-line/ @@ -106416,6 +106713,7 @@ CVE-2025-48074 - https://github.com/AcademySoftwareFoundation/openexr/security/a CVE-2025-48074 - https://github.com/ShielderSec/poc/tree/main/CVE-2025-48074 CVE-2025-48175 - https://github.com/AOMediaCodec/libavif/pull/2769 CVE-2025-48188 - https://savannah.gnu.org/bugs/?67079 +CVE-2025-48366 - https://github.com/Intermesh/groupoffice/security/advisories/GHSA-phhq-3h8f-qxpx CVE-2025-48368 - https://github.com/Intermesh/groupoffice/security/advisories/GHSA-c49j-qvp9-vgg6 CVE-2025-48369 - https://github.com/Intermesh/groupoffice/security/advisories/GHSA-45jj-r48j-75pp CVE-2025-48374 - https://github.com/project-zot/zot/security/advisories/GHSA-c37v-3c8w-crq8 @@ -106447,14 +106745,18 @@ CVE-2025-48827 - https://karmainsecurity.com/dont-call-that-protected-method-vbu CVE-2025-48828 - https://karmainsecurity.com/dont-call-that-protected-method-vbulletin-rce CVE-2025-48865 - https://github.com/fabiolb/fabio/security/advisories/GHSA-q7p4-7xjv-j3wf CVE-2025-48867 - https://github.com/horilla-opensource/horilla/security/advisories/GHSA-w242-xv47-j55r +CVE-2025-48868 - https://github.com/horilla-opensource/horilla/security/advisories/GHSA-h6qj-pwmx-wjhw CVE-2025-48869 - https://github.com/horilla-opensource/horilla/security/advisories/GHSA-99h5-x29f-727w CVE-2025-48882 - https://github.com/PHPOffice/Math/security/advisories/GHSA-42hm-pq2f-3r7m CVE-2025-48887 - https://github.com/vllm-project/vllm/security/advisories/GHSA-w6q7-j642-7c25 CVE-2025-48888 - https://github.com/denoland/deno/security/advisories/GHSA-xqxc-x6p3-w683 CVE-2025-48889 - https://github.com/gradio-app/gradio/security/advisories/GHSA-8jw3-6x8j-v96g CVE-2025-48934 - https://github.com/denoland/deno/security/advisories/GHSA-7w8p-chxq-2789 +CVE-2025-48935 - https://github.com/denoland/deno/security/advisories/GHSA-8vxj-4cph-c596 CVE-2025-48938 - https://github.com/cli/go-gh/commit/a08820a13f257d6c5b4cb86d37db559ec6d14577 CVE-2025-48942 - https://github.com/vllm-project/vllm/security/advisories/GHSA-6qc9-v4r8-22xg +CVE-2025-48944 - https://github.com/vllm-project/vllm/security/advisories/GHSA-vrq3-r879-7m65 +CVE-2025-48948 - https://github.com/navidrome/navidrome/security/advisories/GHSA-f238-rggp-82m3 CVE-2025-48949 - https://github.com/navidrome/navidrome/security/advisories/GHSA-5wgp-vjxm-3x2r CVE-2025-48950 - https://github.com/1Panel-dev/MaxKB/security/advisories/GHSA-p2qq-x9j2-px8v CVE-2025-48952 - https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-4p4p-vq2v-9489 @@ -106465,6 +106767,7 @@ CVE-2025-48992 - https://github.com/Intermesh/groupoffice/security/advisories/GH CVE-2025-48993 - https://github.com/Intermesh/groupoffice/security/advisories/GHSA-xv2x-v374-92gv CVE-2025-48996 - https://github.com/haxtheweb/issues/security/advisories/GHSA-fvx2-x7ff-fc56 CVE-2025-48998 - https://github.com/dataease/dataease/security/advisories/GHSA-2wfc-qwx7-w692 +CVE-2025-4900 - https://vuldb.com/?id.309456 CVE-2025-49002 - https://github.com/dataease/dataease/security/advisories/GHSA-999m-jv2p-5h34 CVE-2025-49002 - https://github.com/dataease/dataease/security/advisories/GHSA-h7hj-4j78-cvc7 CVE-2025-49003 - https://github.com/dataease/dataease/security/advisories/GHSA-x97w-69ff-r55q @@ -106512,6 +106815,7 @@ CVE-2025-49197 - https://www.first.org/cvss/calculator/3.1 CVE-2025-49198 - https://www.first.org/cvss/calculator/3.1 CVE-2025-49199 - https://www.first.org/cvss/calculator/3.1 CVE-2025-49200 - https://www.first.org/cvss/calculator/3.1 +CVE-2025-4939 - https://vuldb.com/?id.309502 CVE-2025-49484 - https://github.com/AdamWallwork/CVEs/tree/main/2025/CVE-2025-49484 CVE-2025-49484 - https://www.exploit-db.com/exploits/52373 CVE-2025-4954 - https://wpscan.com/vulnerability/673f35ff-e1d5-4099-86e7-8b6e3e410ef8/ @@ -106533,30 +106837,88 @@ CVE-2025-49832 - https://github.com/asterisk/asterisk/security/advisories/GHSA-m CVE-2025-5001 - https://drive.google.com/file/d/12IIt8eR591Z8O1ABOCkT_jdXSWaBxMZx/view?usp=drive_link CVE-2025-5001 - https://savannah.gnu.org/bugs/index.php?67069 CVE-2025-5002 - https://github.com/laifeng-boy/cve/issues/5 +CVE-2025-50110 - https://github.com/shinyColumn/CVE-2025-50110 CVE-2025-50129 - https://talosintelligence.com/vulnerability_reports/TALOS-2025-2220 +CVE-2025-50183 - https://github.com/OpenListTeam/OpenList/security/advisories/GHSA-2hw3-h8qx-hqqp +CVE-2025-50200 - https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-gh3x-4x42-fvq8 +CVE-2025-50201 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-52p5-5fmw-9hrf +CVE-2025-50202 - https://github.com/LycheeOrg/Lychee/security/advisories/GHSA-6rj9-gm78-vhf9 +CVE-2025-50233 - https://github.com/xiaoyangsec/cve +CVE-2025-50233 - https://github.com/xiaoyangsec/cve/blob/main/README.md +CVE-2025-50234 - https://github.com/xiaoyangsec/mccms/blob/main/MCCMS-SSRF.md CVE-2025-50251 - https://www.exploit-db.com/exploits/52211 +CVE-2025-50286 - https://github.com/binneko/CVE-2025-50286 CVE-2025-5031 - https://github.com/Ackites/KillWxapkg/issues/86 CVE-2025-5031 - https://github.com/Ackites/KillWxapkg/issues/86#issue-3053628148 CVE-2025-5033 - https://gitee.com/xiaobingby/TeaCMS/issues/IBYRPK CVE-2025-5034 - https://wpscan.com/vulnerability/ebd9aa9f-3da9-4457-922f-975bef6e33f8/ CVE-2025-5035 - https://wpscan.com/vulnerability/5dca30af-4624-4a71-93be-00fa8dc00c97/ +CVE-2025-50420 - https://github.com/Landw-hub/CVE-2025-50420 +CVE-2025-50422 - https://github.com/Landw-hub/CVE-2025-50422 CVE-2025-50428 - https://blog.smarttecs.com/posts/2025-004-cve-2025-50428/ +CVE-2025-50460 - https://github.com/Anchor0221/CVE-2025-50460 +CVE-2025-50461 - https://github.com/Anchor0221/CVE-2025-50461 +CVE-2025-50466 - https://gist.github.com/javadk/aa7b5eb6f0fca2fbc334129b7572c7c6 +CVE-2025-50468 - https://gist.github.com/javadk/0be29d2bb5a971bc09f3410659c83308 CVE-2025-50477 - https://drive.google.com/file/d/1HLxOWDSq6DHeZTVNcY0Tgkcd_eWTqYAS/view +CVE-2025-50477 - https://gist.github.com/Suuuuuzy/a3df9e88a41f9641c37e6d663f9b539c +CVE-2025-50484 - https://github.com/VasilVK/CVE/tree/main/CVE-2025-50484 +CVE-2025-50485 - https://github.com/VasilVK/CVE/tree/main/CVE-2025-50485 +CVE-2025-50486 - https://github.com/sahel0708/CVE/tree/main/CVE-2025-50486 +CVE-2025-50487 - https://github.com/VasilVK/CVE/tree/main/CVE-2025-50487 +CVE-2025-50488 - https://github.com/VasilVK/CVE/tree/main/CVE-2025-50488 +CVE-2025-50489 - https://github.com/VasilVK/CVE/tree/main/CVE-2025-50489 +CVE-2025-50490 - https://github.com/VasilVK/CVE/tree/main/CVE-2025-50490 +CVE-2025-50491 - https://github.com/VasilVK/CVE/tree/main/CVE-2025-50491 +CVE-2025-50493 - https://github.com/VasilVK/CVE/tree/main/CVE-2025-50493 +CVE-2025-50494 - https://github.com/VasilVK/CVE/tree/main/CVE-2025-50494 CVE-2025-5054 - https://www.qualys.com/2025/05/29/apport-coredump/apport-coredump.txt CVE-2025-5056 - https://github.com/Jacob-z691/CVE/issues/1 +CVE-2025-50567 - https://github.com/rahulhoysala/security-research/blob/main/CVE-2025-50567.md CVE-2025-5057 - https://github.com/Jacob-z691/CVE/issues/2 +CVE-2025-50578 - https://github.com/linuxserver/Heimdall/issues/1451 CVE-2025-50578 - https://medium.com/@juanfelipeoz.rar/cve-2025-50578-exploiting-host-header-injection-open-redirect-in-heimdall-application-733afceff2ea CVE-2025-5058 - https://ryankozak.com/posts/cve-2025-5058/ +CVE-2025-50581 - https://github.com/SimonKang949/Vulnerabilities/issues/6 +CVE-2025-50582 - https://github.com/SimonKang949/Vulnerabilities/issues/5 +CVE-2025-50583 - https://github.com/SimonKang949/Vulnerabilities/issues/4 +CVE-2025-50584 - https://github.com/SimonKang949/Vulnerabilities/issues/3 +CVE-2025-50586 - https://github.com/SimonKang949/Vulnerabilities/issues/1 +CVE-2025-50608 - https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/1 +CVE-2025-50609 - https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/2 +CVE-2025-50610 - https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/3 +CVE-2025-50611 - https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/4 +CVE-2025-50612 - https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/5 +CVE-2025-50613 - https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/6 +CVE-2025-50614 - https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/7 +CVE-2025-50615 - https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/8 +CVE-2025-50616 - https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/9 +CVE-2025-50617 - https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/10 CVE-2025-5063 - https://issues.chromium.org/issues/411573532 +CVE-2025-50635 - https://github.com/Chinesexilinyu/Netis-WF2780-cgitest.cgi-Vulnerability/tree/main/1 +CVE-2025-50675 - https://github.com/LukeSec/CVE-2025-50675-GPMAW-Permissions/tree/main CVE-2025-5068 - https://issues.chromium.org/issues/409059706 CVE-2025-50688 - https://medium.com/@Justinsecure/chained-rce-on-twistedweb-14-0-0-via-command-injection-and-unauthenticated-put-1aa657995b4e CVE-2025-50706 - https://xinyisleep.github.io/2024-04-24/Thinkphp5.1%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB-CNVD-2024-29981 CVE-2025-50707 - https://xinyisleep.github.io/2024-07-15/Thinkphp3.%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB-CNVD-2024-39045 +CVE-2025-50708 - https://github.com/mano257200/Perplexity-AI-GPT-4-v.2.51.0/blob/main/README.md +CVE-2025-50708 - https://github.com/mano257200/perplexity/blob/main/README.md +CVE-2025-50709 - https://github.com/mano257200/perplexity/blob/main/README.md +CVE-2025-50740 - https://github.com/AbhijithAJ/AutoConnect_IoT_Lib_vulnerability/blob/main/Report.pdf +CVE-2025-50740 - https://github.com/Hieromon/AutoConnect/issues/632 +CVE-2025-50754 - https://github.com/furk4nyildiz/CVE-2025-50754-PoC +CVE-2025-50756 - https://github.com/Summermu/VulnForIoT/tree/main/Wavlink_WN535K3/set_sys_adm_newpass/readme.md +CVE-2025-50757 - https://github.com/Summermu/VulnForIoT/tree/main/Wavlink_WN535K3/set_sys_adm_username/readme.md CVE-2025-5079 - https://github.com/dico-Z/CVE/issues/1 CVE-2025-50817 - https://medium.com/@abcd_68700/cve-2025-50817-python-future-module-arbitrary-code-execution-via-unintended-import-of-test-py-f0818ea93cf4 +CVE-2025-50819 - https://github.com/amooryx/arxiv-daily/security/advisories/GHSA-xqg6-5wfv-4855 +CVE-2025-50847 - https://github.com/hackerwahab/CS-Cart-Vulns/blob/main/CVE-2025-50847.md +CVE-2025-50850 - https://github.com/hackerwahab/CS-Cart-Vulns/blob/main/CVE-2025-50850.md CVE-2025-50869 - https://portswigger.net/web-security/cross-site-scripting/stored CVE-2025-50891 - https://www.adformhelp.com/hc/en-us/categories/9738364537233-Adform-Site-Tracking +CVE-2025-50897 - https://github.com/LuLuji04/POC-Boomv1.2 CVE-2025-5093 - https://wpscan.com/vulnerability/1862b4a6-5570-48a4-9b09-f9659eb0e9e3/ +CVE-2025-50952 - https://github.com/uclouvain/openjpeg/issues/1505 CVE-2025-5098 - https://korelogic.com/Resources/Advisories/KL-001-2025-003.txt CVE-2025-5099 - https://korelogic.com/Resources/Advisories/KL-001-2025-004.txt CVE-2025-5100 - https://korelogic.com/Resources/Advisories/KL-001-2025-005.txt @@ -106602,6 +106964,7 @@ CVE-2025-52164 - https://herolab.usd.de/security-advisories/usd-2025-0023/ CVE-2025-52166 - https://herolab.usd.de/usd-2025-0028/ CVE-2025-52168 - https://herolab.usd.de/security-advisories/usd-2025-0022/ CVE-2025-52169 - https://herolab.usd.de/security-advisories/usd-2025-0026/ +CVE-2025-5217 - https://vuldb.com/?submit.582963 CVE-2025-52187 - https://medium.com/@sanjay70023/cve-2025-52187-stored-xss-in-school-management-system-php-mysql-79cadcd6340f CVE-2025-5227 - https://github.com/bleakTS/myCVE/issues/18 CVE-2025-52294 - https://pastebin.com/3K4kt713 @@ -106671,6 +107034,7 @@ CVE-2025-54317 - https://servicedesk.logpoint.com/hc/en-us/articles/286855076755 CVE-2025-54317 - https://servicedesk.logpoint.com/hc/en-us/sections/7201103730845-Product-Security CVE-2025-54336 - https://blog.aziz.tn/2025/08/cve-2025-54336.html/ CVE-2025-54336 - https://support.plesk.com/hc/en-us/articles/33785727869847-Vulnerability-CVE-2025-54336 +CVE-2025-54352 - https://www.imperva.com/blog/beware-a-threat-actor-could-steal-the-titles-of-your-private-and-draft-wordpress-posts/ CVE-2025-54413 - https://drive.google.com/drive/folders/1bmVV18mnPbWy21hVYgf51yVJpf78vtB_?usp=sharing CVE-2025-54462 - https://talosintelligence.com/vulnerability_reports/TALOS-2025-2239 CVE-2025-54480 - https://talosintelligence.com/vulnerability_reports/TALOS-2025-2234 @@ -106697,6 +107061,9 @@ CVE-2025-54769 - https://korelogic.com/Resources/Advisories/KL-001-2025-016.txt CVE-2025-54782 - https://socket.dev/blog/nestjs-rce-vuln CVE-2025-54874 - https://securitylab.github.com/advisories/GHSL-2025-057_OpenCV CVE-2025-55004 - https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-cjc8-g9w8-chfw +CVE-2025-55005 - https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-v393-38qx-v8fp +CVE-2025-55010 - https://github.com/kanboard/kanboard/security/advisories/GHSA-359x-c69j-q64r +CVE-2025-55011 - https://github.com/kanboard/kanboard/security/advisories/GHSA-26f4-rx96-xc55 CVE-2025-5509 - https://github.com/uglory-gll/javasec/blob/main/shiyi-blog.md CVE-2025-5509 - https://github.com/uglory-gll/javasec/blob/main/shiyi-blog.md#1file-path-traversal CVE-2025-5510 - https://github.com/uglory-gll/javasec/blob/main/shiyi-blog.md @@ -106709,12 +107076,28 @@ CVE-2025-5513 - https://github.com/uglory-gll/javasec/blob/main/shiyi-blog.md CVE-2025-5513 - https://github.com/uglory-gll/javasec/blob/main/shiyi-blog.md#4stored-cross-site-scripting CVE-2025-55149 - https://github.com/ulab-uiuc/tiny-scientist/security/advisories/GHSA-rrgf-hcr9-jq6h CVE-2025-55150 - https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-xw8v-9mfm-g2pm +CVE-2025-55151 - https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-76hv-h7g2-xfv3 CVE-2025-55152 - https://github.com/oakserver/oak/security/advisories/GHSA-r3v7-pc4g-7xp9 +CVE-2025-55156 - https://github.com/pyload/pyload/security/advisories/GHSA-pwh4-6r3m-j2rf CVE-2025-55160 - https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-6hgw-6x87-578x +CVE-2025-55161 - https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-ff33-grr6-rmvp +CVE-2025-55162 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-95j4-hw7f-v2rh CVE-2025-55165 - https://github.com/gelbphoenix/autocaliweb/security/advisories/GHSA-44vp-wgh9-9535 +CVE-2025-55166 - https://github.com/darylldoyle/svg-sanitizer/security/advisories/GHSA-22wq-q86m-83fh +CVE-2025-55167 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-4fqm-ww3v-6mwv +CVE-2025-55168 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-6wjm-c879-pjf6 +CVE-2025-55169 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mm3p-7573-4x4j +CVE-2025-55170 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-77hc-c8f4-p3hc +CVE-2025-55171 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-8rm5-3jvx-hcxv +CVE-2025-55188 - https://github.com/lunbun/CVE-2025-55188/ CVE-2025-55188 - https://lunbun.dev/blog/cve-2025-55188/ CVE-2025-55188 - https://www.openwall.com/lists/oss-security/2025/08/09/1 CVE-2025-55194 - https://drive.google.com/file/d/10exp_BS9kRKHrFSPjiA_ZYUVJbHN8doW/view +CVE-2025-55194 - https://github.com/Part-DB/Part-DB-server/security/advisories/GHSA-7rv3-rcxv-69ww +CVE-2025-55195 - https://github.com/denoland/std/security/advisories/GHSA-crjp-8r9q-2j9r +CVE-2025-55203 - https://github.com/makeplane/plane/security/advisories/GHSA-rwjc-xhh3-m9m9 +CVE-2025-55205 - https://github.com/projectcapsule/capsule/security/advisories/GHSA-fcpm-6mxq-m5vv +CVE-2025-55207 - https://github.com/withastro/astro/security/advisories/GHSA-9x9c-ghc5-jhw9 CVE-2025-55212 - https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-fh55-q5pj-pxgw CVE-2025-5526 - https://wpscan.com/vulnerability/10196cd3-5bf7-4e40-a4f7-4ff2d34d516d/ CVE-2025-55291 - https://github.com/shaarli/Shaarli/security/advisories/GHSA-7w7w-pw4j-265h @@ -106722,34 +107105,69 @@ CVE-2025-55293 - https://github.com/meshtastic/firmware/pull/6372 CVE-2025-55296 - https://github.com/librenms/librenms/security/advisories/GHSA-vxq6-8cwm-wj99 CVE-2025-55298 - https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-9ccg-6pjw-x645 CVE-2025-55300 - https://github.com/komari-monitor/komari/security/advisories/GHSA-q355-h244-969h +CVE-2025-55303 - https://github.com/withastro/astro/security/advisories/GHSA-xf8x-j4p2-f749 CVE-2025-55304 - https://github.com/Exiv2/exiv2/issues/3333 CVE-2025-55345 - https://research.jfrog.com/vulnerabilities/codex-cli-symlink-arbitrary-file-overwrite-jfsa-2025-001378631/ CVE-2025-55346 - https://research.jfrog.com/vulnerabilities/flowise-js-injection-remote-code-exection-jfsa-2025-001379925/ +CVE-2025-55444 - https://gist.github.com/Anudeepkadambala/88c6065f1de1597be96e50a573cde56e +CVE-2025-55444 - https://github.com/Anudeepkadambala/CVE-Reports/security/advisories/GHSA-r4mf-mr9h-f27m CVE-2025-55472 - https://cyberducky.medium.com/blind-sql-injection-found-in-tirreno-security-analytics-cbd791cec1c0 CVE-2025-55473 - https://cyber-ducky.com/xss-found-in-asian-arts-talent-foundation-2/ CVE-2025-55474 - https://cyber-ducky.com/stored-xss-found-in-many-notes-the-best-note-taking-app/ CVE-2025-55474 - https://medium.com/@cyberducky/how-i-found-a-stored-xss-in-markdown-rendering-e73cfc3cd93a +CVE-2025-55476 - https://github.com/ShaneIsrael/fireshare/issues/311 CVE-2025-55483 - https://github.com/SolitaryGrass/IoT_vuln/blob/main/tenda/AC6/AC6V2.0RTL_V15.03.06.23/formSetMacFilterCfg/poc.md CVE-2025-55495 - https://github.com/SolitaryGrass/IoT_vuln/blob/main/tenda/AC6/AC6V2.0RTL_V15.03.06.23/fromSetIpMacBind/poc.md +CVE-2025-55498 - https://github.com/SolitaryGrass/IoT_vuln/blob/main/tenda/AC6/AC6V2.0RTL_V15.03.06.23/fromSetSysTime/poc.md +CVE-2025-55499 - https://github.com/SolitaryGrass/IoT_vuln/blob/main/tenda/AC6/AC6V2.0RTL_V15.03.06.23/fromSetSysTime/poc.md +CVE-2025-55503 - https://github.com/SolitaryGrass/IoT_vuln/blob/main/tenda/AC6/AC6V2.0RTL_V15.03.06.23/saveParentControlInfo/poc.md CVE-2025-55521 - https://github.com/vityuasd/VulList/blob/main/vul_2.md CVE-2025-55522 - https://github.com/vityuasd/VulList/blob/main/vul_1.md +CVE-2025-55523 - https://github.com/agent0ai/agent-zero/issues/687 +CVE-2025-55526 - https://github.com/Zie619/n8n-workflows/issues/48 CVE-2025-55575 - https://github.com/Aether-0/CVE-2025-55575 CVE-2025-55579 - https://github.com/ddobrev25/CVE-2025-55579 CVE-2025-55580 - https://github.com/ddobrev25/CVE-2025-55580 CVE-2025-55581 - https://cybermaya.in/posts/Post-42/ CVE-2025-55582 - https://cybermaya.in/posts/Post-43/ CVE-2025-55583 - https://cybermaya.in/posts/Post-44/ +CVE-2025-55584 - https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Telnet/PoC.md +CVE-2025-55585 - https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Eval%20Injection/PoC.md +CVE-2025-55587 - https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Boa%20-%20BOF/formMapDelDevice%20PoC.md +CVE-2025-55588 - https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Boa%20-%20BOF/formPortFw%20PoC.md CVE-2025-55589 - https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Boa%20-%20Command%20Injection/PoC%201.md CVE-2025-55590 - https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Boa%20-%20Command%20Injection/PoC%203.md +CVE-2025-55591 - https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Boa%20-%20Command%20Injection/PoC%202.md +CVE-2025-55599 - https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_65/65.md CVE-2025-55602 - https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_79/79.md +CVE-2025-55603 - https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_45/45.md +CVE-2025-55605 - https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_46/46.md CVE-2025-55606 - https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_44/44.md CVE-2025-55613 - https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_58/58.md +CVE-2025-55618 - https://github.com/MatJosephs/CVEs/tree/main/CVE-2025-55618 +CVE-2025-55727 - https://github.com/xwikisas/xwiki-pro-macros/security/advisories/GHSA-hxqp-983c-m8h9 +CVE-2025-55728 - https://github.com/xwikisas/xwiki-pro-macros/security/advisories/GHSA-48f4-h726-74p5 +CVE-2025-55729 - https://github.com/xwikisas/xwiki-pro-macros/security/advisories/GHSA-22xj-jpjg-gpgw CVE-2025-5573 - https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_44/44.md CVE-2025-55730 - https://github.com/xwikisas/xwiki-pro-macros/security/advisories/GHSA-5w8v-h22g-j2mp +CVE-2025-55733 - https://github.com/ThinkInAIXYZ/deepchat/security/advisories/GHSA-hqr4-4gfc-5p2j CVE-2025-55734 - https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-h239-vv39-v3vx CVE-2025-55734 - https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-jw79-2xvp-76p8 +CVE-2025-55735 - https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-gj9v-qhc3-gcfx +CVE-2025-55736 - https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-6q83-vfmq-wf72 +CVE-2025-55737 - https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-6hp9-jv2f-88wr +CVE-2025-55741 - https://github.com/unopim/unopim/security/advisories/GHSA-8p2f-fx4q-75cx +CVE-2025-55742 - https://github.com/unopim/unopim/security/advisories/GHSA-xr97-25v7-hc2q CVE-2025-55743 - https://github.com/unopim/unopim/security/advisories/GHSA-v22v-xwh7-2vrm +CVE-2025-55744 - https://github.com/unopim/unopim/security/advisories/GHSA-287x-6r2h-f9mw +CVE-2025-55745 - https://github.com/unopim/unopim/security/advisories/GHSA-74rg-6f92-g6wx +CVE-2025-55763 - https://github.com/krispybyte/CVE-2025-55763 +CVE-2025-55834 - https://github.com/RrEeSeEeTt/CVEs/blob/main/JeeWMS-xss.md +CVE-2025-55835 - https://github.com/Utainlab/Vulns/blob/main/CVE-2025-55835.txt +CVE-2025-55885 - https://github.com/0xZeroSec/CVE-2025-55885 CVE-2025-55887 - https://github.com/0xZeroSec/CVE-2025-55887 +CVE-2025-55888 - https://github.com/0xZeroSec/CVE-2025-55888 +CVE-2025-55904 - https://github.com/open5gs/open5gs/issues/3942 CVE-2025-55911 - https://medium.com/@mukund.s1337/cve-2025-55911-clipbucket-5-5-2-build-90-ssrf-via-upload-actions-file-downloader-php-eb49dc02bd6f CVE-2025-55912 - https://medium.com/@mukund.s1337/cve-2025-55912-clipbucket-5-5-0-unauthenticated-arbitrary-file-upload-rce-720c0c0fbc58 CVE-2025-55944 - https://github.com/G3XAR/Vulnerability-Research/tree/main/CVE-2025-55944 @@ -106781,21 +107199,72 @@ CVE-2025-56710 - https://medium.com/@mrshaikh841/csrf-pocs-1c96d9305298 CVE-2025-5679 - https://gitee.com/agile-bpm/agile-bpm-basic/issues/ICAQWG CVE-2025-5680 - https://gitee.com/agile-bpm/agile-bpm-basic/issues/ICAPT5 CVE-2025-57052 - https://x-0r.com/posts/cJSON-Array-Index-Parsing-Vulnerability +CVE-2025-57057 - https://github.com/vulnDetailRecord/VulforDevice/blob/main/Tenda/G3/ipMacBindListStore.md +CVE-2025-57058 - https://github.com/vulnDetailRecord/VulforDevice/blob/main/Tenda/G3/formSetDebugCfg.md +CVE-2025-57060 - https://github.com/vulnDetailRecord/VulforDevice/blob/main/Tenda/G3/dns_forward_rule_store.md +CVE-2025-57061 - https://github.com/vulnDetailRecord/VulforDevice/blob/main/Tenda/G3/formIPMacBindModify.md +CVE-2025-57062 - https://github.com/vulnDetailRecord/VulforDevice/blob/main/Tenda/G3/formDelDhcpRule.md +CVE-2025-57064 - https://github.com/vulnDetailRecord/VulforDevice/blob/main/Tenda/G3/modifyDhcpRule.md +CVE-2025-57071 - https://github.com/vulnDetailRecord/VulforDevice/blob/main/Tenda/G3/formAddVpnUsers.md +CVE-2025-57078 - https://github.com/vulnDetailRecord/VulforDevice/blob/main/Tenda/G3/formModifyPppAuthWhiteMac.md +CVE-2025-57085 - https://github.com/vulnDetailRecord/VulforDevice/blob/main/Tenda/W30E/UploadCfg.md +CVE-2025-57087 - https://github.com/vulnDetailRecord/VulforDevice/blob/main/Tenda/W30E/werlessAdvancedSet.md CVE-2025-5709 - https://github.com/YanHanQihomework/cve/issues/2 CVE-2025-57105 - https://github.com/xyh4ck/iot_poc +CVE-2025-57117 - https://github.com/Jazeye/CVE/blob/main/CVE-2025-57117/README.md +CVE-2025-57119 - https://github.com/Jazeye/CVE/blob/main/CVE-2025-57119/README.md CVE-2025-5712 - https://github.com/mysq13/CVE/issues/2 +CVE-2025-57140 - https://github.com/line2222/vuln/issues/5 +CVE-2025-57141 - https://github.com/line2222/vuln/issues/2 CVE-2025-57174 - https://semaja2.net/2025/08/02/siklu-eh-unauthenticated-rce/ CVE-2025-57204 - https://grumpz.net/cve-2025-57204-stored-xss-in-stocky-pos-with-inventory-management-and-hrm-ui-lib-50 CVE-2025-57205 - https://grumpz.net/cve-2025-57205-stored-xss-in-inilabs-school-express-62-sms-express +CVE-2025-57248 - https://github.com/sumatrapdfreader/sumatrapdf/issues/5035 CVE-2025-5726 - https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md#field-6-division-field-in-division-system-page CVE-2025-5727 - https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md#field-7-title-field-in-announcement-page CVE-2025-57278 - https://www.zyenra.com/blog/improper-ip-bound-session-authentication-in-lb-link-cpe300m +CVE-2025-57285 - https://gist.github.com/Dremig/1ba111f9b1f7cffe1fcb4838b64e55b9 +CVE-2025-57293 - https://github.com/ZZ2266/.github.io/blob/main/comfast/multi_pppoe.markdown +CVE-2025-57295 - https://github.com/ZZ2266/.github.io/blob/main/H3C/readme.md +CVE-2025-57296 - https://github.com/ZZ2266/.github.io/blob/main/Tenda/readme.md +CVE-2025-57296 - https://github.com/ZZ2266/.github.io/tree/main/Tenda CVE-2025-5730 - https://wpscan.com/vulnerability/e1e7f423-f981-413c-a99a-e5927fc1cd0c/ +CVE-2025-57425 - https://gist.github.com/progprnv/10110b20469e4ae02aa1c9bfe130f5e9 +CVE-2025-57430 - https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57430 +CVE-2025-57431 - https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57431 +CVE-2025-57432 - https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57432 +CVE-2025-57433 - https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57433 +CVE-2025-57434 - https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57434 +CVE-2025-57437 - https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57437 +CVE-2025-57438 - https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57438 +CVE-2025-57440 - https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57440 CVE-2025-57520 - https://onurcangenc.com.tr/posts/cve-2025-57520--stored-xss-in-decap-cms-3-8-3/ +CVE-2025-57538 - https://github.com/khankishiyev-j/bug-bounty/blob/main/proxmox-xss +CVE-2025-57539 - https://github.com/khankishiyev-j/bug-bounty/blob/main/proxmox-xss +CVE-2025-57540 - https://github.com/khankishiyev-j/bug-bounty/blob/main/proxmox-xss CVE-2025-5758 - https://github.com/mysq13/CVE/issues/6 +CVE-2025-57601 - https://github.com/Shubhangborkar/aikaan-vulnerabilities/blob/main/cve1-shared-ssh-key.md CVE-2025-5761 - https://github.com/qingchuana/q1ngchuan/issues/5 +CVE-2025-57623 - https://gist.github.com/z472421519/d17061ea79a72d39fe69c000fa1a6280 +CVE-2025-57623 - https://github.com/z472421519/BinaryAudit/blob/main/PoC/NPD/TOTOLink/CONTENT_LENGTH.md +CVE-2025-57631 - https://gist.github.com/Theresasu1/b1b57b3763a286d9491541180c99368b CVE-2025-5764 - https://github.com/tuooo/CVE/issues/5 +CVE-2025-57685 - https://github.com/mono7s/LB-Link/blob/main/bs_SetSerial.md +CVE-2025-57692 - https://github.com/Saconyfx/security-advisories/blob/main/CVE-2025-57692/advisory.md +CVE-2025-57751 - https://github.com/pyload/pyload/security/advisories/GHSA-9gjj-6gj7-c4wj +CVE-2025-57753 - https://github.com/sapphi-red/vite-plugin-static-copy/security/advisories/GHSA-pp7p-q8fx-2968 +CVE-2025-57760 - https://github.com/langflow-ai/langflow/security/advisories/GHSA-4gv9-mp8m-592r +CVE-2025-57761 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-fxwc-r5m4-hj62 +CVE-2025-57764 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-qx7f-q867-cgx2 +CVE-2025-57765 - https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-39r5-c63f-99mx +CVE-2025-57768 - https://github.com/Alanaktion/phproject/security/advisories/GHSA-mhhg-qx37-g369 CVE-2025-57770 - https://zitadel.com/docs/self-hosting/manage/production#limits-and-quotas +CVE-2025-57772 - https://github.com/dataease/dataease/security/advisories/GHSA-v37q-vh67-9rqv +CVE-2025-57799 - https://github.com/lemon8866/StreamVault/security/advisories/GHSA-qg4r-92hv-g9f4 +CVE-2025-57803 - https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-mxvv-97wh-cfmm +CVE-2025-57805 - https://github.com/The-Scratch-Channel/tsc-web-client/security/advisories/GHSA-h5rj-2466-qr23 +CVE-2025-57807 - https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-23hg-53q6-hqfg +CVE-2025-57808 - https://github.com/esphome/esphome/security/advisories/GHSA-mxh2-ccgj-8635 CVE-2025-57833 - https://medium.com/@EyalSec/django-unauthenticated-0-click-rce-and-sql-injection-using-default-configuration-059964f3f898 CVE-2025-5789 - https://github.com/awindog/cve/blob/main/11.md CVE-2025-5790 - https://github.com/awindog/cve/blob/main/12.md @@ -106826,51 +107295,248 @@ CVE-2025-5971 - https://github.com/qingchuana/q1ngchuan/issues/6 CVE-2025-5972 - https://github.com/kakalalaww/CVE/issues/5 CVE-2025-5973 - https://github.com/kakalalaww/CVE/issues/6 CVE-2025-5974 - https://github.com/kakalalaww/CVE/issues/8 +CVE-2025-59798 - https://bugs.ghostscript.com/show_bug.cgi?id=708539 +CVE-2025-59799 - https://bugs.ghostscript.com/show_bug.cgi?id=708517 +CVE-2025-59800 - https://bugs.ghostscript.com/show_bug.cgi?id=708602 CVE-2025-5998 - https://wpscan.com/vulnerability/17bad181-6cea-445e-b91c-22415d90743e/ +CVE-2025-60017 - https://github.com/Bin4ry/UniPwn CVE-2025-60017 - https://spectrum.ieee.org/unitree-robot-exploit CVE-2025-6018 - https://bugzilla.suse.com/show_bug.cgi?id=1243226 CVE-2025-6018 - https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt CVE-2025-6019 - https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt +CVE-2025-60250 - https://github.com/Bin4ry/UniPwn CVE-2025-60250 - https://spectrum.ieee.org/unitree-robot-exploit +CVE-2025-60251 - https://github.com/Bin4ry/UniPwn CVE-2025-60251 - https://spectrum.ieee.org/unitree-robot-exploit +CVE-2025-6050 - https://github.com/stephenmcd/mezzanine/discussions/2080 +CVE-2025-6092 - https://gist.github.com/superboy-zjc/96f0d56da584d840ba18355cbea96ac4 +CVE-2025-6095 - https://github.com/YZS17/CVE/blob/main/Jasmin-Ransomware/sqli_password.md +CVE-2025-6095 - https://github.com/YZS17/CVE/blob/main/Jasmin-Ransomware/sqli_username.md +CVE-2025-6096 - https://github.com/YZS17/CVE/blob/main/Jasmin-Ransomware/sqli_search.md +CVE-2025-6097 - https://github.com/pfwqdxwdd/cve/blob/main/6.md +CVE-2025-6097 - https://github.com/pfwqdxwdd/cve/blob/main/6.md#poc +CVE-2025-6099 - https://github.com/szluyu99/gin-vue-blog/issues/28 +CVE-2025-6100 - https://github.com/Bemcliu/cve/blob/main/README.md +CVE-2025-6100 - https://github.com/Bemcliu/cve/blob/main/README.md#poc +CVE-2025-6105 - https://github.com/webzzaa/CVE-/issues/3 CVE-2025-6106 - https://github.com/luokuang1/CVE/issues/2 +CVE-2025-6107 - https://gist.github.com/superboy-zjc/f71b84ed074260a5e459581caa2f1fb2 +CVE-2025-6107 - https://gist.github.com/superboy-zjc/f71b84ed074260a5e459581caa2f1fb2#proof-of-concept +CVE-2025-6114 - https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_60/60.md +CVE-2025-6114 - https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_60/60.md#poc +CVE-2025-6115 - https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_62/62.md#poc +CVE-2025-6119 - https://github.com/assimp/assimp/issues/6219 +CVE-2025-6119 - https://github.com/assimp/assimp/issues/6219#issuecomment-2945016005 +CVE-2025-6120 - https://github.com/assimp/assimp/issues/6220 +CVE-2025-6120 - https://github.com/assimp/assimp/issues/6220#issuecomment-2945018579 CVE-2025-6121 - https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir632-dlink-get_pure_content CVE-2025-6121 - https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir632-dlink-get_pure_content#poc +CVE-2025-6122 - https://github.com/ez-lbz/poc/issues/3 +CVE-2025-6123 - https://github.com/ez-lbz/poc/issues/1 +CVE-2025-6124 - https://github.com/ez-lbz/poc/issues/4 +CVE-2025-6125 - https://github.com/kakalalaww/CVE/issues/11 +CVE-2025-6126 - https://github.com/kakalalaww/CVE/issues/12 +CVE-2025-6127 - https://github.com/kakalalaww/CVE/issues/14 +CVE-2025-6128 - https://github.com/byxs0x0/cve2/blob/main/8.md +CVE-2025-6128 - https://github.com/byxs0x0/cve2/blob/main/8.md#poc +CVE-2025-6129 - https://github.com/byxs0x0/cve2/blob/main/9.md +CVE-2025-6129 - https://github.com/byxs0x0/cve2/blob/main/9.md#poc +CVE-2025-6132 - https://github.com/ltranquility/CVE/issues/3 +CVE-2025-6134 - https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertClient_client_id.md#poc +CVE-2025-6135 - https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertNominee.php_client_id.md +CVE-2025-6135 - https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertNominee.php_nominee_id.md +CVE-2025-6136 - https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertPayment.php.md +CVE-2025-6136 - https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertPayment.php.md#poc +CVE-2025-6140 - https://github.com/gabime/spdlog/issues/3360 +CVE-2025-6140 - https://github.com/gabime/spdlog/issues/3360#issuecomment-2729579422 +CVE-2025-6143 - https://github.com/awindog/cve/blob/main/13.md +CVE-2025-6144 - https://github.com/awindog/cve/blob/main/688/1.md#poc +CVE-2025-6145 - https://github.com/awindog/cve/blob/main/688/2.md +CVE-2025-6145 - https://github.com/awindog/cve/blob/main/688/2.md#poc +CVE-2025-6147 - https://github.com/Lena-lyy/cve/blob/main/4.md +CVE-2025-6147 - https://github.com/Lena-lyy/cve/blob/main/4.md#poc +CVE-2025-6148 - https://github.com/Lena-lyy/cve/blob/main/5.md +CVE-2025-6148 - https://github.com/Lena-lyy/cve/blob/main/5.md#poc +CVE-2025-6149 - https://github.com/Lena-lyy/cve/blob/main/6.md +CVE-2025-6149 - https://github.com/Lena-lyy/cve/blob/main/6.md#poc +CVE-2025-6150 - https://github.com/Lena-lyy/cve/blob/main/688/7.md#poc +CVE-2025-6151 - https://github.com/WhereisDoujo/CVE/issues/7 +CVE-2025-6153 - https://github.com/zzb1388/cve/issues/1 +CVE-2025-6154 - https://github.com/zzb1388/cve/issues/2 +CVE-2025-6155 - https://github.com/zzb1388/cve/issues/3 +CVE-2025-6158 - https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir665-dlink +CVE-2025-6158 - https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir665-dlink#poc +CVE-2025-6159 - https://github.com/Aalok-zz/cve/issues/1 +CVE-2025-6160 - https://github.com/yitianweiming/cve/issues/1 CVE-2025-6161 - https://github.com/kakalalaww/CVE/issues/17 +CVE-2025-6162 - https://github.com/Lena-lyy/cve/blob/main/688/8.md +CVE-2025-6162 - https://github.com/Lena-lyy/cve/blob/main/688/8.md#poc +CVE-2025-6163 - https://github.com/Lena-lyy/cve/blob/main/688/9.md#poc +CVE-2025-6164 - https://github.com/awindog/cve/blob/main/688/10.md +CVE-2025-6164 - https://github.com/awindog/cve/blob/main/688/10.md#poc +CVE-2025-6165 - https://github.com/awindog/cve/blob/main/688/11.md +CVE-2025-6165 - https://github.com/awindog/cve/blob/main/688/11.md#poc +CVE-2025-6166 - https://github.com/frdel/agent-zero/issues/383 +CVE-2025-6166 - https://github.com/frdel/agent-zero/issues/383#issuecomment-2893239897 +CVE-2025-6167 - https://github.com/themanojdesai/python-a2a/issues/40 +CVE-2025-6167 - https://github.com/themanojdesai/python-a2a/issues/40#issuecomment-2904804388 CVE-2025-6174 - https://wpscan.com/vulnerability/ff827f67-712e-4ab6-b6aa-7f5e6ff1283a/ CVE-2025-6200 - https://wpscan.com/vulnerability/27c35255-4963-4d93-85e7-9e7688e5eb2e/ +CVE-2025-6220 - https://github.com/d0n601/CVE-2025-6220 CVE-2025-6220 - https://ryankozak.com/posts/cve-2025-6220/ +CVE-2025-6224 - https://github.com/juju/utils/security/advisories/GHSA-h34r-jxqm-qgpr CVE-2025-6234 - https://wpscan.com/vulnerability/7447c4e1-81b9-4415-b425-27491ff692b2/ CVE-2025-6236 - https://wpscan.com/vulnerability/ff4d312b-a4d1-40cd-a555-a0a1b46f9959/ +CVE-2025-6269 - https://github.com/HDFGroup/hdf5/issues/5579 +CVE-2025-6270 - https://github.com/HDFGroup/hdf5/issues/5580 +CVE-2025-6271 - https://github.com/swftools/swftools/issues/239 CVE-2025-6272 - https://github.com/wasm3/wasm3/issues/531 +CVE-2025-6273 - https://github.com/WebAssembly/wabt/issues/2574 +CVE-2025-6274 - https://github.com/WebAssembly/wabt/issues/2598 +CVE-2025-6275 - https://github.com/WebAssembly/wabt/issues/2614 +CVE-2025-6276 - https://github.com/eeeeeekkkkkkkk/POC/blob/main/%E9%BB%84%E9%87%91%E9%80%9A%E4%BA%8C%E7%BA%A7%E7%B3%BB%E7%BB%9F%E4%B8%89%E4%BB%A3%E7%AE%A1%E7%90%86%E7%AB%AF%E7%B3%BB%E7%BB%9FrentTakeInfoPage%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md CVE-2025-6277 - https://github.com/eeeeeekkkkkkkk/POC/blob/main/%E9%BB%84%E9%87%91%E9%80%9A%E4%BA%8C%E7%BA%A7%E7%B3%BB%E7%BB%9F%E4%B8%89%E4%BB%A3%E7%AE%A1%E7%90%86%E7%AB%AF%E7%B3%BB%E7%BB%9FcustTakeInfoPage%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md +CVE-2025-6278 - https://github.com/Upsonic/Upsonic/issues/356 +CVE-2025-6279 - https://github.com/Upsonic/Upsonic/issues/353 +CVE-2025-6280 - https://github.com/TransformerOptimus/SuperAGI/issues/1466 +CVE-2025-6282 - https://github.com/xlang-ai/OpenAgents/issues/141 +CVE-2025-6283 - https://github.com/xataio/agent/issues/179 CVE-2025-6284 - https://medium.com/@kkfavas481/csrf-in-car-rental-portal-b202b3f2a4f6 +CVE-2025-6291 - https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink +CVE-2025-6291 - https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink#poc +CVE-2025-6292 - https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink-sub_4091AC +CVE-2025-6292 - https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink-sub_4091AC#poc +CVE-2025-6293 - https://github.com/1xxxgg/cve/issues/3 +CVE-2025-6294 - https://github.com/1xxxgg/cve/issues/2 +CVE-2025-6295 - https://github.com/1xxxgg/cve/issues/1 CVE-2025-6296 - https://github.com/y2xsec324/cve/issues/1 CVE-2025-6299 - https://docs.google.com/document/d/1meuD3WLzPE0HHQAm_Ar6zx1NDyO29zsK/edit?usp=sharing&ouid=108490350035271792747&rtpof=true&sd=true +CVE-2025-6300 - https://github.com/GarminYoung/myCVE/issues/10 +CVE-2025-6303 - https://github.com/trinity273-max/cve/issues/2 +CVE-2025-6304 - https://github.com/trinity273-max/cve/issues/1 +CVE-2025-6305 - https://github.com/kali-001/cve/issues/3 +CVE-2025-6306 - https://github.com/kali-001/cve/issues/2 +CVE-2025-6307 - https://github.com/kali-001/cve/issues/1 +CVE-2025-6311 - https://github.com/dragonghost2025/cve/issues/1 +CVE-2025-6312 - https://github.com/dragonghost2025/cve/issues/3 +CVE-2025-6313 - https://github.com/dragonghost2025/cve/issues/4 +CVE-2025-6314 - https://github.com/dragonghost2025/cve/issues/5 +CVE-2025-6315 - https://github.com/vphcc/cve1/issues/1 +CVE-2025-6316 - https://github.com/vphcc/cve1/issues/2 +CVE-2025-6317 - https://github.com/vphcc/cve1/issues/3 +CVE-2025-6328 - https://github.com/Thir0th/Thir0th-CVE/blob/main/D-Link%20DIR-815%20RevA%20v1.01.md +CVE-2025-6335 - https://github.com/jujubooom/CVE/issues/1 +CVE-2025-6336 - https://github.com/awindog/cve/blob/main/688/12.md +CVE-2025-6336 - https://github.com/awindog/cve/blob/main/688/12.md#poc +CVE-2025-6337 - https://github.com/awindog/cve/blob/main/688/14.md +CVE-2025-6340 - https://github.com/tuooo/CVE/issues/14 +CVE-2025-6341 - https://github.com/tuooo/CVE/issues/15 +CVE-2025-6342 - https://github.com/ltranquility/CVE/issues/7 +CVE-2025-6343 - https://github.com/ltranquility/CVE/issues/6 +CVE-2025-6344 - https://github.com/ltranquility/CVE/issues/5 +CVE-2025-6345 - https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README4.md +CVE-2025-6347 - https://gist.github.com/0xCaptainFahim/8bb9021dcea33863eaf0279aaca2671c CVE-2025-6353 - https://github.com/asd1238525/cve/blob/main/xss2.md CVE-2025-6353 - https://github.com/asd1238525/cve/blob/main/xss2.md#poc +CVE-2025-6354 - https://github.com/AlbaDove/cve/issues/1 CVE-2025-6355 - https://github.com/rom4j/cve/issues/15 CVE-2025-6356 - https://github.com/rom4j/cve/issues/14 CVE-2025-6357 - https://github.com/rom4j/cve/issues/13 CVE-2025-6358 - https://github.com/rom4j/cve/issues/12 CVE-2025-6359 - https://github.com/rom4j/cve/issues/11 CVE-2025-6360 - https://github.com/rom4j/cve/issues/10 +CVE-2025-6361 - https://github.com/rom4j/cve/issues/9 +CVE-2025-6362 - https://github.com/rom4j/cve/issues/8 +CVE-2025-6363 - https://github.com/rom4j/cve/issues/7 +CVE-2025-6364 - https://github.com/rom4j/cve/issues/6 +CVE-2025-6367 - https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md +CVE-2025-6368 - https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md +CVE-2025-6369 - https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md +CVE-2025-6370 - https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md +CVE-2025-6371 - https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md +CVE-2025-6372 - https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md +CVE-2025-6373 - https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md CVE-2025-6374 - https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md +CVE-2025-6375 - https://github.com/pocoproject/poco/issues/4915 +CVE-2025-6393 - https://github.com/awindog/cve/blob/main/688/15.md CVE-2025-6393 - https://github.com/awindog/cve/blob/main/688/16.md +CVE-2025-6394 - https://github.com/aoc1997/cve/issues/1 CVE-2025-6399 - https://github.com/d2pq/cve/blob/main/616/19.md CVE-2025-6399 - https://github.com/d2pq/cve/blob/main/616/19.md#poc +CVE-2025-6399 - https://vuldb.com/?id.313392 CVE-2025-6401 - https://github.com/d2pq/cve/blob/main/616/21.md CVE-2025-6401 - https://github.com/d2pq/cve/blob/main/616/21.md#poc +CVE-2025-6403 - https://github.com/tuooo/CVE/issues/16 +CVE-2025-6404 - https://github.com/ASantsSec/CVE/issues/13 +CVE-2025-6405 - https://github.com/ASantsSec/CVE/issues/14 CVE-2025-6406 - https://github.com/ASantsSec/CVE/issues/11 CVE-2025-6407 - https://github.com/ASantsSec/CVE/issues/12 +CVE-2025-6408 - https://github.com/ASantsSec/CVE/issues/15 +CVE-2025-6418 - https://github.com/zzb1388/cve/issues/4 +CVE-2025-6419 - https://github.com/zzb1388/cve/issues/5 +CVE-2025-6420 - https://github.com/zzb1388/cve/issues/6 +CVE-2025-6421 - https://github.com/zzb1388/cve/issues/7 CVE-2025-6435 - https://bugzilla.mozilla.org/show_bug.cgi?id=1950056 CVE-2025-6445 - https://docs.servicestack.net/releases/v8_06#reported-vulnerabilities +CVE-2025-6446 - https://github.com/kakalalaww/CVE/issues/18 +CVE-2025-6447 - https://github.com/kakalalaww/CVE/issues/19 +CVE-2025-6448 - https://github.com/zzb1388/cve/issues/8 +CVE-2025-6449 - https://github.com/zzb1388/cve/issues/9 +CVE-2025-6450 - https://github.com/zzb1388/cve/issues/10 +CVE-2025-6451 - https://github.com/zzb1388/cve/issues/11 +CVE-2025-6452 - https://github.com/Vanshdhawan188/CodeAstro-Online-Healthcare-Patient-Record-Management-System/blob/main/CodeAstro-Online-Healthcare-Patient-Record-Management-System.md +CVE-2025-6452 - https://github.com/Vanshdhawan188/CodeAstro-Online-Healthcare-Patient-Record-Management-System/blob/main/CodeAstro-Online-Healthcare-Patient-Record-Management-System.md#-proof-of-concept-poc +CVE-2025-6453 - https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250618-01.md#steps-to-reproduce +CVE-2025-6455 - https://github.com/blueandhack/cve/issues/3 CVE-2025-6455 - https://vuldb.com/?id.313561 +CVE-2025-6456 - https://github.com/blueandhack/cve/issues/2 +CVE-2025-6457 - https://github.com/blueandhack/cve/issues/1 +CVE-2025-6458 - https://github.com/Kristin5634487/cve/issues/1 +CVE-2025-6466 - https://github.com/ageerle/ruoyi-ai/issues/9 +CVE-2025-6466 - https://github.com/ageerle/ruoyi-ai/issues/9#event-16775988438 +CVE-2025-6467 - https://github.com/Kristin5634487/cve/issues/2 +CVE-2025-6468 - https://github.com/ganzhi-qcy/cve/issues/12 +CVE-2025-6469 - https://github.com/W2-l0mechan1c/cve/issues/2 +CVE-2025-6470 - https://github.com/W2-l0mechan1c/cve/issues/1 +CVE-2025-6471 - https://github.com/ganzhi-qcy/cve/issues/11 +CVE-2025-6472 - https://github.com/ganzhi-qcy/cve/issues/10 +CVE-2025-6473 - https://github.com/tuooo/CVE/issues/17 CVE-2025-6475 - https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README8.md +CVE-2025-6476 - https://github.com/alc9700jmo/CVE/issues/15 +CVE-2025-6477 - https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README9.md CVE-2025-6479 - https://github.com/rom4j/cve/issues/1 +CVE-2025-6480 - https://github.com/rom4j/cve/issues/2 +CVE-2025-6481 - https://github.com/rom4j/cve/issues/3 +CVE-2025-6482 - https://github.com/rom4j/cve/issues/4 +CVE-2025-6483 - https://github.com/rom4j/cve/issues/5 +CVE-2025-6484 - https://github.com/ez-lbz/poc/issues/5 +CVE-2025-6484 - https://github.com/ez-lbz/poc/issues/6 +CVE-2025-6485 - https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_34/34.md +CVE-2025-6486 - https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md +CVE-2025-6489 - https://github.com/ltranquility/CVE/issues/13 +CVE-2025-6490 - https://github.com/sparklemotion/nokogiri/issues/3500 +CVE-2025-6491 - https://github.com/php/php-src/security/advisories/GHSA-453j-q27h-5p8x +CVE-2025-6493 - https://github.com/codemirror/codemirror5/issues/7128 +CVE-2025-6494 - https://github.com/sparklemotion/nokogiri/issues/3508 +CVE-2025-6496 - https://github.com/htacg/tidy-html5/issues/1141 +CVE-2025-6497 - https://github.com/htacg/tidy-html5/issues/1142 +CVE-2025-6498 - https://github.com/htacg/tidy-html5/issues/1152 CVE-2025-6499 - https://github.com/vstakhov/libucl/issues/319 +CVE-2025-6500 - https://github.com/mex135605/cve/issues/3 CVE-2025-6501 - https://github.com/mex135605/cve/issues/2 +CVE-2025-6502 - https://github.com/mex135605/cve/issues/1 +CVE-2025-6503 - https://github.com/YunQipao/cve/issues/1 +CVE-2025-6509 - https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250609-01/report.md +CVE-2025-6509 - https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250609-01/report.md#steps-to-reproduce +CVE-2025-6510 - https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear +CVE-2025-6510 - https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear#poc +CVE-2025-6511 - https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear +CVE-2025-6511 - https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear#poc CVE-2025-6514 - https://research.jfrog.com/vulnerabilities/mcp-remote-command-injection-rce-jfsa-2025-001290844/ +CVE-2025-6516 - https://github.com/HDFGroup/hdf5/issues/5581 +CVE-2025-6517 - https://github.com/honorseclab/vulns/blob/main/dromara_MaxKey/SSRF.md +CVE-2025-6517 - https://github.com/honorseclab/vulns/blob/main/dromara_MaxKey/SSRF.md#vulnerability-verification +CVE-2025-6518 - https://github.com/PySpur-Dev/pyspur/issues/289 CVE-2025-6523 - https://devolutions.net/security/advisories/DEVO-2025-0012/ CVE-2025-6533 - https://blog.0xd00.com/blog/captcha-replay-attack-lead-to-brute-force-protection-bypass CVE-2025-6533 - https://blog.0xd00.com/blog/captcha-replay-attack-lead-to-brute-force-protection-bypass#poc @@ -106878,25 +107544,159 @@ CVE-2025-6534 - https://blog.0xd00.com/blog/missing-authorization-leads-to-arbit CVE-2025-6534 - https://blog.0xd00.com/blog/missing-authorization-leads-to-arbitrary-file-deletion#poc CVE-2025-6535 - https://blog.0xd00.com/blog/sqli-in-user-list-leads-to-sensitive-data-disclosure CVE-2025-6535 - https://blog.0xd00.com/blog/sqli-in-user-list-leads-to-sensitive-data-disclosure#poc +CVE-2025-6536 - https://github.com/tarantool/tarantool/issues/11347 +CVE-2025-6545 - https://github.com/browserify/pbkdf2/security/advisories/GHSA-h7cp-r72f-jxh6 +CVE-2025-6547 - https://github.com/browserify/pbkdf2/security/advisories/GHSA-v62p-rq8g-8h59 +CVE-2025-6551 - https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250613-01/report.md +CVE-2025-6551 - https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250613-01/report.md#steps-to-reproduce +CVE-2025-6552 - https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250613-02.md +CVE-2025-6552 - https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250613-02.md#steps-to-reproduce CVE-2025-6557 - https://issues.chromium.org/issues/406631048 +CVE-2025-6565 - https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear +CVE-2025-6565 - https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear#poc CVE-2025-6566 - https://github.com/oatpp/oatpp/issues/1037 +CVE-2025-6567 - https://github.com/Sp1d3rL1/CVE/issues/3 +CVE-2025-6568 - https://github.com/d2pq/cve/blob/main/616/23.md +CVE-2025-6568 - https://github.com/d2pq/cve/blob/main/616/23.md#poc +CVE-2025-6569 - https://github.com/tuooo/CVE/issues/18 CVE-2025-6572 - https://wpscan.com/vulnerability/58c7a8ac-1acd-45b7-abe5-5635fbb5d4c1/ +CVE-2025-6578 - https://github.com/yangfan-lang/cve/issues/3 +CVE-2025-6579 - https://github.com/yangfan-lang/cve/issues/4 +CVE-2025-6611 - https://github.com/Lwlej/cve/issues/2 +CVE-2025-6612 - https://github.com/Lwlej/cve/issues/1 +CVE-2025-6613 - https://github.com/Vanshdhawan188/Stored-XSS-Hospital-Management/blob/main/Stored-XSS-Hospital-Management.md +CVE-2025-6614 - https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md +CVE-2025-6614 - https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md#poc +CVE-2025-6616 - https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md#poc +CVE-2025-6617 - https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md +CVE-2025-6617 - https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md#poc +CVE-2025-6619 - https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md#poc +CVE-2025-6620 - https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md#poc +CVE-2025-6621 - https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md +CVE-2025-6621 - https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md#poc CVE-2025-6624 - https://security.snyk.io/vuln/SNYK-JS-SNYK-10497607 CVE-2025-6627 - https://github.com/d2pq/cve/blob/main/616/24.md CVE-2025-6627 - https://github.com/d2pq/cve/blob/main/616/24.md#poc +CVE-2025-6664 - https://github.com/Vanshdhawan188/CodeAstro-Online-Healthcare-Patient-Record-Management-System-CSRF/blob/main/CodeAstro-Online-Healthcare-Patient-Record-Management-System-CSRF.md +CVE-2025-6664 - https://github.com/Vanshdhawan188/CodeAstro-Online-Healthcare-Patient-Record-Management-System-CSRF/blob/main/CodeAstro-Online-Healthcare-Patient-Record-Management-System-CSRF.md#-steps-to-reproduce +CVE-2025-6665 - https://github.com/catfish258/cve/issues/1 +CVE-2025-6667 - https://github.com/zzb1388/cve/issues/12 CVE-2025-6668 - https://github.com/lijingze-eng/cve/issues/1 +CVE-2025-6669 - https://github.com/gooaclok819/sublinkX/issues/68 +CVE-2025-6669 - https://github.com/gooaclok819/sublinkX/issues/68#issuecomment-2957290524 +CVE-2025-6694 - https://github.com/RaulPazemecxas/PoCVulDb +CVE-2025-6695 - https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README2.md +CVE-2025-6696 - https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README3.md +CVE-2025-6697 - https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README5.md +CVE-2025-6698 - https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README6.md +CVE-2025-6699 - https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README7.md +CVE-2025-6700 - https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250616-01/report.md CVE-2025-6715 - https://wpscan.com/vulnerability/357aba51-b65e-4691-864b-fef1c78a9362/ +CVE-2025-6731 - https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250616-03.md#steps-to-reproduce +CVE-2025-6732 - https://github.com/d2pq/cve/blob/main/616/1.md +CVE-2025-6732 - https://github.com/d2pq/cve/blob/main/616/1.md#poc +CVE-2025-6733 - https://github.com/d2pq/cve/blob/main/616/2.md +CVE-2025-6733 - https://github.com/d2pq/cve/blob/main/616/2.md#poc +CVE-2025-6734 - https://github.com/d2pq/cve/blob/main/616/3.md#poc CVE-2025-6741 - https://devolutions.net/security/advisories/DEVO-2025-0012/ CVE-2025-6748 - https://drive.google.com/file/d/1atnjssBq4tHeofoIDbWRH32z9rvA9jez/view?usp=sharing +CVE-2025-6748 - https://github.com/honestcorrupt/-CVE-Proof-of-Concept-Airtel-Android-App-Insecure-Local-Storage-of-Sensitive-Data +CVE-2025-6750 - https://github.com/HDFGroup/hdf5/issues/5549 +CVE-2025-6752 - https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md +CVE-2025-6752 - https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md#poc +CVE-2025-6763 - https://github.com/zeke2997/CVE_request_comet_system +CVE-2025-6763 - https://github.com/zeke2997/CVE_request_comet_system#poc +CVE-2025-6772 - https://github.com/eosphoros-ai/DB-GPT/issues/2774 +CVE-2025-6774 - https://github.com/gooaclok819/sublinkX/issues/68#issuecomment-2957290524 +CVE-2025-6775 - https://github.com/xiaoyunjie/openvpn-cms-flask/issues/24 +CVE-2025-6775 - https://github.com/xiaoyunjie/openvpn-cms-flask/issues/24#issuecomment-2948563464 +CVE-2025-6776 - https://github.com/xiaoyunjie/openvpn-cms-flask/issues/23 CVE-2025-6790 - https://wpscan.com/vulnerability/af337f9f-c955-49eb-9675-2f85da96fcfe/ +CVE-2025-6816 - https://github.com/HDFGroup/hdf5/issues/5571 +CVE-2025-6817 - https://github.com/HDFGroup/hdf5/issues/5572 +CVE-2025-6818 - https://github.com/HDFGroup/hdf5/issues/5573 +CVE-2025-6819 - https://github.com/AlbaDove/cve/issues/2 +CVE-2025-6820 - https://github.com/AlbaDove/cve/issues/3 CVE-2025-6821 - https://github.com/Dav1d-safe/cve/issues/3 +CVE-2025-6822 - https://github.com/Dav1d-safe/cve/issues/2 +CVE-2025-6823 - https://github.com/Dav1d-safe/cve/issues/1 +CVE-2025-6824 - https://github.com/awindog/cve/blob/main/688/28.md +CVE-2025-6824 - https://github.com/awindog/cve/blob/main/688/28.md#poc +CVE-2025-6825 - https://github.com/awindog/cve/blob/main/688/29.md +CVE-2025-6825 - https://github.com/awindog/cve/blob/main/688/29.md#poc +CVE-2025-6826 - https://github.com/Cashbeebee/CVE/issues/1 +CVE-2025-6827 - https://github.com/YunQipao/cve/issues/3 +CVE-2025-6828 - https://github.com/YunQipao/cve/issues/2 +CVE-2025-6834 - https://github.com/xiaoqitc/cve-/issues/5 +CVE-2025-6835 - https://github.com/blueandhack/cve/issues/6 +CVE-2025-6836 - https://github.com/blueandhack/cve/issues/4 +CVE-2025-6837 - https://github.com/blueandhack/cve/issues/7 +CVE-2025-6840 - https://github.com/ez-lbz/poc/issues/10 +CVE-2025-6841 - https://github.com/ez-lbz/poc/issues/11 +CVE-2025-6842 - https://github.com/ez-lbz/poc/issues/12 +CVE-2025-6843 - https://github.com/ez-lbz/poc/issues/13 +CVE-2025-6844 - https://github.com/ez-lbz/poc/issues/14 +CVE-2025-6845 - https://github.com/ez-lbz/poc/issues/15 +CVE-2025-6846 - https://github.com/ez-lbz/poc/issues/16 +CVE-2025-6847 - https://github.com/ez-lbz/poc/issues/17 +CVE-2025-6848 - https://github.com/ez-lbz/poc/issues/18 CVE-2025-6849 - https://github.com/ez-lbz/poc/issues/19 CVE-2025-6850 - https://github.com/ez-lbz/poc/issues/20 +CVE-2025-6850 - https://vuldb.com/?submit.603352 +CVE-2025-6853 - https://github.com/chatchat-space/Langchain-Chatchat/issues/5352 +CVE-2025-6854 - https://github.com/chatchat-space/Langchain-Chatchat/issues/5353 +CVE-2025-6855 - https://github.com/chatchat-space/Langchain-Chatchat/issues/5354 +CVE-2025-6856 - https://github.com/HDFGroup/hdf5/issues/5574 +CVE-2025-6857 - https://github.com/HDFGroup/hdf5/issues/5575 +CVE-2025-6858 - https://github.com/HDFGroup/hdf5/issues/5576 CVE-2025-6863 - https://github.com/louis-zly/myCVE/issues/1 +CVE-2025-6864 - https://github.com/murongchengshu/zhicheng_tan/blob/main/SeaCMS_1.md +CVE-2025-6865 - https://github.com/wwm1995/weiming_wang/blob/main/daicuocms_1.md +CVE-2025-6866 - https://github.com/ez-lbz/poc/issues/22 +CVE-2025-6867 - https://github.com/ez-lbz/poc/issues/23 +CVE-2025-6868 - https://github.com/ez-lbz/poc/issues/24 +CVE-2025-6869 - https://github.com/ez-lbz/poc/issues/25 +CVE-2025-6870 - https://github.com/ez-lbz/poc/issues/26 +CVE-2025-6871 - https://github.com/ez-lbz/poc/issues/27 +CVE-2025-6872 - https://github.com/ez-lbz/poc/issues/28 +CVE-2025-6873 - https://github.com/ez-lbz/poc/issues/29 +CVE-2025-6883 - https://github.com/qingchuana/q1ngchuan/issues/7 +CVE-2025-6884 - https://github.com/qingchuana/q1ngchuan/issues/8 +CVE-2025-6885 - https://github.com/louis-zly/myCVE/issues/2 +CVE-2025-6888 - https://github.com/louis-zly/myCVE/issues/3 +CVE-2025-6889 - https://github.com/ez-lbz/poc/issues/30 +CVE-2025-6890 - https://github.com/ez-lbz/poc/issues/31 +CVE-2025-6891 - https://github.com/tangjihong1974/cve/issues/2 +CVE-2025-6900 - https://github.com/W2-l0mechan1c/CVE1/issues/1 +CVE-2025-6901 - https://github.com/p1nkshox/cve/issues/2 +CVE-2025-6902 - https://github.com/p1nkshox/cve/issues/1 +CVE-2025-6905 - https://github.com/zzb1388/cve/issues/15 +CVE-2025-6906 - https://github.com/zzb1388/cve/issues/14 +CVE-2025-6907 - https://github.com/zzb1388/cve/issues/13 +CVE-2025-6916 - https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md +CVE-2025-6925 - https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250620-01/report.md +CVE-2025-6925 - https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250620-01/report.md#steps-to-reproduce CVE-2025-6931 - http://cdn2.v50to.cc/dlink/DCS-7517_B1_FW_v2.02.01/report_1.pdf +CVE-2025-6935 - https://github.com/dragonghost2025/cve/issues/9 +CVE-2025-6936 - https://github.com/Catcheryp/CVE/issues/2 +CVE-2025-6937 - https://github.com/Catcheryp/CVE/issues/3 +CVE-2025-6938 - https://github.com/Catcheryp/CVE/issues/4 +CVE-2025-6939 - https://github.com/awindog/cve/blob/main/688/30.md CVE-2025-6940 - https://github.com/awindog/cve/blob/main/688/27.md CVE-2025-6940 - https://github.com/awindog/cve/blob/main/688/27.md#poc CVE-2025-6944 - https://support.undsgn.com/hc/en-us/articles/213454129-Change-Log +CVE-2025-6953 - https://github.com/d2pq/cve/blob/main/616/26.md +CVE-2025-6953 - https://github.com/d2pq/cve/blob/main/616/26.md#poc +CVE-2025-6954 - https://github.com/ez-lbz/poc/issues/32 +CVE-2025-6955 - https://github.com/ez-lbz/poc/issues/33 +CVE-2025-6956 - https://github.com/ez-lbz/poc/issues/34 +CVE-2025-6957 - https://github.com/ez-lbz/poc/issues/35 +CVE-2025-6958 - https://github.com/ez-lbz/poc/issues/36 +CVE-2025-6959 - https://github.com/ez-lbz/poc/issues/37 +CVE-2025-6960 - https://github.com/ez-lbz/poc/issues/38 +CVE-2025-6961 - https://github.com/ez-lbz/poc/issues/39 +CVE-2025-6962 - https://github.com/ez-lbz/poc/issues/40 +CVE-2025-6963 - https://github.com/ez-lbz/poc/issues/41 CVE-2025-6998 - https://fluidattacks.com/advisories/megadeth CVE-2025-7012 - https://support.catonetworks.com/hc/en-us/articles/28552501717405-CVE-2025-7012-Linux-Client-Local-Privilege-Escalation-via-Symbolic-Link-Handling CVE-2025-7022 - https://wpscan.com/vulnerability/c1021763-075b-40c7-801d-b5519828aabe/ @@ -106904,28 +107704,60 @@ CVE-2025-7095 - https://drive.google.com/file/d/1qnWarYsTSc5_sV6o8ULv0LBvGfKKXPx CVE-2025-7096 - https://drive.google.com/file/d/1qnWarYsTSc5_sV6o8ULv0LBvGfKKXPxn/view?usp=sharing CVE-2025-7097 - https://drive.google.com/file/d/1qnWarYsTSc5_sV6o8ULv0LBvGfKKXPxn/view?usp=sharing CVE-2025-7098 - https://drive.google.com/file/d/1qnWarYsTSc5_sV6o8ULv0LBvGfKKXPxn/view?usp=sharing +CVE-2025-7109 - https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README11.md +CVE-2025-7110 - https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README12.md +CVE-2025-7111 - https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README13.md +CVE-2025-7112 - https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README14.md +CVE-2025-7113 - https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README15.md +CVE-2025-7118 - https://vuldb.com/?id.315029 +CVE-2025-7119 - https://github.com/ez-lbz/poc/issues/42 +CVE-2025-7120 - https://github.com/ez-lbz/poc/issues/43 +CVE-2025-7121 - https://github.com/ez-lbz/poc/issues/44 +CVE-2025-7122 - https://github.com/ez-lbz/poc/issues/45 +CVE-2025-7175 - https://vuldb.com/?id.315114 CVE-2025-7177 - https://github.com/y2xsec324/cve/issues/10 CVE-2025-7190 - https://github.com/y2xsec324/cve/issues/11 CVE-2025-7202 - https://www.toreon.com/flashing-your-lights-cve-2025-7202/ CVE-2025-7371 - https://help.okta.com/oie/en-us/content/topics/settings/version_histories/ver_history_opp_agent.htm CVE-2025-7404 - https://fluidattacks.com/advisories/kino +CVE-2025-7409 - https://github.com/rom4j/cve/issues/20 CVE-2025-7410 - https://github.com/rom4j/cve/issues/19 CVE-2025-7411 - https://github.com/rom4j/cve/issues/18 CVE-2025-7412 - https://github.com/rom4j/cve/issues/17 CVE-2025-7413 - https://github.com/rom4j/cve/issues/16 CVE-2025-7426 - https://www.cryptron.ch/en/blog-detail/security-advisory-CVE-2025-7426-en.html +CVE-2025-7456 - https://vuldb.com/?id.316100 CVE-2025-7475 - https://github.com/y2xsec324/cve/issues/12 CVE-2025-7476 - https://github.com/y2xsec324/cve/issues/13 CVE-2025-7477 - https://github.com/y2xsec324/cve/issues/14 +CVE-2025-7607 - https://github.com/zzb1388/cve/issues/20 +CVE-2025-7608 - https://github.com/zzb1388/cve/issues/19 +CVE-2025-7609 - https://github.com/zzb1388/cve/issues/18 +CVE-2025-7610 - https://github.com/zzb1388/cve/issues/17 +CVE-2025-7611 - https://github.com/zzb1388/cve/issues/16 +CVE-2025-7612 - https://github.com/zzb1388/cve/issues/21 CVE-2025-7616 - https://gitee.com/gmg137/snap7-rs/issues/ICBIOB +CVE-2025-7749 - https://github.com/zzb1388/cve/issues/27 +CVE-2025-7750 - https://github.com/zzb1388/cve/issues/26 +CVE-2025-7751 - https://github.com/zzb1388/cve/issues/24 +CVE-2025-7752 - https://github.com/zzb1388/cve/issues/23 +CVE-2025-7753 - https://github.com/zzb1388/cve/issues/22 CVE-2025-7808 - https://wpscan.com/vulnerability/fa199423-6526-47f6-bab5-9f6dff0f236a/ +CVE-2025-7866 - https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README16.md +CVE-2025-7867 - https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README17.md +CVE-2025-7868 - https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README18.md +CVE-2025-7869 - https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README19.md +CVE-2025-7881 - https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README20.md +CVE-2025-7882 - https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README21.md CVE-2025-7894 - https://www.cnblogs.com/aibot/p/18982747 +CVE-2025-7913 - https://vuldb.com/?id.317028 CVE-2025-7934 - https://gitee.com/fuyang_lipengjun/platform/issues/ICLILS CVE-2025-7935 - https://gitee.com/fuyang_lipengjun/platform/issues/ICLIKX CVE-2025-7936 - https://gitee.com/fuyang_lipengjun/platform/issues/ICLIK1 CVE-2025-7961 - https://fluidattacks.com/advisories/cafrune CVE-2025-7965 - https://wpscan.com/vulnerability/13e0db0b-87c5-4cf0-b0a6-178bdf96991b/ CVE-2025-7969 - https://fluidattacks.com/advisories/fito +CVE-2025-8018 - https://github.com/i-Corner/cve/issues/10 CVE-2025-8020 - https://security.snyk.io/vuln/SNYK-JS-PRIVATEIP-9510757 CVE-2025-8021 - https://security.snyk.io/vuln/SNYK-JS-FILESBUCKETSERVER-9510944 CVE-2025-8041 - https://bugzilla.mozilla.org/show_bug.cgi?id=1670725 @@ -106935,35 +107767,169 @@ CVE-2025-8047 - https://wpscan.com/vulnerability/a0c70b98-a3f9-4d4c-a25f-8142423 CVE-2025-8066 - https://fluidattacks.com/advisories/cypress CVE-2025-8085 - https://wpscan.com/vulnerability/f42c37bb-1ae0-49ab-bd81-7864dff0fcff/ CVE-2025-8101 - https://fluidattacks.com/advisories/charly +CVE-2025-8107 - https://github.com/oceanbase/oceanbase/security CVE-2025-8113 - https://wpscan.com/vulnerability/752908b4-7d05-476f-8920-1d0e58fc2983/ +CVE-2025-8115 - https://github.com/LagonGit/ReportCVE/issues/11 CVE-2025-8125 - https://gitee.com/deerwms/deer-wms-2/issues/ICLRE9 +CVE-2025-8128 - https://github.com/zhousg/letao/issues/13 +CVE-2025-8128 - https://github.com/zhousg/letao/issues/13#issue-2977017027 +CVE-2025-8129 - https://github.com/koajs/koa/issues/1892 +CVE-2025-8129 - https://github.com/koajs/koa/issues/1892#issue-3213028583 +CVE-2025-8134 - https://github.com/LagonGit/ReportCVE/issues/13 +CVE-2025-8135 - https://github.com/viaiam/CVE/issues/5 CVE-2025-8137 - https://github.com/panda666-888/vuls/blob/main/totolink/a702r/formIpQoS.md +CVE-2025-8139 - https://github.com/panda666-888/vuls/blob/main/totolink/a702r/formPortFw.md +CVE-2025-8140 - https://github.com/panda666-888/vuls/blob/main/totolink/a702r/formWlanMultipleAP.md CVE-2025-8156 - https://github.com/secfake/mycve/issues/1 +CVE-2025-8157 - https://github.com/secfake/mycve/issues/2 +CVE-2025-8158 - https://github.com/secfake/mycve/issues/3 CVE-2025-8162 - https://gitee.com/deerwms/deer-wms-2/issues/ICLQKV +CVE-2025-8163 - https://gitee.com/deerwms/deer-wms-2/issues/ICLQFL +CVE-2025-8164 - https://github.com/kbhjt/cve/issues/3 +CVE-2025-8166 - https://github.com/enigma522/cve/issues/1 +CVE-2025-8167 - https://github.com/enigma522/cve/issues/2 +CVE-2025-8170 - https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/9.md +CVE-2025-8170 - https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/9.md#poc +CVE-2025-8173 - https://github.com/Pick-program/CVE/issues/2 +CVE-2025-8174 - https://github.com/i-Corner/cve/issues/11 +CVE-2025-8179 - https://github.com/yuan-max11/mycve/issues/1 +CVE-2025-8191 - https://github.com/zast-ai/vulnerability-reports/blob/main/mall/DOM_XSS.md +CVE-2025-8207 - https://github.com/KMov-g/androidapps/blob/main/com.canarabank.mobility.md +CVE-2025-8220 - https://github.com/m3m0o/engeman-web-language-combobox-sqli +CVE-2025-8221 - https://github.com/Bemcliu/cve-reports/blob/main/cve-04-%E8%9B%8B%E7%B3%95%E5%95%86%E5%9F%8EJPA%E7%89%88-Reflected%20XSS/readme.md +CVE-2025-8222 - https://github.com/Bemcliu/cve-reports/blob/main/cve-05-%E8%9B%8B%E7%B3%95%E5%95%86%E5%9F%8EJPA%E7%89%88-Stored%20XSS/readme.md +CVE-2025-8223 - https://github.com/Bemcliu/cve-reports/blob/main/cve-06-%E8%9B%8B%E7%B3%95%E5%95%86%E5%9F%8EJPA%E7%89%88-CSRF/readme.md +CVE-2025-8232 - https://github.com/xiajian-qx/cve-xiajian/issues/7 +CVE-2025-8233 - https://github.com/xiajian-qx/cve-xiajian/issues/6 +CVE-2025-8234 - https://github.com/xiajian-qx/cve-xiajian/issues/5 +CVE-2025-8235 - https://github.com/xiajian-qx/cve-xiajian/issues/4 +CVE-2025-8236 - https://github.com/xiajian-qx/cve-xiajian/issues/3 +CVE-2025-8237 - https://github.com/xiajian-qx/cve-xiajian/issues/10 +CVE-2025-8238 - https://github.com/xiajian-qx/cve-xiajian/issues/11 +CVE-2025-8239 - https://github.com/xiajian-qx/cve-xiajian/issues/9 +CVE-2025-8240 - https://github.com/xiajian-qx/cve-xiajian/issues/8 +CVE-2025-8241 - https://github.com/online-Y/CVE/issues/1 CVE-2025-8242 - https://github.com/panda666-888/vuls/blob/main/totolink/x15/formFilter_ip6addr.md +CVE-2025-8242 - https://github.com/panda666-888/vuls/blob/main/totolink/x15/formFilter_url.md +CVE-2025-8244 - https://github.com/panda666-888/vuls/blob/main/totolink/x15/formMapDelDevice.md +CVE-2025-8247 - https://github.com/ht4266394/cve/issues/1 +CVE-2025-8248 - https://github.com/xiajian-qx/cve-xiajian/issues/2 +CVE-2025-8249 - https://github.com/Dingzenggonpo/cve/issues/2 +CVE-2025-8250 - https://github.com/Dingzenggonpo/cve/issues/3 +CVE-2025-8251 - https://github.com/mynlxx/CVE-ZhuChengQing/issues/8 +CVE-2025-8252 - https://github.com/mynlxx/CVE-ZhuChengQing/issues/9 CVE-2025-8253 - https://github.com/mynlxx/CVE-ZhuChengQing/issues/10 +CVE-2025-8256 - https://github.com/zzb1388/cve/issues/28 +CVE-2025-8258 - https://github.com/KMov-g/androidapps/blob/main/com.sdmagic.number.md +CVE-2025-8260 - https://github.com/waiwai24/0101/blob/main/CVEs/Vaelsys/Unauthorized_Access_Leads_to_Sensitive_Information_Leakage_in_Vaelsys_V4_Platform.md +CVE-2025-8261 - https://github.com/waiwai24/0101/blob/main/CVEs/Vaelsys/Unauthorized_User_Creation_Vulnerability_Exists_in_Vaelsys_V4_Platform.md CVE-2025-8264 - https://security.snyk.io/vuln/SNYK-PHP-ZPUSHZPUSHDEV-10908180 CVE-2025-8267 - https://security.snyk.io/vuln/SNYK-JS-SSRFCHECK-9510756 +CVE-2025-8269 - https://github.com/mynlxx/CVE-ZhuChengQing/issues/5 +CVE-2025-8270 - https://github.com/mynlxx/CVE-ZhuChengQing/issues/6 +CVE-2025-8272 - https://github.com/mynlxx/CVE-ZhuChengQing/issues/4 +CVE-2025-8273 - https://github.com/mynlxx/CVE-ZhuChengQing/issues/3 +CVE-2025-8274 - https://github.com/ashin9/CVE/issues/1 +CVE-2025-8275 - https://github.com/KMov-g/androidapps/blob/main/bsc.devy.peru_cocktails.md CVE-2025-8280 - https://wpscan.com/vulnerability/f8370026-6293-4814-961f-c254ee8e844d/ CVE-2025-8281 - https://wpscan.com/vulnerability/36b9305e-e086-4edb-bff9-d181ea316389/ CVE-2025-8282 - https://wpscan.com/vulnerability/62680106-1313-4ef0-80a5-33e93b4221a1/ CVE-2025-8312 - https://devolutions.net/security/advisories/DEVO-2025-0013/ +CVE-2025-8326 - https://github.com/vullis0/cve/issues/1 +CVE-2025-8328 - https://github.com/1lusanbao9/cve/issues/1 +CVE-2025-8329 - https://github.com/zgqsdx/cve/issues/2 +CVE-2025-8330 - https://github.com/zgqsdx/cve/issues/1 CVE-2025-8331 - https://github.com/wllovemy/cve/issues/10 +CVE-2025-8332 - https://github.com/wllovemy/cve/issues/9 +CVE-2025-8333 - https://github.com/wllovemy/cve/issues/8 +CVE-2025-8334 - https://github.com/CVE-Hunter-Leo/CVE/issues/1 +CVE-2025-8335 - https://github.com/i-Corner/cve/issues/12 +CVE-2025-8336 - https://github.com/CVE-Hunter-Leo/CVE/issues/2 +CVE-2025-8337 - https://github.com/i-Corner/cve/issues/13 +CVE-2025-8338 - https://github.com/Sunhaobin318/CVE/issues/1 +CVE-2025-8339 - https://github.com/shenxianyuguitian/intern-mms-vuln/blob/main/README.md +CVE-2025-8340 - https://github.com/shenxianyuguitian/intern-mms-vuln-XSS/blob/main/README.md +CVE-2025-8343 - https://github.com/openviglet/shio/issues/1028 +CVE-2025-8343 - https://github.com/openviglet/shio/issues/1028#issue-3239418750 CVE-2025-8353 - https://devolutions.net/security/advisories/DEVO-2025-0013/ +CVE-2025-8366 - https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8366.md CVE-2025-8367 - https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8367.md CVE-2025-8367 - https://github.com/marcelomulder/CVE/blob/main/i-educar/Reflected%20XSS%20funcionario_vinculo_lst.php%20parameter%20nome.md +CVE-2025-8368 - https://github.com/marcelomulder/CVE/blob/main/i-educar/Reflected%20XSS%20intranet.pesquisa_pessoa_lst.php_parameters_campo_busca_and_cpf.md +CVE-2025-8369 - https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8369.md +CVE-2025-8369 - https://github.com/marcelomulder/CVE/blob/main/i-educar/Reflected%20XXS%20educar_avaliacao_desempenho_lst.md +CVE-2025-8370 - https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8370.md CVE-2025-8371 - https://github.com/mynlxx/CVE-ZhuChengQing/issues/1 +CVE-2025-8372 - https://github.com/mynlxx/CVE-ZhuChengQing/issues/2 +CVE-2025-8373 - https://github.com/wllovemy/cve/issues/7 CVE-2025-8374 - https://github.com/wllovemy/cve/issues/6 CVE-2025-8375 - https://github.com/wllovemy/cve/issues/5 +CVE-2025-8376 - https://github.com/wllovemy/cve/issues/4 CVE-2025-8393 - https://support.dreametech.com/hc/en-us +CVE-2025-8407 - https://github.com/wllovemy/cve/issues/3 +CVE-2025-8408 - https://github.com/wllovemy/cve/issues/2 +CVE-2025-8409 - https://github.com/wllovemy/cve/issues/1 +CVE-2025-8431 - https://github.com/shiqumeng/myCVE/issues/3 +CVE-2025-8433 - https://github.com/i-Corner/cve/issues/14 +CVE-2025-8434 - https://github.com/i-Corner/cve/issues/15 +CVE-2025-8435 - https://github.com/i-Corner/cve/issues/15 +CVE-2025-8436 - https://github.com/Sunhaobin318/CVE/issues/2 +CVE-2025-8437 - https://github.com/wllovemy/cve/issues/16 +CVE-2025-8438 - https://github.com/wllovemy/cve/issues/15 +CVE-2025-8439 - https://github.com/wllovemy/cve/issues/14 +CVE-2025-8441 - https://github.com/justconter/cve/issues/2 +CVE-2025-8442 - https://github.com/justconter/cve/issues/1 +CVE-2025-8443 - https://github.com/LI1551/vul/issues/1 CVE-2025-8452 - https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed/ +CVE-2025-8466 - https://github.com/wllovemy/cve/issues/11 +CVE-2025-8467 - https://github.com/wllovemy/cve/issues/12 +CVE-2025-8468 - https://github.com/wllovemy/cve/issues/13 +CVE-2025-8469 - https://github.com/K1nakoo/tmp01/blob/main/tmp01.md +CVE-2025-8470 - https://github.com/K1nakoo/tmp02/blob/main/tmp02.md +CVE-2025-8471 - https://github.com/tqlfront/CVE/issues/1 +CVE-2025-8496 - https://github.com/huangtinlin/CVE/issues/1 +CVE-2025-8497 - https://github.com/shokaku-cyb/cve/issues/2 CVE-2025-8498 - https://github.com/shokaku-cyb/cve/issues/1 +CVE-2025-8499 - https://github.com/joker-vip/cvesubmit/issues/1 +CVE-2025-8500 - https://github.com/shenxianyuguitian/hris-vuln-sqli/blob/main/README.md +CVE-2025-8502 - https://github.com/freshfish-hust/my-cves/issues/1 +CVE-2025-8503 - https://github.com/freshfish-hust/my-cves/issues/2 +CVE-2025-8506 - https://github.com/Bemcliu/cve-reports/blob/main/cve-07-wx-shop-Stored%20XSS/readme.md +CVE-2025-8507 - https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8507.md +CVE-2025-8507 - https://github.com/marcelomulder/CVE/blob/main/i-educar/Reflected%20XXS%20educar_funcao_lst.md +CVE-2025-8508 - https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8508.md +CVE-2025-8508 - https://github.com/marcelomulder/CVE/blob/main/i-educar/Stored%20XSS%20educar_avaliacao_desempenho_cad.php%20parameters%20titulo_avaliacao%20and%20descricao.md +CVE-2025-8509 - https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8509.md +CVE-2025-8509 - https://github.com/marcelomulder/CVE/blob/main/i-educar/Stored%20XSS%20educar_servidor_cad.php%20parameter%20matricula.md +CVE-2025-8510 - https://github.com/CVE-Hunters/CVE/blob/main/i-educar/Reflected%20Cross-Site%20Scripting%20(XSS)%20in%20educar_matricula_lst.php%20via%20ref_cod_aluno%20Parameter.md +CVE-2025-8511 - https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8511.md +CVE-2025-8511 - https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20diario-de-observacoes.(ID)%20in%20'Observa%C3%A7%C3%B5es-Descri%C3%A7%C3%A3o'%20parameter.md +CVE-2025-8513 - https://github.com/KMov-g/androidapps/blob/main/com.caixin.news.md +CVE-2025-8517 - https://github.com/kwerty138/Session-Fixation-in-Vvveb-CMS-v1.0.6.1 CVE-2025-8518 - https://hkohi.ca/vulnerability/8 CVE-2025-8519 - https://hkohi.ca/vulnerability/10 CVE-2025-8520 - https://hkohi.ca/vulnerability/9 CVE-2025-8521 - https://hkohi.ca/vulnerability/11 +CVE-2025-8522 - https://github.com/givanz/VvvebJs/issues/409 +CVE-2025-8522 - https://github.com/givanz/VvvebJs/issues/409#issue-3235569867 +CVE-2025-8523 - https://github.com/KMov-g/androidapps/blob/main/com.fruitcrush.fun.md +CVE-2025-8524 - https://github.com/KMov-g/androidapps/blob/main/com.boquanhash.dotwallet.md +CVE-2025-8525 - https://github.com/Exrick/xboot/issues/72 +CVE-2025-8525 - https://github.com/Exrick/xboot/issues/72#issue-3252465914 +CVE-2025-8526 - https://github.com/Exrick/xboot/issues/71 +CVE-2025-8526 - https://github.com/Exrick/xboot/issues/71#issue-3252446955 +CVE-2025-8527 - https://github.com/Exrick/xboot/issues/70 +CVE-2025-8527 - https://github.com/Exrick/xboot/issues/70#issue-3252425972 +CVE-2025-8528 - https://github.com/Exrick/xboot/issues/69 +CVE-2025-8528 - https://github.com/Exrick/xboot/issues/69#issue-3252177305 +CVE-2025-8529 - https://github.com/cloudfavorites/favorites-web/issues/134 +CVE-2025-8529 - https://github.com/cloudfavorites/favorites-web/issues/134#issue-3252105130 +CVE-2025-8530 - https://github.com/elunez/eladmin/issues/883 +CVE-2025-8530 - https://github.com/elunez/eladmin/issues/883#issue-3252078139 CVE-2025-8534 - https://drive.google.com/file/d/15JPA3kLYiYD-nRNJ8y8HmnYjhv9NE7k6/view?usp=drive_link +CVE-2025-8535 - https://gist.github.com/jackfromeast/1e2e206813887a470e00b8474c616567 CVE-2025-8537 - https://drive.google.com/file/d/1AkRpx3wcMy3Ic9tQeQyRJybBipK72aQO/view?usp=drive_link +CVE-2025-8537 - https://github.com/axiomatic-systems/Bento4/issues/1037 CVE-2025-8538 - https://karinagante.github.io/cve-2025-8538/ CVE-2025-8539 - https://karinagante.github.io/cve-2025-8539/ CVE-2025-8540 - https://karinagante.github.io/cve-2025-8540/ @@ -106972,29 +107938,131 @@ CVE-2025-8542 - https://karinagante.github.io/cve-2025-8542/ CVE-2025-8543 - https://karinagante.github.io/cve-2025-8543/ CVE-2025-8544 - https://karinagante.github.io/cve-2025-8544/ CVE-2025-8545 - https://karinagante.github.io/cve-2025-8545/ +CVE-2025-8546 - https://github.com/atjiu/pybbs/issues/199 +CVE-2025-8546 - https://github.com/atjiu/pybbs/issues/199#issue-3256276118 +CVE-2025-8546 - https://github.com/atjiu/pybbs/issues/199#issuecomment-3134573731 +CVE-2025-8547 - https://github.com/atjiu/pybbs/issues/200 +CVE-2025-8547 - https://github.com/atjiu/pybbs/issues/200#issue-3256283647 +CVE-2025-8547 - https://github.com/atjiu/pybbs/issues/200#issuecomment-3134710486 +CVE-2025-8548 - https://github.com/atjiu/pybbs/issues/202 +CVE-2025-8548 - https://github.com/atjiu/pybbs/issues/202#issue-3256293499 +CVE-2025-8548 - https://github.com/atjiu/pybbs/issues/202#issuecomment-3134602615 +CVE-2025-8550 - https://github.com/atjiu/pybbs/issues/203 +CVE-2025-8550 - https://github.com/atjiu/pybbs/issues/203#issue-3256392964 +CVE-2025-8550 - https://github.com/atjiu/pybbs/issues/203#issuecomment-3134774288 +CVE-2025-8551 - https://github.com/atjiu/pybbs/issues/204 +CVE-2025-8551 - https://github.com/atjiu/pybbs/issues/204#issue-3256412774 +CVE-2025-8551 - https://github.com/atjiu/pybbs/issues/204#issuecomment-3134774122 +CVE-2025-8552 - https://github.com/atjiu/pybbs/issues/205 +CVE-2025-8552 - https://github.com/atjiu/pybbs/issues/205#issue-3256416772 +CVE-2025-8552 - https://github.com/atjiu/pybbs/issues/205#issuecomment-3134773883 +CVE-2025-8553 - https://github.com/atjiu/pybbs/issues/206 +CVE-2025-8553 - https://github.com/atjiu/pybbs/issues/206#issue-3256420783 +CVE-2025-8553 - https://github.com/atjiu/pybbs/issues/206#issuecomment-3134773560 +CVE-2025-8554 - https://github.com/atjiu/pybbs/issues/207 +CVE-2025-8554 - https://github.com/atjiu/pybbs/issues/207#issue-3256426074 +CVE-2025-8554 - https://github.com/atjiu/pybbs/issues/207#issuecomment-3134773217 +CVE-2025-8555 - https://github.com/atjiu/pybbs/issues/208 +CVE-2025-8555 - https://github.com/atjiu/pybbs/issues/208#issue-3256435530 +CVE-2025-8555 - https://github.com/atjiu/pybbs/issues/208#issuecomment-3134772931 CVE-2025-8582 - https://issues.chromium.org/issues/40089450 CVE-2025-8583 - https://issues.chromium.org/issues/373794472 CVE-2025-8584 - https://drive.google.com/file/d/1OwDNHuTbZFNTDX9afmvez_old3oRC7dM/view?usp=sharing CVE-2025-8585 - https://drive.google.com/file/d/1I4VVXGys156UdeSTgya_GGxLZxwuxUPw/view?usp=sharing CVE-2025-8586 - https://drive.google.com/file/d/1CX1GZUyJVzyDDGLVa8FG58XUt_30kHKT/view?usp=sharing CVE-2025-8663 - https://support.upkeeper.se/hc/en-us/articles/22107280228252-CVE-2025-8663-Insertion-of-Sensitive-Information-into-Log-File +CVE-2025-8697 - https://github.com/bayuncao-bit/vul-37 +CVE-2025-8697 - https://github.com/bayuncao-bit/vul-37#proof-of-concept CVE-2025-8699 - https://r.sec-consult.com/kiosoft +CVE-2025-8729 - https://github.com/MigoXLab/LMeterX/issues/10 +CVE-2025-8729 - https://github.com/MigoXLab/LMeterX/issues/10#issue-3255375024 +CVE-2025-8729 - https://github.com/MigoXLab/LMeterX/issues/10#issuecomment-3136380379 CVE-2025-8732 - https://drive.google.com/file/d/1woIeYVcSQB_NwfEhaVnX6MedpWJ_nqWl/view?usp=drive_link +CVE-2025-8733 - https://github.com/akimd/bison/issues/113 +CVE-2025-8733 - https://github.com/akimd/bison/issues/114 CVE-2025-8734 - https://drive.google.com/file/d/123Qe44FaC-GP88dWNl9-6H4jLWUcXYNZ/view?usp=drive_link CVE-2025-8735 - https://drive.google.com/file/d/1Q_rDQSEl3cBu6SUbfqr9pV9cHgvKcXFI/view?usp=drive_link CVE-2025-8736 - https://drive.google.com/file/d/17lkJ5bSiQZoXLTg3bK-rGBt3kahN9Xse/view?usp=drive_link +CVE-2025-8737 - https://github.com/zlt2000/microservices-platform/issues/78 +CVE-2025-8737 - https://github.com/zlt2000/microservices-platform/issues/78#issue-3264847333 +CVE-2025-8738 - https://github.com/zlt2000/microservices-platform/issues/79 +CVE-2025-8738 - https://github.com/zlt2000/microservices-platform/issues/79#issue-3264850271 +CVE-2025-8740 - https://github.com/ZHENFENG13/My-Blog/issues/146 +CVE-2025-8740 - https://github.com/ZHENFENG13/My-Blog/issues/146#issue-3265304545 +CVE-2025-8743 - https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-8743.md +CVE-2025-8745 - https://github.com/KMov-g/androidapps/blob/main/com.ricepo.app.md +CVE-2025-8745 - https://github.com/KMov-g/androidapps/blob/main/com.ricepo.app.md#steps-to-reproduce CVE-2025-8746 - https://drive.google.com/file/d/1yjKOHxvL_9xExy4QUb5x43dxci1x59ts/view?usp=sharing +CVE-2025-8746 - https://github.com/appneta/tcpreplay/issues/957 +CVE-2025-8746 - https://github.com/appneta/tcpreplay/issues/957#issuecomment-3124774393 CVE-2025-8751 - https://news.fmisec.com/self-html-injection-in-total-webshield-chrome-extension CVE-2025-8751 - https://news.fmisec.com/self-html-injection-in-total-webshield-chrome-extension#heading-vulnerability-details +CVE-2025-8753 - https://github.com/linlinjava/litemall/issues/564 +CVE-2025-8753 - https://github.com/linlinjava/litemall/issues/564#issue-3267670352 +CVE-2025-8764 - https://github.com/linlinjava/litemall/issues/567 +CVE-2025-8764 - https://github.com/linlinjava/litemall/issues/567#issue-3268166914 CVE-2025-8772 - https://hkohi.ca/vulnerability/19 +CVE-2025-8784 - https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8784.md +CVE-2025-8785 - https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8785.md +CVE-2025-8785 - https://github.com/marcelomulder/CVE/blob/main/i-educar/Reflected_XSS_endpoint_educar_usuario_lst.php_parameters_nm_pessoa,_matricula_and_matricula_interna.md +CVE-2025-8787 - https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8787.md +CVE-2025-8787 - https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20registros-de-conteudos-por-disciplina.(ID)%20in%20multiples%20parameters.md +CVE-2025-8788 - https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8788.md +CVE-2025-8788 - https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20planos-de-aula-por-areas-de-conhecimento.(ID)%20in%20multiples%20parameters.md +CVE-2025-8789 - https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8789.md +CVE-2025-8792 - https://github.com/MaiqueSilva/VulnDB/blob/main/README02.md +CVE-2025-8793 - https://github.com/MaiqueSilva/VulnDB/blob/main/readme03.md +CVE-2025-8796 - https://github.com/MaiqueSilva/VulnDB/blob/main/readme06.md +CVE-2025-8797 - https://github.com/MaiqueSilva/VulnDB/blob/main/readme07.md +CVE-2025-8809 - https://github.com/Find33-3/cve/issues/1 +CVE-2025-8810 - https://github.com/LaiwanHundun/CVE/blob/main/cve1 +CVE-2025-8811 - https://github.com/Darlingzero2/cve/issues/3 +CVE-2025-8812 - https://github.com/atjiu/pybbs/issues/209 +CVE-2025-8812 - https://github.com/atjiu/pybbs/issues/209#issuecomment-3134772651 +CVE-2025-8814 - https://github.com/atjiu/pybbs/issues/211 +CVE-2025-8814 - https://github.com/atjiu/pybbs/issues/211#issue-3256483043 +CVE-2025-8814 - https://github.com/atjiu/pybbs/issues/211#issuecomment-3134960777 +CVE-2025-8816 - https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_50/50.md +CVE-2025-8816 - https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_50/50.md#poc +CVE-2025-8818 - https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_52/52.md +CVE-2025-8818 - https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_52/52.md#poc +CVE-2025-8819 - https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_53/53.md +CVE-2025-8819 - https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_53/53.md#poc +CVE-2025-8822 - https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_56/56.md +CVE-2025-8822 - https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_56/56.md#poc +CVE-2025-8823 - https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_57/57.md +CVE-2025-8823 - https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_57/57.md#poc +CVE-2025-8824 - https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_40/40.md +CVE-2025-8824 - https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_40/40.md#poc +CVE-2025-8825 - https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_41/41.md +CVE-2025-8825 - https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_41/41.md#poc +CVE-2025-8827 - https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_43/43.md +CVE-2025-8827 - https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_43/43.md#poc +CVE-2025-8828 - https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_44/44.md#poc +CVE-2025-8829 - https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_45/45.md +CVE-2025-8829 - https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_45/45.md#poc +CVE-2025-8830 - https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_46/46.md#poc +CVE-2025-8833 - https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_38/38.md +CVE-2025-8833 - https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_38/38.md#poc CVE-2025-8835 - https://drive.google.com/file/d/1E754R-FsFkNJp9OYtu6Dqjv47uGSVP18/view?usp=sharing +CVE-2025-8835 - https://github.com/jasper-software/jasper/commit/bb7d62bd0a2a8e0e1fdb4d603f3305f955158c52 +CVE-2025-8835 - https://github.com/jasper-software/jasper/issues/400 +CVE-2025-8835 - https://github.com/jasper-software/jasper/issues/400#issuecomment-3134702772 CVE-2025-8836 - https://drive.google.com/file/d/1pPgndhHh2z0lk99Wt31W-XIW3XWt8FB3/view?usp=drive_link CVE-2025-8837 - https://drive.google.com/file/d/17Ic_DDOlH7mMT7IbTN2Bmo6SrujIUh24/view?usp=sharing +CVE-2025-8839 - https://github.com/jishenghua/jshERP/issues/125 +CVE-2025-8840 - https://github.com/jishenghua/jshERP/issues/126 +CVE-2025-8841 - https://github.com/zlt2000/microservices-platform/issues/77 +CVE-2025-8841 - https://github.com/zlt2000/microservices-platform/issues/77#issue-3264841808 CVE-2025-8842 - https://drive.google.com/file/d/11vEV1vMHXO4BrDGhvWAMm0Qo1woiUwVV/view?usp=drive_link CVE-2025-8843 - https://drive.google.com/file/d/1JRHWdjW6FGHDV0CMJe8VinmCQ4vP9ZpR/view?usp=drive_link CVE-2025-8844 - https://drive.google.com/file/d/10TSdMErFTBtLFIwfh_fia635cmtmFuei/view?usp=drive_link CVE-2025-8845 - https://drive.google.com/file/d/1pEQb6lcdohWV53DzPPU7kaCCNg-qAaau/view?usp=drive_link CVE-2025-8846 - https://drive.google.com/file/d/1MQGtdnz58vRF2fAeJMJ4VGiBQWXpnqfy/view?usp=drive_link +CVE-2025-8847 - https://github.com/yangzongzhuan/RuoYi/issues/298 +CVE-2025-8847 - https://github.com/yangzongzhuan/RuoYi/issues/298#issue-3265348205 +CVE-2025-8852 - https://github.com/WuKongOpenSource/WukongCRM-11.0-JAVA/issues/26 +CVE-2025-8852 - https://github.com/WuKongOpenSource/WukongCRM-11.0-JAVA/issues/26#issue-3272864284 CVE-2025-8862 - https://docs.yugabyte.com/preview/secure/vulnerability-disclosure-policy/ CVE-2025-8863 - https://docs.yugabyte.com/preview/secure/vulnerability-disclosure-policy/ CVE-2025-8864 - https://docs.yugabyte.com/preview/secure/vulnerability-disclosure-policy/ @@ -107002,19 +108070,63 @@ CVE-2025-8865 - https://docs.yugabyte.com/preview/secure/vulnerability-disclosur CVE-2025-8866 - https://docs.yugabyte.com/preview/secure/vulnerability-disclosure-policy/ CVE-2025-8889 - https://wpscan.com/vulnerability/5d84a577-62aa-4aa2-ac39-b146eae65243/ CVE-2025-8918 - https://github.com/FeMarb/CVEs/blob/6eeefb2749bb6165557ed4664a0680456131e4de/i-educar/Cross-Site%20Scripting%20(XSS)%20Storage%20in%20endpoint%20_educar_instituicao_cad.php%20parameter%20neighborhood%20name.md +CVE-2025-8920 - https://github.com/FeMarb/CVEs/blob/6eeefb2749bb6165557ed4664a0680456131e4de/I-diario/Cross-Site%20Scripting%20(XSS)%20Storage%20in%20endpoint%20_dicionario-de-termos-bncc%20parameter%20Planos%20de%20ensino%20input%20field.md +CVE-2025-8921 - https://github.com/caesar-power/CVE/issues/1 +CVE-2025-8922 - https://github.com/caesar-power/CVE/issues/2 +CVE-2025-8923 - https://github.com/caesar-power/CVE/issues/3 +CVE-2025-8924 - https://github.com/jue22/cve/issues/1 +CVE-2025-8925 - https://github.com/Kerjo01/day1/issues/1 +CVE-2025-8926 - https://github.com/lrjbsyh/CVE_Hunter/issues/2#issue-3307768438 +CVE-2025-8932 - https://github.com/lan041221/cvec/issues/3 CVE-2025-8933 - https://github.com/lan041221/cvec/issues/4 +CVE-2025-8934 - https://github.com/lan041221/cvec/issues/5 +CVE-2025-8935 - https://github.com/lan041221/cvec/issues/6 +CVE-2025-8936 - https://github.com/lan041221/cvec/issues/7 +CVE-2025-8939 - https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC20/Tenda%20AC20.md +CVE-2025-8939 - https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC20/Tenda%20AC20.md#3-poc +CVE-2025-8940 - https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC20-2/Tenda%20AC20-2.md +CVE-2025-8940 - https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC20-2/Tenda%20AC20-2.md#poc CVE-2025-8942 - https://wpscan.com/vulnerability/d89bb3b2-40ad-4c4f-9f17-4ccacc0f6e1a/ CVE-2025-8943 - https://research.jfrog.com/vulnerabilities/flowise-os-command-remote-code-execution-jfsa-2025-001380578/ CVE-2025-8944 - https://wpscan.com/vulnerability/cf77b7f2-525b-4fe8-b612-185a1c18c197/ +CVE-2025-8946 - https://github.com/guoma-book/CVE/issues/1 +CVE-2025-8947 - https://github.com/guoma-book/CVE/issues/3 +CVE-2025-8947 - https://github.com/guoma-book/CVE/issues/4 +CVE-2025-8949 - https://github.com/i-Corner/cve/issues/16 +CVE-2025-8950 - https://github.com/Noc14/cve/issues/1 +CVE-2025-8953 - https://github.com/zzb1388/cve/issues/29 +CVE-2025-8954 - https://github.com/LitBot123/mycve/issues/2 +CVE-2025-8955 - https://github.com/LitBot123/mycve/issues/3 +CVE-2025-8958 - https://github.com/alc9700jmo/CVE/issues/16 CVE-2025-8961 - https://drive.google.com/file/d/15L4q2eD8GX3Aj3z6SWC3_FbqaM1ChUx2/view?usp=sharing +CVE-2025-8965 - https://github.com/linlinjava/litemall/issues/565 +CVE-2025-8965 - https://github.com/linlinjava/litemall/issues/565#issue-3267850415 +CVE-2025-8966 - https://github.com/zzb1388/cve/issues/37 CVE-2025-8967 - https://github.com/zzb1388/cve/issues/36 +CVE-2025-8968 - https://github.com/zzb1388/cve/issues/35 +CVE-2025-8969 - https://github.com/zzb1388/cve/issues/34 +CVE-2025-8970 - https://github.com/zzb1388/cve/issues/33 +CVE-2025-8971 - https://github.com/zzb1388/cve/issues/32 +CVE-2025-8972 - https://github.com/zzb1388/cve/issues/31 +CVE-2025-8973 - https://github.com/zzb1388/cve/issues/30 CVE-2025-8975 - https://hkohi.ca/vulnerability/6 CVE-2025-8976 - https://hkohi.ca/vulnerability/7 +CVE-2025-8981 - https://github.com/zhuyi-hz/cve/issues/10 +CVE-2025-8982 - https://github.com/zhuyi-hz/cve/issues/9 +CVE-2025-8983 - https://github.com/zhuyi-hz/cve/issues/8 +CVE-2025-8984 - https://github.com/zhuyi-hz/cve/issues/7 +CVE-2025-8986 - https://github.com/zhuyi-hz/cve/issues/5 +CVE-2025-8987 - https://github.com/zhuyi-hz/cve/issues/4 +CVE-2025-8988 - https://github.com/zhuyi-hz/cve/issues/3 +CVE-2025-8990 - https://github.com/zhuyi-hz/cve/issues/1 CVE-2025-8991 - https://github.com/linlinjava/litemall/issues/566 CVE-2025-8991 - https://github.com/linlinjava/litemall/issues/566#issue-3267858791 +CVE-2025-8993 - https://github.com/lin-3-start/lin-cve/issues/1 CVE-2025-9001 - https://github.com/LemonOSProject/LemonOS/issues/60 CVE-2025-9001 - https://hkohi.ca/vulnerability/16 CVE-2025-9002 - https://github.com/fatdog957/CVE-/issues/1 +CVE-2025-9004 - https://gitee.com/mtons/mblog/issues/ICPMIR +CVE-2025-9005 - https://gitee.com/mtons/mblog/issues/ICPMJO CVE-2025-9008 - https://github.com/lin-3-start/lin-cve/issues/4 CVE-2025-9009 - https://github.com/lin-3-start/lin-cve/issues/3 CVE-2025-9010 - https://github.com/lin-3-start/lin-cve/issues/2 @@ -107040,6 +108152,8 @@ CVE-2025-9087 - https://github.com/ZZ2266/.github.io/tree/main/AC20/formSetQosBa CVE-2025-9087 - https://github.com/ZZ2266/.github.io/tree/main/AC20/formSetQosBand#poc-python-exploit-script CVE-2025-9088 - https://github.com/ZZ2266/.github.io/tree/main/AC20/formSetVirtualSer CVE-2025-9088 - https://github.com/ZZ2266/.github.io/tree/main/AC20/formSetVirtualSer#poc-python-exploit-script +CVE-2025-9089 - https://github.com/ZZ2266/.github.io/blob/main/AC20/fromSetIpMacBind/readme.md +CVE-2025-9089 - https://github.com/ZZ2266/.github.io/blob/main/AC20/fromSetIpMacBind/readme.md#poc-python-exploit-script CVE-2025-9090 - https://github.com/ZZ2266/.github.io/blob/main/AC20/telnet/readme.md CVE-2025-9090 - https://github.com/ZZ2266/.github.io/blob/main/AC20/telnet/readme.md#poc-exploit-steps CVE-2025-9091 - https://github.com/ZZ2266/.github.io/blob/main/AC20/hardcoded%20password/readme.md#description @@ -107061,10 +108175,13 @@ CVE-2025-9101 - https://github.com/ZHENFENG13/My-Blog/issues/147#issue-326530629 CVE-2025-9102 - https://github.com/KMov-g/androidapps/blob/main/com.mail.mobile.android.mail.md CVE-2025-9102 - https://github.com/KMov-g/androidapps/blob/main/com.mail.mobile.android.mail.md#steps-to-reproduce CVE-2025-9103 - https://hkohi.ca/vulnerability/28 +CVE-2025-9104 - https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9104.md CVE-2025-9104 - https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20planos-de-aulas-por-disciplina.(ID)%20in%20multiples%20parameters.md#poc +CVE-2025-9105 - https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9105.md CVE-2025-9105 - https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20planos-de-ensino-por-areas-de-conhecimento.(ID)%20in%20multiples%20parameters.md#poc CVE-2025-9106 - https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9106%20.md CVE-2025-9106 - https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20planos-de-ensino-por-disciplina.