diff --git a/2013/CVE-2013-0422.md b/2013/CVE-2013-0422.md index 53103aba2..ee9299c0b 100644 --- a/2013/CVE-2013-0422.md +++ b/2013/CVE-2013-0422.md @@ -27,6 +27,7 @@ Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attacker - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/SaitoLab/supercookie +- https://github.com/binkeys/k8tools - https://github.com/filip0308/cookie - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/gabrielbauman/evercookie-applet diff --git a/2015/CVE-2015-1701.md b/2015/CVE-2015-1701.md index 587b2d902..b124adf80 100644 --- a/2015/CVE-2015-1701.md +++ b/2015/CVE-2015-1701.md @@ -46,6 +46,7 @@ Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vist - https://github.com/TamilHackz/windows-exploitation - https://github.com/YSheldon/New - https://github.com/ambynotcoder/C-libraries +- https://github.com/binkeys/k8tools - https://github.com/blackend/Diario-RedTem - https://github.com/cyberanand1337x/bug-bounty-2022 - https://github.com/fei9747/WindowsElevation diff --git a/2016/CVE-2016-8735.md b/2016/CVE-2016-8735.md index 89f5db7ce..75093ea31 100644 --- a/2016/CVE-2016-8735.md +++ b/2016/CVE-2016-8735.md @@ -30,6 +30,7 @@ Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7 - https://github.com/ZTK-009/RedTeamer - https://github.com/bibortone/Jexboss - https://github.com/c002/Java-Application-Exploits +- https://github.com/ecomtech-oss/pisc - https://github.com/fengjixuchui/RedTeamer - https://github.com/gyanaa/https-github.com-joaomatosf-jexboss - https://github.com/ilmari666/cybsec diff --git a/2017/CVE-2017-0914.md b/2017/CVE-2017-0914.md index 9491fe997..7452ba0f8 100644 --- a/2017/CVE-2017-0914.md +++ b/2017/CVE-2017-0914.md @@ -13,5 +13,5 @@ Gitlab Community and Enterprise Editions version 10.1, 10.2, and 10.2.4 are vuln - https://hackerone.com/reports/298176 #### Github -No PoCs found on GitHub currently. +- https://github.com/EdOverflow/security-template diff --git a/2018/CVE-2018-1123.md b/2018/CVE-2018-1123.md index dd34b2b97..8fa0006c3 100644 --- a/2018/CVE-2018-1123.md +++ b/2018/CVE-2018-1123.md @@ -16,5 +16,6 @@ procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via m #### Github - https://github.com/aravinddathd/CVE-2018-1123 +- https://github.com/ecomtech-oss/pisc - https://github.com/samokat-oss/pisc diff --git a/2018/CVE-2018-2628.md b/2018/CVE-2018-2628.md index bbb088b37..376662228 100644 --- a/2018/CVE-2018-2628.md +++ b/2018/CVE-2018-2628.md @@ -68,6 +68,7 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar - https://github.com/awake1t/Awesome-hacking-tools - https://github.com/awsassets/weblogic_exploit - https://github.com/bakery312/Vulhub-Reproduce +- https://github.com/binkeys/k8tools - https://github.com/cross2to/betaseclab_tools - https://github.com/cscadoge/weblogic-cve-2018-2628 - https://github.com/cyberanand1337x/bug-bounty-2022 diff --git a/2020/CVE-2020-1337.md b/2020/CVE-2020-1337.md index e5a5e9bd6..181af1714 100644 --- a/2020/CVE-2020-1337.md +++ b/2020/CVE-2020-1337.md @@ -47,6 +47,7 @@ An elevation of privilege vulnerability exists when the Windows Print Spooler se - http://packetstormsecurity.com/files/160993/Microsoft-Spooler-Local-Privilege-Elevation.html #### Github +- https://github.com/0xMarcio/cve - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon - https://github.com/Al1ex/WindowsElevation diff --git a/2021/CVE-2021-44228.md b/2021/CVE-2021-44228.md index 24c1a05b7..13e5fb904 100644 --- a/2021/CVE-2021-44228.md +++ b/2021/CVE-2021-44228.md @@ -770,6 +770,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - https://github.com/e-hakson/OSCP - https://github.com/eclipse-archived/kuksa.integration - https://github.com/eclipse-scout/scout.rt +- https://github.com/ecomtech-oss/pisc - https://github.com/edsonjt81/log4-scanner - https://github.com/edsonjt81/log4j-scan - https://github.com/edsonjt81/nse-log4shell diff --git a/2021/CVE-2021-45046.md b/2021/CVE-2021-45046.md index 028edc19e..473cc4758 100644 --- a/2021/CVE-2021-45046.md +++ b/2021/CVE-2021-45046.md @@ -137,6 +137,7 @@ It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was i - https://github.com/docker-solr/docker-solr - https://github.com/doris0213/assignments - https://github.com/dtact/divd-2021-00038--log4j-scanner +- https://github.com/ecomtech-oss/pisc - https://github.com/edsonjt81/log4-scanner - https://github.com/edsonjt81/log4j-scan - https://github.com/edsonjt81/nse-log4shell diff --git a/2023/CVE-2023-1209.md b/2023/CVE-2023-1209.md new file mode 100644 index 000000000..71b7c01e3 --- /dev/null +++ b/2023/CVE-2023-1209.md @@ -0,0 +1,17 @@ +### [CVE-2023-1209](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1209) +![](https://img.shields.io/static/v1?label=Product&message=ServiceNow%20Records&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%20Tokyo%20Patch%205%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) + +### Description + +Cross-Site Scripting (XSS) vulnerabilities exist in ServiceNow records allowing an authenticated attacker to inject arbitrary scripts. + +### POC + +#### Reference +- https://www.linkedin.com/in/osamay/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2023/CVE-2023-1298.md b/2023/CVE-2023-1298.md index 85a781ab1..b1646cc29 100644 --- a/2023/CVE-2023-1298.md +++ b/2023/CVE-2023-1298.md @@ -10,7 +10,7 @@ ServiceNow has released upgrades and patches that address a Reflected Cross-Site ### POC #### Reference -No PoCs from references. +- https://www.linkedin.com/in/osamay/ #### Github - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2023/CVE-2023-1713.md b/2023/CVE-2023-1713.md index baba158cd..d4c85a579 100644 --- a/2023/CVE-2023-1713.md +++ b/2023/CVE-2023-1713.md @@ -16,4 +16,5 @@ Insecure temporary file creation in bitrix/modules/crm/lib/order/import/instagra - https://github.com/ForceFledgling/CVE-2023-1713 - https://github.com/k1rurk/check_bitrix - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/tanjiti/sec_profile diff --git a/2023/CVE-2023-38969.md b/2023/CVE-2023-38969.md index b9b466bff..ed520764b 100644 --- a/2023/CVE-2023-38969.md +++ b/2023/CVE-2023-38969.md @@ -10,6 +10,7 @@ Cross Site Scripting vulnerabiltiy in Badaso v.2.9.7 allows a remote attacker to ### POC #### Reference +- https://github.com/anh91/uasoft-indonesia--badaso/blob/main/XSS2.md - https://panda002.hashnode.dev/badaso-version-297-has-an-xss-vulnerability-in-add-books #### Github diff --git a/2023/CVE-2023-3897.md b/2023/CVE-2023-3897.md index 5a44ea6c9..f15f85aff 100644 --- a/2023/CVE-2023-3897.md +++ b/2023/CVE-2023-3897.md @@ -14,4 +14,5 @@ Username enumeration is possible through Bypassing CAPTCHA in On-premise SureMDM #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-46280.md b/2023/CVE-2023-46280.md index 6a75d326b..6ce4b8b68 100644 --- a/2023/CVE-2023-46280.md +++ b/2023/CVE-2023-46280.md @@ -1,54 +1,11 @@ ### [CVE-2023-46280](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46280) -![](https://img.shields.io/static/v1?label=Product&message=S7-PCT&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Automation%20Tool&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20BATCH%20V9.1&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20NET%20PC%20Software%20V16&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20NET%20PC%20Software%20V17&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20NET%20PC%20Software%20V18&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20PCS%207%20V9.1&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20PDM%20V9.2&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Route%20Control%20V9.1&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20STEP%207%20V5&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20WinCC%20OA%20V3.17&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20WinCC%20OA%20V3.18&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20WinCC%20OA%20V3.19&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20WinCC%20Runtime%20Advanced&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20WinCC%20Runtime%20Professional%20V16&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20WinCC%20Runtime%20Professional%20V17&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20WinCC%20Runtime%20Professional%20V18&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20WinCC%20Runtime%20Professional%20V19&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20WinCC%20Unified%20PC%20Runtime&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20WinCC%20V7.4&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20WinCC%20V7.5&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20WinCC%20V8.0&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SINAMICS%20Startdrive&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SINUMERIK%20ONE%20virtual&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=SINUMERIK%20PLC%20Programming%20Tool&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=Security%20Configuration%20Tool%20(SCT)&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=TIA%20Portal%20Cloud%20Connector&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=Totally%20Integrated%20Automation%20Portal%20(TIA%20Portal)%20V15.1&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=Totally%20Integrated%20Automation%20Portal%20(TIA%20Portal)%20V16&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=Totally%20Integrated%20Automation%20Portal%20(TIA%20Portal)%20V17&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=Totally%20Integrated%20Automation%20Portal%20(TIA%20Portal)%20V18&color=blue) -![](https://img.shields.io/static/v1?label=Product&message=Totally%20Integrated%20Automation%20Portal%20(TIA%20Portal)%20V19&color=blue) -![](https://img.shields.io/static/v1?label=Version&message=%3D%20All%20versions%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Version&message=0%3C%20*%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V16%20Update%206%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V18%20SP1%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V18%20Update%204%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V19%20SP1%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V19%20Update%202%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V2.0%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V3.18%20P025%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V3.19%20P010%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V6.23%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V7.5%20SP2%20Update%2017%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V8.0%20Update%205%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Product&message=SINEC%20NMS&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V3.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-125%3A%20Out-of-bounds%20Read&color=brighgreen) ### Description -A vulnerability has been identified in S7-PCT (All versions), Security Configuration Tool (SCT) (All versions), SIMATIC Automation Tool (All versions), SIMATIC BATCH V9.1 (All versions), SIMATIC NET PC Software V16 (All versions), SIMATIC NET PC Software V17 (All versions), SIMATIC NET PC Software V18 (All versions < V18 SP1), SIMATIC PCS 7 V9.1 (All versions), SIMATIC PDM V9.2 (All versions), SIMATIC Route Control V9.1 (All versions), SIMATIC STEP 7 V5 (All versions), SIMATIC WinCC OA V3.17 (All versions), SIMATIC WinCC OA V3.18 (All versions < V3.18 P025), SIMATIC WinCC OA V3.19 (All versions < V3.19 P010), SIMATIC WinCC Runtime Advanced (All versions), SIMATIC WinCC Runtime Professional V16 (All versions < V16 Update 6), SIMATIC WinCC Runtime Professional V17 (All versions), SIMATIC WinCC Runtime Professional V18 (All versions < V18 Update 4), SIMATIC WinCC Runtime Professional V19 (All versions < V19 Update 2), SIMATIC WinCC Unified PC Runtime (All versions), SIMATIC WinCC V7.4 (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 17), SIMATIC WinCC V8.0 (All versions < V8.0 Update 5), SINAMICS Startdrive (All versions < V19 SP1), SINUMERIK ONE virtual (All versions < V6.23), SINUMERIK PLC Programming Tool (All versions), TIA Portal Cloud Connector (All versions < V2.0), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 4), Totally Integrated Automation Portal (TIA Portal) V19 (All versions < V19 Update 2). The affected applications contain an out of bounds read vulnerability. This could allow an attacker to cause a Blue Screen of Death (BSOD) crash of the underlying Windows kernel. +A vulnerability has been identified in SINEC NMS (All versions < V3.0). The affected applications contain an out of bounds read vulnerability. This could allow an attacker to cause a Blue Screen of Death (BSOD) crash of the underlying Windows kernel. ### POC diff --git a/2023/CVE-2023-48171.md b/2023/CVE-2023-48171.md new file mode 100644 index 000000000..57b70714f --- /dev/null +++ b/2023/CVE-2023-48171.md @@ -0,0 +1,17 @@ +### [CVE-2023-48171](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48171) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue in OWASP DefectDojo before v.1.5.3.1 allows a remote attacker to escalate privileges via the user permissions component. + +### POC + +#### Reference +- https://gccybermonks.com/posts/defectdojo/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2023/CVE-2023-4911.md b/2023/CVE-2023-4911.md index 7f90c473d..d59576825 100644 --- a/2023/CVE-2023-4911.md +++ b/2023/CVE-2023-4911.md @@ -51,6 +51,7 @@ A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so whi - https://github.com/b4k3d/POC_CVE4911 - https://github.com/beruangsalju/LocalPrivilegeEscalation - https://github.com/chaudharyarjun/LooneyPwner +- https://github.com/ecomtech-oss/pisc - https://github.com/feereel/wb_soc - https://github.com/fiksn/security-nix - https://github.com/flex0geek/cves-exploits diff --git a/2024/CVE-2024-21550.md b/2024/CVE-2024-21550.md new file mode 100644 index 000000000..f69ac6abf --- /dev/null +++ b/2024/CVE-2024-21550.md @@ -0,0 +1,17 @@ +### [CVE-2024-21550](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21550) +![](https://img.shields.io/static/v1?label=Product&message=SteVe&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%203.5.