mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-05 10:17:57 +00:00
Update CVE sources 2024-06-07 17:53
This commit is contained in:
parent
436163792c
commit
e6ecd99f3d
@ -73,6 +73,7 @@ vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which
|
||||
- https://github.com/sponkmonk/Ladon_english_update
|
||||
- https://github.com/sunzu94/vsftpd_2.3.4_Exploit
|
||||
- https://github.com/tarikemal/exploit-ftp-samba
|
||||
- https://github.com/thanawut2903/Port-21-tcp-vsftpd-2.3.4-exploit
|
||||
- https://github.com/vaishnavucv/CVE-2011-2523
|
||||
- https://github.com/vasanth-tamil/ctf-writeups
|
||||
- https://github.com/vmmaltsev/13.1
|
||||
|
@ -14,6 +14,7 @@ No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/0xl0k1/CVE-2012-1823
|
||||
- https://github.com/0xsyr0/OSCP
|
||||
- https://github.com/1060275195/Covid-v2-Botnet
|
||||
- https://github.com/404tk/lazyscan
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
|
@ -16,6 +16,7 @@ Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not prope
|
||||
#### Github
|
||||
- https://github.com/ExploitCN/CVE-2012-1876-win7_x86_and_win7x64
|
||||
- https://github.com/WizardVan/CVE-2012-1876
|
||||
- https://github.com/ernestang98/win-exploits
|
||||
- https://github.com/migraine-sudo/Arsenal
|
||||
- https://github.com/ricew4ng/BrowserSecurity
|
||||
- https://github.com/ser4wang/BrowserSecurity
|
||||
|
@ -29,6 +29,7 @@ No PoCs from references.
|
||||
- https://github.com/ellikt1/Vulnerability-Assessment
|
||||
- https://github.com/florylsk/SignatureGate
|
||||
- https://github.com/hiba-ahmad1/NessusVulnManagement
|
||||
- https://github.com/hibahmad30/NessusVulnManagement
|
||||
- https://github.com/izj007/wechat
|
||||
- https://github.com/jason-klein/signed-nsis-exe-append-payload
|
||||
- https://github.com/lau1010/Packer_VMware_Win19_UEFI_secure_boot_with_Updates
|
||||
|
@ -15,6 +15,7 @@ Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb
|
||||
#### Github
|
||||
- https://github.com/Ostorlab/KEV
|
||||
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||||
- https://github.com/bibin-paul-trustme/ruby_repo
|
||||
- https://github.com/jasnow/585-652-ruby-advisory-db
|
||||
- https://github.com/omarkurt/cve-2014-0130
|
||||
- https://github.com/rubysec/ruby-advisory-db
|
||||
|
@ -18,6 +18,7 @@ The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not p
|
||||
- https://hackerone.com/reports/6626
|
||||
|
||||
#### Github
|
||||
- https://github.com/00xNetrunner/Shodan_Cheet-Sheet
|
||||
- https://github.com/0day404/vulnerability-poc
|
||||
- https://github.com/0x0d3ad/Kn0ck
|
||||
- https://github.com/0x90/CVE-2014-0160
|
||||
|
@ -26,6 +26,7 @@ OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not pr
|
||||
- https://kc.mcafee.com/corporate/index?page=content&id=SB10075
|
||||
|
||||
#### Github
|
||||
- https://github.com/00xNetrunner/Shodan_Cheet-Sheet
|
||||
- https://github.com/0nopnop/qualysparser
|
||||
- https://github.com/1N3/MassBleed
|
||||
- https://github.com/84KaliPleXon3/a2sv
|
||||
|
@ -16,4 +16,5 @@ No PoCs from references.
|
||||
- https://github.com/Haifisch/dayswithoutansslexploit
|
||||
- https://github.com/fhightower/ioc-finder
|
||||
- https://github.com/guilhermeG23/manual_suricata_simples
|
||||
- https://github.com/xssec/xshodan
|
||||
|
||||
|
@ -29,6 +29,7 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th
|
||||
- https://www.exploit-db.com/exploits/42938/
|
||||
|
||||
#### Github
|
||||
- https://github.com/00xNetrunner/Shodan_Cheet-Sheet
|
||||
- https://github.com/0bfxgh0st/cve-2014-6271
|
||||
- https://github.com/0x00-0x00/CVE-2014-6271
|
||||
- https://github.com/0x0d3ad/Kn0ck
|
||||
@ -368,6 +369,7 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th
|
||||
- https://github.com/francisck/shellshock-cgi
|
||||
- https://github.com/fxschaefer/ejpt
|
||||
- https://github.com/gabemarshall/shocknaww
|
||||
- https://github.com/gauss77/LaboratoriosHack
|
||||
- https://github.com/ghoneycutt/puppet-module-cve
|
||||
- https://github.com/gipi/cve-cemetery
|
||||
- https://github.com/giterlizzi/secdb-feeds
|
||||
@ -542,6 +544,7 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th
|
||||
- https://github.com/riikunn1004/oscp-cheatsheet
|
||||
- https://github.com/rjdj0261/-Awesome-Hacking-
|
||||
- https://github.com/rmetzler/ansible-shellshock-fix
|
||||
- https://github.com/rodolfomarianocy/OSCP-Tricks-2023
|
||||
- https://github.com/roninAPT/pentest-kit
|
||||
- https://github.com/rrmomaya2900/0dayWriteup-THM
|
||||
- https://github.com/rrreeeyyy/cve-2014-6271-spec
|
||||
|
@ -13,6 +13,7 @@ Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/s
|
||||
- https://puppet.com/security/cve/cve-2014-7829
|
||||
|
||||
#### Github
|
||||
- https://github.com/bibin-paul-trustme/ruby_repo
|
||||
- https://github.com/jasnow/585-652-ruby-advisory-db
|
||||
- https://github.com/rubysec/ruby-advisory-db
|
||||
- https://github.com/tdunning/github-advisory-parser
|
||||
|
@ -14,6 +14,7 @@ Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/s
|
||||
- https://puppet.com/security/cve/cve-2014-7829
|
||||
|
||||
#### Github
|
||||
- https://github.com/bibin-paul-trustme/ruby_repo
|
||||
- https://github.com/jasnow/585-652-ruby-advisory-db
|
||||
- https://github.com/rubysec/ruby-advisory-db
|
||||
- https://github.com/zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-
|
||||
|
@ -19,6 +19,7 @@ HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Wind
|
||||
- https://github.com/ACIC-Africa/metasploitable3
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/Aquilao/Toy-Box
|
||||
- https://github.com/Cappricio-Securities/CVE-2015-1635
|
||||
- https://github.com/H3xL00m/CVE-2015-1635
|
||||
- https://github.com/H3xL00m/CVE-2015-1635-POC
|
||||
- https://github.com/Olysyan/MSS
|
||||
|
@ -17,5 +17,6 @@ No PoCs from references.
