Update CVE sources 2024-07-25 21:25

This commit is contained in:
0xMarcio
2024-07-25 21:25:12 +00:00
parent 1dc77909f8
commit d6bcaa53f2
1879 changed files with 18812 additions and 361 deletions

View File

@@ -28,6 +28,7 @@ No PoCs from references.
- https://github.com/CCIEVoice2009/oscp-survival
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CYBER-PUBLIC-SCHOOL/linux-privilege-escalation-cheatsheet
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/DhivaKD/OSCP-Notes
- https://github.com/DictionaryHouse/The-Security-Handbook-Kali-Linux
@@ -57,6 +58,7 @@ No PoCs from references.
- https://github.com/T3b0g025/PWK-CheatSheet
- https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/a-roshbaik/Linux-Privilege-Escalation-Exploits
- https://github.com/akr3ch/OSCP-Survival-Guide
- https://github.com/aktechnohacker/OSCP-Notes
- https://github.com/albinjoshy03/linux-kernel-exploits
@@ -104,6 +106,7 @@ No PoCs from references.
- https://github.com/kicku6/Opensource88888
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/kyuna312/Linux_menthor
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/make0day/pentest
- https://github.com/manas3c/OSCP-note

View File

@@ -25,6 +25,7 @@ No PoCs from references.
- https://github.com/VictorSum/13.1
- https://github.com/Wernigerode23/Uiazvimosty
- https://github.com/Zhivarev/13-01-hw
- https://github.com/bigb0x/CVE-2024-6387
- https://github.com/kaio6fellipe/ssh-enum
- https://github.com/scmanjarrez/CVEScannerV2
- https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems

17
2012/CVE-2012-0816.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2012-0816](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0816)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue)
### Description
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/bigb0x/CVE-2024-6387

View File

@@ -22,6 +22,7 @@ The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.
- https://github.com/Kiosec/Windows-Exploitation
- https://github.com/Qftm/Information_Collection_Handbook
- https://github.com/amishamunjal-az/Week16-Homework
- https://github.com/casohub/multinmap
- https://github.com/esteban0477/RedTeamPlaybook
- https://github.com/jlashay/Penetration-Testing-1
- https://github.com/joneswu456/rt-n56u

View File

@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/0day666/Vulnerability-verification
- https://github.com/20142995/Goby
- https://github.com/20142995/nuclei-templates
- https://github.com/4ARMED/nmap-nse-scripts
- https://github.com/7hang/cyber-security-interview
- https://github.com/ARPSyndicate/cvemon

View File

@@ -18,5 +18,6 @@ No PoCs from references.
- https://github.com/akircanski/coinbugs
- https://github.com/dmp1ce/eloipool-docker
- https://github.com/fmerg/pymerkle
- https://github.com/slowmist/Cryptocurrency-Security-Audit-Guide
- https://github.com/uvhw/conchimgiangnang

View File

@@ -30,6 +30,7 @@ libdbus 1.5.x and earlier, when used in setuid or other privileged programs in X
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/a-roshbaik/Linux-Privilege-Escalation-Exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp

View File

@@ -14,4 +14,5 @@ Multiple directory traversal vulnerabilities in MySQLDumper 1.24.4 allow remote
#### Github
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/gnarkill78/CSA_S2_2024

View File

@@ -14,4 +14,5 @@ Cross-site scripting (XSS) vulnerability in libs/xing.php in the 2 Click Social
#### Github
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/gnarkill78/CSA_S2_2024

View File

@@ -14,4 +14,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/gnarkill78/CSA_S2_2024

View File

@@ -13,6 +13,7 @@ Apache Tomcat through 7.0.x allows remote attackers to cause a denial of service
No PoCs from references.
#### Github
- https://github.com/SinghNanak/apache-dos
- https://github.com/h0ussni/pwnloris
- https://github.com/nsdhanoa/apache-dos