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=Stored%20Cross-site%20Scripting&color=brighgreen) + +### Description + +SteVe is an open platform that implements different version of the OCPP protocol for Electric Vehicle charge points, acting as a central server for management of registered charge points. Attackers can inject arbitrary HTML and Javascript code via WebSockets leading to persistent Cross-Site Scripting in the SteVe management interface. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-21626.md b/2024/CVE-2024-21626.md index fdd7cf3dd..7d64792f9 100644 --- a/2024/CVE-2024-21626.md +++ b/2024/CVE-2024-21626.md @@ -32,6 +32,7 @@ runc is a CLI tool for spawning and running containers on Linux according to the - https://github.com/bfengj/Cloud-Security - https://github.com/cdxiaodong/CVE-2024-21626 - https://github.com/dorser/cve-2024-21626 +- https://github.com/ecomtech-oss/pisc - https://github.com/fireinrain/github-trending - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/jafshare/GithubTrending diff --git a/2024/CVE-2024-2177.md b/2024/CVE-2024-2177.md new file mode 100644 index 000000000..925705dda --- /dev/null +++ b/2024/CVE-2024-2177.md @@ -0,0 +1,17 @@ +### [CVE-2024-2177](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2177) +![](https://img.shields.io/static/v1?label=Product&message=GitLab&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=16.3%3C%2016.11.5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1021%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames&color=brighgreen) + +### Description + +A Cross Window Forgery vulnerability exists within GitLab CE/EE affecting all versions from 16.3 prior to 16.11.5, 17.0 prior to 17.0.3, and 17.1 prior to 17.1.1. This condition allows for an attacker to abuse the OAuth authentication flow via a crafted payload. + +### POC + +#### Reference +- https://gitlab.com/gitlab-org/gitlab/-/issues/444467 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-2259.md b/2024/CVE-2024-2259.md new file mode 100644 index 000000000..2b2e3f8b1 --- /dev/null +++ b/2024/CVE-2024-2259.md @@ -0,0 +1,17 @@ +### [CVE-2024-2259](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2259) +![](https://img.shields.io/static/v1?label=Product&message=InstaRISPACS&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%203.0.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20'Cross-site%20Scripting')&color=brighgreen) + +### Description + +This vulnerability exists in InstaRISPACS software due to insufficient validation of user supplied input for the loginTo parameter in user login module of the web interface of the application. A remote attacker could exploit this vulnerability by sending a specially crafted input to the vulnerable parameter to perform reflected Cross Site Scripting (XSS) attacks on the targeted system. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-23709.md b/2024/CVE-2024-23709.md index 57d732097..a2c1f4bea 100644 --- a/2024/CVE-2024-23709.md +++ b/2024/CVE-2024-23709.md @@ -13,5 +13,5 @@ In multiple locations, there is a possible out of bounds write due to a heap buf - https://android.googlesource.com/platform/external/sonivox/+/3f798575d2d39cd190797427d13471d6e7ceae4c #### Github -No PoCs found on GitHub currently. +- https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-27442.md b/2024/CVE-2024-27442.md new file mode 100644 index 000000000..072f4567b --- /dev/null +++ b/2024/CVE-2024-27442.md @@ -0,0 +1,17 @@ +### [CVE-2024-27442](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27442) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. The zmmailboxdmgr binary, a component of ZCS, is intended to be executed by the zimbra user with root privileges for specific mailbox operations. However, an attacker can escalate privileges from the zimbra user to root, because of improper handling of input arguments. An attacker can execute arbitrary commands with elevated privileges, leading to local privilege escalation. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-27443.md b/2024/CVE-2024-27443.md new file mode 100644 index 000000000..bd90b58a2 --- /dev/null +++ b/2024/CVE-2024-27443.md @@ -0,0 +1,18 @@ +### [CVE-2024-27443](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27443) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. A Cross-Site Scripting (XSS) vulnerability exists in the CalendarInvite feature of the Zimbra webmail classic user interface, because of improper input validation in the handling of the calendar header. An attacker can exploit this via an email message containing a crafted calendar header with an embedded XSS payload. When a victim views this message in the Zimbra webmail classic interface, the payload is executed in the context of the victim's session, potentially leading to execution of arbitrary JavaScript code. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/nhiephon/Research + diff --git a/2024/CVE-2024-3094.md b/2024/CVE-2024-3094.md index c27dcb325..28b2ddfee 100644 --- a/2024/CVE-2024-3094.md +++ b/2024/CVE-2024-3094.md @@ -84,6 +84,7 @@ Malicious code was discovered in the upstream tarballs of xz, starting with vers - https://github.com/dparksports/detect_intrusion - https://github.com/drdry2/CVE-2024-3094-EXPLOIT - https://github.com/duytruongpham/duytruongpham +- https://github.com/ecomtech-oss/pisc - https://github.com/emirkmo/xz-backdoor-github - https://github.com/enomothem/PenTestNote - https://github.com/felipecosta09/cve-2024-3094 diff --git a/2024/CVE-2024-31315.md b/2024/CVE-2024-31315.md new file mode 100644 index 000000000..aedead4d9 --- /dev/null +++ b/2024/CVE-2024-31315.md @@ -0,0 +1,18 @@ +### [CVE-2024-31315](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31315) +![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2014%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen) + +### Description + +In multiple functions of ManagedServices.java, there is a possible way to hide an app with notification access in the Device & app notifications settings due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/uthrasri/frameworks_base_CVE-2024-31315 + diff --git a/2024/CVE-2024-33533.md b/2024/CVE-2024-33533.md new file mode 100644 index 000000000..4b4070939 --- /dev/null +++ b/2024/CVE-2024-33533.md @@ -0,0 +1,17 @@ +### [CVE-2024-33533](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33533) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0, issue 1 of 2. A reflected cross-site scripting (XSS) vulnerability has been identified in the Zimbra webmail admin interface. This vulnerability occurs due to inadequate input validation of the packages parameter, allowing an authenticated attacker to inject and execute arbitrary JavaScript code within the context of another user's browser session. By uploading a malicious JavaScript file and crafting a URL containing its location in the packages parameter, the attacker can exploit this vulnerability. Subsequently, when another user visits the crafted URL, the malicious JavaScript code is executed. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-33535.md b/2024/CVE-2024-33535.md new file mode 100644 index 000000000..a02d6e114 --- /dev/null +++ b/2024/CVE-2024-33535.md @@ -0,0 +1,17 @@ +### [CVE-2024-33535](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33535) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. The vulnerability involves unauthenticated local file inclusion (LFI) in a web application, specifically impacting the handling of the packages parameter. Attackers can exploit this flaw to include arbitrary local files without authentication, potentially leading to unauthorized access to sensitive information. The vulnerability is limited to files within a specific directory. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-33536.md b/2024/CVE-2024-33536.md new file mode 100644 index 000000000..a0fc79c24 --- /dev/null +++ b/2024/CVE-2024-33536.md @@ -0,0 +1,17 @@ +### [CVE-2024-33536](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33536) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. The vulnerability occurs due to inadequate input validation of the res parameter, allowing an authenticated attacker to inject and execute arbitrary JavaScript code within the context of another user's browser session. By uploading a malicious JavaScript file, accessible externally, and crafting a URL containing its location in the res parameter, the attacker can exploit this vulnerability. Subsequently, when another user visits the crafted URL, the malicious JavaScript code is executed. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-36424.md b/2024/CVE-2024-36424.md index d27dc3eb5..8a986afa2 100644 --- a/2024/CVE-2024-36424.md +++ b/2024/CVE-2024-36424.md @@ -14,4 +14,5 @@ No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-36877.md b/2024/CVE-2024-36877.md new file mode 100644 index 000000000..d8575f08e --- /dev/null +++ b/2024/CVE-2024-36877.md @@ -0,0 +1,17 @@ +### [CVE-2024-36877](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36877) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Micro-Star International Z-series motherboards (Z590, Z490, and Z790) and B-series motherboards (B760, B560, B660, and B460) with firmware 7D25v14, 7D25v17 to 7D25v19, and 7D25v1A to 7D25v1H was discovered to contain a write-what-where condition in the in the SW handler for SMI 0xE3. + +### POC + +#### Reference +- https://jjensn.com/at-home-in-your-firmware/ + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-37935.md b/2024/CVE-2024-37935.md new file mode 100644 index 000000000..2efa87417 --- /dev/null +++ b/2024/CVE-2024-37935.md @@ -0,0 +1,17 @@ +### [CVE-2024-37935](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37935) +![](https://img.shields.io/static/v1?label=Product&message=Woocommerce%20OpenPos&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%206.4.4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in anhvnit Woocommerce OpenPos allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Woocommerce OpenPos: from n/a through 6.4.4. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-38530.md b/2024/CVE-2024-38530.md new file mode 100644 index 000000000..534cc26b7 --- /dev/null +++ b/2024/CVE-2024-38530.md @@ -0,0 +1,17 @@ +### [CVE-2024-38530](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38530) +![](https://img.shields.io/static/v1?label=Product&message=openeclass&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%3D%203.15%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type&color=brighgreen) + +### Description + +The Open eClass platform (formerly known as GUnet eClass) is a complete Course Management System. An arbitrary file upload vulnerability in the "save" functionality of the H5P module enables unauthenticated users to upload arbitrary files on the server's filesystem. This may lead in unrestricted RCE on the backend server, since the upload location is accessible from the internet. This vulnerability is fixed in 3.16. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-38688.md b/2024/CVE-2024-38688.md new file mode 100644 index 000000000..edbad972d --- /dev/null +++ b/2024/CVE-2024-38688.md @@ -0,0 +1,17 @@ +### [CVE-2024-38688](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38688) +![](https://img.shields.io/static/v1?label=Product&message=Recipe%20Maker%20For%20Your%20Food%20Blog%20from%20Zip%20Recipes&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%208.2.6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in Igor Benić Recipe Maker For Your Food Blog from Zip Recipes allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Recipe Maker For Your Food Blog from Zip Recipes: from n/a through 8.2.6. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-38699.md b/2024/CVE-2024-38699.md new file mode 100644 index 000000000..17f1b1842 --- /dev/null +++ b/2024/CVE-2024-38699.md @@ -0,0 +1,17 @@ +### [CVE-2024-38699](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38699) +![](https://img.shields.io/static/v1?label=Product&message=Wallet%20System%20for%20WooCommerce&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in WP Swings Wallet System for WooCommerce allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Wallet System for WooCommerce: from n/a through 2.5.13. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-38724.md b/2024/CVE-2024-38724.md new file mode 100644 index 000000000..15dbe2835 --- /dev/null +++ b/2024/CVE-2024-38724.md @@ -0,0 +1,18 @@ +### [CVE-2024-38724](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38724) +![](https://img.shields.io/static/v1?label=Product&message=Contact%20Form%207%20Summary%20and%20Print&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20'Cross-site%20Scripting')&color=brighgreen) + +### Description + +Cross-Site Request Forgery (CSRF), Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Muhammad Rehman Contact Form 7 Summary and Print allows Stored XSS.This issue affects Contact Form 7 Summary and Print: from n/a through 1.2.5. