mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-19 17:30:12 +00:00
Update CVE sources 2024-08-24 17:55
This commit is contained in:
parent
7f567c153c
commit
8d17e0c8f8
@ -86,6 +86,7 @@ Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusi
|
||||
- https://github.com/password520/RedTeamer
|
||||
- https://github.com/pwnagelabs/VEF
|
||||
- https://github.com/qi4L/WeblogicScan.go
|
||||
- https://github.com/qiuluo-oss/Tiger
|
||||
- https://github.com/rabbitmask/WeblogicScan
|
||||
- https://github.com/rabbitmask/WeblogicScanLot
|
||||
- https://github.com/rabbitmask/WeblogicScanServer
|
||||
|
@ -55,6 +55,7 @@ The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remot
|
||||
- https://github.com/pravinsrc/NOTES-windows-kernel-links
|
||||
- https://github.com/pudiding/CVE-2016-3088
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/qiuluo-oss/Tiger
|
||||
- https://github.com/retr0-13/Goby
|
||||
- https://github.com/sponkmonk/Ladon_english_update
|
||||
- https://github.com/t0m4too/t0m4to
|
||||
|
@ -91,6 +91,7 @@ When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.
|
||||
- https://github.com/q99266/saury-vulnhub
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/qiantu88/Tomcat-Exploit
|
||||
- https://github.com/qiuluo-oss/Tiger
|
||||
- https://github.com/qiwentaidi/Slack
|
||||
- https://github.com/r0eXpeR/redteam_vul
|
||||
- https://github.com/safe6Sec/PentestNote
|
||||
|
@ -41,6 +41,7 @@ No PoCs from references.
|
||||
- https://github.com/merlinepedra25/nuclei-templates
|
||||
- https://github.com/openx-org/BLEN
|
||||
- https://github.com/q99266/saury-vulnhub
|
||||
- https://github.com/qiuluo-oss/Tiger
|
||||
- https://github.com/ronoski/j2ee-rscan
|
||||
- https://github.com/snyk-labs/container-breaking-in-goof
|
||||
- https://github.com/sobinge/nuclei-templates
|
||||
|
@ -26,5 +26,6 @@ In Laravel framework through 5.5.21, remote attackers can obtain sensitive infor
|
||||
- https://github.com/Threekiii/Awesome-POC
|
||||
- https://github.com/Z0fhack/Goby_POC
|
||||
- https://github.com/d4n-sec/d4n-sec.github.io
|
||||
- https://github.com/qiuluo-oss/Tiger
|
||||
- https://github.com/v4p0r/rooon-fiuuu
|
||||
|
||||
|
@ -37,4 +37,5 @@ parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0
|
||||
- https://github.com/luckyfuture0177/VULOnceMore
|
||||
- https://github.com/openx-org/BLEN
|
||||
- https://github.com/pan2013e/ppt4j
|
||||
- https://github.com/qiuluo-oss/Tiger
|
||||
|
||||
|
@ -67,6 +67,7 @@ Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older
|
||||
- https://github.com/nBp1Ng/SpringFramework-Vul
|
||||
- https://github.com/onewinner/VulToolsKit
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/qiuluo-oss/Tiger
|
||||
- https://github.com/ronoski/j2ee-rscan
|
||||
- https://github.com/seal-community/patches
|
||||
- https://github.com/snowlovely/HacLang
|
||||
|
@ -36,4 +36,5 @@ No PoCs from references.
|
||||
- https://github.com/openx-org/BLEN
|
||||
- https://github.com/petitfleur/prov_navigator
|
||||
- https://github.com/provnavigator/prov_navigator
|
||||
- https://github.com/qiuluo-oss/Tiger
|
||||
|
||||
|
@ -41,6 +41,7 @@ When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/pyn3rd/CVE-2019-0232
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/qiuluo-oss/Tiger
|
||||
- https://github.com/r0eXpeR/redteam_vul
|
||||
- https://github.com/rootameen/vulpine
|
||||
- https://github.com/safe6Sec/PentestNote
|
||||
|
@ -3598,6 +3598,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan
|
||||
- https://github.com/pcrobotics2/2023-15425-CenterStage
|
||||
- https://github.com/pcrobotics2/2023-19545-CenterStage
|
||||
- https://github.com/pcrobotics2/2023-22130-CenterStage
|
||||
- https://github.com/perfectparadox8400/8400_2024
|
||||
- https://github.com/petergriffinnn/code
|
||||
- https://github.com/petthepotat-dump/FTC-22-23-Refactored
|
||||
- https://github.com/pgdev1729/FTC-Robot-Controller-Centerstage
|
||||
|
@ -88,6 +88,7 @@ Sonatype Nexus Repository before 3.21.2 allows JavaEL Injection (issue 1 of 2).
