mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-19 17:30:12 +00:00
Update CVE sources 2024-08-21 13:32
This commit is contained in:
parent
57029a3b0f
commit
d2e2cbe9ca
17
2006/CVE-2006-4660.md
Normal file
17
2006/CVE-2006-4660.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2006-4660](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4660)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Multiple cross-site scripting (XSS) vulnerabilities in the RSS Feed module in AOL ICQ Toolbar 1.3 for Internet Explorer (toolbaru.dll) allow remote attackers to process arbitrary web script or HTML in the Feeds interface context via the (1) title and (2) description elements within an item element in an RSS feed.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
- http://securityreason.com/securityalert/1523
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
No PoCs found on GitHub currently.
|
||||||
|
|
17
2006/CVE-2006-4661.md
Normal file
17
2006/CVE-2006-4661.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2006-4661](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4661)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
AOL ICQ Toolbar 1.3 for Internet Explorer (toolbaru.dll) does not properly validate the origin of the configuration web page (options2.html), which allows user-assisted remote attackers to provide a web page that contains disguised checkboxes that trick the user into reconfiguring the toolbar.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
- http://securityreason.com/securityalert/1523
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
No PoCs found on GitHub currently.
|
||||||
|
|
@ -18,11 +18,13 @@ Signal handler race condition in OpenSSH before 4.4 allows remote attackers to c
|
|||||||
- https://github.com/Passyed/regreSSHion-Fix
|
- https://github.com/Passyed/regreSSHion-Fix
|
||||||
- https://github.com/TAM-K592/CVE-2024-6387
|
- https://github.com/TAM-K592/CVE-2024-6387
|
||||||
- https://github.com/ThemeHackers/CVE-2024-6387
|
- https://github.com/ThemeHackers/CVE-2024-6387
|
||||||
|
- https://github.com/almogopp/OpenSSH-CVE-2024-6387-Fix
|
||||||
- https://github.com/azurejoga/CVE-2024-6387-how-to-fix
|
- https://github.com/azurejoga/CVE-2024-6387-how-to-fix
|
||||||
- https://github.com/bigb0x/CVE-2024-6387
|
- https://github.com/bigb0x/CVE-2024-6387
|
||||||
- https://github.com/giterlizzi/secdb-feeds
|
- https://github.com/giterlizzi/secdb-feeds
|
||||||
- https://github.com/invaderslabs/regreSSHion-CVE-2024-6387-
|
- https://github.com/invaderslabs/regreSSHion-CVE-2024-6387-
|
||||||
- https://github.com/kalvin-net/NoLimit-Secu-RegreSSHion
|
- https://github.com/kalvin-net/NoLimit-Secu-RegreSSHion
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
|
- https://github.com/s1d6point7bugcrowd/CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH
|
||||||
- https://github.com/sardine-web/CVE-2024-6387_Check
|
- https://github.com/sardine-web/CVE-2024-6387_Check
|
||||||
|
|
||||||
|
@ -17,8 +17,10 @@ A certain Debian patch for OpenSSH before 4.3p2-9etch3 on etch; before 4.6p1-1 o
|
|||||||
- https://github.com/David-M-Berry/openssh-cve-discovery
|
- https://github.com/David-M-Berry/openssh-cve-discovery
|
||||||
- https://github.com/Passyed/regreSSHion-Fix
|
- https://github.com/Passyed/regreSSHion-Fix
|
||||||
- https://github.com/TAM-K592/CVE-2024-6387
|
- https://github.com/TAM-K592/CVE-2024-6387
|
||||||
|
- https://github.com/almogopp/OpenSSH-CVE-2024-6387-Fix
|
||||||
- https://github.com/azurejoga/CVE-2024-6387-how-to-fix
|
- https://github.com/azurejoga/CVE-2024-6387-how-to-fix
|
||||||
- https://github.com/bigb0x/CVE-2024-6387
|
- https://github.com/bigb0x/CVE-2024-6387
|
||||||
- https://github.com/invaderslabs/regreSSHion-CVE-2024-6387-
|
- https://github.com/invaderslabs/regreSSHion-CVE-2024-6387-
|
||||||
- https://github.com/kalvin-net/NoLimit-Secu-RegreSSHion
|
- https://github.com/kalvin-net/NoLimit-Secu-RegreSSHion
|
||||||
|
- https://github.com/s1d6point7bugcrowd/CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH
|
||||||
|
|
||||||
|
@ -22,6 +22,7 @@ No PoCs from references.
|
|||||||
- https://github.com/Glumgam/UnrealiRCd-3.2.8.1-exploit-python
|
- https://github.com/Glumgam/UnrealiRCd-3.2.8.1-exploit-python
|
||||||
- https://github.com/JoseLRC97/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution
|
- https://github.com/JoseLRC97/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution
|
||||||
- https://github.com/MFernstrom/OffensivePascal-CVE-2010-2075
|
- https://github.com/MFernstrom/OffensivePascal-CVE-2010-2075
|
||||||
|
- https://github.com/Mr-Tree-S/POC_EXP
|
||||||
- https://github.com/Okarn/TP_securite_EDOU_JACQUEMONT
|
- https://github.com/Okarn/TP_securite_EDOU_JACQUEMONT
|
||||||
- https://github.com/Patrick122333/4240project
|
- https://github.com/Patrick122333/4240project
|
||||||
- https://github.com/Sh4dowX404/UnrealIRCD-3.2.8.1-Backdoor
|
- https://github.com/Sh4dowX404/UnrealIRCD-3.2.8.1-Backdoor
|
||||||
|
@ -34,6 +34,7 @@ active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.
|
|||||||
- https://github.com/hktalent/TOP
|
- https://github.com/hktalent/TOP
|
||||||
- https://github.com/jbmihoub/all-poc
|
- https://github.com/jbmihoub/all-poc
|
||||||
- https://github.com/josal/crack-0.1.8-fixed
|
- https://github.com/josal/crack-0.1.8-fixed
|
||||||
|
- https://github.com/localeapp/localeapp
|
||||||
- https://github.com/mengdaya/Web-CTF-Cheatsheet
|
- https://github.com/mengdaya/Web-CTF-Cheatsheet
|
||||||
- https://github.com/michenriksen/nmap-scripts
|
- https://github.com/michenriksen/nmap-scripts
|
||||||
- https://github.com/mitaku/rails_cve_2013_0156_patch
|
- https://github.com/mitaku/rails_cve_2013_0156_patch
|
||||||
|
@ -11,6 +11,7 @@ Sitecore Experience Platform (XP) prior to 9.1.1 is vulnerable to remote code ex
|
|||||||
|
|
||||||
#### Reference
|
#### Reference
|
||||||
- http://packetstormsecurity.com/files/153274/Sitecore-8.x-Deserialization-Remote-Code-Execution.html
|
- http://packetstormsecurity.com/files/153274/Sitecore-8.x-Deserialization-Remote-Code-Execution.html
|
||||||
|
- https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/91/Sitecore%20Experience%20Platform%2091%20Update1/Release%20Notes
|
||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
No PoCs found on GitHub currently.
|
No PoCs found on GitHub currently.
|
||||||
|
@ -1848,6 +1848,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan
|
|||||||
- https://github.com/QuantumRoboticsFTC/freightfrenzy-app
|
- https://github.com/QuantumRoboticsFTC/freightfrenzy-app
|
||||||
- https://github.com/QuantumRoboticsFTC/powerplay-app
|
- https://github.com/QuantumRoboticsFTC/powerplay-app
|
||||||
- https://github.com/QuantumRoboticsFTC/ultimategoal-app
|
- https://github.com/QuantumRoboticsFTC/ultimategoal-app
|
||||||
|
- https://github.com/R-Tacoz/FTC14607_23-24RC
|
||||||
- https://github.com/R3Vipers/test
|
- https://github.com/R3Vipers/test
|
||||||
- https://github.com/RCGV1/testingFTC
|
- https://github.com/RCGV1/testingFTC
|
||||||
- https://github.com/RDasari7304/PurePursuitController
|
- https://github.com/RDasari7304/PurePursuitController
|
||||||
|
17
2022/CVE-2022-3997.md
Normal file
17
2022/CVE-2022-3997.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2022-3997](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3997)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
A vulnerability, which was classified as critical, has been found in MonikaBrzica scm. Affected by this issue is some unknown functionality of the file upis_u_bazu.php. The manipulation of the argument email/lozinka/ime/id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-213698 is the identifier assigned to this vulnerability.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
- https://vuldb.com/?id.213698
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
No PoCs found on GitHub currently.
|
||||||
|
|
17
2022/CVE-2022-48020.md
Normal file
17
2022/CVE-2022-48020.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2022-48020](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48020)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Vinteo VCC v2.36.4 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the conference parameter. This vulnerability allows attackers to inject arbitrary code which will be executed by the victim user's browser.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
- https://www.linkedin.com/in/dmitry-kiryukhin-b5741421b/
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
No PoCs found on GitHub currently.
|
||||||
|
|
@ -13,5 +13,5 @@ A vulnerability has been found in Sisimai up to 4.25.14p11 and classified as pro
|
|||||||
- https://vuldb.com/?id.218452
|
- https://vuldb.com/?id.218452
|
||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
No PoCs found on GitHub currently.
|
- https://github.com/sisimai/rb-sisimai
|
||||||
|
|
||||||
|
17
2023/CVE-2023-2290.md
Normal file
17
2023/CVE-2023-2290.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2023-2290](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2290)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
A potential vulnerability in the LenovoFlashDeviceInterface SMI handler may allow an attacker with local access and elevated privileges to execute arbitrary code.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/tadghh/Dell-unlock-undervolting
|
||||||
|
|
17
2023/CVE-2023-29384.md
Normal file
17
2023/CVE-2023-29384.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2023-29384](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29384)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Unrestricted Upload of File with Dangerous Type vulnerability in HM Plugin WordPress Job Board and Recruitment Plugin – JobWP.This issue affects WordPress Job Board and Recruitment Plugin – JobWP: from n/a through 2.0.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
|
|
@ -14,6 +14,7 @@ A vulnerability was found in D-Link DAR-8000-10 up to 20230809. It has been clas
|
|||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
- https://github.com/20142995/sectool
|
- https://github.com/20142995/sectool
|
||||||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/tanjiti/sec_profile
|
- https://github.com/tanjiti/sec_profile
|
||||||
- https://github.com/wjlin0/poc-doc
|
- https://github.com/wjlin0/poc-doc
|
||||||
- https://github.com/wy876/POC
|
- https://github.com/wy876/POC
|
||||||
|
17
2023/CVE-2023-4590.md
Normal file
17
2023/CVE-2023-4590.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2023-4590](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4590)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Buffer overflow vulnerability in Frhed hex editor, affecting version 1.6.0. This vulnerability could allow an attacker to execute arbitrary code via a long filename argument through the Structured Exception Handler (SEH) registers.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
|
|
36
2023/CVE-2023-48251.md
Normal file
36
2023/CVE-2023-48251.md
Normal file
@ -0,0 +1,36 @@
|
|||||||
|
### [CVE-2023-48251](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48251)
|
||||||
|
&color=blue)
|
||||||
|
&color=blue)
|
||||||
|
&color=blue)
|
||||||
|
&color=blue)
|
||||||
|
&color=blue)
|
||||||
|
&color=blue)
|
||||||
|
&color=blue)
|
||||||
|
&color=blue)
|
||||||
|
&color=blue)
|
||||||
|
&color=blue)
|
||||||
|
&color=blue)
|
||||||
|
&color=blue)
|
||||||
|
&color=blue)
|
||||||
|
&color=blue)
|
||||||
|
&color=blue)
|
||||||
|
&color=blue)
|
||||||
|
&color=blue)
|
||||||
|
&color=blue)
|
||||||
|
&color=blue)
|
||||||
|
&color=blue)
|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
The vulnerability allows a remote attacker to authenticate to the SSH service with root privileges through a hidden hard-coded account.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/oxagast/oxasploits
|
||||||
|
|
17
2023/CVE-2023-50100.md
Normal file
17
2023/CVE-2023-50100.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2023-50100](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50100)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS) via carousel image editing.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
- https://github.com/Jarvis-616/cms/blob/master/There%20is%20a%20storage%20type%20XSS%20for%20carousel%20image%20editing.md
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
No PoCs found on GitHub currently.
|
||||||
|
|
17
2023/CVE-2023-5029.md
Normal file
17
2023/CVE-2023-5029.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2023-5029](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5029)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
A vulnerability, which was classified as critical, was found in mccms 2.6. This affects an unknown part of the file /category/order/hits/copyright/46/finish/1/list/1. The manipulation with the input '"1 leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-239871.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
- https://vuldb.com/?id.239871
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
No PoCs found on GitHub currently.
|
||||||
|
|
17
2023/CVE-2023-5587.md
Normal file
17
2023/CVE-2023-5587.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2023-5587](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5587)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
A vulnerability was found in SourceCodester Free Hospital Management System for Small Practices 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /vm/admin/doctors.php of the component Parameter Handler. The manipulation of the argument search leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-242186 is the identifier assigned to this vulnerability.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
- https://vuldb.com/?id.242186
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
No PoCs found on GitHub currently.
|
||||||
|
|
@ -11,6 +11,7 @@ A vulnerability, which was classified as critical, was found in Netentsec NS-ASG
|
|||||||
|
|
||||||
#### Reference
|
#### Reference
|
||||||
- https://github.com/Wsecpro/cve1/blob/main/NS-ASG-sql-list_addr_fwresource_ip.md
|
- https://github.com/Wsecpro/cve1/blob/main/NS-ASG-sql-list_addr_fwresource_ip.md
|
||||||
|
- https://vuldb.com/?id.243057
|
||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
No PoCs found on GitHub currently.
|
No PoCs found on GitHub currently.
|
||||||
|
17
2023/CVE-2023-5919.md
Normal file
17
2023/CVE-2023-5919.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2023-5919](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5919)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
A vulnerability was found in SourceCodester Company Website CMS 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /dashboard/createblog of the component Create Blog Page. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-244310 is the identifier assigned to this vulnerability.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
- https://vuldb.com/?id.244310
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
No PoCs found on GitHub currently.
|
||||||
|
|
@ -15,4 +15,5 @@ No PoCs from references.
|
|||||||
#### Github
|
#### Github
|
||||||
- https://github.com/NaInSec/CVE-LIST
|
- https://github.com/NaInSec/CVE-LIST
|
||||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
|
|
||||||
|
@ -13,5 +13,5 @@ Buffer Overflow vulnerability in bandisoft bandiview v7.0, allows local attacker
|
|||||||
- https://gist.github.com/GAP-dev/c33276a151c824300d68aecc317082a3
|
- https://gist.github.com/GAP-dev/c33276a151c824300d68aecc317082a3
|
||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
No PoCs found on GitHub currently.