|
||||
- https://github.com/BLACKHAT-SSG/EXP-401-OSEE
|
||||
- https://github.com/HaifeiLi/HardenFlash
|
||||
- https://github.com/PwnAwan/EXP-401-OSEE
|
||||
- https://github.com/ernestang98/win-exploits
|
||||
- https://github.com/gscamelo/OSEE
|
||||
|
||||
|
@ -45,6 +45,7 @@ The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write t
|
||||
- https://github.com/developer3000S/PoC-in-GitHub
|
||||
- https://github.com/ebantula/eHacking_LABS
|
||||
- https://github.com/firatesatoglu/shodanSearch
|
||||
- https://github.com/gauss77/LaboratoriosHack
|
||||
- https://github.com/hackarada/cve-2015-3306
|
||||
- https://github.com/hectorgie/PoC-in-GitHub
|
||||
- https://github.com/hktalent/TOP
|
||||
|
@ -16,4 +16,5 @@ Cross-site scripting (XSS) vulnerability in jsoup before 1.8.3.
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/Anonymous-Phunter/PHunter
|
||||
- https://github.com/CGCL-codes/PHunter
|
||||
- https://github.com/epicosy/VUL4J-59
|
||||
|
||||
|
@ -14,6 +14,7 @@ No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/bibin-paul-trustme/ruby_repo
|
||||
- https://github.com/jasnow/585-652-ruby-advisory-db
|
||||
- https://github.com/rubysec/ruby-advisory-db
|
||||
- https://github.com/zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-
|
||||
|
@ -14,6 +14,7 @@ No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/bibin-paul-trustme/ruby_repo
|
||||
- https://github.com/jasnow/585-652-ruby-advisory-db
|
||||
- https://github.com/rubysec/ruby-advisory-db
|
||||
- https://github.com/zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-
|
||||
|
@ -16,4 +16,5 @@ No PoCs from references.
|
||||
- https://github.com/0xCyberY/CVE-T4PDF
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/datntsec/WINDOWS-10-SEGMENT-HEAP-INTERNALS
|
||||
- https://github.com/ernestang98/win-exploits
|
||||
|
||||
|
@ -14,6 +14,7 @@ No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/bibin-paul-trustme/ruby_repo
|
||||
- https://github.com/jasnow/585-652-ruby-advisory-db
|
||||
- https://github.com/rubysec/ruby-advisory-db
|
||||
- https://github.com/vulsio/go-cve-dictionary
|
||||
|
@ -18,6 +18,7 @@ Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.
|
||||
- https://github.com/NzKoff/shift_summer_2019
|
||||
- https://github.com/Ostorlab/KEV
|
||||
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||||
- https://github.com/bibin-paul-trustme/ruby_repo
|
||||
- https://github.com/dachidahu/CVE-2016-0752
|
||||
- https://github.com/forced-request/rails-rce-cve-2016-0752
|
||||
- https://github.com/jasnow/585-652-ruby-advisory-db
|
||||
|
@ -14,5 +14,5 @@ NUUO NVRmini 2 1.0.0 through 3.0.0 and NUUO NVRsolo 1.0.0 through 3.0.0 have har
|
||||
- https://www.exploit-db.com/exploits/40200/
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
- https://github.com/xssec/xshodan
|
||||
|
||||
|
@ -16,4 +16,5 @@ No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/ernestang98/win-exploits
|
||||
|
||||
|
@ -17,5 +17,6 @@ Unrestricted file upload vulnerability in clients/editclient.php in PhpCollab 2.