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-38742.md b/2024/CVE-2024-38742.md new file mode 100644 index 000000000..79dffe35a --- /dev/null +++ b/2024/CVE-2024-38742.md @@ -0,0 +1,17 @@ +### [CVE-2024-38742](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38742) +![](https://img.shields.io/static/v1?label=Product&message=MBE%20eShip&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%202.1.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen) + +### Description + +Exposure of Sensitive Information to an Unauthorized Actor vulnerability in MBE Worldwide S.P.A. MBE eShip allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects MBE eShip: from n/a through 2.1.2. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-38747.md b/2024/CVE-2024-38747.md new file mode 100644 index 000000000..e99e7b293 --- /dev/null +++ b/2024/CVE-2024-38747.md @@ -0,0 +1,17 @@ +### [CVE-2024-38747](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38747) +![](https://img.shields.io/static/v1?label=Product&message=HitPay%20Payment%20Gateway%20for%20WooCommerce&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen) + +### Description + +Exposure of Sensitive Information to an Unauthorized Actor vulnerability in HitPay Payment Solutions Pte Ltd HitPay Payment Gateway for WooCommerce allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects HitPay Payment Gateway for WooCommerce: from n/a through 4.1.3. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-38749.md b/2024/CVE-2024-38749.md new file mode 100644 index 000000000..7d4bb7b75 --- /dev/null +++ b/2024/CVE-2024-38749.md @@ -0,0 +1,17 @@ +### [CVE-2024-38749](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38749) +![](https://img.shields.io/static/v1?label=Product&message=Olive%20One%20Click%20Demo%20Import&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%201.1.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen) + +### Description + +Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Olive Themes Olive One Click Demo Import allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Olive One Click Demo Import: from n/a through 1.1.2. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-38752.md b/2024/CVE-2024-38752.md new file mode 100644 index 000000000..16dff58a2 --- /dev/null +++ b/2024/CVE-2024-38752.md @@ -0,0 +1,17 @@ +### [CVE-2024-38752](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38752) +![](https://img.shields.io/static/v1?label=Product&message=Zoho%20Campaigns&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20'Cross-site%20Scripting')&color=brighgreen) + +### Description + +Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Zoho Campaigns allows Cross-Site Scripting (XSS).This issue affects Zoho Campaigns: from n/a through 2.0.8. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-38756.md b/2024/CVE-2024-38756.md new file mode 100644 index 000000000..b258e8dfa --- /dev/null +++ b/2024/CVE-2024-38756.md @@ -0,0 +1,17 @@ +### [CVE-2024-38756](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38756) +![](https://img.shields.io/static/v1?label=Product&message=Coming%20Soon&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%201.6.3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen) + +### Description + +Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Weblizar Coming Soon allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Coming Soon: from n/a through 1.6.3. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-38760.md b/2024/CVE-2024-38760.md new file mode 100644 index 000000000..d07199040 --- /dev/null +++ b/2024/CVE-2024-38760.md @@ -0,0 +1,17 @@ +### [CVE-2024-38760](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38760) +![](https://img.shields.io/static/v1?label=Product&message=Send%20Users%20Email&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen) + +### Description + +Exposure of Sensitive Information to an Unauthorized Actor vulnerability in David Maucher Send Users Email allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Send Users Email: from n/a through 1.5.1. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-38787.md b/2024/CVE-2024-38787.md new file mode 100644 index 000000000..3646d4cae --- /dev/null +++ b/2024/CVE-2024-38787.md @@ -0,0 +1,17 @@ +### [CVE-2024-38787](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38787) +![](https://img.shields.io/static/v1?label=Product&message=Import%20and%20export%20users%20and%20customers&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen) + +### Description + +Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Codection Import and export users and customers allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Import and export users and customers: from n/a through 1.26.8. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-39091.md b/2024/CVE-2024-39091.md new file mode 100644 index 000000000..330be1562 --- /dev/null +++ b/2024/CVE-2024-39091.md @@ -0,0 +1,17 @@ +### [CVE-2024-39091](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39091) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An OS command injection vulnerability in the ccm_debug component of MIPC Camera firmware prior to v5.4.1.240424171021 allows attackers within the same network to execute arbitrary code via a crafted HTML request. + +### POC + +#### Reference +- https://joerngermany.github.io/mipc_vulnerability/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-39642.md b/2024/CVE-2024-39642.md new file mode 100644 index 000000000..00f076126 --- /dev/null +++ b/2024/CVE-2024-39642.md @@ -0,0 +1,18 @@ +### [CVE-2024-39642](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39642) +![](https://img.shields.io/static/v1?label=Product&message=LearnPress&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key&color=brighgreen) + +### Description + +Authorization Bypass Through User-Controlled Key vulnerability in ThimPress LearnPress allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects LearnPress: from n/a through 4.2.6.8.2. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-39651.md b/2024/CVE-2024-39651.md new file mode 100644 index 000000000..510449a61 --- /dev/null +++ b/2024/CVE-2024-39651.md @@ -0,0 +1,18 @@ +### [CVE-2024-39651](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39651) +![](https://img.shields.io/static/v1?label=Product&message=WooCommerce%20PDF%20Vouchers&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen) + +### Description + +Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WPWeb WooCommerce PDF Vouchers allows File Manipulation.This issue affects WooCommerce PDF Vouchers: from n/a before 4.9.5. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-40500.md b/2024/CVE-2024-40500.md new file mode 100644 index 000000000..13c39af58 --- /dev/null +++ b/2024/CVE-2024-40500.md @@ -0,0 +1,17 @@ +### [CVE-2024-40500](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40500) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Cross Site Scripting vulnerability in Martin Kucej i-librarian v.5.11.0 and before allows a local attacker to execute arbitrary code via the search function in the import component. + +### POC + +#### Reference +- https://nitipoom-jar.github.io/CVE-2024-40500/ + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-40697.md b/2024/CVE-2024-40697.md new file mode 100644 index 000000000..efb1fdf94 --- /dev/null +++ b/2024/CVE-2024-40697.md @@ -0,0 +1,17 @@ +### [CVE-2024-40697](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40697) +![](https://img.shields.io/static/v1?label=Product&message=Common%20Licensing&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%209.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-521%20Weak%20Password%20Requirements&color=brighgreen) + +### Description + +IBM Common Licensing 9.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 297895. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-41651.md b/2024/CVE-2024-41651.md new file mode 100644 index 000000000..eb9d52e2b --- /dev/null +++ b/2024/CVE-2024-41651.md @@ -0,0 +1,17 @@ +### [CVE-2024-41651](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41651) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An issue in Prestashop v.8.1.7 and before allows a remote attacker to execute arbitrary code via the module upgrade functionality. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-42010.md b/2024/CVE-2024-42010.md index 5185efdaf..1293aebff 100644 --- a/2024/CVE-2024-42010.md +++ b/2024/CVE-2024-42010.md @@ -5,7 +5,7 @@ ### Description -mod_css_styles in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a insufficiently filters Cascading Style Sheets (CSS) token sequences in rendered e-mail messages, allowing a remote attacker to obtain sensitive information. +mod_css_styles in Roundcube through 1.5.7 and 1.6.x through 1.6.7 insufficiently filters Cascading Style Sheets (CSS) token sequences in rendered e-mail messages, allowing a remote attacker to obtain sensitive information. ### POC diff --git a/2024/CVE-2024-42258.md b/2024/CVE-2024-42258.md new file mode 100644 index 000000000..10be5c165 --- /dev/null +++ b/2024/CVE-2024-42258.md @@ -0,0 +1,17 @@ +### [CVE-2024-42258](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42258) +![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=4ef9ad19e176%3C%207e1f4efb8d61%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +In the Linux kernel, the following vulnerability has been resolved:mm: huge_memory: use !CONFIG_64BIT to relax huge page alignment on 32 bit machinesYves-Alexis Perez reported commit 4ef9ad19e176 ("mm: huge_memory: don'tforce huge page alignment on 32 bit") didn't work for x86_32 [1]. It isbecause x86_32 uses CONFIG_X86_32 instead of CONFIG_32BIT.!CONFIG_64BIT should cover all 32 bit machines.[1] https://lore.kernel.org/linux-mm/CAHbLzkr1LwH3pcTgM+aGQ31ip2bKqiqEQ8=FQB+t2c3dhNKNHA@mail.gmail.com/ + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-42477.md b/2024/CVE-2024-42477.md new file mode 100644 index 000000000..d131bce96 --- /dev/null +++ b/2024/CVE-2024-42477.md @@ -0,0 +1,17 @@ +### [CVE-2024-42477](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42477) +![](https://img.shields.io/static/v1?label=Product&message=llama.cpp&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%20b3561%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-125%3A%20Out-of-bounds%20Read&color=brighgreen) + +### Description + +llama.cpp provides LLM inference in C/C++. The unsafe `type` member in the `rpc_tensor` structure can cause `global-buffer-overflow`. This vulnerability may lead to memory data leakage. The vulnerability is fixed in b3561. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-42478.md b/2024/CVE-2024-42478.md new file mode 100644 index 000000000..86f62a5ce --- /dev/null +++ b/2024/CVE-2024-42478.md @@ -0,0 +1,17 @@ +### [CVE-2024-42478](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42478) +![](https://img.shields.io/static/v1?label=Product&message=llama.cpp&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%20b3561%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-125%3A%20Out-of-bounds%20Read&color=brighgreen) + +### Description + +llama.cpp provides LLM inference in C/C++. The unsafe `data` pointer member in the `rpc_tensor` structure can cause arbitrary address reading. This vulnerability is fixed in b3561. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-42479.md b/2024/CVE-2024-42479.md new file mode 100644 index 000000000..f6a5220ab --- /dev/null +++ b/2024/CVE-2024-42479.md @@ -0,0 +1,17 @@ +### [CVE-2024-42479](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42479) +![](https://img.shields.io/static/v1?label=Product&message=llama.cpp&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%20b3561%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-123%3A%20Write-what-where%20Condition&color=brighgreen) + +### Description + +llama.cpp provides LLM inference in C/C++. The unsafe `data` pointer member in the `rpc_tensor` structure can cause arbitrary address writing. This vulnerability is fixed in b3561. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-42520.md b/2024/CVE-2024-42520.md new file mode 100644 index 000000000..16cb67cd8 --- /dev/null +++ b/2024/CVE-2024-42520.md @@ -0,0 +1,17 @@ +### [CVE-2024-42520](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42520) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +TOTOLINK A3002R v4.0.0-B20230531.1404 contains a buffer overflow vulnerability in /bin/boa via formParentControl. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-43121.md b/2024/CVE-2024-43121.md new file mode 100644 index 000000000..ddc69c7ea --- /dev/null +++ b/2024/CVE-2024-43121.md @@ -0,0 +1,17 @@ +### [CVE-2024-43121](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43121) +![](https://img.shields.io/static/v1?label=Product&message=HUSKY&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-269%20Improper%20Privilege%20Management&color=brighgreen) + +### Description + +Improper Privilege Management vulnerability in realmag777 HUSKY allows Privilege Escalation.This issue affects HUSKY: from n/a through 1.3.6.1. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-43128.md b/2024/CVE-2024-43128.md new file mode 100644 index 000000000..0fc3c90fb --- /dev/null +++ b/2024/CVE-2024-43128.md @@ -0,0 +1,17 @@ +### [CVE-2024-43128](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43128) +![](https://img.shields.io/static/v1?label=Product&message=WooCommerce%20Product%20Table%20Lite&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20('Code%20Injection')&color=brighgreen) + +### Description + +Improper Control of Generation of Code ('Code Injection') vulnerability in WC Product Table WooCommerce Product Table Lite allows Code Injection.This issue affects WooCommerce Product Table Lite: from n/a through 3.5.1. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-43129.md b/2024/CVE-2024-43129.md new file mode 100644 index 000000000..dbb2b1c52 --- /dev/null +++ b/2024/CVE-2024-43129.md @@ -0,0 +1,17 @@ +### [CVE-2024-43129](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43129) +![](https://img.shields.io/static/v1?label=Product&message=BetterDocs&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen) + +### Description + +Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WPDeveloper BetterDocs allows PHP Local File Inclusion.This issue affects BetterDocs: from n/a through 3.5.8. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-43131.md b/2024/CVE-2024-43131.md new file mode 100644 index 000000000..937aeb1a2 --- /dev/null +++ b/2024/CVE-2024-43131.md @@ -0,0 +1,17 @@ +### [CVE-2024-43131](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43131) +![](https://img.shields.io/static/v1?label=Product&message=Docket%20(WooCommerce%20Collections%20%2F%20Wishlist%20%2F%20Watchlist)&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-863%20Incorrect%20Authorization&color=brighgreen) + +### Description + +Incorrect Authorization vulnerability in WPWeb Docket (WooCommerce Collections / Wishlist / Watchlist) allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Docket (WooCommerce Collections / Wishlist / Watchlist): from n/a before 1.7.0. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-43135.md b/2024/CVE-2024-43135.md new file mode 100644 index 000000000..7e5f8fa3e --- /dev/null +++ b/2024/CVE-2024-43135.md @@ -0,0 +1,17 @@ +### [CVE-2024-43135](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43135) +![](https://img.shields.io/static/v1?label=Product&message=WPCafe&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen) + +### Description + +Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Themewinter WPCafe allows PHP Local File Inclusion.This issue affects WPCafe: from n/a through 2.2.28. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-43220.md b/2024/CVE-2024-43220.md new file mode 100644 index 000000000..1532daf2b --- /dev/null +++ b/2024/CVE-2024-43220.md @@ -0,0 +1,17 @@ +### [CVE-2024-43220](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43220) +![](https://img.shields.io/static/v1?label=Product&message=Form%20Maker%20by%2010Web&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%201.15.26%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20'Cross-site%20Scripting')&color=brighgreen) + +### Description + +Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in 10Web Form Builder Team Form Maker by 10Web allows Reflected XSS.This issue affects Form Maker by 10Web: from n/a through 1.15.26. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-43224.md b/2024/CVE-2024-43224.md new file mode 100644 index 000000000..34121bb2e --- /dev/null +++ b/2024/CVE-2024-43224.md @@ -0,0 +1,17 @@ +### [CVE-2024-43224](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43224) +![](https://img.shields.io/static/v1?label=Product&message=YaMaps%20for%20WordPress&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%200.6.27%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20'Cross-site%20Scripting')&color=brighgreen) + +### Description + +Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Yuri Baranov YaMaps for WordPress allows Stored XSS.This issue affects YaMaps for WordPress: from n/a through 0.6.27. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-43225.md b/2024/CVE-2024-43225.md new file mode 100644 index 000000000..a9f3380b1 --- /dev/null +++ b/2024/CVE-2024-43225.md @@ -0,0 +1,17 @@ +### [CVE-2024-43225](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43225) +![](https://img.shields.io/static/v1?label=Product&message=Enter%20Addons&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%202.1.7%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20'Cross-site%20Scripting')&color=brighgreen) + +### Description + +Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ThemeLooks Enter Addons allows Stored XSS.This issue affects Enter Addons: from n/a through 2.1.7. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-43226.md b/2024/CVE-2024-43226.md new file mode 100644 index 000000000..51fff3bf8 --- /dev/null +++ b/2024/CVE-2024-43226.md @@ -0,0 +1,17 @@ +### [CVE-2024-43226](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43226) +![](https://img.shields.io/static/v1?label=Product&message=WP%20Dashboard%20Notes&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%201.0.11%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20'Cross-site%20Scripting')&color=brighgreen) + +### Description + +Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Jeroen Sormani WP Dashboard Notes allows Stored XSS.This issue affects WP Dashboard Notes: from n/a through 1.0.11. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-43227.md b/2024/CVE-2024-43227.md new file mode 100644 index 000000000..c4e94eb1b --- /dev/null +++ b/2024/CVE-2024-43227.md @@ -0,0 +1,17 @@ +### [CVE-2024-43227](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43227) +![](https://img.shields.io/static/v1?label=Product&message=BetterDocs&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20'Cross-site%20Scripting')&color=brighgreen) + +### Description + +Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPDeveloper BetterDocs allows Stored XSS.This issue affects BetterDocs: from n/a through 3.5.8. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-43231.md b/2024/CVE-2024-43231.md new file mode 100644 index 000000000..b8283b8f0 --- /dev/null +++ b/2024/CVE-2024-43231.md @@ -0,0 +1,17 @@ +### [CVE-2024-43231](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43231) +![](https://img.shields.io/static/v1?label=Product&message=Tutor%20LMS&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20'Cross-site%20Scripting')&color=brighgreen) + +### Description + +Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Themeum Tutor LMS allows Stored XSS.This issue affects Tutor LMS: from n/a through 2.7.3. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-43233.md b/2024/CVE-2024-43233.md new file mode 100644 index 000000000..bfc4c00a0 --- /dev/null +++ b/2024/CVE-2024-43233.md @@ -0,0 +1,17 @@ +### [CVE-2024-43233](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43233) +![](https://img.shields.io/static/v1?label=Product&message=BSK%20Forms%20Blacklist&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20'Cross-site%20Scripting')&color=brighgreen) + +### Description + +Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BannerSky BSK Forms Blacklist allows Reflected XSS.This issue affects BSK Forms Blacklist: from n/a through 3.8. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-43358.md b/2024/CVE-2024-43358.md new file mode 100644 index 000000000..1523249ad --- /dev/null +++ b/2024/CVE-2024-43358.md @@ -0,0 +1,17 @@ +### [CVE-2024-43358](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43358) +![](https://img.shields.io/static/v1?label=Product&message=zoneminder&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.36.34%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) + +### Description + +ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder has a cross-site scripting vulnerability in the filter view via the filter[Id]. This vulnerability is fixed in 1.36.34 and 1.37.61. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-43359.md b/2024/CVE-2024-43359.md new file mode 100644 index 000000000..48045503a --- /dev/null +++ b/2024/CVE-2024-43359.md @@ -0,0 +1,17 @@ +### [CVE-2024-43359](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43359) +![](https://img.shields.io/static/v1?label=Product&message=zoneminder&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.36.34%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) + +### Description + +ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder has a cross-site scripting vulnerability in the montagereview via the displayinterval, speed, and scale parameters. This vulnerability is fixed in 1.36.34 and 1.37.61. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-43360.md b/2024/CVE-2024-43360.md new file mode 100644 index 000000000..c9c383403 --- /dev/null +++ b/2024/CVE-2024-43360.md @@ -0,0 +1,17 @@ +### [CVE-2024-43360](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43360) +![](https://img.shields.io/static/v1?label=Product&message=zoneminder&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.36.34%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brighgreen) + +### Description + +ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder is affected by a time-based SQL Injection vulnerability. This vulnerability is fixed in 1.36.34 and 1.37.61. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-4871.md b/2024/CVE-2024-4871.md index bb43b159b..56a1ae5d2 100644 --- a/2024/CVE-2024-4871.md +++ b/2024/CVE-2024-4871.md @@ -1,5 +1,5 @@ ### [CVE-2024-4871](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4871) -![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Satellite%206&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Satellite%206.15%20for%20RHEL%208&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Key%20Exchange%20without%20Entity%20Authentication&color=brighgreen) diff --git a/2024/CVE-2024-5430.md b/2024/CVE-2024-5430.md new file mode 100644 index 000000000..d1438cb35 --- /dev/null +++ b/2024/CVE-2024-5430.md @@ -0,0 +1,17 @@ +### [CVE-2024-5430](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5430) +![](https://img.shields.io/static/v1?label=Product&message=GitLab&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=16.10%3C%2016.11.5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-284%3A%20Improper%20Access%20Control&color=brighgreen) + +### Description + +An issue was discovered in GitLab CE/EE affecting all versions starting from 16.10 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows a project maintainer can delete the merge request approval policy via graphQL. + +### POC + +#### Reference +- https://gitlab.com/gitlab-org/gitlab/-/issues/464017 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-6558.md b/2024/CVE-2024-6558.md new file mode 100644 index 000000000..6fb1b4144 --- /dev/null +++ b/2024/CVE-2024-6558.md @@ -0,0 +1,17 @@ +### [CVE-2024-6558](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6558) +![](https://img.shields.io/static/v1?label=Product&message=Anybus-CompactCom%2030&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20all%20versions%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting&color=brighgreen) + +### Description + +HMS Industrial NetworksAnybus-CompactCom 30 products are vulnerable to a XSS attack caused by the lack of input sanitation checks. As a consequence, it is possible to insert HTML code into input fields and store the HTML code. The stored HTML code will be embedded in the page and executed by host browser the next time the page is loaded, enabling social engineering attacks. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-6639.md b/2024/CVE-2024-6639.md new file mode 100644 index 000000000..5c255ecab --- /dev/null +++ b/2024/CVE-2024-6639.md @@ -0,0 +1,18 @@ +### [CVE-2024-6639](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6639) +![](https://img.shields.io/static/v1?label=Product&message=MDx&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%202.0.3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) + +### Description + +The MDx theme for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mdx_list_item' shortcode in all versions up to, and including, 2.0.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-6724.md b/2024/CVE-2024-6724.md new file mode 100644 index 000000000..73ff5f844 --- /dev/null +++ b/2024/CVE-2024-6724.md @@ -0,0 +1,17 @@ +### [CVE-2024-6724](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6724) +![](https://img.shields.io/static/v1?label=Product&message=Generate%20Images&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%205.2.8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) + +### Description + +The Generate Images WordPress plugin before 5.2.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) + +### POC + +#### Reference +- https://wpscan.com/vulnerability/0cb3158a-263d-4c4a-8029-62b453c281cb/ + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-6768.md b/2024/CVE-2024-6768.md new file mode 100644 index 000000000..30dd00db9 --- /dev/null +++ b/2024/CVE-2024-6768.md @@ -0,0 +1,22 @@ +### [CVE-2024-6768](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6768) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2010&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%2011&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202022&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input&color=brighgreen) + +### Description + +A Denial of Service in CLFS.sys in Microsoft Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, and Windows Server 2022 allows a malicious authenticated low-privilege user to cause a Blue Screen of Death via a forced call to the KeBugCheckEx function. + +### POC + +#### Reference +- https://www.fortra.com/security/advisories/research/fr-2024-001 + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-6823.md b/2024/CVE-2024-6823.md new file mode 100644 index 000000000..37d9809ad --- /dev/null +++ b/2024/CVE-2024-6823.md @@ -0,0 +1,17 @@ +### [CVE-2024-6823](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6823) +![](https://img.shields.io/static/v1?label=Product&message=Media%20Library%20Assistant&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%203.18%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type&color=brighgreen) + +### Description + +The Media Library Assistant plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation involving the mla-inline-edit-upload-scripts AJAX action in all versions up to, and including, 3.18. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-6917.md b/2024/CVE-2024-6917.md new file mode 100644 index 000000000..0792ef504 --- /dev/null +++ b/2024/CVE-2024-6917.md @@ -0,0 +1,17 @@ +### [CVE-2024-6917](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6917) +![](https://img.shields.io/static/v1?label=Product&message=Veribase%20Order%20Management&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%20v4.010.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brighgreen) + +### Description + +Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Veribilim Software Veribase Order Management allows OS Command Injection.This issue affects Veribase Order Management: before v4.010.2. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-7092.md b/2024/CVE-2024-7092.md new file mode 100644 index 000000000..c3fa83e0f --- /dev/null +++ b/2024/CVE-2024-7092.md @@ -0,0 +1,17 @@ +### [CVE-2024-7092](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7092) +![](https://img.shields.io/static/v1?label=Product&message=Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%205.9.27%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) + +### Description + +The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘no_more_items_text’ parameter in all versions up to, and including, 5.9.27 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-7094.md b/2024/CVE-2024-7094.md new file mode 100644 index 000000000..818bb89cb --- /dev/null +++ b/2024/CVE-2024-7094.md @@ -0,0 +1,17 @@ +### [CVE-2024-7094](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7094) +![](https://img.shields.io/static/v1?label=Product&message=JS%20Help%20Desk%20%E2%80%93%20The%20Ultimate%20Help%20Desk%20%26%20Support%20Plugin&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%202.8.6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20('Code%20Injection')&color=brighgreen) + +### Description + +The JS Help Desk – The Ultimate Help Desk & Support Plugin plugin for WordPress is vulnerable to PHP Code Injection leading to Remote Code Execution in all versions up to, and including, 2.8.6 via the 'storeTheme' function. This is due to a lack of sanitization on user-supplied values, which replace values in the style.php file, along with missing capability checks. This makes it possible for unauthenticated attackers to execute code on the server. This issue was partially patched in 2.8.6 when the code injection issue was resolved, and fully patched in 2.8.7 when the missing authorization and cross-site request forgery protection was added. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-7247.md b/2024/CVE-2024-7247.md new file mode 100644 index 000000000..634adbc9d --- /dev/null +++ b/2024/CVE-2024-7247.md @@ -0,0 +1,17 @@ +### [CVE-2024-7247](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7247) +![](https://img.shields.io/static/v1?label=Product&message=Element%20Pack%20Elementor%20Addons%20(Header%20Footer%2C%20Template%20Library%2C%20Dynamic%20Grid%20%26%20Carousel%2C%20Remote%20Arrows)&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%205.7.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) + +### Description + +The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Custom Gallery and Countdown widgets in all versions up to, and including, 5.7.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-7388.md b/2024/CVE-2024-7388.md new file mode 100644 index 000000000..225d0cc81 --- /dev/null +++ b/2024/CVE-2024-7388.md @@ -0,0 +1,17 @@ +### [CVE-2024-7388](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7388) +![](https://img.shields.io/static/v1?label=Product&message=WP%20Bannerize%20Pro&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%201.9.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) + +### Description + +The WP Bannerize Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via banner alt data in all versions up to, and including, 1.9.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-7589.md b/2024/CVE-2024-7589.md new file mode 100644 index 000000000..4263ec5c5 --- /dev/null +++ b/2024/CVE-2024-7589.md @@ -0,0 +1,17 @@ +### [CVE-2024-7589](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7589) +![](https://img.shields.io/static/v1?label=Product&message=FreeBSD&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=14.1-RELEASE%3C%20p3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A signal handler in sshd(8) may call a logging function that is not async-signal-safe. The signal handler is invoked when a client does not authenticate within the LoginGraceTime seconds (120 by default). This signal handler executes in the context of the sshd(8)'s privileged code, which is not sandboxed and runs with full root privileges.This issue is another instance of the problem in CVE-2024-6387 addressed by FreeBSD-SA-24:04.openssh. The faulty code in this case is from the integration of blacklistd in OpenSSH in FreeBSD.As a result of calling functions that are not async-signal-safe in the privileged sshd(8) context, a race condition exists that a determined attacker may be able to exploit to allow an unauthenticated remote code execution as root. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/tanjiti/sec_profile + diff --git a/2024/CVE-2024-7590.md b/2024/CVE-2024-7590.md new file mode 100644 index 000000000..9be06b5a6 --- /dev/null +++ b/2024/CVE-2024-7590.md @@ -0,0 +1,17 @@ +### [CVE-2024-7590](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7590) +![](https://img.shields.io/static/v1?label=Product&message=Spectra&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20'Cross-site%20Scripting')&color=brighgreen) + +### Description + +Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Brainstorm Force Spectra allows Stored XSS.This issue affects Spectra: from n/a through 2.14.1. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-7637.md b/2024/CVE-2024-7637.md new file mode 100644 index 000000000..d571895e0 --- /dev/null +++ b/2024/CVE-2024-7637.md @@ -0,0 +1,17 @@ +### [CVE-2024-7637](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7637) +![](https://img.shields.io/static/v1?label=Product&message=Online%20Polling&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in code-projects Online Polling 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file registeracc.php of the component Registration. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/space-security/cve/issues/3 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7643.md b/2024/CVE-2024-7643.md new file mode 100644 index 000000000..af284bb8b --- /dev/null +++ b/2024/CVE-2024-7643.md @@ -0,0 +1,17 @@ +### [CVE-2024-7643](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7643) +![](https://img.shields.io/static/v1?label=Product&message=Leads%20Manager%20Tool&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in SourceCodester Leads Manager Tool 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /endpoint/delete-leads.php of the component Delete Leads Handler. The manipulation of the argument leads leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/joinia/webray.com.cn/blob/main/Leads-Manager-Tool/leadmanagersql.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7644.md b/2024/CVE-2024-7644.md new file mode 100644 index 000000000..2f147a5ba --- /dev/null +++ b/2024/CVE-2024-7644.md @@ -0,0 +1,17 @@ +### [CVE-2024-7644](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7644) +![](https://img.shields.io/static/v1?label=Product&message=Leads%20Manager%20Tool&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross%20Site%20Scripting&color=brighgreen) + +### Description + +A vulnerability was found in SourceCodester Leads Manager Tool 1.0. It has been classified as problematic. This affects an unknown part of the file /endpoint/add-leads.php of the component Add Leads Handler. The manipulation of the argument leads_name/phone_number leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/joinia/webray.com.cn/blob/main/Leads-Manager-Tool/leadmanagerxss.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7661.md b/2024/CVE-2024-7661.md new file mode 100644 index 000000000..7f69dba28 --- /dev/null +++ b/2024/CVE-2024-7661.md @@ -0,0 +1,17 @@ +### [CVE-2024-7661](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7661) +![](https://img.shields.io/static/v1?label=Product&message=Car%20Driving%20School%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery&color=brighgreen) + +### Description + +A vulnerability was found in SourceCodester Car Driving School Management System 1.0. It has been classified as problematic. This affects the function save_users of the file admin/user/index.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20CSRF-1.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7662.md b/2024/CVE-2024-7662.md new file mode 100644 index 000000000..6db7c050f --- /dev/null +++ b/2024/CVE-2024-7662.md @@ -0,0 +1,17 @@ +### [CVE-2024-7662](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7662) +![](https://img.shields.io/static/v1?label=Product&message=Car%20Driving%20School%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery&color=brighgreen) + +### Description + +A vulnerability was found in SourceCodester Car Driving School Management System 1.0. It has been declared as problematic. This vulnerability affects the function save_package of the file admin/packages/manag_package.php. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20CSRF-2.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7664.md b/2024/CVE-2024-7664.md new file mode 100644 index 000000000..7aacf4fdc --- /dev/null +++ b/2024/CVE-2024-7664.md @@ -0,0 +1,17 @@ +### [CVE-2024-7664](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7664) +![](https://img.shields.io/static/v1?label=Product&message=Car%20Driving%20School%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability classified as critical has been found in SourceCodester Car Driving School Management System 1.0. Affected is an unknown function of the file view_details.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20SQL%20Injection-2.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7665.md b/2024/CVE-2024-7665.md new file mode 100644 index 000000000..6c98e74f9 --- /dev/null +++ b/2024/CVE-2024-7665.md @@ -0,0 +1,17 @@ +### [CVE-2024-7665](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7665) +![](https://img.shields.io/static/v1?label=Product&message=Car%20Driving%20School%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability classified as critical was found in SourceCodester Car Driving School Management System 1.0. Affected by this vulnerability is an unknown functionality of the file manage_package.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20SQL%20Injection-3.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7667.md b/2024/CVE-2024-7667.md new file mode 100644 index 000000000..e06033930 --- /dev/null +++ b/2024/CVE-2024-7667.md @@ -0,0 +1,17 @@ +### [CVE-2024-7667](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7667) +![](https://img.shields.io/static/v1?label=Product&message=Car%20Driving%20School%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability, which was classified as critical, was found in SourceCodester Car Driving School Management System 1.0. This affects the function delete_users of the file User.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20SQL%20Injection-5.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7669.md b/2024/CVE-2024-7669.md new file mode 100644 index 000000000..084a93dff --- /dev/null +++ b/2024/CVE-2024-7669.md @@ -0,0 +1,17 @@ +### [CVE-2024-7669](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7669) +![](https://img.shields.io/static/v1?label=Product&message=Car%20Driving%20School%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in SourceCodester Car Driving School Management System 1.0 and classified as critical. This issue affects the function delete_enrollment of the file Master.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20SQL%20Injection-7.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7676.md b/2024/CVE-2024-7676.md new file mode 100644 index 000000000..d6715a84f --- /dev/null +++ b/2024/CVE-2024-7676.md @@ -0,0 +1,17 @@ +### [CVE-2024-7676](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7676) +![](https://img.shields.io/static/v1?label=Product&message=Car%20Driving%20School%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in Sourcecodester Car Driving School Management System 1.0. It has been classified as critical. Affected is the function save_package of the file /classes/Master.php?f=save_package. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20SQL%20Injection-8.