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
|
|
||||||
|
@ -14,4 +14,5 @@ No PoCs from references.
|
|||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
- https://github.com/d3ng03/PP-Auto-Detector
|
- https://github.com/d3ng03/PP-Auto-Detector
|
||||||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
|
|
||||||
|
17
2024/CVE-2024-25582.md
Normal file
17
2024/CVE-2024-25582.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-25582](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25582)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Module savepoints could be abused to inject references to malicious code delivered through the same domain. Attackers could perform malicious API requests or extract information from the users account. Exploiting this vulnerability requires temporary access to an account or successful social engineering to make a user follow a prepared link to a malicious account. Please deploy the provided updates and patch releases. The savepoint module path has been restricted to modules that provide the feature, excluding any arbitrary or non-existing modules. No publicly available exploits are known.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2024-26585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26585)
|
### [CVE-2024-26585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26585)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -15,4 +15,5 @@ es5-ext contains ECMAScript 5 extensions. Passing functions with very long names
|
|||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
|
|
||||||
|
17
2024/CVE-2024-27609.md
Normal file
17
2024/CVE-2024-27609.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-27609](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27609)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Bonita before 2023.2-u2 allows stored XSS via a UI screen in the administration panel.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/mohammedatary/mohammedatary
|
||||||
|
|
@ -14,4 +14,5 @@ No PoCs from references.
|
|||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
- https://github.com/mohammedatary/mohammedatary
|
||||||
|
|
||||||
|
@ -12,6 +12,7 @@ A vulnerability classified as critical was found in code-projects Online Book Sy
|
|||||||
#### Reference
|
#### Reference
|
||||||
- https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Authentication%20Bypass.md
|
- https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Authentication%20Bypass.md
|
||||||
- https://vuldb.com/?id.258202
|
- https://vuldb.com/?id.258202
|
||||||
|
- https://vuldb.com/?submit.305052
|
||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
- https://github.com/FoxyProxys/CVE-2024-3000
|
- https://github.com/FoxyProxys/CVE-2024-3000
|
||||||
|
17
2024/CVE-2024-33644.md
Normal file
17
2024/CVE-2024-33644.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-33644](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33644)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Control of Generation of Code ('Code Injection') vulnerability in WPCustomify Customify Site Library allows Code Injection.This issue affects Customify Site Library: from n/a through 0.0.9.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
|
|
@ -15,4 +15,5 @@ KubePi is a K8s panel. Starting in version 1.6.3 and prior to version 1.8.0, the
|
|||||||
#### Github
|
#### Github
|
||||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
- https://github.com/wy876/POC
|
- https://github.com/wy876/POC
|
||||||
|
- https://github.com/wy876/wiki
|
||||||
|
|
||||||
|
@ -19,4 +19,5 @@ No PoCs from references.
|
|||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
|
|
||||||
|
@ -22,4 +22,5 @@ No PoCs from references.
|
|||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/tanjiti/sec_profile
|
- https://github.com/tanjiti/sec_profile
|
||||||
- https://github.com/wy876/POC
|
- https://github.com/wy876/POC
|
||||||
|
- https://github.com/wy876/wiki
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2024-39472](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39472)
|
### [CVE-2024-39472](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39472)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2024-41042](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41042)
|
### [CVE-2024-41042](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41042)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -15,4 +15,5 @@ Tenda FH1201 v1.2.0.14 was discovered to contain a command injection vulnerabili
|
|||||||
#### Github
|
#### Github
|
||||||
- https://github.com/ibaiw/2024Hvv
|
- https://github.com/ibaiw/2024Hvv
|
||||||
- https://github.com/wy876/POC
|
- https://github.com/wy876/POC
|
||||||
|
- https://github.com/wy876/wiki
|
||||||
|
|
||||||
|
@ -15,4 +15,5 @@ Tenda FH1201 v1.2.0.14 was discovered to contain a command injection vulnerabili
|
|||||||
#### Github
|
#### Github
|
||||||
- https://github.com/ibaiw/2024Hvv
|
- https://github.com/ibaiw/2024Hvv
|
||||||
- https://github.com/wy876/POC
|
- https://github.com/wy876/POC
|
||||||
|
- https://github.com/wy876/wiki
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2024-42259](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42259)
|
### [CVE-2024-42259](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42259)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2024-42299](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42299)
|
### [CVE-2024-42299](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42299)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2024-42301](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42301)
|
### [CVE-2024-42301](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42301)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2024-42302](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42302)
|
### [CVE-2024-42302](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42302)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2024-42304](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42304)
|
### [CVE-2024-42304](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42304)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2024-42305](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42305)
|
### [CVE-2024-42305](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42305)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2024-42306](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42306)
|
### [CVE-2024-42306](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42306)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2024-42308](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42308)
|
### [CVE-2024-42308](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42308)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2024-42309](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42309)
|
### [CVE-2024-42309](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42309)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2024-42310](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42310)
|
### [CVE-2024-42310](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42310)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2024-42311](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42311)
|
### [CVE-2024-42311](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42311)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2024-42312](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42312)
|
### [CVE-2024-42312](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42312)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2024-42313](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42313)
|
### [CVE-2024-42313](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42313)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2024-42318](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42318)
|
### [CVE-2024-42318](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42318)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
17
2024/CVE-2024-42675.md
Normal file
17
2024/CVE-2024-42675.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-42675](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42675)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
17
2024/CVE-2024-43145.md
Normal file
17
2024/CVE-2024-43145.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-43145](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43145)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AyeCode Ltd GeoDirectory.This issue affects GeoDirectory: from n/a through 2.3.61.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/20142995/nuclei-templates
|
||||||
|
|
17
2024/CVE-2024-43207.md
Normal file
17
2024/CVE-2024-43207.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-43207](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43207)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Valiano Unite Gallery Lite.This issue affects Unite Gallery Lite: from n/a through 1.7.62.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/20142995/nuclei-templates
|
||||||
|
|
17
2024/CVE-2024-43238.md
Normal file
17
2024/CVE-2024-43238.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-43238](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43238)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in weDevs weMail allows Reflected XSS.This issue affects weMail: from n/a through 1.14.5.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
17
2024/CVE-2024-43276.md
Normal file
17
2024/CVE-2024-43276.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-43276](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43276)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Svetoslav Marinov (Slavi) Child Theme Creator allows Reflected XSS.This issue affects Child Theme Creator: from n/a through 1.5.4.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
17
2024/CVE-2024-43291.md
Normal file
17
2024/CVE-2024-43291.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-43291](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43291)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in voidCoders Void Contact Form 7 Widget For Elementor Page Builder allows Stored XSS.This issue affects Void Contact Form 7 Widget For Elementor Page Builder: from n/a through 2.4.1.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/20142995/nuclei-templates
|
||||||
|
|
17
2024/CVE-2024-43294.md
Normal file
17
2024/CVE-2024-43294.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-43294](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43294)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BoldThemes Bold Timeline Lite allows Stored XSS.This issue affects Bold Timeline Lite: from n/a through 1.2.0.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/20142995/nuclei-templates
|
||||||
|
|
17
2024/CVE-2024-43304.md
Normal file
17
2024/CVE-2024-43304.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-43304](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43304)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Cool Plugins Cryptocurrency Widgets – Price Ticker & Coins List allows Reflected XSS.This issue affects Cryptocurrency Widgets – Price Ticker & Coins List: from n/a through 2.8.0.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/20142995/nuclei-templates
|
||||||
|
|
18
2024/CVE-2024-43305.md
Normal file
18
2024/CVE-2024-43305.md
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
### [CVE-2024-43305](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43305)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Code Amp Custom Layouts – Post + Product grids made easy allows Stored XSS.This issue affects Custom Layouts – Post + Product grids made easy: from n/a through 1.4.11.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/20142995/nuclei-templates
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
17
2024/CVE-2024-43306.md
Normal file
17
2024/CVE-2024-43306.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-43306](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43306)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP-Lister Lite for eBay allows Reflected XSS.This issue affects WP-Lister Lite for eBay: from n/a through 3.6.0.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
17
2024/CVE-2024-43307.md
Normal file
17
2024/CVE-2024-43307.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-43307](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43307)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Gordon Böhme, Antonio Leutsch Structured Content allows Stored XSS.This issue affects Structured Content: from n/a through 1.6.2.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
17
2024/CVE-2024-43308.md
Normal file
17
2024/CVE-2024-43308.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-43308](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43308)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Gutentor Gutentor - Gutenberg Blocks - Page Builder for Gutenberg Editor allows Stored XSS.This issue affects Gutentor - Gutenberg Blocks - Page Builder for Gutenberg Editor: from n/a through 3.3.5.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
17
2024/CVE-2024-43309.md
Normal file
17
2024/CVE-2024-43309.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-43309](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43309)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Socio WP Telegram Widget and Join Link allows Stored XSS.This issue affects WP Telegram Widget and Join Link: from n/a through 2.1.27.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
17
2024/CVE-2024-43313.md
Normal file
17
2024/CVE-2024-43313.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-43313](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43313)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in FormFacade allows Reflected XSS.This issue affects FormFacade: from n/a through 1.3.2.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
17
2024/CVE-2024-43315.md
Normal file
17
2024/CVE-2024-43315.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-43315](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43315)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Authorization Bypass Through User-Controlled Key vulnerability in Checkout Plugins Stripe Payments For WooCommerce by Checkout.This issue affects Stripe Payments For WooCommerce by Checkout: from n/a through 1.9.1.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/20142995/nuclei-templates
|
||||||
|
|
17
2024/CVE-2024-43318.md
Normal file
17
2024/CVE-2024-43318.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-43318](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43318)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in E2Pdf.Com allows Stored XSS.This issue affects e2pdf: from n/a through 1.25.05.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
18
2024/CVE-2024-43320.md
Normal file
18
2024/CVE-2024-43320.md
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
### [CVE-2024-43320](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43320)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Livemesh Livemesh Addons for WPBakery Page Builder addons-for-visual-composer allows Stored XSS.This issue affects Livemesh Addons for WPBakery Page Builder: from n/a through 3.9.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/20142995/nuclei-templates
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
17
2024/CVE-2024-43321.md
Normal file
17
2024/CVE-2024-43321.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-43321](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43321)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in PickPlugins Team Showcase allows Stored XSS.This issue affects Team Showcase: from n/a through 1.22.23.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
18
2024/CVE-2024-43324.md
Normal file
18
2024/CVE-2024-43324.md
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
### [CVE-2024-43324](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43324)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CleverSoft Clever Addons for Elementor allows Stored XSS.This issue affects Clever Addons for Elementor: from n/a through 2.2.0.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/20142995/nuclei-templates
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
17
2024/CVE-2024-43327.md
Normal file
17
2024/CVE-2024-43327.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-43327](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43327)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Boone Gorges Invite Anyone allows Reflected XSS.This issue affects Invite Anyone: from n/a through 1.4.7.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
18
2024/CVE-2024-43329.md
Normal file
18
2024/CVE-2024-43329.md
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
### [CVE-2024-43329](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43329)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Chill Allegiant allegiant allows Stored XSS.This issue affects Allegiant: from n/a through 1.2.7.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/20142995/nuclei-templates
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
18
2024/CVE-2024-43330.md
Normal file
18
2024/CVE-2024-43330.md
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
### [CVE-2024-43330](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43330)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in IdeaBox Creations PowerPack for Beaver Builder allows Reflected XSS.This issue affects PowerPack for Beaver Builder: from n/a before 2.37.4.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/20142995/nuclei-templates
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
17
2024/CVE-2024-43335.md
Normal file
17
2024/CVE-2024-43335.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-43335](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43335)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CyberChimps Responsive Blocks – WordPress Gutenberg Blocks allows Stored XSS.This issue affects Responsive Blocks – WordPress Gutenberg Blocks: from n/a through 1.8.8.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
17
2024/CVE-2024-43342.md
Normal file
17
2024/CVE-2024-43342.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-43342](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43342)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BdThemes Ultimate Store Kit Elementor Addons allows Stored XSS.This issue affects Ultimate Store Kit Elementor Addons: from n/a through 1.6.4.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
17
2024/CVE-2024-43344.md
Normal file
17
2024/CVE-2024-43344.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-43344](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43344)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Icegram allows Stored XSS.This issue affects Icegram: from n/a through 3.1.25.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
17
2024/CVE-2024-43346.md
Normal file
17
2024/CVE-2024-43346.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-43346](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43346)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wow-Company Modal Window allows Stored XSS.This issue affects Modal Window: from n/a through 6.0.3.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
18
2024/CVE-2024-43347.md
Normal file
18
2024/CVE-2024-43347.md
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
### [CVE-2024-43347](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43347)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in VirusTran Button contact VR allows Stored XSS.This issue affects Button contact VR: from n/a through 4.7.3.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/20142995/nuclei-templates
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
17
2024/CVE-2024-43348.md
Normal file
17
2024/CVE-2024-43348.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-43348](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43348)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Iznyn Purity Of Soul allows Reflected XSS.This issue affects Purity Of Soul: from n/a through 1.9.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
18
2024/CVE-2024-43349.md
Normal file
18
2024/CVE-2024-43349.md
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
### [CVE-2024-43349](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43349)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AREOI All Bootstrap Blocks allows Stored XSS.This issue affects All Bootstrap Blocks: from n/a through 1.3.19.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/20142995/nuclei-templates
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
18
2024/CVE-2024-43351.md
Normal file
18
2024/CVE-2024-43351.md
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
### [CVE-2024-43351](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43351)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CryoutCreations Bravada bravada allows Stored XSS.This issue affects Bravada: from n/a through 1.1.2.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/20142995/nuclei-templates
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
17
2024/CVE-2024-43352.md
Normal file
17
2024/CVE-2024-43352.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-43352](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43352)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Organic Themes GivingPress Lite allows Stored XSS.This issue affects GivingPress Lite: from n/a through 1.8.6.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
@ -11,7 +11,7 @@ reNgine is an automated reconnaissance framework for web applications. Versions
|
|||||||
### POC
|
### POC
|
||||||
|
|
||||||
#### Reference
|
#### Reference
|
||||||
No PoCs from references.