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/ARPSyndicate/kenzer-templates
|
||||
- https://github.com/asaotomo/FofaMap
|
||||
- https://github.com/jlk/exploit-CVE-2017-6090
|
||||
|
||||
|
@ -18,6 +18,7 @@ Incorrect side effect annotation in V8 in Google Chrome prior to 70.0.3538.64 al
|
||||
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||||
- https://github.com/Uniguri/CVE-1day
|
||||
- https://github.com/changelog2020/JSEChalls
|
||||
- https://github.com/ernestang98/win-exploits
|
||||
- https://github.com/hwiwonl/dayone
|
||||
- https://github.com/jhalon/CVE-2018-17463
|
||||
- https://github.com/kdmarti2/CVE-2018-17463
|
||||
|
@ -83,6 +83,7 @@ In WinRAR versions prior to and including 5.61, There is path traversal vulnerab
|
||||
- https://github.com/eastmountyxz/NetworkSecuritySelf-study
|
||||
- https://github.com/eastmountyxz/SystemSecurity-ReverseAnalysis
|
||||
- https://github.com/githuberxu/Safety-Books
|
||||
- https://github.com/gnusec/soapffzblogposts_backup
|
||||
- https://github.com/googleprojectzero/winafl
|
||||
- https://github.com/gyaansastra/Red-Team-Toolkit
|
||||
- https://github.com/hardik05/winafl-powermopt
|
||||
|
@ -15,6 +15,7 @@ This vulnerability allows remote attackers to disclose sensitive information on
|
||||
|
||||
#### Github
|
||||
- https://github.com/0xT11/CVE-POC
|
||||
- https://github.com/ernestang98/win-exploits
|
||||
- https://github.com/hectorgie/PoC-in-GitHub
|
||||
- https://github.com/manojcode/Foxit-Reader-RCE-with-virualalloc-and-shellcode-for-CVE-2018-9948-and-CVE-2018-9958
|
||||
- https://github.com/orangepirate/cve-2018-9948-9958-exp
|
||||
|
@ -17,6 +17,7 @@ This vulnerability allows remote attackers to execute arbitrary code on vulnerab
|
||||
#### Github
|
||||
- https://github.com/0xT11/CVE-POC
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/ernestang98/win-exploits
|
||||
- https://github.com/hectorgie/PoC-in-GitHub
|
||||
- https://github.com/manojcode/Foxit-Reader-RCE-with-virualalloc-and-shellcode-for-CVE-2018-9948-and-CVE-2018-9958
|
||||
- https://github.com/t3rabyt3-zz/CVE-2018-9958--Exploit
|
||||
|
@ -20,6 +20,7 @@ A remote code execution vulnerability exists in the way that the Chakra scriptin
|
||||
- https://github.com/EanNewton/Awesome-Reading-List
|
||||
- https://github.com/NatteeSetobol/Chakra-CVE-2019-0567
|
||||
- https://github.com/developer3000S/PoC-in-GitHub
|
||||
- https://github.com/ernestang98/win-exploits
|
||||
- https://github.com/hectorgie/PoC-in-GitHub
|
||||
- https://github.com/lnick2023/nicenice
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
|
@ -3134,6 +3134,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan
|
||||
- https://github.com/harshidk/MilleniumFalcons2022-2023OLD
|
||||
- https://github.com/harshidk/viperftclibrary-cpp
|
||||
- https://github.com/hashgupta/StaticDischargeCode
|
||||
- https://github.com/hatchetAx/14887FTC
|
||||
- https://github.com/hatchetAxing/14887FTC
|
||||
- https://github.com/heatedmonkeytrousers/powerplay
|
||||
- https://github.com/heavydriver/ftc_jasper
|
||||
|
@ -20,6 +20,7 @@ No PoCs from references.
|
||||
- https://github.com/KotenAngered/ZTE-Blade-A5-2019-Nae-Nae-List
|
||||
- https://github.com/OpposedDeception/ZTE-Blade-A5-2019-Nae-Nae-List
|
||||
- https://github.com/Self-Study-Committee/Skr_Learning
|
||||
- https://github.com/ernestang98/win-exploits
|
||||
- https://github.com/jfmcoronel/eevee
|
||||
- https://github.com/sslab-gatech/DIE
|
||||
- https://github.com/taielab/awesome-hacking-lists
|
||||
|
@ -16,6 +16,7 @@ No PoCs from references.
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/ZwCreatePhoton/CVE-2019-5782_CVE-2019-13768
|
||||
- https://github.com/developer3000S/PoC-in-GitHub
|
||||
- https://github.com/ernestang98/win-exploits
|
||||
- https://github.com/hectorgie/PoC-in-GitHub
|
||||
- https://github.com/wh1ant/vulnjs
|
||||
- https://github.com/yuvaly0/exploits
|
||||
|
@ -22,6 +22,7 @@ An issue was discovered in drivers/media/platform/vivid in the Linux kernel thro
|
||||
- https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation
|
||||
- https://github.com/Limesss/cve-2019-18683
|
||||
- https://github.com/developer3000S/PoC-in-GitHub
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
- https://github.com/hectorgie/PoC-in-GitHub
|
||||
- https://github.com/kdn111/linux-kernel-exploitation
|
||||
- https://github.com/khanhdn111/linux-kernel-exploitation
|
||||
|
@ -49,6 +49,7 @@ A remote code execution vulnerability exists in the way that the scripting engin
|
||||
- https://github.com/binaryfigments/CVE-2020-0674
|
