diff --git a/2005/CVE-2005-1517.md b/2005/CVE-2005-1517.md new file mode 100644 index 0000000000..c86e25ef65 --- /dev/null +++ b/2005/CVE-2005-1517.md @@ -0,0 +1,17 @@ +### [CVE-2005-1517](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1517) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Unknown vulnerability in Cisco Firewall Services Module (FWSM) 2.3.1 and earlier, when using URL, FTP, or HTTPS filtering exceptions, allows certain TCP packets to bypass access control lists (ACLs). + +### POC + +#### Reference +- http://www.cisco.com/warp/public/707/cisco-sa-20050511-url.shtml + +#### Github +No PoCs found on GitHub currently. + diff --git a/2008/CVE-2008-3531.md b/2008/CVE-2008-3531.md index a7cd9b1dd0..bc846f6470 100644 --- a/2008/CVE-2008-3531.md +++ b/2008/CVE-2008-3531.md @@ -15,4 +15,5 @@ No PoCs from references. #### Github - https://github.com/CVEDB/awesome-cve-repo - https://github.com/Snoopy-Sec/Localroot-ALL-CVE +- https://github.com/test-one9/ps4-11.50.github.io diff --git a/2008/CVE-2008-4609.md b/2008/CVE-2008-4609.md index 0172ecf3e5..32bdf780b9 100644 --- a/2008/CVE-2008-4609.md +++ b/2008/CVE-2008-4609.md @@ -19,6 +19,7 @@ The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Micros - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/Live-Hack-CVE/CVE-2008-4609 +- https://github.com/comeillfoo/netverif - https://github.com/marcelki/sockstress - https://github.com/mrclki/sockstress diff --git a/2011/CVE-2011-2523.md b/2011/CVE-2011-2523.md index faff199c27..59e638badc 100644 --- a/2011/CVE-2011-2523.md +++ b/2011/CVE-2011-2523.md @@ -67,6 +67,7 @@ vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which - https://github.com/giusepperuggiero96/Network-Security-2021 - https://github.com/gwyomarch/CVE-Collection - https://github.com/hack-parthsharma/Vision +- https://github.com/jaykerzb/Metasploitable - https://github.com/jaytiwari05/vsftpd_2.3.4_Exploit - https://github.com/k8gege/Ladon - https://github.com/nobodyatall648/CVE-2011-2523 diff --git a/2014/CVE-2014-1607.md b/2014/CVE-2014-1607.md new file mode 100644 index 0000000000..389eed90b2 --- /dev/null +++ b/2014/CVE-2014-1607.md @@ -0,0 +1,17 @@ +### [CVE-2014-1607](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1607) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +** DISPUTED ** Cross-site scripting (XSS) vulnerability in the EventCalendar module for Drupal 7.14 allows remote attackers to inject arbitrary web script or HTML via the year parameter to eventcalander/. NOTE: this issue has been disputed by the Drupal Security Team; it may be site-specific. If so, then this CVE will be REJECTed in the future. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2014/CVE-2014-2734.md b/2014/CVE-2014-2734.md index 703860a17f..44deb2f571 100644 --- a/2014/CVE-2014-2734.md +++ b/2014/CVE-2014-2734.md @@ -21,5 +21,6 @@ - https://github.com/ARPSyndicate/cvemon - https://github.com/adrienthebo/cve-2014-2734 - https://github.com/chnzzh/OpenSSL-CVE-lib +- https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/gdisneyleugers/CVE-2014-2734 diff --git a/2014/CVE-2014-2913.md b/2014/CVE-2014-2913.md index d1013cd462..af3b66b6a1 100644 --- a/2014/CVE-2014-2913.md +++ b/2014/CVE-2014-2913.md @@ -15,5 +15,6 @@ #### Github - https://github.com/bootc/nrpe-ng +- https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/ohsawa0515/ec2-vuls-config diff --git a/2014/CVE-2014-2941.md b/2014/CVE-2014-2941.md index becb3914d7..f4b463508f 100644 --- a/2014/CVE-2014-2941.md +++ b/2014/CVE-2014-2941.md @@ -13,5 +13,5 @@ - http://www.kb.cert.org/vuls/id/269991 #### Github -No PoCs found on GitHub currently. +- https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2014/CVE-2014-3180.md b/2014/CVE-2014-3180.md new file mode 100644 index 0000000000..daf143a5ed --- /dev/null +++ b/2014/CVE-2014-3180.md @@ -0,0 +1,17 @@ +### [CVE-2014-3180](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3180) +![](https://img.shields.io/static/v1?label=Product&message=kernel&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=out-of-bounds%20read&color=brighgreen) + +### Description + +** DISPUTED ** In kernel/compat.c in the Linux kernel before 3.17, as used in Google Chrome OS and other products, there is a possible out-of-bounds read. restart_syscall uses uninitialized data when restarting compat_sys_nanosleep. NOTE: this is disputed because the code path is unreachable. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2015/CVE-2015-10007.md b/2015/CVE-2015-10007.md index 95fef81d17..1f7226d39a 100644 --- a/2015/CVE-2015-10007.md +++ b/2015/CVE-2015-10007.md @@ -14,4 +14,5 @@ #### Github - https://github.com/Live-Hack-CVE/CVE-2015-10007 +- https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2015/CVE-2015-10008.md b/2015/CVE-2015-10008.md index b3e09ba3d9..7c9db8d69f 100644 --- a/2015/CVE-2015-10008.md +++ b/2015/CVE-2015-10008.md @@ -14,4 +14,5 @@ #### Github - https://github.com/Live-Hack-CVE/CVE-2015-10008 +- https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2015/CVE-2015-10012.md b/2015/CVE-2015-10012.md index 983e05d0bf..971aa667d2 100644 --- a/2015/CVE-2015-10012.md +++ b/2015/CVE-2015-10012.md @@ -14,4 +14,5 @@ No PoCs from references. #### Github - https://github.com/Live-Hack-CVE/CVE-2015-10012 +- https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2015/CVE-2015-10041.md b/2015/CVE-2015-10041.md index d69b297caf..500c3a42d5 100644 --- a/2015/CVE-2015-10041.md +++ b/2015/CVE-2015-10041.md @@ -14,4 +14,5 @@ #### Github - https://github.com/Live-Hack-CVE/CVE-2015-10041 +- https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2015/CVE-2015-10042.md b/2015/CVE-2015-10042.md index 0a1ef3a2a7..9d77bb7c01 100644 --- a/2015/CVE-2015-10042.md +++ b/2015/CVE-2015-10042.md @@ -14,4 +14,5 @@ No PoCs from references. #### Github - https://github.com/Live-Hack-CVE/CVE-2015-10042 +- https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2015/CVE-2015-10052.md b/2015/CVE-2015-10052.md index d3f3e738be..181a5a0e1d 100644 --- a/2015/CVE-2015-10052.md +++ b/2015/CVE-2015-10052.md @@ -14,4 +14,5 @@ No PoCs from references. #### Github - https://github.com/Live-Hack-CVE/CVE-2015-10052 +- https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2015/CVE-2015-10087.md b/2015/CVE-2015-10087.md index 917c3e7b37..7d95e25bb5 100644 --- a/2015/CVE-2015-10087.md +++ b/2015/CVE-2015-10087.md @@ -14,5 +14,5 @@ - https://www.exploit-db.com/exploits/36372 #### Github -No PoCs found on GitHub currently. +- https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2015/CVE-2015-10106.md b/2015/CVE-2015-10106.md new file mode 100644 index 0000000000..ef54df22e3 --- /dev/null +++ b/2015/CVE-2015-10106.md @@ -0,0 +1,17 @@ +### [CVE-2015-10106](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-10106) +![](https://img.shields.io/static/v1?label=Product&message=mh_httpbl%20Extension&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.1.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in mback2k mh_httpbl Extension up to 1.1.7 on TYPO3. This vulnerability affects the function moduleContent of the file mod1/index.php. The manipulation leads to sql injection. The attack can be initiated remotely. Upgrading to version 1.1.8 is able to address this issue. The patch is identified as 429f50f4e4795b20dae06735b41fb94f010722bf. It is recommended to upgrade the affected component. VDB-230086 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2015/CVE-2015-1992.md b/2015/CVE-2015-1992.md index 90968d63db..c1126bab01 100644 --- a/2015/CVE-2015-1992.md +++ b/2015/CVE-2015-1992.md @@ -13,5 +13,6 @@ IBM Systems Director 5.2.x, 6.1.x, 6.2.0.x, 6.2.1.x, 6.3.0.0, 6.3.1.x, 6.3.2.x, No PoCs from references. #### Github +- https://github.com/jjljyn/Cve-with-their-PoC-s - https://github.com/kaRaGODDD/Cve-with-their-PoC-s diff --git a/2015/CVE-2015-8709.md b/2015/CVE-2015-8709.md index 5bd753d2fe..10c1bcfd6c 100644 --- a/2015/CVE-2015-8709.md +++ b/2015/CVE-2015-8709.md @@ -13,5 +13,5 @@ - http://www.openwall.com/lists/oss-security/2015/12/17/12 #### Github -No PoCs found on GitHub currently. +- https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2016/CVE-2016-6170.md b/2016/CVE-2016-6170.md index 64ae345801..791869373f 100644 --- a/2016/CVE-2016-6170.md +++ b/2016/CVE-2016-6170.md @@ -27,6 +27,7 @@ No PoCs from references. - https://github.com/fokypoky/places-list - https://github.com/pexip/os-bind9 - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems - https://github.com/zzzWTF/db-13-01 diff --git a/2016/CVE-2016-8735.md b/2016/CVE-2016-8735.md index d45ee2ff1a..89f5db7cea 100644 --- a/2016/CVE-2016-8735.md +++ b/2016/CVE-2016-8735.md @@ -20,6 +20,7 @@ Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7 - https://github.com/ARPSyndicate/cvemon - https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet - https://github.com/BrittanyKuhn/javascript-tutorial +- https://github.com/Drun1baby/CVE-Reproduction-And-Analysis - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors diff --git a/2016/CVE-2016-8864.md b/2016/CVE-2016-8864.md index 3fc2a50503..65e5270147 100644 --- a/2016/CVE-2016-8864.md +++ b/2016/CVE-2016-8864.md @@ -29,6 +29,7 @@ No PoCs from references. - https://github.com/fir3storm/Vision2 - https://github.com/pexip/os-bind9 - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems - https://github.com/zzzWTF/db-13-01 diff --git a/2016/CVE-2016-9131.md b/2016/CVE-2016-9131.md index 4326d81f90..c15976cf80 100644 --- a/2016/CVE-2016-9131.md +++ b/2016/CVE-2016-9131.md @@ -28,6 +28,7 @@ No PoCs from references. - https://github.com/muryo13/USNParser - https://github.com/pexip/os-bind9 - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems - https://github.com/zzzWTF/db-13-01 diff --git a/2016/CVE-2016-9147.md b/2016/CVE-2016-9147.md index 34d3ba235b..6ee743f20f 100644 --- a/2016/CVE-2016-9147.md +++ b/2016/CVE-2016-9147.md @@ -22,4 +22,5 @@ No PoCs from references. - https://github.com/muryo13/USNParser - https://github.com/pexip/os-bind9 - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 diff --git a/2016/CVE-2016-9444.md b/2016/CVE-2016-9444.md index 01a05c8e81..b29d25eb96 100644 --- a/2016/CVE-2016-9444.md +++ b/2016/CVE-2016-9444.md @@ -27,6 +27,7 @@ No PoCs from references. - https://github.com/muryo13/USNParser - https://github.com/pexip/os-bind9 - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems - https://github.com/zzzWTF/db-13-01 diff --git a/2016/CVE-2016-9778.md b/2016/CVE-2016-9778.md index cd50c7148a..2bee8699ba 100644 --- a/2016/CVE-2016-9778.md +++ b/2016/CVE-2016-9778.md @@ -21,4 +21,5 @@ No PoCs from references. - https://github.com/balabit-deps/balabit-os-9-bind9-libs - https://github.com/pexip/os-bind9 - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 diff --git a/2017/CVE-2017-3135.md b/2017/CVE-2017-3135.md index 0d70ca95a9..58b1c3808e 100644 --- a/2017/CVE-2017-3135.md +++ b/2017/CVE-2017-3135.md @@ -22,4 +22,5 @@ No PoCs from references. - https://github.com/balabit-deps/balabit-os-9-bind9-libs - https://github.com/pexip/os-bind9 - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 diff --git a/2017/CVE-2017-3136.md b/2017/CVE-2017-3136.md index 41551fe25d..af56145f35 100644 --- a/2017/CVE-2017-3136.md +++ b/2017/CVE-2017-3136.md @@ -21,4 +21,5 @@ No PoCs from references. - https://github.com/balabit-deps/balabit-os-9-bind9-libs - https://github.com/pexip/os-bind9 - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 diff --git a/2017/CVE-2017-3137.md b/2017/CVE-2017-3137.md index 9e1b75323a..d5c68b6f33 100644 --- a/2017/CVE-2017-3137.md +++ b/2017/CVE-2017-3137.md @@ -21,4 +21,5 @@ No PoCs from references. - https://github.com/balabit-deps/balabit-os-9-bind9-libs - https://github.com/pexip/os-bind9 - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 diff --git a/2017/CVE-2017-3138.md b/2017/CVE-2017-3138.md index 1690ed0332..e4891d75b8 100644 --- a/2017/CVE-2017-3138.md +++ b/2017/CVE-2017-3138.md @@ -21,4 +21,5 @@ No PoCs from references. - https://github.com/balabit-deps/balabit-os-9-bind9-libs - https://github.com/pexip/os-bind9 - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 diff --git a/2017/CVE-2017-3140.md b/2017/CVE-2017-3140.md index de1e9c1efd..096c7c8ee3 100644 --- a/2017/CVE-2017-3140.md +++ b/2017/CVE-2017-3140.md @@ -21,4 +21,5 @@ No PoCs from references. - https://github.com/balabit-deps/balabit-os-9-bind9-libs - https://github.com/pexip/os-bind9 - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 diff --git a/2017/CVE-2017-3141.md b/2017/CVE-2017-3141.md index 5232cc41bf..4e6889cd43 100644 --- a/2017/CVE-2017-3141.md +++ b/2017/CVE-2017-3141.md @@ -27,6 +27,7 @@ The BIND installer on Windows uses an unquoted service path which can enable a l - https://github.com/balabit-deps/balabit-os-9-bind9-libs - https://github.com/pexip/os-bind9 - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems - https://github.com/zzzWTF/db-13-01 diff --git a/2017/CVE-2017-3142.md b/2017/CVE-2017-3142.md index 109161be44..4d7514f4f7 100644 --- a/2017/CVE-2017-3142.md +++ b/2017/CVE-2017-3142.md @@ -27,6 +27,7 @@ No PoCs from references. - https://github.com/dkiser/vulners-yum-scanner - https://github.com/pexip/os-bind9 - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems - https://github.com/zparnold/deb-checker - https://github.com/zzzWTF/db-13-01 diff --git a/2017/CVE-2017-3143.md b/2017/CVE-2017-3143.md index ce6190b2dc..79596cc9ed 100644 --- a/2017/CVE-2017-3143.md +++ b/2017/CVE-2017-3143.md @@ -30,6 +30,7 @@ No PoCs from references. - https://github.com/gladiopeace/awesome-stars - https://github.com/pexip/os-bind9 - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 - https://github.com/saaph/CVE-2017-3143 - https://github.com/securitychampions/Awesome-Vulnerability-Research - https://github.com/sergey-pronin/Awesome-Vulnerability-Research diff --git a/2017/CVE-2017-3145.md b/2017/CVE-2017-3145.md index 427adaeb7e..4bc65fd530 100644 --- a/2017/CVE-2017-3145.md +++ b/2017/CVE-2017-3145.md @@ -26,6 +26,7 @@ No PoCs from references. - https://github.com/balabit-deps/balabit-os-9-bind9-libs - https://github.com/pexip/os-bind9 - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems - https://github.com/tomoyamachi/gocarts - https://github.com/zzzWTF/db-13-01 diff --git a/2017/CVE-2017-5715.md b/2017/CVE-2017-5715.md index 65f0b7739d..d60d43549d 100644 --- a/2017/CVE-2017-5715.md +++ b/2017/CVE-2017-5715.md @@ -40,6 +40,7 @@ Systems with microprocessors utilizing speculative execution and indirect branch - https://github.com/3th1c4l-t0n1/awesome-csirt - https://github.com/ARPSyndicate/cvemon - https://github.com/Aakaashzz/Meltdown-Spectre +- https://github.com/BlessedRebuS/RISCV-Attacks - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top diff --git a/2017/CVE-2017-5753.md b/2017/CVE-2017-5753.md index 7920e39824..d14578c338 100644 --- a/2017/CVE-2017-5753.md +++ b/2017/CVE-2017-5753.md @@ -33,6 +33,7 @@ Systems with microprocessors utilizing speculative execution and branch predicti - https://github.com/20142995/sectool - https://github.com/ARPSyndicate/cvemon - https://github.com/Aakaashzz/Meltdown-Spectre +- https://github.com/BlessedRebuS/RISCV-Attacks - https://github.com/C0dak/linux-exploit - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo diff --git a/2017/CVE-2017-5754.md b/2017/CVE-2017-5754.md index 27809896a4..d603a2ae36 100644 --- a/2017/CVE-2017-5754.md +++ b/2017/CVE-2017-5754.md @@ -31,6 +31,7 @@ Systems with microprocessors utilizing speculative execution and indirect branch - https://github.com/5l1v3r1/update_kernel - https://github.com/ARPSyndicate/cvemon - https://github.com/Aakaashzz/Meltdown-Spectre +- https://github.com/BlessedRebuS/RISCV-Attacks - https://github.com/Bogdantkachenkots/Windows10GamingFocus - https://github.com/CyVerse-Ansible/ansible-prometheus-node-exporter - https://github.com/Fineas/meltdown_vulnerability diff --git a/2017/CVE-2017-9841.md b/2017/CVE-2017-9841.md index e7696be503..d23c458c2d 100644 --- a/2017/CVE-2017-9841.md +++ b/2017/CVE-2017-9841.md @@ -16,6 +16,7 @@ Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows rem #### Github - https://github.com/0day404/vulnerability-poc - https://github.com/20142995/Goby +- https://github.com/20142995/nuclei-templates - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/ArrestX/--POC diff --git a/2018/CVE-2018-15664.md b/2018/CVE-2018-15664.md index 22f9b49974..955a4d0c91 100644 --- a/2018/CVE-2018-15664.md +++ b/2018/CVE-2018-15664.md @@ -14,6 +14,7 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/HuzaifaPatel/houdini - https://github.com/Metarget/cloud-native-security-book - https://github.com/Metarget/metarget - https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground diff --git a/2018/CVE-2018-15891.md b/2018/CVE-2018-15891.md new file mode 100644 index 0000000000..554f9aba65 --- /dev/null +++ b/2018/CVE-2018-15891.md @@ -0,0 +1,17 @@ +### [CVE-2018-15891](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15891) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue was discovered in FreePBX core before 3.0.122.43, 14.0.18.34, and 5.0.1beta4. By crafting a request for adding Asterisk modules, an attacker is able to store JavaScript commands in a module name. + +### POC + +#### Reference +- https://wiki.freepbx.org/display/FOP/2018-09-11+Core+Stored+XSS?src=contextnavpagetreemode + +#### Github +No PoCs found on GitHub currently. + diff --git a/2018/CVE-2018-16763.md b/2018/CVE-2018-16763.md index 6be059b2a8..0cf72eac0a 100644 --- a/2018/CVE-2018-16763.md +++ b/2018/CVE-2018-16763.md @@ -19,6 +19,7 @@ FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter #### Github - https://github.com/0xT11/CVE-POC - https://github.com/1337kid/Exploits +- https://github.com/20142995/nuclei-templates - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/BhattJayD/IgniteCTF diff --git a/2018/CVE-2018-5738.md b/2018/CVE-2018-5738.md index b279a7ead9..9070706c26 100644 --- a/2018/CVE-2018-5738.md +++ b/2018/CVE-2018-5738.md @@ -19,4 +19,5 @@ No PoCs from references. - https://github.com/balabit-deps/balabit-os-9-bind9-libs - https://github.com/pexip/os-bind9 - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 diff --git a/2018/CVE-2018-5741.md b/2018/CVE-2018-5741.md index b9597fe7c0..f141be42fe 100644 --- a/2018/CVE-2018-5741.md +++ b/2018/CVE-2018-5741.md @@ -19,4 +19,5 @@ No PoCs from references. - https://github.com/balabit-deps/balabit-os-9-bind9-libs - https://github.com/pexip/os-bind9 - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 diff --git a/2018/CVE-2018-5743.md b/2018/CVE-2018-5743.md index 70ed939864..04b28a0719 100644 --- a/2018/CVE-2018-5743.md +++ b/2018/CVE-2018-5743.md @@ -19,5 +19,6 @@ No PoCs from references. - https://github.com/balabit-deps/balabit-os-9-bind9-libs - https://github.com/bg6cq/bind9 - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 - https://github.com/sischkg/dnsonsen_advent_calendar diff --git a/2018/CVE-2018-5744.md b/2018/CVE-2018-5744.md index d24c7406dd..bbc64f9af8 100644 --- a/2018/CVE-2018-5744.md +++ b/2018/CVE-2018-5744.md @@ -19,5 +19,6 @@ No PoCs from references. - https://github.com/balabit-deps/balabit-os-9-bind9-libs - https://github.com/pexip/os-bind9 - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 - https://github.com/sischkg/dnsonsen_advent_calendar diff --git a/2018/CVE-2018-5745.md b/2018/CVE-2018-5745.md index 0d5549b921..4c29f3aae5 100644 --- a/2018/CVE-2018-5745.md +++ b/2018/CVE-2018-5745.md @@ -20,4 +20,5 @@ No PoCs from references. - https://github.com/fokypoky/places-list - https://github.com/pexip/os-bind9 - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 diff --git a/2019/CVE-2019-11358.md b/2019/CVE-2019-11358.md index c9f03ce9f5..c127ffcb1d 100644 --- a/2019/CVE-2019-11358.md +++ b/2019/CVE-2019-11358.md @@ -136,6 +136,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/4H-Botsmiths/FTC-18693-Freight-Frenzy - https://github.com/4hscream14204/CenterStage - https://github.com/5015BuffaloWings-FTC/road-runner-quickstart +- https://github.com/5040NutsAndBolts/24-25-Season - https://github.com/5040NutsAndBolts/PowerPlay_22-23 - https://github.com/5070NUTS/center-stage1 - https://github.com/5070NUTS/power-play @@ -293,6 +294,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/AravNeroth/2023-2024-Robolobos-FTC-14363 - https://github.com/AravNeroth/FTC-14361-CENTERSTAGE-V3 - https://github.com/Arch-it-12/FTCTestProject +- https://github.com/Architekt13/Official-Incognito-FTC-Code - https://github.com/Archytas19412/Archytas2023-master - https://github.com/Archytas19412/FTC-Centerstage-19412 - https://github.com/ArcticCrusade/18996-FTC @@ -613,6 +615,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/Daiigr/FTC21148-RobotController - https://github.com/Daiigr/MakerFaireRobotController - https://github.com/Dairy-Foundation/Dairy +- https://github.com/Daniel1833434/RoadRunnerQuickstart15031-mainQuack - https://github.com/DanielRuf/snyk-js-jquery-174006 - https://github.com/DanielRuf/snyk-js-jquery-565129 - https://github.com/Danube-Robotics/FTC-Training @@ -927,6 +930,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/FTC-ORBIT/2023-ftc-14028 - https://github.com/FTC-ORBIT/2023-ftc-14872 - https://github.com/FTC-ORBIT/FGC-2023 +- https://github.com/FTC-ORBIT/Template - https://github.com/FTC-ORBIT/orbit14872-2024 - https://github.com/FTC-ORBIT/preparation-14029 - https://github.com/FTC-Pathfinder-2020/FtcRobotController-master @@ -1145,6 +1149,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/HSE-Robotics/15221-Centerstage - https://github.com/HackerGuy1000/Nebula-23-24 - https://github.com/Hackercats/Ultimate-Goal +- https://github.com/Hal-9k1/FTC-Fall-2023 - https://github.com/HamzaEbeida/MarvelsOfVRIC - https://github.com/HamzaEbeida/offseason-ftc - https://github.com/Harsha23871/HarshaPractieBot_5_24_24 @@ -1427,6 +1432,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/LancerRobotics/FTC-Powerplay - https://github.com/LaneStanley/Garnet-Squadron-Freight-Frenzy - https://github.com/Lara-Martins/5898PowerplayCode +- https://github.com/LarryHiller/2021-FTC-UltimateGoal-Wembley - https://github.com/LauraE4/LauraE - https://github.com/Lawson-Woodward/RR9527-v1-2024 - https://github.com/Lawson-Woodward/RR9527-v2-2024 @@ -1469,6 +1475,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/LouisaHuston/NaturalSelection_2324_Final - https://github.com/LucasFeldsien/UltimateGoal - https://github.com/LucyHarrison/FTC2021-girlboss +- https://github.com/Luk012/Ro2D2_Centerstage - https://github.com/LumenChristiRobotics/Techno-Titans-2023 - https://github.com/Lunerwalker2/FreightFrenzy1002 - https://github.com/Lunerwalker2/SwerveDriveTesting @@ -2361,6 +2368,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/Vasil789/ftc - https://github.com/VasuBanga12/FTCTest - https://github.com/Vault-FTC/FTC-Command-System +- https://github.com/Vault-FTC/Fe2O3-2023-2024 - https://github.com/Vault-FTC/Mg-2023-2024 - https://github.com/Vault-FTC/MgCode2 - https://github.com/Vault-FTC/MoleMotion @@ -2830,6 +2838,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/cyborg48/UltimateGoal - https://github.com/dandominicstaicu/SoftHoardersUG - https://github.com/dandominicstaicu/SoftHoardersUG2 +- https://github.com/danielgrbacbravo/MakerFaireRobotController - https://github.com/daria-lzr/RoboAs-CenterStage - https://github.com/darkhanakh/BalgaMenShege_Program - https://github.com/darmthealarm/FtcRobotController-master @@ -2877,6 +2886,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/dorinon/ftc-14782-orbit - https://github.com/doxulo/FtcRobotController-master - https://github.com/dpeachpeach/WPCPRobogrizzlies +- https://github.com/dr-hextanium/into_the_deep - https://github.com/drxxgn/MECH24testing - https://github.com/dschleuning-github/2023_Halloween - https://github.com/dschleuning-github/DUCKS_2023-24_v9_0_1 @@ -3035,6 +3045,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/ftc16072/2021preseason - https://github.com/ftc16072/2022Preseason - https://github.com/ftc16072/2023Preseason +- https://github.com/ftc16072/2024Preseason - https://github.com/ftc16072/AscendAviators-PowerPlay - https://github.com/ftc16072/CenterStage23-24 - https://github.com/ftc16072/FreightFrenzy21-22 @@ -3236,6 +3247,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/importTahsinZaman/Robotics_PowerPlay2022-2023_Bot2 - https://github.com/importly/FtcRobotController - https://github.com/imsa-ftc-robotics/UltimateGoalMeet1 +- https://github.com/info1robotics/CenterStage-Diff - https://github.com/info1robotics/FtcRobotController - https://github.com/inkineers/Team-Inkineers21982-Power-Play - https://github.com/invjar/FTCtesting @@ -3924,6 +3936,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/the-winsor-school/Wildbots-2021-2022 - https://github.com/the-winsor-school/wildbots_13620_2024 - https://github.com/the-winsor-school/wirecats_20409_2024 +- https://github.com/theQubitBot/2024-25-IntoTheDeep - https://github.com/theSentinelsFTC/sentinels-teamcode - https://github.com/theawesomew/RefactoredFtcRobotController - https://github.com/thecatinthehatcomesback/CenterStage2023 diff --git a/2019/CVE-2019-14271.md b/2019/CVE-2019-14271.md index 1303ef2764..8dafc69025 100644 --- a/2019/CVE-2019-14271.md +++ b/2019/CVE-2019-14271.md @@ -14,6 +14,7 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/HuzaifaPatel/houdini - https://github.com/Metarget/cloud-native-security-book - https://github.com/Metarget/metarget - https://github.com/PercussiveElbow/docker-escape-tool diff --git a/2019/CVE-2019-14312.md b/2019/CVE-2019-14312.md index 38ec7a4190..20552263e6 100644 --- a/2019/CVE-2019-14312.md +++ b/2019/CVE-2019-14312.md @@ -13,6 +13,7 @@ Aptana Jaxer 1.0.3.4547 is vulnerable to a local file inclusion vulnerability in - http://packetstormsecurity.com/files/153985/Aptana-Jaxer-1.0.3.4547-Local-File-Inclusion.html #### Github +- https://github.com/20142995/nuclei-templates - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/d4n-sec/d4n-sec.github.io diff --git a/2019/CVE-2019-5736.md b/2019/CVE-2019-5736.md index 159a15a28a..b551a535bf 100644 --- a/2019/CVE-2019-5736.md +++ b/2019/CVE-2019-5736.md @@ -46,6 +46,7 @@ runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allow - https://github.com/GhostTroops/TOP - https://github.com/GiverOfGifts/CVE-2019-5736-Custom-Runtime - https://github.com/H3xL00m/CVE-2019-5736 +- https://github.com/HuzaifaPatel/houdini - https://github.com/InesMartins31/iot-cves - https://github.com/JERRY123S/all-poc - https://github.com/JlSakuya/CVE-2022-0847-container-escape diff --git a/2019/CVE-2019-6465.md b/2019/CVE-2019-6465.md index b46546d4fb..a01567fb62 100644 --- a/2019/CVE-2019-6465.md +++ b/2019/CVE-2019-6465.md @@ -20,4 +20,5 @@ No PoCs from references. - https://github.com/fokypoky/places-list - https://github.com/pexip/os-bind9 - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 diff --git a/2019/CVE-2019-6471.md b/2019/CVE-2019-6471.md index 931b3c3c23..a27b60c128 100644 --- a/2019/CVE-2019-6471.md +++ b/2019/CVE-2019-6471.md @@ -19,4 +19,5 @@ No PoCs from references. - https://github.com/balabit-deps/balabit-os-9-bind9-libs - https://github.com/bg6cq/bind9 - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 diff --git a/2019/CVE-2019-6477.md b/2019/CVE-2019-6477.md index 0ad26d263d..5d0f7cdd91 100644 --- a/2019/CVE-2019-6477.md +++ b/2019/CVE-2019-6477.md @@ -19,4 +19,5 @@ No PoCs from references. - https://github.com/bg6cq/bind9 - https://github.com/fokypoky/places-list - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 diff --git a/2020/CVE-2020-26160.md b/2020/CVE-2020-26160.md index 53487548f0..053b3f599d 100644 --- a/2020/CVE-2020-26160.md +++ b/2020/CVE-2020-26160.md @@ -19,5 +19,6 @@ No PoCs from references. - https://github.com/k1LoW/oshka - https://github.com/laojianzi/laojianzi - https://github.com/naveensrinivasan/stunning-tribble +- https://github.com/nics-tw/sbom2vans - https://github.com/novalagung/mypullrequests diff --git a/2020/CVE-2020-8616.md b/2020/CVE-2020-8616.md index 718f804583..db8192268c 100644 --- a/2020/CVE-2020-8616.md +++ b/2020/CVE-2020-8616.md @@ -21,6 +21,7 @@ No PoCs from references. - https://github.com/Zhivarev/13-01-hw - https://github.com/balabit-deps/balabit-os-9-bind9-libs - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems - https://github.com/zzzWTF/db-13-01 diff --git a/2020/CVE-2020-8617.md b/2020/CVE-2020-8617.md index 6b57575076..625490d8f4 100644 --- a/2020/CVE-2020-8617.md +++ b/2020/CVE-2020-8617.md @@ -30,6 +30,7 @@ Using a specially-crafted message, an attacker may potentially cause a BIND serv - https://github.com/knqyf263/CVE-2020-8617 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/pexip/os-bind9-libs +- https://github.com/psmedley/bind-os2 - https://github.com/rmkn/cve-2020-8617 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems - https://github.com/soosmile/POC diff --git a/2020/CVE-2020-8619.md b/2020/CVE-2020-8619.md index ece4f0d752..c087dfef8b 100644 --- a/2020/CVE-2020-8619.md +++ b/2020/CVE-2020-8619.md @@ -14,4 +14,5 @@ No PoCs from references. #### Github - https://github.com/Live-Hack-CVE/CVE-2020-8619 +- https://github.com/psmedley/bind-os2 diff --git a/2020/CVE-2020-8622.md b/2020/CVE-2020-8622.md index 7a071e4bac..bc09971b3e 100644 --- a/2020/CVE-2020-8622.md +++ b/2020/CVE-2020-8622.md @@ -20,6 +20,7 @@ In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3 - https://github.com/NikulinMS/13-01-hw - https://github.com/Zhivarev/13-01-hw - https://github.com/fokypoky/places-list +- https://github.com/psmedley/bind-os2 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems - https://github.com/zzzWTF/db-13-01 diff --git a/2020/CVE-2020-8623.md b/2020/CVE-2020-8623.md index edefc09115..9e61d94682 100644 --- a/2020/CVE-2020-8623.md +++ b/2020/CVE-2020-8623.md @@ -15,4 +15,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/fokypoky/places-list +- https://github.com/psmedley/bind-os2 diff --git a/2020/CVE-2020-8624.md b/2020/CVE-2020-8624.md index 8267d0c1d2..7f54918e46 100644 --- a/2020/CVE-2020-8624.md +++ b/2020/CVE-2020-8624.md @@ -15,4 +15,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/fokypoky/places-list +- https://github.com/psmedley/bind-os2 diff --git a/2020/CVE-2020-8625.md b/2020/CVE-2020-8625.md index e0be2476db..ff023576f0 100644 --- a/2020/CVE-2020-8625.md +++ b/2020/CVE-2020-8625.md @@ -14,4 +14,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/psmedley/bind-os2 diff --git a/2021/CVE-2021-25214.md b/2021/CVE-2021-25214.md index 32c40a1485..117b736613 100644 --- a/2021/CVE-2021-25214.md +++ b/2021/CVE-2021-25214.md @@ -14,4 +14,5 @@ No PoCs from references. #### Github - https://github.com/fokypoky/places-list +- https://github.com/psmedley/bind-os2 diff --git a/2021/CVE-2021-25215.md b/2021/CVE-2021-25215.md index 49e74da4c7..61667f196a 100644 --- a/2021/CVE-2021-25215.md +++ b/2021/CVE-2021-25215.md @@ -19,6 +19,7 @@ In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11. - https://github.com/Iknowmyname/Nmap-Scans-M2 - https://github.com/NikulinMS/13-01-hw - https://github.com/Zhivarev/13-01-hw +- https://github.com/psmedley/bind-os2 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems - https://github.com/zzzWTF/db-13-01 diff --git a/2021/CVE-2021-25216.md b/2021/CVE-2021-25216.md index 54b5990b64..d69443672d 100644 --- a/2021/CVE-2021-25216.md +++ b/2021/CVE-2021-25216.md @@ -19,6 +19,7 @@ No PoCs from references. - https://github.com/Iknowmyname/Nmap-Scans-M2 - https://github.com/NikulinMS/13-01-hw - https://github.com/Zhivarev/13-01-hw +- https://github.com/psmedley/bind-os2 - https://github.com/qwerty1q2w/cvescan_handler - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems - https://github.com/zzzWTF/db-13-01 diff --git a/2021/CVE-2021-25219.md b/2021/CVE-2021-25219.md index 5938028839..a4e8c231bc 100644 --- a/2021/CVE-2021-25219.md +++ b/2021/CVE-2021-25219.md @@ -20,6 +20,7 @@ In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 - https://github.com/NikulinMS/13-01-hw - https://github.com/Zhivarev/13-01-hw - https://github.com/fokypoky/places-list +- https://github.com/psmedley/bind-os2 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems - https://github.com/zzzWTF/db-13-01 diff --git a/2021/CVE-2021-25220.md b/2021/CVE-2021-25220.md index bc1a99348e..56fd6427e8 100644 --- a/2021/CVE-2021-25220.md +++ b/2021/CVE-2021-25220.md @@ -15,4 +15,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/fokypoky/places-list +- https://github.com/psmedley/bind-os2 diff --git a/2021/CVE-2021-35465.md b/2021/CVE-2021-35465.md index 2aed613b39..e77570e955 100644 --- a/2021/CVE-2021-35465.md +++ b/2021/CVE-2021-35465.md @@ -14,4 +14,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/KuanKuanQAQ/llvm-pass diff --git a/2021/CVE-2021-41182.md b/2021/CVE-2021-41182.md index b28a0e1588..fb0049b268 100644 --- a/2021/CVE-2021-41182.md +++ b/2021/CVE-2021-41182.md @@ -16,6 +16,7 @@ jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0 - https://www.oracle.com/security-alerts/cpujul2022.html #### Github +- https://github.com/20142995/nuclei-templates - https://github.com/ARPSyndicate/cvemon - https://github.com/cve-sandbox/jquery-ui - https://github.com/marksowell/retire-html-parser diff --git a/2021/CVE-2021-44228.md b/2021/CVE-2021-44228.md index 54bd7e8779..24c1a05b74 100644 --- a/2021/CVE-2021-44228.md +++ b/2021/CVE-2021-44228.md @@ -751,6 +751,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - https://github.com/djytmdj/Tool_Summary - https://github.com/dkd/elasticsearch - https://github.com/dmitsuo/log4shell-war-fixer +- https://github.com/dnaherna/log4shell-poc - https://github.com/docker-solr/docker-solr - https://github.com/doris0213/assignments - https://github.com/dotPY-hax/log4py diff --git a/2022/CVE-2022-0492.md b/2022/CVE-2022-0492.md index e8bf2cfa98..354245b1dc 100644 --- a/2022/CVE-2022-0492.md +++ b/2022/CVE-2022-0492.md @@ -17,6 +17,7 @@ A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/HuzaifaPatel/houdini - https://github.com/JadenQ/Cloud-Computing-Security-ProjectPage - https://github.com/LeoPer02/IDS-Dataset - https://github.com/Metarget/metarget @@ -43,6 +44,7 @@ A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in - https://github.com/josebeo2016/eBPF_Hotpatch - https://github.com/k0mi-tg/CVE-POC - https://github.com/kvesta/vesta +- https://github.com/libera-programming/bayaz - https://github.com/manas3c/CVE-POC - https://github.com/marksowell/my-stars - https://github.com/marksowell/starred diff --git a/2022/CVE-2022-1102.md b/2022/CVE-2022-1102.md new file mode 100644 index 0000000000..28622a4e9b --- /dev/null +++ b/2022/CVE-2022-1102.md @@ -0,0 +1,17 @@ +### [CVE-2022-1102](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1102) +![](https://img.shields.io/static/v1?label=Product&message=Royale%20Event%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross%20Site%20Scripting&color=brighgreen) + +### Description + +A vulnerability classified as problematic has been found in SourceCodester Royale Event Management System 1.0. Affected is an unknown function of the file /royal_event/companyprofile.php. The manipulation of the argument companyname/regno/companyaddress/companyemail leads to cross site scripting. It is possible to launch the attack remotely. VDB-195786 is the identifier assigned to this vulnerability. + +### POC + +#### Reference +- https://vuldb.com/?id.195786 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2022/CVE-2022-31159.md b/2022/CVE-2022-31159.md new file mode 100644 index 0000000000..9b1b0c51ed --- /dev/null +++ b/2022/CVE-2022-31159.md @@ -0,0 +1,17 @@ +### [CVE-2022-31159](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31159) +![](https://img.shields.io/static/v1?label=Product&message=aws-sdk-java&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen) + +### Description + +The AWS SDK for Java enables Java developers to work with Amazon Web Services. A partial-path traversal issue exists within the `downloadDirectory` method in the AWS S3 TransferManager component of the AWS SDK for Java v1 prior to version 1.12.261. Applications using the SDK control the `destinationDirectory` argument, but S3 object keys are determined by the application that uploaded the objects. The `downloadDirectory` method allows the caller to pass a filesystem object in the object key but contained an issue in the validation logic for the key name. A knowledgeable actor could bypass the validation logic by including a UNIX double-dot in the bucket key. Under certain conditions, this could permit them to retrieve a directory from their S3 bucket that is one level up in the filesystem from their working directory. This issue’s scope is limited to directories whose name prefix matches the destinationDirectory. E.g. for destination directory`/tmp/foo`, the actor can cause a download to `/tmp/foo-bar`, but not `/tmp/bar`. If `com.amazonaws.services.s3.transfer.TransferManager::downloadDirectory` is used to download an untrusted buckets contents, the contents of that bucket can be written outside of the intended destination directory. Version 1.12.261 contains a patch for this issue. As a workaround, when calling `com.amazonaws.services.s3.transfer.TransferManager::downloadDirectory`, pass a `KeyFilter` that forbids `S3ObjectSummary` objects that `getKey` method return a string containing the substring `..` . + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/IHTSDO/snomed-parent-owasp + diff --git a/2022/CVE-2022-35951.md b/2022/CVE-2022-35951.md index 0e64698528..b14809705c 100644 --- a/2022/CVE-2022-35951.md +++ b/2022/CVE-2022-35951.md @@ -14,4 +14,5 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/leesh3288/leesh3288 diff --git a/2022/CVE-2022-35977.md b/2022/CVE-2022-35977.md index 40f1092127..81c3ec3e12 100644 --- a/2022/CVE-2022-35977.md +++ b/2022/CVE-2022-35977.md @@ -14,5 +14,6 @@ No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon +- https://github.com/leesh3288/leesh3288 - https://github.com/redis-windows/redis-windows diff --git a/2022/CVE-2022-47021.md b/2022/CVE-2022-47021.md index 25175cc67e..7aaef35ba3 100644 --- a/2022/CVE-2022-47021.md +++ b/2022/CVE-2022-47021.md @@ -13,5 +13,6 @@ A null pointer dereference issue was discovered in functions op_get_data and op_ No PoCs from references. #### Github +- https://github.com/DiRaltvein/memory-corruption-examples - https://github.com/fusion-scan/fusion-scan.github.io diff --git a/2022/CVE-2022-47094.md b/2022/CVE-2022-47094.md index d21c3284bf..32ba29776f 100644 --- a/2022/CVE-2022-47094.md +++ b/2022/CVE-2022-47094.md @@ -13,5 +13,5 @@ GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Null pointer dereference - https://github.com/gpac/gpac/issues/2345 #### Github -No PoCs found on GitHub currently. +- https://github.com/DiRaltvein/memory-corruption-examples diff --git a/2022/CVE-2022-47659.md b/2022/CVE-2022-47659.md index fd0e4f2291..7ada21c9ff 100644 --- a/2022/CVE-2022-47659.md +++ b/2022/CVE-2022-47659.md @@ -13,5 +13,5 @@ GPAC MP4box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to Buffer Overflow in gf_bs_ - https://github.com/gpac/gpac/issues/2354 #### Github -No PoCs found on GitHub currently. +- https://github.com/DiRaltvein/memory-corruption-examples diff --git a/2023/CVE-2023-0341.md b/2023/CVE-2023-0341.md index 57795a4edf..5096ae1fd6 100644 --- a/2023/CVE-2023-0341.md +++ b/2023/CVE-2023-0341.md @@ -13,5 +13,5 @@ A stack buffer overflow exists in the ec_glob function of editorconfig-core-c be - https://litios.github.io/2023/01/14/CVE-2023-0341.html #### Github -No PoCs found on GitHub currently. +- https://github.com/DiRaltvein/memory-corruption-examples diff --git a/2023/CVE-2023-21616.md b/2023/CVE-2023-21616.md new file mode 100644 index 0000000000..0b0a936416 --- /dev/null +++ b/2023/CVE-2023-21616.md @@ -0,0 +1,17 @@ +### [CVE-2023-21616](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21616) +![](https://img.shields.io/static/v1?label=Product&message=Experience%20Manager&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3C%3D%206.5.15.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)&color=brighgreen) + +### Description + +Experience Manager versions 6.5.15.0 (and earlier) are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/HuzaifaPatel/houdini + diff --git a/2023/CVE-2023-22622.md b/2023/CVE-2023-22622.md index 10d172dff4..09876e33aa 100644 --- a/2023/CVE-2023-22622.md +++ b/2023/CVE-2023-22622.md @@ -16,6 +16,7 @@ WordPress through 6.1.1 depends on unpredictable client visits to cause wp-cron. - https://github.com/ARPSyndicate/cvemon - https://github.com/alopresto/epss_api_demo - https://github.com/alopresto6m/epss_api_demo +- https://github.com/michael-david-fry/CVE-2023-22622 - https://github.com/michael-david-fry/wp-cron-smash - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-25221.md b/2023/CVE-2023-25221.md index 374a0525ae..b90fe94144 100644 --- a/2023/CVE-2023-25221.md +++ b/2023/CVE-2023-25221.md @@ -13,5 +13,5 @@ Libde265 v1.0.10 was discovered to contain a heap-buffer-overflow vulnerability - https://github.com/strukturag/libde265/issues/388 #### Github -No PoCs found on GitHub currently. +- https://github.com/DiRaltvein/memory-corruption-examples diff --git a/2023/CVE-2023-29199.md b/2023/CVE-2023-29199.md index ecc00d6c6a..571f286c2e 100644 --- a/2023/CVE-2023-29199.md +++ b/2023/CVE-2023-29199.md @@ -16,6 +16,7 @@ There exists a vulnerability in source code transformer (exception sanitization #### Github - https://github.com/3mpir3Albert/HTB_Codify - https://github.com/jakabakos/vm2-sandbox-escape-exploits +- https://github.com/leesh3288/leesh3288 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/u-crew/vm2-test diff --git a/2023/CVE-2023-3012.md b/2023/CVE-2023-3012.md index d720cfa730..4eff3b9e19 100644 --- a/2023/CVE-2023-3012.md +++ b/2023/CVE-2023-3012.md @@ -13,5 +13,5 @@ NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2. - https://huntr.dev/bounties/916b787a-c603-409d-afc6-25bb02070e69 #### Github -No PoCs found on GitHub currently. +- https://github.com/DiRaltvein/memory-corruption-examples diff --git a/2023/CVE-2023-3390.md b/2023/CVE-2023-3390.md index 0687c0c86f..588dfe2bbb 100644 --- a/2023/CVE-2023-3390.md +++ b/2023/CVE-2023-3390.md @@ -15,6 +15,7 @@ A use-after-free vulnerability was found in the Linux kernel's netfilter subsyst #### Github - https://github.com/c0m0r1/c0m0r1 - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/leesh3288/leesh3288 - https://github.com/tanjiti/sec_profile - https://github.com/xairy/linux-kernel-exploitation diff --git a/2023/CVE-2023-34411.md b/2023/CVE-2023-34411.md new file mode 100644 index 0000000000..457958935c --- /dev/null +++ b/2023/CVE-2023-34411.md @@ -0,0 +1,17 @@ +### [CVE-2023-34411](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34411) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +The xml-rs crate before 0.8.14 for Rust and Crab allows a denial of service (panic) via an invalid show security nat resource-usage source-pool Pool name: source_pool_name..Address Factor-index Port-range Used Avail Total UsageX.X.X.X0 Single Ports 50258 52342 62464 96% <<<<<- Alg Ports 0 2048 2048 0%This issue affects:Juniper Networks Junos OS on MX Series and SRX Series * All versions earlier than 21.2R3-S6; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S5; * 22.1 versions earlier than 22.1R3-S4; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S1; * 22.4 versions earlier than 22.4R2-S2, 22.4R3; * 23.2 versions earlier than 23.2R1-S1, 23.2R2. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/HuzaifaPatel/houdini + diff --git a/2024/CVE-2024-23384.md b/2024/CVE-2024-23384.md new file mode 100644 index 0000000000..1f737bda15 --- /dev/null +++ b/2024/CVE-2024-23384.md @@ -0,0 +1,17 @@ +### [CVE-2024-23384](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23384) +![](https://img.shields.io/static/v1?label=Product&message=Snapdragon&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20FastConnect%206200%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-416%20Use%20After%20Free&color=brighgreen) + +### Description + +Memory corruption when the mapped pages in VBO are still mapped after reclaiming by shrinker. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-23480.md b/2024/CVE-2024-23480.md index 7fd5143d33..c544b8aa6f 100644 --- a/2024/CVE-2024-23480.md +++ b/2024/CVE-2024-23480.md @@ -14,4 +14,5 @@ No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/p4yl0ad/p4yl0ad diff --git a/2024/CVE-2024-24786.md b/2024/CVE-2024-24786.md index f7e8ec7e0f..258d251478 100644 --- a/2024/CVE-2024-24786.md +++ b/2024/CVE-2024-24786.md @@ -17,5 +17,6 @@ No PoCs from references. - https://github.com/DanielePeruzzi97/rancher-k3s-docker - https://github.com/NaInSec/CVE-LIST - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/nics-tw/sbom2vans - https://github.com/ytono/gcp-arcade diff --git a/2024/CVE-2024-26229.md b/2024/CVE-2024-26229.md index f726deafda..6ded7911a6 100644 --- a/2024/CVE-2024-26229.md +++ b/2024/CVE-2024-26229.md @@ -52,8 +52,11 @@ No PoCs from references. #### Github - https://github.com/0xMarcio/cve - https://github.com/GhostTroops/TOP +- https://github.com/RalfHacker/CVE-2024-26229-exploit +- https://github.com/apkc/CVE-2024-26229-BOF - https://github.com/gmh5225/awesome-game-security - https://github.com/michredteam/PoC-26229 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/tanjiti/sec_profile +- https://github.com/varwara/CVE-2024-26229 diff --git a/2024/CVE-2024-27304.md b/2024/CVE-2024-27304.md new file mode 100644 index 0000000000..d1445bb13f --- /dev/null +++ b/2024/CVE-2024-27304.md @@ -0,0 +1,18 @@ +### [CVE-2024-27304](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27304) +![](https://img.shields.io/static/v1?label=Product&message=pgx&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%204.18.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-190%3A%20Integer%20Overflow%20or%20Wraparound&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brighgreen) + +### Description + +pgx is a PostgreSQL driver and toolkit for Go. SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker's control. The problem is resolved in v4.18.2 and v5.5.4. As a workaround, reject user input large enough to cause a single query or bind message to exceed 4 GB in size. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nics-tw/sbom2vans + diff --git a/2024/CVE-2024-27913.md b/2024/CVE-2024-27913.md new file mode 100644 index 0000000000..858a3de2b3 --- /dev/null +++ b/2024/CVE-2024-27913.md @@ -0,0 +1,17 @@ +### [CVE-2024-27913](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27913) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +ospf_te_parse_te in ospfd/ospf_te.c in FRRouting (FRR) through 9.1 allows remote attackers to cause a denial of service (ospfd daemon crash) via a malformed OSPF LSA packet, because of an attempted access to a missing attribute field. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/AimiP02/OSPF_BooFuzzer + diff --git a/2024/CVE-2024-27933.md b/2024/CVE-2024-27933.md index 4183cabfbc..f930786146 100644 --- a/2024/CVE-2024-27933.md +++ b/2024/CVE-2024-27933.md @@ -13,5 +13,5 @@ Deno is a JavaScript, TypeScript, and WebAssembly runtime. In version 1.39.0, us - https://github.com/denoland/deno/security/advisories/GHSA-6q4w-9x56-rmwq #### Github -No PoCs found on GitHub currently. +- https://github.com/leesh3288/leesh3288 diff --git a/2024/CVE-2024-27934.md b/2024/CVE-2024-27934.md index aa4ca15c60..43ddeaa2be 100644 --- a/2024/CVE-2024-27934.md +++ b/2024/CVE-2024-27934.md @@ -13,5 +13,5 @@ Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1 - https://github.com/denoland/deno/security/advisories/GHSA-3j27-563v-28wf #### Github -No PoCs found on GitHub currently. +- https://github.com/leesh3288/leesh3288 diff --git a/2024/CVE-2024-28849.md b/2024/CVE-2024-28849.md index b365f44d05..0362ff6fe6 100644 --- a/2024/CVE-2024-28849.md +++ b/2024/CVE-2024-28849.md @@ -15,4 +15,5 @@ follow-redirects is an open source, drop-in replacement for Node's `http` and `h #### Github - https://github.com/NaInSec/CVE-LIST - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/nics-tw/sbom2vans diff --git a/2024/CVE-2024-2886.md b/2024/CVE-2024-2886.md index 64636de24b..3ebc43178a 100644 --- a/2024/CVE-2024-2886.md +++ b/2024/CVE-2024-2886.md @@ -14,4 +14,5 @@ Use after free in WebCodecs in Google Chrome prior to 123.0.6312.86 allowed a re #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/leesh3288/leesh3288 diff --git a/2024/CVE-2024-29022.md b/2024/CVE-2024-29022.md new file mode 100644 index 0000000000..8d9590a4bf --- /dev/null +++ b/2024/CVE-2024-29022.md @@ -0,0 +1,18 @@ +### [CVE-2024-29022](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29022) +![](https://img.shields.io/static/v1?label=Product&message=xibo-cms&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D1.8.0%2C%20%3C%203.3.10%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-117%3A%20Improper%20Output%20Neutralization%20for%20Logs&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) + +### Description + +Xibo is an Open Source Digital Signage platform with a web content management system and Windows display player software. In affected versions some request headers are not correctly sanitised when stored in the session and display tables. These headers can be used to inject a malicious script into the session page to exfiltrate session IDs and User Agents. These session IDs / User Agents can subsequently be used to hijack active sessions. A malicious script can be injected into the display grid to exfiltrate information related to displays. Users should upgrade to version 3.3.10 or 4.0.9 which fix this issue. Customers who host their CMS with the Xibo Signage service have already received an upgrade or patch to resolve this issue regardless of the CMS version that they are running. Upgrading to a fixed version is necessary to remediate. Patches are available for earlier versions of Xibo CMS that are out of security support: 2.3 patch ebeccd000b51f00b9a25f56a2f252d6812ebf850.diff. 1.8 patch a81044e6ccdd92cc967e34c125bd8162432e51bc.diff. There are no known workarounds for this issue. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/Saadet-T/Saadet-T + diff --git a/2024/CVE-2024-29023.md b/2024/CVE-2024-29023.md new file mode 100644 index 0000000000..2d78bcadc7 --- /dev/null +++ b/2024/CVE-2024-29023.md @@ -0,0 +1,17 @@ +### [CVE-2024-29023](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29023) +![](https://img.shields.io/static/v1?label=Product&message=xibo-cms&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%201.8.0%2C%20%3C%203.3.10%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen) + +### Description + +Xibo is an Open Source Digital Signage platform with a web content management system and Windows display player software. Session tokens are exposed in the return of session search API call on the sessions page. Subsequently they can be exfiltrated and used to hijack a session. Users must be granted access to the session page, or be a super admin. Users should upgrade to version 3.3.10 or 4.0.9 which fix this issue. Customers who host their CMS with the Xibo Signage service have already received an upgrade or patch to resolve this issue regardless of the CMS version that they are running. Patches are available for earlier versions of Xibo CMS that are out of security support: 2.3 patch ebeccd000b51f00b9a25f56a2f252d6812ebf850.diff. 1.8 patch a81044e6ccdd92cc967e34c125bd8162432e51bc.diff. There are no known workarounds for this vulnerability. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/Saadet-T/Saadet-T + diff --git a/2024/CVE-2024-2937.md b/2024/CVE-2024-2937.md new file mode 100644 index 0000000000..38130fee2c --- /dev/null +++ b/2024/CVE-2024-2937.md @@ -0,0 +1,19 @@ +### [CVE-2024-2937](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2937) +![](https://img.shields.io/static/v1?label=Product&message=Arm%205th%20Gen%20GPU%20Architecture%20Kernel%20Driver&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Bifrost%20GPU%20Kernel%20Driver&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Valhall%20GPU%20Kernel%20Driver&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-416%20Use%20After%20Free&color=brighgreen) + +### Description + +Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r41p0 through r49p0; Valhall GPU Kernel Driver: from r41p0 through r49p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r49p0. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-29390.md b/2024/CVE-2024-29390.md new file mode 100644 index 0000000000..64bfee5877 --- /dev/null +++ b/2024/CVE-2024-29390.md @@ -0,0 +1,17 @@ +### [CVE-2024-29390](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29390) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Daily Expenses Management System version 1.0, developed by PHP Gurukul, contains a time-based blind SQL injection vulnerability in the 'add-expense.php' page. An attacker can exploit the 'item' parameter in a POST request to execute arbitrary SQL commands in the backend database. This can be done by injecting specially crafted SQL queries that make the database perform time-consuming operations, thereby confirming the presence of the SQL injection vulnerability based on the delay in the server's response. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/CyberSentryX/CVE_Hunting + diff --git a/2024/CVE-2024-30078.md b/2024/CVE-2024-30078.md index 39ea2e060c..ef8e75e9eb 100644 --- a/2024/CVE-2024-30078.md +++ b/2024/CVE-2024-30078.md @@ -52,7 +52,10 @@ No PoCs from references. #### Github - https://github.com/0xMarcio/cve - https://github.com/GhostTroops/TOP +- https://github.com/blkph0x/CVE_2024_30078_POC_WIFI - https://github.com/enomothem/PenTestNote +- https://github.com/lvyitian/CVE-2024-30078- +- https://github.com/nkontopoul/checkwifivulnerability - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/stryngs/edgedressing diff --git a/2024/CVE-2024-3094.md b/2024/CVE-2024-3094.md index 7401d61991..eb5d73fc61 100644 --- a/2024/CVE-2024-3094.md +++ b/2024/CVE-2024-3094.md @@ -91,6 +91,7 @@ Malicious code was discovered in the upstream tarballs of xz, starting with vers - https://github.com/gayatriracha/CVE-2024-3094-Nmap-NSE-script - https://github.com/gustavorobertux/CVE-2024-3094 - https://github.com/hackingetico21/revisaxzutils +- https://github.com/hanmin0512/Data_splunk - https://github.com/harekrishnarai/xz-utils-vuln-checker - https://github.com/hazemkya/CVE-2024-3094-checker - https://github.com/hoanbi1812000/hoanbi1812000 diff --git a/2024/CVE-2024-31207.md b/2024/CVE-2024-31207.md index ad9b7974e9..a08e553acf 100644 --- a/2024/CVE-2024-31207.md +++ b/2024/CVE-2024-31207.md @@ -15,4 +15,5 @@ No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/nics-tw/sbom2vans diff --git a/2024/CVE-2024-31586.md b/2024/CVE-2024-31586.md index c8dca6e959..0f8d30571d 100644 --- a/2024/CVE-2024-31586.md +++ b/2024/CVE-2024-31586.md @@ -13,5 +13,5 @@ A Cross Site Scripting (XSS) vulnerability exists in Computer Laboratory Managem - https://github.com/CyberSentryX/CVE_Hunting/tree/main/CVE-2024-31586 #### Github -No PoCs found on GitHub currently. +- https://github.com/CyberSentryX/CVE_Hunting diff --git a/2024/CVE-2024-32030.md b/2024/CVE-2024-32030.md index 11baf57818..abedc07177 100644 --- a/2024/CVE-2024-32030.md +++ b/2024/CVE-2024-32030.md @@ -14,6 +14,7 @@ Kafka UI is an Open-Source Web UI for Apache Kafka Management. Kafka UI API allo - https://securitylab.github.com/advisories/GHSL-2023-229_GHSL-2023-230_kafka-ui/ #### Github +- https://github.com/Drun1baby/CVE-Reproduction-And-Analysis - https://github.com/Mr-xn/Penetration_Testing_POC - https://github.com/Threekiii/CVE - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-32113.md b/2024/CVE-2024-32113.md index 59a28e76ee..916bdd9c4b 100644 --- a/2024/CVE-2024-32113.md +++ b/2024/CVE-2024-32113.md @@ -16,6 +16,7 @@ No PoCs from references. - https://github.com/Mr-xn/CVE-2024-32113 - https://github.com/Mr-xn/Penetration_Testing_POC - https://github.com/Ostorlab/KEV +- https://github.com/RacerZ-fighting/CVE-2024-32113-POC - https://github.com/RacerZ-fighting/RacerZ-fighting - https://github.com/Threekiii/CVE - https://github.com/absholi7ly/Apache-OFBiz-Directory-Traversal-exploit diff --git a/2024/CVE-2024-33010.md b/2024/CVE-2024-33010.md new file mode 100644 index 0000000000..a3e29fe566 --- /dev/null +++ b/2024/CVE-2024-33010.md @@ -0,0 +1,17 @@ +### [CVE-2024-33010](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33010) +![](https://img.shields.io/static/v1?label=Product&message=Snapdragon&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20AR8035%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-416%20Use%20After%20Free&color=brighgreen) + +### Description + +Transient DOS while parsing fragments of MBSSID IE from beacon frame. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-33011.md b/2024/CVE-2024-33011.md new file mode 100644 index 0000000000..d843fa8bbb --- /dev/null +++ b/2024/CVE-2024-33011.md @@ -0,0 +1,17 @@ +### [CVE-2024-33011](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33011) +![](https://img.shields.io/static/v1?label=Product&message=Snapdragon&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20AR8035%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-126%20Buffer%20Over-read&color=brighgreen) + +### Description + +Transient DOS while parsing the MBSSID IE from the beacons, when the MBSSID IE length is zero. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-33012.md b/2024/CVE-2024-33012.md new file mode 100644 index 0000000000..514f6b7ae4 --- /dev/null +++ b/2024/CVE-2024-33012.md @@ -0,0 +1,17 @@ +### [CVE-2024-33012](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33012) +![](https://img.shields.io/static/v1?label=Product&message=Snapdragon&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20AR8035%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-126%20Buffer%20Over-read&color=brighgreen) + +### Description + +Transient DOS while parsing the multiple MBSSID IEs from the beacon, when the tag length is non-zero value but with end of beacon. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-33013.md b/2024/CVE-2024-33013.md new file mode 100644 index 0000000000..eec1f08474 --- /dev/null +++ b/2024/CVE-2024-33013.md @@ -0,0 +1,17 @@ +### [CVE-2024-33013](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33013) +![](https://img.shields.io/static/v1?label=Product&message=Snapdragon&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20AR8035%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-126%20Buffer%20Over-read&color=brighgreen) + +### Description + +Transient DOS when driver accesses the ML IE memory and offset value is incremented beyond ML IE length. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-33014.md b/2024/CVE-2024-33014.md new file mode 100644 index 0000000000..737917951d --- /dev/null +++ b/2024/CVE-2024-33014.md @@ -0,0 +1,17 @@ +### [CVE-2024-33014](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33014) +![](https://img.shields.io/static/v1?label=Product&message=Snapdragon&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20315%205G%20IoT%20Modem%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-126%20Buffer%20Over-read&color=brighgreen) + +### Description + +Transient DOS while parsing ESP IE from beacon/probe response frame. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-33015.md b/2024/CVE-2024-33015.md new file mode 100644 index 0000000000..ac2ababa1f --- /dev/null +++ b/2024/CVE-2024-33015.md @@ -0,0 +1,17 @@ +### [CVE-2024-33015](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33015) +![](https://img.shields.io/static/v1?label=Product&message=Snapdragon&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20AR8035%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-126%20Buffer%20Over-read&color=brighgreen) + +### Description + +Transient DOS while parsing SCAN RNR IE when bytes received from AP is such that the size of the last param of IE is less than neighbor report. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-33018.md b/2024/CVE-2024-33018.md new file mode 100644 index 0000000000..88ddaeec5d --- /dev/null +++ b/2024/CVE-2024-33018.md @@ -0,0 +1,17 @@ +### [CVE-2024-33018](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33018) +![](https://img.shields.io/static/v1?label=Product&message=Snapdragon&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20AR8035%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-126%20Buffer%20Over-read&color=brighgreen) + +### Description + +Transient DOS while parsing the received TID-to-link mapping element of the TID-to-link mapping action frame. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-33019.md b/2024/CVE-2024-33019.md new file mode 100644 index 0000000000..ceddab928b --- /dev/null +++ b/2024/CVE-2024-33019.md @@ -0,0 +1,17 @@ +### [CVE-2024-33019](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33019) +![](https://img.shields.io/static/v1?label=Product&message=Snapdragon&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20AR8035%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-126%20Buffer%20Over-read&color=brighgreen) + +### Description + +Transient DOS while parsing the received TID-to-link mapping action frame. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-33020.md b/2024/CVE-2024-33020.md new file mode 100644 index 0000000000..895998e3cc --- /dev/null +++ b/2024/CVE-2024-33020.md @@ -0,0 +1,17 @@ +### [CVE-2024-33020](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33020) +![](https://img.shields.io/static/v1?label=Product&message=Snapdragon&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20AR8035%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-126%20Buffer%20Over-read&color=brighgreen) + +### Description + +Transient DOS while processing TID-to-link mapping IE elements. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-33021.md b/2024/CVE-2024-33021.md new file mode 100644 index 0000000000..046019f6e3 --- /dev/null +++ b/2024/CVE-2024-33021.md @@ -0,0 +1,17 @@ +### [CVE-2024-33021](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33021) +![](https://img.shields.io/static/v1?label=Product&message=Snapdragon&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20AR8035%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-457%20Use%20of%20Uninitialized%20Variable&color=brighgreen) + +### Description + +Memory corruption while processing IOCTL call to set metainfo. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-33022.md b/2024/CVE-2024-33022.md new file mode 100644 index 0000000000..280bd50f97 --- /dev/null +++ b/2024/CVE-2024-33022.md @@ -0,0 +1,17 @@ +### [CVE-2024-33022](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33022) +![](https://img.shields.io/static/v1?label=Product&message=Snapdragon&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20AR8035%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-190%20Integer%20Overflow%20or%20Wraparound&color=brighgreen) + +### Description + +Memory corruption while allocating memory in HGSL driver. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-33023.md b/2024/CVE-2024-33023.md new file mode 100644 index 0000000000..19d29da1e4 --- /dev/null +++ b/2024/CVE-2024-33023.md @@ -0,0 +1,17 @@ +### [CVE-2024-33023](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33023) +![](https://img.shields.io/static/v1?label=Product&message=Snapdragon&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20AR8035%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-416%20Use%20After%20Free&color=brighgreen) + +### Description + +Memory corruption while creating a fence to wait on timeline events, and simultaneously signal timeline events. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-33024.md b/2024/CVE-2024-33024.md new file mode 100644 index 0000000000..693aac79c8 --- /dev/null +++ b/2024/CVE-2024-33024.md @@ -0,0 +1,17 @@ +### [CVE-2024-33024](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33024) +![](https://img.shields.io/static/v1?label=Product&message=Snapdragon&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20AR8035%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-190%20Integer%20Overflow%20or%20Wraparound&color=brighgreen) + +### Description + +Transient DOS while parsing the ML IE when a beacon with length field inside the common info of ML IE greater than the ML IE length. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-33025.md b/2024/CVE-2024-33025.md new file mode 100644 index 0000000000..5170f651fc --- /dev/null +++ b/2024/CVE-2024-33025.md @@ -0,0 +1,17 @@ +### [CVE-2024-33025](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33025) +![](https://img.shields.io/static/v1?label=Product&message=Snapdragon&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20CSR8811%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-126%20Buffer%20Over-read&color=brighgreen) + +### Description + +Transient DOS while parsing the BSS parameter change count or MLD capabilities fields of the ML IE. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-33026.md b/2024/CVE-2024-33026.md new file mode 100644 index 0000000000..f80f4c46e9 --- /dev/null +++ b/2024/CVE-2024-33026.md @@ -0,0 +1,17 @@ +### [CVE-2024-33026](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33026) +![](https://img.shields.io/static/v1?label=Product&message=Snapdragon&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20AR8035%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-126%20Buffer%20Over-read&color=brighgreen) + +### Description + +Transient DOS while parsing probe response and assoc response frame when received frame length is less than max size of timestamp. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-33027.md b/2024/CVE-2024-33027.md new file mode 100644 index 0000000000..d6dc22c16e --- /dev/null +++ b/2024/CVE-2024-33027.md @@ -0,0 +1,17 @@ +### [CVE-2024-33027](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33027) +![](https://img.shields.io/static/v1?label=Product&message=Snapdragon&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20315%205G%20IoT%20Modem%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-284%20Improper%20Access%20Control&color=brighgreen) + +### Description + +Memory corruption can occur when arbitrary user-space app gains kernel level privilege to modify DDR memory by corrupting the GPU page table. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-33028.md b/2024/CVE-2024-33028.md new file mode 100644 index 0000000000..ef7e251a2c --- /dev/null +++ b/2024/CVE-2024-33028.md @@ -0,0 +1,17 @@ +### [CVE-2024-33028](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33028) +![](https://img.shields.io/static/v1?label=Product&message=Snapdragon&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20AR8035%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-416%20Use%20After%20Free&color=brighgreen) + +### Description + +Memory corruption as fence object may still be accessed in timeline destruct after isync fence is released. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-33034.md b/2024/CVE-2024-33034.md new file mode 100644 index 0000000000..bd69fe2219 --- /dev/null +++ b/2024/CVE-2024-33034.md @@ -0,0 +1,17 @@ +### [CVE-2024-33034](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33034) +![](https://img.shields.io/static/v1?label=Product&message=Snapdragon&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20FastConnect%206200%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-416%20Use%20After%20Free&color=brighgreen) + +### Description + +Memory corruption can occur if VBOs hold outdated or invalid GPU SMMU mappings, especially when the binding and reclaiming of memory buffers are performed at the same time. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-33308.md b/2024/CVE-2024-33308.md index fa270605a2..300e4c7c1c 100644 --- a/2024/CVE-2024-33308.md +++ b/2024/CVE-2024-33308.md @@ -13,5 +13,6 @@ No PoCs from references. #### Github +- https://github.com/aaravavi/TVS-Connect-Application-VAPT - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-33309.md b/2024/CVE-2024-33309.md index 361cc97fd8..eea6a8da74 100644 --- a/2024/CVE-2024-33309.md +++ b/2024/CVE-2024-33309.md @@ -13,5 +13,6 @@ No PoCs from references. #### Github +- https://github.com/aaravavi/TVS-Connect-Application-VAPT - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-33975.md b/2024/CVE-2024-33975.md new file mode 100644 index 0000000000..8a0657c21c --- /dev/null +++ b/2024/CVE-2024-33975.md @@ -0,0 +1,17 @@ +### [CVE-2024-33975](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33975) +![](https://img.shields.io/static/v1?label=Product&message=E-Negosyo%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20'Cross-site%20Scripting')&color=brighgreen) + +### Description + +Cross-Site Scripting (XSS) vulnerability in E-Negosyo System affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted JavaScript payload to an authenticated user and partially take over their browser session via 'view' parameter in '/admin/products/index.php'. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-33976.md b/2024/CVE-2024-33976.md new file mode 100644 index 0000000000..13eeb6961b --- /dev/null +++ b/2024/CVE-2024-33976.md @@ -0,0 +1,17 @@ +### [CVE-2024-33976](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33976) +![](https://img.shields.io/static/v1?label=Product&message=E-Negosyo%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20'Cross-site%20Scripting')&color=brighgreen) + +### Description + +Cross-Site Scripting (XSS) vulnerability in E-Negosyo System affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted JavaScript payload to an authenticated user and partially take over their browser session via 'id' parameter in '/admin/user/index.php'. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-33977.md b/2024/CVE-2024-33977.md new file mode 100644 index 0000000000..83f6f459af --- /dev/null +++ b/2024/CVE-2024-33977.md @@ -0,0 +1,17 @@ +### [CVE-2024-33977](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33977) +![](https://img.shields.io/static/v1?label=Product&message=E-Negosyo%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20'Cross-site%20Scripting')&color=brighgreen) + +### Description + +Cross-Site Scripting (XSS) vulnerability in E-Negosyo System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain their session cookie details via 'view' parameter in /admin/orders/index.php'. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-34102.md b/2024/CVE-2024-34102.md index a1031d94ac..9a7070573e 100644 --- a/2024/CVE-2024-34102.md +++ b/2024/CVE-2024-34102.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/Mr-xn/Penetration_Testing_POC - https://github.com/Ostorlab/KEV +- https://github.com/f0ur0four/Insecure-Deserialization - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/redwaysecurity/CVEs diff --git a/2024/CVE-2024-35206.md b/2024/CVE-2024-35206.md new file mode 100644 index 0000000000..ce824d9300 --- /dev/null +++ b/2024/CVE-2024-35206.md @@ -0,0 +1,17 @@ +### [CVE-2024-35206](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35206) +![](https://img.shields.io/static/v1?label=Product&message=SINEC%20Traffic%20Analyzer&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V1.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-613%3A%20Insufficient%20Session%20Expiration&color=brighgreen) + +### Description + +A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected application does not expire the session. This could allow an attacker to get unauthorized access. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-35207.md b/2024/CVE-2024-35207.md new file mode 100644 index 0000000000..b7144ada5a --- /dev/null +++ b/2024/CVE-2024-35207.md @@ -0,0 +1,17 @@ +### [CVE-2024-35207](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35207) +![](https://img.shields.io/static/v1?label=Product&message=SINEC%20Traffic%20Analyzer&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V1.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The web interface of the affected devices are vulnerable to Cross-Site Request Forgery(CSRF) attacks. By tricking an authenticated victim user to click a malicious link, an attacker could perform arbitrary actions on the device on behalf of the victim user. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-35208.md b/2024/CVE-2024-35208.md new file mode 100644 index 0000000000..74c6b2e931 --- /dev/null +++ b/2024/CVE-2024-35208.md @@ -0,0 +1,17 @@ +### [CVE-2024-35208](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35208) +![](https://img.shields.io/static/v1?label=Product&message=SINEC%20Traffic%20Analyzer&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V1.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-522%3A%20Insufficiently%20Protected%20Credentials&color=brighgreen) + +### Description + +A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server stored the password in cleartext. This could allow attacker in a privileged position to obtain access passwords. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-35209.md b/2024/CVE-2024-35209.md new file mode 100644 index 0000000000..1438017433 --- /dev/null +++ b/2024/CVE-2024-35209.md @@ -0,0 +1,17 @@ +### [CVE-2024-35209](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35209) +![](https://img.shields.io/static/v1?label=Product&message=SINEC%20Traffic%20Analyzer&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V1.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function&color=brighgreen) + +### Description + +A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server is allowing HTTP methods like PUT and Delete. This could allow an attacker to modify unauthorized files. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-35210.md b/2024/CVE-2024-35210.md new file mode 100644 index 0000000000..3d8764a77d --- /dev/null +++ b/2024/CVE-2024-35210.md @@ -0,0 +1,17 @@ +### [CVE-2024-35210](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35210) +![](https://img.shields.io/static/v1?label=Product&message=SINEC%20Traffic%20Analyzer&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V1.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information&color=brighgreen) + +### Description + +A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server is not enforcing HSTS. This could allow an attacker to perform downgrade attacks exposing confidential information. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-35211.md b/2024/CVE-2024-35211.md new file mode 100644 index 0000000000..fb0020559b --- /dev/null +++ b/2024/CVE-2024-35211.md @@ -0,0 +1,17 @@ +### [CVE-2024-35211](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35211) +![](https://img.shields.io/static/v1?label=Product&message=SINEC%20Traffic%20Analyzer&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V1.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-614%3A%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20'Secure'%20Attribute&color=brighgreen) + +### Description + +A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server, after a successful login, sets the session cookie on the browser, without applying any security attributes (such as “Secure”, “HttpOnly”, or “SameSite”). + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-35212.md b/2024/CVE-2024-35212.md new file mode 100644 index 0000000000..2843f910c3 --- /dev/null +++ b/2024/CVE-2024-35212.md @@ -0,0 +1,17 @@ +### [CVE-2024-35212](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35212) +![](https://img.shields.io/static/v1?label=Product&message=SINEC%20Traffic%20Analyzer&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V1.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%3A%20Improper%20Input%20Validation&color=brighgreen) + +### Description + +A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected application lacks input validation due to which an attacker can gain access to the Database entries. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-35537.md b/2024/CVE-2024-35537.md new file mode 100644 index 0000000000..0ceea5c24e --- /dev/null +++ b/2024/CVE-2024-35537.md @@ -0,0 +1,17 @@ +### [CVE-2024-35537](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35537) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +TVS Motor Company Limited TVS Connect Android v4.6.0 and IOS v5.0.0 was discovered to insecurely handle the RSA key pair, allowing attackers to possibly access sensitive information via decryption. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/aaravavi/TVS-Connect-Application-VAPT + diff --git a/2024/CVE-2024-36104.md b/2024/CVE-2024-36104.md index 48e42e73e1..327dae1fd1 100644 --- a/2024/CVE-2024-36104.md +++ b/2024/CVE-2024-36104.md @@ -15,6 +15,7 @@ No PoCs from references. #### Github - https://github.com/Co5mos/nuclei-tps - https://github.com/Mr-xn/CVE-2024-32113 +- https://github.com/RacerZ-fighting/CVE-2024-32113-POC - https://github.com/Threekiii/Awesome-POC - https://github.com/Threekiii/CVE - https://github.com/enomothem/PenTestNote diff --git a/2024/CVE-2024-36840.md b/2024/CVE-2024-36840.md index 64c118d2af..8127939152 100644 --- a/2024/CVE-2024-36840.md +++ b/2024/CVE-2024-36840.md @@ -10,6 +10,7 @@ SQL Injection vulnerability in Boelter Blue System Management v.1.3 allows a rem ### POC #### Reference +- http://seclists.org/fulldisclosure/2024/Jun/0 - https://infosec-db.github.io/CyberDepot/vuln_boelter_blue/ - https://packetstormsecurity.com/files/178978/Boelter-Blue-System-Management-1.3-SQL-Injection.html - https://sploitus.com/exploit?id=PACKETSTORM:178978 diff --git a/2024/CVE-2024-3690.md b/2024/CVE-2024-3690.md index 838dbd2312..b4989d61ec 100644 --- a/2024/CVE-2024-3690.md +++ b/2024/CVE-2024-3690.md @@ -11,6 +11,7 @@ A vulnerability classified as critical was found in PHPGurukul Small CRM 3.0. Af #### Reference - https://github.com/psudo-bugboy/CVE-2024 +- https://vuldb.com/?submit.312974 #### Github - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-37169.md b/2024/CVE-2024-37169.md new file mode 100644 index 0000000000..8f0c668ef0 --- /dev/null +++ b/2024/CVE-2024-37169.md @@ -0,0 +1,17 @@ +### [CVE-2024-37169](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37169) +![](https://img.shields.io/static/v1?label=Product&message=url-to-png&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%202.0.3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen) + +### Description + +@jmondi/url-to-png is a self-hosted URL to PNG utility. Versions prior to 2.0.3 are vulnerable to arbitrary file read if a threat actor uses the Playright's screenshot feature to exploit the file wrapper. Version 2.0.3 mitigates this issue by requiring input URLs to be of protocol `http` or `https`. No known workarounds are available aside from upgrading. + +### POC + +#### Reference +- https://github.com/user-attachments/files/15536336/Arbitrary.File.Read.via.Playwright.s.Screenshot.Feature.Exploiting.File.Wrapper.pdf + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37309.md b/2024/CVE-2024-37309.md index ed3f6f0df2..34fdc2c795 100644 --- a/2024/CVE-2024-37309.md +++ b/2024/CVE-2024-37309.md @@ -10,7 +10,7 @@ CrateDB is a distributed SQL database. A high-risk vulnerability has been identi ### POC #### Reference -No PoCs from references. +- https://github.com/crate/crate/security/advisories/GHSA-x268-qpg6-w9g2 #### Github - https://github.com/chnzzh/OpenSSL-CVE-lib diff --git a/2024/CVE-2024-37635.md b/2024/CVE-2024-37635.md new file mode 100644 index 0000000000..7037e2cde0 --- /dev/null +++ b/2024/CVE-2024-37635.md @@ -0,0 +1,17 @@ +### [CVE-2024-37635](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37635) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via ssid in the function setWiFiBasicCfg + +### POC + +#### Reference +- https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWiFiBasicCfg/README.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37663.md b/2024/CVE-2024-37663.md new file mode 100644 index 0000000000..1c7a419e4b --- /dev/null +++ b/2024/CVE-2024-37663.md @@ -0,0 +1,17 @@ +### [CVE-2024-37663](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37663) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Redmi router RB03 v1.0.57 is vulnerable to forged ICMP redirect message attacks. An attacker in the same WLAN as the victim can hijack the traffic between the victim and any remote server by sending out forged ICMP redirect messages. + +### POC + +#### Reference +- https://github.com/ouuan/router-vuln-report/blob/master/icmp-redirect/redmi-rb03-redirect.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37734.md b/2024/CVE-2024-37734.md new file mode 100644 index 0000000000..2149c787d2 --- /dev/null +++ b/2024/CVE-2024-37734.md @@ -0,0 +1,17 @@ +### [CVE-2024-37734](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37734) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue in OpenEMR 7.0.2 allows a remote attacker to escalate privileges viaa crafted POST request using the noteid parameter. + +### POC + +#### Reference +- https://github.com/A3h1nt/CVEs/tree/main/OpenEMR + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37759.md b/2024/CVE-2024-37759.md index c2562dc7c9..de989bdc6c 100644 --- a/2024/CVE-2024-37759.md +++ b/2024/CVE-2024-37759.md @@ -10,7 +10,7 @@ DataGear v5.0.0 and earlier was discovered to contain a SpEL (Spring Expression ### POC #### Reference -No PoCs from references. +- https://github.com/crumbledwall/CVE-2024-37759_PoC #### Github - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-37802.md b/2024/CVE-2024-37802.md new file mode 100644 index 0000000000..09e786f543 --- /dev/null +++ b/2024/CVE-2024-37802.md @@ -0,0 +1,17 @@ +### [CVE-2024-37802](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37802) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +CodeProjects Health Care hospital Management System v1.0 was discovered to contain a SQL injection vulnerability in the Patient Info module via the searvalu parameter. + +### POC + +#### Reference +- https://github.com/SandeepRajauriya/CVEs/blob/main/CVE-2024-37802 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37820.md b/2024/CVE-2024-37820.md new file mode 100644 index 0000000000..0711099fa8 --- /dev/null +++ b/2024/CVE-2024-37820.md @@ -0,0 +1,17 @@ +### [CVE-2024-37820](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37820) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A nil pointer dereference in PingCAP TiDB v8.2.0-alpha-216-gfe5858b allows attackers to crash the application via expression.inferCollation. + +### POC + +#### Reference +- https://github.com/pingcap/tidb/issues/53580 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37855.md b/2024/CVE-2024-37855.md new file mode 100644 index 0000000000..4c952339c7 --- /dev/null +++ b/2024/CVE-2024-37855.md @@ -0,0 +1,17 @@ +### [CVE-2024-37855](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37855) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue in Nepstech Wifi Router xpon (terminal) NTPL-Xpon1GFEVN, hardware verstion 1.0 firmware 2.0.1 allows a remote attacker to execute arbitrary code via the router's Telnet port 2345 without requiring authentication credentials. + +### POC + +#### Reference +- https://github.com/sudo-subho/nepstech-xpon-router-rce + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37870.md b/2024/CVE-2024-37870.md new file mode 100644 index 0000000000..a5576f06ab --- /dev/null +++ b/2024/CVE-2024-37870.md @@ -0,0 +1,17 @@ +### [CVE-2024-37870](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37870) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +SQL injection vulnerability in processscore.php in Learning Management System Project In PHP With Source Code 1.0 allows attackers to execute arbitrary SQL commands via the id parameter. + +### POC + +#### Reference +- https://github.com/TThuyyy/cve1/issues/3 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37871.md b/2024/CVE-2024-37871.md new file mode 100644 index 0000000000..7b706302d4 --- /dev/null +++ b/2024/CVE-2024-37871.md @@ -0,0 +1,17 @@ +### [CVE-2024-37871](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37871) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +SQL injection vulnerability in login.php in Itsourcecode Online Discussion Forum Project in PHP with Source Code 1.0 allows remote attackers to execute arbitrary SQL commands via the email parameter. + +### POC + +#### Reference +- https://github.com/TThuyyy/cve1/issues/1 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37872.md b/2024/CVE-2024-37872.md new file mode 100644 index 0000000000..f2aa7b4e31 --- /dev/null +++ b/2024/CVE-2024-37872.md @@ -0,0 +1,17 @@ +### [CVE-2024-37872](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37872) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +SQL injection vulnerability in process.php in Itsourcecode Billing System in PHP 1.0 allows remote attackers to execute arbitrary SQL commands via the username parameter. + +### POC + +#### Reference +- https://github.com/TThuyyy/cve1/issues/4 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37873.md b/2024/CVE-2024-37873.md new file mode 100644 index 0000000000..2d8fdd73e1 --- /dev/null +++ b/2024/CVE-2024-37873.md @@ -0,0 +1,17 @@ +### [CVE-2024-37873](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37873) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +SQL injection vulnerability in view_payslip.php in Itsourcecode Payroll Management System Project In PHP With Source Code 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter. + +### POC + +#### Reference +- https://github.com/TThuyyy/cve1/issues/2 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-37890.md b/2024/CVE-2024-37890.md index adbcc62a48..7e94fb7101 100644 --- a/2024/CVE-2024-37890.md +++ b/2024/CVE-2024-37890.md @@ -10,6 +10,8 @@ ws is an open source WebSocket client and server for Node.js. A request with a n ### POC #### Reference +- https://github.com/websockets/ws/issues/2230 +- https://github.com/websockets/ws/pull/2231 - https://github.com/websockets/ws/security/advisories/GHSA-3h5v-q93c-6h6q #### Github diff --git a/2024/CVE-2024-38021.md b/2024/CVE-2024-38021.md new file mode 100644 index 0000000000..f6745249df --- /dev/null +++ b/2024/CVE-2024-38021.md @@ -0,0 +1,22 @@ +### [CVE-2024-38021](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38021) +![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20365%20Apps%20for%20Enterprise&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Office%202016&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Office%202019&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Office%20LTSC%202021&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=16.0.0%3C%2016.0.5456.1000%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=16.0.1%3C%20https%3A%2F%2Faka.ms%2FOfficeSecurityReleases%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=19.0.0%3C%20https%3A%2F%2Faka.ms%2FOfficeSecurityReleases%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%3A%20Improper%20Input%20Validation&color=brighgreen) + +### Description + +Microsoft Outlook Remote Code Execution Vulnerability + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/cybereagle2001/KQL-Security-Querries + diff --git a/2024/CVE-2024-38100.md b/2024/CVE-2024-38100.md new file mode 100644 index 0000000000..0ea9e5bfce --- /dev/null +++ b/2024/CVE-2024-38100.md @@ -0,0 +1,25 @@ +### [CVE-2024-38100](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38100) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202022&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.14393.7159%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.17763.6054%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.20348.2582%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.25398.1009%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-284%3A%20Improper%20Access%20Control&color=brighgreen) + +### Description + +Windows File Explorer Elevation of Privilege Vulnerability + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/tanjiti/sec_profile + diff --git a/2024/CVE-2024-38856.md b/2024/CVE-2024-38856.md index 9e140dfd04..1cfa25cb4a 100644 --- a/2024/CVE-2024-38856.md +++ b/2024/CVE-2024-38856.md @@ -13,7 +13,10 @@ Incorrect Authorization vulnerability in Apache OFBiz.This issue affects Apache No PoCs from references. #### Github +- https://github.com/Ostorlab/KEV +- https://github.com/RacerZ-fighting/CVE-2024-32113-POC - https://github.com/RacerZ-fighting/RacerZ-fighting - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/tanjiti/sec_profile diff --git a/2024/CVE-2024-3914.md b/2024/CVE-2024-3914.md index 6d69a29582..31441cb6cd 100644 --- a/2024/CVE-2024-3914.md +++ b/2024/CVE-2024-3914.md @@ -14,4 +14,5 @@ No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/leesh3288/leesh3288 diff --git a/2024/CVE-2024-39689.md b/2024/CVE-2024-39689.md index d41837a2df..658e19ab2c 100644 --- a/2024/CVE-2024-39689.md +++ b/2024/CVE-2024-39689.md @@ -15,4 +15,5 @@ No PoCs from references. #### Github - https://github.com/PBorocz/raindrop-io-py - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/roy-aladin/InfraTest diff --git a/2024/CVE-2024-39903.md b/2024/CVE-2024-39903.md new file mode 100644 index 0000000000..514635384e --- /dev/null +++ b/2024/CVE-2024-39903.md @@ -0,0 +1,17 @@ +### [CVE-2024-39903](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39903) +![](https://img.shields.io/static/v1?label=Product&message=solara&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.35.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen) + +### Description + +Solara is a pure Python, React-style framework for scaling Jupyter and web apps. A Local File Inclusion (LFI) vulnerability was identified in widgetti/solara, in version <1.35.1, which was fixed in version 1.35.1. This vulnerability arises from the application's failure to properly validate URI fragments for directory traversal sequences such as '../' when serving static files. An attacker can exploit this flaw by manipulating the fragment part of the URI to read arbitrary files on the local file system. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/sunriseXu/sunriseXu + diff --git a/2024/CVE-2024-40498.md b/2024/CVE-2024-40498.md new file mode 100644 index 0000000000..7ce169eabe --- /dev/null +++ b/2024/CVE-2024-40498.md @@ -0,0 +1,18 @@ +### [CVE-2024-40498](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40498) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +SQL Injection vulnerability in PuneethReddyHC Online Shopping sysstem advanced v.1.0 allows an attacker to execute arbitrary code via the register.php + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-40530.md b/2024/CVE-2024-40530.md new file mode 100644 index 0000000000..cc1b1bcf0c --- /dev/null +++ b/2024/CVE-2024-40530.md @@ -0,0 +1,17 @@ +### [CVE-2024-40530](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40530) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Insecure Permissions vulnerability in UAB Lexita PanteraCRM CMS v.401.152 and Patera CRM CMS v.402.072 allows a remote attacker to execute arbitrary code via modification of the X-Forwarded-For header component. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-40789.md b/2024/CVE-2024-40789.md new file mode 100644 index 0000000000..464bcc7cb0 --- /dev/null +++ b/2024/CVE-2024-40789.md @@ -0,0 +1,25 @@ +### [CVE-2024-40789](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40789) +![](https://img.shields.io/static/v1?label=Product&message=Safari&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=iOS%20and%20iPadOS&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=macOS&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=tvOS&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=visionOS&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=watchOS&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%201.3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2010.6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2014.6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2017.6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash&color=brighgreen) + +### Description + +An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/leesh3288/leesh3288 + diff --git a/2024/CVE-2024-41108.md b/2024/CVE-2024-41108.md new file mode 100644 index 0000000000..7cd4ebe980 --- /dev/null +++ b/2024/CVE-2024-41108.md @@ -0,0 +1,17 @@ +### [CVE-2024-41108](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41108) +![](https://img.shields.io/static/v1?label=Product&message=fogproject&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.5.10.41%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen) + +### Description + +FOG is a free open-source cloning/imaging/rescue suite/inventory management system. The hostinfo page has missing/improper access control since only the host's mac address is required to obtain the configuration information. This data can only be retrieved if a task is pending on that host. Otherwise, an error message containing "Invalid tasking!" will be returned. The domainpassword in the hostinfo dump is hidden even to authenticated users, as it is displayed as a row of asterisks when navigating to the host's Active Directory settings. This vulnerability is fixed in 1.5.10.41. + +### POC + +#### Reference +- https://github.com/FOGProject/fogproject/security/advisories/GHSA-p3f9-4jj4-fm2g + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41112.md b/2024/CVE-2024-41112.md index 1a02e464b9..2d3e03b8fc 100644 --- a/2024/CVE-2024-41112.md +++ b/2024/CVE-2024-41112.md @@ -10,6 +10,8 @@ streamlit-geospatial is a streamlit multipage app for geospatial applications. P ### POC #### Reference +- https://github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py#L373-L376 +- https://github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py#L380 - https://securitylab.github.com/advisories/GHSL-2024-100_GHSL-2024-108_streamlit-geospatial/ #### Github diff --git a/2024/CVE-2024-41115.md b/2024/CVE-2024-41115.md index bbe016d20f..8253bd69d1 100644 --- a/2024/CVE-2024-41115.md +++ b/2024/CVE-2024-41115.md @@ -10,6 +10,8 @@ streamlit-geospatial is a streamlit multipage app for geospatial applications. P ### POC #### Reference +- https://github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py#L488 +- https://github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py#L493 - https://securitylab.github.com/advisories/GHSL-2024-100_GHSL-2024-108_streamlit-geospatial/ #### Github diff --git a/2024/CVE-2024-41116.md b/2024/CVE-2024-41116.md index 3bd4da7f37..e248d1b926 100644 --- a/2024/CVE-2024-41116.md +++ b/2024/CVE-2024-41116.md @@ -10,6 +10,8 @@ streamlit-geospatial is a streamlit multipage app for geospatial applications. P ### POC #### Reference +- https://github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py#L1254 +- https://github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py#L1345 - https://securitylab.github.com/advisories/GHSL-2024-100_GHSL-2024-108_streamlit-geospatial/ #### Github diff --git a/2024/CVE-2024-41130.md b/2024/CVE-2024-41130.md new file mode 100644 index 0000000000..9b3a7101bf --- /dev/null +++ b/2024/CVE-2024-41130.md @@ -0,0 +1,17 @@ +### [CVE-2024-41130](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41130) +![](https://img.shields.io/static/v1?label=Product&message=llama.cpp&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%20b3427%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-476%3A%20NULL%20Pointer%20Dereference&color=brighgreen) + +### Description + +llama.cpp provides LLM inference in C/C++. Prior to b3427, llama.cpp contains a null pointer dereference in gguf_init_from_file. This vulnerability is fixed in b3427. + +### POC + +#### Reference +- https://github.com/ggerganov/llama.cpp/security/advisories/GHSA-49q7-2jmh-92fp + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41281.md b/2024/CVE-2024-41281.md new file mode 100644 index 0000000000..434555739d --- /dev/null +++ b/2024/CVE-2024-41281.md @@ -0,0 +1,17 @@ +### [CVE-2024-41281](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41281) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Linksys WRT54G v4.21.5 has a stack overflow vulnerability in get_merge_mac function. + +### POC + +#### Reference +- https://github.com/BuaaIOTTeam/Iot_Linksys/blob/main/Linksys_WRT54G_get_merge_mac.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41354.md b/2024/CVE-2024-41354.md new file mode 100644 index 0000000000..088d774124 --- /dev/null +++ b/2024/CVE-2024-41354.md @@ -0,0 +1,17 @@ +### [CVE-2024-41354](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41354) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via /app/admin/widgets/edit.php + +### POC + +#### Reference +- https://github.com/phpipam/phpipam/issues/4150 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41355.md b/2024/CVE-2024-41355.md new file mode 100644 index 0000000000..10a3e4c7d9 --- /dev/null +++ b/2024/CVE-2024-41355.md @@ -0,0 +1,17 @@ +### [CVE-2024-41355](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41355) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via /app/tools/request-ip/index.php. + +### POC + +#### Reference +- https://github.com/phpipam/phpipam/issues/4151 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41373.md b/2024/CVE-2024-41373.md new file mode 100644 index 0000000000..f112b323c1 --- /dev/null +++ b/2024/CVE-2024-41373.md @@ -0,0 +1,17 @@ +### [CVE-2024-41373](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41373) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +ICEcoder 8.1 contains a Path Traversal vulnerability via lib/backup-versions-preview-loader.php. + +### POC + +#### Reference +- https://github.com/xjzzzxx/vulFound/blob/main/icecoder/icecoder8.1_PT.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41375.md b/2024/CVE-2024-41375.md new file mode 100644 index 0000000000..9dfc02d211 --- /dev/null +++ b/2024/CVE-2024-41375.md @@ -0,0 +1,17 @@ +### [CVE-2024-41375](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41375) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +ICEcoder 8.1 is vulnerable to Cross Site Scripting (XSS) via lib/terminal-xhr.php + +### POC + +#### Reference +- https://github.com/xjzzzxx/vulFound/blob/main/icecoder/icecoder8.1_xss1.