|
- https://github.com/yogeshojha/rengine/security/advisories/GHSA-96q4-fj2m-jqf7
|
||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
17
2024/CVE-2024-44067.md
Normal file
17
2024/CVE-2024-44067.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-44067](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44067)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
The T-Head XuanTie C910 CPU in the TH1520 SoC and the T-Head XuanTie C920 CPU in the SOPHON SG2042 have instructions that allow unprivileged attackers to write to arbitrary physical memory locations, aka GhostWrite.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
- https://ghostwriteattack.com
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
No PoCs found on GitHub currently.
|
||||||
|
|
17
2024/CVE-2024-5372.md
Normal file
17
2024/CVE-2024-5372.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-5372](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5372)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
A vulnerability classified as problematic was found in Kashipara College Management System 1.0. This vulnerability affects unknown code of the file submit_extracurricular_activity.php. The manipulation of the argument activity_contact leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266284.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
- https://vuldb.com/?submit.343452
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
No PoCs found on GitHub currently.
|
||||||
|
|
17
2024/CVE-2024-6330.md
Normal file
17
2024/CVE-2024-6330.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-6330](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6330)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
The GEO my WP WordPress plugin before 4.5.0.2 does not prevent unauthenticated attackers from including arbitrary files in PHP's execution context, which leads to Remote Code Execution.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
- https://wpscan.com/vulnerability/95b532e0-1ffb-421e-b9c0-de03f89491d7/
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
No PoCs found on GitHub currently.
|
||||||
|
|
@ -43,6 +43,7 @@ A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd).
|
|||||||
- https://github.com/ThemeHackers/CVE-2024-6387
|
- https://github.com/ThemeHackers/CVE-2024-6387
|
||||||
- https://github.com/Threekiii/CVE
|
- https://github.com/Threekiii/CVE
|
||||||
- https://github.com/TrojanAZhen/Self_Back
|
- https://github.com/TrojanAZhen/Self_Back
|
||||||
|
- https://github.com/almogopp/OpenSSH-CVE-2024-6387-Fix
|
||||||
- https://github.com/azurejoga/CVE-2024-6387-how-to-fix
|
- https://github.com/azurejoga/CVE-2024-6387-how-to-fix
|
||||||
- https://github.com/beac0n/ruroco
|
- https://github.com/beac0n/ruroco
|
||||||
- https://github.com/bigb0x/CVE-2024-6387
|
- https://github.com/bigb0x/CVE-2024-6387
|
||||||
@ -55,6 +56,7 @@ A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd).
|
|||||||
- https://github.com/maycon/stars
|
- https://github.com/maycon/stars
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/rxerium/stars
|
- https://github.com/rxerium/stars
|
||||||
|
- https://github.com/s1d6point7bugcrowd/CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH
|
||||||
- https://github.com/sardine-web/CVE-2024-6387_Check
|
- https://github.com/sardine-web/CVE-2024-6387_Check
|
||||||
- https://github.com/tanjiti/sec_profile
|
- https://github.com/tanjiti/sec_profile
|
||||||
- https://github.com/teamos-hub/regreSSHion
|
- https://github.com/teamos-hub/regreSSHion
|
||||||
|
17
2024/CVE-2024-6451.md
Normal file
17
2024/CVE-2024-6451.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-6451](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6451)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
AI Engine < 2.4.3 is susceptible to remote-code-execution (RCE) via Log Poisoning. The AI Engine WordPress plugin before 2.5.1 fails to validate the file extension of "logs_path", allowing Administrators to change log filetypes from .log to .php.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
- https://wpscan.com/vulnerability/fc06d413-a227-470c-a5b7-cdab57aeab34/
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
No PoCs found on GitHub currently.
|
||||||
|
|
@ -15,4 +15,5 @@ Path traversal in Calibre <= 7.14.0 allow unauthenticated attackers to achieve a
|
|||||||
#### Github
|
#### Github
|
||||||
- https://github.com/20142995/nuclei-templates
|
- https://github.com/20142995/nuclei-templates
|
||||||
- https://github.com/wy876/POC
|
- https://github.com/wy876/POC
|
||||||
|
- https://github.com/wy876/wiki
|
||||||
|
|
||||||
|
@ -16,4 +16,5 @@ Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attacker
|
|||||||
- https://github.com/20142995/nuclei-templates
|
- https://github.com/20142995/nuclei-templates
|
||||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
- https://github.com/wy876/POC
|
- https://github.com/wy876/POC
|
||||||
|
- https://github.com/wy876/wiki
|
||||||
|
|
||||||
|
17
2024/CVE-2024-6843.md
Normal file
17
2024/CVE-2024-6843.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-6843](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6843)
|
||||||
|

|
||||||
|

|
||||||
|
&color=brighgreen)
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
The Chatbot with ChatGPT WordPress plugin before 2.4.5 does not sanitise and escape user inputs, which could allow unauthenticated users to perform Stored Cross-Site Scripting attacks against admins
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
- https://wpscan.com/vulnerability/9a5cb440-065a-445a-9a09-55bd5f782e85/
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
No PoCs found on GitHub currently.
|
||||||
|
|
@ -15,4 +15,5 @@ Files on the Windows system are accessible without authentication to external pa
|
|||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
- https://github.com/wy876/POC
|
- https://github.com/wy876/POC
|
||||||
|
- https://github.com/wy876/wiki
|
||||||
|
|
||||||
|
@ -11,6 +11,7 @@ A vulnerability was found in Tosei Online Store Management System ネット店
|
|||||||
|
|
||||||
#### Reference
|
#### Reference
|
||||||
- https://gist.github.com/b0rgch3n/4788c7c429d49095915d84161a157295
|
- https://gist.github.com/b0rgch3n/4788c7c429d49095915d84161a157295
|
||||||
|
- https://vuldb.com/?submit.387131
|
||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
17
2024/CVE-2024-7906.md
Normal file
17
2024/CVE-2024-7906.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2024-7906](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7906)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
A vulnerability classified as critical was found in DedeBIZ 6.3.0. This vulnerability affects the function get_mime_type of the file /admin/dialog/select_images_post.php of the component Attachment Settings. The manipulation of the argument upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
No PoCs from references.
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
|
94
github.txt
94
github.txt
@ -1801,12 +1801,14 @@ CVE-2006-5051 - https://github.com/David-M-Berry/openssh-cve-discovery
|
|||||||
CVE-2006-5051 - https://github.com/Passyed/regreSSHion-Fix
|
CVE-2006-5051 - https://github.com/Passyed/regreSSHion-Fix
|
||||||
CVE-2006-5051 - https://github.com/TAM-K592/CVE-2024-6387
|
CVE-2006-5051 - https://github.com/TAM-K592/CVE-2024-6387
|
||||||
CVE-2006-5051 - https://github.com/ThemeHackers/CVE-2024-6387
|
CVE-2006-5051 - https://github.com/ThemeHackers/CVE-2024-6387
|
||||||
|
CVE-2006-5051 - https://github.com/almogopp/OpenSSH-CVE-2024-6387-Fix
|
||||||
CVE-2006-5051 - https://github.com/azurejoga/CVE-2024-6387-how-to-fix
|
CVE-2006-5051 - https://github.com/azurejoga/CVE-2024-6387-how-to-fix
|
||||||
CVE-2006-5051 - https://github.com/bigb0x/CVE-2024-6387
|
CVE-2006-5051 - https://github.com/bigb0x/CVE-2024-6387
|
||||||
CVE-2006-5051 - https://github.com/giterlizzi/secdb-feeds
|
CVE-2006-5051 - https://github.com/giterlizzi/secdb-feeds
|
||||||
CVE-2006-5051 - https://github.com/invaderslabs/regreSSHion-CVE-2024-6387-
|
CVE-2006-5051 - https://github.com/invaderslabs/regreSSHion-CVE-2024-6387-
|
||||||
CVE-2006-5051 - https://github.com/kalvin-net/NoLimit-Secu-RegreSSHion
|
CVE-2006-5051 - https://github.com/kalvin-net/NoLimit-Secu-RegreSSHion
|
||||||
CVE-2006-5051 - https://github.com/nomi-sec/PoC-in-GitHub
|
CVE-2006-5051 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
|
CVE-2006-5051 - https://github.com/s1d6point7bugcrowd/CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH
|
||||||
CVE-2006-5051 - https://github.com/sardine-web/CVE-2024-6387_Check
|
CVE-2006-5051 - https://github.com/sardine-web/CVE-2024-6387_Check
|
||||||
CVE-2006-5156 - https://github.com/trend-anz/Deep-Security-CVE-to-IPS-Mapper
|
CVE-2006-5156 - https://github.com/trend-anz/Deep-Security-CVE-to-IPS-Mapper
|
||||||
CVE-2006-5178 - https://github.com/Whissi/realpath_turbo
|
CVE-2006-5178 - https://github.com/Whissi/realpath_turbo
|
||||||
@ -3050,10 +3052,12 @@ CVE-2008-4109 - https://github.com/CVEDB/awesome-cve-repo
|
|||||||
CVE-2008-4109 - https://github.com/David-M-Berry/openssh-cve-discovery
|
CVE-2008-4109 - https://github.com/David-M-Berry/openssh-cve-discovery
|
||||||
CVE-2008-4109 - https://github.com/Passyed/regreSSHion-Fix
|
CVE-2008-4109 - https://github.com/Passyed/regreSSHion-Fix
|
||||||
CVE-2008-4109 - https://github.com/TAM-K592/CVE-2024-6387
|
CVE-2008-4109 - https://github.com/TAM-K592/CVE-2024-6387
|
||||||
|
CVE-2008-4109 - https://github.com/almogopp/OpenSSH-CVE-2024-6387-Fix
|
||||||
CVE-2008-4109 - https://github.com/azurejoga/CVE-2024-6387-how-to-fix
|
CVE-2008-4109 - https://github.com/azurejoga/CVE-2024-6387-how-to-fix
|
||||||
CVE-2008-4109 - https://github.com/bigb0x/CVE-2024-6387
|
CVE-2008-4109 - https://github.com/bigb0x/CVE-2024-6387
|
||||||
CVE-2008-4109 - https://github.com/invaderslabs/regreSSHion-CVE-2024-6387-
|
CVE-2008-4109 - https://github.com/invaderslabs/regreSSHion-CVE-2024-6387-
|
||||||
CVE-2008-4109 - https://github.com/kalvin-net/NoLimit-Secu-RegreSSHion
|
CVE-2008-4109 - https://github.com/kalvin-net/NoLimit-Secu-RegreSSHion
|
||||||
|
CVE-2008-4109 - https://github.com/s1d6point7bugcrowd/CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH
|
||||||
CVE-2008-4114 - https://github.com/RodrigoVarasLopez/Download-Scanners-from-Nessus-8.7-using-the-API
|
CVE-2008-4114 - https://github.com/RodrigoVarasLopez/Download-Scanners-from-Nessus-8.7-using-the-API
|
||||||
CVE-2008-4163 - https://github.com/ARPSyndicate/cvemon
|
CVE-2008-4163 - https://github.com/ARPSyndicate/cvemon
|
||||||
CVE-2008-4163 - https://github.com/DButter/whitehat_public
|
CVE-2008-4163 - https://github.com/DButter/whitehat_public
|
||||||
@ -5251,6 +5255,7 @@ CVE-2010-2075 - https://github.com/FredBrave/CVE-2010-2075-UnrealIRCd-3.2.8.1
|
|||||||
CVE-2010-2075 - https://github.com/Glumgam/UnrealiRCd-3.2.8.1-exploit-python
|
CVE-2010-2075 - https://github.com/Glumgam/UnrealiRCd-3.2.8.1-exploit-python
|
||||||
CVE-2010-2075 - https://github.com/JoseLRC97/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution
|
CVE-2010-2075 - https://github.com/JoseLRC97/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution
|
||||||
CVE-2010-2075 - https://github.com/MFernstrom/OffensivePascal-CVE-2010-2075
|
CVE-2010-2075 - https://github.com/MFernstrom/OffensivePascal-CVE-2010-2075
|
||||||
|
CVE-2010-2075 - https://github.com/Mr-Tree-S/POC_EXP
|
||||||
CVE-2010-2075 - https://github.com/Okarn/TP_securite_EDOU_JACQUEMONT
|
CVE-2010-2075 - https://github.com/Okarn/TP_securite_EDOU_JACQUEMONT
|
||||||
CVE-2010-2075 - https://github.com/Patrick122333/4240project
|
CVE-2010-2075 - https://github.com/Patrick122333/4240project
|
||||||
CVE-2010-2075 - https://github.com/Sh4dowX404/UnrealIRCD-3.2.8.1-Backdoor
|
CVE-2010-2075 - https://github.com/Sh4dowX404/UnrealIRCD-3.2.8.1-Backdoor
|
||||||
@ -9488,6 +9493,7 @@ CVE-2013-0156 - https://github.com/heroku/heroku-CVE-2013-0156
|
|||||||
CVE-2013-0156 - https://github.com/hktalent/TOP
|
CVE-2013-0156 - https://github.com/hktalent/TOP
|
||||||
CVE-2013-0156 - https://github.com/jbmihoub/all-poc
|
CVE-2013-0156 - https://github.com/jbmihoub/all-poc
|
||||||
CVE-2013-0156 - https://github.com/josal/crack-0.1.8-fixed
|
CVE-2013-0156 - https://github.com/josal/crack-0.1.8-fixed
|
||||||
|
CVE-2013-0156 - https://github.com/localeapp/localeapp
|
||||||
CVE-2013-0156 - https://github.com/mengdaya/Web-CTF-Cheatsheet
|
CVE-2013-0156 - https://github.com/mengdaya/Web-CTF-Cheatsheet