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
- https://github.com/yedada-wei/-
|
||||
- https://github.com/yedada-wei/gongkaishouji
|
||||
- https://github.com/zhaojunliing/awesome-stars
|
||||
- https://github.com/zhzyker/CVE-2020-10199_POC-EXP
|
||||
- https://github.com/zhzyker/exphub
|
||||
- https://github.com/zoroqi/my-awesome
|
||||
|
@ -77,6 +77,7 @@ Sonatype Nexus Repository before 3.21.2 allows Remote Code Execution.
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
- https://github.com/yedada-wei/-
|
||||
- https://github.com/yedada-wei/gongkaishouji
|
||||
- https://github.com/zhaojunliing/awesome-stars
|
||||
- https://github.com/zhzyker/CVE-2020-10204
|
||||
- https://github.com/zhzyker/exphub
|
||||
- https://github.com/zoroqi/my-awesome
|
||||
|
@ -48,6 +48,7 @@ Sonatype Nexus Repository Manager 3.x up to and including 3.21.2 has Incorrect A
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/weeka10/-hktalent-TOP
|
||||
- https://github.com/whoadmin/pocs
|
||||
- https://github.com/zhaojunliing/awesome-stars
|
||||
- https://github.com/zhzyker/CVE-2020-11444
|
||||
- https://github.com/zhzyker/exphub
|
||||
- https://github.com/zoroqi/my-awesome
|
||||
|
@ -24,6 +24,7 @@ In Apache APISIX, the user enabled the Admin API and deleted the Admin API acces
|
||||
- https://github.com/bakery312/Vulhub-Reproduce
|
||||
- https://github.com/bigblackhat/oFx
|
||||
- https://github.com/openx-org/BLEN
|
||||
- https://github.com/qiuluo-oss/Tiger
|
||||
- https://github.com/samurai411/toolbox
|
||||
- https://github.com/t0m4too/t0m4to
|
||||
- https://github.com/tanjiti/sec_profile
|
||||
|
@ -190,6 +190,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
||||
- https://github.com/yichensec/Bug_writer
|
||||
- https://github.com/yyzsec/2021SecWinterTask
|
||||
- https://github.com/zer0yu/Awesome-CobaltStrike
|
||||
- https://github.com/zhaojunliing/awesome-stars
|
||||
- https://github.com/zhzyker/exphub
|
||||
- https://github.com/zhzyker/vulmap
|
||||
- https://github.com/zoroqi/my-awesome
|
||||
|
@ -216,6 +216,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
|
||||
- https://github.com/yedada-wei/gongkaishouji
|
||||
- https://github.com/yq1ng/Java
|
||||
- https://github.com/ze0r/GhostCat-LFI-exp
|
||||
- https://github.com/zhaojunliing/awesome-stars
|
||||
- https://github.com/zhzyker/exphub
|
||||
- https://github.com/zoroqi/my-awesome
|
||||
|
||||
|
@ -176,6 +176,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
||||
- https://github.com/yedada-wei/-
|
||||
- https://github.com/yedada-wei/gongkaishouji
|
||||
- https://github.com/zema1/oracle-vuln-crawler
|
||||
- https://github.com/zhaojunliing/awesome-stars
|
||||
- https://github.com/zhzyker/exphub
|
||||
- https://github.com/zoroqi/my-awesome
|
||||
- https://github.com/zzwlpx/weblogicPoc
|
||||
|
@ -163,6 +163,7 @@ Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (compo
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
- https://github.com/yedada-wei/-
|
||||
- https://github.com/yedada-wei/gongkaishouji
|
||||
- https://github.com/zhaojunliing/awesome-stars
|
||||
- https://github.com/zhzyker/exphub
|
||||
- https://github.com/zhzyker/vulmap
|
||||
- https://github.com/zoroqi/my-awesome
|
||||
|
@ -125,6 +125,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
||||
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||||
- https://github.com/yedada-wei/-
|
||||
- https://github.com/yedada-wei/gongkaishouji
|
||||
- https://github.com/zhaojunliing/awesome-stars
|
||||
- https://github.com/zhzyker/exphub
|
||||
- https://github.com/zhzyker/vulmap
|
||||
- https://github.com/zoroqi/my-awesome
|
||||
|
@ -71,6 +71,7 @@ No PoCs from references.