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41380.md b/2024/CVE-2024-41380.md new file mode 100644 index 0000000000..001f6c9e15 --- /dev/null +++ b/2024/CVE-2024-41380.md @@ -0,0 +1,17 @@ +### [CVE-2024-41380](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41380) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +microweber 2.0.16 was discovered to contain a Cross Site Scripting (XSS) vulnerability via userfiles\modules\tags\add_tagging_tagged.php. + +### POC + +#### Reference +- https://github.com/microweber/microweber/issues/1111 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41381.md b/2024/CVE-2024-41381.md new file mode 100644 index 0000000000..24238b0d18 --- /dev/null +++ b/2024/CVE-2024-41381.md @@ -0,0 +1,17 @@ +### [CVE-2024-41381](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41381) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +microweber 2.0.16 was discovered to contain a Cross Site Scripting (XSS) vulnerability via userfiles\modules\settings\admin.php. + +### POC + +#### Reference +- https://github.com/microweber/microweber/issues/1110 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41437.md b/2024/CVE-2024-41437.md new file mode 100644 index 0000000000..62339c8f95 --- /dev/null +++ b/2024/CVE-2024-41437.md @@ -0,0 +1,21 @@ +### [CVE-2024-41437](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41437) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A heap buffer overflow in the function cp_unfilter() (/vendor/cute_png.h) of hicolor v0.5.0 allows attackers to cause a Denial of Service (DoS) via a crafted PNG file. + +### POC + +#### Reference +- https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-r1-cp_unfilter-cute_png-1019c11/poc/sample6.png +- https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-r1-cp_unfilter-cute_png-1019c11/vulDescription.assets/image-20240530183857985.png +- https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-r1-cp_unfilter-cute_png-1019c11/vulDescription.md +- https://github.com/Helson-S/FuzzyTesting/tree/master/hicolor/heapof-r1-cp_unfilter-cute_png-1019c11 +- https://github.com/Helson-S/FuzzyTesting/tree/master/hicolor/heapof-r1-cp_unfilter-cute_png-1019c11/poc + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41438.md b/2024/CVE-2024-41438.md new file mode 100644 index 0000000000..4f52f14a1d --- /dev/null +++ b/2024/CVE-2024-41438.md @@ -0,0 +1,23 @@ +### [CVE-2024-41438](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41438) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A heap buffer overflow in the function cp_stored() (/vendor/cute_png.h) of hicolor v0.5.0 allows attackers to cause a Denial of Service (DoS) via a crafted PNG file. + +### POC + +#### Reference +- https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-r65280-cp_stored-cute_png-543c2 +- https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-r65280-cp_stored-cute_png-543c2/vulDescription.assets/image-20240530184723547.png +- https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-r65280-cp_stored-cute_png-543c2/vulDescription.assets/image-20240530184848743.png +- https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-r65280-cp_stored-cute_png-543c2/vulDescription.assets/image-20240530185015780.png +- https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-r65280-cp_stored-cute_png-543c2/vulDescription.md +- https://github.com/Helson-S/FuzzyTesting/tree/master/hicolor/heapof-r65280-cp_stored-cute_png-543c2/poc +- https://github.com/Helson-S/FuzzyTesting/tree/master/hicolor/heapof-r65280-cp_stored-cute_png-543c2/poc/sample10.png + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41439.md b/2024/CVE-2024-41439.md new file mode 100644 index 0000000000..831d5736fc --- /dev/null +++ b/2024/CVE-2024-41439.md @@ -0,0 +1,22 @@ +### [CVE-2024-41439](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41439) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A heap buffer overflow in the function cp_block() (/vendor/cute_png.h) of hicolor v0.5.0 allows attackers to cause a Denial of Service (DoS) via a crafted PNG file. + +### POC + +#### Reference +- https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-w98-cp_block-5c0-cute_png-642c5 +- https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-w98-cp_block-5c0-cute_png-642c5/poc +- https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-w98-cp_block-5c0-cute_png-642c5/poc/sample13.png +- https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-w98-cp_block-5c0-cute_png-642c5/vulDescription.assets/image-20240530192505615.png +- https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-w98-cp_block-5c0-cute_png-642c5/vulDescription.assets/image-20240531002753478.png +- https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-w98-cp_block-5c0-cute_png-642c5/vulDescription.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41459.md b/2024/CVE-2024-41459.md new file mode 100644 index 0000000000..ce95b7dd72 --- /dev/null +++ b/2024/CVE-2024-41459.md @@ -0,0 +1,17 @@ +### [CVE-2024-41459](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41459) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Tenda FH1201 v1.2.0.14 was discovered to contain a stack-based buffer overflow vulnerability via the PPPOEPassword parameter at ip/goform/QuickIndex. + +### POC + +#### Reference +- https://github.com/iotresearch/iot-vuln/blob/main/Tenda/FH1201/QuickIndex/QuickIndex.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41460.md b/2024/CVE-2024-41460.md new file mode 100644 index 0000000000..f735ed8e05 --- /dev/null +++ b/2024/CVE-2024-41460.md @@ -0,0 +1,17 @@ +### [CVE-2024-41460](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41460) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Tenda FH1201 v1.2.0.14 was discovered to contain a stack-based buffer overflow vulnerability via the entrys parameter at ip/goform/RouteStatic. + +### POC + +#### Reference +- https://github.com/iotresearch/iot-vuln/blob/main/Tenda/FH1201/RouteStatic/README.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41461.md b/2024/CVE-2024-41461.md new file mode 100644 index 0000000000..d758f12aa0 --- /dev/null +++ b/2024/CVE-2024-41461.md @@ -0,0 +1,17 @@ +### [CVE-2024-41461](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41461) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Tenda FH1201 v1.2.0.14 was discovered to contain a stack-based buffer overflow vulnerability via the list1 parameter at ip/goform/DhcpListClient. + +### POC + +#### Reference +- https://github.com/iotresearch/iot-vuln/blob/main/Tenda/FH1201/DhcpListClient/README.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41462.md b/2024/CVE-2024-41462.md index 21050c348e..1fa3813331 100644 --- a/2024/CVE-2024-41462.md +++ b/2024/CVE-2024-41462.md @@ -10,7 +10,7 @@ Tenda FH1201 v1.2.0.14 was discovered to contain a stack-based buffer overflow v ### POC #### Reference -No PoCs from references. +- https://github.com/iotresearch/iot-vuln/blob/main/Tenda/FH1201/DhcpListClient2/README.md #### Github - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-41463.md b/2024/CVE-2024-41463.md index fe8421da73..609c720a5f 100644 --- a/2024/CVE-2024-41463.md +++ b/2024/CVE-2024-41463.md @@ -10,7 +10,7 @@ Tenda FH1201 v1.2.0.14 was discovered to contain a stack-based buffer overflow v ### POC #### Reference -No PoCs from references. +- https://github.com/iotresearch/iot-vuln/blob/main/Tenda/FH1201/addressNat/README.md #### Github - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-41464.md b/2024/CVE-2024-41464.md index e99132e8a7..61d9265d48 100644 --- a/2024/CVE-2024-41464.md +++ b/2024/CVE-2024-41464.md @@ -10,7 +10,7 @@ Tenda FH1201 v1.2.0.14 was discovered to contain a stack-based buffer overflow v ### POC #### Reference -No PoCs from references. +- https://github.com/iotresearch/iot-vuln/tree/main/Tenda/FH1201/RouteStatic2 #### Github - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-41492.md b/2024/CVE-2024-41492.md new file mode 100644 index 0000000000..126fe493c9 --- /dev/null +++ b/2024/CVE-2024-41492.md @@ -0,0 +1,17 @@ +### [CVE-2024-41492](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41492) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A stack overflow in Tenda AX1806 v1.0.0.1 allows attackers to cause a Denial of Service (DoS) via a crafted input. + +### POC + +#### Reference +- https://gist.github.com/Swind1er/4176fdc25e415296904c9fb19e2f8293 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41655.md b/2024/CVE-2024-41655.md new file mode 100644 index 0000000000..38079019cb --- /dev/null +++ b/2024/CVE-2024-41655.md @@ -0,0 +1,18 @@ +### [CVE-2024-41655](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41655) +![](https://img.shields.io/static/v1?label=Product&message=node-tf2-item-format&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%204.2.6%2C%20%3C%205.9.14%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-624%3A%20Executable%20Regular%20Expression%20Error&color=brighgreen) + +### Description + +TF2 Item Format helps users format TF2 items to the community standards. Versions of `tf2-item-format` since at least `4.2.6` and prior to `5.9.14` are vulnerable to a Regular Expression Denial of Service (ReDoS) attack when parsing crafted user input. This vulnerability can be exploited by an attacker to perform DoS attacks on any service that uses any `tf2-item-format` to parse user input. Version `5.9.14` contains a fix for the issue. + +### POC + +#### Reference +- https://github.com/danocmx/node-tf2-item-format/security/advisories/GHSA-8h55-q5qq-p685 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41665.md b/2024/CVE-2024-41665.md new file mode 100644 index 0000000000..d067eb4003 --- /dev/null +++ b/2024/CVE-2024-41665.md @@ -0,0 +1,17 @@ +### [CVE-2024-41665](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41665) +![](https://img.shields.io/static/v1?label=Product&message=ampache&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%206.6.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) + +### Description + +Ampache, a web based audio/video streaming application and file manager, has a stored cross-site scripting (XSS) vulnerability in versions prior to 6.6.0. This vulnerability exists in the "Playlists - Democratic - Configure Democratic Playlist" feature. An attacker with Content Manager permissions can set the Name field to ``. When any administrator or user accesses the Democratic functionality, they will be affected by this stored XSS vulnerability. The attacker can exploit this vulnerability to obtain the cookies of any user or administrator who accesses the `democratic.php` file. Version 6.6.0 contains a patch for the issue. + +### POC + +#### Reference +- https://github.com/ampache/ampache/security/advisories/GHSA-cp44-89r2-fxph + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41666.md b/2024/CVE-2024-41666.md index feb3a681bd..e9a7701e24 100644 --- a/2024/CVE-2024-41666.md +++ b/2024/CVE-2024-41666.md @@ -10,7 +10,7 @@ Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo C ### POC #### Reference -No PoCs from references. +- https://github.com/argoproj/argo-cd/security/advisories/GHSA-v8wx-v5jq-qhhw #### Github - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-41671.md b/2024/CVE-2024-41671.md new file mode 100644 index 0000000000..a3e2783c55 --- /dev/null +++ b/2024/CVE-2024-41671.md @@ -0,0 +1,17 @@ +### [CVE-2024-41671](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41671) +![](https://img.shields.io/static/v1?label=Product&message=twisted&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%3D%2024.3.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20('HTTP%20Request%2FResponse%20Smuggling')&color=brighgreen) + +### Description + +Twisted is an event-based framework for internet applications, supporting Python 3.6+. The HTTP 1.0 and 1.1 server provided by twisted.web could process pipelined HTTP requests out-of-order, possibly resulting in information disclosure. This vulnerability is fixed in 24.7.0rc1. + +### POC + +#### Reference +- https://github.com/twisted/twisted/security/advisories/GHSA-c8m8-j448-xjx7 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41672.md b/2024/CVE-2024-41672.md index 48b2f9f583..1347fb80d8 100644 --- a/2024/CVE-2024-41672.md +++ b/2024/CVE-2024-41672.md @@ -10,7 +10,7 @@ DuckDB is a SQL database management system. In versions 1.0.0 and prior, content ### POC #### Reference -No PoCs from references. +- https://github.com/duckdb/duckdb/security/advisories/GHSA-w2gf-jxc9-pf2q #### Github - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-41812.md b/2024/CVE-2024-41812.md new file mode 100644 index 0000000000..0cae4d6c5c --- /dev/null +++ b/2024/CVE-2024-41812.md @@ -0,0 +1,17 @@ +### [CVE-2024-41812](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41812) +![](https://img.shields.io/static/v1?label=Product&message=txtdot&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.7.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)&color=brighgreen) + +### Description + +txtdot is an HTTP proxy that parses only text, links, and pictures from pages, removing ads and heavy scripts. Prior to version 1.7.0, a Server-Side Request Forgery (SSRF) vulnerability in the `/get` route of txtdot allows remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network. Version 1.7.0 prevents displaying the response of forged requests, but the requests can still be sent. For complete mitigation, a firewall between txtdot and other internal network resources should be set. + +### POC + +#### Reference +- https://github.com/TxtDot/txtdot/security/advisories/GHSA-4gj5-xj97-j8fp + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41817.md b/2024/CVE-2024-41817.md new file mode 100644 index 0000000000..1c04220b04 --- /dev/null +++ b/2024/CVE-2024-41817.md @@ -0,0 +1,17 @@ +### [CVE-2024-41817](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41817) +![](https://img.shields.io/static/v1?label=Product&message=ImageMagick&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%207.11-36%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-427%3A%20Uncontrolled%20Search%20Path%20Element&color=brighgreen) + +### Description + +ImageMagick is a free and open-source software suite, used for editing and manipulating digital images. The `AppImage` version `ImageMagick` might use an empty path when setting `MAGICK_CONFIGURE_PATH` and `LD_LIBRARY_PATH` environment variables while executing, which might lead to arbitrary code execution by loading malicious configuration files or shared libraries in the current working directory while executing `ImageMagick`. The vulnerability is fixed in 7.11-36. + +### POC + +#### Reference +- https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-8rxc-922v-phg8 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41818.md b/2024/CVE-2024-41818.md new file mode 100644 index 0000000000..971f8d2342 --- /dev/null +++ b/2024/CVE-2024-41818.md @@ -0,0 +1,17 @@ +### [CVE-2024-41818](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41818) +![](https://img.shields.io/static/v1?label=Product&message=fast-xml-parser&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%204.4.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +fast-xml-parser is an open source, pure javascript xml parser. a ReDOS exists on currency.js. This vulnerability is fixed in 4.4.1. + +### POC + +#### Reference +- https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-mpg4-rc92-vx8v + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41819.md b/2024/CVE-2024-41819.md index d7f1d9c75b..6135c12bf1 100644 --- a/2024/CVE-2024-41819.md +++ b/2024/CVE-2024-41819.md @@ -10,7 +10,7 @@ Note Mark is a web-based Markdown notes app. A stored cross-site scripting (XSS) ### POC #### Reference -No PoCs from references. +- https://github.com/enchant97/note-mark/security/advisories/GHSA-rm48-9mqf-8jc3 #### Github - https://github.com/alessio-romano/Sfoffo-Pentesting-Notes diff --git a/2024/CVE-2024-41945.md b/2024/CVE-2024-41945.md new file mode 100644 index 0000000000..8ba20280c8 --- /dev/null +++ b/2024/CVE-2024-41945.md @@ -0,0 +1,17 @@ +### [CVE-2024-41945](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41945) +![](https://img.shields.io/static/v1?label=Product&message=fuels-ts&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%200.93.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%3A%20Improper%20Input%20Validation&color=brighgreen) + +### Description + +fuels-ts is a library for interacting with Fuel v2. The typescript SDK has no awareness of to-be-spent transactions causing some transactions to fail or silently get pruned as they are funded with already used UTXOs. The problem occurs, because the `fund` function in `fuels-ts/packages/account/src/account.ts` gets the needed ressources statelessly with the function `getResourcesToSpend` without taking into consideration already used UTXOs. This issue will lead to unexpected SDK behaviour, such as a transaction not getting included in the `txpool` / in a block or a previous transaction silently getting removed from the `txpool` and replaced with a new one. + +### POC + +#### Reference +- https://github.com/FuelLabs/fuels-ts/security/advisories/GHSA-3jcg-vx7f-j6qf + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41957.md b/2024/CVE-2024-41957.md new file mode 100644 index 0000000000..579f6c0da4 --- /dev/null +++ b/2024/CVE-2024-41957.md @@ -0,0 +1,17 @@ +### [CVE-2024-41957](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41957) +![](https://img.shields.io/static/v1?label=Product&message=vim&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%209.1.0647%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-415%3A%20Double%20Free&color=brighgreen) + +### Description + +Vim is an open source command line text editor. Vim < v9.1.0647 has double free in src/alloc.c:616. When closing a window, the corresponding tagstack data will be cleared and freed. However a bit later, the quickfix list belonging to that window will also be cleared and if that quickfix list points to the same tagstack data, Vim will try to free it again, resulting in a double-free/use-after-free access exception. Impact is low since the user must intentionally execute vim with several non-default flags,but it may cause a crash of Vim. The issue has been fixed as of Vim patch v9.1.0647 + +### POC + +#### Reference +- https://github.com/vim/vim/security/advisories/GHSA-f9cr-gv85-hcr4 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-41958.md b/2024/CVE-2024-41958.md new file mode 100644 index 0000000000..75b1a90199 --- /dev/null +++ b/2024/CVE-2024-41958.md @@ -0,0 +1,17 @@ +### [CVE-2024-41958](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41958) +![](https://img.shields.io/static/v1?label=Product&message=mailcow-dockerized&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%202024-07%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-697%3A%20Incorrect%20Comparison&color=brighgreen) + +### Description + +mailcow: dockerized is an open source groupware/email suite based on docker. A vulnerability has been discovered in the two-factor authentication (2FA) mechanism. This flaw allows an authenticated attacker to bypass the 2FA protection, enabling unauthorized access to other accounts that are otherwise secured with 2FA. To exploit this vulnerability, the attacker must first have access to an account within the system and possess the credentials of the target account that has 2FA enabled. By leveraging these credentials, the attacker can circumvent the 2FA process and gain access to the protected account. This issue has been addressed in the `2024-07` release. All users are advised to upgrade. There are no known workarounds for this vulnerability. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-41995.md b/2024/CVE-2024-41995.md new file mode 100644 index 0000000000..853a7f96f7 --- /dev/null +++ b/2024/CVE-2024-41995.md @@ -0,0 +1,17 @@ +### [CVE-2024-41995](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41995) +![](https://img.shields.io/static/v1?label=Product&message=JavaTM%20Platform&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20Ver.12.89%20and%20earlier%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default&color=brighgreen) + +### Description + +Initialization of a resource with an insecure default vulnerability exists in JavaTM Platform Ver.12.89 and earlier. If this vulnerability is exploited, the product may be affected by some known TLS1.0 and TLS1.1 vulnerabilities. As for the specific products/models/versions of MFPs and printers that contain JavaTM Platform, see the information provided by the vendor. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-42010.md b/2024/CVE-2024-42010.md new file mode 100644 index 0000000000..5185efdafe --- /dev/null +++ b/2024/CVE-2024-42010.md @@ -0,0 +1,17 @@ +### [CVE-2024-42010](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42010) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +mod_css_styles in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a insufficiently filters Cascading Style Sheets (CSS) token sequences in rendered e-mail messages, allowing a remote attacker to obtain sensitive information. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-4358.md b/2024/CVE-2024-4358.md index 6e641345e9..f8ae6606be 100644 --- a/2024/CVE-2024-4358.md +++ b/2024/CVE-2024-4358.md @@ -18,6 +18,7 @@ No PoCs from references. - https://github.com/Ostorlab/KEV - https://github.com/RevoltSecurities/CVE-2024-4358 - https://github.com/Sk1dr0wz/CVE-2024-4358_Mass_Exploit +- https://github.com/f0ur0four/Insecure-Deserialization - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/securitycipher/daily-bugbounty-writeups - https://github.com/sinsinology/CVE-2024-4358 diff --git a/2024/CVE-2024-4578.md b/2024/CVE-2024-4578.md new file mode 100644 index 0000000000..6d08f36f59 --- /dev/null +++ b/2024/CVE-2024-4578.md @@ -0,0 +1,17 @@ +### [CVE-2024-4578](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4578) +![](https://img.shields.io/static/v1?label=Product&message=Arista%20Wireless%20Access%20Points&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=13.0.2.x%3C%3D%2013.0.2-28-vv1002%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20('Command%20Injection')&color=brighgreen) + +### Description + +This Advisory describes an issue that impacts Arista Wireless Access Points. Any entity with the ability to authenticate via SSH to an affected AP as the “config” user is able to cause a privilege escalation via spawning a bash shell. The SSH CLI session does not require high permissions to exploit this vulnerability, but the config password is required to establish the session. The spawned shell is able to obtain root privileges. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/cyllective/CVEs + diff --git a/2024/CVE-2024-4607.md b/2024/CVE-2024-4607.md new file mode 100644 index 0000000000..bd40fe34ae --- /dev/null +++ b/2024/CVE-2024-4607.md @@ -0,0 +1,19 @@ +### [CVE-2024-4607](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4607) +![](https://img.shields.io/static/v1?label=Product&message=Arm%205th%20Gen%20GPU%20Architecture%20Kernel%20Driver&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Bifrost%20GPU%20Kernel%20Driver&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Valhall%20GPU%20Kernel%20Driver&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-416%20Use%20After%20Free&color=brighgreen) + +### Description + +Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r41p0 through r49p0; Valhall GPU Kernel Driver: from r41p0 through r49p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r49p0. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-6100.md b/2024/CVE-2024-6100.md new file mode 100644 index 0000000000..746dd5424f --- /dev/null +++ b/2024/CVE-2024-6100.md @@ -0,0 +1,17 @@ +### [CVE-2024-6100](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6100) +![](https://img.shields.io/static/v1?label=Product&message=Chrome&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=126.0.6478.114%3C%20126.0.6478.114%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=Type%20Confusion&color=brighgreen) + +### Description + +Type Confusion in V8 in Google Chrome prior to 126.0.6478.114 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High) + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/leesh3288/leesh3288 + diff --git a/2024/CVE-2024-6162.md b/2024/CVE-2024-6162.md index e2cf46c58d..29379d0641 100644 --- a/2024/CVE-2024-6162.md +++ b/2024/CVE-2024-6162.md @@ -17,7 +17,7 @@ ### Description -A vulnerability was found in Undertow. URL-encoded request path information can be broken for concurrent requests on ajp-listener, causing the wrong path to be processed and resulting in a possible denial of service. +A vulnerability was found in Undertow, where URL-encoded request paths can be mishandled during concurrent requests on the AJP listener. This issue arises because the same buffer is used to decode the paths for multiple requests simultaneously, leading to incorrect path information being processed. As a result, the server may attempt to access the wrong path, causing errors such as "404 Not Found" or other application failures. This flaw can potentially lead to a denial of service, as legitimate resources become inaccessible due to the path mix-up. ### POC diff --git a/2024/CVE-2024-6387.md b/2024/CVE-2024-6387.md index 1d1e4c43c9..2ec801a7cf 100644 --- a/2024/CVE-2024-6387.md +++ b/2024/CVE-2024-6387.md @@ -25,6 +25,7 @@ A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). - http://www.openwall.com/lists/oss-security/2024/07/03/5 - http://www.openwall.com/lists/oss-security/2024/07/28/2 - https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server +- https://news.ycombinator.com/item?id=40843778 - https://santandersecurityresearch.github.io/blog/sshing_the_masses.html - https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html @@ -42,6 +43,7 @@ A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). - https://github.com/TrojanAZhen/Self_Back - https://github.com/azurejoga/CVE-2024-6387-how-to-fix - https://github.com/bigb0x/CVE-2024-6387 +- https://github.com/cybereagle2001/KQL-Security-Querries - https://github.com/enomothem/PenTestNote - https://github.com/giterlizzi/secdb-feeds - https://github.com/invaderslabs/regreSSHion-CVE-2024-6387- diff --git a/2024/CVE-2024-6472.md b/2024/CVE-2024-6472.md new file mode 100644 index 0000000000..7bed2e7806 --- /dev/null +++ b/2024/CVE-2024-6472.md @@ -0,0 +1,17 @@ +### [CVE-2024-6472](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6472) +![](https://img.shields.io/static/v1?label=Product&message=LibreOffice&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=24.2%3C%2024.2.5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-295%20Improper%20Certificate%20Validation&color=brighgreen) + +### Description + +Certificate Validation user interface in LibreOffice allows potential vulnerability.Signed macros are scripts that have been digitally signed by the developer using a cryptographic signature. When a document with a signed macro is opened a warning is displayed by LibreOffice before the macro is executed.Previously if verification failed the user could fail to understand the failure and choose to enable the macros anyway.This issue affects LibreOffice: from 24.2 before 24.2.5. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-6651.md b/2024/CVE-2024-6651.md new file mode 100644 index 0000000000..856cbc55ea --- /dev/null +++ b/2024/CVE-2024-6651.md @@ -0,0 +1,17 @@ +### [CVE-2024-6651](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6651) +![](https://img.shields.io/static/v1?label=Product&message=WordPress%20File%20Upload&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%204.24.8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The WordPress File Upload WordPress plugin before 4.24.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin + +### POC + +#### Reference +- https://wpscan.com/vulnerability/65e2c77d-09bd-4a44-81d9-d7a5db0e0f84/ + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-6731.md b/2024/CVE-2024-6731.md index 7eae4b0a6f..0ecba776a7 100644 --- a/2024/CVE-2024-6731.md +++ b/2024/CVE-2024-6731.md @@ -13,5 +13,5 @@ A vulnerability classified as critical has been found in SourceCodester Student - https://reports-kunull.vercel.app/CVE%20research/2024/cve-2024-6731 #### Github -No PoCs found on GitHub currently. +- https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-6732.md b/2024/CVE-2024-6732.md index 7680d04b8b..5d5d42d272 100644 --- a/2024/CVE-2024-6732.md +++ b/2024/CVE-2024-6732.md @@ -11,7 +11,8 @@ A vulnerability classified as critical was found in SourceCodester Student Study #### Reference - https://reports-kunull.vercel.app/CVE%20research/2024/cve-2024-6732 +- https://vuldb.com/?submit.374370 #### Github -No PoCs found on GitHub currently. +- https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-6766.md b/2024/CVE-2024-6766.md new file mode 100644 index 0000000000..406844af5a --- /dev/null +++ b/2024/CVE-2024-6766.md @@ -0,0 +1,17 @@ +### [CVE-2024-6766](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6766) +![](https://img.shields.io/static/v1?label=Product&message=shortcodes-ultimate-pro&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%207.2.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The shortcodes-ultimate-pro WordPress plugin before 7.2.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks + +### POC + +#### Reference +- https://wpscan.com/vulnerability/77bb1dcf-4e84-497a-955e-f3c0b649ad1c/ + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-6779.md b/2024/CVE-2024-6779.md new file mode 100644 index 0000000000..89c7f9b9ef --- /dev/null +++ b/2024/CVE-2024-6779.md @@ -0,0 +1,17 @@ +### [CVE-2024-6779](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6779) +![](https://img.shields.io/static/v1?label=Product&message=Chrome&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=126.0.6478.182%3C%20126.0.6478.182%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=Out%20of%20bounds%20memory%20access&color=brighgreen) + +### Description + +Out of bounds memory access in V8 in Google Chrome prior to 126.0.6478.182 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/leesh3288/leesh3288 + diff --git a/2024/CVE-2024-6781.md b/2024/CVE-2024-6781.md new file mode 100644 index 0000000000..2919c22483 --- /dev/null +++ b/2024/CVE-2024-6781.md @@ -0,0 +1,17 @@ +### [CVE-2024-6781](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6781) +![](https://img.shields.io/static/v1?label=Product&message=Calibre&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207.14.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen) + +### Description + +Path traversal in Calibre <= 7.14.0 allow unauthenticated attackers to achieve arbitrary file read. + +### POC + +#### Reference +- https://starlabs.sg/advisories/24/24-6781/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6782.md b/2024/CVE-2024-6782.md new file mode 100644 index 0000000000..d0d916f14e --- /dev/null +++ b/2024/CVE-2024-6782.md @@ -0,0 +1,17 @@ +### [CVE-2024-6782](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6782) +![](https://img.shields.io/static/v1?label=Product&message=Calibre&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=6.9.0%3C%3D%207.14.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-863%20Incorrect%20Authorization&color=brighgreen) + +### Description + +Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution. + +### POC + +#### Reference +- https://starlabs.sg/advisories/24/24-6782/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6802.md b/2024/CVE-2024-6802.md index fa28504b2c..c272a8b0ec 100644 --- a/2024/CVE-2024-6802.md +++ b/2024/CVE-2024-6802.md @@ -13,5 +13,5 @@ A vulnerability, which was classified as critical, was found in SourceCodester C - https://reports-kunull.vercel.app/CVE%20research/2024/cve-2024-6802 #### Github -No PoCs found on GitHub currently. +- https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-6807.md b/2024/CVE-2024-6807.md index 765498f0cf..271331de89 100644 --- a/2024/CVE-2024-6807.md +++ b/2024/CVE-2024-6807.md @@ -13,5 +13,5 @@ A vulnerability was found in SourceCodester Student Study Center Desk Management - https://reports-kunull.vercel.app/CVE%20research/2024/cve-2024-6807 #### Github -No PoCs found on GitHub currently. +- https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-6865.md b/2024/CVE-2024-6865.md new file mode 100644 index 0000000000..5dba29fffe --- /dev/null +++ b/2024/CVE-2024-6865.md @@ -0,0 +1,17 @@ +### [CVE-2024-6865](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6865) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) + +### Description + +** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-6933.md b/2024/CVE-2024-6933.md new file mode 100644 index 0000000000..bc955f83c9 --- /dev/null +++ b/2024/CVE-2024-6933.md @@ -0,0 +1,17 @@ +### [CVE-2024-6933](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6933) +![](https://img.shields.io/static/v1?label=Product&message=LimeSurvey&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206.5.14-240624%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in LimeSurvey 6.5.14-240624. It has been rated as critical. Affected by this issue is the function actionUpdateSurveyLocaleSettingsGeneralSettings of the file /index.php?r=admin/database/index/updatesurveylocalesettings_generalsettings of the component Survey General Settings Handler. The manipulation of the argument language leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-271988. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +- https://github.com/Hebing123/cve/issues/55 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7008.md b/2024/CVE-2024-7008.md new file mode 100644 index 0000000000..458f936e39 --- /dev/null +++ b/2024/CVE-2024-7008.md @@ -0,0 +1,17 @@ +### [CVE-2024-7008](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7008) +![](https://img.shields.io/static/v1?label=Product&message=Calibre&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207.15.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20'Cross-site%20Scripting')&color=brighgreen) + +### Description + +Unsanitized user-input in Calibre <= 7.15.0 allow attackers to perform reflected cross-site scripting. + +### POC + +#### Reference +- https://starlabs.sg/advisories/24/24-7008/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7055.md b/2024/CVE-2024-7055.md new file mode 100644 index 0000000000..8dd894d16a --- /dev/null +++ b/2024/CVE-2024-7055.md @@ -0,0 +1,19 @@ +### [CVE-2024-7055](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7055) +![](https://img.shields.io/static/v1?label=Product&message=FFmpeg&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207.0.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-122%20Heap-based%20Buffer%20Overflow&color=brighgreen) + +### Description + +A vulnerability was found in FFmpeg up to 7.0.1. It has been classified as critical. This affects the function pnm_decode_frame in the library /libavcodec/pnmdec.c. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0.2 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-273651. + +### POC + +#### Reference +- https://ffmpeg.org/ +- https://ffmpeg.org/download.html +- https://github.com/CookedMelon/ReportCVE/tree/main/FFmpeg/poc3 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7068.md b/2024/CVE-2024-7068.md new file mode 100644 index 0000000000..8f5812e784 --- /dev/null +++ b/2024/CVE-2024-7068.md @@ -0,0 +1,17 @@ +### [CVE-2024-7068](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7068) +![](https://img.shields.io/static/v1?label=Product&message=Insurance%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross%20Site%20Scripting&color=brighgreen) + +### Description + +A vulnerability classified as problematic has been found in SourceCodester Insurance Management System 1.0. This affects an unknown part of the file /Script/admin/core/update_sub_category. The manipulation of the argument name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272349 was assigned to this vulnerability. + +### POC + +#### Reference +- https://github.com/rtsjx-cve/cve/blob/main/xss2.