|
||||||
CVE-2013-0156 - https://github.com/michenriksen/nmap-scripts
|
CVE-2013-0156 - https://github.com/michenriksen/nmap-scripts
|
||||||
CVE-2013-0156 - https://github.com/mitaku/rails_cve_2013_0156_patch
|
CVE-2013-0156 - https://github.com/mitaku/rails_cve_2013_0156_patch
|
||||||
@ -62434,6 +62440,7 @@ CVE-2019-11358 - https://github.com/QASMT-FTC/FTC-13626-Team2
|
|||||||
CVE-2019-11358 - https://github.com/QuantumRoboticsFTC/freightfrenzy-app
|
CVE-2019-11358 - https://github.com/QuantumRoboticsFTC/freightfrenzy-app
|
||||||
CVE-2019-11358 - https://github.com/QuantumRoboticsFTC/powerplay-app
|
CVE-2019-11358 - https://github.com/QuantumRoboticsFTC/powerplay-app
|
||||||
CVE-2019-11358 - https://github.com/QuantumRoboticsFTC/ultimategoal-app
|
CVE-2019-11358 - https://github.com/QuantumRoboticsFTC/ultimategoal-app
|
||||||
|
CVE-2019-11358 - https://github.com/R-Tacoz/FTC14607_23-24RC
|
||||||
CVE-2019-11358 - https://github.com/R3Vipers/test
|
CVE-2019-11358 - https://github.com/R3Vipers/test
|
||||||
CVE-2019-11358 - https://github.com/RCGV1/testingFTC
|
CVE-2019-11358 - https://github.com/RCGV1/testingFTC
|
||||||
CVE-2019-11358 - https://github.com/RDasari7304/PurePursuitController
|
CVE-2019-11358 - https://github.com/RDasari7304/PurePursuitController
|
||||||
@ -122889,6 +122896,7 @@ CVE-2022-1195 - https://github.com/ARPSyndicate/cvemon
|
|||||||
CVE-2022-1203 - https://github.com/RandomRobbieBF/CVE-2022-1203
|
CVE-2022-1203 - https://github.com/RandomRobbieBF/CVE-2022-1203
|
||||||
CVE-2022-1203 - https://github.com/nomi-sec/PoC-in-GitHub
|
CVE-2022-1203 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2022-1204 - https://github.com/ARPSyndicate/cvemon
|
CVE-2022-1204 - https://github.com/ARPSyndicate/cvemon
|
||||||
|
CVE-2022-1206 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2022-1207 - https://github.com/ARPSyndicate/cvemon
|
CVE-2022-1207 - https://github.com/ARPSyndicate/cvemon
|
||||||
CVE-2022-1208 - https://github.com/ARPSyndicate/cvemon
|
CVE-2022-1208 - https://github.com/ARPSyndicate/cvemon
|
||||||
CVE-2022-1210 - https://github.com/ARPSyndicate/cvemon
|
CVE-2022-1210 - https://github.com/ARPSyndicate/cvemon
|
||||||
@ -142819,6 +142827,7 @@ CVE-2022-48702 - https://github.com/fkie-cad/nvd-json-data-feeds
|
|||||||
CVE-2022-48703 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2022-48703 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2022-4883 - https://github.com/1g-v/DevSec_Docker_lab
|
CVE-2022-4883 - https://github.com/1g-v/DevSec_Docker_lab
|
||||||
CVE-2022-4883 - https://github.com/L-ivan7/-.-DevSec_Docker
|
CVE-2022-4883 - https://github.com/L-ivan7/-.-DevSec_Docker
|
||||||
|
CVE-2022-4891 - https://github.com/sisimai/rb-sisimai
|
||||||
CVE-2022-4896 - https://github.com/nomi-sec/PoC-in-GitHub
|
CVE-2022-4896 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2022-4896 - https://github.com/sapellaniz/CVE-2022-4896
|
CVE-2022-4896 - https://github.com/sapellaniz/CVE-2022-4896
|
||||||
CVE-2022-4897 - https://github.com/ARPSyndicate/cvemon
|
CVE-2022-4897 - https://github.com/ARPSyndicate/cvemon
|
||||||
@ -145179,6 +145188,7 @@ CVE-2023-22894 - https://github.com/Saboor-Hakimi/CVE-2023-22894
|
|||||||
CVE-2023-22894 - https://github.com/nomi-sec/PoC-in-GitHub
|
CVE-2023-22894 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2023-22897 - https://github.com/ARPSyndicate/cvemon
|
CVE-2023-22897 - https://github.com/ARPSyndicate/cvemon
|
||||||
CVE-2023-22897 - https://github.com/MrTuxracer/advisories
|
CVE-2023-22897 - https://github.com/MrTuxracer/advisories
|
||||||
|
CVE-2023-2290 - https://github.com/tadghh/Dell-unlock-undervolting
|
||||||
CVE-2023-22903 - https://github.com/go-compile/security-advisories
|
CVE-2023-22903 - https://github.com/go-compile/security-advisories
|
||||||
CVE-2023-22906 - https://github.com/abrahim7112/Vulnerability-checking-program-for-Android
|
CVE-2023-22906 - https://github.com/abrahim7112/Vulnerability-checking-program-for-Android
|
||||||
CVE-2023-22906 - https://github.com/nomi-sec/PoC-in-GitHub
|
CVE-2023-22906 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
@ -147858,6 +147868,7 @@ CVE-2023-29383 - https://github.com/GrigGM/05-virt-04-docker-hw
|
|||||||
CVE-2023-29383 - https://github.com/adegoodyer/kubernetes-admin-toolkit
|
CVE-2023-29383 - https://github.com/adegoodyer/kubernetes-admin-toolkit
|
||||||
CVE-2023-29383 - https://github.com/fokypoky/places-list
|
CVE-2023-29383 - https://github.com/fokypoky/places-list
|
||||||
CVE-2023-29383 - https://github.com/tl87/container-scanner
|
CVE-2023-29383 - https://github.com/tl87/container-scanner
|
||||||
|
CVE-2023-29384 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2023-29385 - https://github.com/hackintoanetwork/hackintoanetwork
|
CVE-2023-29385 - https://github.com/hackintoanetwork/hackintoanetwork
|
||||||
CVE-2023-29389 - https://github.com/1-tong/vehicle_cves
|
CVE-2023-29389 - https://github.com/1-tong/vehicle_cves
|
||||||
CVE-2023-29389 - https://github.com/Vu1nT0tal/Vehicle-Security
|
CVE-2023-29389 - https://github.com/Vu1nT0tal/Vehicle-Security
|
||||||
@ -153629,6 +153640,7 @@ CVE-2023-45386 - https://github.com/fkie-cad/nvd-json-data-feeds
|
|||||||
CVE-2023-4539 - https://github.com/defragmentator/mitmsqlproxy
|
CVE-2023-4539 - https://github.com/defragmentator/mitmsqlproxy
|
||||||
CVE-2023-4540 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2023-4540 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2023-4542 - https://github.com/20142995/sectool
|
CVE-2023-4542 - https://github.com/20142995/sectool
|
||||||
|
CVE-2023-4542 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2023-4542 - https://github.com/tanjiti/sec_profile
|
CVE-2023-4542 - https://github.com/tanjiti/sec_profile
|
||||||
CVE-2023-4542 - https://github.com/wjlin0/poc-doc
|
CVE-2023-4542 - https://github.com/wjlin0/poc-doc
|
||||||
CVE-2023-4542 - https://github.com/wy876/POC
|
CVE-2023-4542 - https://github.com/wy876/POC
|
||||||
@ -153817,6 +153829,7 @@ CVE-2023-45866 - https://github.com/vs4vijay/exploits
|
|||||||
CVE-2023-45866 - https://github.com/zhaoxiaoha/github-trending
|
CVE-2023-45866 - https://github.com/zhaoxiaoha/github-trending
|
||||||
CVE-2023-4587 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2023-4587 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2023-45887 - https://github.com/MikeIsAStar/DS-Wireless-Communication-Remote-Code-Execution
|
CVE-2023-45887 - https://github.com/MikeIsAStar/DS-Wireless-Communication-Remote-Code-Execution
|
||||||
|
CVE-2023-4590 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2023-4591 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2023-4591 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2023-4591 - https://github.com/tanjiti/sec_profile
|
CVE-2023-4591 - https://github.com/tanjiti/sec_profile
|
||||||
CVE-2023-45918 - https://github.com/GrigGM/05-virt-04-docker-hw
|
CVE-2023-45918 - https://github.com/GrigGM/05-virt-04-docker-hw
|
||||||
@ -154588,6 +154601,7 @@ CVE-2023-48201 - https://github.com/mechaneus/mechaneus.github.io
|
|||||||
CVE-2023-48202 - https://github.com/mechaneus/mechaneus.github.io
|
CVE-2023-48202 - https://github.com/mechaneus/mechaneus.github.io
|
||||||
CVE-2023-4822 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2023-4822 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2023-48226 - https://github.com/mbiesiad/security-hall-of-fame-mb
|
CVE-2023-48226 - https://github.com/mbiesiad/security-hall-of-fame-mb
|
||||||
|
CVE-2023-48251 - https://github.com/oxagast/oxasploits
|
||||||
CVE-2023-48268 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2023-48268 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2023-4827 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2023-4827 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2023-48291 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2023-48291 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
@ -163006,6 +163020,7 @@ CVE-2024-20745 - https://github.com/NaInSec/CVE-LIST
|
|||||||
CVE-2024-20745 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-20745 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-20746 - https://github.com/NaInSec/CVE-LIST
|
CVE-2024-20746 - https://github.com/NaInSec/CVE-LIST
|
||||||
CVE-2024-20746 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-20746 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-20746 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2024-2075 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-2075 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-20750 - https://github.com/vulsio/go-cve-dictionary
|
CVE-2024-20750 - https://github.com/vulsio/go-cve-dictionary
|
||||||
CVE-2024-20752 - https://github.com/NaInSec/CVE-LIST
|
CVE-2024-20752 - https://github.com/NaInSec/CVE-LIST
|
||||||
@ -164120,6 +164135,7 @@ CVE-2024-22515 - https://github.com/nomi-sec/PoC-in-GitHub
|
|||||||
CVE-2024-22519 - https://github.com/Drone-Lab/opendroneid-vulnerability
|
CVE-2024-22519 - https://github.com/Drone-Lab/opendroneid-vulnerability
|
||||||
CVE-2024-22520 - https://github.com/Drone-Lab/Dronetag-vulnerability
|
CVE-2024-22520 - https://github.com/Drone-Lab/Dronetag-vulnerability
|
||||||
CVE-2024-22523 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-22523 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-22526 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2024-22530 - https://github.com/luelueking/luelueking
|
CVE-2024-22530 - https://github.com/luelueking/luelueking
|
||||||
CVE-2024-22532 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-22532 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-22532 - https://github.com/nomi-sec/PoC-in-GitHub
|
CVE-2024-22532 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
@ -164453,6 +164469,7 @@ CVE-2024-23334 - https://github.com/z3rObyte/CVE-2024-23334-PoC
|
|||||||
CVE-2024-23335 - https://github.com/CP04042K/CVE
|
CVE-2024-23335 - https://github.com/CP04042K/CVE
|
||||||
CVE-2024-23336 - https://github.com/CP04042K/CVE
|
CVE-2024-23336 - https://github.com/CP04042K/CVE
|
||||||
CVE-2024-23339 - https://github.com/d3ng03/PP-Auto-Detector
|
CVE-2024-23339 - https://github.com/d3ng03/PP-Auto-Detector
|
||||||
|
CVE-2024-23339 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2024-23342 - https://github.com/memphis-tools/dummy_fastapi_flask_blog_app
|
CVE-2024-23342 - https://github.com/memphis-tools/dummy_fastapi_flask_blog_app
|
||||||
CVE-2024-23343 - https://github.com/Sim4n6/Sim4n6
|
CVE-2024-23343 - https://github.com/Sim4n6/Sim4n6
|
||||||
CVE-2024-23349 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-23349 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
@ -165662,6 +165679,7 @@ CVE-2024-25579 - https://github.com/fkie-cad/nvd-json-data-feeds
|
|||||||
CVE-2024-2558 - https://github.com/LaPhilosophie/IoT-vulnerable
|
CVE-2024-2558 - https://github.com/LaPhilosophie/IoT-vulnerable
|
||||||
CVE-2024-2558 - https://github.com/NaInSec/CVE-LIST
|
CVE-2024-2558 - https://github.com/NaInSec/CVE-LIST
|
||||||
CVE-2024-25580 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-25580 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-25582 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-2559 - https://github.com/LaPhilosophie/IoT-vulnerable
|
CVE-2024-2559 - https://github.com/LaPhilosophie/IoT-vulnerable
|
||||||
CVE-2024-2559 - https://github.com/NaInSec/CVE-LIST
|
CVE-2024-2559 - https://github.com/NaInSec/CVE-LIST
|
||||||
CVE-2024-2559 - https://github.com/helloyhrr/IoT_vulnerability
|
CVE-2024-2559 - https://github.com/helloyhrr/IoT_vulnerability
|
||||||
@ -166468,6 +166486,7 @@ CVE-2024-27085 - https://github.com/NaInSec/CVE-LIST
|
|||||||
CVE-2024-27085 - https://github.com/kip93/kip93
|
CVE-2024-27085 - https://github.com/kip93/kip93
|
||||||
CVE-2024-27087 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-27087 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-27088 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-27088 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-27088 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2024-2709 - https://github.com/LaPhilosophie/IoT-vulnerable
|
CVE-2024-2709 - https://github.com/LaPhilosophie/IoT-vulnerable
|
||||||
CVE-2024-2709 - https://github.com/NaInSec/CVE-LIST
|
CVE-2024-2709 - https://github.com/NaInSec/CVE-LIST
|
||||||
CVE-2024-2709 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-2709 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