|
||||
- https://github.com/pen4uin/vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research-list
|
||||
- https://github.com/pentration/gongkaishouji
|
||||
- https://github.com/qiuluo-oss/Tiger
|
||||
- https://github.com/readloud/Awesome-Stars
|
||||
- https://github.com/ronoski/j2ee-rscan
|
||||
- https://github.com/shadowsock5/spring-cloud-config-starter
|
||||
|
@ -49,6 +49,7 @@ No PoCs from references.
|
||||
- https://github.com/mmk-1/kubernetes-poc
|
||||
- https://github.com/n1sh1th/CVE-POC
|
||||
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
|
||||
- https://github.com/qiuluo-oss/Tiger
|
||||
- https://github.com/slimtoolkit/slim
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/superlink996/chunqiuyunjingbachang
|
||||
|
@ -119,6 +119,7 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic
|
||||
- https://github.com/pen4uin/vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research-list
|
||||
- https://github.com/qingchenhh/Tools-collection
|
||||
- https://github.com/qiuluo-oss/Tiger
|
||||
- https://github.com/r3volved/CVEAggregate
|
||||
- https://github.com/ramimac/aws-customer-security-incidents
|
||||
- https://github.com/randolphcyg/nuclei-plus
|
||||
|
@ -57,6 +57,7 @@ No PoCs from references.
|
||||
- https://github.com/pen4uin/awesome-vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research
|
||||
- https://github.com/pen4uin/vulnerability-research-list
|
||||
- https://github.com/qiuluo-oss/Tiger
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/t0m4too/t0m4to
|
||||
- https://github.com/trhacknon/Pocingit
|
||||
|
@ -11,6 +11,7 @@ A vulnerability, which was classified as problematic, was found in Emlog Pro up
|
||||
|
||||
#### Reference
|
||||
- https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/emlog%3C=pro-1.2.2%20Stored%20Cross-Site%20Scripting(XSS).md
|
||||
- https://vuldb.com/?id.198705
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -23,4 +23,5 @@ UniSharp laravel-filemanager (aka Laravel Filemanager) before 2.6.4 allows downl
|
||||
- https://github.com/Miraitowa70/POC-Notes
|
||||
- https://github.com/Threekiii/Awesome-POC
|
||||
- https://github.com/d4n-sec/d4n-sec.github.io
|
||||
- https://github.com/qiuluo-oss/Tiger
|
||||
|
||||
|
@ -20,6 +20,7 @@ No PoCs from references.
|
||||
- https://github.com/Threekiii/Vulhub-Reproduce
|
||||
- https://github.com/bakery312/Vulhub-Reproduce
|
||||
- https://github.com/d4n-sec/d4n-sec.github.io
|
||||
- https://github.com/qiuluo-oss/Tiger
|
||||
- https://github.com/tanjiti/sec_profile
|
||||
- https://github.com/wjlin0/poc-doc
|
||||
- https://github.com/wy876/POC
|
||||
|
@ -13,5 +13,6 @@ This vulnerability allows remote attackers to execute arbitrary code on affected
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/DiRaltvein/memory-corruption-examples
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
||||
|
17
2023/CVE-2023-0926.md
Normal file
17
2023/CVE-2023-0926.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0926](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0926)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Custom Permalinks plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 2.6.0 due to insufficient input sanitization and output escaping on tag names. This allows authenticated users, with editor-level permissions or greater to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page, even when 'unfiltered_html' has been disabled.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/samiahmedsiddiqui/custom-permalinks/pull/96
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -1,11 +1,11 @@
|
||||
### [CVE-2023-2414](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2414)
|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
The Online Booking & Scheduling Calendar for WordPress by vcita plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the vcita_save_settings_callback function in versions up to, and including, 4.2.10. This makes it possible for authenticated attackers with minimal permissions, such as a subscriber, to modify the plugins settings, upload media files, and inject malicious JavaScript.
|
||||
The Online Booking & Scheduling Calendar for WordPress by vcita plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the vcita_save_settings_callback function in versions up to, and including, 4.4.6. This makes it possible for authenticated attackers with minimal permissions, such as a subscriber, to modify the plugins settings, upload arbitrary files, and inject malicious JavaScript (before 4.3.2).