||||
- https://github.com/cyberanand1337x/bug-bounty-2022
|
||||
- https://github.com/developer3000S/PoC-in-GitHub
|
||||
- https://github.com/ernestang98/win-exploits
|
||||
- https://github.com/forrest-orr/DoubleStar
|
||||
- https://github.com/hasee2018/Penetration_Testing_POC
|
||||
- https://github.com/hectorgie/PoC-in-GitHub
|
||||
|
@ -209,6 +209,7 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
|
||||
- https://github.com/gabimarti/SMBScanner
|
||||
- https://github.com/giterlizzi/secdb-feeds
|
||||
- https://github.com/githuberxu/Safety-Books
|
||||
- https://github.com/gnusec/soapffzblogposts_backup
|
||||
- https://github.com/h7ml/h7ml
|
||||
- https://github.com/hack-parthsharma/WinPwn
|
||||
- https://github.com/halsten/CVE-2020-0796
|
||||
|
@ -21,6 +21,7 @@ Insufficient data validation in V8 in Google Chrome prior to 87.0.4280.88 allowe
|
||||
- https://github.com/anvbis/chrome_v8_ndays
|
||||
- https://github.com/anvbis/trivialize
|
||||
- https://github.com/dongAxis/to_be_a_v8_master
|
||||
- https://github.com/ernestang98/win-exploits
|
||||
- https://github.com/hktalent/bug-bounty
|
||||
- https://github.com/joydo/CVE-Writeups
|
||||
- https://github.com/maldev866/ChExp_CVE_2020_16040
|
||||
|
17
2020/CVE-2020-6368.md
Normal file
17
2020/CVE-2020-6368.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2020-6368](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6368)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
SAP Business Planning and Consolidation, versions - 750, 751, 752, 753, 754, 755, 810, 100, 200, can be abused by an attacker, allowing them to modify displayed application content without authorization, and to potentially obtain authentication information from other legitimate users, leading to Cross Site Scripting.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/ernestang98/win-exploits
|
||||
|
@ -71,6 +71,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
|
||||
- https://github.com/S3cur3Th1sSh1t/Pentest-Tools
|
||||
- https://github.com/SYRTI/POC_to_review
|
||||
- https://github.com/Sma11New/PocList
|
||||
- https://github.com/SummerSec/SpringExploit
|
||||
- https://github.com/TesterCC/exp_poc_library
|
||||
- https://github.com/TheclaMcentire/CVE-2021-26084_Confluence
|
||||
- https://github.com/Threekiii/Awesome-POC
|
||||
|
@ -27,6 +27,7 @@ An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby a
|
||||
- https://github.com/markevans/dragonfly
|
||||
- https://github.com/mlr0p/CVE-2021-33564
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/rodolfomarianocy/OSCP-Tricks-2023
|
||||
- https://github.com/soosmile/POC
|
||||
- https://github.com/trhacknon/Pocingit
|
||||
- https://github.com/zecool/cve
|
||||
|
@ -33,6 +33,7 @@ Microsoft Exchange Server Remote Code Execution Vulnerability
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/CVEDB/top
|
||||
- https://github.com/Dheerajmadhukar/karma_v2
|
||||
- https://github.com/DiedB/caldera-precomp
|
||||
- https://github.com/FDlucifer/Proxy-Attackchain
|
||||
- https://github.com/GhostTroops/TOP
|
||||
|
@ -18,6 +18,7 @@ No PoCs from references.
|
||||
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||||
- https://github.com/SpiralBL0CK/Chrome-V8-RCE-CVE-2021-38003
|
||||
- https://github.com/anvbis/chrome_v8_ndays
|
||||
- https://github.com/ernestang98/win-exploits
|
||||
- https://github.com/kestryix/tisc-2023-writeups
|
||||
- https://github.com/numencyber/Vulnerability_PoC
|
||||
- https://github.com/wh1ant/vulnjs
|
||||
|
@ -77,6 +77,7 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver
|
||||
- https://github.com/anonymous364872/Rapier_Tool
|
||||
- https://github.com/apif-review/APIF_tool_2024
|
||||
- https://github.com/asaotomo/CVE-2021-43798-Grafana-Exp
|
||||
- https://github.com/asaotomo/FofaMap
|
||||
- https://github.com/aymenbouferroum/CVE-2021-43798_exploit
|
||||
- https://github.com/b4zinga/Raphael
|
||||
- https://github.com/bigblackhat/oFx
|
||||
|
@ -15,4 +15,5 @@ The WooCommerce Stored Exporter WordPress plugin before 2.7.1 was affected by a
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/ARPSyndicate/kenzer-templates
|
||||
- https://github.com/asaotomo/FofaMap
|
||||
|
||||
|
@ -13,5 +13,5 @@ Type confusion in V8 in Google Chrome prior to 100.0.4896.60 allowed a remote at
|
||||
- http://packetstormsecurity.com/files/172851/Chrome-Renderer-Type-Confusion-Remote-Code-Execution.html
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
- https://github.com/ernestang98/win-exploits
|
||||
|
||||
|
@ -78,6 +78,7 @@ On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.
