diff --git a/db/cve.sqlite b/db/cve.sqlite index 29af026..50d3990 100644 Binary files a/db/cve.sqlite and b/db/cve.sqlite differ diff --git a/docs/README.md b/docs/README.md index 198926e..64a26d7 100644 --- a/docs/README.md +++ b/docs/README.md @@ -2,12 +2,13 @@ > Automatic monitor github cve using Github Actions -Last generated: 2025-01-14 02:10:13.133971 +Last generated: 2025-01-15 02:12:10.569925 | CVE | Name | Description | Date | |---|---|---|---| | [CVE-2024-9955](https://www.cve.org/CVERecord?id=CVE-2024-9955) | [amfg145/CVE-2024-9955-POC](https://github.com/amfg145/CVE-2024-9955-POC) | Fortinet Privilege Escalation Advisory CVE-2024-9955-POC: Elevation to Domain Admin on FortiOS and FortiProxy | 2024-10-31T20:23:15Z | | [CVE-2024-9935](https://www.cve.org/CVERecord?id=CVE-2024-9935) | [RandomRobbieBF/CVE-2024-9935](https://github.com/RandomRobbieBF/CVE-2024-9935) | PDF Generator Addon for Elementor Page Builder <= 1.7.5 - Unauthenticated Arbitrary File Download | 2024-11-18T10:14:45Z | +| [CVE-2024-9935](https://www.cve.org/CVERecord?id=CVE-2024-9935) | [verylazytech/CVE-2024-9935](https://github.com/verylazytech/CVE-2024-9935) | PDF Generator Addon for Elementor Page Builder <= 1.7.5 - Unauthenticated Arbitrary File Download | 2024-12-19T08:57:30Z | | [CVE-2024-9933](https://www.cve.org/CVERecord?id=CVE-2024-9933) | [RandomRobbieBF/CVE-2024-9933](https://github.com/RandomRobbieBF/CVE-2024-9933) | WatchTowerHQ <= 3.10.1 - Authentication Bypass to Administrator due to Missing Empty Value Check | 2024-11-05T20:55:09Z | | [CVE-2024-9932](https://www.cve.org/CVERecord?id=CVE-2024-9932) | [RandomRobbieBF/CVE-2024-9932](https://github.com/RandomRobbieBF/CVE-2024-9932) | Wux Blog Editor <= 3.0.0 - Unauthenticated Arbitrary File Upload | 2024-11-05T15:00:39Z | | [CVE-2024-9926](https://www.cve.org/CVERecord?id=CVE-2024-9926) | [m3ssap0/wordpress-jetpack-broken-access-control-exploit](https://github.com/m3ssap0/wordpress-jetpack-broken-access-control-exploit) | Exploits Jetpack < 13.9.1 broken access control (CVE-2024-9926). | 2024-11-01T14:03:55Z | @@ -222,6 +223,7 @@ Last generated: 2025-01-14 02:10:13.133971 | [CVE-2024-6387](https://www.cve.org/CVERecord?id=CVE-2024-6387) | [identity-threat-labs/CVE-2024-6387-Vulnerability-Checker](https://github.com/identity-threat-labs/CVE-2024-6387-Vulnerability-Checker) | This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, and ports. The script can also read addresses from a file. | 2024-08-28T13:28:08Z | | [CVE-2024-6387](https://www.cve.org/CVERecord?id=CVE-2024-6387) | [l-urk/CVE-2024-6387](https://github.com/l-urk/CVE-2024-6387) | Proof of concept python script for regreSSHion exploit. | 2024-07-30T06:13:11Z | | [CVE-2024-6387](https://www.cve.org/CVERecord?id=CVE-2024-6387) | [YassDEV221608/CVE-2024-6387](https://github.com/YassDEV221608/CVE-2024-6387) | no description | 2024-11-24T17:12:26Z | +| [CVE-2024-6387](https://www.cve.org/CVERecord?id=CVE-2024-6387) | [zql-gif/CVE-2024-6387](https://github.com/zql-gif/CVE-2024-6387) | no description | 2024-12-19T03:08:19Z | | [CVE-2024-6386](https://www.cve.org/CVERecord?id=CVE-2024-6386) | [argendo/CVE-2024-6386](https://github.com/argendo/CVE-2024-6386) | Research