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7680.md b/2024/CVE-2024-7680.md new file mode 100644 index 000000000..b78c1ec90 --- /dev/null +++ b/2024/CVE-2024-7680.md @@ -0,0 +1,17 @@ +### [CVE-2024-7680](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7680) +![](https://img.shields.io/static/v1?label=Product&message=Tailoring%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been classified as critical. This affects an unknown part of the file /incedit.php?id=4. The manipulation of the argument id/inccat/desc/date/amount leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/chenzg22/cve/issues/1 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7682.md b/2024/CVE-2024-7682.md new file mode 100644 index 000000000..5f3dfddf0 --- /dev/null +++ b/2024/CVE-2024-7682.md @@ -0,0 +1,17 @@ +### [CVE-2024-7682](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7682) +![](https://img.shields.io/static/v1?label=Product&message=Job%20Portal&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in code-projects Job Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file rw_i_nat.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/space-security/cve/issues/7 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7704.md b/2024/CVE-2024-7704.md new file mode 100644 index 000000000..e4a456e1f --- /dev/null +++ b/2024/CVE-2024-7704.md @@ -0,0 +1,17 @@ +### [CVE-2024-7704](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7704) +![](https://img.shields.io/static/v1?label=Product&message=e-cology&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%208%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Information%20Disclosure&color=brighgreen) + +### Description + +A vulnerability was found in Weaver e-cology 8. It has been classified as problematic. Affected is an unknown function of the file /cloudstore/ecode/setup/ecology_dev.zip of the component Source Code Handler. The manipulation leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +- https://github.com/Dreamy-elfland/240731 + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-7705.md b/2024/CVE-2024-7705.md new file mode 100644 index 000000000..9258ef7a6 --- /dev/null +++ b/2024/CVE-2024-7705.md @@ -0,0 +1,17 @@ +### [CVE-2024-7705](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7705) +![](https://img.shields.io/static/v1?label=Product&message=mwcms&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%20Unrestricted%20Upload&color=brighgreen) + +### Description + +A vulnerability was found in Fujian mwcms 1.0.0. It has been declared as critical. Affected by this vulnerability is the function uploadeditor of the file /uploadeditor.html?action=uploadimage of the component Image Upload. The manipulation of the argument upfile leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +- https://github.com/DeepMountains/Mirage/blob/main/CVE12-1.md + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-7706.md b/2024/CVE-2024-7706.md new file mode 100644 index 000000000..d14bc436d --- /dev/null +++ b/2024/CVE-2024-7706.md @@ -0,0 +1,17 @@ +### [CVE-2024-7706](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7706) +![](https://img.shields.io/static/v1?label=Product&message=mwcms&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%20Unrestricted%20Upload&color=brighgreen) + +### Description + +A vulnerability was found in Fujian mwcms 1.0.0. It has been rated as critical. Affected by this issue is the function uploadimage of the file /uploadfile.html. The manipulation of the argument upfile leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +- https://github.com/DeepMountains/Mirage/blob/main/CVE12-2.md + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-7707.md b/2024/CVE-2024-7707.md new file mode 100644 index 000000000..7cadbaa07 --- /dev/null +++ b/2024/CVE-2024-7707.md @@ -0,0 +1,17 @@ +### [CVE-2024-7707](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7707) +![](https://img.shields.io/static/v1?label=Product&message=FH1206&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2002.03.01.35%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-121%20Stack-based%20Buffer%20Overflow&color=brighgreen) + +### Description + +A vulnerability was found in Tenda FH1206 02.03.01.35 and classified as critical. Affected by this issue is the function formSafeEmailFilter of the file /goform/SafeEmailFilter of the component HTTP POST Request Handler. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +- https://github.com/VodkaVortex/IoT/blob/main/formSafeEmailFilter.md + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-7709.md b/2024/CVE-2024-7709.md new file mode 100644 index 000000000..f1382bce3 --- /dev/null +++ b/2024/CVE-2024-7709.md @@ -0,0 +1,17 @@ +### [CVE-2024-7709](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7709) +![](https://img.shields.io/static/v1?label=Product&message=OcoMon&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross%20Site%20Scripting&color=brighgreen) + +### Description + +A vulnerability, which was classified as problematic, has been found in OcoMon 4.0. This issue affects some unknown processing of the file /includes/common/require_access_recovery.php of the component URL Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.0.1 and 5.0 is able to address this issue. It is recommended to upgrade the affected component. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-7715.md b/2024/CVE-2024-7715.md new file mode 100644 index 000000000..abfee11ec --- /dev/null +++ b/2024/CVE-2024-7715.md @@ -0,0 +1,36 @@ +### [CVE-2024-7715](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7715) +![](https://img.shields.io/static/v1?label=Product&message=DNR-202L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNR-322L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNR-326&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1100-4&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-120&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1200-05&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1550-04&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-315L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320LW&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-321&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-323&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-325&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-326&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-327L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-340L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-343&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-345&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-726-4&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2020240812%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-77%20Command%20Injection&color=brighgreen) + +### Description + +** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240812. It has been classified as critical. This affects the function sprintf of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument filter leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced. + +### POC + +#### Reference +- https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_photo_search.md + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/github.txt b/github.txt index d16ae144a..a0672a397 100644 --- a/github.txt +++ b/github.txt @@ -9678,6 +9678,7 @@ CVE-2013-0422 - https://github.com/MrAli-Code/evercookie22 CVE-2013-0422 - https://github.com/Ostorlab/KEV CVE-2013-0422 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors CVE-2013-0422 - https://github.com/SaitoLab/supercookie +CVE-2013-0422 - https://github.com/binkeys/k8tools CVE-2013-0422 - https://github.com/filip0308/cookie CVE-2013-0422 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2013-0422 - https://github.com/gabrielbauman/evercookie-applet @@ -16571,6 +16572,7 @@ CVE-2015-1701 - https://github.com/SoulSec/Resource-Threat-Intelligence CVE-2015-1701 - https://github.com/TamilHackz/windows-exploitation CVE-2015-1701 - https://github.com/YSheldon/New CVE-2015-1701 - https://github.com/ambynotcoder/C-libraries +CVE-2015-1701 - https://github.com/binkeys/k8tools CVE-2015-1701 - https://github.com/blackend/Diario-RedTem CVE-2015-1701 - https://github.com/cyberanand1337x/bug-bounty-2022 CVE-2015-1701 - https://github.com/fei9747/WindowsElevation @@ -29118,6 +29120,7 @@ CVE-2016-8735 - https://github.com/SexyBeast233/SecBooks CVE-2016-8735 - https://github.com/ZTK-009/RedTeamer CVE-2016-8735 - https://github.com/bibortone/Jexboss CVE-2016-8735 - https://github.com/c002/Java-Application-Exploits +CVE-2016-8735 - https://github.com/ecomtech-oss/pisc CVE-2016-8735 - https://github.com/fengjixuchui/RedTeamer CVE-2016-8735 - https://github.com/gyanaa/https-github.com-joaomatosf-jexboss CVE-2016-8735 - https://github.com/ilmari666/cybsec @@ -31516,6 +31519,7 @@ CVE-2017-0893 - https://github.com/ARPSyndicate/cvemon CVE-2017-0894 - https://github.com/ARPSyndicate/cvemon CVE-2017-0901 - https://github.com/ARPSyndicate/cvemon CVE-2017-0902 - https://github.com/ARPSyndicate/cvemon +CVE-2017-0914 - https://github.com/EdOverflow/security-template CVE-2017-0916 - https://github.com/lanjelot/ctfs CVE-2017-0929 - https://github.com/ARPSyndicate/kenzer-templates CVE-2017-0929 - https://github.com/Elsfa7-110/kenzer-templates @@ -45656,6 +45660,7 @@ CVE-2018-11228 - https://github.com/axcheron/crestron_getsudopwd CVE-2018-11228 - https://github.com/mi-hood/CVE-2018-9206 CVE-2018-11228 - https://github.com/roninAPT/CVE-2018-0802 CVE-2018-1123 - https://github.com/aravinddathd/CVE-2018-1123 +CVE-2018-1123 - https://github.com/ecomtech-oss/pisc CVE-2018-1123 - https://github.com/samokat-oss/pisc CVE-2018-11231 - https://github.com/ARPSyndicate/kenzer-templates CVE-2018-11233 - https://github.com/ARPSyndicate/cvemon @@ -51690,6 +51695,7 @@ CVE-2018-2628 - https://github.com/angeloqmartin/Vulnerability-Assessment CVE-2018-2628 - https://github.com/awake1t/Awesome-hacking-tools CVE-2018-2628 - https://github.com/awsassets/weblogic_exploit CVE-2018-2628 - https://github.com/bakery312/Vulhub-Reproduce +CVE-2018-2628 - https://github.com/binkeys/k8tools CVE-2018-2628 - https://github.com/cross2to/betaseclab_tools CVE-2018-2628 - https://github.com/cscadoge/weblogic-cve-2018-2628 CVE-2018-2628 - https://github.com/cyberanand1337x/bug-bounty-2022 @@ -82002,6 +82008,7 @@ CVE-2020-13362 - https://github.com/Live-Hack-CVE/CVE-2020-13362 CVE-2020-13363 - https://github.com/CyberSecurityUP/My-CVEs CVE-2020-13364 - https://github.com/r0mpage/r0mpage.github.io CVE-2020-13365 - https://github.com/r0mpage/r0mpage.github.io +CVE-2020-1337 - https://github.com/0xMarcio/cve CVE-2020-1337 - https://github.com/0xT11/CVE-POC CVE-2020-1337 - https://github.com/ARPSyndicate/cvemon CVE-2020-1337 - https://github.com/Al1ex/WindowsElevation @@ -118192,6 +118199,7 @@ CVE-2021-44228 - https://github.com/dzygann/dzygann CVE-2021-44228 - https://github.com/e-hakson/OSCP CVE-2021-44228 - https://github.com/eclipse-archived/kuksa.integration CVE-2021-44228 - https://github.com/eclipse-scout/scout.rt +CVE-2021-44228 - https://github.com/ecomtech-oss/pisc CVE-2021-44228 - https://github.com/edsonjt81/log4-scanner CVE-2021-44228 - https://github.com/edsonjt81/log4j-scan CVE-2021-44228 - https://github.com/edsonjt81/nse-log4shell @@ -119630,6 +119638,7 @@ CVE-2021-45046 - https://github.com/dkd/elasticsearch CVE-2021-45046 - https://github.com/docker-solr/docker-solr CVE-2021-45046 - https://github.com/doris0213/assignments CVE-2021-45046 - https://github.com/dtact/divd-2021-00038--log4j-scanner +CVE-2021-45046 - https://github.com/ecomtech-oss/pisc CVE-2021-45046 - https://github.com/edsonjt81/log4-scanner CVE-2021-45046 - https://github.com/edsonjt81/log4j-scan CVE-2021-45046 - https://github.com/edsonjt81/nse-log4shell @@ -143606,6 +143615,7 @@ CVE-2023-1698 - https://github.com/wy876/wiki CVE-2023-1713 - https://github.com/ForceFledgling/CVE-2023-1713 CVE-2023-1713 - https://github.com/k1rurk/check_bitrix CVE-2023-1713 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2023-1713 - https://github.com/tanjiti/sec_profile CVE-2023-1714 - https://github.com/ForceFledgling/CVE-2023-1714 CVE-2023-1714 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-1718 - https://github.com/jhonnybonny/Bitrix24DoS @@ -151259,6 +151269,7 @@ CVE-2023-38941 - https://github.com/oxagast/oxasploits CVE-2023-3896 - https://github.com/fullwaywang/QlRules CVE-2023-38960 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-3897 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-3897 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-3899 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-38994 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-38996 - https://github.com/RNPG/CVEs @@ -154717,6 +154728,7 @@ CVE-2023-4911 - https://github.com/aneasystone/github-trending CVE-2023-4911 - https://github.com/b4k3d/POC_CVE4911 CVE-2023-4911 - https://github.com/beruangsalju/LocalPrivilegeEscalation CVE-2023-4911 - https://github.com/chaudharyarjun/LooneyPwner +CVE-2023-4911 - https://github.com/ecomtech-oss/pisc CVE-2023-4911 - https://github.com/feereel/wb_soc CVE-2023-4911 - https://github.com/fiksn/security-nix CVE-2023-4911 - https://github.com/flex0geek/cves-exploits @@ -163351,6 +163363,7 @@ CVE-2024-21626 - https://github.com/aneasystone/github-trending CVE-2024-21626 - https://github.com/bfengj/Cloud-Security CVE-2024-21626 - https://github.com/cdxiaodong/CVE-2024-21626 CVE-2024-21626 - https://github.com/dorser/cve-2024-21626 +CVE-2024-21626 - https://github.com/ecomtech-oss/pisc CVE-2024-21626 - https://github.com/fireinrain/github-trending CVE-2024-21626 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-21626 - https://github.com/jafshare/GithubTrending @@ -163970,6 +163983,7 @@ CVE-2024-2257 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-2258 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-22588 - https://github.com/QUICTester/QUICTester CVE-2024-22588 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-2259 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-22590 - https://github.com/QUICTester/QUICTester CVE-2024-2262 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-22625 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -164383,6 +164397,7 @@ CVE-2024-23692 - https://github.com/wy876/POC CVE-2024-2370 - https://github.com/NaInSec/CVE-LIST CVE-2024-2370 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-23708 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-23709 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-23721 - https://github.com/NaInSec/CVE-LIST CVE-2024-23722 - https://github.com/alexcote1/CVE-2024-23722-poc CVE-2024-23722 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -168377,6 +168392,7 @@ CVE-2024-3094 - https://github.com/donmccaughey/xz_pkg CVE-2024-3094 - https://github.com/dparksports/detect_intrusion CVE-2024-3094 - https://github.com/drdry2/CVE-2024-3094-EXPLOIT CVE-2024-3094 - https://github.com/duytruongpham/duytruongpham +CVE-2024-3094 - https://github.com/ecomtech-oss/pisc CVE-2024-3094 - https://github.com/emirkmo/xz-backdoor-github CVE-2024-3094 - https://github.com/enomothem/PenTestNote CVE-2024-3094 - https://github.com/felipecosta09/cve-2024-3094 @@ -168540,6 +168556,8 @@ CVE-2024-31309 - https://github.com/Vos68/HTTP2-Continuation-Flood-PoC CVE-2024-31309 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-31309 - https://github.com/lockness-Ko/CVE-2024-27316 CVE-2024-3131 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-31315 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-31315 - https://github.com/uthrasri/frameworks_base_CVE-2024-31315 CVE-2024-31318 - https://github.com/canyie/canyie CVE-2024-31342 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-31343 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -169545,6 +169563,7 @@ CVE-2024-35057 - https://github.com/cisagov/vulnrichment CVE-2024-35108 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-35109 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3512 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-35124 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3514 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3515 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3516 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -169754,6 +169773,7 @@ CVE-2024-36412 - https://github.com/wy876/POC CVE-2024-36412 - https://github.com/wy876/wiki CVE-2024-36416 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-36424 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-36424 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-36426 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-36428 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-36428 - https://github.com/tanjiti/sec_profile @@ -169852,6 +169872,7 @@ CVE-2024-3714 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-37147 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-37253 - https://github.com/20142995/nuclei-templates CVE-2024-3727 - https://github.com/EGI-Federation/SVG-advisories +CVE-2024-37287 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-37287 - https://github.com/tanjiti/sec_profile CVE-2024-3729 - https://github.com/chnzzh/OpenSSL-CVE-lib CVE-2024-37305 - https://github.com/chnzzh/OpenSSL-CVE-lib @@ -169921,6 +169942,7 @@ CVE-2024-37890 - https://github.com/Meersalzeis/pingapp CVE-2024-37891 - https://github.com/PBorocz/raindrop-io-py CVE-2024-37894 - https://github.com/MegaManSec/Squid-Security-Audit CVE-2024-37923 - https://github.com/20142995/nuclei-templates +CVE-2024-37935 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3797 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-38021 - https://github.com/cybereagle2001/KQL-Security-Querries CVE-2024-38030 - https://github.com/tomerpeled92/CVE @@ -169979,6 +170001,8 @@ CVE-2024-38473 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-38481 - https://github.com/chnzzh/iDRAC-CVE-lib CVE-2024-38489 - https://github.com/chnzzh/iDRAC-CVE-lib CVE-2024-38490 - https://github.com/chnzzh/iDRAC-CVE-lib +CVE-2024-38501 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-38502 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-38530 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-38537 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-3854 - https://github.com/googleprojectzero/fuzzilli @@ -169992,12 +170016,21 @@ CVE-2024-3858 - https://github.com/zhangjiahui-buaa/MasterThesis CVE-2024-3867 - https://github.com/c4cnm/CVE-2024-3867 CVE-2024-3867 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-3868 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-38688 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-38693 - https://github.com/20142995/nuclei-templates +CVE-2024-38699 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-38724 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3874 - https://github.com/LaPhilosophie/IoT-vulnerable +CVE-2024-38742 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-38747 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-38749 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3875 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-3875 - https://github.com/helloyhrr/IoT_vulnerability +CVE-2024-38752 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-38756 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3876 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-3876 - https://github.com/helloyhrr/IoT_vulnerability +CVE-2024-38760 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-38768 - https://github.com/20142995/nuclei-templates CVE-2024-3877 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-38770 - https://github.com/20142995/nuclei-templates @@ -170007,6 +170040,7 @@ CVE-2024-38782 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-38784 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-38785 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-38786 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-38787 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3879 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-3880 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-3881 - https://github.com/LaPhilosophie/IoT-vulnerable @@ -170039,6 +170073,7 @@ CVE-2024-39081 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-3909 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-39090 - https://github.com/arijitdirghangi/arijitdirghangi CVE-2024-3910 - https://github.com/LaPhilosophie/IoT-vulnerable +CVE-2024-3913 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3914 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3914 - https://github.com/leesh3288/leesh3288 CVE-2024-39203 - https://github.com/nomi-sec/PoC-in-GitHub @@ -170075,6 +170110,7 @@ CVE-2024-3964 - https://github.com/20142995/nuclei-templates CVE-2024-39640 - https://github.com/20142995/nuclei-templates CVE-2024-39641 - https://github.com/20142995/nuclei-templates CVE-2024-39642 - https://github.com/20142995/nuclei-templates +CVE-2024-39642 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-39643 - https://github.com/20142995/nuclei-templates CVE-2024-39644 - https://github.com/20142995/nuclei-templates CVE-2024-39645 - https://github.com/20142995/nuclei-templates @@ -170084,6 +170120,7 @@ CVE-2024-39648 - https://github.com/20142995/nuclei-templates CVE-2024-39649 - https://github.com/20142995/nuclei-templates CVE-2024-39650 - https://github.com/20142995/nuclei-templates CVE-2024-39651 - https://github.com/20142995/nuclei-templates +CVE-2024-39651 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-39652 - https://github.com/20142995/nuclei-templates CVE-2024-39653 - https://github.com/20142995/nuclei-templates CVE-2024-39654 - https://github.com/20142995/nuclei-templates @@ -170372,6 +170409,7 @@ CVE-2024-4064 - https://github.com/helloyhrr/IoT_vulnerability CVE-2024-4065 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-4066 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-4068 - https://github.com/seal-community/patches +CVE-2024-40697 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-40720 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-40721 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-40722 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -170473,6 +170511,7 @@ CVE-2024-41709 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4171 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-4171 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4172 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-41774 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-41806 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-41816 - https://github.com/20142995/nuclei-templates CVE-2024-41819 - https://github.com/alessio-romano/Sfoffo-Pentesting-Notes @@ -170594,21 +170633,42 @@ CVE-2024-43044 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-43044 - https://github.com/tanjiti/sec_profile CVE-2024-43045 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-43111 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-43121 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-43128 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-43129 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4313 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-43131 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-43135 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-43138 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-43140 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-43141 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-43153 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-43160 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-43165 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4317 - https://github.com/wiltondb/wiltondb CVE-2024-43199 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4320 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-43220 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-43224 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-43225 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-43226 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-43227 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4323 - https://github.com/d0rb/CVE-2024-4323 CVE-2024-4323 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-4323 - https://github.com/skilfoy/CVE-2024-4323-Exploit-POC CVE-2024-4323 - https://github.com/yuansec/CVE-2024-4323-dos_poc CVE-2024-4323 - https://github.com/zgimszhd61/openai-sec-test-cve-quickstart +CVE-2024-43231 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-43233 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4324 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4328 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4331 - https://github.com/angelov-1080/CVE_Checker CVE-2024-4331 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4333 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4334 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-43358 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-43359 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-43360 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4340 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4345 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4346 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -171061,6 +171121,7 @@ CVE-2024-5653 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5654 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5655 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-5663 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-56662 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-5668 - https://github.com/20142995/nuclei-templates CVE-2024-5670 - https://github.com/tanjiti/sec_profile CVE-2024-5678 - https://github.com/0x41424142/qualyspy @@ -171103,6 +171164,7 @@ CVE-2024-5809 - https://github.com/20142995/nuclei-templates CVE-2024-5814 - https://github.com/wolfSSL/Arduino-wolfSSL CVE-2024-5814 - https://github.com/wolfSSL/wolfssl CVE-2024-5818 - https://github.com/20142995/nuclei-templates +CVE-2024-5849 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-5861 - https://github.com/20142995/nuclei-templates CVE-2024-5947 - https://github.com/komodoooo/Some-things CVE-2024-5947 - https://github.com/nomi-sec/PoC-in-GitHub @@ -171212,6 +171274,7 @@ CVE-2024-6529 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-6536 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-6552 - https://github.com/20142995/nuclei-templates CVE-2024-6553 - https://github.com/20142995/nuclei-templates +CVE-2024-6558 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6562 - https://github.com/20142995/nuclei-templates CVE-2024-6571 - https://github.com/20142995/nuclei-templates CVE-2024-6589 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -171232,6 +171295,7 @@ CVE-2024-6706 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6707 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6710 - https://github.com/20142995/nuclei-templates CVE-2024-6722 - https://github.com/20142995/nuclei-templates +CVE-2024-6724 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6731 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6732 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6738 - https://github.com/nomi-sec/PoC-in-GitHub @@ -171245,6 +171309,8 @@ CVE-2024-6756 - https://github.com/20142995/nuclei-templates