|
||||
- https://github.com/Stonzyy/Exploit-F5-CVE-2022-1388
|
||||
- https://github.com/Str1am/my-nuclei-templates
|
||||
- https://github.com/SudeepaShiranthaka/F5-BIG-IP-Remote-Code-Execution-Vulnerability-CVE-2022-1388-A-Case-Study
|
||||
- https://github.com/SummerSec/SpringExploit
|
||||
- https://github.com/Threekiii/Awesome-POC
|
||||
- https://github.com/TomArni680/CVE-2022-1388-POC
|
||||
- https://github.com/TomArni680/CVE-2022-1388-RCE
|
||||
|
@ -74,6 +74,7 @@ In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are v
|
||||
- https://github.com/Sec-Fork/mullet2
|
||||
- https://github.com/SiJiDo/CVE-2022-22947
|
||||
- https://github.com/Summer177/Spring-Cloud-Gateway-CVE-2022-22947
|
||||
- https://github.com/SummerSec/SpringExploit
|
||||
- https://github.com/SummerSec/learning-codeql
|
||||
- https://github.com/Tas9er/SpringCloudGatewayRCE
|
||||
- https://github.com/Threekiii/Awesome-Exploit
|
||||
|
@ -68,6 +68,7 @@ In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, w
|
||||
- https://github.com/SirElmard/ethical_hacking
|
||||
- https://github.com/SnailDev/github-hot-hub
|
||||
- https://github.com/SourM1lk/CVE-2022-22963-Exploit
|
||||
- https://github.com/SummerSec/SpringExploit
|
||||
- https://github.com/Threekiii/Awesome-Exploit
|
||||
- https://github.com/Threekiii/Awesome-POC
|
||||
- https://github.com/Threekiii/Awesome-Redteam
|
||||
|
@ -97,6 +97,7 @@ A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable t
|
||||
- https://github.com/Snip3R69/spring-shell-vuln
|
||||
- https://github.com/Sparrow-Co-Ltd/real_cve_examples
|
||||
- https://github.com/SummerSec/BlogPapers
|
||||
- https://github.com/SummerSec/SpringExploit
|
||||
- https://github.com/SummerSec/SummerSec
|
||||
- https://github.com/TheGejr/SpringShell
|
||||
- https://github.com/Threekiii/Awesome-Exploit
|
||||
|
@ -48,6 +48,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
|
||||
- https://github.com/CatAnnaDev/CVE-2022-26134
|
||||
- https://github.com/Chocapikk/CVE-2022-26134
|
||||
- https://github.com/ColdFusionX/CVE-2022-26134
|
||||
- https://github.com/CuriousLearnerDev/Full-Scanner
|
||||
- https://github.com/CyberDonkyx0/CVE-2022-26134
|
||||
- https://github.com/DARKSTUFF-LAB/-CVE-2022-26134
|
||||
- https://github.com/DallasWmk/censys_takehome
|
||||
@ -88,6 +89,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
|
||||
- https://github.com/Sakura-nee/CVE-2022-26134
|
||||
- https://github.com/SirElmard/ethical_hacking
|
||||
- https://github.com/StarCrossPortal/scalpel
|
||||
- https://github.com/SummerSec/SpringExploit
|
||||
- https://github.com/Sylon001/Common-tool
|
||||
- https://github.com/Threekiii/Awesome-POC
|
||||
- https://github.com/Threekiii/Awesome-Redteam
|
||||
|
@ -16,6 +16,7 @@ There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x befor
|
||||
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/bibin-paul-trustme/ruby_repo
|
||||
- https://github.com/jasnow/585-652-ruby-advisory-db
|
||||
- https://github.com/lifeparticle/Ruby-Cheatsheet
|
||||
- https://github.com/rubysec/ruby-advisory-db
|
||||
|
17
2022/CVE-2022-4968.md
Normal file
17
2022/CVE-2022-4968.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2022-4968](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4968)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
netplan leaks the private key of wireguard to local users. A security fix will be released soon.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
17
2023/CVE-2023-0098.md
Normal file
17
2023/CVE-2023-0098.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0098](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0098)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
The Simple URLs WordPress plugin before 115 does not escape some parameters before using them in various SQL statements used by AJAX actions available by any authenticated users, leading to a SQL injection exploitable by low privilege users such as subscriber.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/db0b3275-40df-404e-aa8d-53558f0122d8
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -10,6 +10,7 @@ A vulnerability, which was classified as critical, has been found in GPAC 2.3-DE
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/gpac/gpac/issues/2396
|
||||
- https://github.com/qianshuidewajueji/poc/blob/main/gpac/mp3_dmx_process_poc3
|
||||
|
||||
#### Github
|
||||
|
17
2023/CVE-2023-20938.md
Normal file
17
2023/CVE-2023-20938.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-20938](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20938)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
In binder_transaction_buffer_release of binder.c, there is a possible use after free due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-257685302References: Upstream kernel
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/IamAlch3mist/Awesome-Android-Vulnerability-Research
|
||||
|
@ -13,6 +13,7 @@ A regular expression based DoS vulnerability in Action Dispatch <6.1.7.1 and <7.