(ID)%20in%20multiples%20parameters.md#poc +CVE-2025-9107 - https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9107.md CVE-2025-9107 - https://github.com/marcelomulder/CVE/blob/main/i-diario/Reflected%20XSS%20endpoint%20search_autocomplete%20parameter%20q.md#poc CVE-2025-9111 - https://wpscan.com/vulnerability/5845bcff-beb8-45c8-b182-3dc9e209008b/ CVE-2025-9115 - https://wpscan.com/vulnerability/67721fa5-4d4f-468b-aa77-c406e68fcf17/ @@ -107099,6 +108216,7 @@ CVE-2025-9168 - https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93 CVE-2025-9168 - https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93%84POC%20Stored%20XSS%202.md#-exploitation-steps CVE-2025-9169 - https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93%84PoC%20-%20Stored%20XSS%203.md CVE-2025-9169 - https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93%84PoC%20-%20Stored%20XSS%203.md#-exploitation-steps +CVE-2025-9170 - https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93%84PoC%20-Stored%20XSS%204.md CVE-2025-9170 - https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93%84PoC%20-Stored%20XSS%204.md#-exploitation-steps CVE-2025-9171 - https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%95%B5%EF%B8%8F%E2%80%8D%E2%99%82%EF%B8%8F%20PoC%20%E2%80%93%20Stored%20XSS%205.md CVE-2025-9171 - https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%95%B5%EF%B8%8F%E2%80%8D%E2%99%82%EF%B8%8F%20PoC%20%E2%80%93%20Stored%20XSS%205.md#-exploitation-steps @@ -107110,6 +108228,8 @@ CVE-2025-9216 - https://github.com/d0n601/CVE-2025-9216 CVE-2025-9216 - https://ryankozak.com/posts/cve-2025-9216/ CVE-2025-9233 - https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9233.md CVE-2025-9233 - https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/Stored%20XSS%20endpoint%20view_edit.shtm%20parameter%20name.md#poc +CVE-2025-9234 - https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/Stored%20XSS%20endpoint%20maintenance_events.shtm%20parameter%20Alias.md#poc +CVE-2025-9234 - https://vuldb.com/?id.320767 CVE-2025-9235 - https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9235.md CVE-2025-9235 - https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/Stored%20XSS%20endpoint%20compound_events.shtm%20parameter%20name.md#poc CVE-2025-9236 - https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9236.md @@ -107177,6 +108297,7 @@ CVE-2025-9381 - https://vorachat.somsuay.com/blog/Hacking%20CCTV%20FNKvision%20- CVE-2025-9381 - https://vorachat.somsuay.com/blog/Hacking%20CCTV%20FNKvision%20-%20Y215/#vulnerability-2-ssid-and-wi-fi-password-stored-in-plaintext CVE-2025-9382 - https://vorachat.somsuay.com/blog/Hacking%20CCTV%20FNKvision%20-%20Y215 CVE-2025-9382 - https://vorachat.somsuay.com/blog/Hacking%20CCTV%20FNKvision%20-%20Y215/#vulnerability-3-sd-card-factory-backdoor +CVE-2025-9382 - https://vuldb.com/?id.321215 CVE-2025-9383 - https://vorachat.somsuay.com/blog/Hacking%20CCTV%20FNKvision%20-%20Y215 CVE-2025-9383 - https://vorachat.somsuay.com/blog/Hacking%20CCTV%20FNKvision%20-%20Y215/#vulnerability-4-weak-password-hashing-des CVE-2025-9384 - https://drive.google.com/file/d/1oVmsER6CXULLz_rnIyL410DJqO_hBtw_/view?usp=sharing @@ -107205,6 +108326,8 @@ CVE-2025-9396 - https://drive.google.com/file/d/1EFbiiM1d7Ozb0ucZt6zRO3ngU8ugUnC CVE-2025-9396 - https://github.com/ckolivas/lrzip/issues/264 CVE-2025-9403 - https://drive.google.com/file/d/1r8m9PhU_rk-QPj6OMcs415FcvWPD-zJY/view?usp=sharing CVE-2025-9403 - https://github.com/jqlang/jq/issues/3393 +CVE-2025-9404 - https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/Stored%20XSS%20endpoint%20pointHierarchySLTS%20parameter%20title.md#poc +CVE-2025-9407 - https://gitee.com/mtons/mblog/issues/ICPML3 CVE-2025-9415 - https://github.com/lan041221/cvec/issues/10 CVE-2025-9417 - https://github.com/zzb1388/cve/issues/41 CVE-2025-9418 - https://github.com/zzb1388/cve/issues/40 @@ -107216,8 +108339,11 @@ CVE-2025-9424 - https://github.com/Hwwg/cve/issues/1 CVE-2025-9425 - https://github.com/shq3526/cve/issues/6 CVE-2025-9426 - https://github.com/shq3526/cve/issues/7 CVE-2025-9429 - https://gitee.com/mtons/mblog/issues/ICPMLJ +CVE-2025-9429 - https://gitee.com/mtons/mblog/issues/ICPMLW +CVE-2025-9430 - https://gitee.com/mtons/mblog/issues/ICPMMF CVE-2025-9431 - https://gitee.com/mtons/mblog/issues/ICPMML CVE-2025-9432 - https://gitee.com/mtons/mblog/issues/ICPMMQ +CVE-2025-9433 - https://gitee.com/mtons/mblog/issues/ICPMMW CVE-2025-9434 - https://github.com/lan041221/cvec/issues/11 CVE-2025-9438 - https://github.com/lan041221/cvec/issues/12 CVE-2025-9439 - https://github.com/lan041221/cvec/issues/13 @@ -107235,6 +108361,7 @@ CVE-2025-9476 - https://github.com/lrjbsyh/CVE_Hunter/issues/5 CVE-2025-9476 - https://github.com/lrjbsyh/CVE_Hunter/issues/5#issue-3322736605 CVE-2025-9482 - https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_36/36.md CVE-2025-9482 - https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_36/36.md#poc +CVE-2025-9483 - https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_37/37.md CVE-2025-9483 - https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_37/37.md#poc CVE-2025-9487 - https://wpscan.com/vulnerability/b957b7c4-7a7c-497e-b8e4-499c821fb1b0/ CVE-2025-9492 - https://github.com/skyrainoh/CVE/issues/9 @@ -107250,9 +108377,11 @@ CVE-2025-9510 - https://github.com/zzb1388/cve/issues/44 CVE-2025-9511 - https://github.com/zzb1388/cve/issues/43 CVE-2025-9525 - https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_58/58.md CVE-2025-9525 - https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_58/58.md#poc +CVE-2025-9526 - https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_59/59.md CVE-2025-9526 - https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_59/59.md#poc CVE-2025-9527 - https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_60/60.md CVE-2025-9527 - https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_60/60.md#poc +CVE-2025-9528 - https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_61/61.md CVE-2025-9528 - https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_61/61.md#poc CVE-2025-9531 - https://karinagante.github.io/cve-2025-9531/ CVE-2025-9531 - https://karinagante.github.io/cve-2025-9531/#proof-of-concept-poc @@ -107287,6 +108416,8 @@ CVE-2025-9600 - https://github.com/zzb1388/cve/issues/51 CVE-2025-9601 - https://github.com/zzb1388/cve/issues/50 CVE-2025-9603 - https://github.com/lin-3-start/lin-cve/blob/main/Telesquare%20Tlr-2005Ksh/Telesquare%20Tlr-2005Ksh%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md CVE-2025-9603 - https://github.com/lin-3-start/lin-cve/blob/main/Telesquare%20Tlr-2005Ksh/Telesquare%20Tlr-2005Ksh%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md#3poc +CVE-2025-9606 - https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9606.md +CVE-2025-9606 - https://github.com/marcelomulder/CVE/blob/main/i-educar/SQL%20Injection%20(Blind%20Time-Based)%20Vulnerability%20in%20cod_agenda%20Parameter%20on%20agenda_preferencias.php%20Endpoint.md#poc CVE-2025-9607 - https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9607.md CVE-2025-9607 - https://github.com/marcelomulder/CVE/blob/main/i-educar/SQL%20Injection%20(Blind%20Time-Based)%20Vulnerability%20in%20%60id%60%20Parameter%20on%20%60.module.TabelaArredondamento.view%60%20Endpoint.md#poc CVE-2025-9608 - https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9608.md @@ -107297,6 +108428,7 @@ CVE-2025-9610 - https://github.com/yihaofuweng/cve/issues/15 CVE-2025-9643 - https://github.com/zzb1388/cve/issues/49 CVE-2025-9644 - https://github.com/zzb1388/cve/issues/48 CVE-2025-9645 - https://github.com/loveqiaoshen/QiaoShenCVE/issues/1 +CVE-2025-9647 - https://gitee.com/mtons/mblog/issues/ICPMNE CVE-2025-9649 - https://drive.google.com/file/d/16QQtZvUrMbF-i_1cGt5hNWmkn-YVyBOM/view?usp=sharing CVE-2025-9649 - https://github.com/appneta/tcpreplay/issues/968 CVE-2025-9649 - https://github.com/appneta/tcpreplay/issues/968#issuecomment-3226338070 @@ -107351,13 +108483,17 @@ CVE-2025-9684 - https://github.com/marcelomulder/CVE/blob/main/i-educar/SQL%20In CVE-2025-9685 - https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9685.md CVE-2025-9685 - https://github.com/marcelomulder/CVE/blob/main/i-educar/SQL%20Injection%20(Blind%20Time-Based)%20Vulnerability%20in%20%60id%60%20Parameter%20on%20%60.module.AreaConhecimento.view%60%20Endpoint.md CVE-2025-9686 - https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9686.md +CVE-2025-9686 - https://github.com/marcelomulder/CVE/blob/main/i-educar/SQL%20Injection%20(Blind%20Time-Based)%20Vulnerability%20in%20%60id%60%20Parameter%20on%20%60.module.AreaConhecimento.edit%60%20Endpoint.md CVE-2025-9687 - https://github.com/marcelomulder/CVE/blob/main/i-educar/Broken%20Object%20Level%20Authorization%20(BOLA)%20allows%20enumeration%20of%20students%20via%20.module.HistoricoEscolar.processamentoApi.md +CVE-2025-9687 - https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9687.md CVE-2025-9689 - https://github.com/1ithos/CVE/issues/1 CVE-2025-9690 - https://github.com/1ithos/CVE/issues/1 CVE-2025-9691 - https://github.com/lrjbsyh/CVE_Hunter/issues/6 CVE-2025-9691 - https://github.com/lrjbsyh/CVE_Hunter/issues/6#issue-3339330450 CVE-2025-9692 - https://github.com/lrjbsyh/CVE_Hunter/issues/7 CVE-2025-9692 - https://github.com/lrjbsyh/CVE_Hunter/issues/7#issue-3339422613 +CVE-2025-9695 - https://github.com/KMov-g/androidapps/blob/main/com.thinkyeah.galleryvault.md +CVE-2025-9695 - https://github.com/KMov-g/androidapps/blob/main/com.thinkyeah.galleryvault.md#steps-to-reproduce CVE-2025-9699 - https://github.com/ganzhi-qcy/cve/issues/16 CVE-2025-9700 - https://github.com/0510green-hand/cve/issues/3 CVE-2025-9701 - https://github.com/0510green-hand/cve/issues/4 @@ -107468,6 +108604,7 @@ CVE-2025-9831 - https://github.com/xiaoxinkaishi/cve/issues/2 CVE-2025-9832 - https://github.com/lrjbsyh/CVE_Hunter/issues/11 CVE-2025-9832 - https://github.com/lrjbsyh/CVE_Hunter/issues/11#issue-3354473207 CVE-2025-9833 - https://github.com/ganzhi-qcy/cve/issues/17 +CVE-2025-9834 - https://github.com/YoSheep/cve/blob/main/PHPGurukul%20Small%20CRM%20in%20PHP%20V4.0%20Multiple%20Stored%20Cross-Site%20Scripting%20(XSS)%20Vulnerabilities.md CVE-2025-9835 - https://github.com/ez-lbz/poc/issues/46 CVE-2025-9835 - https://github.com/ez-lbz/poc/issues/46#issue-3354477952 CVE-2025-9836 - https://github.com/ez-lbz/poc/issues/47 @@ -107501,6 +108638,7 @@ CVE-2025-9932 - https://github.com/xiaoxinkaishi/cve/issues/3 CVE-2025-9933 - https://github.com/xiaoxinkaishi/cve/issues/4 CVE-2025-9934 - https://github.com/Axelioc/CVE/blob/main/TOTOLINK/X5000R/sub_410C34/sub_410C34.md CVE-2025-9934 - https://github.com/Axelioc/CVE/blob/main/TOTOLINK/X5000R/sub_410C34/sub_410C34.md#poc +CVE-2025-9935 - https://github.com/mono7s/TOTOLINK/blob/main/N600R/TOTOLINK%20N600R%20Unauthorized_Command_Injection.md CVE-2025-9936 - https://www.cnblogs.com/aibot/p/19063425 CVE-2025-9937 - https://www.cnblogs.com/aibot/p/19063329 CVE-2025-9938 - https://github.com/ZZ2266/.github.io/tree/main/Dlink/DI-8400/yyxz.asp @@ -107929,6 +109067,7 @@ http://bugzilla.maptools.org/show_bug.cgi?id=2819 http://bugzilla.maptools.org/show_bug.cgi?id=2820 http://bugzilla.maptools.org/show_bug.cgi?id=2833 http://bugzilla.maptools.org/show_bug.cgi?id=2836 +http://bugzilla.maptools.org/show_bug.cgi?id=2848 http://bugzilla.mozilla.org/show_bug.cgi?id=249004 http://bugzilla.mozilla.org/show_bug.cgi?id=256316 http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=129337 @@ -108227,6 +109366,7 @@ http://g-laurent.blogspot.com/2009/09/windows-vista7-smb20-negotiate-protocol.ht http://g-laurent.blogspot.com/2009/11/windows-7-server-2008r2-remote-kernel.html http://ghost.org/docs/security/#privilege-escalation-attacks http://ghostinthelab.wordpress.com/2012/07/19/simplewebserver-2-2-rc2-remote-buffer-overflow-exploit/ +http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-w44j-66g7-xw99 http://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html http://greyhathackers.wordpress.com/2010/01/02/left-4-dead-stats-1-1-sql-injection-vulnerability/ http://greyhathackers.wordpress.com/2010/01/07/sniggabo-cms-v2-21-xss-vulnerability/ @@ -112325,6 +113465,17 @@ https://advisories.dxw.com/advisories/xen-mobile-vulnerable-to-code-execution-vi https://advisories.dxw.com/advisories/xss-in-tooltipy/ https://advisories.stormshield.eu/2018-006/ https://advisories.stormshield.eu/2020-011/ +https://advisories.stormshield.eu/2021-004/ +https://advisories.stormshield.eu/2021-006 +https://advisories.stormshield.eu/2021-019/ +https://advisories.stormshield.eu/2021-020/ +https://advisories.stormshield.eu/2021-022/ +https://advisories.stormshield.eu/2021-023/ +https://advisories.stormshield.eu/2021-024/ +https://advisories.stormshield.eu/2021-025/ +https://advisories.stormshield.eu/2021-026/ +https://advisories.stormshield.eu/2021-027/ +https://advisories.stormshield.eu/2021-069/ https://advisories.stormshield.eu/2023-006 https://advisories.stormshield.eu/2023-019 https://advisories.stormshield.eu/2023-020/ @@ -112332,6 +113483,7 @@ https://advisories.stormshield.eu/2023-021/ https://advisories.stormshield.eu/2023-022/ https://advisories.stormshield.eu/2023-024/ https://advisories.stormshield.eu/2023-027 +https://advisories.stormshield.eu/2024-017 https://advisories.stormshield.eu/2025-002/ https://advisories.stormshield.eu/2025-003/ https://advisory.dw1.io/57 @@ -112386,8 +113538,11 @@ https://android.googlesource.com/platform/frameworks/av/+/d834160d9759f1098df692 https://android.googlesource.com/platform/frameworks/av/+/dd3ca4d6b81a9ae2ddf358b7b93d2f8c010921f5 https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33 https://android.googlesource.com/platform/frameworks/base/+/0c3b7ec3377e7fb645ec366be3be96bb1a252ca1 +https://android.googlesource.com/platform/frameworks/base/+/0f3c01c326b6966590c652adec5baa61351756e4 https://android.googlesource.com/platform/frameworks/base/+/18c3b194642f3949d09e48c21da5658fa04994c8 https://android.googlesource.com/platform/frameworks/base/+/3287ac2d2565dc96bf6177967f8e3aed33954253 +https://android.googlesource.com/platform/frameworks/base/+/3a448067ac9ebdf669951e90678c2daa592a81d3 +https://android.googlesource.com/platform/frameworks/base/+/5a3d0c131175d923cf35c7beb3ee77a9e6485dad https://android.googlesource.com/platform/frameworks/base/+/7212a4bec2d2f1a74fa54a12a04255d6a183baa9 https://android.googlesource.com/platform/frameworks/base/+/89e32320207c1f332dd84024a13b001320d8c63d https://android.googlesource.com/platform/frameworks/base/+/8b473b3f79642f42eeeffbfe572df6c6cbe9d79e @@ -112537,8 +113692,10 @@ https://blog.convisoappsec.com/en/bug-hunting-in-the-janet-language-interpreter/ https://blog.csdn.net/2301_79997870/article/details/133365547?spm=1001.2014.3001.5501 https://blog.csdn.net/2301_79997870/article/details/133661890?spm=1001.2014.3001.5502 https://blog.csdn.net/DGS666/article/details/133795200?spm=1001.2014.3001.5501 +https://blog.csdn.net/adminxw/article/details/102881463 https://blog.csdn.net/he_and/article/details/102698171 https://blog.csdn.net/jingke666/article/details/140855251 +https://blog.csdn.net/maxiluo/article/details/135865584 https://blog.csdn.net/nnn2188185/article/details/141065540 https://blog.csdn.net/qq_40684306/article/details/115278837 https://blog.csdn.net/qq_41770175/article/details/93486383 @@ -112548,8 +113705,10 @@ https://blog.csdn.net/sugaryzheng/article/details/133283101?spm=1001.2014.3001.5 https://blog.csdn.net/weixin_42813492/article/details/81240523 https://blog.csdn.net/weixin_43567873/article/details/136636198 https://blog.csdn.net/weixin_46686336/article/details/144797242 +https://blog.csdn.net/weixin_48539059/article/details/141033966 https://blog.csdn.net/weixin_51394168/article/details/132817842 https://blog.csdn.net/weixin_53009585/article/details/140853891 +https://blog.csdn.net/weixin_72610998/article/details/134784075?spm=1001.2014.3001.5502 https://blog.cybergon.com/posts/cve-2024-44349/ https://blog.daniel-ruf.de/critical-design-flaw-npm-pnpm-yarn/ https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004 @@ -112897,6 +114056,12 @@ https://brooklyn.apache.org/community/security/CVE-2016-8744.html https://brooklyn.apache.org/community/security/CVE-2017-3165.html https://bsg.tech/blog/cve-2022-25854-stored-xss-in-yaireo-tagify-npm-module/ https://buer.haus/2019/10/18/a-tale-of-exploitation-in-spreadsheet-file-conversions/ +https://bugbounty.zohocorp.com/bb/#/bug/101000006387693?tab=originator +https://bugbounty.zohocorp.com/bb/#/bug/101000006458675?tab=originator +https://bugbounty.zohocorp.com/bb/#/bug/101000006459171?tab=originator +https://bugbounty.zohocorp.com/bb/#/bug/101000006459195?tab=originator +https://bugbounty.zohocorp.com/bb/#/bug/101000006459751?tab=originator +https://bugbounty.zohocorp.com/bb/#/bug/101000006463045?tab=originator https://bugcrowd.com/disclosures/72d7246b-f77f-4f7f-9bd1-fdc35663cc92/linksys-re6500-unauthenticated-rce-working-across-multiple-fw-versions https://bugs.astron.com/view.php?id=310 https://bugs.debian.org/1031267 @@ -112914,6 +114079,7 @@ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002668 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002669 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002687 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002739 +https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067896 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632862 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747 @@ -112999,7 +114165,16 @@ https://bugs.ghostscript.com/show_bug.cgi?id=700576 https://bugs.ghostscript.com/show_bug.cgi?id=700585 https://bugs.ghostscript.com/show_bug.cgi?id=701176 https://bugs.ghostscript.com/show_bug.cgi?id=701294 +https://bugs.ghostscript.com/show_bug.cgi?id=701785 https://bugs.ghostscript.com/show_bug.cgi?id=701792 +https://bugs.ghostscript.com/show_bug.cgi?id=701793 +https://bugs.ghostscript.com/show_bug.cgi?id=701795 +https://bugs.ghostscript.com/show_bug.cgi?id=701796 +https://bugs.ghostscript.com/show_bug.cgi?id=701800 +https://bugs.ghostscript.com/show_bug.cgi?id=701808 +https://bugs.ghostscript.com/show_bug.cgi?id=701822 +https://bugs.ghostscript.com/show_bug.cgi?id=701827 +https://bugs.ghostscript.com/show_bug.cgi?id=701829 https://bugs.ghostscript.com/show_bug.cgi?id=701843 https://bugs.ghostscript.com/show_bug.cgi?id=701846 https://bugs.ghostscript.com/show_bug.cgi?id=702851 @@ -113007,6 +114182,10 @@ https://bugs.ghostscript.com/show_bug.cgi?id=703791 https://bugs.ghostscript.com/show_bug.cgi?id=706494 https://bugs.ghostscript.com/show_bug.cgi?id=707510 https://bugs.ghostscript.com/show_bug.cgi?id=708030 +https://bugs.ghostscript.com/show_bug.cgi?id=708517 +https://bugs.ghostscript.com/show_bug.cgi?id=708521 +https://bugs.ghostscript.com/show_bug.cgi?id=708539 +https://bugs.ghostscript.com/show_bug.cgi?id=708602 https://bugs.horde.org/ticket/14926 https://bugs.internet2.edu/jira/browse/GRP-1838 https://bugs.launchpad.net/apport/+bug/1648806 @@ -113579,6 +114758,7 @@ https://bugzilla.mozilla.org/show_bug.cgi?id=1656741 https://bugzilla.mozilla.org/show_bug.cgi?id=1658881 https://bugzilla.mozilla.org/show_bug.cgi?id=1661071 https://bugzilla.mozilla.org/show_bug.cgi?id=1663466 +https://bugzilla.mozilla.org/show_bug.cgi?id=1663571 https://bugzilla.mozilla.org/show_bug.cgi?id=1669466 https://bugzilla.mozilla.org/show_bug.cgi?id=1670358 https://bugzilla.mozilla.org/show_bug.cgi?id=1670725 @@ -113665,6 +114845,7 @@ https://bugzilla.mozilla.org/show_bug.cgi?id=1771685 https://bugzilla.mozilla.org/show_bug.cgi?id=1773874 https://bugzilla.mozilla.org/show_bug.cgi?id=1777800 https://bugzilla.mozilla.org/show_bug.cgi?id=1782211 +https://bugzilla.mozilla.org/show_bug.cgi?id=1783504 https://bugzilla.mozilla.org/show_bug.cgi?id=1783561 https://bugzilla.mozilla.org/show_bug.cgi?id=1786188 https://bugzilla.mozilla.org/show_bug.cgi?id=1786934 @@ -113675,6 +114856,7 @@ https://bugzilla.mozilla.org/show_bug.cgi?id=1790345 https://bugzilla.mozilla.org/show_bug.cgi?id=1791201 https://bugzilla.mozilla.org/show_bug.cgi?id=1792138 https://bugzilla.mozilla.org/show_bug.cgi?id=1793551 +https://bugzilla.mozilla.org/show_bug.cgi?id=1794292 https://bugzilla.mozilla.org/show_bug.cgi?id=1795496 https://bugzilla.mozilla.org/show_bug.cgi?id=1795815 https://bugzilla.mozilla.org/show_bug.cgi?id=1798798 @@ -114753,8 +115935,16 @@ https://cxsecurity.com/issue/WLB-2020090063 https://cxsecurity.com/issue/WLB-2020090064 https://cxsecurity.com/issue/WLB-2020100161 https://cxsecurity.com/issue/WLB-2020120118 +https://cxsecurity.com/issue/WLB-2021110057 +https://cxsecurity.com/issue/WLB-2022010013 +https://cxsecurity.com/issue/WLB-2022010019 +https://cxsecurity.com/issue/WLB-2022010093 +https://cxsecurity.com/issue/WLB-2022090057 +https://cxsecurity.com/issue/WLB-2022100037 https://cxsecurity.com/issue/WLB-2023050012 https://cxsecurity.com/issue/WLB-2023090075 +https://cxsecurity.com/issue/WLB-2024010023 +https://cxsecurity.com/issue/WLB-2024010027 https://cyber-ducky.com/stored-xss-found-in-many-notes-the-best-note-taking-app/ https://cyber-ducky.com/xss-found-in-asian-arts-talent-foundation-2/ https://cyber.wtf/2024/11/11/topqw-webportal-cves/ @@ -114790,6 +115980,7 @@ https://cybermaya.in/posts/Post-40/ https://cybermaya.in/posts/Post-42/ https://cybermaya.in/posts/Post-43/ https://cybermaya.in/posts/Post-44/ +https://cybersecurityworks.com/zerodays/cve-2020-14445-wso2.html https://cyberthoth.medium.com/fast-food-ordering-system-1-0-cross-site-scripting-7927f4b1edd6 https://cyberworldmirror.com/nicehash-vulnerability-leaked-miners-information/ https://cybir.com/2022/cve/connectwise-control-dns-spoofing-poc/ @@ -114812,7 +116003,11 @@ https://debbugs.gnu.org/cgi/bugreport.cgi?bug=28350 https://debihiga.wordpress.com/sa-ftp/ https://debihiga.wordpress.com/sa-whip/ https://decrypt.locker/obtaining-my-first-cve/ +https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis +https://defcon.org/html/defcon-29/dc-29-speakers.html#kintigh +https://delvingbitcoin.org/t/cve-2024-38365-public-disclosure-btcd-findanddelete-bug/1184 https://delvingbitcoin.org/t/disclosure-btcd-consensus-bugs-due-to-usage-of-signed-transaction-version/455 +https://delvingbitcoin.org/t/dos-disclosure-lnd-onion-bomb/979 https://depthsecurity.com/blog/medical-exploitation-you-are-now-diabetic https://derekabdine.com/blog/2022-arris-advisory https://deshal3v.github.io/blog/kernel-research/mmap_exploitation @@ -114826,6 +116021,7 @@ https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secur https://devcraft.io/posts/2017/07/21/tp-link-archer-c9-admin-password-reset.html https://devel0pment.de/?p=1881 https://devel0pment.de/?p=2217 +https://developer.aliyun.com/article/1333161 https://developers.hubspot.com/docs/api/webhooks#manage-settings-via-api https://developers.hubspot.com/docs/api/webhooks#scopes https://devicereversing.wordpress.com/2016/11/07/eirs-d1000-modem-is-wide-open-to-being-hacked/ @@ -114926,8 +116122,16 @@ https://dl.packetstormsecurity.net/papers/general/braktooth.pdf https://doar-e.github.io/blog/2018/07/14/cve-2017-2446-or-jscjsglobalobjectishavingabadtime/ https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html#security-note-9-11-2021 +https://docs.aviatrix.com/HowTos/security_bulletin_article.html +https://docs.aviatrix.com/HowTos/security_bulletin_article.html#article-avxsb-00001 +https://docs.aviatrix.com/HowTos/security_bulletin_article.html#clean-up-old-code +https://docs.aviatrix.com/HowTos/security_bulletin_article.html#cross-site-request-forgery-csrf https://docs.aviatrix.com/HowTos/security_bulletin_article.html#csrf-on-password-reset +https://docs.aviatrix.com/HowTos/security_bulletin_article.html#insecure-file-permissions +https://docs.aviatrix.com/HowTos/security_bulletin_article.html#observable-response-discrepancy-from-api https://docs.aviatrix.com/HowTos/security_bulletin_article.html#openvpn-abitrary-file-write +https://docs.aviatrix.com/HowTos/security_bulletin_article.html#openvpn-client-elevation-of-privilege +https://docs.aviatrix.com/HowTos/security_bulletin_article.html#xml-signature-wrapping-in-saml https://docs.google.com/document/d/14ExrgXqPQlgvjw2poqNzYzAOi-C5tda-XBJF513yzag/edit?usp=sharing https://docs.google.com/document/d/15vZXyzddcOv61sFSb3Lf9Dg1rnZ9n3Q6ANoa82jzcNA/edit?usp=sharing https://docs.google.com/document/d/16iWGXHpmlwJ0GAOi458YlpR56McCvDcN/edit#heading=h.gjdgxs @@ -115766,6 +116970,7 @@ https://ghost.org/docs/security/ https://ghost.org/docs/security/#privilege-escalation-attacks https://ghostwriteattack.com https://giongfnef.gitbook.io/giongfnef/cve/cve-2023-5311 +https://gist.github.com/0xCaptainFahim/8bb9021dcea33863eaf0279aaca2671c https://gist.github.com/0xKunAlx0/a80bc7ec5acb2f19daa36257fedbcf11 https://gist.github.com/0xSebin/147e7f57daf7f270d957927892b0a51d https://gist.github.com/0xSebin/29cb8e043974d996509522cdb738edc6 @@ -115780,9 +116985,11 @@ https://gist.github.com/404notf0und/ab59234d71fbf35b4926ffd646324f29 https://gist.github.com/9thplayer/df042fe48c314dbc1afad80ffed8387d https://gist.github.com/AhMyth/6d9c5e15d943dd092ccca19fca8d5d37 https://gist.github.com/AhMyth/b0f7e4b8244def8eb8d7d8c61fa6d4e5 +https://gist.github.com/Anudeepkadambala/88c6065f1de1597be96e50a573cde56e https://gist.github.com/AzhariRamadhan/a5c9644861f46b1eadb1f2a15c7950fe https://gist.github.com/ChALkeR/415a41b561ebea9b341efbb40b802fc9 https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d +https://gist.github.com/Dremig/1ba111f9b1f7cffe1fcb4838b64e55b9 https://gist.github.com/Esquirez/0c41e0279ca11d9bfc52c3938041d935 https://gist.github.com/Esquirez/985db6c65219a3e5a6521e291524aaa0 https://gist.github.com/Frycos/62fa664bacd19a85235be19c6e4d7599 @@ -115795,7 +117002,10 @@ https://gist.github.com/KhanMarshaI/7a2e74fcb194f7d6ee7e60da4a14af7b https://gist.github.com/KhanMarshaI/ba3e74b331ce4ab602a5a22a59aaf819 https://gist.github.com/LiveOverflow/c937820b688922eb127fb760ce06dab9 https://gist.github.com/MortalP0ison/5fd584b4c85fa13281fdc918913446fa +https://gist.github.com/NoSpaceAvailable/234acdf57b5d7b29b2f39090c1686bc8 +https://gist.github.com/RNPG/062cfca2e293a0e7d24f5d55f8db3fde https://gist.github.com/RNPG/458e17f24ebf7d8af3c5c4d7073347a0 +https://gist.github.com/RNPG/56b9fe4dcc3a248d4288bde5ffb3a5b3 https://gist.github.com/RNPG/be2ca92cb1f943d4c340c75fbfc9b783 https://gist.github.com/RNPG/e11af10e1bd3606de8b568033d932589 https://gist.github.com/RootUp/3d9e90ea5ae0799305b4c7ec66e19387 @@ -115803,12 +117013,18 @@ https://gist.github.com/Rootingg/483b09b760d031b62b172f2153f3ed2a https://gist.github.com/Rootingg/843368931f70886bed3cf982f10a4424 https://gist.github.com/Shinkurt/157dbb3767c9489f3d754f79b183a890 https://gist.github.com/Shlucus/ab762d6b148f2d2d046c956526a80ddc +https://gist.github.com/Suuuuuzy/a3df9e88a41f9641c37e6d663f9b539c +https://gist.github.com/Swind1er/02f6cb414e440c34878f20fef756e286 https://gist.github.com/Swind1er/1ec2fde42254598a72f1d716f9cfe2a1 +https://gist.github.com/Swind1er/84161b607d06d060fba5adcdd92bceb4 +https://gist.github.com/Theresasu1/b1b57b3763a286d9491541180c99368b https://gist.github.com/VAMorales/32794cccc2195a935623a12ef32760dc https://gist.github.com/Xib3rR4dAr/91bd37338022b15379f393356d1056a1 https://gist.github.com/Zenexer/40d02da5e07f151adeaeeaa11af9ab36 https://gist.github.com/aaaahuia/1343e3aa06b031ea621b5701cebcee3e https://gist.github.com/aaaahuia/1fd31c1ebcddfe4c95268fa4f31fc312 +https://gist.github.com/adeshkolte/983bcadd82cc1fd60333098eb646ef68 +https://gist.github.com/adeshkolte/9e60b2483d2f20d1951beac0fc917c6f https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894 https://gist.github.com/anonymous/16aca69b7dea27cb73ddebb0d9033b02 https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb @@ -115823,6 +117039,7 @@ https://gist.github.com/c0nrad/e92005446c480707a74a https://gist.github.com/cure53/09a81530a44f6b8173f545accc9ed07e https://gist.github.com/cure53/df34ea68c26441f3ae98f821ba1feb9c https://gist.github.com/dazhouzhou/1a3b7400547f23fe316db303ab9b604f +https://gist.github.com/dru1d-foofus/1af21179f253879f101c3a8d4f718bf0 https://gist.github.com/fxb6476/0b9883a88ff2ca40de46a8469834e16c https://gist.github.com/higordiego/01a35a20a4e20e937d384b677c000921 https://gist.github.com/higordiego/0dae6dd4a36acd12bcc408caf1c787d9 @@ -115855,8 +117072,12 @@ https://gist.github.com/illikainen/ced14e08e00747fef613ba619bb25bb4 https://gist.github.com/isciurus/df4d7edd9c3efb4a0753 https://gist.github.com/izadgot/3efc75f62f9c9567c8f11bad74165425 https://gist.github.com/jackfromeast/176413c3bd73f825f7aeeb05e80e02a6 +https://gist.github.com/jackfromeast/1e2e206813887a470e00b8474c616567 +https://gist.github.com/javadk/0be29d2bb5a971bc09f3410659c83308 +https://gist.github.com/javadk/aa7b5eb6f0fca2fbc334129b7572c7c6 https://gist.github.com/kdrypr/5dac91c2d27c4dc82b1225dffa38f7a8 https://gist.github.com/legndery/a248350bb25b8502a03c2f407cedeb14 +https://gist.github.com/leommxj/0a32afeeaac960682c5b7c9ca8ed070d https://gist.github.com/leonjza/2244eb15510a0687ed93160c623762ab https://gist.github.com/llandeilocymro/7dbe3daaab6d058d609fd9a0b24301cb https://gist.github.com/mariuszpoplwski/51604d8a6d7d78fffdf590c25e844e09 @@ -115865,11 +117086,14 @@ https://gist.github.com/menglong2234/b7bc13ae1a144f47cc3c95a7ea062428 https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f https://gist.github.com/merhawi023/a1155913df3cf0c17971b0fb7dcd8f20 https://gist.github.com/miguelafmonteiro/d8f66af61d14e06338b688f90c4dfa7c +https://gist.github.com/mmmdzz/03df5177afd04b32ac190eb7907f3834 https://gist.github.com/mmmsssttt404/37a40ce7d6e5ca604858fe30814d9466 https://gist.github.com/mmmsssttt404/407e2ffe3e0eaa393ad923a86316a385 https://gist.github.com/netspooky/61101e191afee95feda7dbd2f6b061c4 https://gist.github.com/numanturle/c1e82c47f4cba24cff214e904c227386 https://gist.github.com/pak0s/05a0e517aeff4b1422d1a93f59718459 +https://gist.github.com/prodigiousMind/fc69a79629c4ba9ee88a7ad526043413 +https://gist.github.com/progprnv/10110b20469e4ae02aa1c9bfe130f5e9 https://gist.github.com/redeye5/470708bd27ed115b29d0434255b9f7a0 https://gist.github.com/redeye5/57ccafea7263efec67c82b0503c72480 https://gist.github.com/redeye5/ccbbc43330cc9821062249b78c916317 @@ -115880,18 +117104,24 @@ https://gist.github.com/shawarkhanethicalhacker/b98c5ac7491cf77732c793ecc468f465 https://gist.github.com/shellkraft/a8b1f35d5c3ba313605065889563fb00 https://gist.github.com/shellkraft/aa66561e984e83052bd080f195a3ec80 https://gist.github.com/smidtbx10/f8ff1c4977b7f54886c6a52e9ef4e816 +https://gist.github.com/superboy-zjc/96f0d56da584d840ba18355cbea96ac4 https://gist.github.com/superboy-zjc/a01bd059c4078249d899f8c70c8feb0e https://gist.github.com/superboy-zjc/a01bd059c4078249d899f8c70c8feb0e#proof-of-concept https://gist.github.com/superboy-zjc/a31b8ea7466f91b437598297bf5cbce8 +https://gist.github.com/superboy-zjc/f71b84ed074260a5e459581caa2f1fb2 +https://gist.github.com/superboy-zjc/f71b84ed074260a5e459581caa2f1fb2#proof-of-concept https://gist.github.com/svennergr/204038bda1849ebce9af32eea9e55038 https://gist.github.com/svennergr/501409fbdb0ef4a8b0f07a26a2815fbb https://gist.github.com/swkim101/f473b9a60e6d4635268402a2cd2025ac +https://gist.github.com/tansique-17/0776791b8edd4931216be452a6971f5e +https://gist.github.com/tariqhawis/ad92d5e683f3a5d83e0629955ff42ad7 https://gist.github.com/th4s1s/175ae4b2632096059b42377dd6c49d47 https://gist.github.com/tim124058/5c4babe391a016c771d2cccabead21cb https://gist.github.com/untaman/cb58123fe89fc65e3984165db5d40933 https://gist.github.com/vin01/26a8bb13233acd9425e7575a7ad4c936 https://gist.github.com/yinfei6/56bb396f579cb67840ed1ecb77460a5b https://gist.github.com/yyyyy7777777/a36541cb60d9e55628f78f2a68968212 +https://gist.github.com/z472421519/d17061ea79a72d39fe69c000fa1a6280 https://gist.github.com/zeroSteiner/85daef257831d904479c https://gist.githubusercontent.com/henices/2467e7f22dcc2aa97a2453e197b55a0c/raw/7b54bccc9a129c604fb139266f4497ab7aaa94c7/gistfile1.txt https://gist.githubusercontent.com/john0x186/1d9cc7fcc8386480d2bdaa9fdcfa914b/raw/d2d3d74ccaa939127ee2b03139061509a7dd238c/full-disclosure.md @@ -115912,8 +117142,17 @@ https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31641 https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31642 https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31643 +https://gitee.com/A0kooo/cve_article/blob/master/RapidCMS/SQL%20injection1/rapidcms%20user-move-run.php%20SQL%20injection.md +https://gitee.com/A0kooo/cve_article/blob/master/RapidCMS/SQL%20injection2/rapidcms%20runlogon.php%20SQL%20injection.md +https://gitee.com/A0kooo/cve_article/blob/master/feehi_cms/Fichkems%20Friendley-Link%20file%20upload%20vulnerability.md +https://gitee.com/A0kooo/cve_article/blob/master/feehi_cms/file_upload2/Fichkems%20banner%20file%20upload%20vulnerability.md +https://gitee.com/A0kooo/cve_article/blob/master/feehi_cms/file_upload3/Fichkems%20user%20file%20upload%20vulnerability.md +https://gitee.com/B00W_NSD/poc/blob/master/seacms13.3-sql/poc.md https://gitee.com/CTF-hacker/pwn/issues/I5WAAB +https://gitee.com/CTF-hacker/pwn/issues/I7LH2N +https://gitee.com/CTF-hacker/pwn/issues/I7LI4E https://gitee.com/LinZhaoguan/pb-cms/issues/IBMM8V +https://gitee.com/MetInfo_1/MetInfo/issues/I5YM81?from=project-issue https://gitee.com/NoBlake/cve-2023-48863/ https://gitee.com/NoBlake/cve-2023-48864 https://gitee.com/agile-bpm/agile-bpm-basic/issues/ICAPT5 @@ -115923,35 +117162,62 @@ https://gitee.com/aizuda/snail-job/issues/IBSQ24#note_38500450_link https://gitee.com/blue_ty/cms/issues/I8PG2A https://gitee.com/cui-yiwei/cve-number/blob/master/images/Cve%20number.md https://gitee.com/cui-yiwei/cve-number/blob/master/images/IBOS%20oa%20v4.5.5.md/1.md +https://gitee.com/deerwms/deer-wms-2/issues/ICLQFL https://gitee.com/deerwms/deer-wms-2/issues/ICLQKV https://gitee.com/deerwms/deer-wms-2/issues/ICLRE9 https://gitee.com/erzhongxmu/JEEWMS/issues/IB2XZG +https://gitee.com/erzhongxmu/JEEWMS/issues/IBFK93 +https://gitee.com/erzhongxmu/JEEWMS/issues/IBFKA8 +https://gitee.com/erzhongxmu/JEEWMS/issues/IBFKBM +https://gitee.com/fushuling/cve/blob/master/CVE-2024-52786.md +https://gitee.com/fushuling/cve/blob/master/CVE-2024-53499.md https://gitee.com/fuyang_lipengjun/platform/issues/ICLIK1 https://gitee.com/fuyang_lipengjun/platform/issues/ICLIKX https://gitee.com/fuyang_lipengjun/platform/issues/ICLILS https://gitee.com/getrebuild/rebuild/issues/I6W4M2 https://gitee.com/gmg137/snap7-rs/issues/ICBIOB +https://gitee.com/hailey888/oa_system/issues/IBRQWG https://gitee.com/hailey888/oa_system/issues/IBRQXH +https://gitee.com/hailey888/oa_system/issues/IBRQYI +https://gitee.com/hailey888/oa_system/issues/IBRQZ9 https://gitee.com/hailey888/oa_system/issues/IBRRX3 https://gitee.com/hailey888/oa_system/issues/IBRRZX https://gitee.com/heyewei/JFinalcms/issues/I7WGC6 https://gitee.com/heyewei/JFinalcms/issues/I8VHGR https://gitee.com/heyewei/JFinalcms/issues/I8VHM2 +https://gitee.com/heyewei/SpringBootCMS/issues/IA9D7F +https://gitee.com/lssrain/taskmatic/issues/IAUXOL +https://gitee.com/mindspore/mindspore/issues/I73DOS +https://gitee.com/mindspore/mindspore/issues/IBVKM8 https://gitee.com/mingSoft/MCMS/issues/I4W1S9 +https://gitee.com/mingSoft/MCMS/issues/I61TG5 https://gitee.com/mingSoft/MCMS/issues/I6592F https://gitee.com/mingSoft/MCMS/issues/I65KI5 https://gitee.com/mingSoft/MCMS/issues/I8MAJK https://gitee.com/mingyuefusu/tushuguanlixitong/issues/IBTSPH https://gitee.com/misak7in/cve/blob/master/taocms.md https://gitee.com/morning-pro/Morning/issues/IBRVMX +https://gitee.com/mtons/mblog/issues/ICPMIR +https://gitee.com/mtons/mblog/issues/ICPMJO +https://gitee.com/mtons/mblog/issues/ICPML3 https://gitee.com/mtons/mblog/issues/ICPMLJ +https://gitee.com/mtons/mblog/issues/ICPMLW +https://gitee.com/mtons/mblog/issues/ICPMMF https://gitee.com/mtons/mblog/issues/ICPMML https://gitee.com/mtons/mblog/issues/ICPMMQ +https://gitee.com/mtons/mblog/issues/ICPMMW +https://gitee.com/mtons/mblog/issues/ICPMNE +https://gitee.com/pear-admin/Pear-Admin-Think/issues/I3DIEC +https://gitee.com/r1bbit/JFinalOA/issues/IBHUP1 https://gitee.com/r1bbit/JFinalOA/issues/IBHUQ9 +https://gitee.com/r1bbit/JFinalOA/issues/IBHUQQ https://gitee.com/sanluan/PublicCMS/issues/IADVDM +https://gitee.com/shavchen214/pwn/issues/I94VFH +https://gitee.com/shavchen214/pwn/issues/I94VI3 https://gitee.com/surveyking/surveyking/issues/I4V05A https://gitee.com/taisan/tarzan-cms/issues/IBHZ0J https://gitee.com/upgogo/s123/issues/I9MARO +https://gitee.com/wanglingxiao/mysiteforme/issues/IBFVCZ https://gitee.com/wanglingxiao/mysiteforme/issues/IBFVHR https://gitee.com/wanglongcn/yifang/issues/IC0RCX https://gitee.com/xiandafu/beetl/issues/I6RUIP @@ -115960,6 +117226,9 @@ https://gitee.com/y1336247431/poc-public/issues/I9BA5R https://gitee.com/y_project/RuoYi/issues/I57IME https://gitee.com/y_project/RuoYi/issues/I65V2B https://gitee.com/y_project/RuoYi/issues/I78DOR +https://gitee.com/yadong.zhang/DBlog/issues/IB6552 +https://gitee.com/zchuanwen/cve/issues/I9HQRY +https://gitee.com/zchuanwen/cve123/issues/I9I18D https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/ https://github.blog/2023-01-23-pwning-the-all-google-phone-with-a-non-google-bug/ https://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641/ @@ -115979,12 +117248,20 @@ https://github.com/0x1c1ph3r/CVEs/tree/main/CVE-2024-51063 https://github.com/0x1c1ph3r/CVEs/tree/main/CVE-2024-51064 https://github.com/0x1c1ph3r/CVEs/tree/main/CVE-2024-51065 https://github.com/0x1c1ph3r/CVEs/tree/main/CVE-2024-51066 +https://github.com/0xAlmighty/Vulnerability-Research/blob/main/SourceCodester/CLMS/SourceCodester-CLMS-SQLi.md https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md#field-6-division-field-in-division-system-page https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md#field-7-title-field-in-announcement-page +https://github.com/0xZeroSec/CVE-2025-55885 https://github.com/0xZeroSec/CVE-2025-55887 +https://github.com/0xZeroSec/CVE-2025-55888 https://github.com/0xabandon/CVE/issues/1 https://github.com/0xs1ash/poc/blob/main/portable_data_exfiltration.md +https://github.com/0xs1ash/poc/blob/main/xss.md#1-stored-xss +https://github.com/0xsu3ks/CVE-2024-34327 +https://github.com/0xsu3ks/CVE-2024-34328 https://github.com/10cksYiqiyinHangzhouTechnology/vox2mesh_poc +https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-25346 +https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-25347 https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-25348 https://github.com/1104533685/cve/blob/main/sql.md https://github.com/11whoami99/CVE-2024-4577 @@ -116004,13 +117281,21 @@ https://github.com/1276486/CVE/issues/9 https://github.com/1296299554/CVE/issues/1 https://github.com/12T40910/CVE/issues/3 https://github.com/14isnot40/vul_discovery/blob/06d04dbbc6f792a82321c00376d4dbf3add00f4f/poc/bit2spr%20vulnerability%20discovery.md.pdf +https://github.com/1MurasaKi/STMS_CSRF/blob/main/README.md +https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-f8ch-w75v-c847 https://github.com/1Panel-dev/MaxKB/security/advisories/GHSA-fjf6-6cvf-xr72 https://github.com/1Panel-dev/MaxKB/security/advisories/GHSA-p2qq-x9j2-px8v https://github.com/1SHOTSEC/CVE/issues/1 +https://github.com/1dreamGN/CVE/blob/main/CVE-2023-42406.md https://github.com/1ithos/CVE/issues/1 +https://github.com/1lusanbao9/cve/issues/1 https://github.com/1testnew/CVE_Hunter/blob/main/SQLi-1.md +https://github.com/1xxxgg/cve/issues/1 +https://github.com/1xxxgg/cve/issues/2 +https://github.com/1xxxgg/cve/issues/3 https://github.com/2364490073/cve1/blob/main/README.md https://github.com/244556089/cve/issues/1 +https://github.com/2664521593/mycve/blob/main/D-Link/D-Link_CJ_1.md https://github.com/2664521593/mycve/blob/main/D-Link/D-Link_CJ_1.md#exp https://github.com/2664521593/mycve/blob/main/D-Link/D-Link_CJ_2.md https://github.com/2664521593/mycve/blob/main/D-Link/D-Link_CJ_2.md#poc @@ -116022,9 +117307,11 @@ https://github.com/3127434/CVE/issues/2 https://github.com/38279/1/issues/2 https://github.com/38279/2/issues/1 https://github.com/38279/3/issues/1 +https://github.com/3ndG4me/liferay-xss-7.2.1GA2-poc-report-CVE-2020-7934 https://github.com/404heihei/CVE/issues/2 https://github.com/404heihei/CVE/issues/5 https://github.com/415Curry/cve/issues/1 +https://github.com/418sec/huntr/pull/102 https://github.com/418sec/huntr/pull/1329 https://github.com/485961590/CVE/issues/1 https://github.com/4ra1n/super-xray/releases/tag/0.2-beta @@ -116045,6 +117332,7 @@ https://github.com/ABC-YOLO/cve/blob/main/xss45.md https://github.com/ADOdb/ADOdb/issues/274 https://github.com/AOMediaCodec/libavif/pull/2769 https://github.com/ARPANET-cyber/CVE/issues/10 +https://github.com/ARPANET-cyber/CVE/issues/11 https://github.com/ARPANET-cyber/CVE/issues/12 https://github.com/ARPANET-cyber/CVE/issues/2 https://github.com/ARPANET-cyber/CVE/issues/5 @@ -116056,8 +117344,13 @@ https://github.com/ARPANET-cybersecurity/vuldb/issues/3 https://github.com/ASantsSec/CVE/issues/10 https://github.com/ASantsSec/CVE/issues/11 https://github.com/ASantsSec/CVE/issues/12 +https://github.com/ASantsSec/CVE/issues/13 +https://github.com/ASantsSec/CVE/issues/14 +https://github.com/ASantsSec/CVE/issues/15 https://github.com/ASantsSec/CVE/issues/9 https://github.com/AXUyaku/cve/issues/1 +https://github.com/Aalok-zz/cve/issues/1 +https://github.com/AbhijithAJ/AutoConnect_IoT_Lib_vulnerability/blob/main/Report.pdf https://github.com/AcademySoftwareFoundation/openexr/issues/491 https://github.com/AcademySoftwareFoundation/openexr/issues/493 https://github.com/AcademySoftwareFoundation/openexr/issues/494 @@ -116068,21 +117361,35 @@ https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-x2 https://github.com/Ackites/KillWxapkg/issues/86 https://github.com/Ackites/KillWxapkg/issues/86#issue-3053628148 https://github.com/AdamWallwork/CVEs/tree/main/2025/CVE-2025-49484 +https://github.com/AdeptLanguage/Adept/security/advisories/GHSA-8c7v-vccv-cx4q https://github.com/Admidio/admidio/issues/612 +https://github.com/Admidio/admidio/security/advisories/GHSA-69wx-xc6j-28v3 https://github.com/Admidio/admidio/security/advisories/GHSA-7c4c-749j-pfp2 https://github.com/Aether-0/CVE-2025-55575 +https://github.com/Ahwxorg/LibreY/security/advisories/GHSA-p4f9-h8x8-mpwf https://github.com/Ahwxorg/LibreY/security/advisories/GHSA-xfj6-4vp9-8rgc https://github.com/Ainevsia/CVE-Request/tree/main/Ricoh/1 https://github.com/Ais0329/cve/issues/1 https://github.com/Aiyakami/CVE-1/issues/5 +https://github.com/Alanaktion/phproject/security/advisories/GHSA-mhhg-qx37-g369 +https://github.com/AlbaDove/cve/issues/1 +https://github.com/AlbaDove/cve/issues/2 +https://github.com/AlbaDove/cve/issues/3 +https://github.com/AlquistManager/alquist/issues/42 https://github.com/Am1ngl/ttt/tree/main/22 https://github.com/Am1ngl/ttt/tree/main/29 https://github.com/Am1ngl/ttt/tree/main/30 https://github.com/Am1ngl/ttt/tree/main/31 https://github.com/Am1ngl/ttt/tree/main/32 +https://github.com/Amrita2000/CVES/blob/main/CVE-2024-34230.md https://github.com/Amrita2000/CVES/blob/main/CVE-2024-34231.md +https://github.com/Anchor0221/CVE-2025-50460 +https://github.com/Anchor0221/CVE-2025-50461 +https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/9.md +https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/9.md#poc https://github.com/Ant1sec-ops/CVE-2024-27766 https://github.com/Antho59/wp-jobhunt-exploit +https://github.com/Anudeepkadambala/CVE-Reports/security/advisories/GHSA-r4mf-mr9h-f27m https://github.com/ArchimedesCAD/libredwg/issues/6 https://github.com/AstrBotDevs/AstrBot/issues/1675 https://github.com/Atheos/Atheos/security/advisories/GHSA-rwc2-4q8c-xj48 @@ -116095,6 +117402,7 @@ https://github.com/Awilum/monstra-cms/issues/351 https://github.com/Axelioc/CVE/blob/main/TOTOLINK/X5000R/sub_410C34/sub_410C34.md https://github.com/Axelioc/CVE/blob/main/TOTOLINK/X5000R/sub_410C34/sub_410C34.md#poc https://github.com/AzhariRamadhan/uboot-cve +https://github.com/Azure/AKS/issues/3947 https://github.com/Balasys/dheater https://github.com/Barakat/CVE-2019-16098 https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-17.public-wifi-theft-impersonation.txt @@ -116116,11 +117424,19 @@ https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-40.ethernet-snmp.txt https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-42.remote-OTA.txt https://github.com/BasuCert/WinboxPoC +https://github.com/Bemcliu/cve-reports/blob/main/cve-04-%E8%9B%8B%E7%B3%95%E5%95%86%E5%9F%8EJPA%E7%89%88-Reflected%20XSS/readme.md +https://github.com/Bemcliu/cve-reports/blob/main/cve-05-%E8%9B%8B%E7%B3%95%E5%95%86%E5%9F%8EJPA%E7%89%88-Stored%20XSS/readme.md +https://github.com/Bemcliu/cve-reports/blob/main/cve-06-%E8%9B%8B%E7%B3%95%E5%95%86%E5%9F%8EJPA%E7%89%88-CSRF/readme.md +https://github.com/Bemcliu/cve-reports/blob/main/cve-07-wx-shop-Stored%20XSS/readme.md +https://github.com/Bemcliu/cve/blob/main/README.md +https://github.com/Bemcliu/cve/blob/main/README.md#poc https://github.com/BigNerd95/Chimay-Red https://github.com/BigNerd95/WinboxExploit +https://github.com/Bin4ry/UniPwn https://github.com/BinBall/cve/blob/master/README.md https://github.com/BishopFox/sliver/security/advisories/GHSA-fh4v-v779-4g2w https://github.com/BlackCatDevelopment/BlackCatCMS/issues/373 +https://github.com/BloodHoundAD/BloodHound/issues/338 https://github.com/Bo0oM/CVE-2017-5124 https://github.com/Brauchitsch-Wang/cve/blob/main/cve.md https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25366.md @@ -116132,14 +117448,18 @@ https://github.com/BurakSevben/CVEs/blob/main/News%20Portal/News%20Portal%20-%20 https://github.com/BurakSevben/CVEs/blob/main/News%20Portal/News%20Portal%20-%20SQL%20Injection%20-%204.md https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Authentication%20Bypass.md https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Cross-Site-Scripting.md +https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%203.md https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%204.md https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%205.md https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%201.md https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%202.md +https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20Authentication%20Bypass.md +https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20SQL%20Injection%20-%203.md https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20SQL%20Injection%20-%204.md https://github.com/ByKevin1/CVE/blob/main/sql1.md https://github.com/ByKevin1/CVE/blob/main/xss1.md https://github.com/C0der1iu/Nexusphppoc/blob/master/xss2.txt +https://github.com/C9Y57/TOTOLINK_setTracerouteCfg/blob/main/setTracerouteCfg.md https://github.com/CCCCCrash/POCs/tree/master/Bin/Tools-libansilove-1.0.0 https://github.com/CCCCCrash/POCs/tree/master/Web/gitnote https://github.com/CE-PhoenixCart/PhoenixCart/security/advisories/GHSA-62qj-pvwm-h8cv @@ -116154,9 +117474,14 @@ https://github.com/CSentinel/CVE/issues/1 https://github.com/CSentinel/CVE/issues/2 https://github.com/CSentinel/CVE/issues/3 https://github.com/CTurt/shogihax +https://github.com/CVE-Hunter-Leo/CVE/issues/1 +https://github.com/CVE-Hunter-Leo/CVE/issues/2 https://github.com/CVE-Hunter-Leo/CVE/issues/7 https://github.com/CVE-Hunter-Leo/CVE/issues/8 https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/%20CVE-2025-9139.md +https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/Stored%20XSS%20endpoint%20pointHierarchySLTS%20parameter%20title.md#poc +https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8789.md +https://github.com/CVE-Hunters/CVE/blob/main/i-educar/Reflected%20Cross-Site%20Scripting%20(XSS)%20in%20educar_matricula_lst.php%20via%20ref_cod_aluno%20Parameter.md https://github.com/Cacti/cacti/issues/1057 https://github.com/Cacti/cacti/issues/1071 https://github.com/Cacti/cacti/security/advisories/GHSA-37x7-mfjv-mm7m @@ -116168,21 +117493,42 @@ https://github.com/Camllia2024/mycve/issues/1 https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41635%20%7C%20RealGimm%20-%20XML%20External%20Entity%20Injection.md https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41636%20%7C%20RealGimm%20-%20SQL%20Injection%281%29.md