mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-15 03:30:24 +02:00
Update CVE sources 2024-06-07 17:53
This commit is contained in:
@@ -15,6 +15,7 @@ Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb
|
||||
#### Github
|
||||
- https://github.com/Ostorlab/KEV
|
||||
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||||
- https://github.com/bibin-paul-trustme/ruby_repo
|
||||
- https://github.com/jasnow/585-652-ruby-advisory-db
|
||||
- https://github.com/omarkurt/cve-2014-0130
|
||||
- https://github.com/rubysec/ruby-advisory-db
|
||||
|
||||
@@ -18,6 +18,7 @@ The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not p
|
||||
- https://hackerone.com/reports/6626
|
||||
|
||||
#### Github
|
||||
- https://github.com/00xNetrunner/Shodan_Cheet-Sheet
|
||||
- https://github.com/0day404/vulnerability-poc
|
||||
- https://github.com/0x0d3ad/Kn0ck
|
||||
- https://github.com/0x90/CVE-2014-0160
|
||||
|
||||
@@ -26,6 +26,7 @@ OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not pr
|
||||
- https://kc.mcafee.com/corporate/index?page=content&id=SB10075
|
||||
|
||||
#### Github
|
||||
- https://github.com/00xNetrunner/Shodan_Cheet-Sheet
|
||||
- https://github.com/0nopnop/qualysparser
|
||||
- https://github.com/1N3/MassBleed
|
||||
- https://github.com/84KaliPleXon3/a2sv
|
||||
|
||||
@@ -16,4 +16,5 @@ No PoCs from references.
|
||||
- https://github.com/Haifisch/dayswithoutansslexploit
|
||||
- https://github.com/fhightower/ioc-finder
|
||||
- https://github.com/guilhermeG23/manual_suricata_simples
|
||||
- https://github.com/xssec/xshodan
|
||||
|
||||
|
||||
@@ -29,6 +29,7 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th
|
||||
- https://www.exploit-db.com/exploits/42938/
|
||||
|
||||
#### Github
|
||||
- https://github.com/00xNetrunner/Shodan_Cheet-Sheet
|
||||
- https://github.com/0bfxgh0st/cve-2014-6271
|
||||
- https://github.com/0x00-0x00/CVE-2014-6271
|
||||
- https://github.com/0x0d3ad/Kn0ck
|
||||
@@ -368,6 +369,7 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th
|
||||
- https://github.com/francisck/shellshock-cgi
|
||||
- https://github.com/fxschaefer/ejpt
|
||||
- https://github.com/gabemarshall/shocknaww
|
||||
- https://github.com/gauss77/LaboratoriosHack
|
||||
- https://github.com/ghoneycutt/puppet-module-cve
|
||||
- https://github.com/gipi/cve-cemetery
|
||||
- https://github.com/giterlizzi/secdb-feeds
|
||||
@@ -542,6 +544,7 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th
|
||||
- https://github.com/riikunn1004/oscp-cheatsheet
|
||||
- https://github.com/rjdj0261/-Awesome-Hacking-
|
||||
- https://github.com/rmetzler/ansible-shellshock-fix
|
||||
- https://github.com/rodolfomarianocy/OSCP-Tricks-2023
|
||||
- https://github.com/roninAPT/pentest-kit
|
||||
- https://github.com/rrmomaya2900/0dayWriteup-THM
|
||||
- https://github.com/rrreeeyyy/cve-2014-6271-spec
|
||||
|
||||
@@ -13,6 +13,7 @@ Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/s
|
||||
- https://puppet.com/security/cve/cve-2014-7829
|
||||
|
||||
#### Github
|
||||
- https://github.com/bibin-paul-trustme/ruby_repo
|
||||
- https://github.com/jasnow/585-652-ruby-advisory-db
|
||||
- https://github.com/rubysec/ruby-advisory-db
|
||||
- https://github.com/tdunning/github-advisory-parser
|
||||
|
||||
@@ -14,6 +14,7 @@ Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/s
|
||||
- https://puppet.com/security/cve/cve-2014-7829
|
||||
|
||||
#### Github
|
||||
- https://github.com/bibin-paul-trustme/ruby_repo
|
||||
- https://github.com/jasnow/585-652-ruby-advisory-db
|
||||
- https://github.com/rubysec/ruby-advisory-db
|
||||
- https://github.com/zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-
|
||||
|
||||
Reference in New Issue
Block a user