and PoC for CVE-2024-6386 | 2024-09-05T14:44:36Z | | [CVE-2024-6366](https://www.cve.org/CVERecord?id=CVE-2024-6366) | [Abdurahmon3236/CVE-2024-6366](https://github.com/Abdurahmon3236/CVE-2024-6366) | no description | 2024-08-03T10:30:49Z | | [CVE-2024-6330](https://www.cve.org/CVERecord?id=CVE-2024-6330) | [RandomRobbieBF/CVE-2024-6330](https://github.com/RandomRobbieBF/CVE-2024-6330) | GEO my WordPress < 4.5.0.2 - Unauthenticated LFI to RCE/PHAR Deserialization | 2024-11-20T06:08:32Z | @@ -249,6 +251,7 @@ Last generated: 2025-01-14 02:10:13.133971 | [CVE-2024-56116](https://www.cve.org/CVERecord?id=CVE-2024-56116) | [ComplianceControl/CVE-2024-56116](https://github.com/ComplianceControl/CVE-2024-56116) | no description | 2024-12-16T07:44:07Z | | [CVE-2024-56115](https://www.cve.org/CVERecord?id=CVE-2024-56115) | [ComplianceControl/CVE-2024-56115](https://github.com/ComplianceControl/CVE-2024-56115) | no description | 2024-12-16T07:46:41Z | | [CVE-2024-55968](https://www.cve.org/CVERecord?id=CVE-2024-55968) | [null-event/CVE-2024-55968](https://github.com/null-event/CVE-2024-55968) | POC for DTEX LPE (CVE-2024-55968) | 2024-12-17T21:08:11Z | +| [CVE-2024-55968](https://www.cve.org/CVERecord?id=CVE-2024-55968) | [Wi1DN00B/CVE-2024-55968](https://github.com/Wi1DN00B/CVE-2024-55968) | Exploit POC Code for CVE-2024-55968 | 2024-12-17T21:07:59Z | | [CVE-2024-55875](https://www.cve.org/CVERecord?id=CVE-2024-55875) | [JAckLosingHeart/CVE-2024-55875](https://github.com/JAckLosingHeart/CVE-2024-55875) | CVE-2024-55875 - GHSA-7mj5-hjjj-8rgw - http4k first CVE | 2024-12-13T06:21:36Z | | [CVE-2024-55587](https://www.cve.org/CVERecord?id=CVE-2024-55587) | [CSIRTTrizna/CVE-2024-55587](https://github.com/CSIRTTrizna/CVE-2024-55587) | no description | 2024-12-10T06:59:00Z | | [CVE-2024-5522](https://www.cve.org/CVERecord?id=CVE-2024-5522) | [truonghuuphuc/CVE-2024-5522-Poc](https://github.com/truonghuuphuc/CVE-2024-5522-Poc) | CVE-2024-5522 HTML5 Video Player <= 2.5.26 - Unauthenticated SQL Injection | 2024-05-31T04:41:46Z | @@ -257,14 +260,20 @@ Last generated: 2025-01-14 02:10:13.133971 | [CVE-2024-55099](https://www.cve.org/CVERecord?id=CVE-2024-55099) | [ugurkarakoc1/CVE-2024-55099-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability-](https://github.com/ugurkarakoc1/CVE-2024-55099-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability-) | no description | 2024-12-10T19:40:26Z | | [CVE-2024-54679](https://www.cve.org/CVERecord?id=CVE-2024-54679) | [hotplugin0x01/CVE-2024-54679](https://github.com/hotplugin0x01/CVE-2024-54679) | CVE-2024-54679 - CyberPanel (aka Cyber Panel) Denial of Service (https://nvd.nist.gov/vuln/detail/CVE-2024-54679) | 2024-12-06T06:02:34Z | | [CVE-2024-5452](https://www.cve.org/CVERecord?id=CVE-2024-5452) | [XiaomingX/cve-2024-5452-poc](https://github.com/XiaomingX/cve-2024-5452-poc) | 此漏洞的根本原因是**深度差异库(deepdiff)**在反序列化用户输入时,未正确处理双下划线(dunder)属性。 PyTorch Lightning 使用 deepdiff.Delta 对象根据前端操作修改应用状态,设计目标是仅允许特定状态变量的修改。 | 2024-11-22T06:56:12Z | +| [CVE-2024-54379](https://www.cve.org/CVERecord?id=CVE-2024-54379) | [RandomRobbieBF/CVE-2024-54379](https://github.com/RandomRobbieBF/CVE-2024-54379) | Minterpress <= 1.0.5 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Options Update | 2024-12-19T17:04:01Z | +| [CVE-2024-54369](https://www.cve.org/CVERecord?id=CVE-2024-54369) | [RandomRobbieBF/CVE-2024-54369](https://github.com/RandomRobbieBF/CVE-2024-54369) | Zita Site Builder <= 1.0.2 - Missing Authorization to Arbitrary Plugin Installation | 2024-12-19T15:38:41Z | +| [CVE-2024-54262](https://www.cve.org/CVERecord?id=CVE-2024-54262) | [RandomRobbieBF/CVE-2024-54262](https://github.com/RandomRobbieBF/CVE-2024-54262) | Import Export For WooCommerce <= 1.5 - Authenticated (Subscriber+) Arbitrary File Upload | 2024-12-19T14:42:06Z | | [CVE-2024-5420](https://www.cve.org/CVERecord?id=CVE-2024-5420) | [K4yd0/CVE-2024-5420_XSS](https://github.com/K4yd0/CVE-2024-5420_XSS) | no description | 2024-09-02T16:39:59Z | | [CVE-2024-5420](https://www.cve.org/CVERecord?id=CVE-2024-5420) | [fa-rrel/CVE-2024-5420-XSS](https://github.com/fa-rrel/CVE-2024-5420-XSS) | SEH utnserver Pro/ProMAX / INU-100 20.1.22 - XSS | 2024-09-02T15:29:22Z | | [CVE-2024-53677](https://www.cve.org/CVERecord?id=CVE-2024-53677) | [cloudwafs/s2-067-CVE-2024-53677](https://github.com/cloudwafs/s2-067-CVE-2024-53677) | s2-067(CVE-2024-53677) | 2024-12-12T08:30:14Z | | [CVE-2024-53677](https://www.cve.org/CVERecord?id=CVE-2024-53677) | [yangyanglo/CVE-2024-53677](https://github.com/yangyanglo/CVE-2024-53677) | no description | 2024-12-17T02:22:38Z | | [CVE-2024-53677](https://www.cve.org/CVERecord?id=CVE-2024-53677) | [c4oocO/CVE-2024-53677-Docker](https://github.com/c4oocO/CVE-2024-53677-Docker) | A Docker-based environment to reproduce the CVE-2024-53677 vulnerability in Apache Struts 2. | 2024-12-17T06:42:16Z | | [CVE-2024-53677](https://www.cve.org/CVERecord?id=CVE-2024-53677) | [XiaomingX/CVE-2024-53677-S2-067](https://github.com/XiaomingX/CVE-2024-53677-S2-067) | A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads. | 2024-12-18T02:03:56Z | +| [CVE-2024-53677](https://www.cve.org/CVERecord?id=CVE-2024-53677) | [dustblessnotdust/CVE-2024-53677-S2-067-thread](https://github.com/dustblessnotdust/CVE-2024-53677-S2-067-thread) | no description | 2024-12-18T18:42:34Z | | [CVE-2024-53617](https://www.cve.org/CVERecord?id=CVE-2024-53617) | [ii5mai1/CVE-2024-53617](https://github.com/ii5mai1/CVE-2024-53617) | no description | 2024-11-29T17:50:07Z | | [CVE-2024-5356](https://www.cve.org/CVERecord?id=CVE-2024-5356) | [droyuu/Aj-Report-sql-CVE-2024-5356-POC](https://github.com/droyuu/Aj-Report-sql-CVE-2024-5356-POC) | no description | 2024-09-12T03:02:20Z | +| [CVE-2024-53376](https://www.cve.org/CVERecord?id=CVE-2024-53376) | [ThottySploity/CVE-2024-53376](https://github.com/ThottySploity/CVE-2024-53376) | CyberPanel authenticated RCE < 2.3.8 | 2024-12-15T22:40:52Z | +| [CVE-2024-53375](https://www.cve.org/CVERecord?id=CVE-2024-53375) | [ThottySploity/CVE-2024-53375](https://github.com/ThottySploity/CVE-2024-53375) | TP-Link Archer AXE75 Authenticated Command Injection | 2024-10-04T12:49:19Z | | [CVE-2024-5326](https://www.cve.org/CVERecord?id=CVE-2024-5326) | [truonghuuphuc/CVE-2024-5326-Poc](https://github.com/truonghuuphuc/CVE-2024-5326-Poc) | CVE-2024-5326 Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX <= 4.1.2 - Missing Authorization to Arbitrary Options Update | 2024-06-01T04:23:54Z | | [CVE-2024-5326](https://www.cve.org/CVERecord?id=CVE-2024-5326) | [cve-2024/CVE-2024-5326-Poc](https://github.com/cve-2024/CVE-2024-5326-Poc) | no description | 2024-06-14T07:12:29Z | | [CVE-2024-53259](https://www.cve.org/CVERecord?id=CVE-2024-53259) | [kota-yata/cve-2024-53259](https://github.com/kota-yata/cve-2024-53259) | no description | 2024-12-04T09:27:22Z | @@ -353,6 +362,7 @@ Last generated: 2025-01-14 02:10:13.133971 | [CVE-2024-50450](https://www.cve.org/CVERecord?id=CVE-2024-50450) | [RandomRobbieBF/CVE-2024-50450](https://github.com/RandomRobbieBF/CVE-2024-50450) | WordPress Meta Data and Taxonomies Filter (MDTF) <= 1.3.3.4 - Unauthenticated Arbitrary Shortcode Execution | 2024-11-08T11:24:16Z | | [CVE-2024-50427](https://www.cve.org/CVERecord?id=CVE-2024-50427) | [RandomRobbieBF/CVE-2024-50427](https://github.com/RandomRobbieBF/CVE-2024-50427) | SurveyJS: Drag & Drop WordPress Form Builder <= 1.9.136 - Authenticated (Subscriber+) Arbitrary File Upload | 2024-11-08T12:24:06Z | | [CVE-2024-50395](https://www.cve.org/CVERecord?id=CVE-2024-50395) | [neko-hat/CVE-2024-50395](https://github.com/neko-hat/CVE-2024-50395) | no description | 2024-11-25T06:06:25Z | +| [CVE-2024-50379](https://www.cve.org/CVERecord?id=CVE-2024-50379) | [yiliufeng168/CVE-2024-50379-POC](https://github.com/yiliufeng168/CVE-2024-50379-POC) | no description | 2024-12-19T02:43:18Z | | [CVE-2024-50340](https://www.cve.org/CVERecord?id=CVE-2024-50340) | [Nyamort/CVE-2024-50340](https://github.com/Nyamort/CVE-2024-50340) | no description | 2024-11-06T21:24:43Z | | [CVE-2024-50335](https://www.cve.org/CVERecord?id=CVE-2024-50335) | [shellkraft/CVE-2024-50335](https://github.com/shellkraft/CVE-2024-50335) | no description | 2024-11-07T06:19:49Z | | [CVE-2024-50251](https://www.cve.org/CVERecord?id=CVE-2024-50251) | [slavin-ayu/CVE-2024-50251-PoC](https://github.com/slavin-ayu/CVE-2024-50251-PoC) | Just a local Dos bug in Linux kernel | 2024-11-12T08:08:55Z | @@ -567,6 +577,7 @@ Last generated: 2025-01-14 02:10:13.133971 | [CVE-2024-4484](https://www.cve.org/CVERecord?id=CVE-2024-4484) | [Abo5/CVE-2024-4484](https://github.com/Abo5/CVE-2024-4484) | This script uses HTTParty to detect stored cross-site scripting (XSS) vulnerabilities in WordPress sites using the xai_username parameter. It sends a payload to the specified URL and checks if the payload is reflected in the response, indicating a vulnerability. | 2024-06-12T23:09:39Z | | [CVE-2024-44815](https://www.cve.org/CVERecord?id=CVE-2024-44815) | [nitinronge91/Extracting-User-credentials-For-Web-portal-and-WiFi-AP-For-Hathway-Router-CVE-2024-44815-](https://github.com/nitinronge91/Extracting-User-credentials-For-Web-portal-and-WiFi-AP-For-Hathway-Router-CVE-2024-44815-) | CVE-2024-44815 | 2024-08-31T10:17:11Z | | [CVE-2024-44812](https://www.cve.org/CVERecord?id=CVE-2024-44812) | [b1u3st0rm/CVE-2024-44812-PoC](https://github.com/b1u3st0rm/CVE-2024-44812-PoC) | Proof of Concept Exploit for CVE-2024-44812 - SQL Injection Authentication Bypass vulnerability in Online Complaint