https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41637%20%7C%20RealGimm%20-%20Stored%20Cross-site%20Scripting.md +https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41640%20%7C%20RealGimm%20-%20Information%20disclosure.md https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20Information%20disclosure.md https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20SQL%20Injection%281%29.md +https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20Stored%20Cross-site%20Scripting.md https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20XML%20External%20Entity%20Injection.md https://github.com/Carol7S/cve/blob/main/rce.md +https://github.com/Cashbeebee/CVE/issues/1 +https://github.com/Catcheryp/CVE/issues/2 +https://github.com/Catcheryp/CVE/issues/3 +https://github.com/Catcheryp/CVE/issues/4 +https://github.com/Cedric1314/CVE-2022-44870/blob/main/README.md https://github.com/Charlotte008/cve/issues/3 https://github.com/Checkmarx/Vulnerabilities-Proofs-of-Concept/tree/main/2014/CVE-2014-125127 https://github.com/Checkmarx/Vulnerabilities-Proofs-of-Concept/tree/main/2014/CVE-2014-125128 https://github.com/Checkmarx/Vulnerabilities-Proofs-of-Concept/tree/main/2019/CVE-2019-25225 +https://github.com/Checkmarx/Vulnerabilities-Proofs-of-Concept/tree/main/2022/CVE-2022-41404 https://github.com/Cherry-toto/jizhicms/issues/85 +https://github.com/Chinesexilinyu/Netis-WF2780-cgitest.cgi-Vulnerability/tree/main/1 https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Null-Pointer-Dereference-Vulnerability/tree/main/1 +https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/1 +https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/10 +https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/2 +https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/3 +https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/4 +https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/5 +https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/6 +https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/7 +https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/8 +https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/9 https://github.com/ChurchCRM/CRM/issues/6450 +https://github.com/Ciber-Mike/BigTree_CMS-Stored_XSS-Developer_Settings/blob/main/README.md https://github.com/CleverStupidDog/yf-exam/issues/2 https://github.com/Clinical-Genomics/scout/security/advisories/GHSA-24xv-q29v-3h6r https://github.com/Clinical-Genomics/scout/security/advisories/GHSA-3x45-2m34-x95v https://github.com/ClipperCMS/ClipperCMS/issues/494 +https://github.com/CloudWise-OpenSource/FlyFish/issues/191 https://github.com/Codiad/Codiad/issues/1122 https://github.com/Codiad/Codiad/issues/584 https://github.com/Consensys/gnark/security/advisories/GHSA-9xcg-3q8v-7fq6 @@ -116213,6 +117559,7 @@ https://github.com/CveSecLook/cve/issues/30 https://github.com/CycloneDX/cyclonedx-javascript-library/commit/5e5e1e0b9422f47d2de81c7c4064b803a01e7203 https://github.com/CycloneDX/cyclonedx-javascript-library/pull/1063 https://github.com/CycloneDX/cyclonedx-javascript-library/security/advisories/GHSA-38gf-rh2w-gmj7 +https://github.com/CyclopsMC/IntegratedScripting/security/advisories/GHSA-2v5x-4823-hq77 https://github.com/CyferShepard/Jellystat/security/advisories/GHSA-6x46-6w9f-ffv6 https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/0x00222018 https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/0x00222040 @@ -116262,6 +117609,8 @@ https://github.com/D4mps/CVE/issues/1 https://github.com/D4rkP0w4r/AeroCMS-Add_Posts-Stored_XSS-Poc https://github.com/D4rkP0w4r/AeroCMS-Comment-Stored_XSS-Poc https://github.com/D4rkP0w4r/AeroCMS-Unrestricted-File-Upload-POC +https://github.com/D4rkP0w4r/CVEs/blob/main/Ecommerce%20Website%20Upload%20%2B%20RCE/POC.md +https://github.com/D4rkP0w4r/CVEs/blob/main/Online-Banking_SQLI/POC.md https://github.com/D4rkP0w4r/CVEs/blob/main/Simple%20House%20Rental%20System%20Upload%20%2B%20RCE/POC.md https://github.com/D4rkP0w4r/CVEs/blob/main/Zoo%20Management%20System%20SQLI/POC.md https://github.com/D4rkP0w4r/CVEs/blob/main/Zoo%20Management%20System%20Upload%20%2B%20RCE/POC.md @@ -116275,15 +117624,28 @@ https://github.com/DCMTK/dcmtk/commit/7ad81d69b https://github.com/DIPlib/diplib/issues/80 https://github.com/DIYgod/RSSHub/security/advisories/GHSA-3p3p-cgj7-vgw3 https://github.com/DIYgod/RSSHub/security/advisories/GHSA-9mqc-fm24-h8cw +https://github.com/DMCERTCE/PoC_Tiny_Overflow +https://github.com/DRAGOWN/CVE-2025-26263 +https://github.com/DRAGOWN/CVE-2025-26264 https://github.com/Daniel-itsec/AdvancedSystemCare +https://github.com/Darlingzero2/cve/issues/3 +https://github.com/Dav1d-safe/cve/issues/1 +https://github.com/Dav1d-safe/cve/issues/2 https://github.com/Dav1d-safe/cve/issues/3 https://github.com/DaveGamble/cJSON/issues/30 +https://github.com/DeepMountains/Mirage/blob/main/CVE19-1.md https://github.com/DeepMountains/Mirage/blob/main/CVE19-2.md https://github.com/DeepMountains/zzz/blob/main/CVE5-1.md https://github.com/DeepMountains/zzz/blob/main/CVE5-2.md https://github.com/DeepMountains/zzz/blob/main/CVE5-3.md +https://github.com/DeepMountains/zzz/blob/main/CVE6-1.md https://github.com/DeepMountains/zzz/blob/main/CVE6-2.md +https://github.com/Dingzenggonpo/cve/issues/2 +https://github.com/Dingzenggonpo/cve/issues/3 https://github.com/Dmitriy-area51/Exploit/tree/master/CVE-2020-24038 +https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-6hp9-jv2f-88wr +https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-6q83-vfmq-wf72 +https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-gj9v-qhc3-gcfx https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-h239-vv39-v3vx https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-jw79-2xvp-76p8 https://github.com/Dolibarr/dolibarr/issues/4341 @@ -116317,6 +117679,8 @@ https://github.com/DumbWareio/DumbDrop/security/advisories/GHSA-rx8m-jqm7-vcgp https://github.com/EVerest/everest-core/security/advisories/GHSA-8g9q-7qr9-vc96 https://github.com/EgeBalci/LG-Smart-IP-Device-Backup-Download https://github.com/Elias-Black/Landing-CMS/issues/8 +https://github.com/EmilGallajov/zero-day/blob/main/codeastro_real_estate_ms_authenticated_rce.md +https://github.com/EmilGallajov/zero-day/blob/main/content_management_system_sqli.md https://github.com/EmreOvunc/CyBroHttpServer-v1.0.3-Directory-Traversal https://github.com/EmreOvunc/CyBroHttpServer-v1.0.3-Reflected-XSS https://github.com/EmreOvunc/Medintux-V2.16.000-Reflected-XSS-Vulnerability @@ -116328,6 +117692,7 @@ https://github.com/Eteblue/CVE-2024-37742 https://github.com/Ettercap/ettercap/issues/782 https://github.com/EvnYeung/cve/issues/1 https://github.com/Exiv2/exiv2/commit/a82098f4f90cd86297131b5663c3dec6a34470e8 +https://github.com/Exiv2/exiv2/commit/e884a0955359107f4031c74a07406df7e99929a5 https://github.com/Exiv2/exiv2/issues/1011 https://github.com/Exiv2/exiv2/issues/1019 https://github.com/Exiv2/exiv2/issues/187 @@ -116337,6 +117702,7 @@ https://github.com/Exiv2/exiv2/issues/246 https://github.com/Exiv2/exiv2/issues/247 https://github.com/Exiv2/exiv2/issues/262 https://github.com/Exiv2/exiv2/issues/263 +https://github.com/Exiv2/exiv2/issues/3168 https://github.com/Exiv2/exiv2/issues/3333 https://github.com/Exiv2/exiv2/issues/378 https://github.com/Exiv2/exiv2/issues/400 @@ -116351,6 +117717,14 @@ https://github.com/Exiv2/exiv2/issues/980 https://github.com/Exiv2/exiv2/pull/1657 https://github.com/Exiv2/exiv2/pull/518 https://github.com/Exploo0Osion/netcore_command_injection_3 +https://github.com/Exrick/xboot/issues/69 +https://github.com/Exrick/xboot/issues/69#issue-3252177305 +https://github.com/Exrick/xboot/issues/70 +https://github.com/Exrick/xboot/issues/70#issue-3252425972 +https://github.com/Exrick/xboot/issues/71 +https://github.com/Exrick/xboot/issues/71#issue-3252446955 +https://github.com/Exrick/xboot/issues/72 +https://github.com/Exrick/xboot/issues/72#issue-3252465914 https://github.com/Eyodav/CVE-2025-34157 https://github.com/Eyodav/CVE-2025-34159 https://github.com/FCncdn/MybatisPlusTenantPluginSQLInjection-POC/blob/master/Readme.en.md @@ -116361,12 +117735,16 @@ https://github.com/FGasper/p5-Crypt-Perl/issues/14 https://github.com/FIGHTINGTMQ/CVE/issues/1 https://github.com/FIGHTINGTMQ/CVE/issues/2 https://github.com/FLIF-hub/FLIF/issues/541 +https://github.com/FOGProject/fogproject/security/advisories/GHSA-p3f9-4jj4-fm2g https://github.com/FasterXML/jackson-core/security/advisories/GHSA-wf8f-6423-gfxg +https://github.com/FeMarb/CVEs/blob/6eeefb2749bb6165557ed4664a0680456131e4de/I-diario/Cross-Site%20Scripting%20(XSS)%20Storage%20in%20endpoint%20_dicionario-de-termos-bncc%20parameter%20Planos%20de%20ensino%20input%20field.md https://github.com/FeMarb/CVEs/blob/6eeefb2749bb6165557ed4664a0680456131e4de/i-educar/Cross-Site%20Scripting%20(XSS)%20Storage%20in%20endpoint%20_educar_instituicao_cad.php%20parameter%20neighborhood%20name.md https://github.com/Fewword/Poc/blob/main/microweber/mwb-poc1.md https://github.com/Fewword/Poc/blob/main/smf/smf-poc3.md https://github.com/Fewword/Poc/blob/main/smf/smf-poc4.md +https://github.com/Fewword/Poc/blob/main/smf/smf-poc5.md https://github.com/Fewword/Poc/blob/main/smf/smf-poc6.md +https://github.com/Find33-3/cve/issues/1 https://github.com/Find33-3/cve/issues/2 https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py https://github.com/FiyoCMS/FiyoCMS/issues/10 @@ -116374,18 +117752,24 @@ https://github.com/FiyoCMS/FiyoCMS/issues/11 https://github.com/FiyoCMS/FiyoCMS/issues/7 https://github.com/FiyoCMS/FiyoCMS/issues/9 https://github.com/Fizz-L/CVE1/blob/main/DCME-520%20Remote%20command%20execution.md +https://github.com/Fizz-L/CVE1/blob/main/DI-8100Command%20execution2.md https://github.com/Fluorohydride/ygopro/issues/2314 https://github.com/FoLaJJ/cve/blob/main/sqlcve.md https://github.com/FoLaJJ/cve/blob/main/xsscve.md https://github.com/FractalFir/memory_pages/issues/1 https://github.com/FreePBX/security-reporting/security/advisories/GHSA-x9wc-qjrc-j7ww +https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-8f79-3q3w-43c4 https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-8vvv-jxg6-8578 +https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-w3m8-wcf4-h8vm https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-wgrq-mcwc-8f8v https://github.com/FreySolarEye/CVE/blob/master/Guild%20Wars%202%20-%20Local%20Privilege%20Escalation https://github.com/FreySolarEye/CVE/blob/master/Mara%20CMS%207.5%20-%20Cross%20Site%20Scripting https://github.com/Frichetten/CVE-2019-5736-PoC https://github.com/Frichetten/CVE-2020-11108-PoC https://github.com/FrontAccountingERP/FA/issues/38 +https://github.com/Frozenka/CVE-2025-26318 +https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/104 +https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/113 https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/113_1 https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/113_2 https://github.com/Fysac/CVE-2019-20326 @@ -116393,16 +117777,19 @@ https://github.com/G37SYS73M/CVE-2023-27742 https://github.com/G3XAR/Vulnerability-Research/tree/main/CVE-2025-55944 https://github.com/G3XAR/Vulnerability-Research/tree/main/Slink%20%28up%20to%201.6.3%29/PoC https://github.com/GCatt-AS/CVE-2025-47256 +https://github.com/GENIVI/dlt-daemon/issues/274 https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93%84POC%20Stored%20XSS%202.md https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93%84POC%20Stored%20XSS%202.md#-exploitation-steps https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93%84PoC%20-%20Stored%20XSS%203.md https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93%84PoC%20-%20Stored%20XSS%203.md#-exploitation-steps +https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93%84PoC%20-Stored%20XSS%204.md https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93%84PoC%20-Stored%20XSS%204.md#-exploitation-steps https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%95%B5%EF%B8%8F%E2%80%8D%E2%99%82%EF%B8%8F%20PoC%20%E2%80%93%20Stored%20XSS%205.md https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%95%B5%EF%B8%8F%E2%80%8D%E2%99%82%EF%B8%8F%20PoC%20%E2%80%93%20Stored%20XSS%205.md#-exploitation-steps https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%95%B5%EF%B8%8F%E2%80%8D%E2%99%82%EF%B8%8F%20PoC%20-%20Stored%20XSS%201.md https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%95%B5%EF%B8%8F%E2%80%8D%E2%99%82%EF%B8%8F%20PoC%20-%20Stored%20XSS%201.md#-exploitation-steps https://github.com/Galapag0s/Trendnet_TW100-S4W1CA/blob/main/writeup_XSS.txt +https://github.com/GarminYoung/myCVE/issues/10 https://github.com/GeSHi/geshi-1.0/issues/159 https://github.com/GeSHi/geshi-1.0/issues/159#issue-2880408694 https://github.com/Geal/trailer/issues/2 @@ -116411,6 +117798,8 @@ https://github.com/Gelcon/PoC-of-Hodoku-V2.3.0-RCE https://github.com/GetSimpleCMS-CE/GetSimpleCMS-CE/security/advisories/GHSA-g435-p72m-p582 https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1295 https://github.com/Geta/NestedObjectAssign/pull/11 +https://github.com/Gi0rgi0R/xss_frontend_settings_blackcat_cms_1.4.1 +https://github.com/Gi0rgi0R/xss_installation_blackcat_cms_1.4.1 https://github.com/GilaCMS/gila/issues/57 https://github.com/Gnoxter/mountain_goat https://github.com/Gr-1m/cms/blob/main/2.md @@ -116425,9 +117814,21 @@ https://github.com/HAO-RAY/HCR-CVE/issues/5 https://github.com/HAO-RAY/HCR-CVE/issues/6 https://github.com/HAO-RAY/HCR-CVE/issues/7 https://github.com/HDFGroup/hdf5/issues/5370 +https://github.com/HDFGroup/hdf5/issues/5376 https://github.com/HDFGroup/hdf5/issues/5380 https://github.com/HDFGroup/hdf5/issues/5381 +https://github.com/HDFGroup/hdf5/issues/5383 https://github.com/HDFGroup/hdf5/issues/5384 +https://github.com/HDFGroup/hdf5/issues/5549 +https://github.com/HDFGroup/hdf5/issues/5571 +https://github.com/HDFGroup/hdf5/issues/5572 +https://github.com/HDFGroup/hdf5/issues/5573 +https://github.com/HDFGroup/hdf5/issues/5574 +https://github.com/HDFGroup/hdf5/issues/5575 +https://github.com/HDFGroup/hdf5/issues/5576 +https://github.com/HDFGroup/hdf5/issues/5579 +https://github.com/HDFGroup/hdf5/issues/5580 +https://github.com/HDFGroup/hdf5/issues/5581 https://github.com/HF101010/myCVE/issues/1 https://github.com/HF9/yxcms-code-audit/blob/master/Any%20PHP%20Code%20Execution https://github.com/Ha0Team/crash-of-sqlite3/blob/master/poc.md @@ -116438,6 +117839,7 @@ https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-10269 https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-9560 https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2017-15045 https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2017-6831 +https://github.com/HackAllSec/CVEs/tree/main/Jan%20Arbitrary%20File%20Upload%20vulnerability https://github.com/Hacker0xone/CVE/issues/1 https://github.com/Hacker0xone/CVE/issues/10 https://github.com/Hacker0xone/CVE/issues/11 @@ -116455,20 +117857,26 @@ https://github.com/Hckwzh/cms/blob/main/13.md https://github.com/Hckwzh/cms/blob/main/14.md https://github.com/Hckwzh/cms/blob/main/20.md https://github.com/Hckwzh/cms/blob/main/23.md +https://github.com/Hckwzh/cms/blob/main/24.md https://github.com/Hckwzh/cms/blob/main/25.md +https://github.com/Hebing123/cve/issues/4 +https://github.com/Hebing123/cve/issues/42 https://github.com/Hebing123/cve/issues/45 https://github.com/Hebing123/cve/issues/46 https://github.com/Hebing123/cve/issues/47 https://github.com/Hebing123/cve/issues/85 https://github.com/Hebing123/cve/issues/86 +https://github.com/Hefei-Coffee/cve/blob/main/csrf.md https://github.com/Hefei-Coffee/cve/blob/main/sql.md https://github.com/Hefei-Coffee/cve/blob/main/sql2.md https://github.com/Hefei-Coffee/cve/blob/main/upload.md +https://github.com/Hefei-Coffee/cve/issues/10 https://github.com/Hefei-Coffee/cve/issues/12 https://github.com/Hefei-Coffee/cve/issues/14 https://github.com/Hefei-Coffee/cve/issues/15 https://github.com/Hefei-Coffee/cve/issues/16 https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-r1-cp_unfilter-cute_png-1019c11/poc/sample6.png +https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-r1-cp_unfilter-cute_png-1019c11/vulDescription.assets/image-20240530183857985.png https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-w1-png_quantize-cli-220c32 https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-w1-png_quantize-cli-220c32/poc https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-w1-png_quantize-cli-220c32/poc/sample18.png @@ -116480,21 +117888,29 @@ https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/stkof-w133-cp_dynam https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/stkof-w133-cp_dynamic-cute_png-603/vulDescription.assets/image-20240530223831738.png https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/stkof-w133-cp_dynamic-cute_png-603/vulDescription.assets/image-20240530223921086.png https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/stkof-w133-cp_dynamic-cute_png-603/vulDescription.md +https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_FixMetadata/dos_FixMetadata.md +https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_mmExhausted/dos_mmExhausted.assets/image-20240505161831080.png +https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_mmExhausted/dos_mmExhausted.md https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_mmExhausted/poc/I7K9QM~F https://github.com/Helson-S/FuzzyTesting/tree/master/hicolor/heapof-r1-cp_unfilter-cute_png-1019c11 https://github.com/Helson-S/FuzzyTesting/tree/master/hicolor/heapof-r1-cp_unfilter-cute_png-1019c11/poc +https://github.com/Helson-S/FuzzyTesting/tree/master/ncmdump/dos_FixMetadata/poc https://github.com/Helson-S/FuzzyTesting/tree/master/ncmdump/dos_mmExhausted https://github.com/Helson-S/FuzzyTesting/tree/master/ncmdump/dos_mmExhausted/poc https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2024-51162 https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2024-51163 https://github.com/HerrLeStrate/CVE-2022-44276-PoC +https://github.com/Hieromon/AutoConnect/issues/632 https://github.com/HjsCS/CVE/issues/2 https://github.com/HjsCS/CVE/issues/3 https://github.com/HjsCS/CVE/issues/4 https://github.com/HolaAsuka/CVE/issues/1 https://github.com/HolyTruth/DIR_878-1.30B08/blob/main/1.md +https://github.com/HolyTruth/DIR_878-1.30B08/blob/main/2.md +https://github.com/HolyTruth/DIR_878-1.30B08/blob/main/4.md https://github.com/HumanSignal/label-studio/security/advisories/GHSA-8jhr-wpcm-hh4h https://github.com/Hwwg/cve/issues/1 +https://github.com/I-Schnee-I/cev/blob/main/D-LINK-DAR-8000-10_rce_importhtml.md https://github.com/IAIK/wolfSSL-DoS https://github.com/INTER-Mediator/INTER-Mediator/issues/772 https://github.com/Ickarah/CVE-2019-25137-Version-Research @@ -116593,16 +118009,22 @@ https://github.com/ImageMagick/ImageMagick/issues/921 https://github.com/ImageMagick/ImageMagick/issues/927 https://github.com/ImageMagick/ImageMagick/issues/928 https://github.com/ImageMagick/ImageMagick/issues/941 +https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-23hg-53q6-hqfg https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-6hgw-6x87-578x https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-9ccg-6pjw-x645 https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-cjc8-g9w8-chfw https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-fh55-q5pj-pxgw +https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-mxvv-97wh-cfmm +https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-v393-38qx-v8fp +https://github.com/ImageMagick/Website/blob/main/ChangeLog.md#711-44---2025-02-22 https://github.com/Intermesh/groupoffice/security/advisories/GHSA-45jj-r48j-75pp https://github.com/Intermesh/groupoffice/security/advisories/GHSA-c49j-qvp9-vgg6 https://github.com/Intermesh/groupoffice/security/advisories/GHSA-j35g-q5mc-jwgp +https://github.com/Intermesh/groupoffice/security/advisories/GHSA-phhq-3h8f-qxpx https://github.com/Intermesh/groupoffice/security/advisories/GHSA-xv2x-v374-92gv https://github.com/Iolop/Poc/tree/master/Router/Tenda https://github.com/IvanCql/vulnerability/blob/master/An%20NULL%20pointer%20dereference%28DoS%29%20Vulnerability%20was%20found%20in%20function%20swri_audio_convert%20of%20ffmpeg%20libswresample.md +https://github.com/J0ey17/Silverpeas-Username-Enumeration-PoC https://github.com/J3rryBl4nks/CUPSEasyExploits https://github.com/J3rryBl4nks/GenixCMS/blob/master/CreateAdminBAC.md https://github.com/J3rryBl4nks/SchoolERPCSRF @@ -116707,6 +118129,8 @@ https://github.com/Jacob-z691/CVE/issues/2 https://github.com/Jacob-z691/CVE/issues/3 https://github.com/Jas0nwhy/vulnerability/blob/master/Seacmsxss.md https://github.com/JasonLovesDoggo/abacus/security/advisories/GHSA-vh64-54px-qgf8 +https://github.com/Jazeye/CVE/blob/main/CVE-2025-57117/README.md +https://github.com/Jazeye/CVE/blob/main/CVE-2025-57119/README.md https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2020-10263.md https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2020-8994.md https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33820.md @@ -116738,20 +118162,29 @@ https://github.com/JunGu-W/cve/issues/8 https://github.com/JunGu-W/cve/issues/9 https://github.com/Juniper/libslax/issues/50 https://github.com/Juniper/libslax/issues/51 +https://github.com/Juniper/libslax/issues/52 https://github.com/Juniper/libslax/issues/53 https://github.com/K1nakoo/cve/blob/main/21/report.md https://github.com/K1nakoo/cve/blob/main/26/report.md +https://github.com/K1nakoo/tmp01/blob/main/tmp01.md +https://github.com/K1nakoo/tmp02/blob/main/tmp02.md +https://github.com/KMov-g/androidapps/blob/main/bsc.devy.peru_cocktails.md https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md#steps-to-reproduce https://github.com/KMov-g/androidapps/blob/main/com.ape_edication.md#steps-to-reproduce +https://github.com/KMov-g/androidapps/blob/main/com.boquanhash.dotwallet.md https://github.com/KMov-g/androidapps/blob/main/com.buzzfeed.android.md https://github.com/KMov-g/androidapps/blob/main/com.buzzfeed.android.md#steps-to-reproduce +https://github.com/KMov-g/androidapps/blob/main/com.caixin.news.md +https://github.com/KMov-g/androidapps/blob/main/com.canarabank.mobility.md https://github.com/KMov-g/androidapps/blob/main/com.cic_prod.bad.md https://github.com/KMov-g/androidapps/blob/main/com.cic_prod.bad.md#steps-to-reproduce https://github.com/KMov-g/androidapps/blob/main/com.duige.hzw.multilingual.md#steps-to-reproduce +https://github.com/KMov-g/androidapps/blob/main/com.dw.android.mukbee.md https://github.com/KMov-g/androidapps/blob/main/com.dw.android.mukbee.md#steps-to-reproduce https://github.com/KMov-g/androidapps/blob/main/com.elseplus.filerecovery.md https://github.com/KMov-g/androidapps/blob/main/com.elseplus.filerecovery.md#steps-to-reproduce +https://github.com/KMov-g/androidapps/blob/main/com.fruitcrush.fun.md https://github.com/KMov-g/androidapps/blob/main/com.hatsune.eagleee.md https://github.com/KMov-g/androidapps/blob/main/com.hatsune.eagleee.md#steps-to-reproduce https://github.com/KMov-g/androidapps/blob/main/com.intsig.camscanner.md @@ -116765,8 +118198,13 @@ https://github.com/KMov-g/androidapps/blob/main/com.ncsoft.universeapp.md#steps- https://github.com/KMov-g/androidapps/blob/main/com.ooma.office2.md https://github.com/KMov-g/androidapps/blob/main/com.passport.cash.md https://github.com/KMov-g/androidapps/blob/main/com.passport.cash.md#steps-to-reproduce +https://github.com/KMov-g/androidapps/blob/main/com.ricepo.app.md +https://github.com/KMov-g/androidapps/blob/main/com.ricepo.app.md#steps-to-reproduce +https://github.com/KMov-g/androidapps/blob/main/com.sdmagic.number.md https://github.com/KMov-g/androidapps/blob/main/com.seismic.doccenter.md https://github.com/KMov-g/androidapps/blob/main/com.seismic.doccenter.md#steps-to-reproduce +https://github.com/KMov-g/androidapps/blob/main/com.thinkyeah.galleryvault.md +https://github.com/KMov-g/androidapps/blob/main/com.thinkyeah.galleryvault.md#steps-to-reproduce https://github.com/KMov-g/androidapps/blob/main/com.tuyangkeji.changevoice.md https://github.com/KMov-g/androidapps/blob/main/com.tuyangkeji.changevoice.md#steps-to-reproduce https://github.com/KMov-g/androidapps/blob/main/de.hafas.android.rejseplanen.md @@ -116776,23 +118214,68 @@ https://github.com/KMov-g/androidapps/blob/main/org.dayup.stocks.md https://github.com/KMov-g/androidapps/blob/main/org.dayup.stocks.md#steps-to-reproduce https://github.com/KPN-CISO/CVE-2019-9745/blob/master/README.md https://github.com/Kenun99/CVE-batdappboomx +https://github.com/Kerjo01/day1/issues/1 https://github.com/KhronosGroup/glslang/issues/3903 https://github.com/KhronosGroup/glslang/issues/3903#issue-2927492534 +https://github.com/Kidjing/cve/blob/main/sql1.md https://github.com/Kinsomnia/cve/blob/main/upload/upload.md https://github.com/Kiss-sh0t/e107_v2.1.9_XSS_poc https://github.com/Kotti/Kotti/issues/551 https://github.com/Kozea/CairoSVG/security/advisories/GHSA-rwmf-w63j-p7gv +https://github.com/Kristin5634487/cve/issues/1 +https://github.com/Kristin5634487/cve/issues/2 https://github.com/Kyhvedn/CVE_Description/blob/master/Cobub_Razor_0.8.0_SQL_injection_description.md https://github.com/L1OudFd8cl09/CVE/blob/main/20_09_2024_a.md https://github.com/L1OudFd8cl09/CVE/blob/main/25_07_2024_b.md +https://github.com/LI1551/vul/issues/1 https://github.com/LLK/scratch-vm/pull/2476 +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-27g8-5q48-xmw6 +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-2mhx-5998-46hx +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-39r5-c63f-99mx +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-3qhx-gfqj-vm2j +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-4fqm-ww3v-6mwv +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-52p5-5fmw-9hrf +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-5qw5-q55h-6qg7 +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-65h2-7484-2pww +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-6gv7-4j8g-cvgp +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-6p7c-9hcx-jpqj +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-6wjm-c879-pjf6 +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-77hc-c8f4-p3hc +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-8rm5-3jvx-hcxv +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-9cwj-p4x6-pp88 +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-9rp6-4mqp-g4p8 +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-f654-c5r5-jx77 +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-ffcg-qr75-98mg +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-fxwc-r5m4-hj62 +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-g3w6-m6w8-p6r2 +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-g6wj-3vm2-c59m +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-h7jx-ggv8-v2rh https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-j3p8-xww6-wvqh +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-j856-wh9m-9vpm +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-jp48-94wm-3gmc +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-jpph-g9p7-9jrm +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mm3p-7573-4x4j +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-p5wx-pv8j-f96h https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-pg73-w9vx-8mgp +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-q273-4vcj-qqp4 https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-qjc6-5qv6-fr8m +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-qx7f-q867-cgx2 +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-rxjr-cw9q-cwwg https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-v248-mr5r-87pf +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-x28g-6228-99p9 +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-x3wr-75qx-55cw https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xj79-w799-qjcp +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xw6w-x28r-2p5c +https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xxqg-p22h-3f32 +https://github.com/LagonGit/ReportCVE/issues/11 +https://github.com/LagonGit/ReportCVE/issues/13 +https://github.com/LaiwanHundun/CVE/blob/main/cve1 +https://github.com/Landw-hub/CVE-2025-46206 +https://github.com/Landw-hub/CVE-2025-50420 +https://github.com/Landw-hub/CVE-2025-50422 https://github.com/LaneyYu/cve/issues/1 https://github.com/LaneyYu/cve/issues/3 +https://github.com/Lanxiy7th/lx_CVE_report-/issues/13 https://github.com/Lanxiy7th/lx_CVE_report-/issues/16 https://github.com/Lanxiy7th/lx_CVE_report-/issues/17 https://github.com/Lanxiy7th/lx_CVE_report-/issues/19 @@ -116802,7 +118285,19 @@ https://github.com/LazyAGI/LazyLLM/issues/764 https://github.com/Lee0568/pocccc/blob/main/poc.md https://github.com/Lee0568/pocccc/blob/main/poc.md#vulnerability-analysis https://github.com/LemonOSProject/LemonOS/issues/60 +https://github.com/Lena-lyy/cve/blob/main/4.md +https://github.com/Lena-lyy/cve/blob/main/4.md#poc +https://github.com/Lena-lyy/cve/blob/main/5.md +https://github.com/Lena-lyy/cve/blob/main/5.md#poc +https://github.com/Lena-lyy/cve/blob/main/6.md +https://github.com/Lena-lyy/cve/blob/main/6.md#poc +https://github.com/Lena-lyy/cve/blob/main/688/7.md#poc +https://github.com/Lena-lyy/cve/blob/main/688/8.md +https://github.com/Lena-lyy/cve/blob/main/688/8.md#poc +https://github.com/Lena-lyy/cve/blob/main/688/9.md#poc +https://github.com/LeoWSY-hashblue/cve2/blob/main/cve.md https://github.com/LetUsFsck/PoC-Exploit-Mirror/tree/master/CVE-2017-16944 +https://github.com/LibRaw/LibRaw/issues/301 https://github.com/LibRaw/LibRaw/issues/330 https://github.com/LibRaw/LibRaw/issues/334 https://github.com/LibRaw/LibRaw/issues/335 @@ -116818,6 +118313,8 @@ https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643383 https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643439 https://github.com/LibreDWG/libredwg/issues/178 https://github.com/LibreDWG/libredwg/issues/251 +https://github.com/LibreDWG/libredwg/issues/252 +https://github.com/LibreDWG/libredwg/issues/255 https://github.com/LibreDWG/libredwg/issues/256 https://github.com/LibreDWG/libredwg/issues/258 https://github.com/LibreDWG/libredwg/issues/261 @@ -116836,15 +118333,22 @@ https://github.com/LibreDWG/libredwg/issues/494 https://github.com/LibreDWG/libredwg/issues/615 https://github.com/Ling-Yizhou/zendframework3-/blob/main/zend%20framework3%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%20rce.md https://github.com/LiodAir/images/blob/master/csrf.md +https://github.com/LitBot123/mycve/issues/2 +https://github.com/LitBot123/mycve/issues/3 https://github.com/LitBot123/mycve/issues/6 https://github.com/LitBot123/mycve/issues/7 https://github.com/LitBot123/mycve/issues/8 https://github.com/LiveHelperChat/livehelperchat/issues/2054 https://github.com/LoRexxar/CVE_Request/tree/master/wordpress%20plugin%20updraftplus%20vulnerablity#authenticated--upload-file-and-php-code-execution https://github.com/LoRexxar/CVE_Request/tree/master/wordpress%20plugin%20updraftplus%20vulnerablity#authenticated-ssrf +https://github.com/LuLuji04/POC-Boomv1.2 https://github.com/LuaJIT/LuaJIT/issues/603 https://github.com/LuaJIT/LuaJIT/pull/526 https://github.com/LucidUnicorn/CVE-2020-10560-Key-Recovery +https://github.com/LukeSec/CVE-2025-50675-GPMAW-Permissions/tree/main +https://github.com/Lwlej/cve/issues/1 +https://github.com/Lwlej/cve/issues/2 +https://github.com/LycheeOrg/Lychee/security/advisories/GHSA-6rj9-gm78-vhf9 https://github.com/Lynn1236-cell/cve1/blob/main/sql3.md https://github.com/M0NsTeRRR/CVE-2020-24033 https://github.com/M0NsTeRRR/S3900-24T4S-CSRF-vulnerability @@ -116852,15 +118356,23 @@ https://github.com/M4DM0e/m4dm0e.github.io/blob/gh-pages/_posts/2020-12-07-ipeak https://github.com/M4DM0e/m4dm0e.github.io/blob/gh-pages/_posts/2021-01-04-mikrotik-xss-reflected.md https://github.com/M4st3rYi/IoTVulPocs/blob/main/Tenda/AC1206/fromAdvSetMacMtuWan.md https://github.com/MRdoulestar/CodeAnalyse/issues/2 +https://github.com/MaiqueSilva/VulnDB/blob/main/README02.md +https://github.com/MaiqueSilva/VulnDB/blob/main/readme03.md +https://github.com/MaiqueSilva/VulnDB/blob/main/readme06.md +https://github.com/MaiqueSilva/VulnDB/blob/main/readme07.md https://github.com/MalFuzzer/Vulnerability-Research/blob/master/TL-WR1043ND%20V2%20-%20TP-LINK/TL-WR1043ND_PoC.pdf https://github.com/ManhNDd/CVE-2019-19203 https://github.com/ManhNDd/CVE-2019-19204 https://github.com/MarkLee131/PoCs/blob/main/CVE-2024-34987.md https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2017-15808.md https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2019-16693.md +https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2020-15718.md +https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2020-29607.md +https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2024-41357.md https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2024-41358.md https://github.com/MatJosephs/CVEs/tree/main/CVE-2024-51431 https://github.com/MatJosephs/CVEs/tree/main/CVE-2024-51432 +https://github.com/MatJosephs/CVEs/tree/main/CVE-2025-55618 https://github.com/Matroska-Org/foundation-source/issues/24 https://github.com/Matroska-Org/libebml/issues/74 https://github.com/Matthias-Wandel/jhead/issues/33 @@ -116871,21 +118383,31 @@ https://github.com/Mesh3l911/CVE-2021-32160 https://github.com/Mesh3l911/CVE-2021-32161 https://github.com/Mesh3l911/CVE-2021-32162 https://github.com/Mesh3l911/Disource +https://github.com/MichaelZhuang521/cve/blob/main/rce.md https://github.com/Michsta/CVE/issues/1 https://github.com/Michsta/CVE/issues/2 https://github.com/Michsta/CVE/issues/3 https://github.com/MicroPyramid/Django-CRM/issues/68 https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2342 +https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2396 https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2398 +https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2399 +https://github.com/MigoXLab/LMeterX/issues/10 +https://github.com/MigoXLab/LMeterX/issues/10#issue-3255375024 +https://github.com/MigoXLab/LMeterX/issues/10#issuecomment-3136380379 https://github.com/Miker132/CVE-/issues/2 https://github.com/Miker132/CVE-/issues/3 https://github.com/Miker132/CVE-/issues/5 https://github.com/Mindwerks/wildmidi/issues/178 +https://github.com/MiniSweetBeen/src/issues/2 +https://github.com/MiniSweetBeen/src/issues/5 https://github.com/Mint60/PHP/issues/1 https://github.com/MobSF/Mobile-Security-Framework-MobSF/pull/166 +https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-mwfg-948f-2cc5 https://github.com/Moeditor/Moeditor/issues/156 https://github.com/Mount4in/Mount4in.github.io/blob/master/poc.py https://github.com/Mr-n0b3dy/CVE-2023-42362 +https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2023-22620.txt https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2023-22897.txt https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2025-27889.txt https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2025-47813.txt @@ -116898,12 +118420,14 @@ https://github.com/NagVis/nagvis/issues/91 https://github.com/Nat-Lab/CVE-2018-5951 https://github.com/NationalSecurityAgency/emissary/security/advisories/GHSA-hw43-fcmm-3m5g https://github.com/NationalSecurityAgency/ghidra/issues/4869 +https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-mpg4-rc92-vx8v https://github.com/NaturalIntelligence/wp-thumb-post/issues/1 https://github.com/Ni9htMar3/vulnerability/blob/master/zzcms_8.2/adv2.php.md https://github.com/Ni9htMar3/vulnerability/blob/master/zzcms_8.2/install.md https://github.com/Ni9htMar3/vulnerability/blob/master/zzcms_8.2/licence_save.php.md https://github.com/Ni9htMar3/vulnerability/blob/master/zzcms_8.2/ppsave.php.md https://github.com/Nightmaremassacre/cve/issues/3 +https://github.com/Noc14/cve/issues/1 https://github.com/Notselwyn/CVE-2024-1086 https://github.com/NtRaiseHardError/Antimalware-Research/blob/master/K7%20Security/Local%20Privilege%20Escalation/v16.0.0120/README.md https://github.com/NucleusCMS/NucleusCMS/issues/84 @@ -116915,9 +118439,13 @@ https://github.com/OS4ED/openSIS-Classic/issues/192 https://github.com/OS4ED/openSIS-Classic/issues/193 https://github.com/OS4ED/openSIS-Classic/issues/248 https://github.com/Ocmenog/CVE-2025-55998 +https://github.com/OoLs5/VulDiscovery/blob/main/Symphony_CMS_XSS.pdf +https://github.com/OoLs5/VulDiscovery/blob/main/symphony_xss_vul.pdf https://github.com/OpenIdentityPlatform/OpenDJ/security/advisories/GHSA-93qr-h8pr-4593 https://github.com/OpenImageIO/oiio/issues/3840 https://github.com/OpenImageIO/oiio/issues/3947 +https://github.com/OpenListTeam/OpenList/security/advisories/GHSA-2hw3-h8qx-hqqp +https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8 https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47 https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-rq86-c7g6-r2h8 @@ -116927,6 +118455,7 @@ https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-3jm4-c6qf-jrh3 https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-79jv-5226-783f https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-87cf-j763-vvh8 https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-j8hp-f2mj-586g +https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-p3r5-x3hr-gpg5 https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-pw3x-c5vp-mfc3 https://github.com/OpenRefine/simile-butterfly/security/advisories/GHSA-3p8v-w8mr-m3x8 https://github.com/OpenSC/pam_pkcs11/security/advisories/GHSA-wvr3-c9x3-9mff @@ -116937,6 +118466,7 @@ https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_CVE-2 https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_SuiteCRM.py https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_geomatika_isigeoweb.md https://github.com/Orange-Cyberdefense/CVE-repository/tree/master +https://github.com/OsamaTaher/Java-springboot-codebase/security/advisories/GHSA-q6mm-cm37-w637 https://github.com/Overv/Open.GL/issues/56 https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_00/README.md https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_14/README.md @@ -116945,12 +118475,17 @@ https://github.com/PHPOffice/Math/security/advisories/GHSA-42hm-pq2f-3r7m https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-jw4x-v69f-hh5w https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-wgmf-q9vr-vww6 https://github.com/PX4/PX4-Autopilot/issues/17062 +https://github.com/Part-DB/Part-DB-server/security/advisories/GHSA-7rv3-rcxv-69ww https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/2024/Advocate%20office%20management%20system%20-%20edit_client.php%20sql%20injection%20vulnerability.md +https://github.com/Pick-program/CVE/issues/2 https://github.com/Piwigo/Piwigo/issues/804 https://github.com/Pjwww13447/pjwww/issues/20 https://github.com/PrecursorYork/Product-Management-System-Using-PHP-and-MySQL-Reflected-XSS-POC/blob/main/README.md https://github.com/PrecursorYork/crud-without-refresh-reload-Reflected_XSS-POC/blob/main/README.md https://github.com/ProxymanApp/Proxyman/issues/364 +https://github.com/PuneethReddyHC/online-shopping-system/issues/17 +https://github.com/PySpur-Dev/pyspur/issues/289 +https://github.com/QwikDev/qwik/security/advisories/GHSA-2rwj-7xq8-4gx4 https://github.com/RTio7/cve/issues/1 https://github.com/RainFo666/cve/issues/1 https://github.com/Ramikan/Vulnerabilities/blob/master/GoAhead%20Web%20server%20HTTP%20Header%20Injection @@ -116958,7 +118493,26 @@ https://github.com/RashidKhanPathan/CVE-2022-41445 https://github.com/RashidKhanPathan/CVE-2022-41446 https://github.com/RashidKhanPathan/CVE-2022-44830 https://github.com/RashidKhanPathan/WindowsPrivilegeEscalation/blob/main/DLL%20Hijacking/CVE-2022-44939/Research.txt +https://github.com/RaulPazemecxas/PoCVulDb +https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README11.md +https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README12.md +https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README13.md +https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README14.md +https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README15.md +https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README16.md +https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README17.md +https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README18.md +https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README19.md +https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README2.md +https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README20.md +https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README21.md +https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README3.md +https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README4.md +https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README5.md +https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README6.md +https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README7.md https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README8.md +https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README9.md https://github.com/RealLinkers/CVE-2019-17427 https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2018-5757 https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2019-16864 @@ -116968,20 +118522,26 @@ https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2019-9926 https://github.com/RiieCco/write-ups/tree/master/CVE-2019-9659 https://github.com/RioIsDown/TC7337 https://github.com/RootUp/PersonalStuff/blob/master/Telegram_Privacy.pdf +https://github.com/RrEeSeEeTt/CVEs/blob/main/JeeWMS-xss.md https://github.com/Ruia-ruia/Exploits/blob/master/DFX11details.txt https://github.com/RustCrypto/AEADs/security/advisories/GHSA-423w-p2w9-r7vq +https://github.com/RustCrypto/AEADs/security/advisories/GHSA-r38m-44fw-h886 https://github.com/Ryomensukuna13/QloApps-Reusable-CSRF-Token-in-Logout-Functionality/blob/main/README.md https://github.com/Ryomensukuna13/QloApps-Reusable-CSRF-Token-in-Logout-Functionality/blob/main/README.md#proof-of-concept-poc +https://github.com/S1lkys/CVE-2020-29669 https://github.com/S77code/CVE1/issues/1 https://github.com/S77code/CVE1/issues/3 https://github.com/SECFORCE/CVE-2018-8941 https://github.com/SECWG/cve/issues/3 https://github.com/SaaS5SaaS/CVE/issues/3 +https://github.com/Saconyfx/security-advisories/blob/main/CVE-2025-57692/advisory.md https://github.com/SadFud/Exploits/tree/master/Real%20World/Suites/cir-pwn-life https://github.com/Sadw11v/cve/blob/main/upload.md +https://github.com/SakuraSamuraii/CVE-2021-43032 https://github.com/SakuraSamuraii/derailed https://github.com/SakuraSamuraii/ez-iRZ https://github.com/SamParkerXd/cms/tree/main/1 +https://github.com/SandeepRajauriya/CVEs/blob/main/CVE-2024-37800 https://github.com/SandeepRajauriya/CVEs/blob/main/CVE-2024-37802 https://github.com/Scholar-XD/CVE/issues/1 https://github.com/SecWiki/CMS-Hunter/blob/master/seacms/seacms6.61/seacms661.md @@ -116994,16 +118554,37 @@ https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln6#null-pointer-dereference-in-h5o_sdspace_encode https://github.com/SegfaultMasters/covering360/tree/master/tcpreplay https://github.com/SexyShoelessGodofWar/LibTiff-4.7.0-Write-What-Where?tab=readme-ov-file +https://github.com/ShaneIsrael/fireshare/issues/311 https://github.com/ShellUnease/payroll-management-system-rce +https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250609-01/report.md +https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250609-01/report.md#steps-to-reproduce +https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250613-01/report.md +https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250613-01/report.md#steps-to-reproduce +https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250613-02.md +https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250613-02.md#steps-to-reproduce +https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250616-01/report.md +https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250616-03.md#steps-to-reproduce +https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250618-01.md#steps-to-reproduce +https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250620-01/report.md +https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250620-01/report.md#steps-to-reproduce https://github.com/ShielderSec/cve-2017-18635 https://github.com/ShielderSec/poc/tree/main/CVE-2025-48073 https://github.com/ShielderSec/poc/tree/main/CVE-2025-48074 +https://github.com/Shubhangborkar/aikaan-vulnerabilities/blob/main/cve1-shared-ssh-key.md https://github.com/Sigil-Ebook/flightcrew/issues/52#issuecomment-505967936 https://github.com/Sigil-Ebook/flightcrew/issues/52#issuecomment-505997355 +https://github.com/SimonKang949/Vulnerabilities/issues/1 +https://github.com/SimonKang949/Vulnerabilities/issues/3 +https://github.com/SimonKang949/Vulnerabilities/issues/4 +https://github.com/SimonKang949/Vulnerabilities/issues/5 +https://github.com/SimonKang949/Vulnerabilities/issues/6 https://github.com/Slovejoy/dnsmasq-pre2.76 https://github.com/Snowty/myCVE/blob/master/CraftCMS-2.6.3000/README.md +https://github.com/SoftEtherVPN/SoftEtherVPN/security/advisories/GHSA-xw53-587j-mqh6 https://github.com/SolitaryGrass/IoT_vuln/blob/main/tenda/AC6/AC6V2.0RTL_V15.03.06.23/formSetMacFilterCfg/poc.md https://github.com/SolitaryGrass/IoT_vuln/blob/main/tenda/AC6/AC6V2.0RTL_V15.03.06.23/fromSetIpMacBind/poc.md +https://github.com/SolitaryGrass/IoT_vuln/blob/main/tenda/AC6/AC6V2.0RTL_V15.03.06.23/fromSetSysTime/poc.md +https://github.com/SolitaryGrass/IoT_vuln/blob/main/tenda/AC6/AC6V2.0RTL_V15.03.06.23/saveParentControlInfo/poc.md https://github.com/Sospiro014/zday1/blob/main/Execution_After_Redirect.md https://github.com/Sospiro014/zday1/blob/main/Image_Accordion_Gallery.md https://github.com/Sospiro014/zday1/blob/main/Laboratory_Management_System.md @@ -117011,7 +118592,10 @@ https://github.com/Sospiro014/zday1/blob/main/doctor_appointment_management_syst https://github.com/Sospiro014/zday1/blob/main/doctor_appointment_management_system_xss.md https://github.com/Sospiro014/zday1/blob/main/ear_stord_xss.md https://github.com/Sospiro014/zday1/blob/main/xss_1.md +https://github.com/Souhardya/Exploit-PoCs/tree/main/HonorPCManager-PrivEsc +https://github.com/Sp1d3rL1/CVE/issues/3 https://github.com/SpengeSec/CVE-2019-19699 +https://github.com/SpikeReply/advisories/blob/0f15f5aefb959fbaff049da7cc3e36733e25b580/cve/buffalo/cve-2025-26167.md https://github.com/SpikeReply/advisories/blob/main/cve/totolink/cve-2024-27521.md https://github.com/StarCitizenTools/mediawiki-skins-Citizen/security/advisories/GHSA-2v3v-3whp-953h https://github.com/StarCitizenTools/mediawiki-skins-Citizen/security/advisories/GHSA-4c2h-67qq-vm87 @@ -117019,13 +118603,22 @@ https://github.com/StarCitizenTools/mediawiki-skins-Citizen/security/advisories/ https://github.com/StarCitizenTools/mediawiki-skins-Citizen/security/advisories/GHSA-86xf-2mgp-gv3g https://github.com/StarCitizenTools/mediawiki-skins-Citizen/security/advisories/GHSA-g3cp-pq72-hjpv