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/bibin-paul-trustme/ruby_repo
|
||||
- https://github.com/jasnow/585-652-ruby-advisory-db
|
||||
- https://github.com/rubysec/ruby-advisory-db
|
||||
|
||||
|
17
2023/CVE-2023-26484.md
Normal file
17
2023/CVE-2023-26484.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-26484](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26484)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
KubeVirt is a virtual machine management add-on for Kubernetes. In versions 0.59.0 and prior, if a malicious user has taken over a Kubernetes node where virt-handler (the KubeVirt node-daemon) is running, the virt-handler service account can be used to modify all node specs. This can be misused to lure-in system-level-privileged components which can, for instance, read all secrets on the cluster, or can exec into pods on other nodes. This way, a compromised node can be used to elevate privileges beyond the node until potentially having full privileged access to the whole cluster. The simplest way to exploit this, once a user could compromise a specific node, is to set with the virt-handler service account all other nodes to unschedulable and simply wait until system-critical components with high privileges appear on its node. No patches are available as of time of publication. As a workaround, gatekeeper users can add a webhook which will block the `virt-handler` service account to modify the spec of a node.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/kubevirt/kubevirt/issues/9109
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -12,6 +12,7 @@
|
||||
#### Reference
|
||||
- https://googleinformationsworld.blogspot.com/2023/04/revive-adserver-541-vulnerable-to-brute.html
|
||||
- https://www.esecforte.com/login-page-brute-force-attack/
|
||||
- https://www.revive-adserver.com/security/response-to-cve-2023-26756/
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2023/CVE-2023-27652.md
Normal file
17
2023/CVE-2023-27652.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-27652](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27652)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
An issue found in Ego Studio SuperClean v.1.1.9 and v.1.1.5 allows an attacker to gain privileges cause a denial of service via the update_info field of the _default_.xml file.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27652/CVE%20detail.md
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2023/CVE-2023-29747.md
Normal file
17
2023/CVE-2023-29747.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-29747](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29747)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Story Saver for Instragram - Video Downloader 1.0.6 for Android exists exposed component, the component provides the method to modify the SharedPreference file. The attacker can use the method to modify the data in any SharedPreference file, these data will be loaded into the memory when the application is opened. Depending on how the data is used, this can result in various attack consequences, such as ad display exceptions.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29747/CVE%20detail.md
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2023/CVE-2023-29751.md
Normal file
17
2023/CVE-2023-29751.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-29751](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29751)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
An issue found in Yandex Navigator v.6.60 for Android allows unauthorized apps to cause a persistent denial of service by manipulating the SharedPreference files.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29751/CVE%20detailed.md
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2023/CVE-2023-29758.md
Normal file
17
2023/CVE-2023-29758.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-29758](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29758)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
An issue found in Blue Light Filter v.1.5.5 for Android allows unauthorized apps to cause a persistent denial of service by manipulating the SharedPreference files.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29758/CVE%20detailed.md
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2023/CVE-2023-29767.md
Normal file
17
2023/CVE-2023-29767.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-29767](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29767)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
An issue found in CrossX v.1.15.3 for Android allows a local attacker to cause a persistent denial of service via the database files.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29767/CVE%20detailed.md
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -11,7 +11,9 @@ An issue was discovered in Inosoft VisiWin 7 through 2022-2.1 (Runtime RT7.3 RC3
|
||||
|
||||
#### Reference
|
||||
- http://packetstormsecurity.com/files/174268/Inosoft-VisiWin-7-2022-2.1-Insecure-Permissions-Privilege-Escalation.html
|
||||
- https://www.cisa.gov/news-events/ics-advisories/icsa-24-151-03
|
||||
- https://www.exploit-db.com/exploits/51682
|
||||
- https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -11,6 +11,7 @@ Zoho ManageEngine ADManager Plus version 7182 and prior disclosed the default pa
|
||||
|
||||
#### Reference
|
||||
- http://packetstormsecurity.com/files/177091/ManageEngine-ADManager-Plus-Recovery-Password-Disclosure.html
|
||||
- https://github.com/passtheticket/vulnerability-research/blob/main/manage-engine-apps/admanager-recovery-password-disclosure.md
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
@ -10,6 +10,7 @@ Cross Site Scripting vulnerability in e107 v.2.3.2 allows a remote attacker to e
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/Trinity-SYT-SECURITY/XSS_vuln_issue/blob/main/e107%20v2.3.2.md
|
||||
- https://www.chtsecurity.com/news/0a4743a5-491e-4685-95ee-df8316ab5284
|
||||
- https://www.exploit-db.com/exploits/51449
|
||||
|
||||
|
@ -10,7 +10,7 @@ Incorrect Access Control in ITB-GmbH TradePro v9.5, allows remote attackers to r
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://github.com/caffeinated-labs/CVE-2023-36644
|
||||
|
||||
#### Github
|
||||
- https://github.com/caffeinated-labs/CVE-2023-36644
|
||||
|
17
2023/CVE-2023-3797.md
Normal file
17
2023/CVE-2023-3797.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-3797](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3797)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A vulnerability, which was classified as critical, was found in Gen Technology Four Mountain Torrent Disaster Prevention and Control of Monitoring and Early Warning System up to 20230712. This affects an unknown part of the file /Duty/AjaxHandle/UploadFloodPlanFileUpdate.ashx. The manipulation of the argument Filedata leads to unrestricted upload. The exploit has been disclosed to the public and may be used. The identifier VDB-235065 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/segonse/cve/blob/main/sichuang/sichuang.md
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2023/CVE-2023-3798.md
Normal file
17
2023/CVE-2023-3798.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-3798](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3798)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A vulnerability has been found in Chengdu Flash Flood Disaster Monitoring and Warning System 2.0 and classified as critical. This vulnerability affects unknown code of the file /App_Resource/UEditor/server/upload.aspx. The manipulation of the argument file leads to unrestricted upload. The exploit has been disclosed to the public and may be used. VDB-235066 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/RCEraser/cve/blob/main/wanjiang.md
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -10,6 +10,7 @@ A vulnerability was found in Chengdu Flash Flood Disaster Monitoring and Warning
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/GUIqizsq/cve/blob/main/upload_1.md
|
||||
- https://vuldb.com/?id.235070