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7082.md b/2024/CVE-2024-7082.md new file mode 100644 index 0000000000..b783619d50 --- /dev/null +++ b/2024/CVE-2024-7082.md @@ -0,0 +1,17 @@ +### [CVE-2024-7082](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7082) +![](https://img.shields.io/static/v1?label=Product&message=Easy%20Table%20of%20Contents&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.0.68%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The Easy Table of Contents WordPress plugin before 2.0.68 does not sanitise and escape some parameters, which could allow users with a role as low as Editor to perform Cross-Site Scripting attacks. + +### POC + +#### Reference +- https://wpscan.com/vulnerability/8f30e685-00fa-4dbb-b516-2d14e4b13697/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7084.md b/2024/CVE-2024-7084.md new file mode 100644 index 0000000000..2b714f8706 --- /dev/null +++ b/2024/CVE-2024-7084.md @@ -0,0 +1,17 @@ +### [CVE-2024-7084](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7084) +![](https://img.shields.io/static/v1?label=Product&message=Ajax%20Search%20Lite&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%204.12.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The Ajax Search Lite WordPress plugin before 4.12.1 does not sanitise and escape some parameters, which could allow users with a role as low as Admin+ to perform Cross-Site Scripting attacks. + +### POC + +#### Reference +- https://wpscan.com/vulnerability/0d38bf4d-de6a-49f8-be69-fa483fa61bb7/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7212.md b/2024/CVE-2024-7212.md index 745331a6ba..6253050bcb 100644 --- a/2024/CVE-2024-7212.md +++ b/2024/CVE-2024-7212.md @@ -13,5 +13,5 @@ A vulnerability, which was classified as critical, has been found in TOTOLINK A7 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A7000R/loginauth_password.md #### Github -No PoCs found on GitHub currently. +- https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-7213.md b/2024/CVE-2024-7213.md index a66a532db7..066e61ca97 100644 --- a/2024/CVE-2024-7213.md +++ b/2024/CVE-2024-7213.md @@ -13,5 +13,5 @@ A vulnerability, which was classified as critical, was found in TOTOLINK A7000R - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A7000R/setWizardCfg.md #### Github -No PoCs found on GitHub currently. +- https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-7214.md b/2024/CVE-2024-7214.md index 73cfb6e35a..d397b820a7 100644 --- a/2024/CVE-2024-7214.md +++ b/2024/CVE-2024-7214.md @@ -13,5 +13,5 @@ A vulnerability has been found in TOTOLINK LR350 9.3.5u.6369_B20220309 and class - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/LR350/setWanCfg.md #### Github -No PoCs found on GitHub currently. +- https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-7215.md b/2024/CVE-2024-7215.md index a85f240126..5cdce45b6e 100644 --- a/2024/CVE-2024-7215.md +++ b/2024/CVE-2024-7215.md @@ -13,5 +13,5 @@ A vulnerability was found in TOTOLINK LR1200 9.3.1cu.2832 and classified as crit - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/LR1200/NTPSyncWithHost.md #### Github -No PoCs found on GitHub currently. +- https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-7216.md b/2024/CVE-2024-7216.md index f54525c6df..e340193d9a 100644 --- a/2024/CVE-2024-7216.md +++ b/2024/CVE-2024-7216.md @@ -13,5 +13,5 @@ A vulnerability was found in TOTOLINK LR1200 9.3.1cu.2832. It has been classifie - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/LR1200/shadow.md #### Github -No PoCs found on GitHub currently. +- https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-7246.md b/2024/CVE-2024-7246.md new file mode 100644 index 0000000000..469fff4016 --- /dev/null +++ b/2024/CVE-2024-7246.md @@ -0,0 +1,17 @@ +### [CVE-2024-7246](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7246) +![](https://img.shields.io/static/v1?label=Product&message=gRPC&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.53.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-440%3A%20Expected%20Behavior%20Violation&color=brighgreen) + +### Description + +It's possible for a gRPC client communicating with a HTTP/2 proxy to poison the HPACK table between the proxy and the backend such that other clients see failed requests. It's also possible to use this vulnerability to leak other clients HTTP header keys, but not values.This occurs because the error status for a misencoded header is not cleared between header reads, resulting in subsequent (incrementally indexed) added headers in the first request being poisoned until cleared from the HPACK table.Please update to a fixed version of gRPC as soon as possible. This bug has been fixed in 1.58.3, 1.59.5, 1.60.2, 1.61.3, 1.62.3, 1.63.2, 1.64.3, 1.65.4. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-7275.md b/2024/CVE-2024-7275.md index f610ae55f6..e565dec868 100644 --- a/2024/CVE-2024-7275.md +++ b/2024/CVE-2024-7275.md @@ -11,6 +11,7 @@ A vulnerability, which was classified as critical, was found in itsourcecode Alt #### Reference - https://github.com/DeepMountains/Mirage/blob/main/CVE8-3.md +- https://vuldb.com/?submit.381093 #### Github No PoCs found on GitHub currently. diff --git a/2024/CVE-2024-7317.md b/2024/CVE-2024-7317.md new file mode 100644 index 0000000000..534d859d21 --- /dev/null +++ b/2024/CVE-2024-7317.md @@ -0,0 +1,17 @@ +### [CVE-2024-7317](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7317) +![](https://img.shields.io/static/v1?label=Product&message=Folders%20%E2%80%93%20Unlimited%20Folders%20to%20Organize%20Media%20Library%20Folder%2C%20Pages%2C%20Posts%2C%20File%20Manager&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%203.0.3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) + +### Description + +The Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.0.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-7339.md b/2024/CVE-2024-7339.md index 59ff140607..c740f73397 100644 --- a/2024/CVE-2024-7339.md +++ b/2024/CVE-2024-7339.md @@ -16,5 +16,6 @@ A vulnerability has been found in TVT DVR TD-2104TS-CL, DVR TD-2108TS-HP, Provis No PoCs from references. #### Github +- https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/tanjiti/sec_profile diff --git a/2024/CVE-2024-7383.md b/2024/CVE-2024-7383.md new file mode 100644 index 0000000000..6b51c7d1ad --- /dev/null +++ b/2024/CVE-2024-7383.md @@ -0,0 +1,19 @@ +### [CVE-2024-7383](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7383) +![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%208%20Advanced%20Virtualization&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%208&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%209&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Certificate%20Validation&color=brighgreen) + +### Description + +A flaw was found in libnbd. The client did not always correctly verify the NBD server's certificate when using TLS to connect to an NBD server. This issue allows a man-in-the-middle attack on NBD traffic. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-7395.md b/2024/CVE-2024-7395.md new file mode 100644 index 0000000000..465de1180b --- /dev/null +++ b/2024/CVE-2024-7395.md @@ -0,0 +1,17 @@ +### [CVE-2024-7395](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7395) +![](https://img.shields.io/static/v1?label=Product&message=JetPort%205601v3&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%3D%201.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-287%20Improper%20Authentication&color=brighgreen) + +### Description + +An authentication bypass vulnerability in Korenix JetPort 5601v3 allows an attacker to access functionality on the device without specifying a password.This issue affects JetPort 5601v3: through 1.2. + +### POC + +#### Reference +- https://cyberdanube.com/de/en-multiple-vulnerabilities-in-korenix-jetport/ + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-7396.md b/2024/CVE-2024-7396.md new file mode 100644 index 0000000000..993af6e88d --- /dev/null +++ b/2024/CVE-2024-7396.md @@ -0,0 +1,17 @@ +### [CVE-2024-7396](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7396) +![](https://img.shields.io/static/v1?label=Product&message=JetPort%205601v3&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%3D%201.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data&color=brighgreen) + +### Description + +Missing encryption of sensitive data in Korenix JetPort 5601v3 allows Eavesdropping.This issue affects JetPort 5601v3: through 1.2. + +### POC + +#### Reference +- https://cyberdanube.com/de/en-multiple-vulnerabilities-in-korenix-jetport/ + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-7397.md b/2024/CVE-2024-7397.md new file mode 100644 index 0000000000..b0eb7c779a --- /dev/null +++ b/2024/CVE-2024-7397.md @@ -0,0 +1,17 @@ +### [CVE-2024-7397](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7397) +![](https://img.shields.io/static/v1?label=Product&message=JetPort%205601v3&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%3D%201.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20('Command%20Injection')&color=brighgreen) + +### Description + +Improper filering of special characters result in a command ('command injection') vulnerability in Korenix JetPort 5601v3.This issue affects JetPort 5601v3: through 1.2. + +### POC + +#### Reference +- https://cyberdanube.com/de/en-multiple-vulnerabilities-in-korenix-jetport/ + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-7409.md b/2024/CVE-2024-7409.md new file mode 100644 index 0000000000..6636c943bd --- /dev/null +++ b/2024/CVE-2024-7409.md @@ -0,0 +1,22 @@ +### [CVE-2024-7409](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7409) +![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%206&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%207&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%208%20Advanced%20Virtualization&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%208&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Enterprise%20Linux%209&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20OpenShift%20Container%20Platform%204&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Synchronization&color=brighgreen) + +### Description + +A flaw was found in the QEMU NBD Server. This vulnerability allows a denial of service (DoS) attack via improper synchronization during socket closure when a client keeps a socket open as the server is taken offline. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-7494.md b/2024/CVE-2024-7494.md new file mode 100644 index 0000000000..a203b5f60d --- /dev/null +++ b/2024/CVE-2024-7494.md @@ -0,0 +1,17 @@ +### [CVE-2024-7494](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7494) +![](https://img.shields.io/static/v1?label=Product&message=Clinics%20Patient%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability, which was classified as critical, has been found in SourceCodester Clinics Patient Management System 1.0. Affected by this issue is some unknown functionality of the file /new_prescription.php. The manipulation of the argument patient leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273620. + +### POC + +#### Reference +- https://github.com/lche511/cve/blob/main/sql2.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7496.md b/2024/CVE-2024-7496.md new file mode 100644 index 0000000000..673d1e8834 --- /dev/null +++ b/2024/CVE-2024-7496.md @@ -0,0 +1,17 @@ +### [CVE-2024-7496](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7496) +![](https://img.shields.io/static/v1?label=Product&message=Airline%20Reservation%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-73%20File%20Inclusion&color=brighgreen) + +### Description + +A vulnerability has been found in itsourcecode Airline Reservation System 1.0 and classified as critical. This vulnerability affects unknown code of the file /index.php. The manipulation of the argument page leads to file inclusion. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-273622 is the identifier assigned to this vulnerability. + +### POC + +#### Reference +- https://github.com/DeepMountains/zzz/blob/main/CVE1-1.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7497.md b/2024/CVE-2024-7497.md new file mode 100644 index 0000000000..a908af9fc5 --- /dev/null +++ b/2024/CVE-2024-7497.md @@ -0,0 +1,17 @@ +### [CVE-2024-7497](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7497) +![](https://img.shields.io/static/v1?label=Product&message=Airline%20Reservation%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-73%20File%20Inclusion&color=brighgreen) + +### Description + +A vulnerability was found in itsourcecode Airline Reservation System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/index.php. The manipulation of the argument page leads to file inclusion. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273623. + +### POC + +#### Reference +- https://github.com/DeepMountains/zzz/blob/main/CVE1-2.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7498.md b/2024/CVE-2024-7498.md new file mode 100644 index 0000000000..b307606d4b --- /dev/null +++ b/2024/CVE-2024-7498.md @@ -0,0 +1,17 @@ +### [CVE-2024-7498](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7498) +![](https://img.shields.io/static/v1?label=Product&message=Airline%20Reservation%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in itsourcecode Airline Reservation System 1.0. It has been classified as critical. Affected is the function login/login2 of the file /admin/login.php of the component Admin Login Page. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273624. + +### POC + +#### Reference +- https://github.com/DeepMountains/zzz/blob/main/CVE1-3.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7499.md b/2024/CVE-2024-7499.md new file mode 100644 index 0000000000..4fa2d284c4 --- /dev/null +++ b/2024/CVE-2024-7499.md @@ -0,0 +1,17 @@ +### [CVE-2024-7499](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7499) +![](https://img.shields.io/static/v1?label=Product&message=Airline%20Reservation%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in itsourcecode Airline Reservation System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file flights.php. The manipulation of the argument departure_airport_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273625 was assigned to this vulnerability. + +### POC + +#### Reference +- https://github.com/DeepMountains/zzz/blob/main/CVE1-4.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7500.md b/2024/CVE-2024-7500.md new file mode 100644 index 0000000000..d8745cebe1 --- /dev/null +++ b/2024/CVE-2024-7500.md @@ -0,0 +1,17 @@ +### [CVE-2024-7500](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7500) +![](https://img.shields.io/static/v1?label=Product&message=Airline%20Reservation%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%20Unrestricted%20Upload&color=brighgreen) + +### Description + +A vulnerability was found in itsourcecode Airline Reservation System 1.0. It has been rated as critical. Affected by this issue is the function save_settings of the file admin/admin_class.php. The manipulation of the argument img leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-273626 is the identifier assigned to this vulnerability. + +### POC + +#### Reference +- https://github.com/DeepMountains/zzz/blob/main/CVE1-5.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7505.md b/2024/CVE-2024-7505.md new file mode 100644 index 0000000000..1289e4c405 --- /dev/null +++ b/2024/CVE-2024-7505.md @@ -0,0 +1,17 @@ +### [CVE-2024-7505](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7505) +![](https://img.shields.io/static/v1?label=Product&message=Bike%20Delivery%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability, which was classified as critical, was found in itsourcecode Bike Delivery System 1.0. Affected is an unknown function of the file contact_us_action.php. The manipulation of the argument name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273648. + +### POC + +#### Reference +- https://github.com/CveSecLook/cve/issues/56 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7506.md b/2024/CVE-2024-7506.md new file mode 100644 index 0000000000..138489687b --- /dev/null +++ b/2024/CVE-2024-7506.md @@ -0,0 +1,17 @@ +### [CVE-2024-7506](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7506) +![](https://img.shields.io/static/v1?label=Product&message=Tailoring%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%20Unrestricted%20Upload&color=brighgreen) + +### Description + +A vulnerability has been found in itsourcecode Tailoring Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /setlogo.php. The manipulation of the argument bgimg leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273649 was assigned to this vulnerability. + +### POC + +#### Reference +- https://github.com/CveSecLook/cve/issues/57 + +#### Github +No PoCs found on GitHub currently. + diff --git a/github.txt b/github.txt index 382b6b2978..c9e1c0d994 100644 --- a/github.txt +++ b/github.txt @@ -2986,6 +2986,7 @@ CVE-2008-3464 - https://github.com/lyshark/Windows-exploits CVE-2008-3464 - https://github.com/ycdxsb/WindowsPrivilegeEscalation CVE-2008-3531 - https://github.com/CVEDB/awesome-cve-repo CVE-2008-3531 - https://github.com/Snoopy-Sec/Localroot-ALL-CVE +CVE-2008-3531 - https://github.com/test-one9/ps4-11.50.github.io CVE-2008-3662 - https://github.com/aemon1407/KWSPZapTest CVE-2008-3662 - https://github.com/faizhaffizudin/Case-Study-Hamsa CVE-2008-3663 - https://github.com/aemon1407/KWSPZapTest @@ -3161,6 +3162,7 @@ CVE-2008-4609 - https://github.com/ARPSyndicate/cvemon CVE-2008-4609 - https://github.com/CVEDB/PoC-List CVE-2008-4609 - https://github.com/CVEDB/awesome-cve-repo CVE-2008-4609 - https://github.com/Live-Hack-CVE/CVE-2008-4609 +CVE-2008-4609 - https://github.com/comeillfoo/netverif CVE-2008-4609 - https://github.com/marcelki/sockstress CVE-2008-4609 - https://github.com/mrclki/sockstress CVE-2008-4654 - https://github.com/ARPSyndicate/cvemon @@ -7164,6 +7166,7 @@ CVE-2011-2523 - https://github.com/deepdarkworld/EXPLOIT_CVE CVE-2011-2523 - https://github.com/giusepperuggiero96/Network-Security-2021 CVE-2011-2523 - https://github.com/gwyomarch/CVE-Collection CVE-2011-2523 - https://github.com/hack-parthsharma/Vision +CVE-2011-2523 - https://github.com/jaykerzb/Metasploitable CVE-2011-2523 - https://github.com/jaytiwari05/vsftpd_2.3.4_Exploit CVE-2011-2523 - https://github.com/k8gege/Ladon CVE-2011-2523 - https://github.com/nobodyatall648/CVE-2011-2523 @@ -12489,6 +12492,7 @@ CVE-2014-1542 - https://github.com/mattfeng/picoctf-2014-solutions CVE-2014-1564 - https://github.com/mrash/afl-cve CVE-2014-1568 - https://github.com/abazhaniuk/Publications CVE-2014-1580 - https://github.com/mrash/afl-cve +CVE-2014-1607 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2014-1635 - https://github.com/ARPSyndicate/cvemon CVE-2014-1635 - https://github.com/Flerov/WindowsExploitDev CVE-2014-1635 - https://github.com/cranelab/exploit-development @@ -12706,6 +12710,7 @@ CVE-2014-2733 - https://github.com/virajmane/NetworkingTools CVE-2014-2734 - https://github.com/ARPSyndicate/cvemon CVE-2014-2734 - https://github.com/adrienthebo/cve-2014-2734 CVE-2014-2734 - https://github.com/chnzzh/OpenSSL-CVE-lib +CVE-2014-2734 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2014-2734 - https://github.com/gdisneyleugers/CVE-2014-2734 CVE-2014-2744 - https://github.com/JellyMeyster/vfeedWarp CVE-2014-2744 - https://github.com/JellyToons/vfeedWarp @@ -12744,10 +12749,12 @@ CVE-2014-2851 - https://github.com/xairy/linux-kernel-exploitation CVE-2014-2886 - https://github.com/andir/nixos-issue-db-example CVE-2014-2908 - https://github.com/ARPSyndicate/kenzer-templates CVE-2014-2913 - https://github.com/bootc/nrpe-ng +CVE-2014-2913 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2014-2913 - https://github.com/ohsawa0515/ec2-vuls-config CVE-2014-2917 - https://github.com/Ch4p34uN0iR/mongoaudit CVE-2014-2917 - https://github.com/gold1029/mongoaudit CVE-2014-2917 - https://github.com/stampery/mongoaudit +CVE-2014-2941 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2014-2962 - https://github.com/ARPSyndicate/kenzer-templates CVE-2014-3068 - https://github.com/ARPSyndicate/cvemon CVE-2014-3068 - https://github.com/r-wisniewski/Vulnerability-Check @@ -12943,6 +12950,7 @@ CVE-2014-3177 - https://github.com/ARPSyndicate/cvemon CVE-2014-3177 - https://github.com/lnick2023/nicenice CVE-2014-3177 - https://github.com/qazbnm456/awesome-cve-poc CVE-2014-3177 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 +CVE-2014-3180 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2014-3187 - https://github.com/Section9Labs/advisories CVE-2014-3188 - https://github.com/allpaca/chrome-sbx-db CVE-2014-3201 - https://github.com/BushraAloraini/Android-Vulnerabilities @@ -15964,10 +15972,13 @@ CVE-2015-10003 - https://github.com/ARPSyndicate/cvemon CVE-2015-10005 - https://github.com/Live-Hack-CVE/CVE-2015-10005 CVE-2015-10006 - https://github.com/Live-Hack-CVE/CVE-2015-10006 CVE-2015-10007 - https://github.com/Live-Hack-CVE/CVE-2015-10007 +CVE-2015-10007 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2015-10008 - https://github.com/Live-Hack-CVE/CVE-2015-10008 +CVE-2015-10008 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2015-10009 - https://github.com/Live-Hack-CVE/CVE-2015-10009 CVE-2015-10011 - https://github.com/Live-Hack-CVE/CVE-2015-10011 CVE-2015-10012 - https://github.com/Live-Hack-CVE/CVE-2015-10012 +CVE-2015-10012 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2015-10013 - https://github.com/Live-Hack-CVE/CVE-2015-10013 CVE-2015-10014 - https://github.com/Live-Hack-CVE/CVE-2015-10014 CVE-2015-10015 - https://github.com/Live-Hack-CVE/CVE-2015-10015 @@ -15998,7 +16009,9 @@ CVE-2015-10038 - https://github.com/Live-Hack-CVE/CVE-2015-10038 CVE-2015-10039 - https://github.com/Live-Hack-CVE/CVE-2015-10039 CVE-2015-10040 - https://github.com/Live-Hack-CVE/CVE-2015-10040 CVE-2015-10041 - https://github.com/Live-Hack-CVE/CVE-2015-10041 +CVE-2015-10041 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2015-10042 - https://github.com/Live-Hack-CVE/CVE-2015-10042 +CVE-2015-10042 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2015-10043 - https://github.com/Live-Hack-CVE/CVE-2015-10043 CVE-2015-10044 - https://github.com/Live-Hack-CVE/CVE-2015-10044 CVE-2015-10045 - https://github.com/Live-Hack-CVE/CVE-2015-10045 @@ -16009,6 +16022,7 @@ CVE-2015-10049 - https://github.com/Live-Hack-CVE/CVE-2015-10049 CVE-2015-10050 - https://github.com/Live-Hack-CVE/CVE-2015-10050 CVE-2015-10051 - https://github.com/Live-Hack-CVE/CVE-2015-10051 CVE-2015-10052 - https://github.com/Live-Hack-CVE/CVE-2015-10052 +CVE-2015-10052 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2015-10053 - https://github.com/Live-Hack-CVE/CVE-2015-10053 CVE-2015-10054 - https://github.com/Live-Hack-CVE/CVE-2015-10054 CVE-2015-10055 - https://github.com/Live-Hack-CVE/CVE-2015-10055 @@ -16026,6 +16040,8 @@ CVE-2015-10074 - https://github.com/Live-Hack-CVE/CVE-2015-10074 CVE-2015-10075 - https://github.com/Live-Hack-CVE/CVE-2015-10075 CVE-2015-10078 - https://github.com/Live-Hack-CVE/CVE-2015-10078 CVE-2015-10079 - https://github.com/Live-Hack-CVE/CVE-2015-10079 +CVE-2015-10087 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2015-10106 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2015-10125 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2015-10126 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2015-10130 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -16707,6 +16723,7 @@ CVE-2015-1971 - https://github.com/brianhigh/us-cert-bulletins CVE-2015-1985 - https://github.com/ARPSyndicate/cvemon CVE-2015-1985 - https://github.com/brianhigh/us-cert-bulletins CVE-2015-1986 - https://github.com/3t3rn4lv01d/CVE-2015-1986 +CVE-2015-1992 - https://github.com/jjljyn/Cve-with-their-PoC-s CVE-2015-1992 - https://github.com/kaRaGODDD/Cve-with-their-PoC-s CVE-2015-2000 - https://github.com/ARPSyndicate/cvemon CVE-2015-20001 - https://github.com/Qwaz/rust-cve @@ -19981,6 +19998,7 @@ CVE-2015-8705 - https://github.com/NikulinMS/13-01-hw CVE-2015-8705 - https://github.com/Zhivarev/13-01-hw CVE-2015-8705 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems CVE-2015-8705 - https://github.com/zzzWTF/db-13-01 +CVE-2015-8709 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2015-8710 - https://github.com/Karm/CVE-2015-8710 CVE-2015-8711 - https://github.com/brianhigh/us-cert-bulletins CVE-2015-8712 - https://github.com/ARPSyndicate/cvemon @@ -27295,6 +27313,7 @@ CVE-2016-6170 - https://github.com/balabit-deps/balabit-os-9-bind9-libs CVE-2016-6170 - https://github.com/fokypoky/places-list CVE-2016-6170 - https://github.com/pexip/os-bind9 CVE-2016-6170 - https://github.com/pexip/os-bind9-libs +CVE-2016-6170 - https://github.com/psmedley/bind-os2 CVE-2016-6170 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems CVE-2016-6170 - https://github.com/zzzWTF/db-13-01 CVE-2016-6174 - https://github.com/ARPSyndicate/cvemon @@ -28996,6 +29015,7 @@ CVE-2016-8735 - https://github.com/7hang/cyber-security-interview CVE-2016-8735 - https://github.com/ARPSyndicate/cvemon CVE-2016-8735 - https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet CVE-2016-8735 - https://github.com/BrittanyKuhn/javascript-tutorial +CVE-2016-8735 - https://github.com/Drun1baby/CVE-Reproduction-And-Analysis CVE-2016-8735 - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet CVE-2016-8735 - https://github.com/Ostorlab/KEV CVE-2016-8735 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors @@ -29105,6 +29125,7 @@ CVE-2016-8864 - https://github.com/balabit-deps/balabit-os-9-bind9-libs CVE-2016-8864 - https://github.com/fir3storm/Vision2 CVE-2016-8864 - https://github.com/pexip/os-bind9 CVE-2016-8864 - https://github.com/pexip/os-bind9-libs +CVE-2016-8864 - https://github.com/psmedley/bind-os2 CVE-2016-8864 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems CVE-2016-8864 - https://github.com/zzzWTF/db-13-01 CVE-2016-8866 - https://github.com/mrash/afl-cve @@ -29259,6 +29280,7 @@ CVE-2016-9131 - https://github.com/fir3storm/Vision2 CVE-2016-9131 - https://github.com/muryo13/USNParser CVE-2016-9131 - https://github.com/pexip/os-bind9 CVE-2016-9131 - https://github.com/pexip/os-bind9-libs +CVE-2016-9131 - https://github.com/psmedley/bind-os2 CVE-2016-9131 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems CVE-2016-9131 - https://github.com/zzzWTF/db-13-01 CVE-2016-9147 - https://github.com/ALTinners/bind9 @@ -29270,6 +29292,7 @@ CVE-2016-9147 - https://github.com/balabit-deps/balabit-os-9-bind9-libs CVE-2016-9147 - https://github.com/muryo13/USNParser CVE-2016-9147 - https://github.com/pexip/os-bind9 CVE-2016-9147 - https://github.com/pexip/os-bind9-libs +CVE-2016-9147 - https://github.com/psmedley/bind-os2 CVE-2016-9164 - https://github.com/ARPSyndicate/cvemon CVE-2016-9177 - https://github.com/ARPSyndicate/cvemon CVE-2016-9178 - https://github.com/thdusdl1219/CVE-Study @@ -29420,6 +29443,7 @@ CVE-2016-9444 - https://github.com/balabit-deps/balabit-os-9-bind9-libs CVE-2016-9444 - https://github.com/muryo13/USNParser CVE-2016-9444 - https://github.com/pexip/os-bind9 CVE-2016-9444 - https://github.com/pexip/os-bind9-libs +CVE-2016-9444 - https://github.com/psmedley/bind-os2 CVE-2016-9444 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems CVE-2016-9444 - https://github.com/zzzWTF/db-13-01 CVE-2016-9445 - https://github.com/ARPSyndicate/cvemon @@ -29521,6 +29545,7 @@ CVE-2016-9778 - https://github.com/balabit-deps/balabit-os-8-bind9-libs CVE-2016-9778 - https://github.com/balabit-deps/balabit-os-9-bind9-libs CVE-2016-9778 - https://github.com/pexip/os-bind9 CVE-2016-9778 - https://github.com/pexip/os-bind9-libs +CVE-2016-9778 - https://github.com/psmedley/bind-os2 CVE-2016-9793 - https://github.com/ARPSyndicate/cvemon CVE-2016-9793 - https://github.com/Al1ex/LinuxEelvation CVE-2016-9793 - https://github.com/C0dak/linux-kernel-exploits @@ -37148,6 +37173,7 @@ CVE-2017-3135 - https://github.com/balabit-deps/balabit-os-8-bind9-libs CVE-2017-3135 - https://github.com/balabit-deps/balabit-os-9-bind9-libs CVE-2017-3135 - https://github.com/pexip/os-bind9 CVE-2017-3135 - https://github.com/pexip/os-bind9-libs +CVE-2017-3135 - https://github.com/psmedley/bind-os2 CVE-2017-3136 - https://github.com/ALTinners/bind9 CVE-2017-3136 - https://github.com/ARPSyndicate/cvemon CVE-2017-3136 - https://github.com/AndrewLipscomb/bind9 @@ -37156,6 +37182,7 @@ CVE-2017-3136 - https://github.com/balabit-deps/balabit-os-8-bind9-libs CVE-2017-3136 - https://github.com/balabit-deps/balabit-os-9-bind9-libs CVE-2017-3136 - https://github.com/pexip/os-bind9 CVE-2017-3136 - https://github.com/pexip/os-bind9-libs +CVE-2017-3136 - https://github.com/psmedley/bind-os2 CVE-2017-3137 - https://github.com/ALTinners/bind9 CVE-2017-3137 - https://github.com/ARPSyndicate/cvemon CVE-2017-3137 - https://github.com/AndrewLipscomb/bind9 @@ -37164,6 +37191,7 @@ CVE-2017-3137 - https://github.com/balabit-deps/balabit-os-8-bind9-libs CVE-2017-3137 - https://github.com/balabit-deps/balabit-os-9-bind9-libs CVE-2017-3137 - https://github.com/pexip/os-bind9 CVE-2017-3137 - https://github.com/pexip/os-bind9-libs +CVE-2017-3137 - https://github.com/psmedley/bind-os2 CVE-2017-3138 - https://github.com/ALTinners/bind9 CVE-2017-3138 - https://github.com/ARPSyndicate/cvemon CVE-2017-3138 - https://github.com/AndrewLipscomb/bind9 @@ -37172,6 +37200,7 @@ CVE-2017-3138 - https://github.com/balabit-deps/balabit-os-8-bind9-libs CVE-2017-3138 - https://github.com/balabit-deps/balabit-os-9-bind9-libs CVE-2017-3138 - https://github.com/pexip/os-bind9 CVE-2017-3138 - https://github.com/pexip/os-bind9-libs +CVE-2017-3138 - https://github.com/psmedley/bind-os2 CVE-2017-3140 - https://github.com/ALTinners/bind9 CVE-2017-3140 - https://github.com/ARPSyndicate/cvemon CVE-2017-3140 - https://github.com/AndrewLipscomb/bind9 @@ -37180,6 +37209,7 @@ CVE-2017-3140 - https://github.com/balabit-deps/balabit-os-8-bind9-libs CVE-2017-3140 - https://github.com/balabit-deps/balabit-os-9-bind9-libs CVE-2017-3140 - https://github.com/pexip/os-bind9 CVE-2017-3140 - https://github.com/pexip/os-bind9-libs +CVE-2017-3140 - https://github.com/psmedley/bind-os2 CVE-2017-3141 - https://github.com/ALTinners/bind9 CVE-2017-3141 - https://github.com/ARPSyndicate/cvemon CVE-2017-3141 - https://github.com/AndrewLipscomb/bind9 @@ -37194,6 +37224,7 @@ CVE-2017-3141 - https://github.com/balabit-deps/balabit-os-8-bind9-libs CVE-2017-3141 - https://github.com/balabit-deps/balabit-os-9-bind9-libs CVE-2017-3141 - https://github.com/pexip/os-bind9 CVE-2017-3141 - https://github.com/pexip/os-bind9-libs +CVE-2017-3141 - https://github.com/psmedley/bind-os2 CVE-2017-3141 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems CVE-2017-3141 - https://github.com/zzzWTF/db-13-01 CVE-2017-3142 - https://github.com/ALTinners/bind9 @@ -37210,6 +37241,7 @@ CVE-2017-3142 - https://github.com/balabit-deps/balabit-os-9-bind9-libs CVE-2017-3142 - https://github.com/dkiser/vulners-yum-scanner CVE-2017-3142 - https://github.com/pexip/os-bind9 CVE-2017-3142 - https://github.com/pexip/os-bind9-libs +CVE-2017-3142 - https://github.com/psmedley/bind-os2 CVE-2017-3142 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems CVE-2017-3142 - https://github.com/zparnold/deb-checker CVE-2017-3142 - https://github.com/zzzWTF/db-13-01 @@ -37230,6 +37262,7 @@ CVE-2017-3143 - https://github.com/ducducuc111/Awesome-Vulnerability-Research CVE-2017-3143 - https://github.com/gladiopeace/awesome-stars CVE-2017-3143 - https://github.com/pexip/os-bind9 CVE-2017-3143 - https://github.com/pexip/os-bind9-libs +CVE-2017-3143 - https://github.com/psmedley/bind-os2 CVE-2017-3143 - https://github.com/saaph/CVE-2017-3143 CVE-2017-3143 - https://github.com/securitychampions/Awesome-Vulnerability-Research CVE-2017-3143 - https://github.com/sergey-pronin/Awesome-Vulnerability-Research @@ -37248,6 +37281,7 @@ CVE-2017-3145 - https://github.com/balabit-deps/balabit-os-8-bind9-libs CVE-2017-3145 - https://github.com/balabit-deps/balabit-os-9-bind9-libs CVE-2017-3145 - https://github.com/pexip/os-bind9 CVE-2017-3145 - https://github.com/pexip/os-bind9-libs +CVE-2017-3145 - https://github.com/psmedley/bind-os2 CVE-2017-3145 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems CVE-2017-3145 - https://github.com/tomoyamachi/gocarts CVE-2017-3145 - https://github.com/zzzWTF/db-13-01 @@ -38878,6 +38912,7 @@ CVE-2017-5715 - https://github.com/20142995/sectool CVE-2017-5715 - https://github.com/3th1c4l-t0n1/awesome-csirt CVE-2017-5715 - https://github.com/ARPSyndicate/cvemon CVE-2017-5715 - https://github.com/Aakaashzz/Meltdown-Spectre +CVE-2017-5715 - https://github.com/BlessedRebuS/RISCV-Attacks CVE-2017-5715 - https://github.com/CVEDB/PoC-List CVE-2017-5715 - https://github.com/CVEDB/awesome-cve-repo CVE-2017-5715 - https://github.com/CVEDB/top @@ -38992,6 +39027,7 @@ CVE-2017-5753 - https://github.com/00052/spectre-attack-example CVE-2017-5753 - https://github.com/20142995/sectool CVE-2017-5753 - https://github.com/ARPSyndicate/cvemon CVE-2017-5753 - https://github.com/Aakaashzz/Meltdown-Spectre +CVE-2017-5753 - https://github.com/BlessedRebuS/RISCV-Attacks