|
||||
|
||||
### POC
|
||||
|
||||
|
17
2023/CVE-2023-27772.md
Normal file
17
2023/CVE-2023-27772.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-27772](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27772)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
libiec61850 v1.5.1 was discovered to contain a segmentation violation via the function ControlObjectClient_setOrigin() at /client/client_control.c.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/mz-automation/libiec61850/issues/442
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -83,6 +83,7 @@ Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 all
|
||||
- https://github.com/passwa11/2023Hvv_
|
||||
- https://github.com/passwa11/CVE-2023-38646
|
||||
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
|
||||
- https://github.com/qiuluo-oss/Tiger
|
||||
- https://github.com/raytheon0x21/CVE-2023-38646
|
||||
- https://github.com/robotmikhro/CVE-2023-38646
|
||||
- https://github.com/samurai411/toolbox
|
||||
|
17
2023/CVE-2023-41101.md
Normal file
17
2023/CVE-2023-41101.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-41101](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41101)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
An issue was discovered in the captive portal in OpenNDS before version 10.1.3. get_query in http_microhttpd.c does not validate the length of the query string of GET requests. This leads to a stack-based buffer overflow in versions 9.x and earlier, and to a heap-based buffer overflow in versions 10.x and later. Attackers may exploit the issue to crash OpenNDS (Denial-of-Service condition) or to inject and execute arbitrary bytecode (Remote Code Execution). Affected OpenNDS before version 10.1.3 fixed in OpenWrt master and OpenWrt 23.05 on 23. November by updating OpenNDS to version 10.2.0.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/DiRaltvein/memory-corruption-examples
|
||||
|
@ -10,7 +10,7 @@ A vulnerability was found in SourceCodester Free Hospital Management System for
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://vuldb.com/?id.237563
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
17
2023/CVE-2023-4449.md
Normal file
17
2023/CVE-2023-4449.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-4449](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4449)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A vulnerability was found in SourceCodester Free and Open Source Inventory Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /index.php?page=member. The manipulation of the argument columns[0][data] leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-237570 is the identifier assigned to this vulnerability.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://vuldb.com/?id.237570
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -13,5 +13,5 @@ PlutoSVG commit 336c02997277a1888e6ccbbbe674551a0582e5c4 and before was discover
|
||||
- https://github.com/sammycage/plutosvg/issues/7
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
- https://github.com/DiRaltvein/memory-corruption-examples
|
||||
|
||||
|
@ -10,7 +10,7 @@ A vulnerability has been found in IBOS OA 4.5.5 and classified as critical. This
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://vuldb.com/?id.238630
|
||||
|
||||
#### Github
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
@ -11,6 +11,7 @@ A vulnerability was found in Byzoro Smart S45F Multi-Service Secure Gateway Inte
|
||||
|
||||
#### Reference
|
||||
- https://github.com/Jacky-Y/vuls/blob/main/vul6.md
|
||||
- https://vuldb.com/?id.238634
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2023/CVE-2023-49485.md
Normal file
17
2023/CVE-2023-49485.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-49485](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49485)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
JFinalCMS v5.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the column management department.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/Rabb1ter/cms/blob/main/There%20is%20a%20storage%20type%20XSS%20in%20the%20column%20management%20department.md
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -11,6 +11,7 @@ A vulnerability, which was classified as critical, has been found in infinitiete
|
||||
|
||||
#### Reference
|
||||
- http://packetstormsecurity.com/files/174760/Taskhub-2.8.7-SQL-Injection.html
|
||||
- https://vuldb.com/?id.239798
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2023/CVE-2023-4991.md
Normal file
17
2023/CVE-2023-4991.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-4991](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4991)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A vulnerability was found in NextBX QWAlerter 4.50. It has been rated as critical. Affected by this issue is some unknown functionality of the file QWAlerter.exe. The manipulation leads to unquoted search path. It is possible to launch the attack on the local host. The identifier of this vulnerability is VDB-239804. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://vuldb.com/?id.239804
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -24,6 +24,7 @@ No PoCs from references.
|
||||
- https://github.com/m-cetin/CVE-2024-20767
|
||||
- https://github.com/netlas-io/netlas-dorks
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/qiuluo-oss/Tiger
|
||||
- https://github.com/tanjiti/sec_profile
|
||||
- https://github.com/trganda/starrlist
|
||||
- https://github.com/wjlin0/poc-doc
|
||||
|
18
2024/CVE-2024-21689.md
Normal file
18
2024/CVE-2024-21689.md
Normal file
@ -0,0 +1,18 @@
|
||||
### [CVE-2024-21689](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21689)
|
||||

|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
This High severity RCE (Remote Code Execution) vulnerability CVE-2024-21689 was introduced in versions 9.1.0, 9.2.0, 9.3.0, 9.4.0, 9.5.0, and 9.6.0 of Bamboo Data Center and Server.