Site v1.0 | 2024-08-31T15:20:27Z | +| [CVE-2024-44765](https://www.cve.org/CVERecord?id=CVE-2024-44765) | [josephgodwinkimani/cloudpanel-2.4.2-CVE-2024-44765-recovery](https://github.com/josephgodwinkimani/cloudpanel-2.4.2-CVE-2024-44765-recovery) | How to "recover" a CloudPanel server affected by the CVE-2024-44765 vulnerability | 2024-12-17T13:29:38Z | | [CVE-2024-44625](https://www.cve.org/CVERecord?id=CVE-2024-44625) | [Fysac/CVE-2024-44625](https://github.com/Fysac/CVE-2024-44625) | Symbolic link path traversal vulnerability in Gogs | 2024-11-13T16:16:31Z | | [CVE-2024-44623](https://www.cve.org/CVERecord?id=CVE-2024-44623) | [merbinr/CVE-2024-44623](https://github.com/merbinr/CVE-2024-44623) | Details about the Blind RCE issue(SPX-GC) in SPX-GC | 2024-09-13T17:11:16Z | | [CVE-2024-44610](https://www.cve.org/CVERecord?id=CVE-2024-44610) | [BertoldVdb/PcanExploit](https://github.com/BertoldVdb/PcanExploit) | CVE-2024-44610: Authenticated remote root exploit in Peak PCAN-Ethernet CAN-(FD) gateways | 2024-07-23T10:34:19Z | @@ -1822,6 +1833,7 @@ Last generated: 2025-01-14 02:10:13.133971 | [CVE-2024-23334](https://www.cve.org/CVERecord?id=CVE-2024-23334) | [TheRedP4nther/LFI-aiohttp-CVE-2024-23334-PoC](https://github.com/TheRedP4nther/LFI-aiohttp-CVE-2024-23334-PoC) | Bash script to automate Local File Inclusion (LFI) attacks on aiohttp server version 3.9.1. | 2024-11-14T21:43:29Z | | [CVE-2024-23334](https://www.cve.org/CVERecord?id=CVE-2024-23334) | [Pylonet/CVE-2024-23334](https://github.com/Pylonet/CVE-2024-23334) | no description | 2024-11-07T21:37:05Z | | [CVE-2024-23334](https://www.cve.org/CVERecord?id=CVE-2024-23334) | [Betan423/CVE-2024-23334-PoC](https://github.com/Betan423/CVE-2024-23334-PoC) | This repository is a proof of concept (POC) for CVE-2024-23334, demonstrating an attempt to replicate the bug in aiohttp that leads to Local File Inclusion (LFI). | 2024-12-09T06:51:13Z | +| [CVE-2024-23298](https://www.cve.org/CVERecord?id=CVE-2024-23298) | [p1tsi/CVE-2024-23298.app](https://github.com/p1tsi/CVE-2024-23298.app) | PoC for CVE-2024-23298 | 2024-12-18T18:12:10Z | | [CVE-2024-23208](https://www.cve.org/CVERecord?id=CVE-2024-23208) | [hrtowii/CVE-2024-23208-test](https://github.com/hrtowii/CVE-2024-23208-test) | no description | 2024-02-04T07:37:21Z | | [CVE-2024-23200](https://www.cve.org/CVERecord?id=CVE-2024-23200) | [l00neyhacker/CVE-2024-23200](https://github.com/l00neyhacker/CVE-2024-23200) | CVE-2024-23200 | 2024-01-14T21:46:27Z | | [CVE-2024-23199](https://www.cve.org/CVERecord?id=CVE-2024-23199) | [l00neyhacker/CVE-2024-23199](https://github.com/l00neyhacker/CVE-2024-23199) | CVE-2024-23199 | 2024-01-14T21:43:45Z | @@ -2071,6 +2083,7 @@ Last generated: 2025-01-14 02:10:13.133971 | [CVE-2024-1209](https://www.cve.org/CVERecord?id=CVE-2024-1209) | [karlemilnikka/CVE-2024-1209](https://github.com/karlemilnikka/CVE-2024-1209) | Sensitive Information Exposure via assignments in LearnDash. | 2024-02-05T17:41:47Z | | [CVE-2024-1208](https://www.cve.org/CVERecord?id=CVE-2024-1208) | [Cappricio-Securities/CVE-2024-1208](https://github.com/Cappricio-Securities/CVE-2024-1208) | LearnDash LMS < 4.10.3 - Sensitive Information Exposure | 2024-05-30T17:55:45Z | | [CVE-2024-1207](https://www.cve.org/CVERecord?id=CVE-2024-1207) | [sahar042/CVE-2024-1207](https://github.com/sahar042/CVE-2024-1207) | The WP Booking Calendar plugin for WordPress is vulnerable to SQL Injection via the 'calendar_request_params[dates_ddmmyy_csv]' parameter in all versions up to, and including, 9.