CVE-2017-5753 - https://github.com/C0dak/linux-exploit CVE-2017-5753 - https://github.com/CVEDB/PoC-List CVE-2017-5753 - https://github.com/CVEDB/awesome-cve-repo @@ -39093,6 +39129,7 @@ CVE-2017-5754 - https://github.com/3th1c4l-t0n1/awesome-csirt CVE-2017-5754 - https://github.com/5l1v3r1/update_kernel CVE-2017-5754 - https://github.com/ARPSyndicate/cvemon CVE-2017-5754 - https://github.com/Aakaashzz/Meltdown-Spectre +CVE-2017-5754 - https://github.com/BlessedRebuS/RISCV-Attacks CVE-2017-5754 - https://github.com/Bogdantkachenkots/Windows10GamingFocus CVE-2017-5754 - https://github.com/CyVerse-Ansible/ansible-prometheus-node-exporter CVE-2017-5754 - https://github.com/Fineas/meltdown_vulnerability @@ -43231,6 +43268,7 @@ CVE-2017-9834 - https://github.com/ARPSyndicate/cvemon CVE-2017-9834 - https://github.com/SirCryptic/PoC CVE-2017-9841 - https://github.com/0day404/vulnerability-poc CVE-2017-9841 - https://github.com/20142995/Goby +CVE-2017-9841 - https://github.com/20142995/nuclei-templates CVE-2017-9841 - https://github.com/ARPSyndicate/cvemon CVE-2017-9841 - https://github.com/ARPSyndicate/kenzer-templates CVE-2017-9841 - https://github.com/ArrestX/--POC @@ -48437,6 +48475,7 @@ CVE-2018-15640 - https://github.com/Elsfa7-110/kenzer-templates CVE-2018-15640 - https://github.com/d4n-sec/d4n-sec.github.io CVE-2018-15657 - https://github.com/ARPSyndicate/kenzer-templates CVE-2018-15664 - https://github.com/ARPSyndicate/cvemon +CVE-2018-15664 - https://github.com/HuzaifaPatel/houdini CVE-2018-15664 - https://github.com/Metarget/cloud-native-security-book CVE-2018-15664 - https://github.com/Metarget/metarget CVE-2018-15664 - https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground @@ -49255,6 +49294,7 @@ CVE-2018-16752 - https://github.com/Z0fhack/Goby_POC CVE-2018-16761 - https://github.com/ARPSyndicate/kenzer-templates CVE-2018-16763 - https://github.com/0xT11/CVE-POC CVE-2018-16763 - https://github.com/1337kid/Exploits +CVE-2018-16763 - https://github.com/20142995/nuclei-templates CVE-2018-16763 - https://github.com/ARPSyndicate/cvemon CVE-2018-16763 - https://github.com/ARPSyndicate/kenzer-templates CVE-2018-16763 - https://github.com/BhattJayD/IgniteCTF @@ -53798,6 +53838,7 @@ CVE-2018-5738 - https://github.com/balabit-deps/balabit-os-8-bind9-libs CVE-2018-5738 - https://github.com/balabit-deps/balabit-os-9-bind9-libs CVE-2018-5738 - https://github.com/pexip/os-bind9 CVE-2018-5738 - https://github.com/pexip/os-bind9-libs +CVE-2018-5738 - https://github.com/psmedley/bind-os2 CVE-2018-5740 - https://github.com/0xT11/CVE-POC CVE-2018-5740 - https://github.com/ARPSyndicate/cvemon CVE-2018-5740 - https://github.com/developer3000S/PoC-in-GitHub @@ -53810,12 +53851,14 @@ CVE-2018-5741 - https://github.com/balabit-deps/balabit-os-8-bind9-libs CVE-2018-5741 - https://github.com/balabit-deps/balabit-os-9-bind9-libs CVE-2018-5741 - https://github.com/pexip/os-bind9 CVE-2018-5741 - https://github.com/pexip/os-bind9-libs +CVE-2018-5741 - https://github.com/psmedley/bind-os2 CVE-2018-5743 - https://github.com/ARPSyndicate/cvemon CVE-2018-5743 - https://github.com/Seabreg/bind CVE-2018-5743 - https://github.com/balabit-deps/balabit-os-8-bind9-libs CVE-2018-5743 - https://github.com/balabit-deps/balabit-os-9-bind9-libs CVE-2018-5743 - https://github.com/bg6cq/bind9 CVE-2018-5743 - https://github.com/pexip/os-bind9-libs +CVE-2018-5743 - https://github.com/psmedley/bind-os2 CVE-2018-5743 - https://github.com/sischkg/dnsonsen_advent_calendar CVE-2018-5744 - https://github.com/ARPSyndicate/cvemon CVE-2018-5744 - https://github.com/HJXSaber/bind9-my @@ -53823,6 +53866,7 @@ CVE-2018-5744 - https://github.com/balabit-deps/balabit-os-8-bind9-libs CVE-2018-5744 - https://github.com/balabit-deps/balabit-os-9-bind9-libs CVE-2018-5744 - https://github.com/pexip/os-bind9 CVE-2018-5744 - https://github.com/pexip/os-bind9-libs +CVE-2018-5744 - https://github.com/psmedley/bind-os2 CVE-2018-5744 - https://github.com/sischkg/dnsonsen_advent_calendar CVE-2018-5745 - https://github.com/ARPSyndicate/cvemon CVE-2018-5745 - https://github.com/HJXSaber/bind9-my @@ -53831,6 +53875,7 @@ CVE-2018-5745 - https://github.com/balabit-deps/balabit-os-9-bind9-libs CVE-2018-5745 - https://github.com/fokypoky/places-list CVE-2018-5745 - https://github.com/pexip/os-bind9 CVE-2018-5745 - https://github.com/pexip/os-bind9-libs +CVE-2018-5745 - https://github.com/psmedley/bind-os2 CVE-2018-5747 - https://github.com/andir/nixos-issue-db-example CVE-2018-5755 - https://github.com/ARPSyndicate/cvemon CVE-2018-5757 - https://github.com/ARPSyndicate/cvemon @@ -60487,6 +60532,7 @@ CVE-2019-11358 - https://github.com/4537-Enterprise/DRSS_Baby_Bot_Auto_Update CVE-2019-11358 - https://github.com/4H-Botsmiths/FTC-18693-Freight-Frenzy CVE-2019-11358 - https://github.com/4hscream14204/CenterStage CVE-2019-11358 - https://github.com/5015BuffaloWings-FTC/road-runner-quickstart +CVE-2019-11358 - https://github.com/5040NutsAndBolts/24-25-Season CVE-2019-11358 - https://github.com/5040NutsAndBolts/PowerPlay_22-23 CVE-2019-11358 - https://github.com/5070NUTS/center-stage1 CVE-2019-11358 - https://github.com/5070NUTS/power-play @@ -60644,6 +60690,7 @@ CVE-2019-11358 - https://github.com/Apple-CRISPR/FtcRobotController_2021 CVE-2019-11358 - https://github.com/AravNeroth/2023-2024-Robolobos-FTC-14363 CVE-2019-11358 - https://github.com/AravNeroth/FTC-14361-CENTERSTAGE-V3 CVE-2019-11358 - https://github.com/Arch-it-12/FTCTestProject +CVE-2019-11358 - https://github.com/Architekt13/Official-Incognito-FTC-Code CVE-2019-11358 - https://github.com/Archytas19412/Archytas2023-master CVE-2019-11358 - https://github.com/Archytas19412/FTC-Centerstage-19412 CVE-2019-11358 - https://github.com/ArcticCrusade/18996-FTC @@ -60964,6 +61011,7 @@ CVE-2019-11358 - https://github.com/Daedruoy/Team-2993-Powerplay-main-master CVE-2019-11358 - https://github.com/Daiigr/FTC21148-RobotController CVE-2019-11358 - https://github.com/Daiigr/MakerFaireRobotController CVE-2019-11358 - https://github.com/Dairy-Foundation/Dairy +CVE-2019-11358 - https://github.com/Daniel1833434/RoadRunnerQuickstart15031-mainQuack CVE-2019-11358 - https://github.com/DanielRuf/snyk-js-jquery-174006 CVE-2019-11358 - https://github.com/DanielRuf/snyk-js-jquery-565129 CVE-2019-11358 - https://github.com/Danube-Robotics/FTC-Training @@ -61278,6 +61326,7 @@ CVE-2019-11358 - https://github.com/FTC-ORBIT/14872-2024-CenterStage CVE-2019-11358 - https://github.com/FTC-ORBIT/2023-ftc-14028 CVE-2019-11358 - https://github.com/FTC-ORBIT/2023-ftc-14872 CVE-2019-11358 - https://github.com/FTC-ORBIT/FGC-2023 +CVE-2019-11358 - https://github.com/FTC-ORBIT/Template CVE-2019-11358 - https://github.com/FTC-ORBIT/orbit14872-2024 CVE-2019-11358 - https://github.com/FTC-ORBIT/preparation-14029 CVE-2019-11358 - https://github.com/FTC-Pathfinder-2020/FtcRobotController-master @@ -61496,6 +61545,7 @@ CVE-2019-11358 - https://github.com/HPHS-Owls-Robotics/Robot23-24 CVE-2019-11358 - https://github.com/HSE-Robotics/15221-Centerstage CVE-2019-11358 - https://github.com/HackerGuy1000/Nebula-23-24 CVE-2019-11358 - https://github.com/Hackercats/Ultimate-Goal +CVE-2019-11358 - https://github.com/Hal-9k1/FTC-Fall-2023 CVE-2019-11358 - https://github.com/HamzaEbeida/MarvelsOfVRIC CVE-2019-11358 - https://github.com/HamzaEbeida/offseason-ftc CVE-2019-11358 - https://github.com/Harsha23871/HarshaPractieBot_5_24_24 @@ -61778,6 +61828,7 @@ CVE-2019-11358 - https://github.com/LancerRobotics/FTC-Freight-Frenzy CVE-2019-11358 - https://github.com/LancerRobotics/FTC-Powerplay CVE-2019-11358 - https://github.com/LaneStanley/Garnet-Squadron-Freight-Frenzy CVE-2019-11358 - https://github.com/Lara-Martins/5898PowerplayCode +CVE-2019-11358 - https://github.com/LarryHiller/2021-FTC-UltimateGoal-Wembley CVE-2019-11358 - https://github.com/LauraE4/LauraE CVE-2019-11358 - https://github.com/Lawson-Woodward/RR9527-v1-2024 CVE-2019-11358 - https://github.com/Lawson-Woodward/RR9527-v2-2024 @@ -61820,6 +61871,7 @@ CVE-2019-11358 - https://github.com/LouisHarnish/2023-11846-Louis CVE-2019-11358 - https://github.com/LouisaHuston/NaturalSelection_2324_Final CVE-2019-11358 - https://github.com/LucasFeldsien/UltimateGoal CVE-2019-11358 - https://github.com/LucyHarrison/FTC2021-girlboss +CVE-2019-11358 - https://github.com/Luk012/Ro2D2_Centerstage CVE-2019-11358 - https://github.com/LumenChristiRobotics/Techno-Titans-2023 CVE-2019-11358 - https://github.com/Lunerwalker2/FreightFrenzy1002 CVE-2019-11358 - https://github.com/Lunerwalker2/SwerveDriveTesting @@ -62712,6 +62764,7 @@ CVE-2019-11358 - https://github.com/Vasil789/2023-FTC-Build-Fettucine CVE-2019-11358 - https://github.com/Vasil789/ftc CVE-2019-11358 - https://github.com/VasuBanga12/FTCTest CVE-2019-11358 - https://github.com/Vault-FTC/FTC-Command-System +CVE-2019-11358 - https://github.com/Vault-FTC/Fe2O3-2023-2024 CVE-2019-11358 - https://github.com/Vault-FTC/Mg-2023-2024 CVE-2019-11358 - https://github.com/Vault-FTC/MgCode2 CVE-2019-11358 - https://github.com/Vault-FTC/MoleMotion @@ -63181,6 +63234,7 @@ CVE-2019-11358 - https://github.com/cyberhawks14188/Freight-Frenzy-Repo CVE-2019-11358 - https://github.com/cyborg48/UltimateGoal CVE-2019-11358 - https://github.com/dandominicstaicu/SoftHoardersUG CVE-2019-11358 - https://github.com/dandominicstaicu/SoftHoardersUG2 +CVE-2019-11358 - https://github.com/danielgrbacbravo/MakerFaireRobotController CVE-2019-11358 - https://github.com/daria-lzr/RoboAs-CenterStage CVE-2019-11358 - https://github.com/darkhanakh/BalgaMenShege_Program CVE-2019-11358 - https://github.com/darmthealarm/FtcRobotController-master @@ -63228,6 +63282,7 @@ CVE-2019-11358 - https://github.com/dora-xia123/SkyStone-5.5 CVE-2019-11358 - https://github.com/dorinon/ftc-14782-orbit CVE-2019-11358 - https://github.com/doxulo/FtcRobotController-master CVE-2019-11358 - https://github.com/dpeachpeach/WPCPRobogrizzlies +CVE-2019-11358 - https://github.com/dr-hextanium/into_the_deep CVE-2019-11358 - https://github.com/drxxgn/MECH24testing CVE-2019-11358 - https://github.com/dschleuning-github/2023_Halloween CVE-2019-11358 - https://github.com/dschleuning-github/DUCKS_2023-24_v9_0_1 @@ -63386,6 +63441,7 @@ CVE-2019-11358 - https://github.com/ftc16072/2020preseason CVE-2019-11358 - https://github.com/ftc16072/2021preseason CVE-2019-11358 - https://github.com/ftc16072/2022Preseason CVE-2019-11358 - https://github.com/ftc16072/2023Preseason +CVE-2019-11358 - https://github.com/ftc16072/2024Preseason CVE-2019-11358 - https://github.com/ftc16072/AscendAviators-PowerPlay CVE-2019-11358 - https://github.com/ftc16072/CenterStage23-24 CVE-2019-11358 - https://github.com/ftc16072/FreightFrenzy21-22 @@ -63587,6 +63643,7 @@ CVE-2019-11358 - https://github.com/importTahsinZaman/Robotics_PowerPlay2022-202 CVE-2019-11358 - https://github.com/importTahsinZaman/Robotics_PowerPlay2022-2023_Bot2 CVE-2019-11358 - https://github.com/importly/FtcRobotController CVE-2019-11358 - https://github.com/imsa-ftc-robotics/UltimateGoalMeet1 +CVE-2019-11358 - https://github.com/info1robotics/CenterStage-Diff CVE-2019-11358 - https://github.com/info1robotics/FtcRobotController CVE-2019-11358 - https://github.com/inkineers/Team-Inkineers21982-Power-Play CVE-2019-11358 - https://github.com/invjar/FTCtesting @@ -64275,6 +64332,7 @@ CVE-2019-11358 - https://github.com/the-winsor-school/Wildbots-2020-2021 CVE-2019-11358 - https://github.com/the-winsor-school/Wildbots-2021-2022 CVE-2019-11358 - https://github.com/the-winsor-school/wildbots_13620_2024 CVE-2019-11358 - https://github.com/the-winsor-school/wirecats_20409_2024 +CVE-2019-11358 - https://github.com/theQubitBot/2024-25-IntoTheDeep CVE-2019-11358 - https://github.com/theSentinelsFTC/sentinels-teamcode CVE-2019-11358 - https://github.com/theawesomew/RefactoredFtcRobotController CVE-2019-11358 - https://github.com/thecatinthehatcomesback/CenterStage2023 @@ -67110,6 +67168,7 @@ CVE-2019-14267 - https://github.com/hectorgie/PoC-in-GitHub CVE-2019-14267 - https://github.com/snappyJack/pdfresurrect_CVE-2019-14267 CVE-2019-14270 - https://github.com/ARPSyndicate/cvemon CVE-2019-14271 - https://github.com/ARPSyndicate/cvemon +CVE-2019-14271 - https://github.com/HuzaifaPatel/houdini CVE-2019-14271 - https://github.com/Metarget/cloud-native-security-book CVE-2019-14271 - https://github.com/Metarget/metarget CVE-2019-14271 - https://github.com/PercussiveElbow/docker-escape-tool @@ -67266,6 +67325,7 @@ CVE-2019-14287 - https://github.com/yaguine/agent_sudo CVE-2019-14287 - https://github.com/zhsh9/RedTeam CVE-2019-1429 - https://github.com/Ostorlab/KEV CVE-2019-1429 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors +CVE-2019-14312 - https://github.com/20142995/nuclei-templates CVE-2019-14312 - https://github.com/ARPSyndicate/kenzer-templates CVE-2019-14312 - https://github.com/d4n-sec/d4n-sec.github.io CVE-2019-14314 - https://github.com/0xT11/CVE-POC @@ -73230,6 +73290,7 @@ CVE-2019-5736 - https://github.com/Frichetten/CVE-2019-5736-PoC CVE-2019-5736 - https://github.com/GhostTroops/TOP CVE-2019-5736 - https://github.com/GiverOfGifts/CVE-2019-5736-Custom-Runtime CVE-2019-5736 - https://github.com/H3xL00m/CVE-2019-5736 +CVE-2019-5736 - https://github.com/HuzaifaPatel/houdini CVE-2019-5736 - https://github.com/InesMartins31/iot-cves CVE-2019-5736 - https://github.com/JERRY123S/all-poc CVE-2019-5736 - https://github.com/JlSakuya/CVE-2022-0847-container-escape @@ -73906,6 +73967,7 @@ CVE-2019-6465 - https://github.com/balabit-deps/balabit-os-9-bind9-libs CVE-2019-6465 - https://github.com/fokypoky/places-list CVE-2019-6465 - https://github.com/pexip/os-bind9 CVE-2019-6465 - https://github.com/pexip/os-bind9-libs +CVE-2019-6465 - https://github.com/psmedley/bind-os2 CVE-2019-6467 - https://github.com/0xT11/CVE-POC CVE-2019-6467 - https://github.com/NetW0rK1le3r/awesome-hacking-lists CVE-2019-6467 - https://github.com/Seabreg/bind @@ -73923,6 +73985,7 @@ CVE-2019-6471 - https://github.com/balabit-deps/balabit-os-8-bind9-libs CVE-2019-6471 - https://github.com/balabit-deps/balabit-os-9-bind9-libs CVE-2019-6471 - https://github.com/bg6cq/bind9 CVE-2019-6471 - https://github.com/pexip/os-bind9-libs +CVE-2019-6471 - https://github.com/psmedley/bind-os2 CVE-2019-6475 - https://github.com/bg6cq/bind9 CVE-2019-6476 - https://github.com/bg6cq/bind9 CVE-2019-6477 - https://github.com/ARPSyndicate/cvemon @@ -73931,6 +73994,7 @@ CVE-2019-6477 - https://github.com/balabit-deps/balabit-os-9-bind9-libs CVE-2019-6477 - https://github.com/bg6cq/bind9 CVE-2019-6477 - https://github.com/fokypoky/places-list CVE-2019-6477 - https://github.com/pexip/os-bind9-libs +CVE-2019-6477 - https://github.com/psmedley/bind-os2 CVE-2019-6485 - https://github.com/tls-attacker/TLS-Padding-Oracles CVE-2019-6487 - https://github.com/0xT11/CVE-POC CVE-2019-6487 - https://github.com/afang5472/TP-Link-WDR-Router-Command-injection_POC @@ -88977,6 +89041,7 @@ CVE-2020-26160 - https://github.com/finnigja/test-go-container-images CVE-2020-26160 - https://github.com/k1LoW/oshka CVE-2020-26160 - https://github.com/laojianzi/laojianzi CVE-2020-26160 - https://github.com/naveensrinivasan/stunning-tribble +CVE-2020-26160 - https://github.com/nics-tw/sbom2vans CVE-2020-26160 - https://github.com/novalagung/mypullrequests CVE-2020-26164 - https://github.com/Live-Hack-CVE/CVE-2020-26164 CVE-2020-2617 - https://github.com/Live-Hack-CVE/CVE-2020-2617 @@ -95371,6 +95436,7 @@ CVE-2020-8616 - https://github.com/NikulinMS/13-01-hw CVE-2020-8616 - https://github.com/Zhivarev/13-01-hw CVE-2020-8616 - https://github.com/balabit-deps/balabit-os-9-bind9-libs CVE-2020-8616 - https://github.com/pexip/os-bind9-libs +CVE-2020-8616 - https://github.com/psmedley/bind-os2 CVE-2020-8616 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems CVE-2020-8616 - https://github.com/zzzWTF/db-13-01 CVE-2020-8617 - https://github.com/0xT11/CVE-POC @@ -95390,6 +95456,7 @@ CVE-2020-8617 - https://github.com/hectorgie/PoC-in-GitHub CVE-2020-8617 - https://github.com/knqyf263/CVE-2020-8617 CVE-2020-8617 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2020-8617 - https://github.com/pexip/os-bind9-libs +CVE-2020-8617 - https://github.com/psmedley/bind-os2 CVE-2020-8617 - https://github.com/rmkn/cve-2020-8617 CVE-2020-8617 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems CVE-2020-8617 - https://github.com/soosmile/POC @@ -95398,6 +95465,7 @@ CVE-2020-8617 - https://github.com/ultra-supara/portscanner CVE-2020-8617 - https://github.com/zzzWTF/db-13-01 CVE-2020-8618 - https://github.com/Live-Hack-CVE/CVE-2020-8618 CVE-2020-8619 - https://github.com/Live-Hack-CVE/CVE-2020-8619 +CVE-2020-8619 - https://github.com/psmedley/bind-os2 CVE-2020-8622 - https://github.com/ARPSyndicate/cvemon CVE-2020-8622 - https://github.com/DButter/whitehat_public CVE-2020-8622 - https://github.com/Dokukin1/Metasploitable @@ -95405,13 +95473,17 @@ CVE-2020-8622 - https://github.com/Iknowmyname/Nmap-Scans-M2 CVE-2020-8622 - https://github.com/NikulinMS/13-01-hw CVE-2020-8622 - https://github.com/Zhivarev/13-01-hw CVE-2020-8622 - https://github.com/fokypoky/places-list +CVE-2020-8622 - https://github.com/psmedley/bind-os2 CVE-2020-8622 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems CVE-2020-8622 - https://github.com/zzzWTF/db-13-01 CVE-2020-8623 - https://github.com/ARPSyndicate/cvemon CVE-2020-8623 - https://github.com/fokypoky/places-list +CVE-2020-8623 - https://github.com/psmedley/bind-os2 CVE-2020-8624 - https://github.com/ARPSyndicate/cvemon CVE-2020-8624 - https://github.com/fokypoky/places-list +CVE-2020-8624 - https://github.com/psmedley/bind-os2 CVE-2020-8625 - https://github.com/ARPSyndicate/cvemon +CVE-2020-8625 - https://github.com/psmedley/bind-os2 CVE-2020-8634 - https://github.com/ARPSyndicate/cvemon CVE-2020-8634 - https://github.com/CnHack3r/Penetration_PoC CVE-2020-8634 - https://github.com/EchoGin404/- @@ -102603,12 +102675,14 @@ CVE-2021-25162 - https://github.com/twentybel0w/CVE-2021-25162 CVE-2021-25162 - https://github.com/whoforget/CVE-POC CVE-2021-25162 - https://github.com/youwizard/CVE-POC CVE-2021-25214 - https://github.com/fokypoky/places-list +CVE-2021-25214 - https://github.com/psmedley/bind-os2 CVE-2021-25215 - https://github.com/ARPSyndicate/cvemon CVE-2021-25215 - https://github.com/DButter/whitehat_public CVE-2021-25215 - https://github.com/Dokukin1/Metasploitable CVE-2021-25215 - https://github.com/Iknowmyname/Nmap-Scans-M2 CVE-2021-25215 - https://github.com/NikulinMS/13-01-hw CVE-2021-25215 - https://github.com/Zhivarev/13-01-hw +CVE-2021-25215 - https://github.com/psmedley/bind-os2 CVE-2021-25215 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems CVE-2021-25215 - https://github.com/zzzWTF/db-13-01 CVE-2021-25216 - https://github.com/ARPSyndicate/cvemon @@ -102617,6 +102691,7 @@ CVE-2021-25216 - https://github.com/Dokukin1/Metasploitable CVE-2021-25216 - https://github.com/Iknowmyname/Nmap-Scans-M2 CVE-2021-25216 - https://github.com/NikulinMS/13-01-hw CVE-2021-25216 - https://github.com/Zhivarev/13-01-hw +CVE-2021-25216 - https://github.com/psmedley/bind-os2 CVE-2021-25216 - https://github.com/qwerty1q2w/cvescan_handler CVE-2021-25216 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems CVE-2021-25216 - https://github.com/zzzWTF/db-13-01 @@ -102628,10 +102703,12 @@ CVE-2021-25219 - https://github.com/Iknowmyname/Nmap-Scans-M2 CVE-2021-25219 - https://github.com/NikulinMS/13-01-hw CVE-2021-25219 - https://github.com/Zhivarev/13-01-hw CVE-2021-25219 - https://github.com/fokypoky/places-list +CVE-2021-25219 - https://github.com/psmedley/bind-os2 CVE-2021-25219 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems CVE-2021-25219 - https://github.com/zzzWTF/db-13-01 CVE-2021-25220 - https://github.com/ARPSyndicate/cvemon CVE-2021-25220 - https://github.com/fokypoky/places-list +CVE-2021-25220 - https://github.com/psmedley/bind-os2 CVE-2021-25251 - https://github.com/Parasect-Team/for-trendmciro CVE-2021-25253 - https://github.com/msd0pe-1/CVE-2021-25253 CVE-2021-25254 - https://github.com/KirtiRamchandani/KirtiRamchandani @@ -110319,6 +110396,7 @@ CVE-2021-35464 - https://github.com/rudrapwn/source-code-review CVE-2021-35464 - https://github.com/xinyisleep/pocscan CVE-2021-35464 - https://github.com/youcans896768/APIV_Tool CVE-2021-35465 - https://github.com/ARPSyndicate/cvemon +CVE-2021-35465 - https://github.com/KuanKuanQAQ/llvm-pass CVE-2021-35475 - https://github.com/ARPSyndicate/cvemon CVE-2021-35475 - https://github.com/NaInSec/CVE-PoC-in-GitHub CVE-2021-35475 - https://github.com/SYRTI/POC_to_review @@ -113935,6 +114013,7 @@ CVE-2021-41174 - https://github.com/kh4sh3i/Grafana-CVE CVE-2021-41174 - https://github.com/we45/nuclei-appsec-workflows CVE-2021-41181 - https://github.com/ARPSyndicate/cvemon CVE-2021-41181 - https://github.com/karimhabush/cyberowl +CVE-2021-41182 - https://github.com/20142995/nuclei-templates CVE-2021-41182 - https://github.com/ARPSyndicate/cvemon CVE-2021-41182 - https://github.com/cve-sandbox/jquery-ui CVE-2021-41182 - https://github.com/marksowell/retire-html-parser @@ -117716,6 +117795,7 @@ CVE-2021-44228 - https://github.com/djungeldan/Log4Me CVE-2021-44228 - https://github.com/djytmdj/Tool_Summary CVE-2021-44228 - https://github.com/dkd/elasticsearch CVE-2021-44228 - https://github.com/dmitsuo/log4shell-war-fixer +CVE-2021-44228 - https://github.com/dnaherna/log4shell-poc CVE-2021-44228 - https://github.com/docker-solr/docker-solr CVE-2021-44228 - https://github.com/doris0213/assignments CVE-2021-44228 - https://github.com/dotPY-hax/log4py @@ -120883,6 +120963,7 @@ CVE-2022-0487 - https://github.com/ARPSyndicate/cvemon CVE-2022-0487 - https://github.com/karanlvm/DirtyPipe-Exploit CVE-2022-0487 - https://github.com/si1ent-le/CVE-2022-0847 CVE-2022-0492 - https://github.com/ARPSyndicate/cvemon +CVE-2022-0492 - https://github.com/HuzaifaPatel/houdini CVE-2022-0492 - https://github.com/JadenQ/Cloud-Computing-Security-ProjectPage CVE-2022-0492 - https://github.com/LeoPer02/IDS-Dataset CVE-2022-0492 - https://github.com/Metarget/metarget @@ -120909,6 +120990,7 @@ CVE-2022-0492 - https://github.com/iridium-soda/container-escape-exploits CVE-2022-0492 - https://github.com/josebeo2016/eBPF_Hotpatch CVE-2022-0492 - https://github.com/k0mi-tg/CVE-POC CVE-2022-0492 - https://github.com/kvesta/vesta +CVE-2022-0492 - https://github.com/libera-programming/bayaz CVE-2022-0492 - https://github.com/manas3c/CVE-POC CVE-2022-0492 - https://github.com/marksowell/my-stars CVE-2022-0492 - https://github.com/marksowell/starred @@ -134411,6 +134493,7 @@ CVE-2022-31153 - https://github.com/ARPSyndicate/cvemon CVE-2022-31153 - https://github.com/ChamalBandara/CVEs CVE-2022-31157 - https://github.com/ARPSyndicate/cvemon CVE-2022-31157 - https://github.com/ChamalBandara/CVEs +CVE-2022-31159 - https://github.com/IHTSDO/snomed-parent-owasp CVE-2022-31160 - https://github.com/ARPSyndicate/cvemon CVE-2022-31160 - https://github.com/ameeralwafiq/Case-Study-Report-Sab-a CVE-2022-31160 - https://github.com/cve-sandbox/jquery-ui @@ -137029,6 +137112,7 @@ CVE-2022-35944 - https://github.com/cyllective/CVEs CVE-2022-35948 - https://github.com/ARPSyndicate/cvemon CVE-2022-35948 - https://github.com/happyhacking-k/happyhacking-k CVE-2022-35951 - https://github.com/ARPSyndicate/cvemon +CVE-2022-35951 - https://github.com/leesh3288/leesh3288 CVE-2022-35952 - https://github.com/ARPSyndicate/cvemon CVE-2022-35952 - https://github.com/skipfuzz/skipfuzz CVE-2022-3596 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -137043,6 +137127,7 @@ CVE-2022-3597 - https://github.com/waugustus/waugustus CVE-2022-35975 - https://github.com/karimhabush/cyberowl CVE-2022-35976 - https://github.com/karimhabush/cyberowl CVE-2022-35977 - https://github.com/ARPSyndicate/cvemon +CVE-2022-35977 - https://github.com/leesh3288/leesh3288 CVE-2022-35977 - https://github.com/redis-windows/redis-windows CVE-2022-3598 - https://github.com/ARPSyndicate/cvemon CVE-2022-3598 - https://github.com/maxim12z/ECommerce @@ -141848,6 +141933,7 @@ CVE-2022-47012 - https://github.com/fusion-scan/fusion-scan.github.io CVE-2022-47015 - https://github.com/fusion-scan/fusion-scan.github.io CVE-2022-47016 - https://github.com/ARPSyndicate/cvemon CVE-2022-4702 - https://github.com/ARPSyndicate/cvemon +CVE-2022-47021 - https://github.com/DiRaltvein/memory-corruption-examples CVE-2022-47021 - https://github.com/fusion-scan/fusion-scan.github.io CVE-2022-47022 - https://github.com/fusion-scan/fusion-scan.github.io CVE-2022-47024 - https://github.com/ARPSyndicate/cvemon @@ -141869,6 +141955,7 @@ CVE-2022-47071 - https://github.com/Sylon001/Sylon001 CVE-2022-47072 - https://github.com/DojoSecurity/DojoSecurity CVE-2022-47072 - https://github.com/DojoSecurity/Enterprise-Architect-SQL-Injection CVE-2022-47085 - https://github.com/shinmao/Bug-hunting-in-Rust +CVE-2022-47094 - https://github.com/DiRaltvein/memory-corruption-examples CVE-2022-47095 - https://github.com/ARPSyndicate/cvemon CVE-2022-47095 - https://github.com/Habib0x0/CVE-FU CVE-2022-47095 - https://github.com/hab1b0x/CVE-FU @@ -141954,6 +142041,7 @@ CVE-2022-47632 - https://github.com/ARPSyndicate/cvemon CVE-2022-47633 - https://github.com/ARPSyndicate/cvemon CVE-2022-47633 - https://github.com/slashben/beat-ac-cosign-verifier CVE-2022-47636 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2022-47659 - https://github.com/DiRaltvein/memory-corruption-examples CVE-2022-47695 - https://github.com/ChrisAdkin8/Ubuntu-CVE-Verify CVE-2022-4770 - https://github.com/ARPSyndicate/cvemon CVE-2022-47714 - https://github.com/l00neyhacker/CVE-2022-47714 @@ -142432,6 +142520,7 @@ CVE-2023-0315 - https://github.com/whoforget/CVE-POC CVE-2023-0315 - https://github.com/youwizard/CVE-POC CVE-2023-0316 - https://github.com/ARPSyndicate/cvemon CVE-2023-0316 - https://github.com/kos0ng/CVEs +CVE-2023-0341 - https://github.com/DiRaltvein/memory-corruption-examples CVE-2023-0361 - https://github.com/ARPSyndicate/cvemon CVE-2023-0361 - https://github.com/GitHubForSnap/ssmtp-gael CVE-2023-0361 - https://github.com/alexcowperthwaite/PasskeyScanner @@ -143841,6 +143930,7 @@ CVE-2023-21611 - https://github.com/ARPSyndicate/cvemon CVE-2023-21611 - https://github.com/kohnakagawa/kohnakagawa CVE-2023-21612 - https://github.com/ARPSyndicate/cvemon CVE-2023-21612 - https://github.com/kohnakagawa/kohnakagawa +CVE-2023-21616 - https://github.com/HuzaifaPatel/houdini CVE-2023-2163 - https://github.com/Dikens88/hopp CVE-2023-2163 - https://github.com/Snoopy-Sec/Localroot-ALL-CVE CVE-2023-2163 - https://github.com/google/buzzer @@ -144447,6 +144537,7 @@ CVE-2023-22621 - https://github.com/strapi/security-patches CVE-2023-22622 - https://github.com/ARPSyndicate/cvemon CVE-2023-22622 - https://github.com/alopresto/epss_api_demo CVE-2023-22622 - https://github.com/alopresto6m/epss_api_demo +CVE-2023-22622 - https://github.com/michael-david-fry/CVE-2023-22622 CVE-2023-22622 - https://github.com/michael-david-fry/wp-cron-smash CVE-2023-22622 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-22655 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -145521,6 +145612,7 @@ CVE-2023-25202 - https://github.com/Trackflaw/CVE-2023-25202 CVE-2023-25202 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-25203 - https://github.com/Trackflaw/CVE-2023-25203 CVE-2023-25203 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2023-25221 - https://github.com/DiRaltvein/memory-corruption-examples CVE-2023-2523 - https://github.com/Any3ite/CVE-2023-2523 CVE-2023-2523 - https://github.com/Co5mos/nuclei-tps CVE-2023-2523 - https://github.com/TrojanAZhen/Self_Back @@ -147096,6 +147188,7 @@ CVE-2023-29197 - https://github.com/elifesciences/github-repo-security-alerts CVE-2023-29197 - https://github.com/karimhabush/cyberowl CVE-2023-29199 - https://github.com/3mpir3Albert/HTB_Codify CVE-2023-29199 - https://github.com/jakabakos/vm2-sandbox-escape-exploits +CVE-2023-29199 - https://github.com/leesh3288/leesh3288 CVE-2023-29199 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-29199 - https://github.com/u-crew/vm2-test CVE-2023-29206 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -147418,6 +147511,7 @@ CVE-2023-30092 - https://github.com/nawed20002/CVE-2023-30092 CVE-2023-30092 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-30093 - https://github.com/edoardottt/master-degree-thesis CVE-2023-30093 - https://github.com/edoardottt/offensive-onos +CVE-2023-3012 - https://github.com/DiRaltvein/memory-corruption-examples CVE-2023-30145 - https://github.com/ARPSyndicate/cvemon CVE-2023-30145 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-30145 - https://github.com/paragbagul111/CVE-2023-30145 @@ -148708,6 +148802,7 @@ CVE-2023-33898 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-33899 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-3390 - https://github.com/c0m0r1/c0m0r1 CVE-2023-3390 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-3390 - https://github.com/leesh3288/leesh3288 CVE-2023-3390 - https://github.com/tanjiti/sec_profile CVE-2023-3390 - https://github.com/xairy/linux-kernel-exploitation CVE-2023-33900 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -148957,6 +149052,7 @@ CVE-2023-34395 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-34396 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-34396 - https://github.com/weblegacy/struts1 CVE-2023-3440 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-34411 - https://github.com/IHTSDO/snomed-parent-owasp CVE-2023-34425 - https://github.com/jp-cpe/retrieve-cvss-scores CVE-2023-3443 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-34432 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -149404,6 +149500,7 @@ CVE-2023-35905 - https://github.com/kosmosec/CVE-numbers CVE-2023-35909 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-35911 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-35913 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-35926 - https://github.com/leesh3288/leesh3288 CVE-2023-35932 - https://github.com/Sim4n6/Sim4n6 CVE-2023-35934 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-35936 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -150236,6 +150333,7 @@ CVE-2023-3824 - https://github.com/NewLockBit/CVE-2023-3824-PHP-to-RCE CVE-2023-3824 - https://github.com/NewLockBit/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK CVE-2023-3824 - https://github.com/NewLockBit/CVE-2023-3824-PHP-to-RCE-National-Crime-AgencyLEAK CVE-2023-3824 - https://github.com/NewLockBit/Research-of-CVE-2023-3824-NCA-Lockbit +CVE-2023-3824 - https://github.com/Nfttkcauzy/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK CVE-2023-3824 - https://github.com/Nuki2u/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK CVE-2023-3824 - https://github.com/StayBeautiful-collab/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK CVE-2023-3824 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -150508,6 +150606,7 @@ CVE-2023-38646 - https://github.com/hheeyywweellccoommee/CVE-2023-38646-suynl CVE-2023-38646 - https://github.com/hktalent/bug-bounty CVE-2023-38646 - https://github.com/ibaiw/2023Hvv CVE-2023-38646 - https://github.com/iluaster/getdrive_PoC +CVE-2023-38646 - https://github.com/int3x/ctf-writeups CVE-2023-38646 - https://github.com/j0yb0y0h/CVE-2023-38646 CVE-2023-38646 - https://github.com/joaoviictorti/CVE-2023-38646 CVE-2023-38646 - https://github.com/junnythemarksman/CVE-2023-38646 @@ -150772,6 +150871,7 @@ CVE-2023-39325 - https://github.com/NaInSec/CVE-LIST CVE-2023-39325 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-39325 - https://github.com/knabben/dos-poc CVE-2023-39325 - https://github.com/latchset/tang-operator +CVE-2023-39325 - https://github.com/nics-tw/sbom2vans CVE-2023-39325 - https://github.com/testing-felickz/docker-scout-demo CVE-2023-39326 - https://github.com/testing-felickz/docker-scout-demo CVE-2023-39336 - https://github.com/netlas-io/netlas-dorks @@ -150860,6 +150960,7 @@ CVE-2023-39725 - https://github.com/anky-123/CVE-2023-39725 CVE-2023-39725 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-39742 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-3978 - https://github.com/knabben/dos-poc +CVE-2023-3978 - https://github.com/nics-tw/sbom2vans CVE-2023-39784 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-39785 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-39785 - https://github.com/tanjiti/sec_profile @@ -150903,6 +151004,7 @@ CVE-2023-39848 - https://github.com/Security-Test-Account/DVWA CVE-2023-39848 - https://github.com/ShrutikaNakhale/DVWA2 CVE-2023-39848 - https://github.com/Slon12jr/DVWA CVE-2023-39848 - https://github.com/StepsOnes/dvwa +CVE-2023-39848 - https://github.com/Swapnodeep/dvwa-vulnerable-code CVE-2023-39848 - https://github.com/TINNI-Lal/DVWA CVE-2023-39848 - https://github.com/VasuAz400/DVWA CVE-2023-39848 - https://github.com/Yahyazaizi/application-test-security @@ -150935,6 +151037,7 @@ CVE-2023-39848 - https://github.com/jayaprakashmurthy/Sonarcloudjp CVE-2023-39848 - https://github.com/jlcmux/DWVA-Desafio3 CVE-2023-39848 - https://github.com/jmsanderscybersec/DVWA CVE-2023-39848 - https://github.com/johdgft/digininja +CVE-2023-39848 - https://github.com/kabulshowcase/dvwa CVE-2023-39848 - https://github.com/kaushik-qp/DVWA-2 CVE-2023-39848 - https://github.com/kowan7/DVWA CVE-2023-39848 - https://github.com/krrajesh-git/DVWA @@ -151285,6 +151388,7 @@ CVE-2023-4077 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-40771 - https://github.com/tanjiti/sec_profile CVE-2023-4078 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-40787 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-40819 