This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.6, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.
Atlassian recommends that Bamboo Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:
Bamboo Data Center and Server 9.2: Upgrade to a release greater than or equal to 9.2.17
Bamboo Data Center and Server 9.6: Upgrade to a release greater than or equal to 9.6.5
See the release notes ([https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html]). You can download the latest version of Bamboo Data Center and Server from the download center ([https://www.atlassian.com/software/bamboo/download-archives]).
This vulnerability was reported via our Bug Bounty program.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
@ -18,6 +18,7 @@ Generation of Error Message Containing Sensitive Information vulnerability in Ap
|
||||
- https://github.com/Ostorlab/KEV
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/qiuluo-oss/Tiger
|
||||
- https://github.com/tanjiti/sec_profile
|
||||
- https://github.com/versio-io/product-lifecycle-security-api
|
||||
- https://github.com/wjlin0/poc-doc
|
||||
|
@ -14,4 +14,5 @@ No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/tanjiti/sec_profile
|
||||
|
||||
|
@ -13,5 +13,6 @@ Type Confusion in WebAssembly in Google Chrome prior to 123.0.6312.86 allowed a
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/TrojanAZhen/Self_Back
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
||||
|
18
2024/CVE-2024-34065.md
Normal file
18
2024/CVE-2024-34065.md
Normal file
@ -0,0 +1,18 @@
|
||||
### [CVE-2024-34065](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34065)
|
||||

|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
Strapi is an open-source content management system. By combining two vulnerabilities (an `Open Redirect` and `session token sent as URL query parameter`) in @strapi/plugin-users-permissions before version 4.24.2, is its possible of an unauthenticated attacker to bypass authentication mechanisms and retrieve the 3rd party tokens. The attack requires user interaction (one click). Unauthenticated attackers can leverage two vulnerabilities to obtain an 3rd party token and the bypass authentication of Strapi apps. Users should upgrade @strapi/plugin-users-permissions to version 4.24.2 to receive a patch.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/strapi/strapi/security/advisories/GHSA-wrvh-rcmr-9qfc
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -10,7 +10,7 @@ Virtual Programming Lab for Moodle up to v4.2.3 was discovered to contain a cros
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://github.com/vincentscode/CVE-2024-34312
|
||||
|
||||
#### Github
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
@ -10,7 +10,7 @@ Insecure permissions in Entrust Datacard XPS Card Printer Driver 8.4 and earlier
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://github.com/pamoutaf/CVE-2024-34329/blob/main/README.md
|
||||
|
||||
#### Github
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
@ -10,7 +10,7 @@ Pi-hole is a DNS sinkhole that protects devices from unwanted content without in
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://github.com/pi-hole/pi-hole/security/advisories/GHSA-jg6g-rrj6-xfg6
|
||||
|
||||
#### Github
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
@ -10,7 +10,7 @@ CMSimple_XH 1.7.6 allows XSS by uploading a crafted SVG document.