https://github.com/StarCitizenTools/mediawiki-skins-Citizen/security/advisories/GHSA-jwr7-992g-68mh +https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-76hv-h7g2-xfv3 +https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-998c-x8hx-737r +https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-ff33-grr6-rmvp https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-xw8v-9mfm-g2pm https://github.com/Stolichnayer/mist-ce-account-takeover https://github.com/StolidWaffle/AVer-PTZApp2 https://github.com/Stranger6667/pyanyapi/issues/41 https://github.com/Studio-42/elFinder/issues/3295 https://github.com/Stuub/CVE-2024-32640-SQLI-MuraCMS +https://github.com/Summermu/VulnForIoT/tree/main/Wavlink_WN535K3/set_sys_adm_newpass/readme.md +https://github.com/Summermu/VulnForIoT/tree/main/Wavlink_WN535K3/set_sys_adm_username/readme.md +https://github.com/Sunhaobin318/CVE/issues/1 +https://github.com/Sunhaobin318/CVE/issues/2 https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/ToTolink/A950RG/5024-setDeviceName-deviceMac-command.md +https://github.com/SwayZGl1tZyyy/n-days/blob/main/AIBattery-Charge-Limiter/README.md +https://github.com/SwayZGl1tZyyy/n-days/blob/main/AIBattery-Charge-Limiter/README.md#proof-of-concept https://github.com/SwayZGl1tZyyy/n-days/blob/main/Endurance/README.md https://github.com/SwayZGl1tZyyy/n-days/blob/main/Endurance/README.md#proof-of-concept https://github.com/SwayZGl1tZyyy/n-days/blob/main/batteryKid/README.md @@ -117039,6 +118632,7 @@ https://github.com/TEag1e/zzcms https://github.com/TThuyyy/cve1/issues/1 https://github.com/TThuyyy/cve1/issues/2 https://github.com/TThuyyy/cve1/issues/3 +https://github.com/TThuyyy/cve1/issues/4 https://github.com/Tardis07/CVE_GO/blob/master/zzzphp_code_execution_v1.7.3.md https://github.com/Tatsh/pngdefry/issues/1 https://github.com/TeamEasy/EasyCMS/issues/8 @@ -117058,34 +118652,63 @@ https://github.com/TeamSeri0us/pocs/tree/master/soundtouch/2018_09_03 https://github.com/TeamSeri0us/pocs/tree/master/xpdf https://github.com/TeamSeri0us/pocs/tree/master/xpdf/2018_10_16/pdftoppm https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01 +https://github.com/Tencent/libpag/issues/2230 +https://github.com/The-Scratch-Channel/tsc-web-client/security/advisories/GHSA-h5rj-2466-qr23 +https://github.com/ThinkInAIXYZ/deepchat/security/advisories/GHSA-hqr4-4gfc-5p2j +https://github.com/Thir0th/Thir0th-CVE/blob/main/D-Link%20DIR-815%20RevA%20v1.01.md https://github.com/Thirukrishnan/CVE-2024-27665/ https://github.com/Thomas-Tsai/partclone/issues/71 https://github.com/Thomas-Tsai/partclone/issues/82 https://github.com/TiggerT/MyCVE/issues/1 https://github.com/TiggerT/MyCVE/issues/2 +https://github.com/TishaManandhar/Superstore-sql-poc/blob/main/SQL https://github.com/TonyKentClark/MyCodeAudit/blob/master/gxlcms1.1.4 +https://github.com/Tr0e/CVE_Hunter/blob/main/AIAS/AIAS_RCE.md https://github.com/Tr0e/CVE_Hunter/blob/main/AIAS/AIAS_SSRF1.md https://github.com/Tr0e/CVE_Hunter/blob/main/AIAS/AIAS_SSRF2.md https://github.com/Tr0e/CVE_Hunter/blob/main/ruoyi-ai/ruoyi-ai_UnauthorizedAccess_01.md https://github.com/Tr0e/CVE_Hunter/blob/main/ruoyi-ai/ruoyi-ai_UnauthorizedAccess_02.md +https://github.com/TransformerOptimus/SuperAGI/issues/1466 https://github.com/TreyWW/MyFinances/security/advisories/GHSA-4884-3gvp-3wj2 +https://github.com/UT-Security/gpu-zip https://github.com/Unitech/pm2/pull/5971 https://github.com/UnrealdDei/cve/blob/main/sql11.md +https://github.com/Upsonic/Upsonic/issues/353 +https://github.com/Upsonic/Upsonic/issues/356 +https://github.com/Utainlab/Vulns/blob/main/CVE-2025-55835.txt https://github.com/V1n1v131r4/Exploiting-Postie-WordPress-Plugin-/blob/master/README.md https://github.com/V1n1v131r4/Exploiting-WP-Htaccess-by-BestWebSoft-Plugin/blob/master/README.md https://github.com/V1n1v131r4/HGB10R-2 https://github.com/V1n1v131r4/MIME-Confusion-Attack-on-Midori-Browser/blob/master/README.md +https://github.com/Vanshdhawan188/CodeAstro-Online-Healthcare-Patient-Record-Management-System-CSRF/blob/main/CodeAstro-Online-Healthcare-Patient-Record-Management-System-CSRF.md +https://github.com/Vanshdhawan188/CodeAstro-Online-Healthcare-Patient-Record-Management-System-CSRF/blob/main/CodeAstro-Online-Healthcare-Patient-Record-Management-System-CSRF.md#-steps-to-reproduce +https://github.com/Vanshdhawan188/CodeAstro-Online-Healthcare-Patient-Record-Management-System/blob/main/CodeAstro-Online-Healthcare-Patient-Record-Management-System.md +https://github.com/Vanshdhawan188/CodeAstro-Online-Healthcare-Patient-Record-Management-System/blob/main/CodeAstro-Online-Healthcare-Patient-Record-Management-System.md#-proof-of-concept-poc +https://github.com/Vanshdhawan188/Stored-XSS-Hospital-Management/blob/main/Stored-XSS-Hospital-Management.md https://github.com/VasilVK/CVE/blob/main/CVE-2025-45947/README.MD https://github.com/VasilVK/CVE/blob/main/CVE-2025-45949/README.MD +https://github.com/VasilVK/CVE/tree/main/CVE-2025-50484 +https://github.com/VasilVK/CVE/tree/main/CVE-2025-50485 +https://github.com/VasilVK/CVE/tree/main/CVE-2025-50487 +https://github.com/VasilVK/CVE/tree/main/CVE-2025-50488 +https://github.com/VasilVK/CVE/tree/main/CVE-2025-50489 +https://github.com/VasilVK/CVE/tree/main/CVE-2025-50490 +https://github.com/VasilVK/CVE/tree/main/CVE-2025-50491 +https://github.com/VasilVK/CVE/tree/main/CVE-2025-50493 +https://github.com/VasilVK/CVE/tree/main/CVE-2025-50494 https://github.com/Venan24/SCMS/issues/2 https://github.com/VerSprite/research/blob/master/advisories/VS-2018-014.md https://github.com/Verytops/verydows/issues/10 https://github.com/Vict00r/poc/issues/1 +https://github.com/Vietsunshine-Electronic-Solution-JSC/Vulnerability-Disclosures/tree/main/2023/CVE-2023-44008 https://github.com/VijayT007/Vulnerability-Database/blob/master/Telegram-CVE-2020-17448 https://github.com/VirusTotal/yara/issues/1178 https://github.com/VirusTotal/yara/issues/999 https://github.com/Visionatrix/Visionatrix/security/advisories/GHSA-w36r-9jvx-q48v https://github.com/VitoCrl/vulnerability_research/tree/main/CVE-2024-51240 +https://github.com/W2-l0mechan1c/CVE1/issues/1 +https://github.com/W2-l0mechan1c/cve/issues/1 +https://github.com/W2-l0mechan1c/cve/issues/2 https://github.com/WPO-Foundation/webpagetest/issues/820 https://github.com/WPO-Foundation/webpagetest/issues/831 https://github.com/WPO-Foundation/webpagetest/issues/832 @@ -117117,16 +118740,23 @@ https://github.com/WebAssembly/wabt/issues/2557 https://github.com/WebAssembly/wabt/issues/2557#issue-2900405517 https://github.com/WebAssembly/wabt/issues/2565 https://github.com/WebAssembly/wabt/issues/2565#issue-2927572319 +https://github.com/WebAssembly/wabt/issues/2574 +https://github.com/WebAssembly/wabt/issues/2598 +https://github.com/WebAssembly/wabt/issues/2614 https://github.com/WhatCD/Gazelle/issues/111 https://github.com/WhatCD/Gazelle/issues/112 https://github.com/WhatCD/Gazelle/issues/113 https://github.com/WhatCD/Gazelle/issues/114 +https://github.com/WhereisDoujo/CVE/issues/7 https://github.com/Wocanilo/CVE-2019-14537 https://github.com/WonderCMS/wondercms/issues/330 https://github.com/WonderCMS/wondercms/issues/330#issue-2940381112 https://github.com/WonderCMS/wondercms/issues/330#issuecomment-2745347770 https://github.com/WoodManGitHub/MyCVEs/blob/main/2024-Totolink/X6000R-Hardcoded-Password.md +https://github.com/WuKongOpenSource/WukongCRM-11.0-JAVA/issues/26 +https://github.com/WuKongOpenSource/WukongCRM-11.0-JAVA/issues/26#issue-3272864284 https://github.com/XOOPS/XoopsCore25/issues/523 +https://github.com/Xh4H/Satellian-CVE-2020-7980 https://github.com/Xiaoyao-i03i/CVE/issues/1 https://github.com/Xiaoyao-i03i/CVE/issues/2 https://github.com/Xin246/cms/blob/main/2.md @@ -117138,17 +118768,31 @@ https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/dingfanzu-CMS/dingfanzu https://github.com/Xtraball/SiberianCMS/issues/217 https://github.com/Xueweian/cve/blob/main/sql18.md https://github.com/Xyntax/POC-T/blob/2.0/script/fiyo2.0.7-getshell.py +https://github.com/YAFNET/YAFNET/security/advisories/GHSA-mg6p-jjff-7g5m https://github.com/YZS17/CVE/blob/main/CodeAstro_Real_Estate_Management_System/admin_propertyview.php_xss.md https://github.com/YZS17/CVE/blob/main/CodeAstro_Real_Estate_Management_System/register.php_file_upload.md https://github.com/YZS17/CVE/blob/main/CodeAstro_Real_Estate_Management_System/sqli_submitpropertydelete.php.md https://github.com/YZS17/CVE/blob/main/CodeAstro_Real_Estate_Management_System/submitproperty.php_file_upload.md +https://github.com/YZS17/CVE/blob/main/Gazelle/xss1.md +https://github.com/YZS17/CVE/blob/main/Gazelle/xss1.md#poc https://github.com/YZS17/CVE/blob/main/Hospital_Management_System/user-login.md +https://github.com/YZS17/CVE/blob/main/Jasmin-Ransomware/sqli_handshake.php.md +https://github.com/YZS17/CVE/blob/main/Jasmin-Ransomware/sqli_password.md +https://github.com/YZS17/CVE/blob/main/Jasmin-Ransomware/sqli_search.md +https://github.com/YZS17/CVE/blob/main/Jasmin-Ransomware/sqli_username.md +https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertClient_client_id.md#poc +https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertNominee.php_client_id.md +https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertNominee.php_nominee_id.md +https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertPayment.php.md +https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertPayment.php.md#poc https://github.com/YZS17/CVE/blob/main/Online_Fire_Reporting_System/sqli_admin_manage-teams.php_teamid.md https://github.com/YZS17/CVE/blob/main/RPi-Jukebox-RFID/rce3.md https://github.com/YZS17/CVE/blob/main/RPi-Jukebox-RFID/rce3.md#poc https://github.com/YZS17/CVE/blob/main/RPi-Jukebox-RFID/rce5.md https://github.com/YZS17/CVE/blob/main/RPi-Jukebox-RFID/xss1.md https://github.com/YZS17/CVE/blob/main/RPi-Jukebox-RFID/xss1.md#poc +https://github.com/YZS17/CVE/blob/main/RPi-Jukebox-RFID/xss2.md +https://github.com/YZS17/CVE/blob/main/RPi-Jukebox-RFID/xss2.md#poc https://github.com/YZS17/CVE/blob/main/RPi-Jukebox-RFID/xss3.md https://github.com/YZS17/CVE/blob/main/RPi-Jukebox-RFID/xss3.md#poc https://github.com/YZS17/CVE/blob/main/RPi-Jukebox-RFID/xss4.md @@ -117164,17 +118808,25 @@ https://github.com/YZS17/CVE/blob/main/unmark/xss2.md https://github.com/YanHanQihomework/cve/issues/2 https://github.com/Yang-Nankai/Vulnerabilities/blob/main/DataCube3%20Shell%20Code%20Injection.md https://github.com/YesWiki/yeswiki/security/advisories/GHSA-4fvx-h823-38v3 +https://github.com/YesWiki/yeswiki/security/advisories/GHSA-88xg-v53p-fpvf https://github.com/YesWiki/yeswiki/security/advisories/GHSA-w59h-3x3q-3p6j +https://github.com/YesWiki/yeswiki/security/advisories/GHSA-wc9g-6j9w-hr95 https://github.com/YesWiki/yeswiki/security/advisories/GHSA-wphc-5f2j-jhvg https://github.com/YoSheep/cve/blob/main/Online%20Hotel%20Reservation%20System%20In%20PHP%20With%20Source%20Code%20-%20SQL%20Injection%20in%20edituser.php.md https://github.com/YoSheep/cve/blob/main/Online%20Hotel%20Reservation%20System%20In%20PHP%20With%20Source%20Code%20-%20SQL%20Injection%20in%20updateabout.php.md +https://github.com/YoSheep/cve/blob/main/PHPGurukul%20Small%20CRM%20in%20PHP%20V4.0%20Multiple%20Stored%20Cross-Site%20Scripting%20(XSS)%20Vulnerabilities.md https://github.com/Ysurac/FlightAirMap/issues/275 https://github.com/Yu1e/vuls/blob/main/Byzro%20Networks%20Smart%20S80%20management%20platform%20has%20rce%20vulnerability.md https://github.com/Yuanwennnn/cve/issues/1 https://github.com/Yuanwennnn/cve/issues/2 +https://github.com/YunQipao/cve/issues/1 +https://github.com/YunQipao/cve/issues/2 +https://github.com/YunQipao/cve/issues/3 https://github.com/Yyjccc/CVE/issues/1 https://github.com/Yyjccc/CVE/issues/2 https://github.com/ZBWACD/CodeAudit/blob/master/rejucms_v2.1%20%20xss1 +https://github.com/ZHENFENG13/My-Blog/issues/146 +https://github.com/ZHENFENG13/My-Blog/issues/146#issue-3265304545 https://github.com/ZHENFENG13/My-Blog/issues/147 https://github.com/ZHENFENG13/My-Blog/issues/147#issue-3265306297 https://github.com/ZHENFENG13/My-Blog/issues/149 @@ -117186,14 +118838,19 @@ https://github.com/ZOKEYE/CVE/blob/main/cve2.md https://github.com/ZTurNA/cve/issues/1 https://github.com/ZZ2266/.github.io/blob/main/AC20/formSetMacFilterCfg/readme.md https://github.com/ZZ2266/.github.io/blob/main/AC20/formSetMacFilterCfg/readme.md#poc-python-exploit-script +https://github.com/ZZ2266/.github.io/blob/main/AC20/fromSetIpMacBind/readme.md +https://github.com/ZZ2266/.github.io/blob/main/AC20/fromSetIpMacBind/readme.md#poc-python-exploit-script https://github.com/ZZ2266/.github.io/blob/main/AC20/hardcoded%20password/readme.md#description https://github.com/ZZ2266/.github.io/blob/main/AC20/telnet/readme.md https://github.com/ZZ2266/.github.io/blob/main/AC20/telnet/readme.md#poc-exploit-steps https://github.com/ZZ2266/.github.io/blob/main/COMFAST/N1V2/update_interface_png/readme.md https://github.com/ZZ2266/.github.io/blob/main/COMFAST/N1V2/wifilith_delete_pic_file/readme.md https://github.com/ZZ2266/.github.io/blob/main/COMFAST/N1V2/wireless_device_dissoc/readme.md +https://github.com/ZZ2266/.github.io/blob/main/H3C/readme.md +https://github.com/ZZ2266/.github.io/blob/main/Tenda/readme.md https://github.com/ZZ2266/.github.io/blob/main/WAVLINK/WL-WN578W2/login.cgi/login/readme.md https://github.com/ZZ2266/.github.io/blob/main/WAVLINK/WL-WN578W2/wireless.cgi/add_mac/ +https://github.com/ZZ2266/.github.io/blob/main/comfast/multi_pppoe.markdown https://github.com/ZZ2266/.github.io/tree/main/AC20/formSetQosBand https://github.com/ZZ2266/.github.io/tree/main/AC20/formSetQosBand#poc-python-exploit-script https://github.com/ZZ2266/.github.io/tree/main/AC20/formSetVirtualSer @@ -117206,6 +118863,7 @@ https://github.com/ZZ2266/.github.io/tree/main/Cudy https://github.com/ZZ2266/.github.io/tree/main/Cudy#steps-to-reproduce https://github.com/ZZ2266/.github.io/tree/main/Dlink/DI-8400/yyxz.asp https://github.com/ZZ2266/.github.io/tree/main/Dlink/DI-8400/yyxz.asp#proof-of-concept-poc +https://github.com/ZZ2266/.github.io/tree/main/Tenda https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/adm.cgi/wizard_rep.shtml https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/firewall.cgi/websSysFirewall https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/wireless.cgi/DeleteMac @@ -117217,6 +118875,8 @@ https://github.com/Zedeldi/CVE-2025-47827 https://github.com/Zehraakmanlar/Bortecine-s_CVEs/blob/main/README.md https://github.com/Zephkek/ping-rtt-overflow/ https://github.com/ZerBea/hcxtools/issues/155 +https://github.com/ZeroMemoryEx/CVE-2025-26125 +https://github.com/ZeroMemoryEx/IObit-EoP https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9C40E020 https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e004 https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e010 @@ -117225,7 +118885,9 @@ https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9 https://github.com/ZhiyuanWang-Chengdu-Qihoo360/ZillyaAntivirus_POC/tree/master/0x9C402414 https://github.com/ZhiyuanWang-Chengdu-Qihoo360/ZillyaAntivirus_POC/tree/master/0x9C402424 https://github.com/ZhiyuanWang-Chengdu-Qihoo360/ZillyaAntivirus_POC/tree/master/0x9C40242C +https://github.com/Zie619/n8n-workflows/issues/48 https://github.com/ZoneMinder/ZoneMinder/issues/1797 +https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-2qp3-fwpv-mc96 https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-qm8h-3xvf-m7j3 https://github.com/ZooNJarway/CVE/issues/3 https://github.com/a2ure123/libjson-unicode-buffer-overflow-poc @@ -117242,45 +118904,75 @@ https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-005.md https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-010.md https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-011.md https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-002.md +https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-004.md https://github.com/actuator/com.cutestudio.colordialer/blob/main/CWE-284.md https://github.com/actuator/com.full.dialer.top.secure.encrypted https://github.com/actuator/com.full.dialer.top.secure.encrypted/blob/main/dial.gif https://github.com/actuator/com.full.dialer.top.secure.encrypted/blob/main/poc.apk https://github.com/actuator/cve/blob/main/CVE-2023-42469 https://github.com/actuator/cve/blob/main/CVE-2023-42470 +https://github.com/actuator/cve/blob/main/CVE-2023-42471 +https://github.com/actuator/imou/blob/main/imou-life-6.8.0.md +https://github.com/actuator/imou/blob/main/poc.apk https://github.com/actuator/wave.ai.browser/blob/main/CWE-94.md https://github.com/actuator/wave.ai.browser/blob/main/poc.apk https://github.com/adamghill/django-unicorn/security/advisories/GHSA-g9wf-5777-gq43 https://github.com/adamstark/AudioFile/issues/58 https://github.com/adeoluwa-adebiyi/Mikrotik-Router-Monitoring-System/issues/4 https://github.com/adfinis/document-merge-service/security/advisories/GHSA-v5gf-r78h-55q6 +https://github.com/adhikara13/CVE/blob/main/netis_N3/Improper%20Authentication%20Mechanism%20Leading%20to%20Denial-of-Service%20%28DoS%29.md https://github.com/adiapera/xss_how_to_page_wondercms_3.4.3 https://github.com/advisories/GHSA-2m57-hf25-phgg +https://github.com/advisories/GHSA-93mv-x874-956g https://github.com/advisories/GHSA-qg8p-v9q4-gh34 +https://github.com/advisories/GHSA-qppj-fm5r-hxr3 +https://github.com/advisories/GHSA-rq77-p4h8-4crw +https://github.com/advisories/GHSA-w52x-cp47-xhhw +https://github.com/advplyr/audiobookshelf/security/advisories/GHSA-47g3-c5hx-2q3w https://github.com/agambier/libsvg2/issues/2 https://github.com/agambier/libsvg2/issues/3 https://github.com/agambier/libsvg2/issues/4 https://github.com/ageerle/ruoyi-ai/issues/43 https://github.com/ageerle/ruoyi-ai/issues/43#issuecomment-2763091490 https://github.com/ageerle/ruoyi-ai/issues/44#issue-2957771318 +https://github.com/ageerle/ruoyi-ai/issues/9 +https://github.com/ageerle/ruoyi-ai/issues/9#event-16775988438 +https://github.com/agent0ai/agent-zero/issues/687 https://github.com/agentejo/cockpit/issues/1310 https://github.com/agnaistic/agnai/security/advisories/GHSA-h355-hm5h-cm8h +https://github.com/ahmetak4n/vulnerability-playground/tree/main/vulnerability-research/CVE-2025-26260 +https://github.com/ahrixia/CVE-2023-44811 +https://github.com/ahrixia/CVE-2023-44812 +https://github.com/ahrixia/CVE-2023-44813 https://github.com/aio-libs/aiohttp/issues/6772 https://github.com/aionman/cve/issues/5 https://github.com/aionman/cve/issues/6 https://github.com/aionman/cve/issues/7 https://github.com/aionman/cve/issues/9 +https://github.com/aixiao0621/Tenda/blob/main/AC10/0.md +https://github.com/aixiao0621/Tenda/blob/main/AC10U/1/0.md +https://github.com/aixiao0621/Tenda/blob/main/AC10U/10/0.md +https://github.com/aixiao0621/Tenda/blob/main/AC10U/2/0.md +https://github.com/aixiao0621/Tenda/blob/main/AC10U/3/0.md +https://github.com/aixiao0621/Tenda/blob/main/AC10U/8/0.md +https://github.com/akimd/bison/issues/113 +https://github.com/akimd/bison/issues/114 https://github.com/akjedfha/cve/issues/1 +https://github.com/akka/akka-http/issues/4323 https://github.com/akrennmair/newsbeuter/issues/591 https://github.com/albandes/helpdezk/issues/2 https://github.com/alc9700jmo/CVE/issues/11 +https://github.com/alc9700jmo/CVE/issues/15 +https://github.com/alc9700jmo/CVE/issues/16 https://github.com/algolia/algoliasearch-helper-js/issues/922 https://github.com/aliasrobotics/RVD/issues/1495 https://github.com/aliasrobotics/RVD/issues/3316 +https://github.com/alibaba/tengine/issues/1872 https://github.com/alipay/sofa-hessian/issues/34 https://github.com/ally-petitt/CVE-2024-27631 https://github.com/alterebro/WeaselCMS/issues/6 https://github.com/amir20/dozzle/security/advisories/GHSA-w7qr-q9fh-fj35 +https://github.com/amooryx/arxiv-daily/security/advisories/GHSA-xqg6-5wfv-4855 https://github.com/ampache/ampache/security/advisories/GHSA-46m4-5pxj-66f2 https://github.com/ampache/ampache/security/advisories/GHSA-4q69-983r-mwwr https://github.com/ampache/ampache/security/advisories/GHSA-4xw5-f7xm-vpw5 @@ -117293,6 +118985,7 @@ https://github.com/ampache/ampache/security/advisories/GHSA-xvfj-w962-hqcx https://github.com/andreas83/SocialNetwork/issues/84 https://github.com/andreysanyuk/CVE-2023-42283 https://github.com/andreysanyuk/CVE-2023-42284 +https://github.com/andsnw/sockjs-dos-py https://github.com/anhdq201/rukovoditel/issues/10 https://github.com/anhdq201/rukovoditel/issues/11 https://github.com/anhdq201/rukovoditel/issues/12 @@ -117317,6 +119010,10 @@ https://github.com/ansible/ansible-modules-extras/pull/1941/commits/8c6fe646ee79 https://github.com/ansilove/libansilove/issues/4 https://github.com/antirez/kilo/issues/60 https://github.com/antoonpurnal/clangover +https://github.com/aoc1997/cve/issues/1 +https://github.com/apache/apisix/issues/10320 +https://github.com/apache/httpd-site/pull/10 +https://github.com/apache/trafficserver/pull/10564 https://github.com/apexcharts/apexcharts.js/pull/2158 https://github.com/appneta/tcpreplay/issues/278 https://github.com/appneta/tcpreplay/issues/484 @@ -117332,6 +119029,8 @@ https://github.com/appneta/tcpreplay/issues/718 https://github.com/appneta/tcpreplay/issues/719 https://github.com/appneta/tcpreplay/issues/780 https://github.com/appneta/tcpreplay/issues/787 +https://github.com/appneta/tcpreplay/issues/957 +https://github.com/appneta/tcpreplay/issues/957#issuecomment-3124774393 https://github.com/appneta/tcpreplay/issues/958 https://github.com/appneta/tcpreplay/issues/958#issuecomment-3124876035 https://github.com/appneta/tcpreplay/issues/959 @@ -117344,12 +119043,17 @@ https://github.com/appneta/tcpreplay/issues/971#issuecomment-3199014524 https://github.com/appneta/tcpreplay/issues/972 https://github.com/appneta/tcpreplay/issues/972#issuecomment-3199019278 https://github.com/appneta/tcpreplay/issues/973 +https://github.com/arachnys/cabot/pull/694 https://github.com/argoproj/argo-events/security/advisories/GHSA-hmp7-x699-cvhq https://github.com/argoproj/argo-workflows/security/advisories/GHSA-ghjw-32xw-ffwr +https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487 +https://github.com/armink/struct2json/issues/13 https://github.com/arvidn/libtorrent/issues/2099 https://github.com/asd1238525/cve/blob/main/xss2.md https://github.com/asd1238525/cve/blob/main/xss2.md#poc https://github.com/asd1238525/cve/blob/main/xss3.md +https://github.com/ashin9/CVE/issues/1 +https://github.com/aslanemre/CVE-2020-29364/blob/main/CVE-2020-29364 https://github.com/assimp/assimp/issues/6009 https://github.com/assimp/assimp/issues/6009#issue-2877367021 https://github.com/assimp/assimp/issues/6011 @@ -117385,19 +119089,74 @@ https://github.com/assimp/assimp/issues/6069#issuecomment-2763273425 https://github.com/assimp/assimp/issues/6070 https://github.com/assimp/assimp/issues/6170 https://github.com/assimp/assimp/issues/6172 +https://github.com/assimp/assimp/issues/6219 +https://github.com/assimp/assimp/issues/6219#issuecomment-2945016005 +https://github.com/assimp/assimp/issues/6220 +https://github.com/assimp/assimp/issues/6220#issuecomment-2945018579 https://github.com/asterisk/asterisk/security/advisories/GHSA-2grh-7mhv-fcfw https://github.com/asterisk/asterisk/security/advisories/GHSA-c7p6-7mvq-8jq2 https://github.com/asterisk/asterisk/security/advisories/GHSA-mrq5-74j5-f5cr +https://github.com/astropy/astropy/security/advisories/GHSA-h2x6-5jx5-46hf +https://github.com/atjiu/pybbs/issues/199 +https://github.com/atjiu/pybbs/issues/199#issue-3256276118 +https://github.com/atjiu/pybbs/issues/199#issuecomment-3134573731 +https://github.com/atjiu/pybbs/issues/200 +https://github.com/atjiu/pybbs/issues/200#issue-3256283647 +https://github.com/atjiu/pybbs/issues/200#issuecomment-3134710486 +https://github.com/atjiu/pybbs/issues/202 +https://github.com/atjiu/pybbs/issues/202#issue-3256293499 +https://github.com/atjiu/pybbs/issues/202#issuecomment-3134602615 +https://github.com/atjiu/pybbs/issues/203 +https://github.com/atjiu/pybbs/issues/203#issue-3256392964 +https://github.com/atjiu/pybbs/issues/203#issuecomment-3134774288 +https://github.com/atjiu/pybbs/issues/204 +https://github.com/atjiu/pybbs/issues/204#issue-3256412774 +https://github.com/atjiu/pybbs/issues/204#issuecomment-3134774122 +https://github.com/atjiu/pybbs/issues/205 +https://github.com/atjiu/pybbs/issues/205#issue-3256416772 +https://github.com/atjiu/pybbs/issues/205#issuecomment-3134773883 +https://github.com/atjiu/pybbs/issues/206 +https://github.com/atjiu/pybbs/issues/206#issue-3256420783 +https://github.com/atjiu/pybbs/issues/206#issuecomment-3134773560 +https://github.com/atjiu/pybbs/issues/207 +https://github.com/atjiu/pybbs/issues/207#issue-3256426074 +https://github.com/atjiu/pybbs/issues/207#issuecomment-3134773217 +https://github.com/atjiu/pybbs/issues/208 +https://github.com/atjiu/pybbs/issues/208#issue-3256435530 +https://github.com/atjiu/pybbs/issues/208#issuecomment-3134772931 +https://github.com/atjiu/pybbs/issues/209 +https://github.com/atjiu/pybbs/issues/209#issuecomment-3134772651 +https://github.com/atjiu/pybbs/issues/211 +https://github.com/atjiu/pybbs/issues/211#issue-3256483043 +https://github.com/atjiu/pybbs/issues/211#issuecomment-3134960777 https://github.com/atutor/ATutor/issues/129 https://github.com/atutor/ATutor/issues/135 https://github.com/auracms/AuraCMS/issues/3 https://github.com/awindog/cve/blob/main/11.md https://github.com/awindog/cve/blob/main/12.md +https://github.com/awindog/cve/blob/main/13.md +https://github.com/awindog/cve/blob/main/688/1.md#poc +https://github.com/awindog/cve/blob/main/688/10.md +https://github.com/awindog/cve/blob/main/688/10.md#poc +https://github.com/awindog/cve/blob/main/688/11.md +https://github.com/awindog/cve/blob/main/688/11.md#poc +https://github.com/awindog/cve/blob/main/688/12.md +https://github.com/awindog/cve/blob/main/688/12.md#poc +https://github.com/awindog/cve/blob/main/688/14.md +https://github.com/awindog/cve/blob/main/688/15.md https://github.com/awindog/cve/blob/main/688/16.md +https://github.com/awindog/cve/blob/main/688/2.md +https://github.com/awindog/cve/blob/main/688/2.md#poc https://github.com/awindog/cve/blob/main/688/27.md https://github.com/awindog/cve/blob/main/688/27.md#poc +https://github.com/awindog/cve/blob/main/688/28.md +https://github.com/awindog/cve/blob/main/688/28.md#poc +https://github.com/awindog/cve/blob/main/688/29.md +https://github.com/awindog/cve/blob/main/688/29.md#poc +https://github.com/awindog/cve/blob/main/688/30.md https://github.com/axboe/fio/issues/1981 https://github.com/axboe/fio/issues/1982 +https://github.com/axiomatic-systems/Bento4/issues/1037 https://github.com/axiomatic-systems/Bento4/issues/181 https://github.com/axiomatic-systems/Bento4/issues/182 https://github.com/axiomatic-systems/Bento4/issues/185 @@ -117436,8 +119195,11 @@ https://github.com/axiomatic-systems/Bento4/issues/779 https://github.com/axios/axios/security/advisories/GHSA-jr5f-v2jv-69x6 https://github.com/aziz0x48/CVEs-and-Vulnerabilities/blob/main/CVE-2024-51337.md https://github.com/b51s77/cve/blob/main/upload.md +https://github.com/babel/babel/pull/17173 https://github.com/badboycxcc/nuuo-xss/blob/main/README.md https://github.com/baijiacms/baijiacmsV4/issues/2 +https://github.com/bayuncao-bit/vul-37 +https://github.com/bayuncao-bit/vul-37#proof-of-concept https://github.com/bayuncao/vul-cve-20/blob/main/PoC.py https://github.com/bazad/ctl_ctloutput-leak https://github.com/bazhahei123/CVE/blob/main/sql_cve_4_8.pdf @@ -117457,6 +119219,7 @@ https://github.com/benjaminjonard/koillection/issues/1393#issue-3347724086 https://github.com/benjaminjonard/koillection/issues/1393#issuecomment-3217310072 https://github.com/bentoml/BentoML/security/advisories/GHSA-33xw-247w-6hmc https://github.com/bentoml/BentoML/security/advisories/GHSA-7v4r-c989-xh26 +https://github.com/bettershop/LaikeTui/issues/8 https://github.com/bevennyamande/bloodbank_delete_csrf_attack https://github.com/bevennyamande/bloodbank_profile_update_csrf https://github.com/bevennyamande/receiver_request_sample_csrf @@ -117488,11 +119251,19 @@ https://github.com/bigtreecms/BigTree-CMS/issues/296 https://github.com/bigtreecms/BigTree-CMS/issues/297 https://github.com/bigtreecms/BigTree-CMS/issues/298 https://github.com/bigtreecms/BigTree-CMS/issues/323 +https://github.com/binneko/CVE-2025-46041 +https://github.com/binneko/CVE-2025-50286 https://github.com/bitfu/sricam-gsoap2.8-dos-exploit https://github.com/bitovi/launchpad/pull/124 https://github.com/bleakTS/myCVE/issues/18 https://github.com/bludit/bludit/issues/1132 https://github.com/bludit/bludit/pull/1090 +https://github.com/blueandhack/cve/issues/1 +https://github.com/blueandhack/cve/issues/2 +https://github.com/blueandhack/cve/issues/3 +https://github.com/blueandhack/cve/issues/4 +https://github.com/blueandhack/cve/issues/6 +https://github.com/blueandhack/cve/issues/7 https://github.com/bluecity/CMS/blob/master/niushop%20v1.1-upload/Niushop%20Multi-business%20V1.11-en.md https://github.com/blyssprivacy/sdk/issues/36 https://github.com/bmantra/bmantra.github.io/blob/master/logmx/logmx.html @@ -117515,38 +119286,59 @@ https://github.com/brianmario/yajl-ruby/issues/176 https://github.com/brianvoe/slim-select/issues/564 https://github.com/browser-use/browser-use/security/advisories/GHSA-x39x-9qw5-ghrf https://github.com/browserify/cipher-base/security/advisories/GHSA-cpq7-6gpm-g9rc +https://github.com/browserify/pbkdf2/security/advisories/GHSA-h7cp-r72f-jxh6 +https://github.com/browserify/pbkdf2/security/advisories/GHSA-v62p-rq8g-8h59 https://github.com/browserify/sha.js/security/advisories/GHSA-95m3-7q98-8xr5 https://github.com/bsmali4/cve/blob/master/CMS%20Made%20Simple%20Stored%20XSS.md https://github.com/bsmali4/cve/blob/master/CMS%20Made%20Simple%20UPLOAD%20FILE%20XSS.md https://github.com/bullfrogsec/bullfrog/security/advisories/GHSA-m32f-fjw2-37v3 +https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/IKUN_Library-authority.md https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/My-Blog-layui-fileUpload.md https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/My-Blog-layui-xss-1.md +https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/My-Blog-layui-xss-2.md https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/Nimrod-SQL.md +https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/Nimrod-fileUpload.md https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/ZeroWdd-studentmanager-authority.md +https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/db-hospital-drug-authority.md https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/db-hospital-drug-xss.md https://github.com/bytecodealliance/wasm-micro-runtime/issues/3130 https://github.com/bytecodealliance/wasm-micro-runtime/issues/3346 +https://github.com/bytecodealliance/wasm-micro-runtime/issues/3347 https://github.com/bytium/vulnerability-research/blob/main/stored-xss-perfex-crm-3.2.1.md https://github.com/byxs0x0/SQL/blob/main/SQL6.md https://github.com/byxs0x0/SQL/issues/2 https://github.com/byxs0x0/cve2/blob/main/5.md +https://github.com/byxs0x0/cve2/blob/main/8.md +https://github.com/byxs0x0/cve2/blob/main/8.md#poc +https://github.com/byxs0x0/cve2/blob/main/9.md +https://github.com/byxs0x0/cve2/blob/main/9.md#poc https://github.com/c0d3x27/CVEs/tree/main/CVE-2023-27098 +https://github.com/c0n5n3d/CVE-2021-43657/blob/main/Info.txt https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20LR350%20Vuln.md +https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md https://github.com/c610/tmp/blob/master/zenload4patreons.zip +https://github.com/caesar-power/CVE/issues/1 +https://github.com/caesar-power/CVE/issues/2 +https://github.com/caesar-power/CVE/issues/3 https://github.com/caigo8/CVE-md/blob/main/Books-Management-System/CSRF.md https://github.com/caigo8/CVE-md/blob/main/DS-Java/CSRF.md https://github.com/caigo8/CVE-md/blob/main/My-bbs/CSRF.md https://github.com/caigo8/CVE-md/blob/main/admintwo/CSRF.md https://github.com/caigo8/CVE-md/blob/main/carRentalV1.0/druid%E6%9C%AA%E6%8E%88%E6%9D%83.md https://github.com/cainiao159357/x5000r_poc/blob/main/README.md +https://github.com/canonical/operator/security/advisories/GHSA-hcmv-jmqh-fjgm https://github.com/caokang/waimai/issues/2 https://github.com/caokang/waimai/issues/3 https://github.com/cardgate/magento2/issues/54 https://github.com/cardgate/woocommerce/issues/18 +https://github.com/carsonchan12345/CVE-2024-37726-MSI-Center-Local-Privilege-Escalation https://github.com/casdoor/casdoor/issues/1171 +https://github.com/catfish258/cve/issues/1 https://github.com/causefx/Organizr/issues/1997 +https://github.com/causefx/Organizr/issues/1999 https://github.com/ccxvii/mujs/issues/136 https://github.com/ccxvii/mujs/issues/148 +https://github.com/cdl00/cve/blob/main/sql8-message-book.md https://github.com/ceng-yildirim/LFI-processwire https://github.com/cesanta/mjs/issues/160 https://github.com/cesanta/mjs/issues/163 @@ -117555,6 +119347,9 @@ https://github.com/cesanta/mjs/issues/165 https://github.com/cesanta/mjs/issues/166 https://github.com/cesanta/mjs/issues/169 https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Online%20student%20management%20system(XSS)%202.md +https://github.com/chatchat-space/Langchain-Chatchat/issues/5352 +https://github.com/chatchat-space/Langchain-Chatchat/issues/5353 +https://github.com/chatchat-space/Langchain-Chatchat/issues/5354 https://github.com/chekun/DiliCMS/issues/60 https://github.com/chemcms/ChemCMS/issues/2 https://github.com/chen2496088236/CVE/issues/11 @@ -117577,6 +119372,7 @@ https://github.com/chocolate-doom/chocolate-doom/issues/1293 https://github.com/chrisWalker11/Cves/blob/main/CVE-2025-45314/CVE-2025-45314.md https://github.com/chrisWalker11/Cves/blob/main/CVE-2025-45315/CVE-2025-45315.md https://github.com/chrisWalker11/Cves/blob/main/CVE-2025-45317/CVE-2025-45317.md +https://github.com/chrisandoryan/vuln-advisory/blob/main/nJwt/CVE-2024-34273.md https://github.com/chshcms/cscms/issues/12#issue-1170440183 https://github.com/chshcms/cscms/issues/2 https://github.com/chshcms/cscms/issues/20#issue-1207634969 @@ -117603,7 +119399,9 @@ https://github.com/chujianxin0101/vuln/issues/10 https://github.com/chujianxin0101/vuln/issues/8 https://github.com/chujianxin0101/vuln/issues/9 https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt +https://github.com/cilan2/iot/blob/main/4.md https://github.com/cinecert/asdcplib/issues/138 +https://github.com/ciur/papermerge/issues/228 https://github.com/ckolivas/lrzip/issues/264 https://github.com/ckolivas/lrzip/issues/66 https://github.com/ckolivas/lrzip/issues/67 @@ -117617,9 +119415,12 @@ https://github.com/claviska/simple-php-captcha/issues/16 https://github.com/cli/go-gh/commit/a08820a13f257d6c5b4cb86d37db559ec6d14577 https://github.com/clidey/whodb/security/advisories/GHSA-9r4c-jwx3-3j76 https://github.com/clidey/whodb/security/advisories/GHSA-c7w4-9wv8-7x7c +https://github.com/cloudfavorites/favorites-web/issues/134 +https://github.com/cloudfavorites/favorites-web/issues/134#issue-3252105130 https://github.com/cnvs/canvas/issues/331 https://github.com/cobbler/cobbler/security/advisories/GHSA-m26c-fcgh-cp6h https://github.com/cocotais/cocotais-bot/security/advisories/GHSA-mj2c-8hxf-ffvq +https://github.com/codemirror/codemirror5/issues/7128 https://github.com/codinglosser/cve/blob/main/README.md https://github.com/concrete5/concrete5-legacy/issues/1948 https://github.com/conda-forge/conda-forge-ci-setup-feedstock/security/advisories/GHSA-jh2q-mrmj-hff3 @@ -117639,6 +119440,7 @@ https://github.com/cooorgi/cve/blob/main/hris_sql_log_query12.md https://github.com/cooorgi/cve/blob/main/hris_sql_login.md https://github.com/cooorgi/cve/blob/main/hris_sql_login_attendance2.md https://github.com/cooorgi/cve/blob/main/sql.md +https://github.com/craftcms/cms/security/advisories/GHSA-f3cw-hg6r-chfv https://github.com/crate/crate/security/advisories/GHSA-x268-qpg6-w9g2 https://github.com/creditease-sec/insight/issues/42 https://github.com/cri-o/cri-o/security/advisories/GHSA-2cgq-h8xw-2v5j @@ -117649,12 +119451,18 @@ https://github.com/cskaza/cszcms/issues/17 https://github.com/cskaza/cszcms/issues/28 https://github.com/ctflearner/Android_Findings/blob/main/Replify-Messenger/Backup.md https://github.com/ctflearner/Android_Findings/blob/main/Smartalarm/Backup.md +https://github.com/ctflearner/Vulnerability/blob/main/Bank_Locker_Management_System/BLMS_XSS_IN_ADMIN_BROWSER.md +https://github.com/ctflearner/Vulnerability/blob/main/Bank_Locker_Management_System/Bank%20Locker%20Management%20System-SQL%20.md +https://github.com/ctflearner/Vulnerability/blob/main/Canteen%20Management%20System/Canteen_Management_System_XSS_IN_Add_Customer.md +https://github.com/ctflearner/Vulnerability/blob/main/Employee%20Leaves%20Management%20System/ELMS.md +https://github.com/ctflearner/Vulnerability/blob/main/Online-Security-guard-POC.md https://github.com/cure53/DOMPurify/pull/1101 https://github.com/cure53/DOMPurify/security/advisories/GHSA-gx9m-whjm-85jf https://github.com/curlyboi/hashtopus/issues/63 https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/config_vpn_pptp.md https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/generate_conf_router.md https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/init_nvram.md +https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/makeCurRemoteApList.md https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/setupEC20Apn.md https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/updateCurAPlist.md https://github.com/cybersecurityworks/Disclosed/issues/1 @@ -117676,6 +119484,7 @@ https://github.com/cybersecurityworks/Disclosed/issues/26 https://github.com/cybersecurityworks/Disclosed/issues/4 https://github.com/cybersecurityworks/Disclosed/issues/5 https://github.com/cybersecurityworks/Disclosed/issues/7 +https://github.com/cymiao1978/cve/blob/main/1.md https://github.com/cymiao1978/cve/blob/main/4.md https://github.com/cymiao1978/cve/blob/main/4.md#poc https://github.com/cymiao1978/cve/blob/main/5.md @@ -117687,14 +119496,25 @@ https://github.com/cymiao1978/cve/blob/main/9.md https://github.com/d0n601/CVE-2024-9162 https://github.com/d0n601/CVE-2025-47549 https://github.com/d0n601/CVE-2025-47550/ +https://github.com/d0n601/CVE-2025-6220 https://github.com/d0n601/CVE-2025-9215 https://github.com/d0n601/CVE-2025-9216 +https://github.com/d2pq/cve/blob/main/616/1.md +https://github.com/d2pq/cve/blob/main/616/1.md#poc https://github.com/d2pq/cve/blob/main/616/19.md https://github.com/d2pq/cve/blob/main/616/19.md#poc +https://github.com/d2pq/cve/blob/main/616/2.md +https://github.com/d2pq/cve/blob/main/616/2.md#poc https://github.com/d2pq/cve/blob/main/616/21.md https://github.com/d2pq/cve/blob/main/616/21.md#poc +https://github.com/d2pq/cve/blob/main/616/23.md +https://github.com/d2pq/cve/blob/main/616/23.md#poc https://github.com/d2pq/cve/blob/main/616/24.md https://github.com/d2pq/cve/blob/main/616/24.md#poc +https://github.com/d2pq/cve/blob/main/616/26.md +https://github.com/d2pq/cve/blob/main/616/26.md#poc +https://github.com/d2pq/cve/blob/main/616/3.md#poc +https://github.com/d3do-23/cvelist/blob/main/gpt_academic/Plugins_LFI.md https://github.com/d4wner/Vulnerabilities-Report/blob/master/FS%20Lynda%20Clone.md https://github.com/d4wner/Vulnerabilities-Report/blob/master/gd-rating-system.md https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-44897/poc.txt @@ -117702,12 +119522,16 @@ https://github.com/dad-zm/myCVE/issues/3 https://github.com/dad-zm/myCVE/issues/4 https://github.com/dahua966/Routers-vuls/blob/master/DAP-1320/vuls_poc.md https://github.com/daimabiabia/cve/issues/1 +https://github.com/dani-garcia/vaultwarden/security/advisories/GHSA-h6cc-rc6q-23j4 https://github.com/dani-garcia/vaultwarden/security/advisories/GHSA-j4h8-vch3-f797 https://github.com/danieljiang0415/android_kernel_crash_poc +https://github.com/danocmx/node-tf2-item-format/security/advisories/GHSA-8h55-q5qq-p685 https://github.com/danpros/htmly/issues/462 +https://github.com/darylldoyle/svg-sanitizer/security/advisories/GHSA-22wq-q86m-83fh https://github.com/dataease/dataease/security/advisories/GHSA-2wfc-qwx7-w692 https://github.com/dataease/dataease/security/advisories/GHSA-999m-jv2p-5h34 https://github.com/dataease/dataease/security/advisories/GHSA-h7hj-4j78-cvc7 +https://github.com/dataease/dataease/security/advisories/GHSA-v37q-vh67-9rqv https://github.com/dataease/dataease/security/advisories/GHSA-x97w-69ff-r55q https://github.com/davesteele/gnome-gmail/issues/84 https://github.com/davybat/IoT-Vuls/blob/main/tenda/formGetMasterPassengerAnalyseData.md @@ -117730,10 +119554,12 @@ https://github.com/denoland/deno/security/advisories/GHSA-3j27-563v-28wf https://github.com/denoland/deno/security/advisories/GHSA-5frw-4rwq-xhcr https://github.com/denoland/deno/security/advisories/GHSA-6q4w-9x56-rmwq https://github.com/denoland/deno/security/advisories/GHSA-7w8p-chxq-2789 +https://github.com/denoland/deno/security/advisories/GHSA-8vxj-4cph-c596 https://github.com/denoland/deno/security/advisories/GHSA-m4pq-fv2w-6hrw https://github.com/denoland/deno/security/advisories/GHSA-qqwr-j9mm-fhw6 https://github.com/denoland/deno/security/advisories/GHSA-wrqv-pf6j-mqjp https://github.com/denoland/deno/security/advisories/GHSA-xqxc-x6p3-w683 +https://github.com/denoland/std/security/advisories/GHSA-crjp-8r9q-2j9r https://github.com/derrekr/android_security/commit/0dd1a733e60cf5239c0a185d4219ba2ef1118a8b https://github.com/devryan/GamePanelX-V3/issues/161 https://github.com/devtron-labs/devtron/security/advisories/GHSA-q78v-cv36-8fxj @@ -117773,11 +119599,19 @@ https://github.com/doramart/DoraCMS/issues/136 https://github.com/dotCMS/core/issues/12131 https://github.com/doublefast/yunucms/issues/1 https://github.com/doudoudedi/main-DIR-816_A2_Command-injection/blob/main/injection.md +https://github.com/dovankha/CVE-2024-34220 https://github.com/dovankha/CVE-2024-34221 https://github.com/dovankha/CVE-2024-34222 https://github.com/dovankha/CVE-2024-34223 +https://github.com/dovankha/CVE-2024-34224 https://github.com/dovankha/CVE-2024-34225 +https://github.com/dovankha/CVE-2024-34226 https://github.com/dragonflyoss/Dragonfly2/security/advisories/GHSA-hpc8-7wpm-889w +https://github.com/dragonghost2025/cve/issues/1 +https://github.com/dragonghost2025/cve/issues/3 +https://github.com/dragonghost2025/cve/issues/4 +https://github.com/dragonghost2025/cve/issues/5 +https://github.com/dragonghost2025/cve/issues/9 https://github.com/drbye78/libgig/issues/1 https://github.com/drew-byte/Link_Status_Checker_PoC https://github.com/drew-byte/Online-Pet-Shop-Management-System-Stored-XSS-PoC/blob/main/README.md @@ -117793,6 +119627,7 @@ https://github.com/drewlong/vbully https://github.com/dromara/hutool/issues/3289 https://github.com/dtwin88/cve-md/blob/main/lecms%20V3.0.3/lecms_3.md https://github.com/dtwin88/cve-md/blob/main/lecms%20V3.0.3/lecms_4.md +https://github.com/duckdb/duckdb/security/advisories/GHSA-w2gf-jxc9-pf2q https://github.com/duxphp/DuxCMS3/issues/5 https://github.com/dvidelabs/flatcc/issues/188 https://github.com/dweeves/magmi-git/issues/522 @@ -117812,7 +119647,9 @@ https://github.com/eclypsium/USBAnywhere https://github.com/ecomfe/zrender/pull/826 https://github.com/eddietcc/CVEnotes/blob/master/MyWebSQL/CSRF/readme.md https://github.com/edwin-0990/CVE_ID/tree/main/CVE-2025-45777 +https://github.com/eeeeeekkkkkkkk/POC/blob/main/%E5%AE%8F%E6%99%AFHCM%20%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fdownlawbase%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md https://github.com/eeeeeekkkkkkkk/POC/blob/main/%E9%BB%84%E9%87%91%E9%80%9A%E4%BA%8C%E7%BA%A7%E7%B3%BB%E7%BB%9F%E4%B8%89%E4%BB%A3%E7%AE%A1%E7%90%86%E7%AB%AF%E7%B3%BB%E7%BB%9FcustTakeInfoPage%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md +https://github.com/eeeeeekkkkkkkk/POC/blob/main/%E9%BB%84%E9%87%91%E9%80%9A%E4%BA%8C%E7%BA%A7%E7%B3%BB%E7%BB%9F%E4%B8%89%E4%BB%A3%E7%AE%A1%E7%90%86%E7%AB%AF%E7%B3%BB%E7%BB%9FrentTakeInfoPage%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/Offline-decryption https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/Replay https://github.com/ehtec/phpipam-exploit @@ -117820,6 +119657,8 @@ https://github.com/ejdhssh/IOT_Vul https://github.com/ekultek/cve-2019-7216 https://github.com/ele7enxxh/poc-exp/tree/master/CVE-2016-5346 https://github.com/elttam/publications/blob/master/writeups/home-assistant/supervisor-authentication-bypass-advisory.md +https://github.com/elunez/eladmin/issues/883 +https://github.com/elunez/eladmin/issues/883#issue-3252078139 https://github.com/elvanderb/TCP-32764 https://github.com/embedi/CVE-2017-11882 https://github.com/emlog/emlog/issues/48 @@ -117827,17 +119666,24 @@ https://github.com/emlog/emlog/issues/49 https://github.com/emlog/emlog/security/advisories/GHSA-82qc-9vg7-2c6c https://github.com/encode/starlette/security/advisories/GHSA-f96h-pmfr-66vw https://github.com/enferex/pdfresurrect/issues/17 +https://github.com/enigma522/cve/issues/1 +https://github.com/enigma522/cve/issues/2 +https://github.com/envoyproxy/envoy/pull/30055 https://github.com/envoyproxy/envoy/security/advisories/GHSA-5375-pq35-hf2g https://github.com/envoyproxy/envoy/security/advisories/GHSA-5jmv-cw9p-f9rp https://github.com/envoyproxy/envoy/security/advisories/GHSA-7wp5-c2vq-4f8m +https://github.com/envoyproxy/envoy/security/advisories/GHSA-95j4-hw7f-v2rh https://github.com/envoyproxy/envoy/security/advisories/GHSA-9g5w-hqr3-w2ph https://github.com/envoyproxy/envoy/security/advisories/GHSA-ffhv-fvxq-r6mf +https://github.com/envoyproxy/envoy/security/advisories/GHSA-g979-ph9j-5gg4 https://github.com/envoyproxy/envoy/security/advisories/GHSA-hww5-43gv-35jv https://github.com/envoyproxy/envoy/security/advisories/GHSA-j79q-2g66-2xv5 https://github.com/envoyproxy/envoy/security/advisories/GHSA-w5w5-487h-qv8q https://github.com/envoyproxy/envoy/security/advisories/GHSA-wpc2-2jp6-ppg2 https://github.com/envoyproxy/envoy/security/advisories/GHSA-x74r-f4mw-c32h https://github.com/envoyproxy/envoy/security/advisories/GHSA-xcx5-93pw-jw2w +https://github.com/enzored/CVE-2024-34831 +https://github.com/eosphoros-ai/DB-GPT/issues/2774 https://github.com/epistemophilia/CVEs/blob/master/Epson-WorkForce-WF2861/CVE-2018-19232/poc-cve-2018-19232.py https://github.com/epistemophilia/CVEs/blob/master/LG-GAMP-Routers/CVE-2019-7404/poc-cve-2019-7404.py https://github.com/erberkan/fortilogger_arbitrary_fileupload @@ -117851,30 +119697,73 @@ https://github.com/erpscanteam/CVE-2018-2380 https://github.com/erpscanteam/CVE-2018-2636 https://github.com/esphome/esphome/security/advisories/GHSA-8p25-3q46-8q2p https://github.com/esphome/esphome/security/advisories/GHSA-9p43-hj5j-96h5 +https://github.com/esphome/esphome/security/advisories/GHSA-mxh2-ccgj-8635 https://github.com/espocrm/espocrm/issues/1357 https://github.com/espocrm/espocrm/issues/1358 +https://github.com/espocrm/espocrm/security/advisories/GHSA-3ph3-jcfx-fq53 https://github.com/espocrm/espocrm/security/advisories/GHSA-qrwp-v8v3-hqp2 https://github.com/ethyca/fides/security/advisories/GHSA-2h46-8gf5-fmxv +https://github.com/ethyca/fides/security/advisories/GHSA-8cm5-jfj2-26q7 