@ -166786,6 +166805,7 @@ CVE-2024-2758 - https://github.com/Vos68/HTTP2-Continuation-Flood-PoC
|
|||||||
CVE-2024-2759 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-2759 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-27593 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-27593 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-2760 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-2760 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-27609 - https://github.com/mohammedatary/mohammedatary
|
||||||
CVE-2024-27612 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-27612 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-27613 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-27613 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-27619 - https://github.com/ioprojecton/dir-3040_dos
|
CVE-2024-27619 - https://github.com/ioprojecton/dir-3040_dos
|
||||||
@ -167039,6 +167059,7 @@ CVE-2024-28085 - https://github.com/nomi-sec/PoC-in-GitHub
|
|||||||
CVE-2024-28085 - https://github.com/skyler-ferrante/CVE-2024-28085
|
CVE-2024-28085 - https://github.com/skyler-ferrante/CVE-2024-28085
|
||||||
CVE-2024-28085 - https://github.com/testing-felickz/docker-scout-demo
|
CVE-2024-28085 - https://github.com/testing-felickz/docker-scout-demo
|
||||||
CVE-2024-28087 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-28087 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-28087 - https://github.com/mohammedatary/mohammedatary
|
||||||
CVE-2024-28088 - https://github.com/levpachmanov/cve-2024-28088-poc
|
CVE-2024-28088 - https://github.com/levpachmanov/cve-2024-28088-poc
|
||||||
CVE-2024-28088 - https://github.com/nomi-sec/PoC-in-GitHub
|
CVE-2024-28088 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2024-28088 - https://github.com/seal-community/patches
|
CVE-2024-28088 - https://github.com/seal-community/patches
|
||||||
@ -169352,6 +169373,7 @@ CVE-2024-33612 - https://github.com/fkie-cad/nvd-json-data-feeds
|
|||||||
CVE-2024-33633 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-33633 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-33640 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-33640 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-33643 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-33643 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-33644 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2024-33645 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-33645 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-33646 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-33646 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-33648 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-33648 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
@ -169818,6 +169840,7 @@ CVE-2024-35522 - https://github.com/AnixPasBesoin/AnixPasBesoin
|
|||||||
CVE-2024-35523 - https://github.com/AnixPasBesoin/AnixPasBesoin
|
CVE-2024-35523 - https://github.com/AnixPasBesoin/AnixPasBesoin
|
||||||
CVE-2024-35524 - https://github.com/AnixPasBesoin/AnixPasBesoin
|
CVE-2024-35524 - https://github.com/AnixPasBesoin/AnixPasBesoin
|
||||||
CVE-2024-35537 - https://github.com/aaravavi/TVS-Connect-Application-VAPT
|
CVE-2024-35537 - https://github.com/aaravavi/TVS-Connect-Application-VAPT
|
||||||
|
CVE-2024-35538 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2024-35548 - https://github.com/bytyme/MybatisPlusSQLInjection
|
CVE-2024-35548 - https://github.com/bytyme/MybatisPlusSQLInjection
|
||||||
CVE-2024-35570 - https://github.com/ibaiw/2024Hvv
|
CVE-2024-35570 - https://github.com/ibaiw/2024Hvv
|
||||||
CVE-2024-35591 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-35591 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
@ -169915,6 +169938,7 @@ CVE-2024-36104 - https://github.com/wy876/wiki
|
|||||||
CVE-2024-36105 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-36105 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-36111 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-36111 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-36111 - https://github.com/wy876/POC
|
CVE-2024-36111 - https://github.com/wy876/POC
|
||||||
|
CVE-2024-36111 - https://github.com/wy876/wiki
|
||||||
CVE-2024-36120 - https://github.com/SteakEnthusiast/My-CTF-Challenges
|
CVE-2024-36120 - https://github.com/SteakEnthusiast/My-CTF-Challenges
|
||||||
CVE-2024-36136 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-36136 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-3614 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-3614 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
@ -170175,6 +170199,7 @@ CVE-2024-38166 - https://github.com/fkie-cad/nvd-json-data-feeds
|
|||||||
CVE-2024-3817 - https://github.com/dellalibera/dellalibera
|
CVE-2024-3817 - https://github.com/dellalibera/dellalibera
|
||||||
CVE-2024-3817 - https://github.com/otms61/vex_dir
|
CVE-2024-3817 - https://github.com/otms61/vex_dir
|
||||||
CVE-2024-38189 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-38189 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-38189 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2024-38202 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-38202 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-38206 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-38206 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-3822 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-3822 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
@ -170271,6 +170296,7 @@ CVE-2024-38856 - https://github.com/k3ppf0r/2024-PocLib
|
|||||||
CVE-2024-38856 - https://github.com/nomi-sec/PoC-in-GitHub
|
CVE-2024-38856 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2024-38856 - https://github.com/tanjiti/sec_profile
|
CVE-2024-38856 - https://github.com/tanjiti/sec_profile
|
||||||
CVE-2024-38856 - https://github.com/wy876/POC
|
CVE-2024-38856 - https://github.com/wy876/POC
|
||||||
|
CVE-2024-38856 - https://github.com/wy876/wiki
|
||||||
CVE-2024-3889 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-3889 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-3891 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-3891 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-3892 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-3892 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
@ -170728,8 +170754,10 @@ CVE-2024-41465 - https://github.com/fkie-cad/nvd-json-data-feeds
|
|||||||
CVE-2024-41466 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-41466 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-41468 - https://github.com/ibaiw/2024Hvv
|
CVE-2024-41468 - https://github.com/ibaiw/2024Hvv
|
||||||
CVE-2024-41468 - https://github.com/wy876/POC
|
CVE-2024-41468 - https://github.com/wy876/POC
|
||||||
|
CVE-2024-41468 - https://github.com/wy876/wiki
|
||||||
CVE-2024-41473 - https://github.com/ibaiw/2024Hvv
|
CVE-2024-41473 - https://github.com/ibaiw/2024Hvv
|
||||||
CVE-2024-41473 - https://github.com/wy876/POC
|
CVE-2024-41473 - https://github.com/wy876/POC
|
||||||
|
CVE-2024-41473 - https://github.com/wy876/wiki
|
||||||
CVE-2024-41476 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-41476 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-41550 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-41550 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-41551 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-41551 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
@ -170928,6 +170956,7 @@ CVE-2024-4257 - https://github.com/wy876/wiki
|
|||||||
CVE-2024-4265 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-4265 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-42657 - https://github.com/nomi-sec/PoC-in-GitHub
|
CVE-2024-42657 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2024-42658 - https://github.com/nomi-sec/PoC-in-GitHub
|
CVE-2024-42658 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
|
CVE-2024-42675 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-42676 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-42676 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-42677 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-42677 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-42678 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-42678 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
@ -170939,6 +170968,7 @@ CVE-2024-42758 - https://github.com/nomi-sec/PoC-in-GitHub
|
|||||||
CVE-2024-42849 - https://github.com/nomi-sec/PoC-in-GitHub
|
CVE-2024-42849 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2024-42850 - https://github.com/nomi-sec/PoC-in-GitHub
|
CVE-2024-42850 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2024-4286 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-4286 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-42919 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2024-4295 - https://github.com/nomi-sec/PoC-in-GitHub
|
CVE-2024-4295 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2024-4295 - https://github.com/truonghuuphuc/CVE-2024-4295-Poc
|
CVE-2024-4295 - https://github.com/truonghuuphuc/CVE-2024-4295-Poc
|
||||||
CVE-2024-4296 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-4296 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
@ -171061,7 +171091,22 @@ CVE-2024-43236 - https://github.com/20142995/nuclei-templates
|
|||||||
CVE-2024-43238 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43238 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-4324 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-4324 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-43276 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43276 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-43277 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-4328 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-4328 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-43285 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43287 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43290 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43291 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43293 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43294 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43295 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43297 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43298 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43299 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43301 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43302 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43304 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43305 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-43305 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43305 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-43306 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43306 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-43307 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43307 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
@ -171069,25 +171114,51 @@ CVE-2024-43308 - https://github.com/fkie-cad/nvd-json-data-feeds
|
|||||||
CVE-2024-43309 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43309 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-4331 - https://github.com/angelov-1080/CVE_Checker
|
CVE-2024-4331 - https://github.com/angelov-1080/CVE_Checker
|
||||||