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://github.com/surajhacx/CVE-2024-34452/
|
||||
|
||||
#### Github
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
17
2024/CVE-2024-34702.md
Normal file
17
2024/CVE-2024-34702.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-34702](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34702)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
Botan is a C++ cryptography library. X.509 certificates can identify elliptic curves using either an object identifier or using explicit encoding of the parameters. Prior to 3.5.0 and 2.19.5, checking name constraints in X.509 certificates is quadratic in the number of names and name constraints. An attacker who presented a certificate chain which contained a very large number of names in the SubjectAlternativeName, signed by a CA certificate which contained a large number of name constraints, could cause a denial of service. The problem has been addressed in Botan 3.5.0 and a partial backport has also been applied and is included in Botan 2.19.5.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/randombit/botan/security/advisories/GHSA-5gg9-hqpr-r58j
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
18
2024/CVE-2024-34703.md
Normal file
18
2024/CVE-2024-34703.md
Normal file
@ -0,0 +1,18 @@
|
||||
### [CVE-2024-34703](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34703)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Botan is a C++ cryptography library. X.509 certificates can identify elliptic curves using either an object identifier or using explicit encoding of the parameters. Prior to versions 3.3.0 and 2.19.4, an attacker could present an ECDSA X.509 certificate using explicit encoding where the parameters are very large. The proof of concept used a 16Kbit prime for this purpose. When parsing, the parameter is checked to be prime, causing excessive computation. This was patched in 2.19.4 and 3.3.0 to allow the prime parameter of the elliptic curve to be at most 521 bits. No known workarounds are available. Note that support for explicit encoding of elliptic curve parameters is deprecated in Botan.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/randombit/botan/security/advisories/GHSA-w4g2-7m2h-7xj7
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2024/CVE-2024-35325.md
Normal file
17
2024/CVE-2024-35325.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-35325](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35325)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A vulnerability was found in libyaml up to 0.2.5. Affected by this issue is the function yaml_event_delete of the file /src/libyaml/src/api.c. The manipulation leads to a double-free.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35325.c
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2024/CVE-2024-36514.md
Normal file
17
2024/CVE-2024-36514.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-36514](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36514)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
Zohocorp ManageEngine ADAudit Plus versions below 8000 are vulnerable to the authenticated SQL injection in file summary option.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
17
2024/CVE-2024-36515.md
Normal file
17
2024/CVE-2024-36515.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-36515](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36515)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
Zohocorp ManageEngine ADAudit Plus versions below 8000 are vulnerable to the authenticated SQL injection in dashboard.Note: This vulnerability is different from another vulnerability (CVE-2024-36516), both of which have affected ADAudit Plus' dashboard.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
17
2024/CVE-2024-36516.md
Normal file
17
2024/CVE-2024-36516.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-36516](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36516)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
Zohocorp ManageEngine ADAudit Plus versions below 8000 are vulnerable to the authenticated SQL injection in dashboard.Note: This vulnerability is different from another vulnerability (CVE-2024-36515), both of which have affected ADAudit Plus' dashboard.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
17
2024/CVE-2024-36517.md
Normal file
17
2024/CVE-2024-36517.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-36517](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36517)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
Zohocorp ManageEngine ADAudit Plus versions below 8000 are vulnerable to the authenticated SQL injection in alerts module.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
17
2024/CVE-2024-37311.md
Normal file
17
2024/CVE-2024-37311.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-37311](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37311)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Collabora Online is a collaborative online office suite based on LibreOffice. In affected versions of Collabora Online, https connections from coolwsd to other hosts may incompletely verify the remote host's certificate's against the full chain of trust. This vulnerability is fixed in Collabora Online 24.04.4.3, 23.05.14.1, and 22.05.23.1.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
@ -20,6 +20,7 @@ No PoCs from references.
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
- https://github.com/k3ppf0r/2024-PocLib
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/qiuluo-oss/Tiger
|
||||
- https://github.com/tanjiti/sec_profile
|
||||
- https://github.com/wy876/POC
|
||||
- https://github.com/wy876/wiki
|
||||
|
20
2024/CVE-2024-38869.md
Normal file
20
2024/CVE-2024-38869.md
Normal file
@ -0,0 +1,20 @@
|
||||
### [CVE-2024-38869](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38869)
|
||||

|
||||

|
||||

|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
An Stored Cross-site Scripting vulnerability affects Zohocorp ManageEngine ServiceDesk Plus, ServiceDesk Plus MSP and SupportCenter Plus.This issue affects ServiceDesk Plus versions: through 14810; ServiceDesk Plus MSP: through 14800; SupportCenter Plus: through 14800.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
17
2024/CVE-2024-39666.md
Normal file
17
2024/CVE-2024-39666.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-39666](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39666)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Automattic WooCommerce.This issue affects WooCommerce: from n/a through 9.1.2.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
@ -14,6 +14,7 @@ No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/qiuluo-oss/Tiger
|
||||
- https://github.com/wy876/POC
|
||||
- https://github.com/wy876/wiki
|
||||
|
||||
|
20
2024/CVE-2024-41150.md
Normal file
20
2024/CVE-2024-41150.md
Normal file
@ -0,0 +1,20 @@
|
||||
### [CVE-2024-41150](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41150)
|
||||

|
||||

|
||||

|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
An Stored Cross-site Scripting vulnerability affects Zohocorp ManageEngine ServiceDesk Plus, ServiceDesk Plus MSP and SupportCenter Plus.This issue affects ServiceDesk Plus versions: through 14810; ServiceDesk Plus MSP: through 14800; SupportCenter Plus: through 14800.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
17
2024/CVE-2024-42040.md
Normal file
17