|
||||
|
||||
#### Github
|
||||
|
17
2023/CVE-2023-3804.md
Normal file
17
2023/CVE-2023-3804.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-3804](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3804)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A vulnerability classified as problematic was found in Chengdu Flash Flood Disaster Monitoring and Warning System 2.0. This vulnerability affects unknown code of the file /Service/FileHandler.ashx. The manipulation of the argument userFile leads to unrestricted upload. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235072. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/yueying638/cve/blob/main/upload.md
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2023/CVE-2023-38870.md
Normal file
17
2023/CVE-2023-38870.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-38870](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38870)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A SQL injection vulnerability exists in gugoan Economizzer commit 3730880 (April 2023) and v.0.9-beta1. The cash book has a feature to list accomplishments by category, and the 'category_id' parameter is vulnerable to SQL Injection.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38870
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2023/CVE-2023-38872.md
Normal file
17
2023/CVE-2023-38872.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-38872](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38872)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
An Insecure Direct Object Reference (IDOR) vulnerability in gugoan Economizzer commit 3730880 (April 2023) and v.0.9-beta1 allows any unauthenticated attacker to access cash book entry attachments of any other user, if they know the Id of the attachment.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38872
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2023/CVE-2023-38874.md
Normal file
17
2023/CVE-2023-38874.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-38874](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38874)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A remote code execution (RCE) vulnerability via an insecure file upload exists in gugoan's Economizzer v.0.9-beta1 and commit 3730880 (April 2023). A malicious attacker can upload a PHP web shell as an attachment when adding a new cash book entry. Afterwards, the attacker may visit the web shell and execute arbitrary commands.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38874
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2023/CVE-2023-38876.md
Normal file
17
2023/CVE-2023-38876.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-38876](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38876)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A reflected cross-site scripting (XSS) vulnerability in msaad1999's PHP-Login-System 2.0.1 allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the 'selector' parameter in '/reset-password'.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38876
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2023/CVE-2023-38879.md
Normal file
17
2023/CVE-2023-38879.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-38879](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38879)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
The Community Edition version 9.0 of OS4ED's openSIS Classic allows remote attackers to read arbitrary files via a directory traversal vulnerability in the 'filename' parameter of 'DownloadWindow.php'.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38879
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2023/CVE-2023-38882.md
Normal file
17
2023/CVE-2023-38882.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-38882](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38882)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A reflected cross-site scripting (XSS) vulnerability in the Community Edition version 9.0 of OS4ED's openSIS Classic allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the 'include' parameter in 'ForExport.php'
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38882
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2023/CVE-2023-38973.md
Normal file
17
2023/CVE-2023-38973.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-38973](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38973)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A stored cross-site scripting (XSS) vulnerability in the Add Tag function of Badaso v2.9.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title parameter.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/anh91/uasoft-indonesia--badaso/blob/main/xss5.md
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -10,6 +10,7 @@ PHPGurukul Online Security Guards Hiring System v.1.0 is vulnerable to SQL Injec
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/Trinity-SYT-SECURITY/XSS_vuln_issue/blob/main/Online%20Security%20Guards%20Hiring%20System%201.0.md
|
||||
- https://www.chtsecurity.com/news/0dbe8e1d-0a6c-4604-9cf1-778ddc86a8c1
|
||||
|
||||
#### Github
|
||||
|
@ -10,7 +10,7 @@ An issue was discovered in OpenClinic GA 5.247.01. An attacker can perform a dir
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://github.com/BugBountyHunterCVE/CVE-2023-40280/blob/main/CVE-2023-40280_Authenticated-Directory-Path-Traversal_OpenClinic-GA_5.247.01_Report.md
|
||||
|
||||
#### Github
|
||||
- https://github.com/BugBountyHunterCVE/CVE-2023-40280
|
||||
|
@ -10,7 +10,7 @@ Macvim is a text editor for MacOS. Prior to version 178, Macvim makes use of an
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://github.com/macvim-dev/macvim/security/advisories/GHSA-9jgj-jfwg-99fv
|
||||
|
||||
#### Github
|
||||
- https://github.com/NaInSec/CVE-LIST
|
||||
|
@ -10,7 +10,7 @@ Astropy is a project for astronomy in Python that fosters interoperability betwe
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://github.com/astropy/astropy/security/advisories/GHSA-h2x6-5jx5-46hf
|
||||
|
||||
#### Github
|
||||
- https://github.com/NaInSec/CVE-LIST
|
||||
|
17
2023/CVE-2023-41443.md
Normal file
17
2023/CVE-2023-41443.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-41443](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41443)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
SQL injection vulnerability in Novel-Plus v.4.1.0 allows a remote attacker to execute arbitrary code via a crafted script to the sort parameter in /sys/menu/list.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/Deng-JunFeng/cve-lists/tree/main/novel-plus/vuln
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -10,7 +10,7 @@ A vulnerability, which was classified as critical, was found in Tongda OA. This
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://github.com/nagenanhai/cve/blob/main/sql.md
|
||||
|
||||
#### Github
|
||||
- https://github.com/d4n-sec/d4n-sec.github.io
|
||||
|
17
2023/CVE-2023-4171.md
Normal file
17
2023/CVE-2023-4171.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-4171](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4171)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A vulnerability classified as problematic was found in Chengdu Flash Flood Disaster Monitoring and Warning System 2.0. This vulnerability affects unknown code of the file \Service\FileDownload.ashx. The manipulation of the argument Files leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-236206 is the identifier assigned to this vulnerability.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/nagenanhai/cve/blob/main/duqu.md
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2023/CVE-2023-42286.md
Normal file
17
2023/CVE-2023-42286.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-42286](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42286)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
There is a PHP file inclusion vulnerability in the template configuration of eyoucms v1.6.4, allowing attackers to execute code or system commands through a carefully crafted malicious payload.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/Nacl122/CVEReport/blob/main/CVE-2023-42286/CVE-2023-42286.md