CVE-2024-4331 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-4331 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-43310 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43312 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-43313 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43313 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-43314 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43315 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43316 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43317 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-43318 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43318 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-43320 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-43320 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43320 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-43321 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43321 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-43323 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43324 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-43324 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43324 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-43325 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43326 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-43327 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43327 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-43329 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-43329 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43329 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-4333 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-4333 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-43330 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-43330 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43330 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-43331 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43332 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-43335 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43335 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-43336 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43337 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43339 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-4334 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-4334 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-43340 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43341 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-43342 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43342 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-43343 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-43344 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43344 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-43346 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43346 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-43347 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-43347 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43347 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-43348 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43348 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-43349 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-43349 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43349 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-43351 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-43351 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43351 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-43352 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43352 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-43355 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-43356 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-43358 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43358 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-43359 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43359 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-43360 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-43360 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
@ -171546,6 +171617,7 @@ CVE-2024-5542 - https://github.com/fkie-cad/nvd-json-data-feeds
|
|||||||
CVE-2024-5555 - https://github.com/JohnnyBradvo/CVE-2024-5555
|
CVE-2024-5555 - https://github.com/JohnnyBradvo/CVE-2024-5555
|
||||||
CVE-2024-5555 - https://github.com/nomi-sec/PoC-in-GitHub
|
CVE-2024-5555 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2024-5572 - https://github.com/ajmalabubakkr/CVE
|
CVE-2024-5572 - https://github.com/ajmalabubakkr/CVE
|
||||||
|
CVE-2024-5576 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-5585 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-5585 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-5585 - https://github.com/tianstcht/tianstcht
|
CVE-2024-5585 - https://github.com/tianstcht/tianstcht
|
||||||
CVE-2024-5595 - https://github.com/20142995/nuclei-templates
|
CVE-2024-5595 - https://github.com/20142995/nuclei-templates
|
||||||
@ -171583,6 +171655,7 @@ CVE-2024-5744 - https://github.com/20142995/nuclei-templates
|
|||||||
CVE-2024-5745 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-5745 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-5756 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-5756 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-5758 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-5758 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-5763 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-5765 - https://github.com/20142995/nuclei-templates
|
CVE-2024-5765 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-5766 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-5766 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-5770 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-5770 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
@ -171608,7 +171681,11 @@ CVE-2024-5861 - https://github.com/20142995/nuclei-templates
|
|||||||
CVE-2024-5893 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-5893 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-5894 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-5894 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-5895 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-5895 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-5932 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-5936 - https://github.com/20142995/nuclei-templates
|
CVE-2024-5936 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-5939 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-5940 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-5941 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-5947 - https://github.com/komodoooo/Some-things
|
CVE-2024-5947 - https://github.com/komodoooo/Some-things
|
||||||
CVE-2024-5947 - https://github.com/nomi-sec/PoC-in-GitHub
|
CVE-2024-5947 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2024-5961 - https://github.com/nomi-sec/PoC-in-GitHub
|
CVE-2024-5961 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
@ -171688,6 +171765,7 @@ CVE-2024-6387 - https://github.com/TAM-K592/CVE-2024-6387
|
|||||||
CVE-2024-6387 - https://github.com/ThemeHackers/CVE-2024-6387
|
CVE-2024-6387 - https://github.com/ThemeHackers/CVE-2024-6387
|
||||||
CVE-2024-6387 - https://github.com/Threekiii/CVE
|
CVE-2024-6387 - https://github.com/Threekiii/CVE
|
||||||
CVE-2024-6387 - https://github.com/TrojanAZhen/Self_Back
|
CVE-2024-6387 - https://github.com/TrojanAZhen/Self_Back
|
||||||
|
CVE-2024-6387 - https://github.com/almogopp/OpenSSH-CVE-2024-6387-Fix
|
||||||
CVE-2024-6387 - https://github.com/azurejoga/CVE-2024-6387-how-to-fix
|
CVE-2024-6387 - https://github.com/azurejoga/CVE-2024-6387-how-to-fix
|
||||||
CVE-2024-6387 - https://github.com/beac0n/ruroco
|
CVE-2024-6387 - https://github.com/beac0n/ruroco
|
||||||
CVE-2024-6387 - https://github.com/bigb0x/CVE-2024-6387
|
CVE-2024-6387 - https://github.com/bigb0x/CVE-2024-6387
|
||||||
@ -171700,6 +171778,7 @@ CVE-2024-6387 - https://github.com/lukibahr/stars
|
|||||||
CVE-2024-6387 - https://github.com/maycon/stars
|
CVE-2024-6387 - https://github.com/maycon/stars
|
||||||
CVE-2024-6387 - https://github.com/nomi-sec/PoC-in-GitHub
|
CVE-2024-6387 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2024-6387 - https://github.com/rxerium/stars
|
CVE-2024-6387 - https://github.com/rxerium/stars
|
||||||
|
CVE-2024-6387 - https://github.com/s1d6point7bugcrowd/CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH
|
||||||
CVE-2024-6387 - https://github.com/sardine-web/CVE-2024-6387_Check
|
CVE-2024-6387 - https://github.com/sardine-web/CVE-2024-6387_Check
|
||||||
CVE-2024-6387 - https://github.com/tanjiti/sec_profile
|
CVE-2024-6387 - https://github.com/tanjiti/sec_profile
|
||||||
CVE-2024-6387 - https://github.com/teamos-hub/regreSSHion
|
CVE-2024-6387 - https://github.com/teamos-hub/regreSSHion
|
||||||
@ -171734,6 +171813,7 @@ CVE-2024-6553 - https://github.com/20142995/nuclei-templates
|
|||||||
CVE-2024-6558 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-6558 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-6562 - https://github.com/20142995/nuclei-templates
|
CVE-2024-6562 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-6571 - https://github.com/20142995/nuclei-templates
|
CVE-2024-6571 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-6575 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-6589 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-6589 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-6629 - https://github.com/20142995/nuclei-templates
|
CVE-2024-6629 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-6639 - https://github.com/20142995/nuclei-templates
|
CVE-2024-6639 - https://github.com/20142995/nuclei-templates
|
||||||
@ -171773,9 +171853,11 @@ CVE-2024-6768 - https://github.com/nomi-sec/PoC-in-GitHub
|
|||||||
CVE-2024-6779 - https://github.com/leesh3288/leesh3288
|
CVE-2024-6779 - https://github.com/leesh3288/leesh3288
|
||||||
CVE-2024-6781 - https://github.com/20142995/nuclei-templates
|
CVE-2024-6781 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-6781 - https://github.com/wy876/POC
|
CVE-2024-6781 - https://github.com/wy876/POC
|
||||||
|
CVE-2024-6781 - https://github.com/wy876/wiki
|
||||||
CVE-2024-6782 - https://github.com/20142995/nuclei-templates
|
CVE-2024-6782 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-6782 - https://github.com/nomi-sec/PoC-in-GitHub
|
CVE-2024-6782 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2024-6782 - https://github.com/wy876/POC
|
CVE-2024-6782 - https://github.com/wy876/POC
|
||||||
|
CVE-2024-6782 - https://github.com/wy876/wiki
|
||||||
CVE-2024-6797 - https://github.com/20142995/nuclei-templates
|
CVE-2024-6797 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-6798 - https://github.com/20142995/nuclei-templates
|
CVE-2024-6798 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-6802 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-6802 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
@ -171789,6 +171871,7 @@ CVE-2024-6853 - https://github.com/20142995/nuclei-templates
|
|||||||
CVE-2024-6855 - https://github.com/20142995/nuclei-templates
|
CVE-2024-6855 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-6856 - https://github.com/20142995/nuclei-templates
|
CVE-2024-6856 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-6859 - https://github.com/20142995/nuclei-templates
|
CVE-2024-6859 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-6864 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-6865 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-6865 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-6869 - https://github.com/20142995/nuclei-templates
|
CVE-2024-6869 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-6884 - https://github.com/20142995/nuclei-templates
|
CVE-2024-6884 - https://github.com/20142995/nuclei-templates
|
||||||
@ -171798,6 +171881,7 @@ CVE-2024-6893 - https://github.com/20142995/nuclei-templates
|
|||||||
CVE-2024-6893 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-6893 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-6896 - https://github.com/20142995/nuclei-templates
|
CVE-2024-6896 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-6911 - https://github.com/wy876/POC
|
CVE-2024-6911 - https://github.com/wy876/POC
|
||||||
|
CVE-2024-6911 - https://github.com/wy876/wiki
|
||||||
CVE-2024-6917 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-6917 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-6923 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-6923 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-6924 - https://github.com/20142995/nuclei-templates
|
CVE-2024-6924 - https://github.com/20142995/nuclei-templates
|
||||||
@ -171824,6 +171908,7 @@ CVE-2024-6990 - https://github.com/fkie-cad/nvd-json-data-feeds
|
|||||||
CVE-2024-7008 - https://github.com/20142995/nuclei-templates
|
CVE-2024-7008 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-7027 - https://github.com/20142995/nuclei-templates
|