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attac | 2024-10-08T09:05:16Z | +| [CVE-2024-12025](https://www.cve.org/CVERecord?id=CVE-2024-12025) | [RandomRobbieBF/CVE-2024-12025](https://github.com/RandomRobbieBF/CVE-2024-12025) | Collapsing Categories <= 3.0.8 - Unauthenticated SQL Injection | 2024-12-19T14:15:29Z | | [CVE-2024-11728](https://www.cve.org/CVERecord?id=CVE-2024-11728) | [samogod/CVE-2024-11728](https://github.com/samogod/CVE-2024-11728) | KiviCare – Clinic & Patient Management System (EHR) WordPress Plugin Unauthenticated SQL Injection PoC | 2024-12-11T12:33:46Z | | [CVE-2024-11680](https://www.cve.org/CVERecord?id=CVE-2024-11680) | [D3N14LD15K/CVE-2024-11680_PoC_Exploit](https://github.com/D3N14LD15K/CVE-2024-11680_PoC_Exploit) | This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues. | 2024-12-04T18:42:43Z | | [CVE-2024-11643](https://www.cve.org/CVERecord?id=CVE-2024-11643) | [RandomRobbieBF/CVE-2024-11643](https://github.com/RandomRobbieBF/CVE-2024-11643) | Accessibility by AllAccessible <= 1.3.4 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Option Update | 2024-12-05T09:47:31Z | @@ -2122,6 +2135,7 @@ Last generated: 2025-01-14 02:10:13.133971 | [CVE-2024-1086](https://www.cve.org/CVERecord?id=CVE-2024-1086) | [matrixvk/CVE-2024-1086-aarch64](https://github.com/matrixvk/CVE-2024-1086-aarch64) | no description | 2024-10-21T10:45:49Z | | [CVE-2024-1086](https://www.cve.org/CVERecord?id=CVE-2024-1086) | [LLfam/CVE-2024-1086](https://github.com/LLfam/CVE-2024-1086) | no description | 2024-12-16T17:33:13Z | | [CVE-2024-10793](https://www.cve.org/CVERecord?id=CVE-2024-10793) | [windz3r0day/CVE-2024-10793](https://github.com/windz3r0day/CVE-2024-10793) | CVE-2024-10793 poc exploit | 2024-11-17T18:44:53Z | +| [CVE-2024-10793](https://www.cve.org/CVERecord?id=CVE-2024-10793) | [MAHajian/CVE-2024-10793](https://github.com/MAHajian/CVE-2024-10793) | no description | 2024-12-19T15:50:53Z | | [CVE-2024-10728](https://www.cve.org/CVERecord?id=CVE-2024-10728) | [RandomRobbieBF/CVE-2024-10728](https://github.com/RandomRobbieBF/CVE-2024-10728) | PostX <= 4.1.16 - Missing Authorization to Arbitrary Plugin Installation/Activation | 2024-11-16T10:51:56Z | | [CVE-2024-1071](https://www.cve.org/CVERecord?id=CVE-2024-1071) | [gbrsh/CVE-2024-1071](https://github.com/gbrsh/CVE-2024-1071) | Ultimate Member Unauthorized Database Access / SQLi | 2024-02-27T11:41:53Z | | [CVE-2024-1071](https://www.cve.org/CVERecord?id=CVE-2024-1071) | [Matrexdz/CVE-2024-1071-Docker](https://github.com/Matrexdz/CVE-2024-1071-Docker) | no description | 2024-03-18T17:07:27Z | @@ -2867,6 +2881,7 @@ Last generated: 2025-01-14 02:10:13.133971 | [CVE-2023-4220](https://www.cve.org/CVERecord?id=CVE-2023-4220) | [LGenAgul/CVE-2023-4220-Proof-of-concept](https://github.com/LGenAgul/CVE-2023-4220-Proof-of-concept) | Chamilo