https://github.com/evildrummer/MyOwnCVEs/tree/main/CVE-2021-39458 https://github.com/evildrummer/MyOwnCVEs/tree/main/CVE-2021-39459 +https://github.com/evmos/evmos/security/advisories/GHSA-xgr7-jgq3-mhmc https://github.com/excalidraw/excalidraw/security/advisories/GHSA-m64q-4jqh-f72f https://github.com/exponentcms/exponent-cms/issues/73 https://github.com/extramaster/bchunk/issues/2 https://github.com/extramaster/bchunk/issues/3 https://github.com/extramaster/bchunk/issues/4 +https://github.com/ez-lbz/poc/issues/1 +https://github.com/ez-lbz/poc/issues/10 +https://github.com/ez-lbz/poc/issues/11 +https://github.com/ez-lbz/poc/issues/12 +https://github.com/ez-lbz/poc/issues/13 +https://github.com/ez-lbz/poc/issues/14 +https://github.com/ez-lbz/poc/issues/15 +https://github.com/ez-lbz/poc/issues/16 +https://github.com/ez-lbz/poc/issues/17 +https://github.com/ez-lbz/poc/issues/18 https://github.com/ez-lbz/poc/issues/19 https://github.com/ez-lbz/poc/issues/20 +https://github.com/ez-lbz/poc/issues/22 +https://github.com/ez-lbz/poc/issues/23 +https://github.com/ez-lbz/poc/issues/24 +https://github.com/ez-lbz/poc/issues/25 +https://github.com/ez-lbz/poc/issues/26 +https://github.com/ez-lbz/poc/issues/27 +https://github.com/ez-lbz/poc/issues/28 +https://github.com/ez-lbz/poc/issues/29 +https://github.com/ez-lbz/poc/issues/3 +https://github.com/ez-lbz/poc/issues/30 +https://github.com/ez-lbz/poc/issues/31 +https://github.com/ez-lbz/poc/issues/32 +https://github.com/ez-lbz/poc/issues/33 +https://github.com/ez-lbz/poc/issues/34 +https://github.com/ez-lbz/poc/issues/35 +https://github.com/ez-lbz/poc/issues/36 +https://github.com/ez-lbz/poc/issues/37 +https://github.com/ez-lbz/poc/issues/38 +https://github.com/ez-lbz/poc/issues/39 +https://github.com/ez-lbz/poc/issues/4 +https://github.com/ez-lbz/poc/issues/40 +https://github.com/ez-lbz/poc/issues/41 +https://github.com/ez-lbz/poc/issues/42 +https://github.com/ez-lbz/poc/issues/43 +https://github.com/ez-lbz/poc/issues/44 +https://github.com/ez-lbz/poc/issues/45 https://github.com/ez-lbz/poc/issues/46 https://github.com/ez-lbz/poc/issues/46#issue-3354477952 https://github.com/ez-lbz/poc/issues/47 https://github.com/ez-lbz/poc/issues/47#issue-3354493935 +https://github.com/ez-lbz/poc/issues/5 https://github.com/ez-lbz/poc/issues/50 https://github.com/ez-lbz/poc/issues/50#issue-3389830879 https://github.com/ez-lbz/poc/issues/51 https://github.com/ez-lbz/poc/issues/51#issue-3391023368 +https://github.com/ez-lbz/poc/issues/6 https://github.com/f000x0/cve/issues/2 https://github.com/f4rs1ght/vuln-research/tree/main/CVE-2024-37877 https://github.com/fabiolb/fabio/security/advisories/GHSA-q7p4-7xjv-j3wf +https://github.com/facebook/proxygen/pull/466 https://github.com/factionsecurity/faction/security/advisories/GHSA-97cv-f342-v2jc https://github.com/faizzaidi/Admidio-3.2.8-CSRF-POC-by-Provensec-llc https://github.com/faizzaidi/Blackcat-cms-v1.2-xss-POC-by-Provensec-llc @@ -117883,12 +119772,15 @@ https://github.com/faizzaidi/Zurmo-Stable-3.1.1-XSS-By-Provensec-LLC https://github.com/fastify/fastify/security/policy https://github.com/fatdog957/CVE-/issues/1 https://github.com/faucetsdn/ryu/issues/190 +https://github.com/faucetsdn/ryu/issues/191 https://github.com/faucetsdn/ryu/issues/192 https://github.com/faucetsdn/ryu/issues/193 https://github.com/faucetsdn/ryu/issues/194 https://github.com/faucetsdn/ryu/issues/195 https://github.com/fdbao/UsualToolCMS/issues/1 https://github.com/federella/CVE-2023-41717 +https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md +https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md#poc https://github.com/fengzipan/cve/blob/master/tmp30/tmp30/report.md https://github.com/feross/bittorrent-dht/issues/87 https://github.com/fezzyang/CVE_report/blob/main/online-veterinary-appointment-system/SQLi.md @@ -117942,11 +119834,16 @@ https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#15 https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#2 https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#3 https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#9 +https://github.com/frdel/agent-zero/issues/383 +https://github.com/frdel/agent-zero/issues/383#issuecomment-2893239897 https://github.com/freeswitch/sofia-sip/security/advisories/GHSA-8599-x7rq-fr54 +https://github.com/freshfish-hust/my-cves/issues/1 +https://github.com/freshfish-hust/my-cves/issues/2 https://github.com/freshfish-hust/my-cves/issues/5 https://github.com/freshfish-hust/my-cves/issues/5#issue-3286622393 https://github.com/freshfish-hust/my-cves/issues/6 https://github.com/freshfish-hust/my-cves/issues/6#issue-3287078206 +https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-06-18-helpdesk.md https://github.com/frohoff/ysoserial https://github.com/frohoff/ysoserial/ https://github.com/frohoff/ysoserial/pull/13 @@ -117957,10 +119854,16 @@ https://github.com/froxlor/Froxlor/security/advisories/GHSA-x525-54hf-xr53 https://github.com/frozeman/feindura-flat-file-cms/issues/29 https://github.com/fs0c131y/ESFileExplorerOpenPortVuln https://github.com/fu2x2000/Liferay_exploit_Poc +https://github.com/furk4nyildiz/CVE-2025-50754-PoC https://github.com/g1an123/POC/blob/main/README.md https://github.com/g1an123/POC/blob/main/Unauthorized%20file%20deletion.md https://github.com/g1an123/POC/blob/main/Unauthorized%20file%20upload%20getshell.md +https://github.com/gabime/spdlog/issues/3360 +https://github.com/gabime/spdlog/issues/3360#issuecomment-2729579422 https://github.com/galaxyproject/galaxy/security/advisories/GHSA-vf5q-r8p9-35xh +https://github.com/ganzhi-qcy/cve/issues/10 +https://github.com/ganzhi-qcy/cve/issues/11 +https://github.com/ganzhi-qcy/cve/issues/12 https://github.com/ganzhi-qcy/cve/issues/16 https://github.com/ganzhi-qcy/cve/issues/17 https://github.com/ganzhi-qcy/cve/issues/18 @@ -117970,6 +119873,7 @@ https://github.com/ganzhi-qcy/cve/issues/21 https://github.com/ganzhi-qcy/cve/issues/22 https://github.com/ganzhi-qcy/cve/issues/25 https://github.com/ganzhi-qcy/cve/issues/3 +https://github.com/ganzhi-qcy/cve/issues/4 https://github.com/gaozhifeng/PHPMyWind/issues/15 https://github.com/gaozhifeng/PHPMyWind/issues/9 https://github.com/garboa/cve_3/blob/main/Upload2.md @@ -117981,6 +119885,7 @@ https://github.com/gelbphoenix/autocaliweb/security/advisories/GHSA-44vp-wgh9-95 https://github.com/gerwout/CVE-2019-9596-and-CVE-2019-9597/blob/master/poc.html https://github.com/getformwork/formwork/security/advisories/GHSA-5pxr-7m4j-jjc6 https://github.com/getgrav/grav/security/advisories/GHSA-f6g2-h7qv-3m5v +https://github.com/getgrav/grav/security/advisories/GHSA-f8v5-jmfh-pr69 https://github.com/getgrav/grav/security/advisories/GHSA-m7hx-hw6h-mqmc https://github.com/geyang/ml-logger/issues/72 https://github.com/geyang/ml-logger/issues/73 @@ -117999,6 +119904,8 @@ https://github.com/github/cmark-gfm/security/advisories/GHSA-c944-cv5f-hpvr https://github.com/github/cmark-gfm/security/advisories/GHSA-r572-jvj2-3m8p https://github.com/github/codeql-action/security/advisories/GHSA-vqf5-2xx6-9wfm https://github.com/givanz/Vvveb/issues/323 +https://github.com/givanz/VvvebJs/issues/409 +https://github.com/givanz/VvvebJs/issues/409#issue-3235569867 https://github.com/gleez/cms/issues/802 https://github.com/glennrp/libpng/issues/269 https://github.com/glennrp/libpng/issues/307 @@ -118010,20 +119917,30 @@ https://github.com/glkfc/IoT-Vulnerability/blob/main/LB-LINK/LB-LINK_mac%20Unaut https://github.com/glkfc/IoT-Vulnerability/blob/main/LB-LINK/LB-LINK_routepwd%20Indicates%20the%20unauthorized%20command%20injection/LB-LINK_routepwd%20command%20injection.md https://github.com/glpi-project/glpi-inventory-plugin/security/advisories/GHSA-h6x9-jm98-cw7c https://github.com/glpi-project/glpi/issues/1047 +https://github.com/glpi-project/glpi/security/advisories/GHSA-jwpv-7m4h-5gvc https://github.com/gnuboard/gnuboard5/issues/318 https://github.com/gnuboard/gnuboard5/issues/319 https://github.com/gnuboard/gnuboard5/issues/320 https://github.com/gogs/gogs/issues/5372 https://github.com/gogs/gogs/security/advisories/GHSA-xh32-cx6c-cp4v +https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Boa%20-%20BOF/formMapDelDevice%20PoC.md +https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Boa%20-%20BOF/formPortFw%20PoC.md https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Boa%20-%20Command%20Injection/PoC%201.md +https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Boa%20-%20Command%20Injection/PoC%202.md https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Boa%20-%20Command%20Injection/PoC%203.md +https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Eval%20Injection/PoC.md +https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Telnet/PoC.md https://github.com/gomarkdown/markdown/security/advisories/GHSA-m9xq-6h2j-65r2 https://github.com/gongfuxiang/schoolcms/issues/1 +https://github.com/gooaclok819/sublinkX/issues/68 +https://github.com/gooaclok819/sublinkX/issues/68#issuecomment-2957290524 https://github.com/google/security-research/security/advisories/GHSA-39q3-f8jq-v6mg https://github.com/google/security-research/security/advisories/GHSA-7f33-f4f5-xwgw +https://github.com/google/security-research/security/advisories/GHSA-9x5g-vmxf-4qj8 https://github.com/google/security-research/security/advisories/GHSA-f5pg-7wfw-84q9 https://github.com/google/security-research/security/advisories/GHSA-g69r-8jwh-2462 https://github.com/google/security-research/security/advisories/GHSA-gg9x-v835-m48q +https://github.com/google/security-research/security/advisories/GHSA-jg27-jx6w-xwph https://github.com/google/security-research/security/advisories/GHSA-r7m9-grw7-vcc4 https://github.com/google/security-research/security/advisories/GHSA-xrg4-qp5w-2c3w https://github.com/gopro/gpmf-parser/issues/74 @@ -118034,6 +119951,7 @@ https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3 https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh https://github.com/gottburgm/Exploits/tree/master/CVE-2017-12149 https://github.com/gottburgm/Exploits/tree/master/CVE-2017-3169 +https://github.com/gozan10/cve/issues/17 https://github.com/gpac/gpac/commit/893fb99b606eebfae46cde151846a980e689039b https://github.com/gpac/gpac/issues/1263 https://github.com/gpac/gpac/issues/1264 @@ -118080,13 +119998,18 @@ https://github.com/gpac/gpac/issues/2067 https://github.com/gpac/gpac/issues/2108 https://github.com/gpac/gpac/issues/2109 https://github.com/gpac/gpac/issues/2120 +https://github.com/gpac/gpac/issues/2396 https://github.com/gpac/gpac/issues/2567 https://github.com/gradio-app/gradio/security/advisories/GHSA-8jw3-6x8j-v96g https://github.com/gradio-app/gradio/security/advisories/GHSA-rhm9-gp5p-5248 +https://github.com/grpc/grpc-go/pull/6703 https://github.com/gteissier/CVE-2016-6271 https://github.com/gunet/openeclass/issues/11 https://github.com/gunet/openeclass/issues/39 +https://github.com/guoma-book/CVE/issues/1 https://github.com/guoma-book/CVE/issues/2 +https://github.com/guoma-book/CVE/issues/3 +https://github.com/guoma-book/CVE/issues/4 https://github.com/guoma-book/CVE/issues/6 https://github.com/guoma-book/CVE/issues/7 https://github.com/guoma-book/CVE/issues/8 @@ -118097,10 +120020,15 @@ https://github.com/guttlefish/vul/issues/8 https://github.com/guttlefish/vul/issues/9 https://github.com/guy-liu/yith-giftdrop https://github.com/gwenn/lemon-rs/issues/86 +https://github.com/h2o/h2o/pull/3291 https://github.com/hackerlib/hackerlib-vul/tree/master/gnome https://github.com/hackerlib/hackerlib-vul/tree/master/potrace/heap-buffer-overflow-mkbitmap https://github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/heap-buffer-overflow/print-pim https://github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/heap-buffer-overflow/util-print +https://github.com/hackerwahab/CS-Cart-Vulns/blob/main/CVE-2025-50847.md +https://github.com/hackerwahab/CS-Cart-Vulns/blob/main/CVE-2025-50850.md +https://github.com/hackmdio/codimd/issues/1910 +https://github.com/hacksparrow/safe-eval/issues/19 https://github.com/hacksparrow/safe-eval/issues/5 https://github.com/hacky1997/CVE-2020-8825 https://github.com/haiwen/seafile-client/issues/1309 @@ -118113,6 +120041,7 @@ https://github.com/haluka92/CVE-2025-47423 https://github.com/hamkovic/Admidio-3.2.5-SQLi https://github.com/hannob/optionsbleed https://github.com/hapijs/hapi/issues/3466 +https://github.com/haproxy/haproxy/issues/2312 https://github.com/haxtheweb/issues/security/advisories/GHSA-fvx2-x7ff-fc56 https://github.com/haxtheweb/issues/security/advisories/GHSA-g4cf-pp4x-hqgw https://github.com/haxtheweb/issues/security/advisories/GHSA-hxrr-x32w-cg8g @@ -118121,39 +120050,63 @@ https://github.com/haxtheweb/issues/security/advisories/GHSA-vj5q-3jv2-cg5p https://github.com/hbuzs/CVE/issues/1 https://github.com/hbuzs/CVE/issues/3 https://github.com/heiheiworld/cve/blob/main/cve-h.md +https://github.com/heiheixz/report/blob/main/sk_1.md https://github.com/heimdal/heimdal/issues/353 https://github.com/heling-520/CVE/issues/1 +https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-29228.md +https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-29230.md https://github.com/hessandrew/CVE-2019-17124 https://github.com/hfiref0x/LightFTP/issues/5 https://github.com/hhhhu8045759/619L_upnpd_heapoverflow https://github.com/hhhhu8045759/dir_619l-buffer-overflow https://github.com/hhhhu8045759/dlink-619l-buffer_overflow https://github.com/himanshubindra/CVEs/blob/main/CVE-2024-37803 +https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-f2f7-gj54-6vpv https://github.com/hjsjbsg/record-for-own/issues/1 https://github.com/hjsjbsg/record-for-own/issues/2 https://github.com/hjsjbsg/record-for-own/issues/3 https://github.com/hjsjbsg/record-for-own/issues/4 +https://github.com/hkerma/opa-gatekeeper-concurrency-issue https://github.com/hoene/libmysofa/issues/67 https://github.com/hoene/libmysofa/issues/84 https://github.com/holychang/maccms8/blob/master/xss2 +https://github.com/honestcorrupt/-CVE-Proof-of-Concept-Airtel-Android-App-Insecure-Local-Storage-of-Sensitive-Data +https://github.com/honorseclab/vulns/blob/main/dromara_MaxKey/SSRF.md +https://github.com/honorseclab/vulns/blob/main/dromara_MaxKey/SSRF.md#vulnerability-verification https://github.com/honysyang/Xinference/blob/main/Xinference_Web/Xinference_Web_EN.docx https://github.com/honysyang/Xinference/tree/main/Xinference_Web +https://github.com/hoppscotch/hoppscotch-extension/security/advisories/GHSA-jjh5-pvqx-gg5v https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-8r6h-8r68-q3pp https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-qmmm-73r2-f8xr https://github.com/horde/horde/commit/eb3afd14c22c77ae0d29e2848f5ac726ef6e7c5b https://github.com/horilla-opensource/horilla/security/advisories/GHSA-99h5-x29f-727w +https://github.com/horilla-opensource/horilla/security/advisories/GHSA-h6qj-pwmx-wjhw https://github.com/horilla-opensource/horilla/security/advisories/GHSA-w242-xv47-j55r https://github.com/hosakauk/exploits/blob/master/listserv_report_xss.MD +https://github.com/ht4266394/cve/issues/1 +https://github.com/htacg/tidy-html5/issues/1141 +https://github.com/htacg/tidy-html5/issues/1142 +https://github.com/htacg/tidy-html5/issues/1152 https://github.com/htacg/tidy-html5/issues/588 https://github.com/htacg/tidy-html5/issues/656 https://github.com/httl/httl/issues/225 https://github.com/hu1y40/PoC/blob/main/rtspserver_stackoverflow_poc.py +https://github.com/huangtinlin/CVE/issues/1 https://github.com/hujianjie123/vuln/blob/main/Tenda/SetFirewallCfg/readme.md https://github.com/hundanchen69/bug_report/blob/main/vendors/janobe/Online%20Reviewer%20Management%20System/XSS-1.md +https://github.com/hunzi0/Vullnfo/tree/main/Tenda/AC18/formSetPPTPServer +https://github.com/hyfhacker/cve/blob/main/README.md https://github.com/hyperledger/indy-node/blob/master/CHANGELOG.md#1123 https://github.com/hyperledger/indy-node/security/advisories/GHSA-wh2w-39f4-rpv2 https://github.com/hyx123123/cve1/blob/main/README.md https://github.com/hyx123123/cve1/blob/main/cve2.md +https://github.com/i-Corner/cve/issues/10 +https://github.com/i-Corner/cve/issues/11 +https://github.com/i-Corner/cve/issues/12 +https://github.com/i-Corner/cve/issues/13 +https://github.com/i-Corner/cve/issues/14 +https://github.com/i-Corner/cve/issues/15 +https://github.com/i-Corner/cve/issues/16 https://github.com/i-Corner/cve/issues/17 https://github.com/i-Corner/cve/issues/18 https://github.com/i-Corner/cve/issues/21 @@ -118186,27 +120139,36 @@ https://github.com/intelliants/subrion/issues/570 https://github.com/intelliants/subrion/issues/845 https://github.com/intelliants/subrion/issues/890 https://github.com/intercpt/XSS1/blob/main/Directorylisting.md +https://github.com/intercpt/XSS1/blob/main/SQL.md https://github.com/intercpt/XSS1/blob/main/SQL1.md https://github.com/intercpt/XSS1/blob/main/SQL10.md https://github.com/intercpt/XSS1/blob/main/SQL11.md +https://github.com/intercpt/XSS1/blob/main/SQL12.md +https://github.com/intercpt/XSS1/blob/main/SQL5.md +https://github.com/intercpt/XSS1/blob/main/SQL6.md https://github.com/intercpt/XSS1/blob/main/SQL7.md https://github.com/intlify/vue-i18n/security/advisories/GHSA-p2ph-7g93-hw3m https://github.com/intridea/omniauth-oauth2/pull/25 +https://github.com/intruderlabs/cvex/blob/main/Pixeon/WebLaudos/Directory-Traversal/README.md https://github.com/invoiceninja/invoiceninja/issues/1727 https://github.com/ionize/ionize/issues/393 https://github.com/ioprojecton/dir-3040_dos https://github.com/iotresearch/iot-vuln/blob/main/Tenda/FH1201/DhcpListClient/README.md https://github.com/iotresearch/iot-vuln/blob/main/Tenda/FH1201/DhcpListClient2/README.md https://github.com/iotresearch/iot-vuln/blob/main/Tenda/FH1201/QuickIndex/QuickIndex.md +https://github.com/iotresearch/iot-vuln/blob/main/Tenda/FH1201/addressNat/README.md https://github.com/iotresearch/iot-vuln/tree/main/Tenda/FH1201/setcfm https://github.com/iputils/iputils/issues/584 https://github.com/iputils/iputils/security/advisories/GHSA-25fr-jw29-74f9 https://github.com/irsl/ADB-Backup-APK-Injection/ +https://github.com/irsl/CVE-2020-1967 https://github.com/irsl/jackson-rce-via-spel/ https://github.com/irsl/knc-memory-exhaustion/ https://github.com/ismailerkek/CVEs/blob/main/CVE-2020-19762-RESERVED.md https://github.com/italia/cie-aspnetcore/security/advisories/GHSA-vq63-8f72-f486 https://github.com/italia/spid-aspnetcore/security/advisories/GHSA-36h8-r92j-w9vw +https://github.com/iterate-ch/cyberduck/security/advisories/GHSA-688c-vjrc-84rv +https://github.com/iterate-ch/cyberduck/security/advisories/GHSA-vjjc-grpp-m655 https://github.com/itssixtyn3in/CVE-2023-42222 https://github.com/ivoschyk-cs/CVE-s/blob/master/Email%20Subscribers%20%26%20Newsletters%20Wordpress%20Plugin%20%28XSS%29 https://github.com/ixSly/CVE-2022-41401 @@ -118217,15 +120179,22 @@ https://github.com/jackhong1236/cve_0/blob/main/12/tmp25/report.md https://github.com/jacobwb/hashover-next/issues/152 https://github.com/jadacheng/vulnerability/blob/master/Metinfo6.x/MetInfo.md https://github.com/jahithoque/Vulnerability-Research/tree/main/CVE-2024-51408 +https://github.com/janssensjelle/published-pocs/blob/main/openxe-xss-ticket.md https://github.com/janssensjelle/published-pocs/blob/main/weberp-xss-confirm-dispatch.md https://github.com/jarradseers/config-handler/issues/1 https://github.com/jasonjoh/php-calendar/issues/4 +https://github.com/jasper-software/jasper/commit/bb7d62bd0a2a8e0e1fdb4d603f3305f955158c52 +https://github.com/jasper-software/jasper/issues/259 +https://github.com/jasper-software/jasper/issues/400 +https://github.com/jasper-software/jasper/issues/400#issuecomment-3134702772 https://github.com/jaygreig86/dmitry/issues/4 +https://github.com/jayus0821/insight/blob/master/ClipperCMS%20SSRF.md https://github.com/jbeder/yaml-cpp/issues/657 https://github.com/jbeder/yaml-cpp/issues/660 https://github.com/jbroadway/elefant/issues/285 https://github.com/jbroadway/elefant/issues/286 https://github.com/jbroadway/elefant/issues/287 +https://github.com/jcubic/jquery.terminal/issues/727 https://github.com/jeanmarc77/123solar/issues/73 https://github.com/jeanmarc77/123solar/issues/73#issuecomment-2357648077 https://github.com/jeanmarc77/123solar/issues/74 @@ -118248,17 +120217,26 @@ https://github.com/jhipster/generator-jhipster/issues/10401 https://github.com/jhipster/jhipster-kotlin/issues/183 https://github.com/jianx0i/CVE/issues/1 https://github.com/jianyan74/TinyShop/issues/14 +https://github.com/jingping911/tendaAC23overflow/blob/main/README.md +https://github.com/jishenghua/jshERP/issues/125 +https://github.com/jishenghua/jshERP/issues/126 https://github.com/jmurty/java-xmlbuilder/issues/6 +https://github.com/joblib/joblib/issues/1582 https://github.com/johnawm/vulner-box/blob/master/TRENDNet/TEW-820AP/02/README.md https://github.com/joinia/webray.com.cn/blob/main/Loan-Management-System/lmssql%20-%20deleteltype.md +https://github.com/joinia/webray.com.cn/blob/main/Loan-Management-System/lmssql%20-%20deleteuser.md +https://github.com/joinia/webray.com.cn/blob/main/Pet-grooming-management-software/petgrooming-sql-ajaxpro.md https://github.com/joinia/webray.com.cn/blob/main/Pet-grooming-management-software/petgrooming-sql-ajaxrepresent.md https://github.com/joinia/webray.com.cn/blob/main/Pet-grooming-management-software/petgrooming-sql-barcode.md https://github.com/joinia/webray.com.cn/blob/main/Pet-grooming-management-software/petgrooming-upload-user.md +https://github.com/joker-vip/cvesubmit/issues/1 https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-4p4p-vq2v-9489 +https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-h4x5-vr54-vjrx https://github.com/jomskiller/Employee-Management-System---Stored-XSS https://github.com/jomskiller/Employee-Management-System---Stored-XSS/ https://github.com/jomskiller/Employee-Managemet-System---Broken-Access-Control https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170 +https://github.com/jpatokal/openflights/issues/1478 https://github.com/jqlang/jq/issues/3393 https://github.com/jqlang/jq/security/advisories/GHSA-p7rr-28xf-3m5w https://github.com/jqlang/jq/security/advisories/GHSA-rmjp-cr27-wpg2 @@ -118272,10 +120250,20 @@ https://github.com/jtdowney/private_address_check/issues/1 https://github.com/jtesta/gog_galaxy_client_service_poc https://github.com/jtesta/gog_galaxy_client_service_poc/issues/1#issuecomment-926932218 https://github.com/jubilianite/flusity-CMS/security/advisories/GHSA-5843-5m74-7fqh +https://github.com/jue22/cve/issues/1 +https://github.com/juju/utils/security/advisories/GHSA-h34r-jxqm-qgpr +https://github.com/jujubooom/CVE/issues/1 https://github.com/juliangruber/brace-expansion/pull/65/commits/a5b98a4f30d7813266b221435e1eaaf25a1b0ac5 https://github.com/jupyter/nbconvert/security/advisories/GHSA-9jmq-rx5f-8jwq +https://github.com/justconter/cve/issues/1 +https://github.com/justconter/cve/issues/2 +https://github.com/justdan96/tsMuxer/issues/423 https://github.com/justdan96/tsMuxer/issues/424 https://github.com/justdan96/tsMuxer/issues/426 +https://github.com/justdan96/tsMuxer/issues/427 +https://github.com/justdan96/tsMuxer/issues/428 +https://github.com/justdan96/tsMuxer/issues/846 +https://github.com/justinas/nosurf-cve-2025-46721 https://github.com/justinhunt/moodle-filter_poodll/issues/23 https://github.com/justinsteven/advisories/blob/master/2017_rbenv_ruby_version_directory_traversal.md https://github.com/justinsteven/advisories/blob/master/2017_rvm_cd_command_execution.md @@ -118294,22 +120282,41 @@ https://github.com/k0keoyo/Vir.IT-explorer-Anti-Virus-Null-Pointer-Reference-PoC https://github.com/k0keoyo/Vir.IT-explorer-Anti-Virus-Null-Pointer-Reference-PoC/tree/master/VirIT_NullPointerReference1 https://github.com/k0keoyo/Vir.IT-explorer-Anti-Virus-Null-Pointer-Reference-PoC/tree/master/VirIT_NullPointerReference_0x82730010 https://github.com/kafbat/kafka-ui/security/advisories/GHSA-g3mf-c374-fgh2 +https://github.com/kaisersource/kaisersource.github.io/blob/main/_posts/2021-01-17-dsl-n14u.md +https://github.com/kakalalaww/CVE/issues/11 +https://github.com/kakalalaww/CVE/issues/12 +https://github.com/kakalalaww/CVE/issues/14 https://github.com/kakalalaww/CVE/issues/17 +https://github.com/kakalalaww/CVE/issues/18 +https://github.com/kakalalaww/CVE/issues/19 https://github.com/kakalalaww/CVE/issues/5 https://github.com/kakalalaww/CVE/issues/6 https://github.com/kakalalaww/CVE/issues/8 +https://github.com/kali-001/cve/issues/1 +https://github.com/kali-001/cve/issues/2 +https://github.com/kali-001/cve/issues/3 https://github.com/kaltura/server/issues/5303 +https://github.com/kanboard/kanboard/security/advisories/GHSA-26f4-rx96-xc55 +https://github.com/kanboard/kanboard/security/advisories/GHSA-359x-c69j-q64r +https://github.com/kanboard/kanboard/security/advisories/GHSA-5wj3-c9v4-pj9v https://github.com/kanboard/kanboard/security/advisories/GHSA-78pf-vg56-5p8v https://github.com/kanboard/kanboard/security/advisories/GHSA-jvff-x577-j95p https://github.com/kangsf1989/2025/issues/1 +https://github.com/kazu-yamamoto/http2/issues/93 +https://github.com/kbhjt/cve/issues/3 https://github.com/kbni/owlky https://github.com/keepgoing2077/cve/issues/1 https://github.com/keepinggg/poc/blob/main/poc_of_swfdump/poc https://github.com/keepinggg/poc/tree/main/poc_of_swfdump +https://github.com/kekingcn/kkFileView/issues/304 https://github.com/kele28886/cve/issues/1 https://github.com/keras-team/keras/security/advisories/GHSA-36rr-ww3j-vrjv https://github.com/kermitt2/pdfalto/issues/46 +https://github.com/kevinroleke/security/tree/main/CVE-2025-46011 +https://github.com/khankishiyev-j/bug-bounty/blob/main/proxmox-xss +https://github.com/kilooooo/cms/blob/main/1.md https://github.com/kings-way/deepinhack/blob/master/dde_daemon_poc.py +https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/264 https://github.com/kirillwow/ids_bypass https://github.com/kjur/jsrsasign/issues/437 https://github.com/kjur/jsrsasign/issues/438 @@ -118332,9 +120339,13 @@ https://github.com/knik0/faad2/issues/56 https://github.com/knik0/faad2/issues/57 https://github.com/knik0/faad2/issues/58 https://github.com/knik0/faad2/issues/60 +https://github.com/koajs/koa/issues/1892 +https://github.com/koajs/koa/issues/1892#issue-3213028583 https://github.com/koajs/koa/security/advisories/GHSA-x2rg-q646-7m2v https://github.com/koevas257/cve/blob/main/sql.md https://github.com/kohler/gifsicle/issues/140 +https://github.com/kohler/gifsicle/issues/195 +https://github.com/kohler/gifsicle/issues/65 https://github.com/komari-monitor/komari/security/advisories/GHSA-q355-h244-969h https://github.com/koto/exceed-mitm https://github.com/koyomihack00/CVE-2025-47226/blob/main/PoC/idor-exploit.md @@ -118347,10 +120358,13 @@ https://github.com/krb5/krb5/commit/dc7ed55c689d57de7f7408b34631bf06fec9dab1 https://github.com/krb5/krb5/commit/e3b5a5e5267818c97750b266df50b6a3d4649604 https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73 https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f +https://github.com/krispybyte/CVE-2025-55763 https://github.com/kuaifan/dootask/issues/210 https://github.com/kubernetes/kubernetes/issues/97076 https://github.com/kutsa1/My-CVE/tree/main/CVE-2024-51211 +https://github.com/kvz/locutus/pull/418/ https://github.com/kwerty138/Reflected-XSS-in-Vvveb-CMS-v1.0.7.2 +https://github.com/kwerty138/Session-Fixation-in-Vvveb-CMS-v1.0.6.1 https://github.com/kyverno/kyverno/security/advisories/GHSA-r5p3-955p-5ggq https://github.com/kyz/libmspack/issues/27 https://github.com/l8BL/vul_report/issues/1 @@ -118369,8 +120383,13 @@ https://github.com/lan041221/cvec/issues/18 https://github.com/lan041221/cvec/issues/2 https://github.com/lan041221/cvec/issues/22 https://github.com/lan041221/cvec/issues/23 +https://github.com/lan041221/cvec/issues/3 https://github.com/lan041221/cvec/issues/4 +https://github.com/lan041221/cvec/issues/5 +https://github.com/lan041221/cvec/issues/6 +https://github.com/lan041221/cvec/issues/7 https://github.com/lan041221/cvec/issues/8 +https://github.com/langflow-ai/langflow/security/advisories/GHSA-4gv9-mp8m-592r https://github.com/langfuse/langfuse/issues/8522 https://github.com/langfuse/langfuse/issues/8522#issue-3320549867 https://github.com/langgenius/dify/security/advisories/GHSA-gg5w-m2vw-vmmj @@ -118378,9 +120397,11 @@ https://github.com/langgenius/dify/security/advisories/GHSA-grmh-ww4v-5cgj https://github.com/langgenius/dify/security/advisories/GHSA-hqcx-598m-pjq4 https://github.com/langgenius/dify/security/advisories/GHSA-jp6m-v4gw-5vgp https://github.com/langhsu/mblog/issues/27 +https://github.com/langroid/langroid/security/advisories/GHSA-pw95-88fg-3j6f https://github.com/lara-zeus/dynamic-dashboard/security/advisories/GHSA-c6cw-g7fc-4gwc https://github.com/latte-soft/kartlanpwn https://github.com/laurent22/joplin/security/advisories/GHSA-5w3c-wph9-hq92 +https://github.com/laurent22/joplin/security/advisories/GHSA-5xv6-7jm3-fmg5 https://github.com/laurent22/joplin/security/advisories/GHSA-xj67-649m-3p8x https://github.com/ldenoue/pdftojson/issues/3 https://github.com/ldenoue/pdftojson/issues/4 @@ -118390,6 +120411,7 @@ https://github.com/learnsec6/test/issues/1 https://github.com/leesavide/abcm2ps/issues/83 https://github.com/leesavide/abcm2ps/issues/84 https://github.com/leesavide/abcm2ps/issues/85 +https://github.com/lemon8866/StreamVault/security/advisories/GHSA-qg4r-92hv-g9f4 https://github.com/leonW7/D-Link/blob/master/Vul_2.md https://github.com/leonW7/D-Link/blob/master/Vul_3.md https://github.com/leonW7/D-Link/blob/master/Vul_4.md @@ -118438,6 +120460,14 @@ https://github.com/libming/libming/issues/202 https://github.com/libming/libming/issues/203 https://github.com/libming/libming/issues/204 https://github.com/libming/libming/issues/205 +https://github.com/libming/libming/issues/322 +https://github.com/libming/libming/issues/323 +https://github.com/libming/libming/issues/324 +https://github.com/libming/libming/issues/325 +https://github.com/libming/libming/issues/326 +https://github.com/libming/libming/issues/327 +https://github.com/libming/libming/issues/328 +https://github.com/libming/libming/issues/329 https://github.com/libming/libming/issues/85 https://github.com/libming/libming/issues/86 https://github.com/libming/libming/issues/98 @@ -118477,19 +120507,35 @@ https://github.com/lin-3-start/lin-cve/blob/main/TOTOLINK%20A720R/TOTOLINK-A720R https://github.com/lin-3-start/lin-cve/blob/main/TOTOLINK%20A720R/TOTOLINK-A720R.md#poc https://github.com/lin-3-start/lin-cve/blob/main/Telesquare%20Tlr-2005Ksh/Telesquare%20Tlr-2005Ksh%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md https://github.com/lin-3-start/lin-cve/blob/main/Telesquare%20Tlr-2005Ksh/Telesquare%20Tlr-2005Ksh%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md#3poc +https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC20-2/Tenda%20AC20-2.md +https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC20-2/Tenda%20AC20-2.md#poc +https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC20/Tenda%20AC20.md +https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC20/Tenda%20AC20.md#3-poc https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC21/Tenda%20AC21%20Buffer%20overflow.md https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC21/Tenda%20AC21%20Buffer%20overflow.md#poc https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC23-3/Tenda%20AC23%20Buffer%20overflow.md https://github.com/lin-3-start/lin-cve/blob/main/UTT%201200GW-1/UTT%201200GW-1.md +https://github.com/lin-3-start/lin-cve/blob/main/UTT%201200GW-2/UTT%201200GW-2.md https://github.com/lin-3-start/lin-cve/blob/main/Wavlink/Wavlink.md https://github.com/lin-3-start/lin-cve/blob/main/Wavlink/Wavlink.md#poc +https://github.com/lin-3-start/lin-cve/issues/1 https://github.com/lin-3-start/lin-cve/issues/2 https://github.com/lin-3-start/lin-cve/issues/3 https://github.com/lin-3-start/lin-cve/issues/4 +https://github.com/line/armeria/pull/5232 +https://github.com/line2222/vuln/issues/2 +https://github.com/line2222/vuln/issues/5 https://github.com/linkwarden/linkwarden/security/advisories/GHSA-rfc2-x8hr-536q +https://github.com/linlinjava/litemall/issues/564 +https://github.com/linlinjava/litemall/issues/564#issue-3267670352 +https://github.com/linlinjava/litemall/issues/565 +https://github.com/linlinjava/litemall/issues/565#issue-3267850415 https://github.com/linlinjava/litemall/issues/566 https://github.com/linlinjava/litemall/issues/566#issue-3267858791 +https://github.com/linlinjava/litemall/issues/567 +https://github.com/linlinjava/litemall/issues/567#issue-3268166914 https://github.com/lintian31/vpm-system/blob/main/Vehicle%20parking%20Management%20System.md +https://github.com/linuxserver/Heimdall/issues/1451 https://github.com/liong007/Zed-3/issues/1 https://github.com/lishihihi/voyager-issue-report/ https://github.com/lishuyuan12138/CVE/issues/1 @@ -118497,11 +120543,16 @@ https://github.com/litsasuk/CVE-POC/blob/main/CVE-2025-45997.md https://github.com/liu21st/onethink/issues/37 https://github.com/liujiaquan1122/cve/issues/2 https://github.com/livewire/livewire/security/advisories/GHSA-f3cx-396f-7jqp +https://github.com/liyako/vulnerability/blob/main/POC/Limbas-Blind-SQL-injection.md https://github.com/liyansong2018/CVE-2024-32258 https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-34201 https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-34202 +https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-34203 +https://github.com/lizhipay/faka/issues/22 https://github.com/lkncdy/cve/issues/1 +https://github.com/llixixi/cve/blob/main/D-LINK-DAR-7000_rce_%20mailrecvview.md https://github.com/lmfit/asteval/security/advisories/GHSA-3wwr-3g9f-9gc7 +https://github.com/lnbits/lnbits/security/advisories/GHSA-3j4h-h3fp-vwww https://github.com/lobehub/lobe-chat/security/advisories/GHSA-3fc8-2r3f-8wrg https://github.com/lobehub/lobe-chat/security/advisories/GHSA-mxhq-xw3g-rphc https://github.com/lobehub/lobe-chat/security/advisories/GHSA-p36r-qxgx-jq2v @@ -118514,10 +120565,17 @@ https://github.com/login-securite/CVE/blob/main/CVE-2020-16194.md https://github.com/logological/gpp/issues/26 https://github.com/lolo-pop/poc/tree/master/Segmentation%20fault%20in%20convert-test%28exiv2%29 https://github.com/louis-zly/myCVE/issues/1 +https://github.com/louis-zly/myCVE/issues/2 +https://github.com/louis-zly/myCVE/issues/3 +https://github.com/louislam/uptime-kuma/issues/5574 +https://github.com/louislam/uptime-kuma/security/advisories/GHSA-553g-fcpf-m3wp +https://github.com/louislam/uptime-kuma/security/advisories/GHSA-g9v2-wqcj-j99g +https://github.com/louislam/uptime-kuma/security/advisories/GHSA-wh8j-xr66-f296 https://github.com/loveqiaoshen/QiaoShenCVE/issues/1 https://github.com/lrjbsyh/CVE_Hunter/issues/11 https://github.com/lrjbsyh/CVE_Hunter/issues/11#issue-3354473207 https://github.com/lrjbsyh/CVE_Hunter/issues/12 +https://github.com/lrjbsyh/CVE_Hunter/issues/2#issue-3307768438 https://github.com/lrjbsyh/CVE_Hunter/issues/3 https://github.com/lrjbsyh/CVE_Hunter/issues/3#issue-3313419319 https://github.com/lrjbsyh/CVE_Hunter/issues/4 @@ -118532,40 +120590,66 @@ https://github.com/lrjbsyh/CVE_Hunter/issues/8#issue-3348441601 https://github.com/lrjbsyh/CVE_Hunter/issues/9#issue-3348584620 https://github.com/lsegal/yard/security/advisories/GHSA-8mq4-9jjh-9xrc https://github.com/lsh123/xmlsec/issues/43 +https://github.com/ltranquility/CVE/issues/13 https://github.com/ltranquility/CVE/issues/2 +https://github.com/ltranquility/CVE/issues/3 +https://github.com/ltranquility/CVE/issues/5 +https://github.com/ltranquility/CVE/issues/6 +https://github.com/ltranquility/CVE/issues/7 https://github.com/lucxssouza/CVE-2020-13886 https://github.com/luelueking/Databasir-1.0.7-vuln-poc https://github.com/lukevella/rallly/security/advisories/GHSA-gm8g-3r3j-48hv +https://github.com/lunbun/CVE-2025-55188/ https://github.com/luokuang1/CVE/issues/1 https://github.com/luokuang1/CVE/issues/2 +https://github.com/luqiut/iot/blob/main/DIR-645%20Stack%20overflow.md https://github.com/luvsn/OdZoo/tree/main/exploits/izi_data https://github.com/luvsn/OdZoo/tree/main/exploits/query_deluxe +https://github.com/luvsn/OdZoo/tree/main/exploits/text_commander https://github.com/luyisi-7/CVE/issues/1 https://github.com/luyisi-7/CVE/issues/2 https://github.com/lvandeve/lodepng/issues/177 https://github.com/lyg986443/cve/issues/2 https://github.com/lyg986443/cve/issues/4 +https://github.com/m3m0o/engeman-web-language-combobox-sqli https://github.com/m4b/bingrep/issues/30 https://github.com/maboroshinokiseki/scsir/issues/4 +https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc2.md +https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc4.md https://github.com/maelosoki/MaeloStore/issues/1 https://github.com/magicsword-io/LOLDrivers/issues/204 https://github.com/makeplane/plane/security/advisories/GHSA-39gx-38xf-c348 https://github.com/makeplane/plane/security/advisories/GHSA-cjh4-q763-cc48 +https://github.com/makeplane/plane/security/advisories/GHSA-rwjc-xhh3-m9m9 https://github.com/malerisch/omnivista-8770-unauth-rce +https://github.com/mano257200/Perplexity-AI-GPT-4-v.2.51.0/blob/main/README.md +https://github.com/mano257200/QloApps-VUL +https://github.com/mano257200/perplexity/blob/main/README.md https://github.com/mantisbt/mantisbt/pull/1094 https://github.com/manvel-khnkoyan/jpv/issues/10 https://github.com/marc-q/libwav/issues/24 +https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-8743.md https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9233.md https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9235.md https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9388.md https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/Stored%20XSS%20endpoint%20compound_events.shtm%20parameter%20name.md#poc +https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/Stored%20XSS%20endpoint%20maintenance_events.shtm%20parameter%20Alias.md#poc https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/Stored%20XSS%20endpoint%20view_edit.shtm%20parameter%20name.md#poc https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/Stored_XSS_endpoint_watch_list.shtm_parameter_name.md#poc +https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8511.md +https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8787.md +https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8788.md +https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9104.md +https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9105.md https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9106%20.md +https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9107.md https://github.com/marcelomulder/CVE/blob/main/i-diario/Reflected%20XSS%20endpoint%20search_autocomplete%20parameter%20q.md#poc +https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20diario-de-observacoes.(ID)%20in%20'Observa%C3%A7%C3%B5es-Descri%C3%A7%C3%A3o'%20parameter.md +https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20planos-de-aula-por-areas-de-conhecimento.(ID)%20in%20multiples%20parameters.md https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20planos-de-aulas-por-disciplina.(ID)%20in%20multiples%20parameters.md#poc https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20planos-de-ensino-por-areas-de-conhecimento.(ID)%20in%20multiples%20parameters.md#poc https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20planos-de-ensino-por-disciplina.(ID)%20in%20multiples%20parameters.md#poc +https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20registros-de-conteudos-por-disciplina.(ID)%20in%20multiples%20parameters.md https://github.com/marcelomulder/CVE/blob/main/i-educar/Broken%20Access%20Control%20%20in%20.matricula.(ID_STUDENT).enturmar.(ID_CLASS)%60%20Endpoint.md https://github.com/marcelomulder/CVE/blob/main/i-educar/Broken%20Access%20Control%20%E2%80%93%20Missing%20Function-Level%20Access%20Control%20in%20%60.educacenso.consulta%60%20Endpoint.md#poc https://github.com/marcelomulder/CVE/blob/main/i-educar/Broken%20Access%20Control%20Vulnerability%20%20in%20%60.enrollment-history.(ID)%60%20Endpoint.md @@ -118578,29 +120662,52 @@ https://github.com/marcelomulder/CVE/blob/main/i-educar/Broken%20Object%20Level% https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10012.md https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10013.md https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10070.md +https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10071.md https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10072.md https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10073.md https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10074.md https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10099.md https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10606.md +https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10607.md +https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8366.md https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8367.md +https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8369.md +https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8370.md +https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8507.md +https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8508.md +https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8509.md +https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8784.md +https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8785.md https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9236.md +https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9606.md https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9607.md https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9608.md https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9609.md https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9684.md https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9685.md https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9686.md +https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9687.md https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9760.md +https://github.com/marcelomulder/CVE/blob/main/i-educar/Cross-Site%20Scripting%20(XSS)%20Reflected%20endpoint%20%60.module.Configuracao.ConfiguracaoMovimentoGeral%60%20parameter%20%60tipoacao%60.md +https://github.com/marcelomulder/CVE/blob/main/i-educar/Cross-Site%20Scripting%20(XSS)%20Reflected%20endpoint%20%60agenda_preferencias.php%60%20parameter%20%60tipoacao%60.md https://github.com/marcelomulder/CVE/blob/main/i-educar/Cross-Site%20Scripting%20(XSS)%20Reflected%20endpoint%20%60educar_usuario_det.php%60%20parameter%20%60ref_pessoa%60.md https://github.com/marcelomulder/CVE/blob/main/i-educar/Cross-Site%20Scripting%20(XSS)%20Stored%20endpoint%20%60.usuarios.tipos.