Update CVE sources 2024-06-07 17:53

This commit is contained in:
0xMarcio
2024-06-07 17:53:02 +00:00
parent 436163792c
commit e6ecd99f3d
205 changed files with 5340 additions and 34 deletions
+1
View File
@@ -15,6 +15,7 @@ Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb
#### Github
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/bibin-paul-trustme/ruby_repo
- https://github.com/jasnow/585-652-ruby-advisory-db
- https://github.com/omarkurt/cve-2014-0130
- https://github.com/rubysec/ruby-advisory-db
+1
View File
@@ -18,6 +18,7 @@ The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not p
- https://hackerone.com/reports/6626
#### Github
- https://github.com/00xNetrunner/Shodan_Cheet-Sheet
- https://github.com/0day404/vulnerability-poc
- https://github.com/0x0d3ad/Kn0ck
- https://github.com/0x90/CVE-2014-0160
+1
View File
@@ -26,6 +26,7 @@ OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not pr
- https://kc.mcafee.com/corporate/index?page=content&id=SB10075
#### Github
- https://github.com/00xNetrunner/Shodan_Cheet-Sheet
- https://github.com/0nopnop/qualysparser
- https://github.com/1N3/MassBleed
- https://github.com/84KaliPleXon3/a2sv
+1
View File
@@ -16,4 +16,5 @@ No PoCs from references.
- https://github.com/Haifisch/dayswithoutansslexploit
- https://github.com/fhightower/ioc-finder
- https://github.com/guilhermeG23/manual_suricata_simples
- https://github.com/xssec/xshodan
+3
View File
@@ -29,6 +29,7 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th
- https://www.exploit-db.com/exploits/42938/
#### Github
- https://github.com/00xNetrunner/Shodan_Cheet-Sheet
- https://github.com/0bfxgh0st/cve-2014-6271
- https://github.com/0x00-0x00/CVE-2014-6271
- https://github.com/0x0d3ad/Kn0ck
@@ -368,6 +369,7 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th
- https://github.com/francisck/shellshock-cgi
- https://github.com/fxschaefer/ejpt
- https://github.com/gabemarshall/shocknaww
- https://github.com/gauss77/LaboratoriosHack
- https://github.com/ghoneycutt/puppet-module-cve
- https://github.com/gipi/cve-cemetery
- https://github.com/giterlizzi/secdb-feeds
@@ -542,6 +544,7 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th
- https://github.com/riikunn1004/oscp-cheatsheet
- https://github.com/rjdj0261/-Awesome-Hacking-
- https://github.com/rmetzler/ansible-shellshock-fix
- https://github.com/rodolfomarianocy/OSCP-Tricks-2023
- https://github.com/roninAPT/pentest-kit
- https://github.com/rrmomaya2900/0dayWriteup-THM
- https://github.com/rrreeeyyy/cve-2014-6271-spec
+1
View File
@@ -13,6 +13,7 @@ Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/s
- https://puppet.com/security/cve/cve-2014-7829
#### Github
- https://github.com/bibin-paul-trustme/ruby_repo
- https://github.com/jasnow/585-652-ruby-advisory-db
- https://github.com/rubysec/ruby-advisory-db
- https://github.com/tdunning/github-advisory-parser
+1
View File
@@ -14,6 +14,7 @@ Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/s
- https://puppet.com/security/cve/cve-2014-7829
#### Github
- https://github.com/bibin-paul-trustme/ruby_repo
- https://github.com/jasnow/585-652-ruby-advisory-db
- https://github.com/rubysec/ruby-advisory-db
- https://github.com/zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-