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-40834 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-40850 - https://github.com/flyyue2001/cve CVE-2023-40868 - https://github.com/MinoTauro2020/CVE-2023-40868 @@ -152023,6 +152127,7 @@ CVE-2023-4294 - https://github.com/b0marek/CVE-2023-4294 CVE-2023-4294 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-42942 - https://github.com/Siguza/ios-resources CVE-2023-42942 - https://github.com/houjingyi233/macOS-iOS-system-security +CVE-2023-42943 - https://github.com/iCMDdev/iCMDdev CVE-2023-42954 - https://github.com/NaInSec/CVE-LIST CVE-2023-42974 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-4298 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -152565,6 +152670,7 @@ CVE-2023-44487 - https://github.com/CVEDB/awesome-cve-repo CVE-2023-44487 - https://github.com/CVEDB/top CVE-2023-44487 - https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh CVE-2023-44487 - https://github.com/GhostTroops/TOP +CVE-2023-44487 - https://github.com/Green-Ace/test CVE-2023-44487 - https://github.com/Millen93/HTTP-2.0-Rapid-Reset-Attack-Laboratory CVE-2023-44487 - https://github.com/Ostorlab/KEV CVE-2023-44487 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors @@ -152599,6 +152705,7 @@ CVE-2023-44487 - https://github.com/m00dy/r4p1d-r3s3t CVE-2023-44487 - https://github.com/malinkamedok/devops_sandbox CVE-2023-44487 - https://github.com/micrictor/http2-rst-stream CVE-2023-44487 - https://github.com/ndrscodes/http2-rst-stream-attacker +CVE-2023-44487 - https://github.com/nics-tw/sbom2vans CVE-2023-44487 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-44487 - https://github.com/nvdg2/http2RapidReset CVE-2023-44487 - https://github.com/nxenon/cve-2023-44487 @@ -152868,6 +152975,7 @@ CVE-2023-45288 - https://github.com/aerospike-managed-cloud-services/flb-output- CVE-2023-45288 - https://github.com/blackmagic2023/http-2-DOS-PoC CVE-2023-45288 - https://github.com/hex0punk/cont-flood-poc CVE-2023-45288 - https://github.com/mkloubert/go-package-manager +CVE-2023-45288 - https://github.com/nics-tw/sbom2vans CVE-2023-45288 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-45288 - https://github.com/testing-felickz/docker-scout-demo CVE-2023-45289 - https://github.com/testing-felickz/docker-scout-demo @@ -153965,6 +154073,7 @@ CVE-2023-48795 - https://github.com/bollwarm/SecToolSet CVE-2023-48795 - https://github.com/giterlizzi/secdb-feeds CVE-2023-48795 - https://github.com/jtesta/ssh-audit CVE-2023-48795 - https://github.com/kitan-akamai/akamai-university-demo-lke-wordpress +CVE-2023-48795 - https://github.com/nics-tw/sbom2vans CVE-2023-48795 - https://github.com/rgl/openssh-server-windows-vagrant CVE-2023-48795 - https://github.com/salmankhan-prs/Go-Good-First-issue CVE-2023-48795 - https://github.com/testing-felickz/docker-scout-demo @@ -155141,6 +155250,7 @@ CVE-2023-52226 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-52229 - https://github.com/NaInSec/CVE-LIST CVE-2023-52235 - https://github.com/hackintoanetwork/hackintoanetwork CVE-2023-52251 - https://github.com/BobTheShoplifter/CVE-2023-52251-POC +CVE-2023-52251 - https://github.com/Drun1baby/CVE-Reproduction-And-Analysis CVE-2023-52251 - https://github.com/Mr-xn/Penetration_Testing_POC CVE-2023-52251 - https://github.com/Ostorlab/KEV CVE-2023-52251 - https://github.com/nomi-sec/PoC-in-GitHub @@ -160890,6 +161000,8 @@ CVE-2024-0043 - https://github.com/cisagov/vulnrichment CVE-2024-0044 - https://github.com/0xMarcio/cve CVE-2024-0044 - https://github.com/GhostTroops/TOP CVE-2024-0044 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-0044 - https://github.com/pl4int3xt/cve_2024_0044 +CVE-2024-0044 - https://github.com/scs-labrat/android_autorooter CVE-2024-0044 - https://github.com/tanjiti/sec_profile CVE-2024-0049 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-0054 - https://github.com/NaInSec/CVE-LIST @@ -161866,6 +161978,7 @@ CVE-2024-1799 - https://github.com/NaInSec/CVE-LIST CVE-2024-1800 - https://github.com/GhostTroops/TOP CVE-2024-1800 - https://github.com/Harydhk7/CVE-2024-4358 CVE-2024-1800 - https://github.com/NaInSec/CVE-LIST +CVE-2024-1800 - https://github.com/f0ur0four/Insecure-Deserialization CVE-2024-1800 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1800 - https://github.com/sinsinology/CVE-2024-4358 CVE-2024-1800 - https://github.com/tanjiti/sec_profile @@ -162686,6 +162799,7 @@ CVE-2024-2159 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-2161 - https://github.com/NaInSec/CVE-LIST CVE-2024-21610 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-21615 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-21616 - https://github.com/HuzaifaPatel/houdini CVE-2024-21618 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-21619 - https://github.com/Ostorlab/KEV CVE-2024-2162 - https://github.com/NaInSec/CVE-LIST @@ -163651,6 +163765,7 @@ CVE-2024-23477 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-23478 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-23479 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-23480 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-23480 - https://github.com/p4yl0ad/p4yl0ad CVE-2024-23482 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-23494 - https://github.com/NaInSec/CVE-LIST CVE-2024-23496 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -164320,6 +164435,7 @@ CVE-2024-24785 - https://github.com/testing-felickz/docker-scout-demo CVE-2024-24786 - https://github.com/DanielePeruzzi97/rancher-k3s-docker CVE-2024-24786 - https://github.com/NaInSec/CVE-LIST CVE-2024-24786 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-24786 - https://github.com/nics-tw/sbom2vans CVE-2024-24786 - https://github.com/ytono/gcp-arcade CVE-2024-24787 - https://github.com/LOURC0D3/CVE-2024-24787-PoC CVE-2024-24787 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -165259,10 +165375,13 @@ CVE-2024-2622 - https://github.com/NaInSec/CVE-LIST CVE-2024-2622 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-26229 - https://github.com/0xMarcio/cve CVE-2024-26229 - https://github.com/GhostTroops/TOP +CVE-2024-26229 - https://github.com/RalfHacker/CVE-2024-26229-exploit +CVE-2024-26229 - https://github.com/apkc/CVE-2024-26229-BOF CVE-2024-26229 - https://github.com/gmh5225/awesome-game-security CVE-2024-26229 - https://github.com/michredteam/PoC-26229 CVE-2024-26229 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-26229 - https://github.com/tanjiti/sec_profile +CVE-2024-26229 - https://github.com/varwara/CVE-2024-26229 CVE-2024-26246 - https://github.com/NaInSec/CVE-LIST CVE-2024-26247 - https://github.com/NaInSec/CVE-LIST CVE-2024-26247 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -165814,6 +165933,7 @@ CVE-2024-27296 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-27297 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-27297 - https://github.com/mrdev023/nixos CVE-2024-27298 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-27304 - https://github.com/nics-tw/sbom2vans CVE-2024-27306 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-27310 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-27316 - https://github.com/Ampferl/poc_http2-continuation-flood @@ -166033,6 +166153,7 @@ CVE-2024-27900 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-27902 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-27905 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-27907 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-27913 - https://github.com/AimiP02/OSPF_BooFuzzer CVE-2024-27914 - https://github.com/NaInSec/CVE-LIST CVE-2024-27919 - https://github.com/Ampferl/poc_http2-continuation-flood CVE-2024-27919 - https://github.com/DrewskyDev/H2Flood @@ -166044,6 +166165,8 @@ CVE-2024-27921 - https://github.com/NaInSec/CVE-LIST CVE-2024-27930 - https://github.com/NaInSec/CVE-LIST CVE-2024-27930 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-27931 - https://github.com/KTH-LangSec/server-side-prototype-pollution +CVE-2024-27933 - https://github.com/leesh3288/leesh3288 +CVE-2024-27934 - https://github.com/leesh3288/leesh3288 CVE-2024-27936 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-27937 - https://github.com/NaInSec/CVE-LIST CVE-2024-27937 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -166604,6 +166727,7 @@ CVE-2024-28848 - https://github.com/wy876/POC CVE-2024-28848 - https://github.com/wy876/wiki CVE-2024-28849 - https://github.com/NaInSec/CVE-LIST CVE-2024-28849 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-28849 - https://github.com/nics-tw/sbom2vans CVE-2024-2885 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-28851 - https://github.com/NaInSec/CVE-LIST CVE-2024-28854 - https://github.com/NaInSec/CVE-LIST @@ -166611,6 +166735,7 @@ CVE-2024-28855 - https://github.com/NaInSec/CVE-LIST CVE-2024-28855 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-28859 - https://github.com/NaInSec/CVE-LIST CVE-2024-2886 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-2886 - https://github.com/leesh3288/leesh3288 CVE-2024-28861 - https://github.com/NaInSec/CVE-LIST CVE-2024-28862 - https://github.com/NaInSec/CVE-LIST CVE-2024-28863 - https://github.com/NaInSec/CVE-LIST @@ -166669,6 +166794,8 @@ CVE-2024-2901 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-29018 - https://github.com/NaInSec/CVE-LIST CVE-2024-29019 - https://github.com/NaInSec/CVE-LIST CVE-2024-2902 - https://github.com/LaPhilosophie/IoT-vulnerable +CVE-2024-29022 - https://github.com/Saadet-T/Saadet-T +CVE-2024-29023 - https://github.com/Saadet-T/Saadet-T CVE-2024-29025 - https://github.com/Azure/kafka-sink-azure-kusto CVE-2024-29025 - https://github.com/th2-net/th2-bom CVE-2024-29025 - https://github.com/ytono/gcp-arcade @@ -166916,6 +167043,7 @@ CVE-2024-29384 - https://github.com/randshell/CVE-2024-29384 CVE-2024-29385 - https://github.com/NaInSec/CVE-LIST CVE-2024-29385 - https://github.com/yj94/Yj_learning CVE-2024-2939 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-29390 - https://github.com/CyberSentryX/CVE_Hunting CVE-2024-29392 - https://github.com/phulelouch/CVEs CVE-2024-29399 - https://github.com/ally-petitt/CVE-2024-29399 CVE-2024-29399 - https://github.com/nomi-sec/PoC-in-GitHub @@ -167217,7 +167345,10 @@ CVE-2024-3007 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-3007 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-30078 - https://github.com/0xMarcio/cve CVE-2024-30078 - https://github.com/GhostTroops/TOP +CVE-2024-30078 - https://github.com/blkph0x/CVE_2024_30078_POC_WIFI CVE-2024-30078 - https://github.com/enomothem/PenTestNote +CVE-2024-30078 - https://github.com/lvyitian/CVE-2024-30078- +CVE-2024-30078 - https://github.com/nkontopoul/checkwifivulnerability CVE-2024-30078 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-30078 - https://github.com/stryngs/edgedressing CVE-2024-3008 - https://github.com/LaPhilosophie/IoT-vulnerable @@ -167245,6 +167376,7 @@ CVE-2024-30161 - https://github.com/NaInSec/CVE-LIST CVE-2024-30161 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-30163 - https://github.com/1Softworks/IPS-SQL-Injection CVE-2024-30165 - https://github.com/p4yl0ad/p4yl0ad +CVE-2024-30170 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-30171 - https://github.com/cdupuis/aspnetapp CVE-2024-30171 - https://github.com/ytono/gcp-arcade CVE-2024-30172 - https://github.com/cdupuis/aspnetapp @@ -167668,6 +167800,7 @@ CVE-2024-3094 - https://github.com/galacticquest/cve-2024-3094-detect CVE-2024-3094 - https://github.com/gayatriracha/CVE-2024-3094-Nmap-NSE-script CVE-2024-3094 - https://github.com/gustavorobertux/CVE-2024-3094 CVE-2024-3094 - https://github.com/hackingetico21/revisaxzutils +CVE-2024-3094 - https://github.com/hanmin0512/Data_splunk CVE-2024-3094 - https://github.com/harekrishnarai/xz-utils-vuln-checker CVE-2024-3094 - https://github.com/hazemkya/CVE-2024-3094-checker CVE-2024-3094 - https://github.com/hoanbi1812000/hoanbi1812000 @@ -167727,6 +167860,7 @@ CVE-2024-3094 - https://github.com/zayidu/zayidu CVE-2024-3094 - https://github.com/zgimszhd61/cve-2024-3094-detect-tool CVE-2024-3094 - https://github.com/zhaoxiaoha/github-trending CVE-2024-3094 - https://github.com/zoroqi/my-awesome +CVE-2024-30956 - https://github.com/leoCottret/CVE-2024-30956 CVE-2024-30956 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-3096 - https://github.com/Symbolexe/SHIFU CVE-2024-3096 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -167781,6 +167915,7 @@ CVE-2024-3119 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3120 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-31205 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-31207 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-31207 - https://github.com/nics-tw/sbom2vans CVE-2024-31208 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-31209 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-31210 - https://github.com/nomi-sec/PoC-in-GitHub @@ -167870,6 +168005,7 @@ CVE-2024-3157 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-31574 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-31576 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3158 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-31586 - https://github.com/CyberSentryX/CVE_Hunting CVE-2024-3159 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3160 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-31619 - https://github.com/fdu-sec/NestFuzz @@ -168046,6 +168182,7 @@ CVE-2024-32020 - https://github.com/testing-felickz/docker-scout-demo CVE-2024-32021 - https://github.com/testing-felickz/docker-scout-demo CVE-2024-32022 - https://github.com/OrenGitHub/dhscanner CVE-2024-3203 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-32030 - https://github.com/Drun1baby/CVE-Reproduction-And-Analysis CVE-2024-32030 - https://github.com/Mr-xn/Penetration_Testing_POC CVE-2024-32030 - https://github.com/Threekiii/CVE CVE-2024-32030 - https://github.com/nomi-sec/PoC-in-GitHub @@ -168060,6 +168197,7 @@ CVE-2024-32105 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-32113 - https://github.com/Mr-xn/CVE-2024-32113 CVE-2024-32113 - https://github.com/Mr-xn/Penetration_Testing_POC CVE-2024-32113 - https://github.com/Ostorlab/KEV +CVE-2024-32113 - https://github.com/RacerZ-fighting/CVE-2024-32113-POC CVE-2024-32113 - https://github.com/RacerZ-fighting/RacerZ-fighting CVE-2024-32113 - https://github.com/Threekiii/CVE CVE-2024-32113 - https://github.com/absholi7ly/Apache-OFBiz-Directory-Traversal-exploit @@ -168341,7 +168479,9 @@ CVE-2024-33294 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-33302 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-33303 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-33305 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-33308 - https://github.com/aaravavi/TVS-Connect-Application-VAPT CVE-2024-33308 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-33309 - https://github.com/aaravavi/TVS-Connect-Application-VAPT CVE-2024-33309 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3333 - https://github.com/JohnnyBradvo/CVE-2024-3333 CVE-2024-3333 - https://github.com/nomi-sec/PoC-in-GitHub @@ -168476,9 +168616,20 @@ CVE-2024-3388 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-33883 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-33883 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-33883 - https://github.com/seal-community/patches +CVE-2024-33897 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-33905 - https://github.com/tanjiti/sec_profile CVE-2024-33911 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-33911 - https://github.com/xbz0n/CVE-2024-33911 +CVE-2024-33957 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-33958 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-33959 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-33975 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-33976 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-33977 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-33978 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-33979 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-33980 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-33981 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3400 - https://github.com/0x0d3ad/CVE-2024-3400 CVE-2024-3400 - https://github.com/0xMarcio/cve CVE-2024-3400 - https://github.com/0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection @@ -168566,6 +168717,7 @@ CVE-2024-34096 - https://github.com/markyason/markyason.github.io CVE-2024-34097 - https://github.com/markyason/markyason.github.io CVE-2024-34102 - https://github.com/Mr-xn/Penetration_Testing_POC CVE-2024-34102 - https://github.com/Ostorlab/KEV +CVE-2024-34102 - https://github.com/f0ur0four/Insecure-Deserialization CVE-2024-34102 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-34102 - https://github.com/redwaysecurity/CVEs CVE-2024-3413 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -168762,7 +168914,14 @@ CVE-2024-35195 - https://github.com/PBorocz/raindrop-io-py CVE-2024-35195 - https://github.com/astellingwerf/renovate-requests-allowedVersion CVE-2024-35195 - https://github.com/seal-community/patches CVE-2024-35205 - https://github.com/Ch0pin/related_work +CVE-2024-35206 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-35207 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-35208 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-35209 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3521 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-35210 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-35211 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-35212 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3522 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3523 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-35231 - https://github.com/Sim4n6/Sim4n6 @@ -168821,6 +168980,7 @@ CVE-2024-35520 - https://github.com/AnixPasBesoin/AnixPasBesoin CVE-2024-35522 - https://github.com/AnixPasBesoin/AnixPasBesoin CVE-2024-35523 - https://github.com/AnixPasBesoin/AnixPasBesoin CVE-2024-35524 - https://github.com/AnixPasBesoin/AnixPasBesoin +CVE-2024-35537 - https://github.com/aaravavi/TVS-Connect-Application-VAPT CVE-2024-35548 - https://github.com/bytyme/MybatisPlusSQLInjection CVE-2024-35591 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-35592 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -168903,6 +169063,7 @@ CVE-2024-36079 - https://github.com/DxRvs/vaultize_CVE-2024-36079 CVE-2024-36079 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-36104 - https://github.com/Co5mos/nuclei-tps CVE-2024-36104 - https://github.com/Mr-xn/CVE-2024-32113 +CVE-2024-36104 - https://github.com/RacerZ-fighting/CVE-2024-32113-POC CVE-2024-36104 - https://github.com/Threekiii/Awesome-POC CVE-2024-36104 - https://github.com/Threekiii/CVE CVE-2024-36104 - https://github.com/enomothem/PenTestNote @@ -168940,6 +169101,7 @@ CVE-2024-36405 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-36412 - https://github.com/wy876/POC CVE-2024-36412 - https://github.com/wy876/wiki CVE-2024-36416 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-36424 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-36426 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-36428 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-36428 - https://github.com/tanjiti/sec_profile @@ -169091,6 +169253,7 @@ CVE-2024-37891 - https://github.com/PBorocz/raindrop-io-py CVE-2024-37894 - https://github.com/MegaManSec/Squid-Security-Audit CVE-2024-37923 - https://github.com/20142995/nuclei-templates CVE-2024-3797 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-38021 - https://github.com/cybereagle2001/KQL-Security-Querries CVE-2024-38030 - https://github.com/tomerpeled92/CVE CVE-2024-38041 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-3806 - https://github.com/nomi-sec/PoC-in-GitHub @@ -169098,6 +169261,7 @@ CVE-2024-3806 - https://github.com/tanjiti/sec_profile CVE-2024-3806 - https://github.com/truonghuuphuc/CVE-2024-3806-AND-CVE-2024-3807-Poc CVE-2024-3807 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-3807 - https://github.com/truonghuuphuc/CVE-2024-3806-AND-CVE-2024-3807-Poc +CVE-2024-38100 - https://github.com/tanjiti/sec_profile CVE-2024-38112 - https://github.com/thepcn3rd/goAdventures CVE-2024-3817 - https://github.com/dellalibera/dellalibera CVE-2024-3817 - https://github.com/otms61/vex_dir @@ -169159,9 +169323,12 @@ CVE-2024-3879 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-3880 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-3881 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-3882 - https://github.com/LaPhilosophie/IoT-vulnerable +CVE-2024-38856 - https://github.com/Ostorlab/KEV +CVE-2024-38856 - https://github.com/RacerZ-fighting/CVE-2024-32113-POC CVE-2024-38856 - https://github.com/RacerZ-fighting/RacerZ-fighting CVE-2024-38856 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-38856 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-38856 - https://github.com/tanjiti/sec_profile CVE-2024-3889 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3891 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3892 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -169176,11 +169343,13 @@ CVE-2024-3907 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-39071 - https://github.com/Y5neKO/Y5neKO CVE-2024-39072 - https://github.com/Y5neKO/Y5neKO CVE-2024-3908 - https://github.com/LaPhilosophie/IoT-vulnerable +CVE-2024-39081 - https://github.com/Amirasaiyad/BLE-TPMS CVE-2024-39081 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-3909 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-39090 - https://github.com/arijitdirghangi/arijitdirghangi CVE-2024-3910 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-3914 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-3914 - https://github.com/leesh3288/leesh3288 CVE-2024-39203 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-39210 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-39211 - https://github.com/nomi-sec/PoC-in-GitHub @@ -169212,6 +169381,7 @@ CVE-2024-39674 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3968 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-39689 - https://github.com/PBorocz/raindrop-io-py CVE-2024-39689 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-39689 - https://github.com/roy-aladin/InfraTest CVE-2024-39694 - https://github.com/IdentityServer/IdentityServer4 CVE-2024-3970 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-39700 - https://github.com/nomi-sec/PoC-in-GitHub @@ -169222,6 +169392,7 @@ CVE-2024-39863 - https://github.com/ch4n3-yoon/ch4n3-yoon CVE-2024-39877 - https://github.com/ch4n3-yoon/ch4n3-yoon CVE-2024-39884 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-39899 - https://github.com/nbxiglk0/nbxiglk0 +CVE-2024-39903 - https://github.com/sunriseXu/sunriseXu CVE-2024-39908 - https://github.com/lifeparticle/Ruby-Cheatsheet CVE-2024-3991 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-39911 - https://github.com/wy876/POC @@ -169237,6 +169408,7 @@ CVE-2024-4003 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4006 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-40096 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4010 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-40101 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-40110 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-40119 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-4021 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -169283,6 +169455,7 @@ CVE-2024-4040 - https://github.com/zgimszhd61/cve-exploit-collection-scanner CVE-2024-4042 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-40422 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-40492 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-40498 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-40498 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-40506 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-40507 - https://github.com/nomi-sec/PoC-in-GitHub @@ -169291,6 +169464,7 @@ CVE-2024-40509 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-40510 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-40511 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-40512 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-40530 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4058 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4059 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4060 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -169306,6 +169480,7 @@ CVE-2024-4068 - https://github.com/seal-community/patches CVE-2024-40725 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-40725 - https://github.com/tanjiti/sec_profile CVE-2024-40784 - https://github.com/gandalf4a/crash_report +CVE-2024-40789 - https://github.com/leesh3288/leesh3288 CVE-2024-4083 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4085 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4086 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -169337,6 +169512,7 @@ CVE-2024-4119 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-4120 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-4121 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-4122 - https://github.com/LaPhilosophie/IoT-vulnerable +CVE-2024-41226 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4123 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-4124 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-4125 - https://github.com/LaPhilosophie/IoT-vulnerable @@ -169391,11 +169567,17 @@ CVE-2024-41819 - https://github.com/alessio-romano/Sfoffo-Pentesting-Notes CVE-2024-41819 - https://github.com/alessio-romano/alessio-romano CVE-2024-41827 - https://github.com/tanjiti/sec_profile CVE-2024-4186 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-41910 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-41911 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-41913 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-41943 - https://github.com/alessio-romano/Sfoffo-Pentesting-Notes CVE-2024-41943 - https://github.com/alessio-romano/alessio-romano CVE-2024-41946 - https://github.com/lifeparticle/Ruby-Cheatsheet +CVE-2024-41958 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-4199 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-41995 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4200 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-42010 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4202 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4203 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-42041 - https://github.com/actuator/cve @@ -169473,6 +169655,7 @@ CVE-2024-4358 - https://github.com/Harydhk7/CVE-2024-4358 CVE-2024-4358 - https://github.com/Ostorlab/KEV CVE-2024-4358 - https://github.com/RevoltSecurities/CVE-2024-4358 CVE-2024-4358 - https://github.com/Sk1dr0wz/CVE-2024-4358_Mass_Exploit +CVE-2024-4358 - https://github.com/f0ur0four/Insecure-Deserialization CVE-2024-4358 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-4358 - https://github.com/securitycipher/daily-bugbounty-writeups CVE-2024-4358 - https://github.com/sinsinology/CVE-2024-4358 @@ -169608,6 +169791,7 @@ CVE-2024-4577 - https://github.com/wy876/POC CVE-2024-4577 - https://github.com/wy876/wiki CVE-2024-4577 - https://github.com/xcanwin/CVE-2024-4577-PHP-RCE CVE-2024-4577 - https://github.com/zomasec/CVE-2024-4577 +CVE-2024-4578 - https://github.com/cyllective/CVEs CVE-2024-4582 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4583 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4584 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -169924,6 +170108,7 @@ CVE-2024-6027 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6028 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-6050 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-6095 - https://github.com/sev-hack/sev-hack +CVE-2024-6100 - https://github.com/leesh3288/leesh3288 CVE-2024-6120 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6147 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6153 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -169966,6 +170151,7 @@ CVE-2024-6387 - https://github.com/Threekiii/CVE CVE-2024-6387 - https://github.com/TrojanAZhen/Self_Back CVE-2024-6387 - https://github.com/azurejoga/CVE-2024-6387-how-to-fix CVE-2024-6387 - https://github.com/bigb0x/CVE-2024-6387 +CVE-2024-6387 - https://github.com/cybereagle2001/KQL-Security-Querries CVE-2024-6387 - https://github.com/enomothem/PenTestNote CVE-2024-6387 - https://github.com/giterlizzi/secdb-feeds CVE-2024-6387 - https://github.com/invaderslabs/regreSSHion-CVE-2024-6387- @@ -169992,10 +170178,13 @@ CVE-2024-6589 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6629 - https://github.com/20142995/nuclei-templates CVE-2024-6646 - https://github.com/wy876/POC CVE-2024-6646 - https://github.com/wy876/wiki +CVE-2024-6651 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6666 - https://github.com/JohnnyBradvo/CVE-2024-6666 CVE-2024-6666 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-6695 - https://github.com/20142995/nuclei-templates CVE-2024-6703 - https://github.com/fluentform/fluentform +CVE-2024-6731 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-6732 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6738 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-6750 - https://github.com/20142995/nuclei-templates CVE-2024-6751 - https://github.com/20142995/nuclei-templates @@ -170004,6 +170193,10 @@ CVE-2024-6753 - https://github.com/20142995/nuclei-templates CVE-2024-6754 - https://github.com/20142995/nuclei-templates CVE-2024-6755 - https://github.com/20142995/nuclei-templates CVE-2024-6756 - https://github.com/20142995/nuclei-templates +CVE-2024-6766 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-6779 - https://github.com/leesh3288/leesh3288 +CVE-2024-6802 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-6807 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6836 - https://github.com/20142995/nuclei-templates CVE-2024-6865 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6896 - https://github.com/20142995/nuclei-templates @@ -170028,7 +170221,15 @@ CVE-2024-7080 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7081 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7091 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7120 - https://github.com/komodoooo/Some-things +CVE-2024-7212 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7213 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7214 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7215 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7216 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7246 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7297 - https://github.com/JoshuaMart/JoshuaMart +CVE-2024-7317 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7339 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-7339 - https://github.com/tanjiti/sec_profile CVE-2024-7383 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7395 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -170063,6 +170264,9 @@ CVE-2024-7467 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7468 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7469 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7470 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7521 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7529 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7552 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-87654 - https://github.com/runwuf/clickhouse-test CVE-2024-98765 - https://github.com/runwuf/clickhouse-test CVE-2024-99999 - https://github.com/kolewttd/wtt diff --git a/references.txt b/references.txt index d57b7003fc..7b8438c54e 100644 --- a/references.txt +++ b/references.txt @@ -1864,6 +1864,7 @@ CVE-2005-1514 - http://www.openwall.com/lists/oss-security/2020/05/19/8 CVE-2005-1515 - http://packetstormsecurity.com/files/157805/Qualys-Security-Advisory-Qmail-Remote-Code-Execution.html CVE-2005-1515 - http://seclists.org/fulldisclosure/2020/May/42 CVE-2005-1515 - http://www.openwall.com/lists/oss-security/2020/05/19/8 +CVE-2005-1517 - http://www.cisco.com/warp/public/707/cisco-sa-20050511-url.shtml CVE-2005-1519 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9976 CVE-2005-1532 - http://www.redhat.com/support/errata/RHSA-2005-601.html CVE-2005-1547 - http://marc.info/?l=bugtraq&m=111600439331242&w=2 @@ -51005,6 +51006,7 @@ CVE-2018-15877 - https://www.exploit-db.com/exploits/45274/ CVE-2018-15884 - http://packetstormsecurity.com/files/149082/RICOH-MP-C4504ex-Cross-Site-Request-Forgery.html CVE-2018-15884 - https://www.exploit-db.com/exploits/45264/ CVE-2018-15890 - https://github.com/frohoff/ysoserial/ +CVE-2018-15891 - https://wiki.freepbx.org/display/FOP/2018-09-11+Core+Stored+XSS?src=contextnavpagetreemode CVE-2018-15892 - https://wiki.freepbx.org/display/FOP/2018-09-11+DISA+SQL+Injection CVE-2018-15893 - https://github.com/wuzhicms/wuzhicms/issues/149 CVE-2018-15894 - https://github.com/wuzhicms/wuzhicms/issues/150 @@ -80341,6 +80343,7 @@ CVE-2022-1092 - https://wpscan.com/vulnerability/95759d5c-8802-4493-b7e5-7f2bc54 CVE-2022-1093 - https://wpscan.com/vulnerability/57017050-811e-474d-8256-33d19d4c0553 CVE-2022-1094 - https://wpscan.com/vulnerability/3c03816b-e381-481c-b9f5-63d0c24ff329 CVE-2022-1095 - https://wpscan.com/vulnerability/bf476a3e-05ba-4b54-8a65-3d261ad5337b +CVE-2022-1102 - https://vuldb.com/?id.195786 CVE-2022-1103 - https://wpscan.com/vulnerability/9ddeef95-7c7f-4296-a55b-fd3304c91c18 CVE-2022-1104 - https://wpscan.com/vulnerability/4d4709f3-ad38-4519-a24a-73bc04b20e52 CVE-2022-1106 - https://huntr.dev/bounties/16b9d0ea-71ed-41bc-8a88-2deb4c20be8f @@ -93094,6 +93097,7 @@ CVE-2023-38495 - https://github.com/crossplane/crossplane/blob/ac8b24fe739c5d942 CVE-2023-38501 - http://packetstormsecurity.com/files/173821/Copyparty-1.8.6-Cross-Site-Scripting.html CVE-2023-38501 - https://github.com/9001/copyparty/security/advisories/GHSA-f54q-j679-p9hh CVE-2023-38502 - https://github.com/taosdata/TDengine/security/advisories/GHSA-w23f-r2fm-27hf +CVE-2023-38506 - https://github.com/laurent22/joplin/security/advisories/GHSA-m59c-9rrj-c399 CVE-2023-38507 - https://github.com/strapi/strapi/security/advisories/GHSA-24q2-59hm-rh9r CVE-2023-3853 - https://vuldb.com/?id.235205 CVE-2023-38543 - https://northwave-cybersecurity.com/vulnerability-notice/denial-of-service-in-ivanti-secure-access-client-driver @@ -93123,6 +93127,7 @@ CVE-2023-38702 - https://github.com/KnowageLabs/Knowage-Server/security/advisori CVE-2023-3878 - https://github.com/E1CHO/cve_hub/blob/main/Beauty%20Salon%20Management%20System/Beauty%20Salon%20Management%20System%20-%20vuln%2010.pdf CVE-2023-38817 - https://ioctl.fail/echo-ac-writeup/ CVE-2023-3882 - https://vuldb.com/?id.235244 +CVE-2023-38823 - https://github.com/johnathanhuutri/CVE_report/blob/master/CVE-2023-38823/README.md CVE-2023-38823 - https://github.com/nhtri2003gmail/CVE_report/blob/master/CVE-2023-38823.md CVE-2023-38829 - https://github.com/adhikara13/CVE-2023-38829-NETIS-WF2409E CVE-2023-3883 - https://github.com/E1CHO/cve_hub/blob/main/Beauty%20Salon%20Management%20System/Beauty%20Salon%20Management%20System%20-%20vuln%2015.pdf @@ -93145,6 +93150,7 @@ CVE-2023-3887 - https://vuldb.com/?id.235249 CVE-2023-38870 - https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38870 CVE-2023-38872 - https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38872 CVE-2023-38874 - https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38874 +CVE-2023-38875 - https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38875 CVE-2023-38876 - https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38876 CVE-2023-38877 - https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38877 CVE-2023-38879 - https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38879 @@ -93166,6 +93172,7 @@ CVE-2023-38921 - https://github.com/FirmRec/IoT-Vulns/tree/main/netgear/upgrade_ CVE-2023-38943 - https://github.com/0x727/ShuiZe_0x727 CVE-2023-38943 - https://github.com/0x727/ShuiZe_0x727/issues/160 CVE-2023-38947 - https://gitee.com/CTF-hacker/pwn/issues/I7LH2N +CVE-2023-38947 - https://github.com/capture0x/WBCE_CMS CVE-2023-38947 - https://packetstormsecurity.com/files/176018/WBCE-CMS-1.6.1-Shell-Upload.html CVE-2023-38948 - https://gitee.com/CTF-hacker/pwn/issues/I7LI4E CVE-2023-3896 - https://github.com/vim/vim/issues/12528 @@ -93179,6 +93186,7 @@ CVE-2023-38970 - https://panda002.hashnode.dev/badaso-version-297-has-an-xss-vul CVE-2023-38971 - https://github.com/anh91/uasoft-indonesia--badaso/blob/main/XSS3.md CVE-2023-38971 - https://panda002.hashnode.dev/badaso-version-297-has-xss-vulnerability-in-add-ranks CVE-2023-38973 - https://github.com/anh91/uasoft-indonesia--badaso/blob/main/xss5.md +CVE-2023-38974 - https://github.com/anh91/uasoft-indonesia--badaso/blob/main/XSS4.md CVE-2023-38975 - https://github.com/qdrant/qdrant/issues/2268 CVE-2023-38996 - https://gist.github.com/RNPG/53b579da330ba896aa8dc2d901e5e400 CVE-2023-38997 - https://logicaltrust.net/blog/2023/08/opnsense.html @@ -94722,6 +94730,7 @@ CVE-2023-48841 - http://packetstormsecurity.com/files/176058 CVE-2023-48849 - https://github.com/delsploit/CVE-2023-48849 CVE-2023-48858 - https://github.com/Shumerez/CVE-2023-48858 CVE-2023-48859 - https://github.com/xieqiang11/security_research/blob/main/TOTOLINK-A3002RU-RCE.md +CVE-2023-48860 - https://github.com/xieqiang11/security_research/blob/main/TOTOLINK-N300RT-RCE.md CVE-2023-48861 - https://github.com/xieqiang11/POC4/blob/main/README.md CVE-2023-48863 - https://gitee.com/NoBlake/cve-2023-48863/ CVE-2023-48866 - https://nitipoom-jar.github.io/CVE-2023-48866/ @@ -94934,6 +94943,7 @@ CVE-2023-49781 - https://github.com/nocodb/nocodb/security/advisories/GHSA-h6r4- CVE-2023-49786 - http://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html CVE-2023-49786 - http://seclists.org/fulldisclosure/2023/Dec/24 CVE-2023-4979 - https://huntr.dev/bounties/e67f8f5d-4048-404f-9b86-cb6b8719b77f +CVE-2023-49793 - https://github.com/Ericsson/codechecker/security/advisories/GHSA-h26w-r4m5-8rrf CVE-2023-49794 - https://github.com/tiann/KernelSU/security/advisories/GHSA-8rc5-x54x-5qc4 CVE-2023-49799 - https://github.com/johannschopplich/nuxt-api-party/security/advisories/GHSA-3wfp-253j-5jxv CVE-2023-4980 - https://huntr.dev/bounties/470b9b13-b7fe-4b3f-a186-fdc5dc193976 @@ -95332,6 +95342,7 @@ CVE-2023-52564 - http://www.openwall.com/lists/oss-security/2024/04/11/9 CVE-2023-5259 - https://github.com/RCEraser/cve/blob/main/ForU-CMS.md CVE-2023-5261 - https://github.com/csbsong/bug_report/blob/main/sql2.md CVE-2023-5264 - https://github.com/yhy217/huakecms-vul/issues/1 +CVE-2023-5265 - https://github.com/YaGaoT/cve/blob/main/sql.md CVE-2023-5267 - https://github.com/kpz-wm/cve/blob/main/sql.md CVE-2023-5284 - https://vuldb.com/?id.240912 CVE-2023-5286 - https://github.com/xcodeOn1/XSS-Stored-Expense-Tracker-App @@ -95460,6 +95471,7 @@ CVE-2023-5690 - https://huntr.com/bounties/980c75a5-d978-4b0e-9bcc-2b2682c97e01 CVE-2023-5700 - https://github.com/istlnight/cve/blob/main/NS-ASG-sql-uploadiscgwrouteconf.md CVE-2023-5708 - https://www.wordfence.com/threat-intel/vulnerabilities/id/d96e5986-8c89-4e7e-aa63-f41aa13eeff4?source=cve CVE-2023-5718 - https://gist.github.com/CalumHutton/bdb97077a66021ed455f87823cd7c7cb +CVE-2023-5719 - https://support.redlion.net/hc/en-us/categories/360002087671-Security-Advisories CVE-2023-5724 - https://bugzilla.mozilla.org/show_bug.cgi?id=1836705 CVE-2023-5725 - https://bugzilla.mozilla.org/show_bug.cgi?id=1845739 CVE-2023-5729 - https://bugzilla.mozilla.org/show_bug.cgi?id=1823720 @@ -95479,6 +95491,7 @@ CVE-2023-5774 - https://drive.google.com/file/d/1zXWW545ktCznO36k90AN0APhTz8ky-g CVE-2023-5774 - https://www.wordfence.com/threat-intel/vulnerabilities/id/33c2756d-c300-479f-b3aa-8f22c3a70278?source=cve CVE-2023-5779 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7cmj-963q-jj47 CVE-2023-5780 - https://github.com/RCEraser/cve/blob/main/sql_inject_5.md +CVE-2023-5781 - https://github.com/wangxinyudad/cve/blob/main/sql.md CVE-2023-5783 - https://github.com/halleyakina/cve/blob/main/sql.md CVE-2023-5784 - https://github.com/gb111d/ns-asg_poc/ CVE-2023-5784 - https://vuldb.com/?id.243590 @@ -96143,6 +96156,7 @@ CVE-2024-0974 - https://wpscan.com/vulnerability/7f8e5e63-a928-443e-9771-8b3f51f CVE-2024-0985 - https://saites.dev/projects/personal/postgres-cve-2024-0985/ CVE-2024-0986 - https://drive.google.com/file/d/10BYLQ7Rk4oag96afLZouSvDDPvsO7SoJ/view?usp=drive_link CVE-2024-0998 - https://vuldb.com/?id.252267 +CVE-2024-1001 - https://vuldb.com/?id.252270 CVE-2024-1008 - https://vuldb.com/?id.252277 CVE-2024-1009 - https://youtu.be/oL98TSjy89Q?si=_T6YkJZlbn7SJ4Gn CVE-2024-1010 - https://github.com/jomskiller/Employee-Management-System---Stored-XSS @@ -96155,6 +96169,7 @@ CVE-2024-1017 - https://packetstormsecurity.com/files/176714/Gabriels-FTP-Server CVE-2024-1017 - https://www.youtube.com/watch?v=wwHuXfYS8yQ CVE-2024-1019 - https://owasp.org/www-project-modsecurity/tab_cves#cve-2024-1019-2024-01-30 CVE-2024-1020 - https://www.yuque.com/mailemonyeyongjuan/tha8tr/gdd3hiwz8uo6ylab +CVE-2024-1021 - https://vuldb.com/?id.252290 CVE-2024-1021 - https://www.yuque.com/mailemonyeyongjuan/tha8tr/yemvnt5uo53gfem5 CVE-2024-1022 - https://drive.google.com/file/d/1lPZ1yL9UlU-uB03xz17q4OR9338X_1am/view?usp=sharing CVE-2024-1028 - https://vuldb.com/?id.252301 @@ -96193,6 +96208,7 @@ CVE-2024-1252 - https://vuldb.com/?id.252991 CVE-2024-1253 - https://github.com/b51s77/cve/blob/main/upload.md CVE-2024-1254 - https://github.com/rockersiyuan/CVE/blob/main/Smart%20S20.md CVE-2024-1266 - https://drive.google.com/file/d/16a9lQqUFBICw-Hhbe9bT5sSB7qwZjMwA/view?usp=sharing +CVE-2024-1267 - https://vuldb.com/?id.253010 CVE-2024-1269 - https://github.com/PrecursorYork/Product-Management-System-Using-PHP-and-MySQL-Reflected-XSS-POC/blob/main/README.md CVE-2024-1273 - https://wpscan.com/vulnerability/9784d7c8-e3aa-42af-ace8-5b2b37ebc9cb/ CVE-2024-1274 - https://wpscan.com/vulnerability/91dba45b-9930-4bfb-a7bf-903c46864e9f/ @@ -96285,6 +96301,7 @@ CVE-2024-1871 - https://vuldb.com/?id.254694 CVE-2024-1874 - http://www.openwall.com/lists/oss-security/2024/04/12/11 CVE-2024-1874 - https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7 CVE-2024-1876 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20EMPLOYEE%20MANAGEMENT%20SYSTEM/Employee%20Project%20SQL%20Injection%20Update.md +CVE-2024-1876 - https://vuldb.com/?id.254724 CVE-2024-1877 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20EMPLOYEE%20MANAGEMENT%20SYSTEM/Employee%20Leave%20Cancel%20SQL%20Injection.md CVE-2024-1878 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20EMPLOYEE%20MANAGEMENT%20SYSTEM/IDOR%20Employee%20Profile.md CVE-2024-1892 - https://huntr.com/bounties/271f94f2-1e05-4616-ac43-41752389e26b @@ -96293,6 +96310,7 @@ CVE-2024-1905 - https://wpscan.com/vulnerability/b9a448d2-4bc2-4933-8743-58c8768 CVE-2024-1919 - https://vuldb.com/?id.254854 CVE-2024-1922 - https://vuldb.com/?id.254857 CVE-2024-1923 - https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/SOURCECODESTER%20%5BSimple%20Student%20Attendance%20System%20using%20PHP%20and%20MySQL%5D%20SQLi%20on%20ajax-api.php%3Faction=delete_class.md +CVE-2024-1923 - https://vuldb.com/?id.254858 CVE-2024-1924 - https://github.com/1testnew/CVE_Hunter/blob/main/SQLi-1.md CVE-2024-1926 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Free%20and%20Open%20Source%20inventory%20management%20system-SQLi.md CVE-2024-1927 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Web-Based%20Student%20Clearance%20System%20-%20SQLi.md @@ -98710,6 +98728,7 @@ CVE-2024-36800 - https://github.com/want1997/SEMCMS_VUL/blob/main/Download_sql_v CVE-2024-36801 - https://github.com/want1997/SEMCMS_VUL/blob/main/Download_sql_vul_2.md CVE-2024-36821 - https://github.com/IvanGlinkin/CVE-2024-36821 CVE-2024-36837 - https://github.com/phtcloud-dev/CVE-2024-36837 +CVE-2024-36840 - http://seclists.org/fulldisclosure/2024/Jun/0 CVE-2024-36840 - https://infosec-db.github.io/CyberDepot/vuln_boelter_blue/ CVE-2024-36840 - https://packetstormsecurity.com/files/178978/Boelter-Blue-System-Management-1.3-SQL-Injection.html CVE-2024-36840 - https://sploitus.com/exploit?id=PACKETSTORM:178978 @@ -98728,6 +98747,7 @@ CVE-2024-36886 - https://git.kernel.org/stable/c/a0fbb26f8247e326a320e2cb4395bfb CVE-2024-36886 - https://git.kernel.org/stable/c/e19ec8ab0e25bc4803d7cc91c84e84532e2781bd CVE-2024-36886 - https://git.kernel.org/stable/c/ffd4917c1edb3c3ff334fce3704fbe9c39f35682 CVE-2024-3690 - https://github.com/psudo-bugboy/CVE-2024 +CVE-2024-3690 - https://vuldb.com/?submit.312974 CVE-2024-3691 - https://github.com/nikhil-aniill/Small-CRM-CVE CVE-2024-3691 - https://vuldb.com/?submit.312975 CVE-2024-3692 - https://wpscan.com/vulnerability/6f100f85-3a76-44be-8092-06eb8595b0c9/ @@ -98740,6 +98760,7 @@ CVE-2024-3710 - https://wpscan.com/vulnerability/bde10913-4f7e-4590-86eb-33bfa90 CVE-2024-37153 - https://github.com/evmos/evmos/security/advisories/GHSA-xgr7-jgq3-mhmc CVE-2024-37160 - https://github.com/getformwork/formwork/security/advisories/GHSA-5pxr-7m4j-jjc6 CVE-2024-37161 - https://github.com/metersphere/metersphere/security/advisories/GHSA-6h7v-q5rp-h6q9 +CVE-2024-37169 - https://github.com/user-attachments/files/15536336/Arbitrary.File.Read.via.Playwright.s.Screenshot.Feature.Exploiting.File.Wrapper.pdf CVE-2024-3720 - https://github.com/scausoft/cve/blob/main/sql.md CVE-2024-3721 - https://github.com/netsecfish/tbk_dvr_command_injection CVE-2024-3721 - https://vuldb.com/?id.260573 @@ -98747,6 +98768,7 @@ CVE-2024-37273 - https://github.com/HackAllSec/CVEs/tree/main/Jan%20Arbitrary%20 CVE-2024-37298 - https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3 CVE-2024-37301 - https://github.com/adfinis/document-merge-service/security/advisories/GHSA-v5gf-r78h-55q6 CVE-2024-37308 - https://github.com/XjSv/Cooked/security/advisories/GHSA-9vfv-c966-jwrv +CVE-2024-37309 - https://github.com/crate/crate/security/advisories/GHSA-x268-qpg6-w9g2 CVE-2024-37310 - https://github.com/EVerest/everest-core/security/advisories/GHSA-8g9q-7qr9-vc96 CVE-2024-3735 - https://vuldb.com/?submit.311153 CVE-2024-37386 - https://advisories.stormshield.eu/2024-017 @@ -98775,6 +98797,7 @@ CVE-2024-37631 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOL CVE-2024-37632 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/loginAuth/README.md CVE-2024-37633 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWiFiGuestCfg/README.md CVE-2024-37634 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWiFiEasyCfg/README.md +CVE-2024-37635 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWiFiBasicCfg/README.md CVE-2024-37637 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWizardCfg/README.md CVE-2024-37639 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setIpPortFilterRules/README.md CVE-2024-37640 - https://github.com/s4ndw1ch136/IOT-vuln-reports/tree/main/TOTOLINK/A3700R/setWiFiEasyGuestCfg @@ -98786,6 +98809,7 @@ CVE-2024-3765 - https://github.com/netsecfish/xiongmai_incorrect_access_control CVE-2024-3765 - https://github.com/netsecfish/xiongmai_incorrect_access_control/blob/main/pocCheck3-en.py CVE-2024-37661 - https://github.com/ouuan/router-vuln-report/blob/master/icmp-redirect/tl-7dr5130-redirect.md CVE-2024-37662 - https://github.com/ouuan/router-vuln-report/blob/master/nat-rst/tl-7dr5130-nat-rst.md +CVE-2024-37663 - https://github.com/ouuan/router-vuln-report/blob/master/icmp-redirect/redmi-rb03-redirect.md CVE-2024-3767 - https://github.com/BurakSevben/CVEs/blob/main/News%20Portal/News%20Portal%20-%20SQL%20Injection%20-%203.md CVE-2024-37671 - https://github.com/MohamedAzizMSALLEMI/Docubase_Security/blob/main/CVE-2024-37671.md CVE-2024-37672 - https://github.com/MohamedAzizMSALLEMI/Docubase_Security/blob/main/CVE-2024-37672.md @@ -98798,25 +98822,36 @@ CVE-2024-3769 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%2 CVE-2024-3770 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20SQL%20Injection%20-%203.md CVE-2024-3771 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20SQL%20Injection%20-%204.md CVE-2024-37726 - https://github.com/carsonchan12345/CVE-2024-37726-MSI-Center-Local-Privilege-Escalation +CVE-2024-37734 - https://github.com/A3h1nt/CVEs/tree/main/OpenEMR CVE-2024-37742 - https://github.com/Eteblue/CVE-2024-37742 +CVE-2024-37759 - https://github.com/crumbledwall/CVE-2024-37759_PoC CVE-2024-37791 - https://github.com/duxphp/DuxCMS3/issues/5 CVE-2024-37799 - https://github.com/himanshubindra/CVEs/blob/main/CVE-2024-37799 CVE-2024-37800 - https://github.com/SandeepRajauriya/CVEs/blob/main/CVE-2024-37800 +CVE-2024-37802 - https://github.com/SandeepRajauriya/CVEs/blob/main/CVE-2024-37802 CVE-2024-37803 - https://github.com/himanshubindra/CVEs/blob/main/CVE-2024-37803 +CVE-2024-37820 - https://github.com/pingcap/tidb/issues/53580 CVE-2024-37829 - https://github.com/sysentr0py/CVEs/tree/main/CVE-2024-37829 CVE-2024-37830 - https://github.com/sysentr0py/CVEs/tree/main/CVE-2024-37830 CVE-2024-37840 - https://github.com/ganzhi-qcy/cve/issues/4 CVE-2024-37843 - https://blog.smithsecurity.biz/craft-cms-unauthenticated-sqli-via-graphql CVE-2024-37848 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/13 CVE-2024-37849 - https://github.com/ganzhi-qcy/cve/issues/3 +CVE-2024-37855 - https://github.com/sudo-subho/nepstech-xpon-router-rce CVE-2024-37856 - https://packetstormsecurity.com/files/179078/Lost-And-Found-Information-System-1.0-Cross-Site-Scripting.html CVE-2024-37857 - https://packetstormsecurity.com/files/179080/Lost-And-Found-Information-System-1.0-SQL-Injection.html CVE-2024-37858 - https://packetstormsecurity.com/files/179079/Lost-And-Found-Information-System-1.0-SQL-Injection.html CVE-2024-37859 - https://packetstormsecurity.com/files/179081/Lost-And-Found-Information-System-1.0-Cross-Site-Scripting.html +CVE-2024-37870 - https://github.com/TThuyyy/cve1/issues/3 +CVE-2024-37871 - https://github.com/TThuyyy/cve1/issues/1 +CVE-2024-37872 - https://github.com/TThuyyy/cve1/issues/4 +CVE-2024-37873 - https://github.com/TThuyyy/cve1/issues/2 CVE-2024-37877 - https://github.com/f4rs1ght/vuln-research/tree/main/CVE-2024-37877 CVE-2024-37880 - https://github.com/antoonpurnal/clangover CVE-2024-37880 - https://pqshield.com/pqshield-plugs-timing-leaks-in-kyber-ml-kem-to-improve-pqc-implementation-maturity/ CVE-2024-37889 - https://github.com/TreyWW/MyFinances/security/advisories/GHSA-4884-3gvp-3wj2 +CVE-2024-37890 - https://github.com/websockets/ws/issues/2230 +CVE-2024-37890 - https://github.com/websockets/ws/pull/2231 CVE-2024-37890 - https://github.com/websockets/ws/security/advisories/GHSA-3h5v-q93c-6h6q CVE-2024-37895 - https://github.com/lobehub/lobe-chat/security/advisories/GHSA-p36r-qxgx-jq2v CVE-2024-37896 - https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gf3r-h744-mqgp @@ -99093,11 +99128,18 @@ CVE-2024-4094 - https://wpscan.com/vulnerability/04b2feba-e009-4fce-8539-5dfdb43 CVE-2024-4096 - https://wpscan.com/vulnerability/4dba5e9e-24be-458a-9150-7c7a958e66cb/ CVE-2024-4105 - https://web-material3.yokogawa.com/1/36059/files/YSAR-24-0001-E.pdf CVE-2024-4106 - https://web-material3.yokogawa.com/1/36059/files/YSAR-24-0001-E.pdf +CVE-2024-41108 - https://github.com/FOGProject/fogproject/security/advisories/GHSA-p3f9-4jj4-fm2g CVE-2024-4111 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/SetLEDCfg.md +CVE-2024-41112 - https://github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py#L373-L376 +CVE-2024-41112 - https://github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py#L380 CVE-2024-41112 - https://securitylab.github.com/advisories/GHSL-2024-100_GHSL-2024-108_streamlit-geospatial/ CVE-2024-41113 - https://securitylab.github.com/advisories/GHSL-2024-100_GHSL-2024-108_streamlit-geospatial/ CVE-2024-41114 - https://securitylab.github.com/advisories/GHSL-2024-100_GHSL-2024-108_streamlit-geospatial/ +CVE-2024-41115 - https://github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py#L488 +CVE-2024-41115 - https://github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py#L493 CVE-2024-41115 - https://securitylab.github.com/advisories/GHSL-2024-100_GHSL-2024-108_streamlit-geospatial/ +CVE-2024-41116 - https://github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py#L1254 +CVE-2024-41116 - https://github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py#L1345 CVE-2024-41116 - https://securitylab.github.com/advisories/GHSL-2024-100_GHSL-2024-108_streamlit-geospatial/ CVE-2024-41117 - https://securitylab.github.com/advisories/GHSL-2024-100_GHSL-2024-108_streamlit-geospatial/ CVE-2024-41118 - https://securitylab.github.com/advisories/GHSL-2024-100_GHSL-2024-108_streamlit-geospatial/ @@ -99106,6 +99148,7 @@ CVE-2024-4112 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX CVE-2024-41120 - https://securitylab.github.com/advisories/GHSL-2024-100_GHSL-2024-108_streamlit-geospatial/ CVE-2024-41127 - https://securitylab.github.com/advisories/GHSL-2024-167_monkeytype CVE-2024-4113 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/fromSetSysTime.md +CVE-2024-41130 - https://github.com/ggerganov/llama.cpp/security/advisories/GHSA-49q7-2jmh-92fp CVE-2024-4114 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/setSmartPowerManagement.md CVE-2024-4115 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formAddDnsForward.md CVE-2024-4116 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formDelDhcpRule.md @@ -99121,22 +99164,65 @@ CVE-2024-4124 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W1 CVE-2024-4125 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetStaticRoute.md CVE-2024-4126 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetSysTime.md CVE-2024-4127 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/guestWifiRuleRefresh.md +CVE-2024-41281 - https://github.com/BuaaIOTTeam/Iot_Linksys/blob/main/Linksys_WRT54G_get_merge_mac.md +CVE-2024-41354 - https://github.com/phpipam/phpipam/issues/4150 +CVE-2024-41355 - https://github.com/phpipam/phpipam/issues/4151 +CVE-2024-41373 - https://github.com/xjzzzxx/vulFound/blob/main/icecoder/icecoder8.1_PT.md +CVE-2024-41375 - https://github.com/xjzzzxx/vulFound/blob/main/icecoder/icecoder8.1_xss1.md +CVE-2024-41380 - https://github.com/microweber/microweber/issues/1111 +CVE-2024-41381 - https://github.com/microweber/microweber/issues/1110 CVE-2024-4140 - https://github.com/rjbs/Email-MIME/issues/66 +CVE-2024-41437 - https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-r1-cp_unfilter-cute_png-1019c11/poc/sample6.png +CVE-2024-41437 - https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-r1-cp_unfilter-cute_png-1019c11/vulDescription.assets/image-20240530183857985.png +CVE-2024-41437 - https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-r1-cp_unfilter-cute_png-1019c11/vulDescription.md +CVE-2024-41437 - https://github.com/Helson-S/FuzzyTesting/tree/master/hicolor/heapof-r1-cp_unfilter-cute_png-1019c11 +CVE-2024-41437 - https://github.com/Helson-S/FuzzyTesting/tree/master/hicolor/heapof-r1-cp_unfilter-cute_png-1019c11/poc +CVE-2024-41438 - https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-r65280-cp_stored-cute_png-543c2 +CVE-2024-41438 - https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-r65280-cp_stored-cute_png-543c2/vulDescription.assets/image-20240530184723547.png +CVE-2024-41438 - https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-r65280-cp_stored-cute_png-543c2/vulDescription.assets/image-20240530184848743.png +CVE-2024-41438 - https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-r65280-cp_stored-cute_png-543c2/vulDescription.assets/image-20240530185015780.png +CVE-2024-41438 - https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-r65280-cp_stored-cute_png-543c2/vulDescription.md +CVE-2024-41438 - https://github.com/Helson-S/FuzzyTesting/tree/master/hicolor/heapof-r65280-cp_stored-cute_png-543c2/poc +CVE-2024-41438 - https://github.com/Helson-S/FuzzyTesting/tree/master/hicolor/heapof-r65280-cp_stored-cute_png-543c2/poc/sample10.png +CVE-2024-41439 - https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-w98-cp_block-5c0-cute_png-642c5 +CVE-2024-41439 - https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-w98-cp_block-5c0-cute_png-642c5/poc +CVE-2024-41439 - https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-w98-cp_block-5c0-cute_png-642c5/poc/sample13.png +CVE-2024-41439 - https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-w98-cp_block-5c0-cute_png-642c5/vulDescription.assets/image-20240530192505615.png +CVE-2024-41439 - https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-w98-cp_block-5c0-cute_png-642c5/vulDescription.assets/image-20240531002753478.png +CVE-2024-41439 - https://github.com/Helson-S/FuzzyTesting/blob/master/hicolor/heapof-w98-cp_block-5c0-cute_png-642c5/vulDescription.md CVE-2024-4145 - https://wpscan.com/vulnerability/7d5b8764-c82d-4969-a707-f38b63bcadca/ +CVE-2024-41459 - https://github.com/iotresearch/iot-vuln/blob/main/Tenda/FH1201/QuickIndex/QuickIndex.md +CVE-2024-41460 - https://github.com/iotresearch/iot-vuln/blob/main/Tenda/FH1201/RouteStatic/README.md +CVE-2024-41461 - https://github.com/iotresearch/iot-vuln/blob/main/Tenda/FH1201/DhcpListClient/README.md +CVE-2024-41462 - https://github.com/iotresearch/iot-vuln/blob/main/Tenda/FH1201/DhcpListClient2/README.md +CVE-2024-41463 - https://github.com/iotresearch/iot-vuln/blob/main/Tenda/FH1201/addressNat/README.md +CVE-2024-41464 - https://github.com/iotresearch/iot-vuln/tree/main/Tenda/FH1201/RouteStatic2 CVE-2024-4149 - https://wpscan.com/vulnerability/0256ec2a-f1a9-4110-9978-ee88f9e24237/ +CVE-2024-41492 - https://gist.github.com/Swind1er/4176fdc25e415296904c9fb19e2f8293 CVE-2024-41597 - https://gist.github.com/DefensiumDevelopers/608be4d10b016dce0566925368a8b08c#file-cve-2024-41597-md CVE-2024-41637 - https://blog.0xzon.dev/2024-07-27-CVE-2024-41637/ CVE-2024-4164 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/G3V15/formModifyPppAuthWhiteMac.md CVE-2024-4165 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/G3V15/modifyDhcpRule.md +CVE-2024-41655 - https://github.com/danocmx/node-tf2-item-format/security/advisories/GHSA-8h55-q5qq-p685 CVE-2024-4166 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_41E858_GO.md +CVE-2024-41665 - https://github.com/ampache/ampache/security/advisories/GHSA-cp44-89r2-fxph +CVE-2024-41666 - https://github.com/argoproj/argo-cd/security/advisories/GHSA-v8wx-v5jq-qhhw CVE-2024-41668 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-004 CVE-2024-4167 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_422AA4.md +CVE-2024-41671 - https://github.com/twisted/twisted/security/advisories/GHSA-c8m8-j448-xjx7 +CVE-2024-41672 - https://github.com/duckdb/duckdb/security/advisories/GHSA-w2gf-jxc9-pf2q CVE-2024-4168 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_4260F0.md CVE-2024-4169 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_42775C.md CVE-2024-4170 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_429A30.md CVE-2024-4171 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromWizardHandle.md CVE-2024-4172 - https://github.com/bigbigbigbaby/cms2/blob/main/1.md CVE-2024-4180 - https://wpscan.com/vulnerability/b2a92316-e404-4a5e-8426-f88df6e87550/ +CVE-2024-41812 - https://github.com/TxtDot/txtdot/security/advisories/GHSA-4gj5-xj97-j8fp +CVE-2024-41817 - https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-8rxc-922v-phg8 +CVE-2024-41818 - https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-mpg4-rc92-vx8v +CVE-2024-41819 - https://github.com/enchant97/note-mark/security/advisories/GHSA-rm48-9mqf-8jc3 +CVE-2024-41945 - https://github.com/FuelLabs/fuels-ts/security/advisories/GHSA-3jcg-vx7f-j6qf +CVE-2024-41957 - https://github.com/vim/vim/security/advisories/GHSA-f9cr-gv85-hcr4 CVE-2024-4201 - https://gitlab.com/gitlab-org/gitlab/-/issues/458229 CVE-2024-42029 - https://github.com/hyprwm/xdg-desktop-portal-hyprland/issues/242 CVE-2024-42054 - https://github.com/CervantesSec/cervantes/commit/78631a034d0fb3323a53fb7428b2022b29a0d2cd @@ -99585,6 +99671,7 @@ CVE-2024-6373 - https://github.com/Abyssun/abyssun-/issues/1 CVE-2024-6387 - http://www.openwall.com/lists/oss-security/2024/07/03/5 CVE-2024-6387 - http://www.openwall.com/lists/oss-security/2024/07/28/2 CVE-2024-6387 - https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server +CVE-2024-6387 - https://news.ycombinator.com/item?id=40843778 CVE-2024-6387 - https://santandersecurityresearch.github.io/blog/sshing_the_masses.html CVE-2024-6387 - https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html CVE-2024-6390 - https://wpscan.com/vulnerability/00586687-33c7-4d84-b606-0478b1063d24/ @@ -99607,6 +99694,7 @@ CVE-2024-6526 - https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/i CVE-2024-6529 - https://wpscan.com/vulnerability/1a346c9a-cc1a-46b1-b27a-a77a38449933/ CVE-2024-6531 - https://www.herodevs.com/vulnerability-directory/cve-2024-6531 CVE-2024-6536 - https://wpscan.com/vulnerability/ee40c1c6-4186-4b97-866c-fb0e76cedeb8/ +CVE-2024-6651 - https://wpscan.com/vulnerability/65e2c77d-09bd-4a44-81d9-d7a5db0e0f84/ CVE-2024-6652 - https://github.com/littletree7/cve/issues/1 CVE-2024-6695 - https://wpscan.com/vulnerability/4afa5c85-ce27-4ca7-bba2-61fb39c53a5b/ CVE-2024-6710 - https://wpscan.com/vulnerability/1afcf9d4-c2f9-4d47-8d9e-d7fa6ae2358d/ @@ -99614,7 +99702,11 @@ CVE-2024-6716 - https://gitlab.com/libtiff/libtiff/-/issues/620 CVE-2024-6729 - https://reports-kunull.vercel.app/CVE%20research/2024/cve-2024-6729 CVE-2024-6731 - https://reports-kunull.vercel.app/CVE%20research/2024/cve-2024-6731 CVE-2024-6732 - https://reports-kunull.vercel.app/CVE%20research/2024/cve-2024-6732 +CVE-2024-6732 - https://vuldb.com/?submit.374370 CVE-2024-6745 - https://github.com/xzyxiaohaha/cve/issues/2 +CVE-2024-6766 - https://wpscan.com/vulnerability/77bb1dcf-4e84-497a-955e-f3c0b649ad1c/ +CVE-2024-6781 - https://starlabs.sg/advisories/24/24-6781/ +CVE-2024-6782 - https://starlabs.sg/advisories/24/24-6782/ CVE-2024-6783 - https://www.herodevs.com/vulnerability-directory/cve-2024-6783---vue-client-side-xss CVE-2024-6802 - https://reports-kunull.vercel.app/CVE%20research/2024/cve-2024-6802 CVE-2024-6807 - https://reports-kunull.vercel.app/CVE%20research/2024/cve-2024-6807 @@ -99626,6 +99718,7 @@ CVE-2024-6912 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-perten CVE-2024-6913 - http://seclists.org/fulldisclosure/2024/Jul/13 CVE-2024-6913 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-perten-processplus/ CVE-2024-6932 - https://github.com/Hebing123/cve/issues/42 +CVE-2024-6933 - https://github.com/Hebing123/cve/issues/55 CVE-2024-6934 - https://github.com/DeepMountains/Mirage/blob/main/CVE-2.md CVE-2024-6938 - https://github.com/siyuan-note/siyuan/issues/11650 CVE-2024-6938 - https://github.com/siyuan-note/siyuan/issues/11949 @@ -99640,14 +99733,21 @@ CVE-2024-6963 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/O3 CVE-2024-6966 - https://github.com/HermesCui/CVE/issues/1 CVE-2024-6967 - https://github.com/rtsjx-cve/cve/blob/main/sql.md CVE-2024-7007 - https://www.cisa.gov/news-events/ics-advisories/icsa-24-207-02 +CVE-2024-7008 - https://starlabs.sg/advisories/24/24-7008/ +CVE-2024-7055 - https://ffmpeg.org/ +CVE-2024-7055 - https://ffmpeg.org/download.html +CVE-2024-7055 - https://github.com/CookedMelon/ReportCVE/tree/main/FFmpeg/poc3 CVE-2024-7065 - https://github.com/topsky979/Security-Collections/blob/main/1700810/README.md CVE-2024-7066 - https://vuldb.com/?id.272347 CVE-2024-7067 - https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18 CVE-2024-7067 - https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18#issuecomment-2192470359 CVE-2024-7067 - https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18#issuecomment-2206863135 +CVE-2024-7068 - https://github.com/rtsjx-cve/cve/blob/main/xss2.md CVE-2024-7069 - https://github.com/pineapple65/cve/blob/main/sql.md CVE-2024-7080 - https://github.com/Xu-Mingming/cve/blob/main/bianli.md CVE-2024-7081 - https://github.com/zgg012/cve/issues/1 +CVE-2024-7082 - https://wpscan.com/vulnerability/8f30e685-00fa-4dbb-b516-2d14e4b13697/ +CVE-2024-7084 - https://wpscan.com/vulnerability/0d38bf4d-de6a-49f8-be69-fa483fa61bb7/ CVE-2024-7106 - https://github.com/topsky979/Security-Collections/blob/main/cve3/README.md CVE-2024-7114 - https://github.com/topsky979/Security-Collections/tree/main/cve5 CVE-2024-7115 - https://github.com/topsky979/Security-Collections/tree/main/cve6 @@ -99712,6 +99812,7 @@ CVE-2024-7226 - https://github.com/Xu-Mingming/cve/blob/main/CSRF2.md CVE-2024-7273 - https://github.com/DeepMountains/Mirage/blob/main/CVE8-1.md CVE-2024-7274 - https://github.com/DeepMountains/Mirage/blob/main/CVE8-2.md CVE-2024-7275 - https://github.com/DeepMountains/Mirage/blob/main/CVE8-3.md +CVE-2024-7275 - https://vuldb.com/?submit.381093 CVE-2024-7276 - https://github.com/DeepMountains/Mirage/blob/main/CVE8-4.md CVE-2024-7277 - https://github.com/DeepMountains/Mirage/blob/main/CVE8-5.md CVE-2024-7278 - https://github.com/DeepMountains/Mirage/blob/main/CVE8-6.md @@ -99775,6 +99876,9 @@ CVE-2024-7375 - https://gist.github.com/topsky979/840587360c33d53efb359ff314f7ea CVE-2024-7376 - https://gist.github.com/topsky979/8c36e6a899fc02e8054f67b94e34f6c6 CVE-2024-7377 - https://gist.github.com/topsky979/4415a08deadd16356484d5ff540e60f9 CVE-2024-7378 - https://gist.github.com/topsky979/d4cb58afc5fb41f647b1021d1364d846 +CVE-2024-7395 - https://cyberdanube.com/de/en-multiple-vulnerabilities-in-korenix-jetport/ +CVE-2024-7396 - https://cyberdanube.com/de/en-multiple-vulnerabilities-in-korenix-jetport/ +CVE-2024-7397 - https://cyberdanube.com/de/en-multiple-vulnerabilities-in-korenix-jetport/ CVE-2024-7437 - https://github.com/Fewword/Poc/blob/main/smf/smf-poc1.md CVE-2024-7438 - https://github.com/Fewword/Poc/blob/main/smf/smf-poc2.md CVE-2024-7444 - https://github.com/DeepMountains/Mirage/blob/main/CVE10-1.md @@ -99794,3 +99898,11 @@ CVE-2024-7462 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK CVE-2024-7463 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/CP900/UploadCustomModule.md CVE-2024-7464 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/CP900/setTelnetCfg.md CVE-2024-7465 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/CP450/loginauth.md +CVE-2024-7494 - https://github.com/lche511/cve/blob/main/sql2.md +CVE-2024-7496 - https://github.com/DeepMountains/zzz/blob/main/CVE1-1.md +CVE-2024-7497 - https://github.com/DeepMountains/zzz/blob/main/CVE1-2.md +CVE-2024-7498 - https://github.com/DeepMountains/zzz/blob/main/CVE1-3.md +CVE-2024-7499 - https://github.com/DeepMountains/zzz/blob/main/CVE1-4.md +CVE-2024-7500 - https://github.com/DeepMountains/zzz/blob/main/CVE1-5.md +CVE-2024-7505 - https://github.com/CveSecLook/cve/issues/56 +CVE-2024-7506 - https://github.com/CveSecLook/cve/issues/57