CVE-2024-7027 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-7047 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-7047 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-7054 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-7057 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-7057 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-7060 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-7060 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-7063 - https://github.com/20142995/nuclei-templates
|
CVE-2024-7063 - https://github.com/20142995/nuclei-templates
|
||||||
@ -172004,10 +172089,12 @@ CVE-2024-7630 - https://github.com/20142995/nuclei-templates
|
|||||||
CVE-2024-7646 - https://github.com/nomi-sec/PoC-in-GitHub
|
CVE-2024-7646 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2024-7648 - https://github.com/20142995/nuclei-templates
|
CVE-2024-7648 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-7649 - https://github.com/20142995/nuclei-templates
|
CVE-2024-7649 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-7689 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-7690 - https://github.com/20142995/nuclei-templates
|
CVE-2024-7690 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-7691 - https://github.com/20142995/nuclei-templates
|
CVE-2024-7691 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-7692 - https://github.com/20142995/nuclei-templates
|
CVE-2024-7692 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-7697 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-7697 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-7702 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-7703 - https://github.com/20142995/nuclei-templates
|
CVE-2024-7703 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-7703 - https://github.com/lfillaz/CVE-2024-7703
|
CVE-2024-7703 - https://github.com/lfillaz/CVE-2024-7703
|
||||||
CVE-2024-7703 - https://github.com/nomi-sec/PoC-in-GitHub
|
CVE-2024-7703 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
@ -172021,19 +172108,26 @@ CVE-2024-7728 - https://github.com/fkie-cad/nvd-json-data-feeds
|
|||||||
CVE-2024-7729 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-7729 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-7731 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-7731 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-7732 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-7732 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-7775 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-7777 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-7780 - https://github.com/20142995/nuclei-templates
|
||||||
|
CVE-2024-7782 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-7790 - https://github.com/JoshuaMart/JoshuaMart
|
CVE-2024-7790 - https://github.com/JoshuaMart/JoshuaMart
|
||||||
CVE-2024-7790 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-7790 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-7827 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-7829 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-7829 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-7830 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-7830 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-7831 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-7831 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-7832 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-7832 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-7833 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-7833 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-7850 - https://github.com/20142995/nuclei-templates
|
||||||
CVE-2024-7886 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-7886 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-7887 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-7887 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-7896 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-7896 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-7897 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-7897 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-7904 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-7904 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
CVE-2024-7906 - https://github.com/fkie-cad/nvd-json-data-feeds
|
CVE-2024-7906 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||||
|
CVE-2024-7928 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||||
CVE-2024-87654 - https://github.com/runwuf/clickhouse-test
|
CVE-2024-87654 - https://github.com/runwuf/clickhouse-test
|
||||||
CVE-2024-98765 - https://github.com/runwuf/clickhouse-test
|
CVE-2024-98765 - https://github.com/runwuf/clickhouse-test
|
||||||
CVE-2024-99999 - https://github.com/kolewttd/wtt
|
CVE-2024-99999 - https://github.com/kolewttd/wtt
|
||||||
|
@ -4812,6 +4812,8 @@ CVE-2006-4647 - https://www.exploit-db.com/exploits/2309
|
|||||||
CVE-2006-4648 - https://www.exploit-db.com/exploits/2312
|
CVE-2006-4648 - https://www.exploit-db.com/exploits/2312
|
||||||
CVE-2006-4655 - http://securityreason.com/securityalert/1545
|
CVE-2006-4655 - http://securityreason.com/securityalert/1545
|
||||||
CVE-2006-4656 - https://www.exploit-db.com/exploits/2317
|
CVE-2006-4656 - https://www.exploit-db.com/exploits/2317
|
||||||
|
CVE-2006-4660 - http://securityreason.com/securityalert/1523
|
||||||
|
CVE-2006-4661 - http://securityreason.com/securityalert/1523
|
||||||
CVE-2006-4662 - http://securityreason.com/securityalert/1530
|
CVE-2006-4662 - http://securityreason.com/securityalert/1530
|
||||||
CVE-2006-4662 - http://www.securityfocus.com/archive/1/445513/100/0/threaded
|
CVE-2006-4662 - http://www.securityfocus.com/archive/1/445513/100/0/threaded
|
||||||
CVE-2006-4664 - https://www.exploit-db.com/exploits/2311
|
CVE-2006-4664 - https://www.exploit-db.com/exploits/2311
|
||||||
@ -56687,6 +56689,7 @@ CVE-2019-11074 - https://how2itsec.blogspot.com/2019/10/security-fixes-in-prtg-1
|
|||||||
CVE-2019-11074 - https://sensepost.com/blog/2019/being-stubborn-pays-off-pt.-1-cve-2018-19204/
|
CVE-2019-11074 - https://sensepost.com/blog/2019/being-stubborn-pays-off-pt.-1-cve-2018-19204/
|
||||||
CVE-2019-11076 - https://github.com/livehybrid/poc-cribl-rce
|
CVE-2019-11076 - https://github.com/livehybrid/poc-cribl-rce
|
||||||
CVE-2019-11080 - http://packetstormsecurity.com/files/153274/Sitecore-8.x-Deserialization-Remote-Code-Execution.html
|
CVE-2019-11080 - http://packetstormsecurity.com/files/153274/Sitecore-8.x-Deserialization-Remote-Code-Execution.html
|
||||||
|
CVE-2019-11080 - https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/91/Sitecore%20Experience%20Platform%2091%20Update1/Release%20Notes
|
||||||
CVE-2019-11085 - https://usn.ubuntu.com/4068-1/
|
CVE-2019-11085 - https://usn.ubuntu.com/4068-1/
|
||||||
CVE-2019-11085 - https://usn.ubuntu.com/4118-1/
|
CVE-2019-11085 - https://usn.ubuntu.com/4118-1/
|
||||||
CVE-2019-11091 - https://seclists.org/bugtraq/2019/Jun/28
|
CVE-2019-11091 - https://seclists.org/bugtraq/2019/Jun/28
|
||||||
@ -86481,6 +86484,7 @@ CVE-2022-3989 - https://wpscan.com/vulnerability/1bd20329-f3a5-466d-81b0-e4ff0ca
|
|||||||
CVE-2022-3993 - https://huntr.dev/bounties/bebd0cd6-18ec-469c-b6ca-19ffa9db0699
|
CVE-2022-3993 - https://huntr.dev/bounties/bebd0cd6-18ec-469c-b6ca-19ffa9db0699
|
||||||
CVE-2022-3994 - https://wpscan.com/vulnerability/802a2139-ab48-4281-888f-225e6e3134aa
|
CVE-2022-3994 - https://wpscan.com/vulnerability/802a2139-ab48-4281-888f-225e6e3134aa
|
||||||
CVE-2022-39960 - https://gist.github.com/CveCt0r/ca8c6e46f536e9ae69fc6061f132463e
|
CVE-2022-39960 - https://gist.github.com/CveCt0r/ca8c6e46f536e9ae69fc6061f132463e
|
||||||
|
CVE-2022-3997 - https://vuldb.com/?id.213698
|
||||||
CVE-2022-39974 - https://github.com/wasm3/wasm3/issues/379
|
CVE-2022-39974 - https://github.com/wasm3/wasm3/issues/379
|
||||||
CVE-2022-3998 - https://github.com/MonikaBrzica/scm/issues/1
|
CVE-2022-3998 - https://github.com/MonikaBrzica/scm/issues/1
|
||||||
CVE-2022-39983 - https://www.swascan.com/it/vulnerability-report-instant-developer/
|
CVE-2022-39983 - https://www.swascan.com/it/vulnerability-report-instant-developer/
|
||||||
@ -88552,6 +88556,7 @@ CVE-2022-48012 - https://github.com/Sakura-501/Opencats-0.9.7-Vulnerabilities/bl
|
|||||||
CVE-2022-48013 - https://github.com/Sakura-501/Opencats-0.9.7-Vulnerabilities/blob/main/Opencats-0.9.7-Stored%20XSS%20in%20Calendar-Add-Event.md
|
CVE-2022-48013 - https://github.com/Sakura-501/Opencats-0.9.7-Vulnerabilities/blob/main/Opencats-0.9.7-Stored%20XSS%20in%20Calendar-Add-Event.md
|
||||||
CVE-2022-48019 - https://github.com/kkent030315/CVE-2022-42046
|
CVE-2022-48019 - https://github.com/kkent030315/CVE-2022-42046
|
||||||
CVE-2022-4802 - https://huntr.dev/bounties/d47d4a94-92e3-4400-b012-a8577cbd7956
|
CVE-2022-4802 - https://huntr.dev/bounties/d47d4a94-92e3-4400-b012-a8577cbd7956
|
||||||
|
CVE-2022-48020 - https://www.linkedin.com/in/dmitry-kiryukhin-b5741421b/
|
||||||
CVE-2022-4803 - https://huntr.dev/bounties/0fba72b9-db10-4d9f-a707-2acf2004a286
|
CVE-2022-4803 - https://huntr.dev/bounties/0fba72b9-db10-4d9f-a707-2acf2004a286
|
||||||
CVE-2022-4805 - https://huntr.dev/bounties/b03f6a9b-e49b-42d6-a318-1d7afd985873
|
CVE-2022-4805 - https://huntr.dev/bounties/b03f6a9b-e49b-42d6-a318-1d7afd985873
|
||||||
CVE-2022-4806 - https://huntr.dev/bounties/2c7101bc-e6d8-4cd0-9003-bc8d86f4e4be
|
CVE-2022-4806 - https://huntr.dev/bounties/2c7101bc-e6d8-4cd0-9003-bc8d86f4e4be
|
||||||
@ -95133,6 +95138,7 @@ CVE-2023-50089 - https://github.com/NoneShell/Vulnerabilities/blob/main/NETGEAR/
|
|||||||
CVE-2023-50094 - https://github.com/yogeshojha/rengine/security/advisories/GHSA-fx7f-f735-vgh4
|
CVE-2023-50094 - https://github.com/yogeshojha/rengine/security/advisories/GHSA-fx7f-f735-vgh4
|
||||||
CVE-2023-50094 - https://www.mattz.io/posts/cve-2023-50094/
|
CVE-2023-50094 - https://www.mattz.io/posts/cve-2023-50094/
|
||||||
CVE-2023-50096 - https://github.com/elttam/publications/blob/master/writeups/CVE-2023-50096.md
|
CVE-2023-50096 - https://github.com/elttam/publications/blob/master/writeups/CVE-2023-50096.md
|
||||||
|
CVE-2023-50100 - https://github.com/Jarvis-616/cms/blob/master/There%20is%20a%20storage%20type%20XSS%20for%20carousel%20image%20editing.md
|
||||||
CVE-2023-50110 - https://github.com/TestLinkOpenSourceTRMS/testlink-code/pull/357
|
CVE-2023-50110 - https://github.com/TestLinkOpenSourceTRMS/testlink-code/pull/357
|
||||||
CVE-2023-50120 - https://github.com/gpac/gpac/issues/2698
|
CVE-2023-50120 - https://github.com/gpac/gpac/issues/2698
|
||||||
CVE-2023-50123 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
|
CVE-2023-50123 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
|
||||||
@ -95173,6 +95179,7 @@ CVE-2023-50265 - https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-20
|
|||||||
CVE-2023-50266 - https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/
|
CVE-2023-50266 - https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/
|
||||||
CVE-2023-5027 - https://vuldb.com/?id.239869
|
CVE-2023-5027 - https://vuldb.com/?id.239869
|
||||||
CVE-2023-5028 - https://vuldb.com/?id.239870
|
CVE-2023-5028 - https://vuldb.com/?id.239870
|
||||||
|
CVE-2023-5029 - https://vuldb.com/?id.239871
|
||||||
CVE-2023-5030 - https://github.com/husterdjx/cve/blob/main/sql1.md
|
CVE-2023-5030 - https://github.com/husterdjx/cve/blob/main/sql1.md
|
||||||
CVE-2023-5033 - https://vuldb.com/?id.239877
|
CVE-2023-5033 - https://vuldb.com/?id.239877
|
||||||
CVE-2023-50358 - https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2024/2024-213941-1032
|
CVE-2023-50358 - https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2024/2024-213941-1032
|
||||||
@ -95583,6 +95590,7 @@ CVE-2023-5572 - https://huntr.dev/bounties/db649f1b-8578-4ef0-8df3-d320ab33f1be
|
|||||||
CVE-2023-5573 - https://huntr.dev/bounties/46a2bb2c-712a-4008-a147-b862e3af7d72
|
CVE-2023-5573 - https://huntr.dev/bounties/46a2bb2c-712a-4008-a147-b862e3af7d72
|
||||||
CVE-2023-5585 - https://vuldb.com/?id.242170
|
CVE-2023-5585 - https://vuldb.com/?id.242170
|
||||||
CVE-2023-5586 - https://huntr.dev/bounties/d2a6ea71-3555-47a6-9b18-35455d103740
|
CVE-2023-5586 - https://huntr.dev/bounties/d2a6ea71-3555-47a6-9b18-35455d103740
|
||||||
|
CVE-2023-5587 - https://vuldb.com/?id.242186
|
||||||
CVE-2023-5590 - https://huntr.dev/bounties/e268cd68-4f34-49bd-878b-82b96dcc0c99
|
CVE-2023-5590 - https://huntr.dev/bounties/e268cd68-4f34-49bd-878b-82b96dcc0c99
|
||||||
CVE-2023-5591 - https://huntr.dev/bounties/54813d42-5b93-440e-b9b1-c179d2cbf090
|
CVE-2023-5591 - https://huntr.dev/bounties/54813d42-5b93-440e-b9b1-c179d2cbf090
|
||||||