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -10,7 +10,7 @@ A vulnerability was found in Byzoro Smart S85F Management Platform up to 2023080
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://github.com/RCEraser/cve/blob/main/S85F.md
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
18
2023/CVE-2023-44253.md
Normal file
18
2023/CVE-2023-44253.md
Normal file
@ -0,0 +1,18 @@
|
||||
### [CVE-2023-44253](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44253)
|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in Fortinet FortiManager version 7.4.0 through 7.4.1 and before 7.2.5, FortiAnalyzer version 7.4.0 through 7.4.1 and before 7.2.5 and FortiAnalyzer-BigData before 7.2.5 allows an adom administrator to enumerate other adoms and device names via crafted HTTP or HTTPS requests.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/orangecertcc/security-research/security/advisories/GHSA-25j8-69h7-83h2
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -10,7 +10,7 @@ D-Link Online behavior audit gateway DAR-7000 V31R02B1413C is vulnerable to SQL
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://github.com/llixixi/cve/blob/main/D-LINK-DAR-7000_sql_%20importexport.md
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
17
2023/CVE-2023-4543.md
Normal file
17
2023/CVE-2023-4543.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-4543](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4543)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A vulnerability was found in IBOS OA 4.5.5. It has been declared as critical. This vulnerability affects unknown code of the file ?r=recruit/contact/export&contactids=x. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-238048. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/spcck/cve/blob/main/sql.md
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2023/CVE-2023-46012.md
Normal file
17
2023/CVE-2023-46012.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-46012](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46012)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Buffer Overflow vulnerability LINKSYS EA7500 3.0.1.207964 allows a remote attacker to execute arbitrary code via an HTTP request to the IGD UPnP.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/dest-3/CVE-2023-46012/tree/main
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2023/CVE-2023-46060.md
Normal file
17
2023/CVE-2023-46060.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-46060](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46060)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A Buffer Overflow vulnerability in Tenda AC500 v.2.0.1.9 allows a remote attacker to cause a denial of service via the port parameter at the goform/setVlanInfo component.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/peris-navince/founded-0-days/blob/main/Tenda/ac500/fromSetVlanInfo/1.md
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2023/CVE-2023-46426.md
Normal file
17
2023/CVE-2023-46426.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-46426](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46426)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Heap-based Buffer Overflow vulnerability in gpac version 2.3-DEV-rev588-g7edc40fee-master, allows remote attackers to execute arbitrary code and cause a denial of service (DoS) via gf_fwrite component in at utils/os_file.c.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/gpac/gpac/issues/2642
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2023/CVE-2023-46427.md
Normal file
17
2023/CVE-2023-46427.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-46427](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46427)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
An issue was discovered in gpac version 2.3-DEV-rev588-g7edc40fee-master, allows remote attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via null pointer deference in gf_dash_setup_period component in media_tools/dash_client.c.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/gpac/gpac/issues/2641
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -10,7 +10,7 @@ An infinite loop in the retrieveActiveBody function of Soot before v4.4.1 under
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://github.com/JAckLosingHeart/CVE-2023-46442_POC/tree/main
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
17
2023/CVE-2023-46694.md
Normal file
17
2023/CVE-2023-46694.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-46694](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46694)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Vtenext 21.02 allows an authenticated attacker to upload arbitrary files, potentially enabling them to execute remote commands. This flaw exists due to the application's failure to enforce proper authentication controls when accessing the Ckeditor file manager functionality.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/invisiblebyte/CVE-2023-46694
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -10,7 +10,7 @@ Cross Site Scripting vulnerability in Contribsys Sidekiq v.6.5.8 allows a remote
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://github.com/mhenrixon/sidekiq-unique-jobs/security/advisories/GHSA-cmh9-rx85-xj38
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
@ -10,7 +10,7 @@ Cross Site Scripting vulnerability in Contribsys Sidekiq v.6.5.8 allows a remote
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://github.com/mhenrixon/sidekiq-unique-jobs/security/advisories/GHSA-cmh9-rx85-xj38
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
@ -10,6 +10,7 @@ A vulnerability, which was classified as critical, was found in IBOS OA 4.5.5. T
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/RCEraser/cve/blob/main/sql_inject_2.md
|
||||
- https://vuldb.com/?id.239259
|
||||
|
||||
#### Github
|
||||
|
17
2023/CVE-2023-48859.md
Normal file
17
2023/CVE-2023-48859.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-48859](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48859)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
TOTOLINK A3002RU version 2.0.0-B20190902.1958 has a post-authentication RCE due to incorrect access control, allows attackers to bypass front-end security restrictions and execute arbitrary code.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/xieqiang11/security_research/blob/main/TOTOLINK-A3002RU-RCE.md
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2023/CVE-2023-49275.md
Normal file
17
2023/CVE-2023-49275.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-49275](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49275)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Wazuh is a free and open source platform used for threat prevention, detection, and response. A NULL pointer dereference was detected during fuzzing of the analysis engine, allowing malicious clients to DoS the analysis engine. The bug occurs when `analysisd` receives a syscollector message with the `hotfix` `msg_type` but lacking a `timestamp`. It uses `cJSON_GetObjectItem()` to get the `timestamp` object item and dereferences it without checking for a `NULL` value. A malicious client can DoS the analysis engine. This vulnerability is fixed in 4.7.1.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/wazuh/wazuh/security/advisories/GHSA-4mq7-w9r6-9975
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2023/CVE-2023-49484.md
Normal file
17
2023/CVE-2023-49484.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2023-49484](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49484)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Dreamer CMS v4.1.3 was discovered to contain a cross-site scripting (XSS) vulnerability in the article management department.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/jiaofj/cms/blob/main/There%20is%20a%20storage%20based%20XSS%20in%20the%20article%20management%20department.md
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user