(ID)%60%20parameters%20%60Tipos%20de%20Usu%C3%A1rio%60,%20%60Descri%C3%A7%C3%A3o%60.md https://github.com/marcelomulder/CVE/blob/main/i-educar/Reflected%20XSS%20funcionario_vinculo_lst.php%20parameter%20nome.md +https://github.com/marcelomulder/CVE/blob/main/i-educar/Reflected%20XSS%20intranet.pesquisa_pessoa_lst.php_parameters_campo_busca_and_cpf.md +https://github.com/marcelomulder/CVE/blob/main/i-educar/Reflected%20XXS%20educar_avaliacao_desempenho_lst.md +https://github.com/marcelomulder/CVE/blob/main/i-educar/Reflected%20XXS%20educar_funcao_lst.md +https://github.com/marcelomulder/CVE/blob/main/i-educar/Reflected_XSS_endpoint_educar_usuario_lst.php_parameters_nm_pessoa,_matricula_and_matricula_interna.md +https://github.com/marcelomulder/CVE/blob/main/i-educar/SQL%20Injection%20(Blind%20Time-Based)%20Vulnerability%20in%20%60id%60%20Parameter%20on%20%60.module.AreaConhecimento.edit%60%20Endpoint.md https://github.com/marcelomulder/CVE/blob/main/i-educar/SQL%20Injection%20(Blind%20Time-Based)%20Vulnerability%20in%20%60id%60%20Parameter%20on%20%60.module.AreaConhecimento.view%60%20Endpoint.md https://github.com/marcelomulder/CVE/blob/main/i-educar/SQL%20Injection%20(Blind%20Time-Based)%20Vulnerability%20in%20%60id%60%20Parameter%20on%20%60.module.FormulaMedia.edit%60%20Endpoint.md https://github.com/marcelomulder/CVE/blob/main/i-educar/SQL%20Injection%20(Blind%20Time-Based)%20Vulnerability%20in%20%60id%60%20Parameter%20on%20%60.module.FormulaMedia.view%60%20Endpoint%201.md#poc https://github.com/marcelomulder/CVE/blob/main/i-educar/SQL%20Injection%20(Blind%20Time-Based)%20Vulnerability%20in%20%60id%60%20Parameter%20on%20%60.module.TabelaArredondamento.edit%60%20Endpoint.md https://github.com/marcelomulder/CVE/blob/main/i-educar/SQL%20Injection%20(Blind%20Time-Based)%20Vulnerability%20in%20%60id%60%20Parameter%20on%20%60.module.TabelaArredondamento.view%60%20Endpoint.md#poc +https://github.com/marcelomulder/CVE/blob/main/i-educar/SQL%20Injection%20(Blind%20Time-Based)%20Vulnerability%20in%20cod_agenda%20Parameter%20on%20agenda_preferencias.php%20Endpoint.md#poc https://github.com/marcelomulder/CVE/blob/main/i-educar/SQL%20Injection%20(Blind%20Time-Based)%20Vulnerability%20in%20nm_tipo%20Parameter%20on%20educar_tipo_usuario_lst.php%20Endpoint.md#poc +https://github.com/marcelomulder/CVE/blob/main/i-educar/SQL%20Injection%20(Blind%20Time-Based)%20Vulnerability%20in%20ref_cod_aluno%20Parameter%20on%20educar_historico_escolar_lst.php%20Endpoint.md +https://github.com/marcelomulder/CVE/blob/main/i-educar/Stored%20XSS%20educar_avaliacao_desempenho_cad.php%20parameters%20titulo_avaliacao%20and%20descricao.md +https://github.com/marcelomulder/CVE/blob/main/i-educar/Stored%20XSS%20educar_servidor_cad.php%20parameter%20matricula.md https://github.com/marcobambini/gravity/issues/123 https://github.com/marcobambini/gravity/issues/133 https://github.com/marcobambini/gravity/issues/172 @@ -118617,8 +120724,10 @@ https://github.com/martinh/libconfuse/issues/109 https://github.com/matt-/nunjucks_test https://github.com/matthiaskramm/swftools/issues/100 https://github.com/matthiaskramm/swftools/issues/101 +https://github.com/matthiaskramm/swftools/issues/102 https://github.com/matthiaskramm/swftools/issues/103 https://github.com/matthiaskramm/swftools/issues/105 +https://github.com/matthiaskramm/swftools/issues/106 https://github.com/matthiaskramm/swftools/issues/114 https://github.com/matthiaskramm/swftools/issues/115 https://github.com/matthiaskramm/swftools/issues/116 @@ -118627,6 +120736,7 @@ https://github.com/matthiaskramm/swftools/issues/122 https://github.com/matthiaskramm/swftools/issues/124 https://github.com/matthiaskramm/swftools/issues/125 https://github.com/matthiaskramm/swftools/issues/128 +https://github.com/matthiaskramm/swftools/issues/129 https://github.com/matthiaskramm/swftools/issues/13 https://github.com/matthiaskramm/swftools/issues/130 https://github.com/matthiaskramm/swftools/issues/131 @@ -118671,6 +120781,7 @@ https://github.com/matthiaskramm/swftools/issues/57 https://github.com/matthiaskramm/swftools/issues/97 https://github.com/matthiaskramm/swftools/issues/98 https://github.com/matthiaskramm/swftools/issues/99 +https://github.com/maxihongtatum/cve/blob/main/sql14.md https://github.com/maximdevere/CVE2/blob/main/README.md https://github.com/maximdevere/CVE2/issues/1 https://github.com/maximdevere/cve/issues/1 @@ -118687,6 +120798,7 @@ https://github.com/mdadams/jasper/issues/94 https://github.com/medikoo/es5-ext/issues/201 https://github.com/meetecho/janus-gateway/blob/v0.10.0/plugins/janus_streaming.c#L6117 https://github.com/meetecho/janus-gateway/blob/v0.10.0/plugins/janus_streaming.c#L6166 +https://github.com/megamagnus/cve-2020-15956 https://github.com/memcached/memcached/issues/629 https://github.com/merrychap/CVEs/tree/master/janus-webrtc/CVE-2020-13898 https://github.com/merrychap/poc_exploits/tree/master/janus-webrtc/CVE-2020-13900 @@ -118698,7 +120810,9 @@ https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-734 https://github.com/metersphere/metersphere/security/advisories/GHSA-6h7v-q5rp-h6q9 https://github.com/metersphere/metersphere/security/advisories/GHSA-7499-q88f-mxqp https://github.com/metersphere/metersphere/security/advisories/GHSA-fwc3-5h55-mh2j +https://github.com/mex135605/cve/issues/1 https://github.com/mex135605/cve/issues/2 +https://github.com/mex135605/cve/issues/3 https://github.com/mhsinj/CVE-2025-45805 https://github.com/miaoyum/cve/blob/main/sql21.md https://github.com/michaelrsweet/htmldoc/issues/413 @@ -118706,12 +120820,21 @@ https://github.com/michaelrsweet/htmldoc/issues/414 https://github.com/michaelrsweet/htmldoc/issues/415 https://github.com/michaelrsweet/htmldoc/issues/416 https://github.com/michaelrsweet/htmldoc/issues/418 +https://github.com/michaelrsweet/htmldoc/issues/431 +https://github.com/michaelrsweet/htmldoc/issues/433 https://github.com/michaelrsweet/htmldoc/issues/471 +https://github.com/micrictor/http2-rst-stream +https://github.com/microsoft/CBL-Mariner/pull/6381 +https://github.com/microweber/microweber/issues/1110 https://github.com/microweber/microweber/issues/483 https://github.com/microweber/microweber/issues/484 https://github.com/micwallace/wallacepos/issues/84 https://github.com/miekg/dns/issues/742 https://github.com/migraine-sudo/D_Link_Vuln/tree/main/Permanent%20DDOS%20vulnerability%20in%20emailInfo +https://github.com/migraine-sudo/D_Link_Vuln/tree/main/cmd%20Inject%20In%20tools_AccountName +https://github.com/migraine-sudo/D_Link_Vuln/tree/main/cmd%20Inject%20in%20pingV4Msg +https://github.com/migraine-sudo/D_Link_Vuln/tree/main/stackoverflow%20%20in%20reserveDHCP_HostName_1.1.1.0 +https://github.com/migraine-sudo/D_Link_Vuln/tree/main/stackoverflow%20cancelPing https://github.com/mikelbring/tinyissue/issues/237 https://github.com/millken/doyocms/issues/1 https://github.com/mindstellar/Osclass/issues/495 @@ -118722,6 +120845,8 @@ https://github.com/miniupnp/ngiflib/issues/15 https://github.com/miniupnp/ngiflib/issues/17 https://github.com/mirchr/security-research/blob/master/vulnerabilities/F5/CVE-2018-5529.txt https://github.com/missing0x00/CVE-2018-5354 +https://github.com/misskey-dev/misskey/security/advisories/GHSA-3p2w-xmv5-jm95 +https://github.com/misskey-dev/summaly/security/advisories/GHSA-7899-w6c4-vqc4 https://github.com/misstt123/oasys/issues/11 https://github.com/mitmproxy/mitmproxy/issues/3234 https://github.com/mitre/caldera/issues/1405 @@ -118738,12 +120863,15 @@ https://github.com/mnfst/manifest/security/advisories/GHSA-h8h6-7752-g28c https://github.com/modzero/MZ-20-02-NETGEAR-Orbi-Security https://github.com/moehw/poc_exploits/tree/master/CVE-2021-3199/poc_uploadImageFile.py https://github.com/monkey/monkey/issues/92 +https://github.com/mono7s/LB-Link/blob/main/bs_SetSerial.md +https://github.com/mono7s/TOTOLINK/blob/main/N600R/TOTOLINK%20N600R%20Unauthorized_Command_Injection.md https://github.com/monstra-cms/monstra/issues/471 https://github.com/moonlight-stream/moonlight-common-c/security/advisories/GHSA-4927-23jw-rq62 https://github.com/moonlight-stream/moonlight-common-c/security/advisories/GHSA-r8cf-45f4-vf8m https://github.com/motioneye-project/motioneye/issues/3142 https://github.com/motioneye-project/motioneye/security/advisories/GHSA-g5mq-prx7-c588 https://github.com/mozilla/mozjpeg/issues/268 +https://github.com/mozilla/node-convict/issues/410 https://github.com/mozilla/ssl-config-generator/issues/162 https://github.com/mpdf/mpdf/issues/867 https://github.com/mpdf/mpdf/issues/949 @@ -118756,6 +120884,7 @@ https://github.com/mpruett/audiofile/issues/38 https://github.com/mpruett/audiofile/issues/40 https://github.com/mpruett/audiofile/issues/41 https://github.com/mrojz/ZKT-Bio-CVSecurity/blob/main/CVE-2025-45746.md +https://github.com/mruby/mruby/issues/5042 https://github.com/mrvautin/expressCart/issues/288 https://github.com/mrvautin/expressCart/issues/288#issue-3287867610 https://github.com/mselbrede/CVE-2024-51442 @@ -118763,6 +120892,7 @@ https://github.com/mspaling/mbam-exclusions-poc- https://github.com/mspaling/mbam-exclusions-poc-/blob/master/mbam-whitelist-poc.txt https://github.com/mssalvatore/CVE-2019-14751_PoC https://github.com/munin-monitoring/munin/blob/2.0.18/ChangeLog +https://github.com/murongchengshu/zhicheng_tan/blob/main/SeaCMS_1.md https://github.com/mwrlabs/CVE-2016-7255 https://github.com/mybonn/CVE/issues/1 https://github.com/mybonn/CVE/issues/2 @@ -118773,21 +120903,44 @@ https://github.com/mybonn/CVE/issues/6 https://github.com/myliang/x-spreadsheet/issues/580 https://github.com/mynlxx/CVE-ZhuChengQing/issues/1 https://github.com/mynlxx/CVE-ZhuChengQing/issues/10 +https://github.com/mynlxx/CVE-ZhuChengQing/issues/2 +https://github.com/mynlxx/CVE-ZhuChengQing/issues/3 +https://github.com/mynlxx/CVE-ZhuChengQing/issues/4 +https://github.com/mynlxx/CVE-ZhuChengQing/issues/5 +https://github.com/mynlxx/CVE-ZhuChengQing/issues/6 +https://github.com/mynlxx/CVE-ZhuChengQing/issues/8 +https://github.com/mynlxx/CVE-ZhuChengQing/issues/9 https://github.com/mysq13/CVE/issues/2 https://github.com/mysq13/CVE/issues/6 +https://github.com/mz-automation/libiec61850/issues/200 +https://github.com/n0wstr/IOTVuln/tree/main/CP450/CloudACMunualUpdate_injection +https://github.com/n0wstr/IOTVuln/tree/main/CP450/CloudACMunualUpdate_overflow https://github.com/n0wstr/IOTVuln/tree/main/CP450/NTPSyncWithHost +https://github.com/n0wstr/IOTVuln/tree/main/CP450/SetTelnetCfg +https://github.com/n0wstr/IOTVuln/tree/main/CP450/SetUrlFilterRules https://github.com/n0wstr/IOTVuln/tree/main/CP450/addWlProfileClientMode https://github.com/n0wstr/IOTVuln/tree/main/CP450/getSaveConfig https://github.com/n0wstr/IOTVuln/tree/main/CP450/setIpPortFilterRules https://github.com/n0wstr/IOTVuln/tree/main/CP450/setIpQosRules +https://github.com/n0wstr/IOTVuln/tree/main/CP450/setLanguageCfg https://github.com/n0wstr/IOTVuln/tree/main/CP450/setMacFilterRules https://github.com/n0wstr/IOTVuln/tree/main/CP450/setStaticDhcpConfig +https://github.com/n0wstr/IOTVuln/tree/main/CP450/setUpgradeFW +https://github.com/n0wstr/IOTVuln/tree/main/CP450/setWebWlanIdx https://github.com/nabiland/cve/blob/main/cve.md https://github.com/nabiland/cve/issues/1 https://github.com/nabiland/cve/issues/2 +https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20Broken%20Access%20Control.md +https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20SQL%20Injection%20-%201.md +https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20SQL%20Injection%20-%202.md +https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Employee%20Task%20Management%20System%20-%20SQL%20Injection%20-%202.md +https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Employee%20Task%20Management%20System%20-%20SQL%20Injection.md +https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20Broken%20Access%20Control.md +https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Simple%20Food%20Ordering%20System%20-%20Authenticated%20Reflected%20XSS.md https://github.com/navidrome/navidrome/security/advisories/GHSA-58vj-cv5w-v4v6 https://github.com/navidrome/navidrome/security/advisories/GHSA-5wgp-vjxm-3x2r https://github.com/navidrome/navidrome/security/advisories/GHSA-c3p4-vm8f-386p +https://github.com/navidrome/navidrome/security/advisories/GHSA-f238-rggp-82m3 https://github.com/nektos/act/security/advisories/GHSA-pc99-qmg4-rcff https://github.com/net-snmp/net-snmp/issues/474 https://github.com/net-snmp/net-snmp/issues/475 @@ -118797,6 +120950,7 @@ https://github.com/netsecfish/xiongmai_incorrect_access_control https://github.com/netsecfish/xiongmai_incorrect_access_control/blob/main/pocCheck3-en.py https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv https://github.com/ngallagher/simplexml/issues/18 +https://github.com/nghttp2/nghttp2/pull/1961 https://github.com/nginx/njs/issues/188 https://github.com/nginx/njs/issues/322 https://github.com/nginx/njs/issues/323 @@ -118808,9 +120962,12 @@ https://github.com/nginx/njs/issues/615 https://github.com/nginx/njs/issues/617 https://github.com/nginx/njs/issues/618 https://github.com/nginx/njs/issues/619 +https://github.com/nhairs/python-json-logger/security/advisories/GHSA-wmxh-pxcx-9w24 https://github.com/nih-at/libzip/issues/5 https://github.com/nikhil-aniill/Small-CRM-CVE +https://github.com/ninenines/cowboy/issues/1615 https://github.com/niteosoft/simplejobscript/issues/10 +https://github.com/niteosoft/simplejobscript/issues/7 https://github.com/niteosoft/simplejobscript/issues/9 https://github.com/njhartwell/pw3nage https://github.com/no-security/sqlalchemy_test @@ -118818,8 +120975,10 @@ https://github.com/noahze01/IoT-vulnerable/blob/main/D-Link/DIR-605L/formSetDoma https://github.com/noahze01/IoT-vulnerable/blob/main/D-Link/DIR-605L/formSetQoS.md https://github.com/nobugpal/cve_Vulnerability_application/issues/1 https://github.com/nobugpal/cve_Vulnerability_application/issues/2 +https://github.com/nocodb/nocodb/security/advisories/GHSA-wf6c-hrhf-86cw https://github.com/node-saml/passport-saml/pull/595 https://github.com/node-swig/swig-templates/issues/88 +https://github.com/node-swig/swig-templates/issues/89 https://github.com/nokiatech/heif/issues/86 https://github.com/nokiatech/heif/issues/87 https://github.com/nola-milkin/poc_exploits/blob/master/CVE-2021-3199/poc_uploadImageFile.py @@ -118841,6 +121000,7 @@ https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE https://github.com/nuxt-modules/mdc/security/advisories/GHSA-j82m-pc2v-2484 https://github.com/nuxt/nuxt/security/advisories/GHSA-2452-6xj8-jh47 https://github.com/nuxt/nuxt/security/advisories/GHSA-4gf7-ff8x-hq99 +https://github.com/nuxt/nuxt/security/advisories/GHSA-vf6r-87q4-2vjf https://github.com/nyariv/SandboxJS/issues/31 https://github.com/o2oa/o2oa/issues/173 https://github.com/o2oa/o2oa/issues/173#issue-3332925583 @@ -118890,17 +121050,23 @@ https://github.com/o2oa/o2oa/issues/189#issuecomment-3212649984 https://github.com/o2platform/DefCon_RESTing/tree/master/Live-Demos/Neo4j https://github.com/oakserver/oak/security/advisories/GHSA-r3v7-pc4g-7xp9 https://github.com/oatpp/oatpp/issues/1037 +https://github.com/obiba/agate/security/advisories/GHSA-v3wj-7vj5-xj5v https://github.com/obiba/opal/security/advisories/GHSA-27vw-29rq-c358 https://github.com/obiba/opal/security/advisories/GHSA-rxmx-gqjj-vhv8 https://github.com/obsidiandynamics/anode/issues/1 +https://github.com/oceanbase/oceanbase/security https://github.com/octobercms/october/issues/1302 +https://github.com/ohler55/agoo/issues/88 https://github.com/ohler55/ox/issues/194 https://github.com/ohler55/ox/issues/195 https://github.com/omarexala/PHP-MYSQL-User-Login-System---Broken-Access-Control https://github.com/omarexala/PHP-MYSQL-User-Login-System---SQL-Injection https://github.com/omarexala/PHP-MYSQL-User-Login-System---Stored-XSS https://github.com/omnitaint/Vulnerability-Reports/blob/2211ea4712f24d20b7f223fb737910fdfb041edb/reports/rails-routes-to-json/report.md +https://github.com/online-Y/CVE/issues/1 https://github.com/onupset/CVE/issues/7 +https://github.com/open-webui/open-webui/security/advisories/GHSA-9f4f-jv96-8766 +https://github.com/open5gs/open5gs/issues/3942 https://github.com/openSUSE/libsolv/issues/416 https://github.com/openSUSE/libsolv/issues/417 https://github.com/openbabel/openbabel/issues/2827 @@ -118924,22 +121090,36 @@ https://github.com/openemr/openemr/issues/1782 https://github.com/openemr/openemr/issues/498 https://github.com/openemr/openemr/security/advisories/GHSA-3c27-2m7h-f7rx https://github.com/openemr/openemr/security/advisories/GHSA-7qj6-jxfc-xw4v +https://github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py#L383-L388 +https://github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py#L390-L393 +https://github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py#L395 https://github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py#L488 https://github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py#L493 https://github.com/openid/ruby-openid/pull/43 https://github.com/openimaj/openimaj/issues/382 https://github.com/openl2d/moc3ingbird +https://github.com/openresty/openresty/issues/930 +https://github.com/opensearch-project/data-prepper/issues/3474 +https://github.com/opensolon/solon/issues/357 +https://github.com/openviglet/shio/issues/1028 +https://github.com/openviglet/shio/issues/1028#issue-3239418750 +https://github.com/orangecertcc/security-research/security/advisories/GHSA-25j8-69h7-83h2 https://github.com/orangecertcc/security-research/security/advisories/GHSA-j94f-5cg6-6j9j https://github.com/orangecertcc/security-research/security/advisories/GHSA-q5pq-8666-j8fr https://github.com/orangecertcc/security-research/security/advisories/GHSA-qpv8-g6qv-rf8p https://github.com/orangecertcc/security-research/security/advisories/GHSA-qx9c-49m4-f3vj https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp +https://github.com/orangecertcc/security-research/security/advisories/GHSA-x8rp-jfwc-gqqj https://github.com/oskarsve/ms-teams-rce https://github.com/ossec/ossec-hids/issues/1585 https://github.com/ossec/ossec-hids/releases/tag/2.8.1 +https://github.com/osvaldotenorio/CVE-2024-34470 +https://github.com/osvaldotenorio/CVE-2024-34471 +https://github.com/osvaldotenorio/CVE-2024-34472 https://github.com/otavioarj/SIOCtl https://github.com/oveleon/contao-cookiebar/security/advisories/GHSA-296q-rj83-g9rq https://github.com/oxyno-zeta/s3-proxy/security/advisories/GHSA-pp9m-qf39-hxjc +https://github.com/oye-ujjwal/CVEs/blob/main/Employee%20Management%20System%20App/CVE-2025-26258 https://github.com/p1026/CVE/issues/10 https://github.com/p1026/CVE/issues/12 https://github.com/p1026/CVE/issues/13 @@ -118980,14 +121160,21 @@ https://github.com/p1026/CVE/issues/60 https://github.com/p1026/CVE/issues/7 https://github.com/p1026/CVE/issues/8 https://github.com/p1026/CVE/issues/9 +https://github.com/p1nkshox/cve/issues/1 +https://github.com/p1nkshox/cve/issues/2 https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-01.md +https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-02.md https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-06.md https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-08.md https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-15.md https://github.com/panda666-888/vuls/blob/main/d-link/dir-513/formWPS.md https://github.com/panda666-888/vuls/blob/main/d-link/dir-513/formWPS.md#poc https://github.com/panda666-888/vuls/blob/main/totolink/a702r/formIpQoS.md +https://github.com/panda666-888/vuls/blob/main/totolink/a702r/formPortFw.md +https://github.com/panda666-888/vuls/blob/main/totolink/a702r/formWlanMultipleAP.md https://github.com/panda666-888/vuls/blob/main/totolink/x15/formFilter_ip6addr.md +https://github.com/panda666-888/vuls/blob/main/totolink/x15/formFilter_url.md +https://github.com/panda666-888/vuls/blob/main/totolink/x15/formMapDelDevice.md https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/AddMac.md https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/AddMac.md#poc https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/DMZ.md @@ -118997,13 +121184,17 @@ https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/DeleteMac.md#poc https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/Delete_Mac_list.md https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/SetName.md https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/SetName.md#poc +https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/singlePortForwardDelete.md https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/singlePortForwardDelete.md#poc +https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/websSysFirewall.md https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/websSysFirewall.md#poc https://github.com/pandao/editor.md/issues/700 https://github.com/panghusec/exploit/issues/2 https://github.com/panghusec/exploit/issues/8 +https://github.com/para-paradise/webray.com.cn/blob/main/Advocate%20office%20management%20system/Advocate%20office%20management%20system%20activate.php%20error-based%20SQL%20Injection%20Vulnerability.md https://github.com/para-paradise/webray.com.cn/blob/main/Advocate%20office%20management%20system/Advocate%20office%20management%20system%20forgot_pass.php%20time-based%20SQL%20Injection%20Vulnerability.md https://github.com/para-paradise/webray.com.cn/blob/main/Advocate%20office%20management%20system/Advocate%20office%20management%20system%20login.php%20time-based%20SQL%20Injection%20Vulnerability.md +https://github.com/para-paradise/webray.com.cn/blob/main/Best%20house%20rental%20management%20system%20project%20in%20php/Best%20house%20rental%20management%20system%20project%20in%20php%20Stored%20Cross-Site%20Scripting(XSS)%20vulnerability.md https://github.com/para-paradise/webray.com.cn/blob/main/Best%20house%20rental%20management%20system%20project%20in%20php/Best%20house%20rental%20management%20system%20signup%20time-based%20SQL%20Injection%20Vulnerability.md https://github.com/para-paradise/webray.com.cn/blob/main/Best%20house%20rental%20management%20system%20project%20in%20php/Best%20house%20rental%20management%20system%20update_account%20time-based%20SQL%20Injection%20Vulnerability.md https://github.com/para-paradise/webray.com.cn/blob/main/Pet%20Grooming%20Management/SourceCodester%20Pet%20Grooming%20Management%20Software%20edit.php%20sql%20injection%20Vulnerability.md @@ -119011,6 +121202,7 @@ https://github.com/para-paradise/webray.com.cn/blob/main/Pet%20Grooming%20Manage https://github.com/paradessia/cve/blob/main/Ipack-Scada-Automation.txt https://github.com/parisneo/lollms-webui/commit/1e17df01e01d4d33599db2afaafe91d90b6f0189 https://github.com/patrickhener/CVE-2023-22855/blob/main/advisory/advisory.md +https://github.com/patrickhener/goshs/security/advisories/GHSA-rwj2-w85g-5cmm https://github.com/payatu/QuickHeal https://github.com/pbgt/CVEs/blob/main/CVE-2021-39285.md https://github.com/pedrib/PoC/blob/master/advisories/bmc-track-it-11.4.txt @@ -119019,39 +121211,52 @@ https://github.com/pedrib/PoC/blob/master/generic/impresscms-1.3.5.txt https://github.com/pedrib/PoC/blob/master/lorexActivex/lorex-testcase.html https://github.com/pedrib/PoC/blob/master/pimcore-2.1.0.txt https://github.com/pentestingforfunandprofit/research/tree/master/dozer-rce +https://github.com/pentesttoolscom/vulnerability-research/tree/master/CVE-2025-26127 https://github.com/peri0d/my_cve/blob/main/ONLINE-BIDDING-SYSTEM-Project-V1.0-remove.php-SQL-injection.md +https://github.com/peri0d/my_cve/blob/main/Online-Hotel-Reservation-System-In-PHP-With-Source-Code-deleteroominventory.php-sql-injection.md https://github.com/peri0d/my_cve/issues/4 https://github.com/peri0d/my_cve/issues/5 +https://github.com/pfwqdxwdd/cve/blob/main/6.md +https://github.com/pfwqdxwdd/cve/blob/main/6.md#poc https://github.com/phantom0301/vulns/blob/master/Metinfo2.md https://github.com/philippe/FrogCMS/issues/12 https://github.com/php/php-src/commit/1a23ebc1fff59bf480ca92963b36eba5c1b904c4 https://github.com/php/php-src/commit/6a7cc8ff85827fa9ac715b3a83c2d9147f33cd43?w=1 https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv +https://github.com/php/php-src/security/advisories/GHSA-453j-q27h-5p8x +https://github.com/php/php-src/security/advisories/GHSA-7fj2-8x79-rjf4 https://github.com/php/php-src/security/advisories/GHSA-865w-9rf3-2wh5 https://github.com/php/php-src/security/advisories/GHSA-h746-cjrr-wfmr https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7 +https://github.com/phpgt/Dom/security/advisories/GHSA-cwj7-6v67-2cm4 https://github.com/phpipam/phpipam/issues/2327 https://github.com/phpipam/phpipam/issues/4146 https://github.com/phpipam/phpipam/issues/4148 https://github.com/phpipam/phpipam/issues/4149 https://github.com/phpipam/phpipam/issues/4150 +https://github.com/phpipam/phpipam/issues/4151 https://github.com/phpipam/phpipam/issues/992 https://github.com/phpmyadmin/phpmyadmin/issues/16056 https://github.com/pi-engine/pi/issues/1523 https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-5cm9-6p3m-v259 https://github.com/pi-hole/pi-hole/security/advisories/GHSA-jg6g-rrj6-xfg6 +https://github.com/piccolo-orm/piccolo/security/advisories/GHSA-h7cm-mrvq-wcfr +https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-fx6j-9pp6-ph36 https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-vr5f-php7-rg24 +https://github.com/pimcore/pimcore/security/advisories/GHSA-qjpx-5m2p-5pgh https://github.com/piuppi/Proof-of-Concepts/blob/main/AChecker/CVE-2024-34523.md https://github.com/piuppi/Proof-of-Concepts/blob/main/Syracom/SecureLogin2FA-OpenRedirect.md https://github.com/pjy2004/cve/issues/1 https://github.com/pjy2004/cve/issues/2 https://github.com/pjy2004/cve/issues/3 https://github.com/plack/Plack/issues/405 +https://github.com/plentico/plenti/security/advisories/GHSA-mj4v-hp69-27x5 https://github.com/pluck-cms/pluck/issues/69 https://github.com/pluck-cms/pluck/issues/70 https://github.com/pluck-cms/pluck/issues/81 https://github.com/poc-effectiveness/PoCAdaptation/tree/main/Adapted/CVE-2019-16869/5.0.0.Alpha1/exploit https://github.com/poc-effectiveness/PoCAdaptation/tree/main/Adapted/CVE-2019-20444/5.0.0.Alpha1/exploit +https://github.com/pocoproject/poco/issues/4915 https://github.com/podofo/podofo/issues/275 https://github.com/ponchio/untrunc/issues/131 https://github.com/poropro/kuaifan/issues/3 @@ -119097,10 +121302,15 @@ https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990 https://github.com/pr0v3rbs/CVE/tree/master/CVE-2019-20082 https://github.com/pr0v3rbs/CVE/tree/master/CVE-2019-6258 https://github.com/pracharapol/CVE-2025-45960 +https://github.com/pramodmahato/BlogCMS/issues/1 https://github.com/pravednik/xmlBundle/issues/2 https://github.com/primaryboy/CVE/issues/1 https://github.com/project-zot/zot/security/advisories/GHSA-c37v-3c8w-crq8 +https://github.com/projectcapsule/capsule/security/advisories/GHSA-fcpm-6mxq-m5vv +https://github.com/projectcontour/contour/pull/5826 https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/2 +https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/3 +https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/4 https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/10 https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/11 https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/12 @@ -119109,6 +121319,7 @@ https://github.com/projectworldsofficial/online-book-store-project-in-php/issues https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/1 https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/2 https://github.com/proofofcalc/cve-2019-6453-poc +https://github.com/pruthuraut/CVE-2025-46173 https://github.com/psudo-bugboy/CVE-2024 https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9582.md https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9583.md @@ -119118,6 +121329,12 @@ https://github.com/pts/sam2p/issues/14 https://github.com/pts/sam2p/issues/67 https://github.com/punkave/sanitize-html/issues/100 https://github.com/purpleracc00n/CVE-2019-16941 +https://github.com/pwncollege/dojo/security/advisories/GHSA-8m79-rmhw-rg84 +https://github.com/pwncollege/dojo/security/advisories/GHSA-fcq8-jqq5-9xmh +https://github.com/pwndoc/pwndoc/security/advisories/GHSA-mxw8-vgvx-89hx +https://github.com/pwndoc/pwndoc/security/advisories/GHSA-r3vj-47cf-4672 +https://github.com/pyload/pyload/security/advisories/GHSA-9gjj-6gj7-c4wj +https://github.com/pyload/pyload/security/advisories/GHSA-pwh4-6r3m-j2rf https://github.com/pyload/pyload/security/advisories/GHSA-w7hq-f2pj-c53g https://github.com/pypa/pip/issues/6413 https://github.com/pypa/setuptools/issues/4946 @@ -119146,12 +121363,18 @@ https://github.com/qcycop0101-hash/CVE/issues/8 https://github.com/qcycop0101-hash/CVE/issues/9 https://github.com/qemm/joomlasqli https://github.com/qi-wm/cve/issues/1 +https://github.com/qianshuidewajueji/poc/blob/main/gpac/mp3_dmx_process_poc3 https://github.com/qingchuana/q1ngchuan/issues/5 https://github.com/qingchuana/q1ngchuan/issues/6 +https://github.com/qingchuana/q1ngchuan/issues/7 +https://github.com/qingchuana/q1ngchuan/issues/8 https://github.com/qpdf/qpdf/issues/146 https://github.com/qpdf/qpdf/issues/202 +https://github.com/qqqbalabala/cve/blob/main/sql20.md https://github.com/qurbat/gpon https://github.com/r1b/CVE-2017-13089 +https://github.com/r4hn1/Simple-Client-Management-System-Exploit/blob/main/CVE-2021-43510 +https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-gh3x-4x42-fvq8 https://github.com/radare/radare2/issues/10464 https://github.com/radare/radare2/issues/10465 https://github.com/radare/radare2/issues/8742 @@ -119165,14 +121388,19 @@ https://github.com/radareorg/radare2/issues/17431 https://github.com/radareorg/radare2/issues/21363 https://github.com/radareorg/radare2/issues/24233 https://github.com/radareorg/radare2/issues/24233#issuecomment-2918847833 +https://github.com/rahulhoysala/security-research/blob/main/CVE-2025-50567.md https://github.com/rainrocka/xinhu/issues/4 https://github.com/rainrocka/xinhu/issues/5 https://github.com/rainrocka/xinhu/issues/6 https://github.com/ralap-z/rpcms/issues/1 https://github.com/ralap-z/rpcms/issues/2 https://github.com/ralap-z/rpcms/issues/3 +https://github.com/randombit/botan/security/advisories/GHSA-5gg9-hqpr-r58j https://github.com/randombit/botan/security/advisories/GHSA-w4g2-7m2h-7xj7 +https://github.com/rapid7/metasploit-framework/issues/13026 +https://github.com/rapid7/metasploit-framework/issues/14015 https://github.com/rapid7/metasploit-framework/issues/8064 +https://github.com/rapid7/metasploit-framework/pull/13828 https://github.com/rapid7/metasploit-framework/pull/1834 https://github.com/rapid7/metasploit-framework/pull/18870 https://github.com/rauschecker/CVEs/tree/main/CVE-2021-34675 @@ -119181,14 +121409,17 @@ https://github.com/rdincel1/Bolt-CMS-3.6.2---Cross-Site-Scripting https://github.com/reactiveui/refit/security/advisories/GHSA-3hxg-fxwm-8gf7 https://github.com/realistic-security/CVE-2017-16524 https://github.com/reasoncms/reasoncms/issues/264 +https://github.com/redaxo/redaxo/security/advisories/GHSA-8366-xmgf-334f https://github.com/redaxo/redaxo/security/advisories/GHSA-wppf-gqj5-fc4f https://github.com/redaxo/redaxo4/issues/421 +https://github.com/redblueteam/CVE-2023-41507/ https://github.com/redtrib3/CVEs/tree/main/CVE-2024-51326%20-%20Union%20SQLi https://github.com/redtrib3/CVEs/tree/main/CVE-2024-51327%20-%20SQLi%20Auth%20Bypass https://github.com/redtrib3/CVEs/tree/main/CVE-2024-51328%20-%20Stored%20XSS%20 https://github.com/redtrib3/CVEs/tree/main/CVE-2024-51329%20-%20Host%20Header%20Injection https://github.com/regainer27/CVE-key/tree/main/ALFA/AIP%20W512/bo4 https://github.com/renmizo/CVE-2022-41413 +https://github.com/rennf93/fastapi-guard/security/advisories/GHSA-77q8-qmj7-x7pp https://github.com/requarks/wiki/security/advisories/GHSA-xjcj-p2qv-q3rf https://github.com/request/request/issues/1904 https://github.com/restify/node-restify/issues/1018 @@ -119196,6 +121427,7 @@ https://github.com/restsharp/RestSharp/security/advisories/GHSA-4rr6-2v9v-wcpc https://github.com/rgaufman/live555/issues/19 https://github.com/rhysd/Shiba/issues/42 https://github.com/ricardojoserf/CVE-2021-40845 +https://github.com/richardgirges/express-fileupload/issues/236 https://github.com/rizinorg/rizin/pull/1313 https://github.com/rjbs/Email-MIME/issues/66 https://github.com/rmccarth/cve-2021-3164 @@ -119204,7 +121436,12 @@ https://github.com/robertguetzkow/ets5-password-recovery https://github.com/robiso/wondercms/issues/64 https://github.com/rockcarry/ffjpeg/issues/10 https://github.com/rockcarry/ffjpeg/issues/12 +https://github.com/rockcarry/ffjpeg/issues/26 https://github.com/rockcarry/ffjpeg/issues/36 +https://github.com/rockersiyuan/CVE/blob/main/Smart%20S20.md +https://github.com/rohan-pt/CVE-2025-26054 +https://github.com/rohan-pt/CVE-2025-26055 +https://github.com/rohan-pt/CVE-2025-26056 https://github.com/rohe/pysaml2/issues/366 https://github.com/rollup/rollup/security/advisories/GHSA-gcx4-mw62-g8wm https://github.com/rom4j/cve/issues/1 @@ -119218,11 +121455,21 @@ https://github.com/rom4j/cve/issues/16 https://github.com/rom4j/cve/issues/17 https://github.com/rom4j/cve/issues/18 https://github.com/rom4j/cve/issues/19 +https://github.com/rom4j/cve/issues/2 +https://github.com/rom4j/cve/issues/20 +https://github.com/rom4j/cve/issues/3 +https://github.com/rom4j/cve/issues/4 +https://github.com/rom4j/cve/issues/5 +https://github.com/rom4j/cve/issues/6 +https://github.com/rom4j/cve/issues/7 +https://github.com/rom4j/cve/issues/8 +https://github.com/rom4j/cve/issues/9 https://github.com/rookiekuan/CVE/issues/1 https://github.com/rookiekuan/CVE/issues/2 https://github.com/rookiekuan/CVE/issues/3 https://github.com/root3nl/SupportApp/security/advisories/GHSA-jr78-247f-rhqc https://github.com/ros/actionlib/pull/171 +https://github.com/roughb8722/CVE-2021-3122-Details/blob/main/CVE-2021-3122 https://github.com/rrainn/PortProcesses/security/advisories/GHSA-vm67-7vmg-66vm https://github.com/rsyslog/rsyslog/blob/master/ChangeLog https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog @@ -119265,7 +121512,11 @@ https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/Upload https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWiFiBasicCfg/README.md https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWiFiEasyCfg/README.md https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWiFiGuestCfg/README.md +https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWizardCfg/README.md +https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TRENDnet/TEW-814DAP/formNewSchedule/README.md +https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TRENDnet/TEW-814DAP/formPasswordAuth/README.md https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TRENDnet/TEW-814DAP/formSysLog/README.md +https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TRENDnet/TEW-814DAP/formSystemCheck/README.md https://github.com/s4ndw1ch136/IOT-vuln-reports/tree/main/TOTOLINK/A3700R/setWiFiEasyGuestCfg https://github.com/sahaRatul/sela/issues/23 https://github.com/sahaRatul/sela/issues/25 @@ -119276,6 +121527,7 @@ https://github.com/sahaRatul/sela/issues/29 https://github.com/sahaRatul/sela/issues/30 https://github.com/sahaRatul/sela/issues/31 https://github.com/sahaRatul/sela/issues/32 +https://github.com/sahel0708/CVE/tree/main/CVE-2025-50486 https://github.com/sahici/CVE-2025-2812/ https://github.com/sahildhar/sahildhar.github.io/blob/master/research/reports/Piwigo_2.9.2/Cross%20Site%20Request%20Forgery%20in%20Piwigo%202.9.2.md https://github.com/saitoha/libsixel/commit/316c086e79d66b62c0c4bc66229ee894e4fdb7d1 @@ -119295,7 +121547,13 @@ https://github.com/saitoha/libsixel/issues/200 https://github.com/saitoha/libsixel/issues/200#issuecomment-3178785635 https://github.com/salesagility/SuiteCRM/issues/333 https://github.com/saltcorn/saltcorn/security/advisories/GHSA-43f3-h63w-p6f6 +https://github.com/samiahmedsiddiqui/custom-permalinks/pull/96 +https://github.com/sammycage/plutosvg/issues/7 +https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-3984-r877-q7xp +https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-67p9-6h73-ff7x +https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-c5h5-54gp-xh4q https://github.com/sansanyun/mipcms5/issues/4 +https://github.com/sapphi-red/vite-plugin-static-copy/security/advisories/GHSA-pp7p-q8fx-2968 https://github.com/sass/libsass/issues/2814 https://github.com/sass/libsass/issues/2815 https://github.com/sass/libsass/issues/2816 @@ -119311,12 +121569,16 @@ https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190913-04_W https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20191203-01_Monsta_FTP_Arbitrary_File_Read_and_Write https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20191203-02_Monsta_FTP_Server-Side_Request_Forgery https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20191211-01_Monsta_FTP_Stored_XSS +https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250325-01_Cyberduck_Mountain_Duck_Certificate_Handling +https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250325-02_Cyberduck_Mountain_Duck_Weak_Hash https://github.com/sbm-98/CVE/issues/1 https://github.com/sbmzhcn/EmpireCMS/issues/1 https://github.com/scausoft/cve/blob/main/rce.md https://github.com/scausoft/cve/blob/main/sql.md https://github.com/schettino72/sqla_yaml_fixtures/issues/20 https://github.com/secfake/mycve/issues/1 +https://github.com/secfake/mycve/issues/2 +https://github.com/secfake/mycve/issues/3 https://github.com/secoats/cve/tree/master/CVE-2020-27543_dos_restify-paginate https://github.com/secunnix/CVE-2024-27518 https://github.com/secuserx/CVE/blob/main/%5BHardcoded%20reCAPTCHA%20secret%20key%5D%20found%20in%20Odyssey%20CMS%2010.35%20-%20(odyssey_contact_form.php).md @@ -119344,26 +121606,43 @@ https://github.com/shanranne/myCVE/issues/4 https://github.com/shashankmangal2/Exploits/blob/master/ThinVNC-RemoteAccess/POC.py https://github.com/sheehan/grails-console/issues/54 https://github.com/sheehan/grails-console/issues/55 +https://github.com/shenxianyuguitian/hris-vuln-sqli/blob/main/README.md +https://github.com/shenxianyuguitian/intern-mms-vuln-XSS/blob/main/README.md +https://github.com/shenxianyuguitian/intern-mms-vuln/blob/main/README.md https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-45813 https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-45814 +https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57430 +https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57431 +https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57432 +https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57433 +https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57434 +https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57437 +https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57438 +https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57440 +https://github.com/shinyColumn/CVE-2025-50110 https://github.com/shipcod3/CVE-2025-48466 https://github.com/shiqumeng/myCVE/issues/10 +https://github.com/shiqumeng/myCVE/issues/3 https://github.com/shirasagi/shirasagi/security/advisories/GHSA-xr45-c2jv-2v9r https://github.com/shish/shimmie2/issues/597 https://github.com/shokaku-cyb/cve/issues/1 +https://github.com/shokaku-cyb/cve/issues/2 https://github.com/shq3526/cve/issues/6 https://github.com/shq3526/cve/issues/7 https://github.com/shuanx/BurpAPIFinder/issues/18 https://github.com/shuanx/BurpAPIFinder/issues/18#issue-2956026808 https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27743.md https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27744.md +https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27746.md https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27747.md https://github.com/shuqi233/loophole/blob/main/Tenda%20AC9/SetSysAutoRebbotCfg-rebootTime.md https://github.com/shuqi233/loophole/blob/main/Tenda%20AC9/WifiBasicSet-security.md https://github.com/shuqi233/loophole/blob/main/Tenda%20AC9/WifiWpsStart-index.md https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-111.md https://github.com/sigstore/gitsign/security/advisories/GHSA-8pmp-678w-c8xx +https://github.com/silent1189/Phpgurukul-Old-Age-Home-Management-System-V1.0-SQL-injection/issues/1 https://github.com/simonhaenisch/md-to-pdf/issues/99 +https://github.com/simplcommerce/SimplCommerce/issues/969 https://github.com/simplesamlphp/saml2/security/advisories/GHSA-46r4-f8gj-xg56 https://github.com/simstudioai/sim/issues/1128 https://github.com/simstudioai/sim/issues/1128#issue-3349260976 @@ -119402,24 +121681,43 @@ https://github.com/sonicdoe/ced/security/advisories/GHSA-27wq-qx3q-fxm9 https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-5rwj-j5m3-3chj https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-jqfh-8hw5-fqjr https://github.com/soruly/whatanime.ga/issues/8 +https://github.com/soundarkutty/Stored-xss/blob/main/poc https://github.com/source-trace/beescms/issues/4 https://github.com/spaceraccoon/CVE-2020-10665 https://github.com/sparkle-project/Sparkle/discussions/2764 +https://github.com/sparklemotion/nokogiri/issues/3500 +https://github.com/sparklemotion/nokogiri/issues/3508 https://github.com/spatie/image-optimizer/issues/210 +https://github.com/spbavarva/CVE-2025-46204 https://github.com/spejman/festivaltts4r/issues/1 https://github.com/splitbrain/dokuwiki/issues/2061 https://github.com/splitbrain/dokuwiki/issues/2081 https://github.com/spoNge369/CVE/blob/main/CVE-2025-45994/README.md https://github.com/spotipy-dev/spotipy/security/advisories/GHSA-h25v-8c87-rvm8 +https://github.com/spotipy-dev/spotipy/security/advisories/GHSA-pwhh-q4h6-w599 +https://github.com/sromanhu/CVE-2023-44769_ZenarioCMS--Reflected-XSS---Alias/tree/main +https://github.com/sromanhu/ConcreteCMS-Arbitrary-file-upload-Thumbnail +https://github.com/sromanhu/ConcreteCMS-Reflected-XSS---Tags +https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Associations +https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Forms +https://github.com/sromanhu/ConcreteCMS-Stored-XSS---SEO +https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Site_Installation +https://github.com/sromanhu/GDidees-CMS-Stored-XSS---Title/tree/main +https://github.com/sromanhu/RiteCMS-File-Upload--XSS---Filemanager/blob/main/README.md +https://github.com/sromanhu/ZenarioCMS--Reflected-XSS---Alias/tree/main +https://github.com/sromanhu/ZenarioCMS--Stored-XSS---Page-Layout https://github.com/sruki3/cve/issues/1 https://github.com/ss122-0ss/cms/blob/main/omos.md https://github.com/stacklok/minder/security/advisories/GHSA-hpcg-xjq5-g666 https://github.com/stacklok/minder/security/advisories/GHSA-q6h8-4j2v-pjg4 https://github.com/stacklok/minder/security/advisories/GHSA-v627-69v2-xx37 https://github.com/stampit-org/supermixer/issues/9 +https://github.com/starship/starship/security/advisories/GHSA-vx24-x4mv-vwr5 +https://github.com/stephenmcd/mezzanine/discussions/2080 https://github.com/sternstundes/cve/blob/main/sql5-campdetails.md https://github.com/sternstundes/cve/blob/main/xss5.md https://github.com/strapi/strapi/security/advisories/GHSA-wrvh-rcmr-9qfc +https://github.com/strik3r0x1/Vulns/blob/main/Clavister_E80-RXSS.md https://github.com/strik3r0x1/Vulns/blob/main/GARO_GLBDCMB-T274WO_Stored_XSS.md https://github.com/strik3r0x1/Vulns/blob/main/SolarView%20Compact%20XSS%20up%20to%207.0.md https://github.com/strik3r0x1/Vulns/blob/main/Unrestricted%20File%20Upload_%20SolarView%20Compact%204.0%2C5.0.md @@ -119429,17 +121727,23 @@ https://github.com/strukturag/libde265/issues/388 https://github.com/strukturag/libde265/issues/393 https://github.com/strukturag/libde265/issues/394 https://github.com/strukturag/libheif/issues/138 +https://github.com/sudo-subho/nepstech-xpon-router-rce +https://github.com/sumatrapdfreader/sumatrapdf/issues/5035 https://github.com/sumingwjl/cve/issues/1 +https://github.com/summernote/summernote/issues/4642 https://github.com/sungjungk/whoopsie_killer https://github.com/sungjungk/whoopsie_killer2/blob/master/README.md https://github.com/sungjungk/whoopsie_killer2/blob/master/whoopsie_killer2.py +https://github.com/surajhacx/CVE-2024-34452/ https://github.com/svanderburg/libiff/issues/10 https://github.com/svgpp/svgpp/issues/70 +https://github.com/swftools/swftools/issues/239 https://github.com/swoole/swoole-src/pull/3539 https://github.com/swwer7000/iot https://github.com/sybrenstuvel/python-rsa/issues/146 https://github.com/sybrenstuvel/python-rsa/issues/146#issuecomment-641845667 https://github.com/sysentr0py/CVEs/tree/main/CVE-2024-37829 +https://github.com/sysentr0py/CVEs/tree/main/CVE-2024-37830 https://github.com/syslog-ng/syslog-ng/security/advisories/GHSA-xr54-gx74-fghg https://github.com/sysstat/sysstat/issues/196 https://github.com/sysstat/sysstat/issues/199 @@ -119447,19 +121751,26 @@ https://github.com/sysstat/sysstat/issues/230 https://github.com/systemd/systemd/issues/4234 https://github.com/systemd/systemd/issues/4234#issuecomment-250441246 https://github.com/syuilo/misskey/security/advisories/GHSA-6qw9-6jxq-xj3p +https://github.com/szluyu99/gin-vue-blog/issues/28 https://github.com/tadashi-aikawa/owlmixin/issues/12 +https://github.com/tangjihong1974/cve/issues/2 +https://github.com/tansique-17/CVE-2025-26198/ https://github.com/taogogo/taocms/issues/6 +https://github.com/tarantool/tarantool/issues/11347 https://github.com/tarantula-team/CSS-injection-in-Swagger-UI https://github.com/tarantula-team/CVE-2019-19203 https://github.com/tarantula-team/CVE-2019-19204 +https://github.com/taurusxin/ncmdump/issues/18 https://github.com/taurusxin/ncmdump/issues/19 https://github.com/tbeu/matio/issues/127 https://github.com/tbeu/matio/issues/128 https://github.com/tbeu/matio/issues/130 +https://github.com/tbeu/matio/issues/267#issue-2883856488 https://github.com/tboothman/imdbphp/issues/88 https://github.com/tddgns/cve/issues/1 https://github.com/teameasy/EasyCMS/issues/4 https://github.com/teameasy/EasyCMS/issues/5 +https://github.com/tempesta-tech/tempesta/issues/1986 https://github.com/tenable/routeros/tree/master/poc/bytheway https://github.com/tenable/routeros/tree/master/poc/cve_2018_14847 https://github.com/tencentmusic/supersonic/issues/2193 @@ -119468,6 +121779,8 @@ https://github.com/thanethomson/MLAlchemy/issues/1 https://github.com/the-girl-who-lived/CVE-2020-11539/ https://github.com/the-tcpdump-group/tcpdump/issues/645 https://github.com/thecasual/CVE-2022-41358 +https://github.com/themanojdesai/python-a2a/issues/40 +https://github.com/themanojdesai/python-a2a/issues/40#issuecomment-2904804388 https://github.com/theori-io/chakra-2016-11 https://github.com/thevindu-w/clip_share_server/security/advisories/GHSA-rc47-h83g-2r8j https://github.com/thinkcmf/cmfx/issues/26 @@ -119499,8 +121812,10 @@ https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-16929 https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-16930 https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-18016 https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-8798 +https://github.com/tintinweb/pub/tree/master/pocs/cve-2020-15690 https://github.com/tjko/jpegoptim/issues/132 https://github.com/tldjgggg/cve/blob/main/sql.md +https://github.com/tolgee/tolgee-platform/security/advisories/GHSA-gx3w-rwh5-w5cg https://github.com/tongjt123/CVE/issues/1 https://github.com/tonini/alchemist-server/issues/14 https://github.com/top-think/framework/issues/2996 @@ -119510,17 +121825,29 @@ https://github.com/torvalds/linux/commit/9a59029bc218b48eff8b5d4dde5662fd79d3e1a https://github.com/torvalds/linux/commit/b1bb5b49373b61bf9d2c73a4d30058ba6f069e4c https://github.com/torvalds/linux/commit/b66c5984017533316fd1951770302649baf1aa33 https://github.com/torvalds/linux/commit/d114b9fe78c8d6fc6e70808c2092aa307c36dc8e +https://github.com/tqlfront/CVE/issues/1 https://github.com/traefik/traefik/security/advisories/GHSA-vrch-868g-9jx5 https://github.com/transcendent-group/advisories/blob/main/CVE-2022-27192.md https://github.com/transmission/transmission/pull/468 +https://github.com/trentm/json/issues/144 https://github.com/trentm/python-markdown2/issues/348 +https://github.com/trifectatechfoundation/sudo-rs/security/advisories/GHSA-98cv-wqjx-wx8f +https://github.com/trifectatechfoundation/sudo-rs/security/advisories/GHSA-w9q3-g4p5-5q2r +https://github.com/trinity273-max/cve/issues/1 +https://github.com/trinity273-max/cve/issues/2 https://github.com/trippo/ResponsiveFilemanager/issues/600 https://github.com/tristao-marinho/CVE-2023-27842 https://github.com/tristao-marinho/CVE-2023-27842/blob/main/README.md https://github.com/tristao-marinho/CVE-2023-41646/ https://github.com/tu3n4nh/netbox/issues/1 +https://github.com/tuooo/CVE/issues/14 +https://github.com/tuooo/CVE/issues/15 +https://github.com/tuooo/CVE/issues/16 +https://github.com/tuooo/CVE/issues/17 +https://github.com/tuooo/CVE/issues/18 https://github.com/tuooo/CVE/issues/5 https://github.com/tursodatabase/libsql/issues/2052 +https://github.com/twisted/twisted/security/advisories/GHSA-cf56-g6w6-pqq2 https://github.com/twosevenzero/shoretel-mitel-rce https://github.com/twothink/twothink/issues/1 https://github.com/typecho/typecho/issues/1535 @@ -119538,7 +121865,9 @@ https://github.com/uclouvain/openjpeg/issues/1053 https://github.com/uclouvain/openjpeg/issues/1057 https://github.com/uclouvain/openjpeg/issues/1178 https://github.com/uclouvain/openjpeg/issues/1231 +https://github.com/uclouvain/openjpeg/issues/1261 https://github.com/uclouvain/openjpeg/issues/1347 +https://github.com/uclouvain/openjpeg/issues/1505 https://github.com/uclouvain/openjpeg/issues/731 https://github.com/uclouvain/openjpeg/issues/732 https://github.com/uclouvain/openjpeg/issues/733 @@ -119589,7 +121918,11 @@ https://github.com/uglory-gll/javasec/blob/main/shiyi-blog.md#4stored-cross-site https://github.com/ulab-uiuc/tiny-scientist/security/advisories/GHSA-rrgf-hcr9-jq6h https://github.com/underprotection/CVE-2019-19550/ https://github.com/unlcms/UNL-CMS/issues/941 +https://github.com/unopim/unopim/security/advisories/GHSA-287x-6r2h-f9mw +https://github.com/unopim/unopim/security/advisories/GHSA-74rg-6f92-g6wx +https://github.com/unopim/unopim/security/advisories/GHSA-8p2f-fx4q-75cx https://github.com/unopim/unopim/security/advisories/GHSA-v22v-xwh7-2vrm +https://github.com/unopim/unopim/security/advisories/GHSA-xr97-25v7-hc2q https://github.com/unpWn4bL3/iot-security/blob/main/1.md https://github.com/upasvi/CVE-/issues/1 https://github.com/upasvi/CVE-/issues/2 @@ -119601,6 +121934,7 @@ https://github.com/upx/upx/issues/315 https://github.com/upx/upx/issues/332 https://github.com/upx/upx/issues/333 https://github.com/upx/upx/issues/378 +https://github.com/upx/upx/issues/379 https://github.com/upx/upx/issues/380 https://github.com/upx/upx/issues/381 https://github.com/upx/upx/issues/388 @@ -119624,6 +121958,7 @@ https://github.com/v1k1ngfr/exploits-rconfig/blob/master/rconfig_sqli.py https://github.com/vah13/OracleCVE/tree/master/CVE-2017-10147 https://github.com/vah13/SAP_exploit https://github.com/vah13/extractTVpasswords +https://github.com/vanhoefm/fragattacks-survey-public/blob/main/README.md https://github.com/varangamin/CVE-2017-6206 https://github.com/varun-suresh/Clustering/issues/12 