CVE-2023-5595 - https://huntr.dev/bounties/0064cf76-ece1-495d-82b4-e4a1bebeb28e
|
CVE-2023-5595 - https://huntr.dev/bounties/0064cf76-ece1-495d-82b4-e4a1bebeb28e
|
||||||
@ -95610,6 +95618,7 @@ CVE-2023-5672 - https://wpscan.com/vulnerability/7c1dff5b-bed3-49f8-96cc-1bc9abe
|
|||||||
CVE-2023-5673 - https://wpscan.com/vulnerability/231f72bf-9ad0-417e-b7a0-3555875749e9
|
CVE-2023-5673 - https://wpscan.com/vulnerability/231f72bf-9ad0-417e-b7a0-3555875749e9
|
||||||
CVE-2023-5674 - https://wpscan.com/vulnerability/32a23d0d-7ece-4870-a99d-f3f344be2d67
|
CVE-2023-5674 - https://wpscan.com/vulnerability/32a23d0d-7ece-4870-a99d-f3f344be2d67
|
||||||
CVE-2023-5681 - https://github.com/Wsecpro/cve1/blob/main/NS-ASG-sql-list_addr_fwresource_ip.md
|
CVE-2023-5681 - https://github.com/Wsecpro/cve1/blob/main/NS-ASG-sql-list_addr_fwresource_ip.md
|
||||||
|
CVE-2023-5681 - https://vuldb.com/?id.243057
|
||||||
CVE-2023-5682 - https://github.com/Godfather-onec/cve/blob/main/sql.md
|
CVE-2023-5682 - https://github.com/Godfather-onec/cve/blob/main/sql.md
|
||||||
CVE-2023-5684 - https://github.com/Chef003/cve/blob/main/rce.md
|
CVE-2023-5684 - https://github.com/Chef003/cve/blob/main/rce.md
|
||||||
CVE-2023-5686 - https://huntr.com/bounties/bbfe1f76-8fa1-4a8c-909d-65b16e970be0
|
CVE-2023-5686 - https://huntr.com/bounties/bbfe1f76-8fa1-4a8c-909d-65b16e970be0
|
||||||
@ -95690,6 +95699,7 @@ CVE-2023-5905 - https://wpscan.com/vulnerability/f94e91ef-1773-476c-9945-37e89ce
|
|||||||
CVE-2023-5906 - https://wpscan.com/vulnerability/911d495c-3867-4259-a73a-572cd4fccdde
|
CVE-2023-5906 - https://wpscan.com/vulnerability/911d495c-3867-4259-a73a-572cd4fccdde
|
||||||
CVE-2023-5907 - https://wpscan.com/vulnerability/f250226f-4a05-4d75-93c4-5444a4ce919e
|
CVE-2023-5907 - https://wpscan.com/vulnerability/f250226f-4a05-4d75-93c4-5444a4ce919e
|
||||||
CVE-2023-5911 - https://wpscan.com/vulnerability/dde0767d-1dff-4261-adbe-1f3fdf2d9aae
|
CVE-2023-5911 - https://wpscan.com/vulnerability/dde0767d-1dff-4261-adbe-1f3fdf2d9aae
|
||||||
|
CVE-2023-5919 - https://vuldb.com/?id.244310
|
||||||
CVE-2023-5922 - https://wpscan.com/vulnerability/debd8498-5770-4270-9ee1-1503e675ef34/
|
CVE-2023-5922 - https://wpscan.com/vulnerability/debd8498-5770-4270-9ee1-1503e675ef34/
|
||||||
CVE-2023-5931 - https://wpscan.com/vulnerability/3d6889e3-a01b-4e7f-868f-af7cc8c7531a
|
CVE-2023-5931 - https://wpscan.com/vulnerability/3d6889e3-a01b-4e7f-868f-af7cc8c7531a
|
||||||
CVE-2023-5939 - https://wpscan.com/vulnerability/db5d41fc-bcd3-414f-aa99-54d5537007bc
|
CVE-2023-5939 - https://wpscan.com/vulnerability/db5d41fc-bcd3-414f-aa99-54d5537007bc
|
||||||
@ -98070,6 +98080,7 @@ CVE-2024-29975 - https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/
|
|||||||
CVE-2024-29976 - https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/
|
CVE-2024-29976 - https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/
|
||||||
CVE-2024-3000 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Authentication%20Bypass.md
|
CVE-2024-3000 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Authentication%20Bypass.md
|
||||||
CVE-2024-3000 - https://vuldb.com/?id.258202
|
CVE-2024-3000 - https://vuldb.com/?id.258202
|
||||||
|
CVE-2024-3000 - https://vuldb.com/?submit.305052
|
||||||
CVE-2024-3001 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%203.md
|
CVE-2024-3001 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%203.md
|
||||||
CVE-2024-3002 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%204.md
|
CVE-2024-3002 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%204.md
|
||||||
CVE-2024-3003 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%205.md
|
CVE-2024-3003 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%205.md
|
||||||
@ -99747,6 +99758,7 @@ CVE-2024-43168 - https://github.com/NLnetLabs/unbound/issues/1039
|
|||||||
CVE-2024-43360 - https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-9cmr-7437-v9fj
|
CVE-2024-43360 - https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-9cmr-7437-v9fj
|
||||||
CVE-2024-43373 - https://github.com/j4k0xb/webcrack/security/advisories/GHSA-ccqh-278p-xq6w
|
CVE-2024-43373 - https://github.com/j4k0xb/webcrack/security/advisories/GHSA-ccqh-278p-xq6w
|
||||||
CVE-2024-43374 - https://github.com/vim/vim/security/advisories/GHSA-2w8m-443v-cgvw
|
CVE-2024-43374 - https://github.com/vim/vim/security/advisories/GHSA-2w8m-443v-cgvw
|
||||||
|
CVE-2024-43381 - https://github.com/yogeshojha/rengine/security/advisories/GHSA-96q4-fj2m-jqf7
|
||||||
CVE-2024-4340 - https://github.com/advisories/GHSA-2m57-hf25-phgg
|
CVE-2024-4340 - https://github.com/advisories/GHSA-2m57-hf25-phgg
|
||||||
CVE-2024-4340 - https://research.jfrog.com/vulnerabilities/sqlparse-stack-exhaustion-dos-jfsa-2024-001031292/
|
CVE-2024-4340 - https://research.jfrog.com/vulnerabilities/sqlparse-stack-exhaustion-dos-jfsa-2024-001031292/
|
||||||
CVE-2024-4348 - https://vuldb.com/?submit.320855
|
CVE-2024-4348 - https://vuldb.com/?submit.320855
|
||||||
@ -99759,6 +99771,7 @@ CVE-2024-4384 - https://wpscan.com/vulnerability/ad714196-2590-4dc9-b5b9-50808e9
|
|||||||
CVE-2024-4388 - https://wpscan.com/vulnerability/5c791747-f60a-40a7-94fd-e4b9bb5ea2b0/
|
CVE-2024-4388 - https://wpscan.com/vulnerability/5c791747-f60a-40a7-94fd-e4b9bb5ea2b0/
|
||||||
CVE-2024-4395 - https://khronokernel.com/macos/2024/05/01/CVE-2024-4395.html
|
CVE-2024-4395 - https://khronokernel.com/macos/2024/05/01/CVE-2024-4395.html
|
||||||
CVE-2024-4399 - https://wpscan.com/vulnerability/0690327e-da60-4d71-8b3c-ac9533d82302/
|
CVE-2024-4399 - https://wpscan.com/vulnerability/0690327e-da60-4d71-8b3c-ac9533d82302/
|
||||||
|
CVE-2024-44067 - https://ghostwriteattack.com
|
||||||
CVE-2024-4469 - https://wpscan.com/vulnerability/d6b1270b-52c0-471d-a5fb-507e21b46310/
|
CVE-2024-4469 - https://wpscan.com/vulnerability/d6b1270b-52c0-471d-a5fb-507e21b46310/
|
||||||
CVE-2024-4474 - https://wpscan.com/vulnerability/71954c60-6a5b-4cac-9920-6d9b787ead9c/
|
CVE-2024-4474 - https://wpscan.com/vulnerability/71954c60-6a5b-4cac-9920-6d9b787ead9c/
|
||||||
CVE-2024-4475 - https://wpscan.com/vulnerability/f0c7fa00-da6e-4f07-875f-7b85759a54b3/
|
CVE-2024-4475 - https://wpscan.com/vulnerability/f0c7fa00-da6e-4f07-875f-7b85759a54b3/
|
||||||
@ -99996,6 +100009,7 @@ CVE-2024-5363 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester_Hou
|
|||||||
CVE-2024-5364 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester_House_Rental_Management_System_Sql_Inject-2.md
|
CVE-2024-5364 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester_House_Rental_Management_System_Sql_Inject-2.md
|
||||||
CVE-2024-5365 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester_House_Rental_Management_System_Sql_Inject-3.md
|
CVE-2024-5365 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester_House_Rental_Management_System_Sql_Inject-3.md
|
||||||
CVE-2024-5366 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester_House_Rental_Management_System_Sql_Inject-4.md
|
CVE-2024-5366 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester_House_Rental_Management_System_Sql_Inject-4.md
|
||||||
|
CVE-2024-5372 - https://vuldb.com/?submit.343452
|
||||||
CVE-2024-5377 - https://github.com/yuyuliq/cve/issues/1
|
CVE-2024-5377 - https://github.com/yuyuliq/cve/issues/1
|
||||||
CVE-2024-5378 - https://github.com/GAO-UNO/cve/blob/main/sql2.md
|
CVE-2024-5378 - https://github.com/GAO-UNO/cve/blob/main/sql2.md
|
||||||
CVE-2024-5379 - https://gitee.com/heyewei/JFinalcms/issues/I8VHGR
|
CVE-2024-5379 - https://gitee.com/heyewei/JFinalcms/issues/I8VHGR
|
||||||
@ -100167,6 +100181,7 @@ CVE-2024-6273 - https://docs.google.com/document/d/14ExrgXqPQlgvjw2poqNzYzAOi-C5
|
|||||||
CVE-2024-6273 - https://github.com/sgr-xd/CVEs/blob/main/CVE-2024-6273.md
|
CVE-2024-6273 - https://github.com/sgr-xd/CVEs/blob/main/CVE-2024-6273.md
|
||||||
CVE-2024-6289 - https://wpscan.com/vulnerability/fd6d0362-df1d-4416-b8b5-6e5d0ce84793/
|
CVE-2024-6289 - https://wpscan.com/vulnerability/fd6d0362-df1d-4416-b8b5-6e5d0ce84793/
|
||||||
CVE-2024-6308 - https://github.com/L1OudFd8cl09/CVE/blob/main/25_06_2024_a.md
|
CVE-2024-6308 - https://github.com/L1OudFd8cl09/CVE/blob/main/25_06_2024_a.md
|
||||||
|
CVE-2024-6330 - https://wpscan.com/vulnerability/95b532e0-1ffb-421e-b9c0-de03f89491d7/
|
||||||
CVE-2024-6334 - https://wpscan.com/vulnerability/6c09083c-6960-4369-8c5c-ad20e34aaa8b/
|
CVE-2024-6334 - https://wpscan.com/vulnerability/6c09083c-6960-4369-8c5c-ad20e34aaa8b/
|
||||||
CVE-2024-6362 - https://wpscan.com/vulnerability/d2e2d06b-0f07-40b9-9b87-3373f62ae1a9/
|
CVE-2024-6362 - https://wpscan.com/vulnerability/d2e2d06b-0f07-40b9-9b87-3373f62ae1a9/
|
||||||
CVE-2024-6366 - https://wpscan.com/vulnerability/5b90cbdd-52cc-4e7b-bf39-bea0dd59e19e/
|
CVE-2024-6366 - https://wpscan.com/vulnerability/5b90cbdd-52cc-4e7b-bf39-bea0dd59e19e/
|
||||||
@ -100184,6 +100199,7 @@ CVE-2024-6408 - https://wpscan.com/vulnerability/31aaeffb-a752-4941-9d0f-1b374fb
|
|||||||
CVE-2024-6412 - https://wpscan.com/vulnerability/9eb0dad6-3c19-4fe4-a20d-d45b51410444/
|
CVE-2024-6412 - https://wpscan.com/vulnerability/9eb0dad6-3c19-4fe4-a20d-d45b51410444/
|
||||||
CVE-2024-6417 - https://github.com/xyj123a/cve/blob/main/sql.md
|
CVE-2024-6417 - https://github.com/xyj123a/cve/blob/main/sql.md
|
||||||
CVE-2024-6420 - https://wpscan.com/vulnerability/dfda6577-81aa-4397-a2d6-1d736f9ebd44/
|
CVE-2024-6420 - https://wpscan.com/vulnerability/dfda6577-81aa-4397-a2d6-1d736f9ebd44/
|
||||||
|
CVE-2024-6451 - https://wpscan.com/vulnerability/fc06d413-a227-470c-a5b7-cdab57aeab34/
|
||||||
CVE-2024-6459 - https://wpscan.com/vulnerability/330359fa-d085-4923-b5a8-c0e2e5267247/
|
CVE-2024-6459 - https://wpscan.com/vulnerability/330359fa-d085-4923-b5a8-c0e2e5267247/
|
||||||
CVE-2024-6460 - https://wpscan.com/vulnerability/ba2f53e0-30be-4f37-91bc-5fa151f1eee7/
|
CVE-2024-6460 - https://wpscan.com/vulnerability/ba2f53e0-30be-4f37-91bc-5fa151f1eee7/
|
||||||
CVE-2024-6477 - https://wpscan.com/vulnerability/346c855a-4d42-4a87-aac9-e5bfc2242b16/
|
CVE-2024-6477 - https://wpscan.com/vulnerability/346c855a-4d42-4a87-aac9-e5bfc2242b16/
|
||||||
@ -100232,6 +100248,7 @@ CVE-2024-6802 - https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6802
|
|||||||
CVE-2024-6807 - https://reports-kunull.vercel.app/CVE%20research/2024/cve-2024-6807
|
CVE-2024-6807 - https://reports-kunull.vercel.app/CVE%20research/2024/cve-2024-6807
|
||||||
CVE-2024-6807 - https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6807
|
CVE-2024-6807 - https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6807
|
||||||
CVE-2024-6808 - https://github.com/qianqiusujiu/cve/issues/1
|
CVE-2024-6808 - https://github.com/qianqiusujiu/cve/issues/1
|
||||||
|
CVE-2024-6843 - https://wpscan.com/vulnerability/9a5cb440-065a-445a-9a09-55bd5f782e85/
|
||||||
CVE-2024-6884 - https://wpscan.com/vulnerability/1768de0c-e4ea-4c98-abf1-7ac805f214b8/
|
CVE-2024-6884 - https://wpscan.com/vulnerability/1768de0c-e4ea-4c98-abf1-7ac805f214b8/
|
||||||
CVE-2024-6890 - https://korelogic.com/Resources/Advisories/KL-001-2024-007.txt
|
CVE-2024-6890 - https://korelogic.com/Resources/Advisories/KL-001-2024-007.txt
|
||||||
CVE-2024-6891 - https://korelogic.com/Resources/Advisories/KL-001-2024-008.txt
|
CVE-2024-6891 - https://korelogic.com/Resources/Advisories/KL-001-2024-008.txt
|
||||||
@ -100524,6 +100541,7 @@ CVE-2024-7852 - https://github.com/Wsstiger/cve/blob/main/Yoga_xss.md
|
|||||||
CVE-2024-7868 - https://www.xpdfreader.com/security-bug/CVE-2024-7868.html
|
CVE-2024-7868 - https://www.xpdfreader.com/security-bug/CVE-2024-7868.html
|
||||||
CVE-2024-7887 - https://github.com/Hebing123/cve/issues/67
|
CVE-2024-7887 - https://github.com/Hebing123/cve/issues/67
|
||||||
CVE-2024-7896 - https://gist.github.com/b0rgch3n/4788c7c429d49095915d84161a157295
|
CVE-2024-7896 - https://gist.github.com/b0rgch3n/4788c7c429d49095915d84161a157295
|
||||||
|
CVE-2024-7896 - https://vuldb.com/?submit.387131
|
||||||
CVE-2024-7897 - https://gist.github.com/b0rgch3n/bb47a1ed6f66c1e8c7a80f210f4ac8ef
|
CVE-2024-7897 - https://gist.github.com/b0rgch3n/bb47a1ed6f66c1e8c7a80f210f4ac8ef
|
||||||
CVE-2024-7898 - https://gist.github.com/b0rgch3n/3136cad95b09e42184fb2d78aae33651
|
CVE-2024-7898 - https://gist.github.com/b0rgch3n/3136cad95b09e42184fb2d78aae33651
|
||||||
CVE-2024-7900 - https://github.com/DeepMountains/Mirage/blob/main/CVE16-1.md
|
CVE-2024-7900 - https://github.com/DeepMountains/Mirage/blob/main/CVE16-1.md
|
||||||
|
Loading…
x
Reference in New Issue
Block a user