2024/CVE-2024-42040.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-42040](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42040)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Buffer Overflow vulnerability in the net/bootp.c in DENEX U-Boot from its initial commit in 2002 (3861aa5) up to today on any platform allows an attacker on the local network to leak memory from four up to 32 bytes of memory stored behind the packet to the network depending on the later use of DHCP-provided parameters via crafted DHCP responses.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
17
2024/CVE-2024-42764.md
Normal file
17
2024/CVE-2024-42764.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-42764](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42764)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Kashipara Bus Ticket Reservation System v1.0 is vulnerable to Cross Site Request Forgery (CSRF) via /deleteTicket.php.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
17
2024/CVE-2024-42765.md
Normal file
17
2024/CVE-2024-42765.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-42765](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42765)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A SQL injection vulnerability in "/login.php" of the Kashipara Bus Ticket Reservation System v1.0 allows remote attackers to execute arbitrary SQL commands and bypass Login via the "email" or "password" Login page parameters.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
17
2024/CVE-2024-42766.md
Normal file
17
2024/CVE-2024-42766.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-42766](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42766)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Kashipara Bus Ticket Reservation System v1.0 0 is vulnerable to Incorrect Access Control via /deleteTicket.php.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
17
2024/CVE-2024-42845.md
Normal file
17
2024/CVE-2024-42845.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-42845](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42845)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
An eval Injection vulnerability in the component invesalius/reader/dicom.py of InVesalius 3.1.99991 through 3.1.99998 allows attackers to execute arbitrary code via loading a crafted DICOM file.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
17
2024/CVE-2024-42915.md
Normal file
17
2024/CVE-2024-42915.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-42915](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42915)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A host header injection vulnerability in Staff Appraisal System v1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link. This will allow attackers to arbitrarily reset other users' passwords and compromise their accounts.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
17
2024/CVE-2024-42918.md
Normal file
17
2024/CVE-2024-42918.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-42918](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42918)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
itsourcecode Online Accreditation Management System contains a Cross Site Scripting vulnerability, which allows an attacker to execute arbitrary code via a crafted payload to the SCHOOLNAME, EMAILADDRES, CONTACTNO, COMPANYNAME and COMPANYCONTACTNO parameters in controller.php.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://packetstormsecurity.com
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2024/CVE-2024-42992.md
Normal file
17
2024/CVE-2024-42992.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-42992](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42992)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Python Pip Pandas v2.2.2 was discovered to contain an arbitrary file read vulnerability.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
@ -13,5 +13,6 @@ Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
||||
|
17
2024/CVE-2024-43239.md
Normal file
17
2024/CVE-2024-43239.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43239](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43239)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Authorization Bypass Through User-Controlled Key vulnerability in Masteriyo Masteriyo - LMS.This issue affects Masteriyo - LMS: from n/a through 1.11.4.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43240.md
Normal file
17
2024/CVE-2024-43240.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43240](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43240)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Improper Privilege Management vulnerability in azzaroco Ultimate Membership Pro allows Privilege Escalation.This issue affects Ultimate Membership Pro: from n/a through 12.6.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43241.md
Normal file
17
2024/CVE-2024-43241.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43241](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43241)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in azzaroco Ultimate Membership Pro allows Reflected XSS.This issue affects Ultimate Membership Pro: from n/a through 12.6.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43242.md
Normal file
17
2024/CVE-2024-43242.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43242](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43242)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Deserialization of Untrusted Data vulnerability in azzaroco Ultimate Membership Pro allows Object Injection.This issue affects Ultimate Membership Pro: from n/a through 12.6.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43244.md
Normal file
17
2024/CVE-2024-43244.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43244](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43244)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in favethemes Houzez allows Reflected XSS.This issue affects Houzez: from n/a through 3.2.4.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43245.md
Normal file
17
2024/CVE-2024-43245.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43245](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43245)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Improper Privilege Management vulnerability in eyecix JobSearch allows Privilege Escalation.This issue affects JobSearch: from n/a through 2.3.4.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43246.md
Normal file
17
2024/CVE-2024-43246.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43246](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43246)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in creativeon WHMpress allows Reflected XSS.This issue affects WHMpress: from n/a through 6.2-revision-5.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43247.md
Normal file
17
2024/CVE-2024-43247.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43247](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43247)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Missing Authorization vulnerability in creativeon WHMpress allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects WHMpress: from n/a through 6.2-revision-5.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43248.md
Normal file
17
2024/CVE-2024-43248.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43248](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43248)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Bit Apps Bit Form Pro allows File Manipulation.This issue affects Bit Form Pro: from n/a through 2.6.4.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43249.md