https://github.com/vedees/wcms/issues/10 @@ -119636,23 +121971,46 @@ https://github.com/vega/vega/security/advisories/GHSA-963h-3v39-3pqf https://github.com/verdammelt/tnef/issues/23 https://github.com/verf1sh/Poc/blob/master/pic_ppm.png https://github.com/verf1sh/Poc/blob/master/poc_ppm +https://github.com/veyon/veyon/issues/657 +https://github.com/viaiam/CVE/issues/5 https://github.com/vim/vim/issues/17940 https://github.com/vim/vim/issues/17940#issuecomment-3203415781 https://github.com/vim/vim/issues/17944 https://github.com/vim/vim/issues/7674 +https://github.com/vim/vim/security/advisories/GHSA-46pw-v7qw-xc2f +https://github.com/vim/vim/security/advisories/GHSA-63p5-mwg2-787v https://github.com/vim/vim/security/advisories/GHSA-f9cr-gv85-hcr4 https://github.com/vim/vim/security/advisories/GHSA-j3g9-wg22-v955 https://github.com/vim/vim/security/advisories/GHSA-rj48-v4mq-j4vg +https://github.com/vincentscode/CVE-2024-34312 https://github.com/vipinxsec/Alfresco_XSS/blob/master/README.md https://github.com/vitejs/vite/security/advisories/GHSA-356w-63v5-8wf4 +https://github.com/vitejs/vite/security/advisories/GHSA-859w-5945-r5v3 https://github.com/vitejs/vite/security/advisories/GHSA-vg6x-rcgg-rjx6 https://github.com/vitest-dev/vitest/security/advisories/GHSA-8gvc-j273-4wm5 +https://github.com/vitest-dev/vitest/security/advisories/GHSA-9crc-q9x8-hgqq https://github.com/vityuasd/VulList/blob/main/vul_1.md https://github.com/vityuasd/VulList/blob/main/vul_2.md https://github.com/vllm-project/vllm/security/advisories/GHSA-6qc9-v4r8-22xg +https://github.com/vllm-project/vllm/security/advisories/GHSA-vc6m-hm49-g9qg +https://github.com/vllm-project/vllm/security/advisories/GHSA-vrq3-r879-7m65 https://github.com/vllm-project/vllm/security/advisories/GHSA-w6q7-j642-7c25 +https://github.com/vphcc/cve1/issues/1 +https://github.com/vphcc/cve1/issues/2 +https://github.com/vphcc/cve1/issues/3 https://github.com/vran-dev/databasir/issues/269 https://github.com/vstakhov/libucl/issues/319 +https://github.com/vullis0/cve/issues/1 +https://github.com/vulnDetailRecord/VulforDevice/blob/main/Tenda/G3/dns_forward_rule_store.md +https://github.com/vulnDetailRecord/VulforDevice/blob/main/Tenda/G3/formAddVpnUsers.md +https://github.com/vulnDetailRecord/VulforDevice/blob/main/Tenda/G3/formDelDhcpRule.md +https://github.com/vulnDetailRecord/VulforDevice/blob/main/Tenda/G3/formIPMacBindModify.md +https://github.com/vulnDetailRecord/VulforDevice/blob/main/Tenda/G3/formModifyPppAuthWhiteMac.md +https://github.com/vulnDetailRecord/VulforDevice/blob/main/Tenda/G3/formSetDebugCfg.md +https://github.com/vulnDetailRecord/VulforDevice/blob/main/Tenda/G3/ipMacBindListStore.md +https://github.com/vulnDetailRecord/VulforDevice/blob/main/Tenda/G3/modifyDhcpRule.md +https://github.com/vulnDetailRecord/VulforDevice/blob/main/Tenda/W30E/UploadCfg.md +https://github.com/vulnDetailRecord/VulforDevice/blob/main/Tenda/W30E/werlessAdvancedSet.md https://github.com/vulnbe/poc-rebar3.git https://github.com/vulnbe/poc-yaws-cgi-shell-injection https://github.com/vulnbe/poc-yaws-dav-xxe @@ -119661,6 +122019,8 @@ https://github.com/vyperlang/vyper/security/advisories/GHSA-4w26-8p97-f4jp https://github.com/vyperlang/vyper/security/advisories/GHSA-5jrj-52x8-m64h https://github.com/w3c/resource-timing/issues/29 https://github.com/w4fz5uck5/FTPGetter/blob/master/xpl.py +https://github.com/waiwai24/0101/blob/main/CVEs/Vaelsys/Unauthorized_Access_Leads_to_Sensitive_Information_Leakage_in_Vaelsys_V4_Platform.md +https://github.com/waiwai24/0101/blob/main/CVEs/Vaelsys/Unauthorized_User_Creation_Vulnerability_Exists_in_Vaelsys_V4_Platform.md https://github.com/walmartlabs/concord/issues/22 https://github.com/wasm3/wasm3/issues/458 https://github.com/wasm3/wasm3/issues/462 @@ -119678,6 +122038,7 @@ https://github.com/wazuh/wazuh/security/advisories/GHSA-hcrc-79hj-m3qh https://github.com/wcndy13/cve/issues/1 https://github.com/webasyst/webasyst-framework/issues/377 https://github.com/websockets/ws/security/advisories/GHSA-3h5v-q93c-6h6q +https://github.com/webzzaa/CVE-/issues/3 https://github.com/weedl/CVE-2025-45620 https://github.com/weison-tech/yii2-cms/issues/2 https://github.com/westes/flex/issues/414 @@ -119687,13 +122048,29 @@ https://github.com/will121351/wenqin.webray.com.cn/blob/main/CVE-project/house-r https://github.com/will121351/wenqin.webray.com.cn/blob/main/CVE-project/house-rentalmanagement-system1.md https://github.com/windhxy/CVE-my/issues/1 https://github.com/wireui/wireui/security/advisories/GHSA-rw5h-g8xq-6877 +https://github.com/withastro/astro/security/advisories/GHSA-9x9c-ghc5-jhw9 https://github.com/withastro/astro/security/advisories/GHSA-m85w-3h95-hcf9 +https://github.com/withastro/astro/security/advisories/GHSA-xf8x-j4p2-f749 https://github.com/wkeyuan/DWSurvey/issues/47 https://github.com/wkeyuan/DWSurvey/issues/81 https://github.com/wlingze/IRify_scan/issues/1 +https://github.com/wllovemy/cve/issues/1 https://github.com/wllovemy/cve/issues/10 +https://github.com/wllovemy/cve/issues/11 +https://github.com/wllovemy/cve/issues/12 +https://github.com/wllovemy/cve/issues/13 +https://github.com/wllovemy/cve/issues/14 +https://github.com/wllovemy/cve/issues/15 +https://github.com/wllovemy/cve/issues/16 +https://github.com/wllovemy/cve/issues/2 +https://github.com/wllovemy/cve/issues/3 +https://github.com/wllovemy/cve/issues/4 https://github.com/wllovemy/cve/issues/5 https://github.com/wllovemy/cve/issues/6 +https://github.com/wllovemy/cve/issues/7 +https://github.com/wllovemy/cve/issues/8 +https://github.com/wllovemy/cve/issues/9 +https://github.com/woodpecker-ci/woodpecker/issues/3924 https://github.com/wooluo/nuclei-templates-2025hw/blob/main/bianque-medical-sql-injection.yaml https://github.com/wooyun123/wooyun/issues/1 https://github.com/wshepherd0010/advisories/blob/master/CVE-2018-8974.md @@ -119701,7 +122078,23 @@ https://github.com/wshepherd0010/advisories/blob/master/CVE-2018-9113.md https://github.com/wsummerhill/BSA-Radar_CVE-Vulnerabilities/blob/master/CVE-2020-14946%20-%20Local%20File%20Inclusion.md https://github.com/wsy149433/cve/blob/main/sql19.md https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_44/44.md +https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_60/60.md +https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_60/60.md#poc +https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_62/62.md#poc +https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_65/65.md +https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md +https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md +https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md +https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md +https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md +https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md +https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md +https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md +https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md#poc +https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md#poc +https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md +https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md#poc https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_79/79.md https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_11/11.md https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_14/14.md @@ -119734,15 +122127,48 @@ https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_33/33.md https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_33/33.md#poc https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_36/36.md https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_36/36.md#poc +https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_37/37.md https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_37/37.md#poc +https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_38/38.md +https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_38/38.md#poc +https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_40/40.md +https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_40/40.md#poc +https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_41/41.md +https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_41/41.md#poc +https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_43/43.md +https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_43/43.md#poc +https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_44/44.md#poc +https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_45/45.md +https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_45/45.md#poc +https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_46/46.md#poc +https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_50/50.md +https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_50/50.md#poc +https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_52/52.md +https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_52/52.md#poc +https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_53/53.md +https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_53/53.md#poc +https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_56/56.md +https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_56/56.md#poc +https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_57/57.md +https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_57/57.md#poc https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_58/58.md https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_58/58.md#poc +https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_59/59.md https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_59/59.md#poc https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_60/60.md https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_60/60.md#poc +https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_61/61.md https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_61/61.md#poc https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_44/44.md +https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_45/45.md +https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_46/46.md https://github.com/wudipjq/my_vuln/blob/main/Tenda3/vuln_58/58.md +https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_34/34.md +https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md +https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md#poc +https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md#poc +https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md +https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md#poc https://github.com/wuzhicms/wuzhicms/issues/128 https://github.com/wuzhicms/wuzhicms/issues/143 https://github.com/wuzhicms/wuzhicms/issues/145 @@ -119757,6 +122183,7 @@ https://github.com/wuzhicms/wuzhicms/issues/172 https://github.com/wuzhicms/wuzhicms/issues/191 https://github.com/wuzhicms/wuzhicms/issues/197 https://github.com/wuzhicms/wuzhicms/issues/200 +https://github.com/wwm1995/weiming_wang/blob/main/daicuocms_1.md https://github.com/wy876/POC/blob/main/OfficeWeb365/OfficeWeb365_%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md https://github.com/wyyyxxxx1017/CVE/issues/10 https://github.com/wyyyxxxx1017/CVE/issues/6 @@ -119765,11 +122192,24 @@ https://github.com/xCss/Valine/issues/127 https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-2384 https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-9793 https://github.com/xairy/kernel-exploits/tree/master/CVE-2017-1000112 +https://github.com/xataio/agent/issues/179 +https://github.com/xcodeOn1/XSS-Stored-Expense-Tracker-App/tree/main https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Free%20and%20Open%20Source%20inventory%20management%20system-SQLi.md https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/OnlineLearningSystemV2-XSS.md https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-Student-Attendance-System.md#2pageattendancexss https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Web-Based%20Student%20Clearance%20System%20-%20SQLi.md https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Web-Based%20Student%20Clearance%20System%20-%20XSS.md +https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/employee-management-system.md#2accountloginphp +https://github.com/xiajian-qx/cve-xiajian/issues/10 +https://github.com/xiajian-qx/cve-xiajian/issues/11 +https://github.com/xiajian-qx/cve-xiajian/issues/2 +https://github.com/xiajian-qx/cve-xiajian/issues/3 +https://github.com/xiajian-qx/cve-xiajian/issues/4 +https://github.com/xiajian-qx/cve-xiajian/issues/5 +https://github.com/xiajian-qx/cve-xiajian/issues/6 +https://github.com/xiajian-qx/cve-xiajian/issues/7 +https://github.com/xiajian-qx/cve-xiajian/issues/8 +https://github.com/xiajian-qx/cve-xiajian/issues/9 https://github.com/xiangxiaobo/poc_and_report/tree/master/podofo_heapoverflow_PdfParser.ReadObjects https://github.com/xiaobor123/tenda-vul-i22 https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir632-dlink @@ -119778,11 +122218,24 @@ https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir632-dlink-FUN_0042 https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir632-dlink-FUN_00425fd8#poc https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir632-dlink-get_pure_content https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir632-dlink-get_pure_content#poc +https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir665-dlink +https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir665-dlink#poc +https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink +https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink#poc +https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink-sub_4091AC +https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink-sub_4091AC#poc +https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear +https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear#poc +https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear +https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear#poc +https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear +https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear#poc https://github.com/xiaobsss/CVE/issues/1 https://github.com/xiaokka/cve/blob/main/sql.md https://github.com/xiaoliyu-1/Pet-grooming-management-print-payment.php-v.1.0-Unauthorized-sql-injection/blob/main/report.md https://github.com/xiaoliyu-1/Pet-grooming-management-print1.php-v.1.0-sql-injection/blob/main/report.md https://github.com/xiaoliyu-1/Pet-grooming-management-view_payorder.php-v.1.0-sql-injection/blob/main/report.md +https://github.com/xiaoqitc/cve-/issues/5 https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md https://github.com/xiaoqx/pocs/blob/master/netpbm https://github.com/xiaoqx/pocs/tree/master/exiv2 @@ -119791,14 +122244,25 @@ https://github.com/xiaoxinkaishi/cve/issues/2 https://github.com/xiaoxinkaishi/cve/issues/3 https://github.com/xiaoxinkaishi/cve/issues/4 https://github.com/xiaoxinkaishi/cve/issues/5 +https://github.com/xiaoyangsec/cve +https://github.com/xiaoyangsec/cve/blob/main/README.md +https://github.com/xiaoyangsec/mccms/blob/main/MCCMS-SSRF.md +https://github.com/xiaoyunjie/openvpn-cms-flask/issues/23 +https://github.com/xiaoyunjie/openvpn-cms-flask/issues/24 +https://github.com/xiaoyunjie/openvpn-cms-flask/issues/24#issuecomment-2948563464 https://github.com/xiayulei/open_source_bms/issues/33 +https://github.com/xibhi/CVE-2025-26206 +https://github.com/xiboon/kurwov/security/advisories/GHSA-hfrv-h3q8-9jpr https://github.com/xiguala123/myCVE/issues/10 https://github.com/xiguala123/myCVE/issues/7 https://github.com/xingrenlvke/cve/issues/1 https://github.com/xingrenlvke/cve/issues/10 https://github.com/xinzfy/cve/issues/1 +https://github.com/xjzzzxx/vulFound/blob/main/icecoder/icecoder8.1_xss1.md https://github.com/xjzzzxx/vulFound/blob/main/icecoder/icecoder8.1_xss2.md +https://github.com/xlang-ai/OpenAgents/issues/141 https://github.com/xoffense/POC/blob/main/Account%20takeover%20using%20CSRF%20in%20ICE%20Hrm%20Version%2029.0.0.OS.md +https://github.com/xoffense/POC/blob/main/Stored%20XSS%20via%20malicious%20file%20upload%20in%20ICE%20Hrm%20Version%2029.0.0.OS.md https://github.com/xtr4nge/FruityWifi/issues/277 https://github.com/xuanluansec/vul/issues/5 https://github.com/xuetang1125/OfficeWeb365/blob/main/OfficeWeb365_%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%20.md @@ -119806,12 +122270,16 @@ https://github.com/xujeff/tianti/issues/39 https://github.com/xujeff/tianti/issues/43 https://github.com/xujeff/tianti/issues/43#issue-3287851827 https://github.com/xuxueli/xxl-job/issues/1921 +https://github.com/xuxueli/xxl-job/issues/2083 https://github.com/xuxueli/xxl-job/issues/3391 https://github.com/xuzhuojia22/cve/blob/main/cvexuzhoujia.md https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jp4x-w9cj-97q7 https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-m9x4-w7p9-mxhx https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qxjg-jhgw-qhrv +https://github.com/xwikisas/xwiki-pro-macros/security/advisories/GHSA-22xj-jpjg-gpgw +https://github.com/xwikisas/xwiki-pro-macros/security/advisories/GHSA-48f4-h726-74p5 https://github.com/xwikisas/xwiki-pro-macros/security/advisories/GHSA-5w8v-h22g-j2mp +https://github.com/xwikisas/xwiki-pro-macros/security/advisories/GHSA-hxqp-983c-m8h9 https://github.com/xxx-www/cve/blob/main/sql8.md https://github.com/xxy1126/Vuln/blob/main/Draytek/4.md https://github.com/xxy961216/attack-baijiacmsV4-with-blind-sql-injection @@ -119826,17 +122294,23 @@ https://github.com/y2xsec324/cve/issues/13 https://github.com/y2xsec324/cve/issues/14 https://github.com/yaklang/IRifyScanResult/blob/main/Web-based%20Pharmacy%20Product%20Management%20System/rce_in_backup.md https://github.com/yaklang/IRifyScanResult/blob/main/Web-based%20Pharmacy%20Product%20Management%20System/sql_inject_in_edit.md +https://github.com/yaklang/IRifyScanResult/blob/main/Web-based%20Pharmacy%20Product%20Management%20System/sql_inject_in_search.md https://github.com/yaklang/IRifyScanResult/blob/main/Web-based%20Pharmacy%20Product%20Management%20System/sql_inject_in_session_email.md https://github.com/yaklang/IRifyScanResult/blob/main/Web-based%20Pharmacy%20Product%20Management%20System/upload_in_add-product.md https://github.com/yaklang/IRifyScanResult/blob/main/Web-based%20Pharmacy%20Product%20Management%20System/upload_in_edit-photo.md https://github.com/yaklang/IRifyScanResult/blob/main/Web-based%20Pharmacy%20Product%20Management%20System/upload_in_edit-product.md https://github.com/yaklang/IRifyScanResult/blob/main/Web-based%20Pharmacy%20Product%20Management%20System/xss_from_input_with_post.md https://github.com/yali-1002/some-poc/blob/main/CVE-2024-41622 +https://github.com/yangfan-lang/cve/issues/3 +https://github.com/yangfan-lang/cve/issues/4 https://github.com/yangfar/CVE/blob/main/Reference%20of%20Binbloom.md https://github.com/yangjiageng/PoC/blob/master/libsolv-PoCs/PoC-testcase_read-2334 https://github.com/yangzhenyu6/CVE/issues/1 +https://github.com/yangzongzhuan/RuoYi/issues/298 +https://github.com/yangzongzhuan/RuoYi/issues/298#issue-3265348205 https://github.com/yanhuoshanjin/cve/issues/1 https://github.com/yaowenxiao721/Poc/blob/main/One-API/One-API-poc.md +https://github.com/yargs/y18n/issues/96 https://github.com/yasm/yasm/issues/161 https://github.com/yasm/yasm/issues/170 https://github.com/yasm/yasm/issues/172 @@ -119855,7 +122329,10 @@ https://github.com/ydnd/cve/issues/7 https://github.com/ydnd/cve/issues/8 https://github.com/yeqifu/carRental/issues/43 https://github.com/yetingli/PoCs/blob/main/CVE-2020-27511/Prototype.md +https://github.com/yeyinshi/tuzicms/issues/13 +https://github.com/yggcwhat/CVE-2025-46078/ https://github.com/yhcyhc981/cve/blob/main/sql16.md +https://github.com/yhirose/cpp-httplib/security/advisories/GHSA-px83-72rx-v57c https://github.com/yihaofuweng/cve/issues/14 https://github.com/yihaofuweng/cve/issues/15 https://github.com/yihaofuweng/cve/issues/16 @@ -119870,14 +122347,17 @@ https://github.com/yihaofuweng/cve/issues/27 https://github.com/yihaofuweng/cve/issues/28 https://github.com/yihaofuweng/cve/issues/29 https://github.com/yihaofuweng/cve/issues/30 +https://github.com/yitianweiming/cve/issues/1 https://github.com/yjlhk/cve/blob/main/README.md https://github.com/yogeshojha/rengine/security/advisories/GHSA-23wx-5q5w-334w https://github.com/yogeshojha/rengine/security/advisories/GHSA-4phc-m2wm-p8x6 https://github.com/yogeshojha/rengine/security/advisories/GHSA-cg75-ph7x-5rr9 +https://github.com/yogeshojha/rengine/security/advisories/GHSA-r3fp-xr9f-wv38 https://github.com/yogeshshe1ke/CVE/blob/master/2019-7690/mobaxterm_exploit.py https://github.com/yoshuawuyts/vmd/issues/137 https://github.com/ysrc/xunfeng/issues/177 https://github.com/ytsutano/axmldec/issues/4 +https://github.com/yuan-max11/mycve/issues/1 https://github.com/yujiyuji159/cve/blob/main/README.md https://github.com/yunhdeng/CVE/issues/1 https://github.com/yxcmf/ukcms/issues/1 @@ -119891,32 +122371,59 @@ https://github.com/yzmcms/yzmcms/issues/3 https://github.com/yzmcms/yzmcms/issues/43 https://github.com/yzmcms/yzmcms/issues/7 https://github.com/z1r00/IOT_Vul/blob/main/Tenda/A18/TendaTelnet/readme.md +https://github.com/z1r00/IOT_Vul/blob/main/Tenda/A18/formWifiBasicSet/readme.md +https://github.com/z472421519/BinaryAudit/blob/main/PoC/NPD/TOTOLink/CONTENT_LENGTH.md +https://github.com/zakumini/CVE-List/blob/main/CVE-2025-46000/CVE-2025-46000.md +https://github.com/zast-ai/vulnerability-reports/blob/main/formidable/file_upload/report.md +https://github.com/zast-ai/vulnerability-reports/blob/main/mall/DOM_XSS.md https://github.com/zchuanzhao/jeesns/issues/6 https://github.com/zchuanzhao/jeesns/issues/9 https://github.com/zeke2997/CVE_request_Sony https://github.com/zeke2997/CVE_request_Sony#3-poc +https://github.com/zeke2997/CVE_request_comet_system +https://github.com/zeke2997/CVE_request_comet_system#poc https://github.com/zencart/zencart/issues/1431 +https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-9xj8-6989-r549 https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hfww-j92m-x8fv https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-p6f3-f63q-5mc2 https://github.com/zer0yu/CVE_Request/blob/master/WonderCMS/wondercms_installUpdateThemePluginAction_plugins.md https://github.com/zer0yu/CVE_Request/blob/master/WonderCMS/wondercms_pluginThemeUrl.md https://github.com/zer0yu/CVE_Request/blob/master/netgear/Netgear_web_interface_exists_authentication_bypass.md https://github.com/zeromicro/go-zero/security/advisories/GHSA-fgxv-gw55-r5fq +https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-0908 +https://github.com/zgqsdx/cve/issues/1 +https://github.com/zgqsdx/cve/issues/2 https://github.com/zgsnj123/CVE-2025-45467/tree/main https://github.com/zhaolu33/CVE/issues/3 https://github.com/zhe293/src2/blob/master/report.md https://github.com/zhimengzhe/iBarn/issues/20 +https://github.com/zhousg/letao/issues/13 +https://github.com/zhousg/letao/issues/13#issue-2977017027 https://github.com/zhuxianjin/vuln_repo/blob/master/chaojicms_stored_xss.md +https://github.com/zhuyi-hz/cve/issues/1 +https://github.com/zhuyi-hz/cve/issues/10 https://github.com/zhuyi-hz/cve/issues/11 https://github.com/zhuyi-hz/cve/issues/12 https://github.com/zhuyi-hz/cve/issues/13 https://github.com/zhuyi-hz/cve/issues/14 https://github.com/zhuyi-hz/cve/issues/15 https://github.com/zhuyi-hz/cve/issues/16 +https://github.com/zhuyi-hz/cve/issues/3 +https://github.com/zhuyi-hz/cve/issues/4 +https://github.com/zhuyi-hz/cve/issues/5 +https://github.com/zhuyi-hz/cve/issues/7 +https://github.com/zhuyi-hz/cve/issues/8 +https://github.com/zhuyi-hz/cve/issues/9 https://github.com/zikula/core/issues/3237 https://github.com/zitadel/zitadel/security/advisories/GHSA-jj94-6f5c-65r8 https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc4.md https://github.com/zlgxzswjy/BUI-select-xss +https://github.com/zlt2000/microservices-platform/issues/77 +https://github.com/zlt2000/microservices-platform/issues/77#issue-3264841808 +https://github.com/zlt2000/microservices-platform/issues/78 +https://github.com/zlt2000/microservices-platform/issues/78#issue-3264847333 +https://github.com/zlt2000/microservices-platform/issues/79 +https://github.com/zlt2000/microservices-platform/issues/79#issue-3264850271 https://github.com/zn9988/publications/blob/main/2.Mage-AI%20-%20Insecure%20Default%20Authentication%20Setup%20Leading%20to%20Zero-Click%20RCE/README.md https://github.com/zrax/pycdc/issues/291 https://github.com/zty-1995/SmartGateway/blob/cd56e1d00c56589accddb63b465b31f6387b51c2/NBR800G_networksafe/README.md @@ -119925,11 +122432,45 @@ https://github.com/zws128/cve/issues/1 https://github.com/zyairelai/CVE-submissions/blob/main/kortex-activate_case-sqli.md https://github.com/zyairelai/CVE-submissions/blob/main/kortex-addcase_stage-sqli.md https://github.com/zyairelai/CVE-submissions/blob/main/kortex-adds-sqli.md +https://github.com/zyairelai/CVE-submissions/blob/main/kortex-deactivate_case-sqli.md +https://github.com/zyairelai/CVE-submissions/blob/main/kortex-register_case-sqli.md https://github.com/zyairelai/CVE-submissions/blob/main/prison-xss.md +https://github.com/zyb26252/CVE/issues/1 +https://github.com/zzZxby/Vulnerability-Exploration/blob/main/%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A11.md https://github.com/zzZxby/Vulnerability-Exploration/blob/main/%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A12.md +https://github.com/zzb1388/cve/issues/1 +https://github.com/zzb1388/cve/issues/10 +https://github.com/zzb1388/cve/issues/11 +https://github.com/zzb1388/cve/issues/12 +https://github.com/zzb1388/cve/issues/13 +https://github.com/zzb1388/cve/issues/14 +https://github.com/zzb1388/cve/issues/15 +https://github.com/zzb1388/cve/issues/16 +https://github.com/zzb1388/cve/issues/17 +https://github.com/zzb1388/cve/issues/18 +https://github.com/zzb1388/cve/issues/19 +https://github.com/zzb1388/cve/issues/2 +https://github.com/zzb1388/cve/issues/20 +https://github.com/zzb1388/cve/issues/21 +https://github.com/zzb1388/cve/issues/22 +https://github.com/zzb1388/cve/issues/23 +https://github.com/zzb1388/cve/issues/24 +https://github.com/zzb1388/cve/issues/26 +https://github.com/zzb1388/cve/issues/27 +https://github.com/zzb1388/cve/issues/28 +https://github.com/zzb1388/cve/issues/29 +https://github.com/zzb1388/cve/issues/3 +https://github.com/zzb1388/cve/issues/30 +https://github.com/zzb1388/cve/issues/31 +https://github.com/zzb1388/cve/issues/32 +https://github.com/zzb1388/cve/issues/33 +https://github.com/zzb1388/cve/issues/34 +https://github.com/zzb1388/cve/issues/35 https://github.com/zzb1388/cve/issues/36 +https://github.com/zzb1388/cve/issues/37 https://github.com/zzb1388/cve/issues/38 https://github.com/zzb1388/cve/issues/39 +https://github.com/zzb1388/cve/issues/4 https://github.com/zzb1388/cve/issues/40 https://github.com/zzb1388/cve/issues/41 https://github.com/zzb1388/cve/issues/42 @@ -119940,6 +122481,7 @@ https://github.com/zzb1388/cve/issues/46 https://github.com/zzb1388/cve/issues/47 https://github.com/zzb1388/cve/issues/48 https://github.com/zzb1388/cve/issues/49 +https://github.com/zzb1388/cve/issues/5 https://github.com/zzb1388/cve/issues/50 https://github.com/zzb1388/cve/issues/51 https://github.com/zzb1388/cve/issues/52 @@ -119949,11 +122491,13 @@ https://github.com/zzb1388/cve/issues/55 https://github.com/zzb1388/cve/issues/57 https://github.com/zzb1388/cve/issues/58 https://github.com/zzb1388/cve/issues/59 +https://github.com/zzb1388/cve/issues/6 https://github.com/zzb1388/cve/issues/60 https://github.com/zzb1388/cve/issues/61 https://github.com/zzb1388/cve/issues/62 https://github.com/zzb1388/cve/issues/63 https://github.com/zzb1388/cve/issues/67 +https://github.com/zzb1388/cve/issues/7 https://github.com/zzb1388/cve/issues/70 https://github.com/zzb1388/cve/issues/71 https://github.com/zzb1388/cve/issues/72 @@ -119964,6 +122508,7 @@ https://github.com/zzb1388/cve/issues/76 https://github.com/zzb1388/cve/issues/77 https://github.com/zzb1388/cve/issues/78 https://github.com/zzb1388/cve/issues/79 +https://github.com/zzb1388/cve/issues/8 https://github.com/zzb1388/cve/issues/80 https://github.com/zzb1388/cve/issues/81 https://github.com/zzb1388/cve/issues/82 @@ -119974,6 +122519,7 @@ https://github.com/zzb1388/cve/issues/86 https://github.com/zzb1388/cve/issues/87 https://github.com/zzb1388/cve/issues/88 https://github.com/zzb1388/cve/issues/89 +https://github.com/zzb1388/cve/issues/9 https://github.com/zzb1388/zzb1/issues/8 https://github.com/zzx-yyds/mycve/issues/2 https://github.com/zzx-yyds/mycve/issues/3 @@ -120875,6 +123421,7 @@ https://kc.mcafee.com/corporate/index?page=content&id=SB10309 https://kc.mcafee.com/corporate/index?page=content&id=SB10310 https://kc.mcafee.com/corporate/index?page=content&id=SB10311 https://kc.mcafee.com/corporate/index?page=content&id=SB10312 +https://kc.mcafee.com/corporate/index?page=content&id=SB10313 https://kc.mcafee.com/corporate/index?page=content&id=SB10314 https://kc.mcafee.com/corporate/index?page=content&id=SB10315 https://kc.mcafee.com/corporate/index?page=content&id=SB10316 @@ -120884,6 +123431,7 @@ https://kc.mcafee.com/corporate/index?page=content&id=SB10319 https://kc.mcafee.com/corporate/index?page=content&id=SB10320 https://kc.mcafee.com/corporate/index?page=content&id=SB10321 https://kc.mcafee.com/corporate/index?page=content&id=SB10323 +https://kc.mcafee.com/corporate/index?page=content&id=SB10324 https://kc.mcafee.com/corporate/index?page=content&id=SB10325 https://kc.mcafee.com/corporate/index?page=content&id=SB10326 https://kc.mcafee.com/corporate/index?page=content&id=SB10327 @@ -120897,6 +123445,7 @@ https://kc.mcafee.com/corporate/index?page=content&id=SB10335 https://kc.mcafee.com/corporate/index?page=content&id=SB10336 https://kc.mcafee.com/corporate/index?page=content&id=SB10338 https://kc.mcafee.com/corporate/index?page=content&id=SB10340 +https://kc.mcafee.com/corporate/index?page=content&id=SB10341 https://kc.mcafee.com/corporate/index?page=content&id=SB10342 https://kc.mcafee.com/corporate/index?page=content&id=SB10343 https://kc.mcafee.com/corporate/index?page=content&id=SB10344 @@ -121540,6 +124089,7 @@ https://novysodope.github.io/2021/10/29/64/ https://novysodope.github.io/2023/04/01/95/ https://novysodope.github.io/2023/07/02/100/ https://nsysean.github.io/posts/dompurify-323-bypass/ +https://ntware.atlassian.net/wiki/spaces/SA/pages/12113215492/2024+Security+Advisory+Device+registration+susceptible+to+compromise https://nullku7.github.io/stuff/exploit/dahua/2017/03/09/dahua-nvr-authbypass.html https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:X/RC:X/CR:M/IR:M/AR:M/MAV:L/MAC:L/MPR:H/MUI:N/MS:C/MC:H/MI:H/MA:H&version=3.1 https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N&version=3.1 @@ -121592,17 +124142,24 @@ https://palantir.safebase.us/?tcuUid=115d9bf4-201f-4cfe-b2fc-219e3a2d945b https://palantir.safebase.us/?tcuUid=14874400-e9c9-4ac4-a8a6-9f4c48a56ff8 https://palantir.safebase.us/?tcuUid=2755c49f-2c30-459e-8bdf-f95ef3692da4 https://palantir.safebase.us/?tcuUid=3c6b63b7-fb67-4202-a94a-9c83515efb8a +https://palantir.safebase.us/?tcuUid=40367943-738c-4e69-b852-4a503c77478a +https://palantir.safebase.us/?tcuUid=42bdb7fa-9a6d-4462-b89d-cabc62f281f4 https://palantir.safebase.us/?tcuUid=4c257f07-58af-4532-892a-bdbe8ab3ec63 https://palantir.safebase.us/?tcuUid=4cf0b6e6-564a-467b-83ae-36fec3a491c3 https://palantir.safebase.us/?tcuUid=5764b094-d3c0-4380-90f2-234f36116c9b https://palantir.safebase.us/?tcuUid=69be99ef-ad24-4339-9017-c8bf70789c72 https://palantir.safebase.us/?tcuUid=7f1fd834-805d-4679-85d0-9d779fa064ae +https://palantir.safebase.us/?tcuUid=8fd5809f-26f8-406e-b36f-4a6596a19d79 +https://palantir.safebase.us/?tcuUid=92dd599a-07e2-43a8-956a-9c9566794be0 https://palantir.safebase.us/?tcuUid=ad6b08b1-2f79-4e32-b125-406dd2b9b1c3 https://palantir.safebase.us/?tcuUid=afcbc9b2-de62-44b9-b28b-2ebf0684fbf7 +https://palantir.safebase.us/?tcuUid=b5724367-8b86-436a-8ef2-4480ec41cc2c https://palantir.safebase.us/?tcuUid=b60db1ee-4b1a-475d-848e-c5a670a0da16 https://palantir.safebase.us/?tcuUid=bbc1772c-e10a-45cc-b89f-48cc1a8b2cfc +https://palantir.safebase.us/?tcuUid=d2366a3e-a92c-476e-8a7a-7db60e4be567 https://palantir.safebase.us/?tcuUid=d839709d-c50f-4a37-8faa-b0c35054418a https://palantir.safebase.us/?tcuUid=e62e4dad-b39b-48ba-ba30-7b7c83406ad9 +https://palantir.safebase.us/?tcuUid=f9bf67ef-be15-4f87-a526-bf6064e8f682 https://palantir.safebase.us/?tcuUid=fe021f28-9e25-42c4-acd8-772cd8006ced https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys https://paste.sr.ht/~edaigle/0b4a037fbd3166c8c72fee18efaa7decaf75b0ab @@ -121753,8 +124310,10 @@ https://playframework.com/security/vulnerability/CVE-2014-3630-XmlExternalEntity https://poctestblog.blogspot.com/2017/12/samsung-internet-browser-sop-bypassuxss.html https://podalirius.net/cves/2020-16147/ https://podalirius.net/cves/2020-16148/ +https://podalirius.net/en/articles/python-vulnerabilities-code-execution-in-jinja-templates/ https://podalirius.net/en/cves/2020-16147/ https://podalirius.net/en/cves/2020-16148/ +https://podalirius.net/en/publications/grehack-2021-optimizing-ssti-payloads-for-jinja2/ https://portal.perforce.com/s/cve/a91PA000001Smp7YAC/insufficiently-protected-credentials-in-puppet-enterprise-20254-and-20255 https://portal.perforce.com/s/detail/a91PA000001STsvYAG https://portal.perforce.com/s/detail/a91PA000001STuXYAW @@ -121867,8 +124426,10 @@ https://r.sec-consult.com/imageaccess https://r.sec-consult.com/imonitor https://r.sec-consult.com/kiosoft https://r.sec-consult.com/kiuwan +https://r.sec-consult.com/lawo https://r.sec-consult.com/metaventis https://r.sec-consult.com/numerix +https://r.sec-consult.com/omada https://r.sec-consult.com/onlyoffice https://r.sec-consult.com/openolat https://r.sec-consult.com/optimizely @@ -121985,6 +124546,7 @@ https://reddassolutions.com/blog/tenda_w18e_security_research https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-lb-link-bl-w1210m-router/ https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-netgear-wnr614-router/ https://redmaple.tech/blogs/2023/extract-bitwarden-vault-passwords/ +https://redmine.openinfosecfoundation.org/issues/7209 https://redmine.pfsense.org/issues/9554#change-40729 https://redteam.pl/poc/dasan-zhone-znid-gpon-2426a-eu.html https://redteamzone.com/ThinVNC/ @@ -122064,6 +124626,7 @@ https://research.loginsoft.com/bugs/invalid-memory-access-in-gatomiccounter-gato https://research.loginsoft.com/bugs/invalid-memory-access-in-gfxindexedcolorspacemapcolortobase-pdfalto-0-2/ https://research.loginsoft.com/bugs/invalid-memory-access-in-textpagefindgaps-xpdf-4-01/ https://research.loginsoft.com/bugs/invalid-memory-access-vulnerability-in-function-do_checksum-tcpreplay-4-3-1/ +https://research.loginsoft.com/bugs/multiple-vulnerabilities-discovered-in-the-d-link-firmware-dir-816l/ https://research.loginsoft.com/bugs/null-pointer-dereference-in-function-agroot/ https://research.loginsoft.com/bugs/null-pointer-dereference-in-h5ac-c-hdf5-1-13-0/ https://research.loginsoft.com/bugs/null-pointer-dereference-in-h5fquery-c-hdf5-1-13-0/ @@ -122162,6 +124725,7 @@ https://satoshihunter1.blogspot.com/2023/06/the-bitcoin-app-is-vulnerable-to-hac https://saturncloud.io/blog/cors-cannot-use-wildcard-in-accesscontrolalloworigin-when-credentials-flag-is-true https://savannah.gnu.org/bugs/?52264 https://savannah.gnu.org/bugs/?52265 +https://savannah.gnu.org/bugs/?59897 https://savannah.gnu.org/bugs/?62387 https://savannah.gnu.org/bugs/?62977 https://savannah.gnu.org/bugs/?67049 @@ -123012,6 +125576,7 @@ https://service.gxsoftware.com https://service.gxsoftware.com/hc/en-us/articles/4717373636381-Vulnerability-in-Spring-core-Spring4Shell- https://service.gxsoftware.com/hc/nl/articles/12208173122461 https://service.mcafee.com/?articleId=TS103243 +https://service.mcafee.com/?articleId=TS103271&page=shell&shell=article-view https://service.mcafee.com/?articleId=TS103273&page=shell&shell=article-view https://service.mcafee.com/?articleId=TS103318&page=shell&shell=article-view https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102462 @@ -123861,6 +126426,7 @@ https://support.coros.com/hc/en-us/categories/4416357319956-Software-Updates https://support.dcmtk.org/redmine/issues/1155 https://support.dcmtk.org/redmine/issues/1155?tab=history#note-1 https://support.delphix.com/Support_Policies_and_Technical_Bulletins/Technical_Bulletins/TB111_Delphix_Plugin_for_Jenkins_Vulnerable_to_Credential_Enumeration_and_Capture +https://support.deskpro.com/en/news/posts/deskpro-v2019-8-0-released-security-update https://support.dreametech.com/hc/en-us https://support.gog.com/hc/en-us/articles/360025458833-GOG-GALAXY-2-0-updates-and-known-issues https://support.gog.com/hc/en-us/categories/201553005-Downloads-Installing?product=gog @@ -124471,6 +127037,7 @@ https://talosintelligence.com/vulnerability_reports/TALOS-2024-1998 https://talosintelligence.com/vulnerability_reports/TALOS-2024-2068 https://talosintelligence.com/vulnerability_reports/TALOS-2024-2069 https://talosintelligence.com/vulnerability_reports/TALOS-2024-2071 +https://talosintelligence.com/vulnerability_reports/TALOS-2024-2093 https://talosintelligence.com/vulnerability_reports/TALOS-2024-2094 https://talosintelligence.com/vulnerability_reports/TALOS-2024-2112 https://talosintelligence.com/vulnerability_reports/TALOS-2024-2128 @@ -124565,6 +127132,7 @@ https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-2 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-unauth-access https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-xml-ext-entity https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-wi-fi-info-disclosure +https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-VU855201-J3z8CKTX https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-F26WwJW https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dos-55AYyxYr https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-fileread-PbHbgHMj @@ -124711,30 +127279,49 @@ https://vuldb.com/?id.214774 https://vuldb.com/?id.214790 https://vuldb.com/?id.223398 https://vuldb.com/?id.236184 +https://vuldb.com/?id.237517 https://vuldb.com/?id.237557 https://vuldb.com/?id.238048 +https://vuldb.com/?id.238159 https://vuldb.com/?id.238576 https://vuldb.com/?id.239254 https://vuldb.com/?id.239795 +https://vuldb.com/?id.239857 https://vuldb.com/?id.239866 https://vuldb.com/?id.240242 https://vuldb.com/?id.241647 https://vuldb.com/?id.243590 https://vuldb.com/?id.243802 https://vuldb.com/?id.246104 +https://vuldb.com/?id.247156 https://vuldb.com/?id.247249 https://vuldb.com/?id.247338 https://vuldb.com/?id.247907 https://vuldb.com/?id.248256 +https://vuldb.com/?id.248743 +https://vuldb.com/?id.249364 +https://vuldb.com/?id.249367 +https://vuldb.com/?id.249388 +https://vuldb.com/?id.249770 https://vuldb.com/?id.249778 https://vuldb.com/?id.250430 https://vuldb.com/?id.250716 https://vuldb.com/?id.252716 +https://vuldb.com/?id.257382 https://vuldb.com/?id.257940 +https://vuldb.com/?id.262488 +https://vuldb.com/?id.263115 +https://vuldb.com/?id.263313 +https://vuldb.com/?id.263808 +https://vuldb.com/?id.268695 +https://vuldb.com/?id.269487 +https://vuldb.com/?id.269805 https://vuldb.com/?id.270366 +https://vuldb.com/?id.271457 https://vuldb.com/?id.273529 https://vuldb.com/?id.274061 https://vuldb.com/?id.280359 +https://vuldb.com/?id.281985 https://vuldb.com/?id.282608 https://vuldb.com/?id.283038 https://vuldb.com/?id.283544 @@ -124816,11 +127403,22 @@ https://vuldb.com/?id.302032 https://vuldb.com/?id.303107 https://vuldb.com/?id.304671 https://vuldb.com/?id.306402 +https://vuldb.com/?id.307478 https://vuldb.com/?id.308199 +https://vuldb.com/?id.308221 https://vuldb.com/?id.309086 +https://vuldb.com/?id.309456 +https://vuldb.com/?id.309502 https://vuldb.com/?id.311713 +https://vuldb.com/?id.313392 https://vuldb.com/?id.313561 +https://vuldb.com/?id.315029 +https://vuldb.com/?id.315114 +https://vuldb.com/?id.316100 +https://vuldb.com/?id.317028 +https://vuldb.com/?id.320767 https://vuldb.com/?id.321060 +https://vuldb.com/?id.321215 https://vuldb.com/?id.321221 https://vuldb.com/?id.321866 https://vuldb.com/?id.322109 @@ -124828,12 +127426,18 @@ https://vuldb.com/?id.322342 https://vuldb.com/?id.325958 https://vuldb.com/?id.325986 https://vuldb.com/?id.326093 +https://vuldb.com/?id.326095 https://vuldb.com/?id.4143 https://vuldb.com/?id.8900 +https://vuldb.com/?submit.320855 +https://vuldb.com/?submit.381091 https://vuldb.com/?submit.383643 +https://vuldb.com/?submit.511471 https://vuldb.com/?submit.517305 https://vuldb.com/?submit.544136 https://vuldb.com/?submit.549268 +https://vuldb.com/?submit.582963 +https://vuldb.com/?submit.603352 https://vulmon.com/exploitdetails?qidtp=EDB&qid=20759 https://vulmon.com/exploitdetails?qidtp=EDB&qid=46180 https://vuln.be/post/rebar3-command-injection/ @@ -126230,6 +128834,7 @@ https://wpscan.com/vulnerability/4b7c61da-952c-492a-8ce6-3c2126942a7c https://wpscan.com/vulnerability/4b8b9638-d52a-40bc-b298-ae1c74788c18/ https://wpscan.com/vulnerability/4bb559b7-8dde-4c90-a9a6-d8dcfbea53a7 https://wpscan.com/vulnerability/4bb92693-23b3-4250-baee-af38b7e615e0/ +https://wpscan.com/vulnerability/4bda5dff-f577-4cd8-a225-c6b4c32f22b4 https://wpscan.com/vulnerability/4bea7baa-84a2-4b21-881c-4f17822329e7/ https://wpscan.com/vulnerability/4c13a93d-2100-4721-8937-a1205378655f https://wpscan.com/vulnerability/4c1b0e5e-245a-4d1f-a561-e91af906e62d @@ -129191,6 +131796,8 @@ https://www.cente.jp/obstacle/4963/ https://www.certik.com/resources/blog/cors-anywhere-dangers-of-misconfigured-third-party-software https://www.chtsecurity.com/news/13a86b33-7e49-4167-9682-7ff3f51cbcba%20 https://www.chtsecurity.com/news/4ffbe017-70e1-4789-bfe6-4d6fb0d1a0b7 +https://www.chtsecurity.com/news/57fd2fe6-11d9-421d-9087-88b4d5090452 +https://www.chtsecurity.com/news/afe25fb4-55ac-45d9-9ece-cbc1edda2fb2%20 https://www.chudamax.com/posts/multiple-vulnerabilities-in-belloo-dating-script/ https://www.cirosec.de/fileadmin/1._Unternehmen/1.4._Unsere_Kompetenzen/Security_Advisory_AudioCodes_Mediant_family.pdf https://www.cisa.gov/news-events/ics-advisories/icsa-12-325-01 @@ -138685,6 +141292,8 @@ https://www.imagemagick.org/script/changelog.php https://www.immuniweb.com/advisory/HTB22913 https://www.immuniweb.com/advisory/HTB23039 https://www.immuniweb.com/advisory/HTB23169 +https://www.imperva.com/blog/beware-a-threat-actor-could-steal-the-titles-of-your-private-and-draft-wordpress-posts/ +https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ https://www.infosecsanyam.blogspot.com/2019/12/d-link-dir-615-wireless-routervertical.html https://www.inputzero.io/2018/09/telegram-share-password-in-cleartext.html https://www.inputzero.io/2019/02/fuzzing-webkit.html @@ -138830,12 +141439,14 @@ https://www.kroll.com/en/insights/publications/cyber/cve-2021-43702-from-discove https://www.kyberturvallisuuskeskus.fi/en/vulnerabilities-mirasys-vms-video-management-solution https://www.labarchives.com/labarchives-knowledge-base/2022-feature-releases-2/ https://www.labs.greynoise.io/grimoire/2024-08-20-bluuid-firewalla/ +https://www.leavesongs.com/PENETRATION/docker-php-include-getshell.html#0x06-pearcmdphp https://www.leviathansecurity.com/research/tunnelvision https://www.linkedin.com/in/abdallah-fouad/ https://www.linkedin.com/pulse/buffer-overflow-exploitation-british-airways-system-marco-gisbert/ https://www.linkedin.com/pulse/cve-2021-35508-privilege-escalation-via-weak-windows-marshall-mba https://www.linkedin.com/pulse/cve-2021-43609-write-up-division5-security-4lgwe https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies +https://www.mail-archive.com/fulldisclosure%40seclists.org/msg07139.html https://www.mail-archive.com/fulldisclosure%40seclists.org/msg07140.html https://www.mail-archive.com/netdev%40vger.kernel.org/msg186255.html https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg116312.html @@ -138926,6 +141537,7 @@ https://www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-buildi https://www.onapsis.com/blog/oracle-fixes-record-276-vulnerabilities-july-2016 https://www.onekey.com/resource/security-advisory-remote-command-execution-on-smartbedded-meteobridge-cve-2025-4008 https://www.onvio.nl/nieuws/research-day-discovering-vulnerabilities-in-wordpress-plugins +https://www.op-c.net/2020/05/15/dll-injection-attack-in-kerberos-npm-package/ https://www.open-emr.org/wiki/images/1/11/Openemr_insecurity.pdf https://www.openldap.org/its/index.cgi/Incoming?id=9123 https://www.openoffice.org/security/cves/CVE-2016-6803.html @@ -139236,6 +141848,7 @@ https://www.rootshellsecurity.net/rootshell-discover-denial-of-service-flaw-deka https://www.rootshellsecurity.net/rootshell-discovered-a-critical-vulnerability-in-top-wordpress-theme/ https://www.rsa.com/en-us/company/vulnerability-response-policy https://www.ruby-lang.org/en/news/2014/05/09/dispute-of-vulnerability-cve-2014-2734/ +https://www.ruijie.com.cn/gy/xw-aqtg-gw/91389/ https://www.safecloud.co.th/researches/blog/CVE-2024-53522 https://www.saotn.org/wordpress-advisory-akal-theme-xss-vulnerability/ https://www.schneider-elektronik.de/wp-content/uploads/2024/07/SAR-202405-1.pdf @@ -139349,6 +141962,8 @@ https://www.seebug.org/vuldb/ssvid-97867 https://www.seebug.org/vuldb/ssvid-97883 https://www.seebug.org/vuldb/ssvid-97884 https://www.seebug.org/vuldb/ssvid-97885 +https://www.seebug.org/vuldb/ssvid-97925 +https://www.seebug.org/vuldb/ssvid-97926 https://www.seebug.org/vuldb/ssvid-97928 https://www.seebug.org/vuldb/ssvid-97938 https://www.seebug.org/vuldb/ssvid-97950 @@ -139357,6 +141972,7 @@ https://www.seebug.org/vuldb/ssvid-97995 https://www.seebug.org/vuldb/ssvid-97996 https://www.seebug.org/vuldb/ssvid-98023 https://www.seebug.org/vuldb/ssvid-98024 +https://www.seebug.org/vuldb/ssvid-99835 https://www.seekurity.com/blog/advisories/cross-sitescripting-vulnerability-in-phpsocial-aka-phpdolphin-social-network-script/ https://www.seekurity.com/blog/general/cve-2017-17713-and-cve-2017-17714-multiple-sql-injections-and-xss-vulnerabilities-found-in-the-hackers-tracking-tool-trape-boxug/ https://www.seekurity.com/blog/general/metasploit-web-project-kill-all-running-tasks-csrf-CVE-2017-5244/ @@ -140526,6 +143142,7 @@ https://www.zdnet.com/article/new-cold-boot-attack-affects-seven-years-of-lg-and https://www.zdnet.com/article/unpatched-kde-vulnerability-disclosed-on-twitter/ https://www.zdnet.com/article/wifi-firmware-bug-affects-laptops-smartphones-routers-gaming-devices/ https://www.zdnet.com/article/wordpress-deploys-forced-security-update-for-dangerous-bug-in-popular-plugin/ +https://www.zdnet.com/article/zoho-zero-day-published-on-twitter/ https://www.zerodayinitiative.com/blog/2022/3/16/abusing-arbitrary-file-deletes-to-escalate-privilege-and-other-great-tricks https://www.zeroscience.mk/en/vulnerabilities https://www.zeroscience.mk/en/vulnerabilities/