CVE-2024-6759 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6766 - https://github.com/20142995/nuclei-templates CVE-2024-6766 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-6768 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-6768 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-6779 - https://github.com/leesh3288/leesh3288 CVE-2024-6781 - https://github.com/20142995/nuclei-templates CVE-2024-6781 - https://github.com/wy876/POC @@ -171253,6 +171319,7 @@ CVE-2024-6782 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-6782 - https://github.com/wy876/POC CVE-2024-6802 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6807 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-6823 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6824 - https://github.com/20142995/nuclei-templates CVE-2024-6836 - https://github.com/20142995/nuclei-templates CVE-2024-6865 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -171292,6 +171359,8 @@ CVE-2024-7081 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7082 - https://github.com/20142995/nuclei-templates CVE-2024-7084 - https://github.com/20142995/nuclei-templates CVE-2024-7091 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7092 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7094 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7120 - https://github.com/Ostorlab/KEV CVE-2024-7120 - https://github.com/komodoooo/Some-things CVE-2024-7150 - https://github.com/20142995/nuclei-templates @@ -171315,6 +171384,7 @@ CVE-2024-7214 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7215 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7216 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7246 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7247 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7265 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7266 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7267 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -171346,6 +171416,7 @@ CVE-2024-7365 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7366 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7382 - https://github.com/20142995/nuclei-templates CVE-2024-7383 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7388 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7395 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7396 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7397 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -171422,11 +171493,19 @@ CVE-2024-7580 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7581 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7584 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7585 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7589 - https://github.com/tanjiti/sec_profile +CVE-2024-7590 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7610 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7621 - https://github.com/20142995/nuclei-templates CVE-2024-7648 - https://github.com/20142995/nuclei-templates CVE-2024-7649 - https://github.com/20142995/nuclei-templates CVE-2024-7697 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7704 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7705 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7706 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7707 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7709 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7715 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-87654 - https://github.com/runwuf/clickhouse-test CVE-2024-98765 - https://github.com/runwuf/clickhouse-test CVE-2024-99999 - https://github.com/kolewttd/wtt diff --git a/references.txt b/references.txt index d49b5e9b9..cc1e79a06 100644 --- a/references.txt +++ b/references.txt @@ -89263,6 +89263,7 @@ CVE-2023-1197 - https://huntr.dev/bounties/97d226ea-2cd8-4f4d-9360-aa46c37fdd26 CVE-2023-1200 - https://vuldb.com/?id.222388 CVE-2023-1207 - https://wpscan.com/vulnerability/6f3f460b-542a-4d32-8feb-afa1aef57e37 CVE-2023-1208 - https://wpscan.com/vulnerability/e0cc6740-866a-4a81-a93d-ff486b79b7f7 +CVE-2023-1209 - https://www.linkedin.com/in/osamay/ CVE-2023-1211 - https://huntr.dev/bounties/ed569124-2aeb-4b0d-a312-435460892afd CVE-2023-1212 - https://huntr.dev/bounties/3d5199d6-9bb2-4f7b-bd81-bded704da499 CVE-2023-1219 - http://packetstormsecurity.com/files/171795/Chrome-base-debug-ActivityUserData-ActivityUserData-Heap-Buffer-Overflow.html @@ -89291,6 +89292,7 @@ CVE-2023-1282 - https://wpscan.com/vulnerability/f4b2617f-5235-4587-9eaf-d0f6bb2 CVE-2023-1283 - https://huntr.dev/bounties/63f1ff91-48f3-4886-a179-103f1ddd8ff8 CVE-2023-1286 - https://huntr.dev/bounties/31d97442-3f87-439f-83f0-1c7862ef0c7c CVE-2023-1289 - https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-j96m-mjp6-99xr +CVE-2023-1298 - https://www.linkedin.com/in/osamay/ CVE-2023-1304 - https://docs.divvycloud.com/changelog/23321-release-notes CVE-2023-1305 - https://docs.divvycloud.com/changelog/23321-release-notes CVE-2023-1306 - https://docs.divvycloud.com/changelog/23321-release-notes @@ -93286,6 +93288,7 @@ CVE-2023-3896 - https://github.com/vim/vim/issues/12528 CVE-2023-38960 - https://rodelllemit.medium.com/insecure-permissions-vulnerability-in-raidenftpd-v2-4-build-4005-2016-04-01-ea7389be3d33 CVE-2023-38961 - https://github.com/jerryscript-project/jerryscript/issues/5092 CVE-2023-38965 - http://packetstormsecurity.com/files/175077/Lost-And-Found-Information-System-1.0-Insecure-Direct-Object-Reference.html +CVE-2023-38969 - https://github.com/anh91/uasoft-indonesia--badaso/blob/main/XSS2.md CVE-2023-38969 - https://panda002.hashnode.dev/badaso-version-297-has-an-xss-vulnerability-in-add-books CVE-2023-3897 - http://packetstormsecurity.com/files/177179/SureMDM-On-Premise-CAPTCHA-Bypass-User-Enumeration.html CVE-2023-38970 - https://github.com/anh91/uasoft-indonesia--badaso/blob/main/XSS3.md @@ -94739,6 +94742,7 @@ CVE-2023-4815 - https://huntr.dev/bounties/4cd3eeb4-57c9-4af2-ad19-2166c9e0fd2c CVE-2023-4816 - https://images.go.hitachienergy.com/Web/ABBEnterpriseSoftware/%7B70b3d323-4866-42e1-8a75-58996729c1d4%7D_8DBD000172-VU-2023-23_Asset_Suite_Tagout_vulnerability_Rev1.pdf CVE-2023-48161 - https://github.com/tacetool/TACE#cve-2023-48161 CVE-2023-48161 - https://sourceforge.net/p/giflib/bugs/167/ +CVE-2023-48171 - https://gccybermonks.com/posts/defectdojo/ CVE-2023-48172 - http://packetstormsecurity.com/files/175800 CVE-2023-4818 - https://blog.stmcyber.com/pax-pos-cves-2023/ CVE-2023-4819 - https://wpscan.com/vulnerability/4423b023-cf4a-46cb-b314-7a09ac08b29a @@ -96739,6 +96743,7 @@ CVE-2024-21732 - https://github.com/Ghostfox2003/cms/blob/main/1.md CVE-2024-21733 - http://packetstormsecurity.com/files/176951/Apache-Tomcat-8.5.63-9.0.43-HTTP-Response-Smuggling.html CVE-2024-2174 - https://issues.chromium.org/issues/325866363 CVE-2024-2176 - https://issues.chromium.org/issues/325936438 +CVE-2024-2177 - https://gitlab.com/gitlab-org/gitlab/-/issues/444467 CVE-2024-2180 - https://fluidattacks.com/advisories/gomez/ CVE-2024-21827 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-1947 CVE-2024-21887 - http://packetstormsecurity.com/files/176668/Ivanti-Connect-Secure-Unauthenticated-Remote-Code-Execution.html @@ -98903,6 +98908,7 @@ CVE-2024-36844 - https://github.com/stephane/libmodbus/issues/749 CVE-2024-36845 - https://github.com/stephane/libmodbus/issues/750 CVE-2024-36857 - https://github.com/HackAllSec/CVEs/tree/main/Jan%20AFR%20vulnerability CVE-2024-36858 - https://github.com/HackAllSec/CVEs/tree/main/Jan%20Arbitrary%20File%20Upload%20vulnerability +CVE-2024-36877 - https://jjensn.com/at-home-in-your-firmware/ CVE-2024-36886 - https://git.kernel.org/stable/c/080cbb890286cd794f1ee788bbc5463e2deb7c2b CVE-2024-36886 - https://git.kernel.org/stable/c/21ea04aad8a0839b4ec27ef1691ca480620e8e14 CVE-2024-36886 - https://git.kernel.org/stable/c/367766ff9e407f8a68409b7ce4dc4d5a72afeab1 @@ -99154,6 +99160,7 @@ CVE-2024-3908 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC CVE-2024-3909 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formexeCommand.md CVE-2024-3909 - https://vuldb.com/?id.261145 CVE-2024-39090 - https://github.com/arijitdirghanji/My-CVEs/blob/main/CVE-2024-39090.md +CVE-2024-39091 - https://joerngermany.github.io/mipc_vulnerability/ CVE-2024-3910 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/fromDhcpListClient_page.md CVE-2024-3910 - https://vuldb.com/?id.261146 CVE-2024-39119 - https://github.com/2477231995/cms/blob/main/1.md @@ -99282,6 +99289,7 @@ CVE-2024-40430 - https://alexsecurity.rocks/posts/cve-2024-40430/ CVE-2024-40430 - https://github.com/github/advisory-database/pull/4645 CVE-2024-40433 - https://github.com/yikaikkk/CookieShareInWebView/blob/master/README.md CVE-2024-40492 - https://github.com/minendie/POC_CVE-2024-40492 +CVE-2024-40500 - https://nitipoom-jar.github.io/CVE-2024-40500/ CVE-2024-40502 - https://packetstormsecurity.com/files/179583/Hospital-Management-System-Project-In-ASP.Net-MVC-1-SQL-Injection.html CVE-2024-4057 - https://wpscan.com/vulnerability/da4d4d87-07b3-4f7d-bcbd-d29968a30b4f/ CVE-2024-40576 - https://github.com/jubilianite/CVEs/blob/main/CVE-2024-40576.md @@ -99883,6 +99891,7 @@ CVE-2024-5421 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-seh-un CVE-2024-5422 - http://seclists.org/fulldisclosure/2024/Jun/4 CVE-2024-5422 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-seh-untserver-pro/index.html CVE-2024-5428 - https://github.com/kaikai145154/CVE-CSRF/blob/main/SourceCodester%20Simple%20Online%20Bidding%20System%20CSRF.md +CVE-2024-5430 - https://gitlab.com/gitlab-org/gitlab/-/issues/464017 CVE-2024-5437 - https://github.com/pijiawei/CVE/blob/pijiawei-photo/SourceCodester%20Simple%20Online%20Bidding%20System%20XSS.md CVE-2024-5442 - https://wpscan.com/vulnerability/4f1fa417-f760-4132-95c2-a38d0b631263/ CVE-2024-5444 - https://wpscan.com/vulnerability/21eddf64-c71e-4aba-b1e9-fe67b4ddfb30/ @@ -100071,6 +100080,7 @@ CVE-2024-6707 - https://korelogic.com/Resources/Advisories/KL-001-2024-006.txt CVE-2024-6710 - https://wpscan.com/vulnerability/1afcf9d4-c2f9-4d47-8d9e-d7fa6ae2358d/ CVE-2024-6716 - https://gitlab.com/libtiff/libtiff/-/issues/620 CVE-2024-6720 - https://wpscan.com/vulnerability/d1449be1-ae85-46f4-b5ba-390d25b87723/ +CVE-2024-6724 - https://wpscan.com/vulnerability/0cb3158a-263d-4c4a-8029-62b453c281cb/ CVE-2024-6729 - https://reports-kunull.vercel.app/CVE%20research/2024/cve-2024-6729 CVE-2024-6729 - https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6729 CVE-2024-6731 - https://reports-kunull.vercel.app/CVE%20research/2024/cve-2024-6731 @@ -100080,6 +100090,7 @@ CVE-2024-6732 - https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6732 CVE-2024-6732 - https://vuldb.com/?submit.374370 CVE-2024-6745 - https://github.com/xzyxiaohaha/cve/issues/2 CVE-2024-6766 - https://wpscan.com/vulnerability/77bb1dcf-4e84-497a-955e-f3c0b649ad1c/ +CVE-2024-6768 - https://www.fortra.com/security/advisories/research/fr-2024-001 CVE-2024-6781 - https://starlabs.sg/advisories/24/24-6781/ CVE-2024-6782 - https://starlabs.sg/advisories/24/24-6782/ CVE-2024-6783 - https://www.herodevs.com/vulnerability-directory/cve-2024-6783---vue-client-side-xss @@ -100312,9 +100323,26 @@ CVE-2024-7614 - https://github.com/BeaCox/IoT_vuln/tree/main/tenda/FH1206/qosset CVE-2024-7615 - https://github.com/BeaCox/IoT_vuln/tree/main/tenda/FH1206/Safe_Client_or_Url_or_Mac_Filter_bof CVE-2024-7635 - https://github.com/space-security/cve/issues/2 CVE-2024-7636 - https://github.com/space-security/cve/issues/1 +CVE-2024-7637 - https://github.com/space-security/cve/issues/3 +CVE-2024-7643 - https://github.com/joinia/webray.com.cn/blob/main/Leads-Manager-Tool/leadmanagersql.md +CVE-2024-7644 - https://github.com/joinia/webray.com.cn/blob/main/Leads-Manager-Tool/leadmanagerxss.md CVE-2024-7645 - https://github.com/ddChenA/cve/blob/main/csrf.md CVE-2024-7660 - https://docs.google.com/document/d/19jCrr48SwP9dkOAaf8HAgg0fxK7PjE4ZWbPSFU4zqKE/edit?usp=sharing +CVE-2024-7661 - https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20CSRF-1.md +CVE-2024-7662 - https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20CSRF-2.md CVE-2024-7663 - https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20SQL%20Injection-1.md +CVE-2024-7664 - https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20SQL%20Injection-2.md +CVE-2024-7665 - https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20SQL%20Injection-3.md CVE-2024-7666 - https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20SQL%20Injection-4.md +CVE-2024-7667 - https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20SQL%20Injection-5.md CVE-2024-7668 - https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20SQL%20Injection-6.md +CVE-2024-7669 - https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20SQL%20Injection-7.md +CVE-2024-7676 - https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20SQL%20Injection-8.md +CVE-2024-7680 - https://github.com/chenzg22/cve/issues/1 CVE-2024-7681 - https://github.com/space-security/cve/issues/6 +CVE-2024-7682 - https://github.com/space-security/cve/issues/7 +CVE-2024-7704 - https://github.com/Dreamy-elfland/240731 +CVE-2024-7705 - https://github.com/DeepMountains/Mirage/blob/main/CVE12-1.md +CVE-2024-7706 - https://github.com/DeepMountains/Mirage/blob/main/CVE12-2.md +CVE-2024-7707 - https://github.com/VodkaVortex/IoT/blob/main/formSafeEmailFilter.md +CVE-2024-7715 - https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_photo_search.md