Normal file
17
2024/CVE-2024-43249.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43249](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43249)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Unrestricted Upload of File with Dangerous Type vulnerability in Bit Apps Bit Form Pro allows Command Injection.This issue affects Bit Form Pro: from n/a through 2.6.4.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43250.md
Normal file
17
2024/CVE-2024-43250.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43250](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43250)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Incorrect Authorization vulnerability in Bit Apps Bit Form Pro bitformpro allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Bit Form Pro: from n/a through 2.6.4.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43252.md
Normal file
17
2024/CVE-2024-43252.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43252](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43252)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Deserialization of Untrusted Data vulnerability in Crew HRM allows Object Injection.This issue affects Crew HRM: from n/a through 1.1.1.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43256.md
Normal file
17
2024/CVE-2024-43256.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43256](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43256)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Missing Authorization vulnerability in nouthemes Leopard - WordPress offload media allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Leopard - WordPress offload media: from n/a through 2.0.36.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43261.md
Normal file
17
2024/CVE-2024-43261.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43261](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43261)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Hamed Naderfar Compute Links allows PHP Remote File Inclusion.This issue affects Compute Links: from n/a through 1.2.1.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43262.md
Normal file
17
2024/CVE-2024-43262.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43262](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43262)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in webriti Busiprof allows Stored XSS.This issue affects Busiprof: from n/a through 2.4.8.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43263.md
Normal file
17
2024/CVE-2024-43263.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43263](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43263)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Visual Composer Visual Composer Starter allows Stored XSS.This issue affects Visual Composer Starter: from n/a through 3.3.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43266.md
Normal file
17
2024/CVE-2024-43266.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43266](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43266)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Authorization Bypass Through User-Controlled Key vulnerability in WP Job Portal.This issue affects WP Job Portal: from n/a through 2.1.6.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43267.md
Normal file
17
2024/CVE-2024-43267.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43267](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43267)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Qamar Sheeraz, Nasir Ahmad, GenialSouls Mega Addons For Elementor allows Stored XSS.This issue affects Mega Addons For Elementor: from n/a through 1.9.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43271.md
Normal file
17
2024/CVE-2024-43271.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43271](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43271)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Themelocation Woo Products Widgets For Elementor allows PHP Local File Inclusion.This issue affects Woo Products Widgets For Elementor: from n/a through 2.0.0.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43272.md
Normal file
17
2024/CVE-2024-43272.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43272](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43272)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Missing Authentication for Critical Function vulnerability in icegram Icegram allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Icegram: from n/a through 3.1.24.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
@ -13,5 +13,6 @@ Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
||||
|
17
2024/CVE-2024-43278.md
Normal file
17
2024/CVE-2024-43278.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43278](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43278)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Phi Phan Meta Field Block allows Stored XSS.This issue affects Meta Field Block: from n/a through 1.2.13.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43279.md
Normal file
17
2024/CVE-2024-43279.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43279](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43279)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Tribulant Newsletters allows Reflected XSS.This issue affects Newsletters: from n/a through 4.9.8.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43280.md
Normal file
17
2024/CVE-2024-43280.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43280](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43280)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Salon Booking System Salon booking system.This issue affects Salon booking system: from n/a through 10.8.1.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43281.md
Normal file
17
2024/CVE-2024-43281.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43281](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43281)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in VOID CODERS Void Elementor Post Grid Addon for Elementor Page builder allows PHP Local File Inclusion.This issue affects Void Elementor Post Grid Addon for Elementor Page builder: from n/a through 2.3.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43282.md
Normal file
17
2024/CVE-2024-43282.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43282](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43282)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themeum Tutor LMS.This issue affects Tutor LMS: from n/a through 2.7.2.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43284.md
Normal file
17
2024/CVE-2024-43284.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43284](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43284)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Travel WP Travel Gutenberg Blocks allows Stored XSS.This issue affects WP Travel Gutenberg Blocks: from n/a through 3.5.1.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
17
2024/CVE-2024-43288.md
Normal file
17
2024/CVE-2024-43288.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2024-43288](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43288)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Authorization Bypass Through User-Controlled Key vulnerability in gVectors Team wpForo Forum.This issue affects wpForo Forum: from n/a through 2.3.4.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user