LMS Unauthenticated Big Upload File that allows remote code execution | 2024-08-18T20:00:33Z | | [CVE-2023-4220](https://www.cve.org/CVERecord?id=CVE-2023-4220) | [B1TC0R3/CVE-2023-4220-PoC](https://github.com/B1TC0R3/CVE-2023-4220-PoC) | Proof of concept exploit for CVE-2023-4220 | 2024-07-09T20:06:40Z | | [CVE-2023-4220](https://www.cve.org/CVERecord?id=CVE-2023-4220) | [qrxnz/CVE-2023-4220](https://github.com/qrxnz/CVE-2023-4220) | CVE-2023-4220 Chamilo Exploit | 2024-08-27T17:12:48Z | +| [CVE-2023-42115](https://www.cve.org/CVERecord?id=CVE-2023-42115) | [kirinse/cve-2023-42115](https://github.com/kirinse/cve-2023-42115) | This module exploits a vulnerability in the target service identified as CVE-2023-42115. | 2024-09-02T21:17:41Z | | [CVE-2023-4208](https://www.cve.org/CVERecord?id=CVE-2023-4208) | [hshivhare67/Kernel_4.1.15_CVE-2023-4206_CVE-2023-4207_CVE-2023-4208](https://github.com/hshivhare67/Kernel_4.1.15_CVE-2023-4206_CVE-2023-4207_CVE-2023-4208) | no description | 2023-12-15T05:13:24Z | | [CVE-2023-4208](https://www.cve.org/CVERecord?id=CVE-2023-4208) | [GhostBalladw/wuhaozhe-s-CVE](https://github.com/GhostBalladw/wuhaozhe-s-CVE) | CVE-2023-41623 | 2023-12-08T04:15:06Z | | [CVE-2023-4207](https://www.cve.org/CVERecord?id=CVE-2023-4207) | [nidhi7598/linux-4.19.72_net_CVE-2023-4207](https://github.com/nidhi7598/linux-4.19.72_net_CVE-2023-4207) | no description | 2023-11-23T04:50:24Z | @@ -2919,6 +2934,7 @@ Last generated: 2025-01-14 02:10:13.133971 | [CVE-2023-41425](https://www.cve.org/CVERecord?id=CVE-2023-41425) | [insomnia-jacob/CVE-2023-41425](https://github.com/insomnia-jacob/CVE-2023-41425) | WonderCMS RCE CVE-2023-41425 | 2024-08-12T06:16:17Z | | [CVE-2023-41425](https://www.cve.org/CVERecord?id=CVE-2023-41425) | [charlesgargasson/CVE-2023-41425](https://github.com/charlesgargasson/CVE-2023-41425) | Wonder CMS RCE (XSS) | 2024-08-11T16:43:56Z | | [CVE-2023-41425](https://www.cve.org/CVERecord?id=CVE-2023-41425) | [SpycioKon/CVE-2023-41425](https://github.com/SpycioKon/CVE-2023-41425) | Research | 2024-08-22T23:27:48Z | +| [CVE-2023-41425](https://www.cve.org/CVERecord?id=CVE-2023-41425) | [Raffli-Dev/CVE-2023-41425](https://github.com/Raffli-Dev/CVE-2023-41425) | no description | 2024-09-03T09:59:42Z | | [CVE-2023-41362](https://www.cve.org/CVERecord?id=CVE-2023-41362) | [SorceryIE/CVE-2023-41362_MyBB_ACP_RCE](https://github.com/SorceryIE/CVE-2023-41362_MyBB_ACP_RCE) | no description | 2023-09-11T07:49:38Z | | [CVE-2023-41320](https://www.cve.org/CVERecord?id=CVE-2023-41320) | [Guilhem7/CVE_2023_41320](https://github.com/Guilhem7/CVE_2023_41320) | POC for cve 2023 41320 GLPI | 2023-11-16T16:21:51Z | | [CVE-2023-4128](https://www.cve.org/CVERecord?id=CVE-2023-4128) | [Trinadh465/linux-4.1.15_CVE-2023-4128](https://github.com/Trinadh465/linux-4.1.15_CVE-2023-4128) | no description | 2023-09-19T06:45:47Z | @@ -3780,6 +3796,7 @@ Last generated: 2025-01-14 02:10:13.133971 | [CVE-2023-2640](https://www.cve.org/CVERecord?id=CVE-2023-2640) | [K5LK/CVE-2023-2640-32629](https://github.com/K5LK/CVE-2023-2640-32629) | no description | 2024-05-21T23:39:02Z | | [CVE-2023-26360](https://www.cve.org/CVERecord?id=CVE-2023-26360) | [yosef0x01/CVE-2023-26360](https://github.com/yosef0x01/CVE-2023-26360) | Exploit for Arbitrary File Read for CVE-2023-26360 - Adobe Coldfusion | 2023-12-26T06:26:01Z | | [CVE-2023-26360](https://www.cve.org/CVERecord?id=CVE-2023-26360) | [jakabakos/CVE-2023-26360-adobe-coldfusion-rce-exploit](https://github.com/jakabakos/CVE-2023-26360-adobe-coldfusion-rce-exploit) | no description | 2024-05-14T11:22:35Z | +| [CVE-2023-26360](https://www.cve.org/CVERecord?id=CVE-2023-26360) | [CuriousLearnerDev/ColdFusion_EXp](https://github.com/CuriousLearnerDev/ColdFusion_EXp) | Adobe ColdFusion CVE-2023-26360/CVE-2023-29298 自动化实现反弹 | 2024-09-03T09:53:57Z | | [CVE-2023-2636](https://www.cve.org/CVERecord?id=CVE-2023-2636) | [lukinneberg/CVE-2023-2636](https://github.com/lukinneberg/CVE-2023-2636) | no description | 2023-06-11T20:24:20Z | | [CVE-2023-26269](https://www.cve.org/CVERecord?id=CVE-2023-26269) | [mbadanoiu/CVE-2023-26269](https://github.com/mbadanoiu/CVE-2023-26269) | CVE-2023-26269: Misconfigured JMX in Apache James | 2023-11-23T21:55:30Z | | [CVE-2023-26258](https://www.cve.org/CVERecord?id=CVE-2023-26258) | [hheeyywweellccoommee/CVE-2023-26258-lbalq](https://github.com/hheeyywweellccoommee/CVE-2023-26258-lbalq) | no description | 2023-07-01T03:01:37Z | @@ -4730,6 +4747,7 @@ Last generated: 2025-01-14 02:10:13.133971 | [CVE-2021-44228](https://www.cve.org/CVERecord?id=CVE-2021-44228) | [scabench/l4j-fp1](https://github.com/scabench/l4j-fp1) | jee web project with sanitised log4shell (CVE-2021-44228) vulnerability | 2023-12-27T08:49:38Z | | [CVE-2021-44228](https://www.cve.org/CVERecord?id=CVE-2021-44228) | [digital-dev/Log4j-CVE-2021-44228-Remediation](https://github.com/digital-dev/Log4j-CVE-2021-44228-Remediation) | This powershell script is intended to be used by anyone looking to remediate the Log4j Vulnerability within their environment. It can target multiple machines and run remotely as a job on all or only affected devices. | 2022-09-08T00:22:57Z | | [CVE-2021-44228](https://www.cve.org/CVERecord?id=CVE-2021-44228) | [Super-Binary/cve-2021-44228](https://github.com/Super-Binary/cve-2021-44228) | 这是安徽大学 “漏洞分析实验”(大三秋冬)期中作业归档。完整文档位于https://testgames.me/2024/11/10/cve-2021-44228/ | 2024-11-15T01:11:25Z | +| [CVE-2021-44228](https://www.cve.org/CVERecord?id=CVE-2021-44228) | [0xsyr0/Log4Shell](https://github.com/0xsyr0/Log4Shell) | This repository contains all gathered resources we used during our Incident Reponse on CVE-2021-44228 and CVE-2021-45046 aka Log4Shell. | 2021-12-13T11:34:54Z | | [CVE-2021-44186](https://www.cve.org/CVERecord?id=CVE-2021-44186) | [0xhaggis/CVE-2021-44186](https://github.com/0xhaggis/CVE-2021-44186) | A download of code without integrity check vulnerability in the "execute restore src-vis" command of FortiOS before 7.0.3. | 2023-02-08T07:30:52Z | | [CVE-2021-44103](https://www.cve.org/CVERecord?id=CVE-2021-44103) | [paulotrindadec/CVE-2021-44103](https://github.com/paulotrindadec/CVE-2021-44103) | no description | 2022-10-16T16:02:47Z | | [CVE-2021-44026](https://www.cve.org/CVERecord?id=CVE-2021-44026) | [pentesttoolscom/roundcube-cve-2021-44026](https://github.com/pentesttoolscom/roundcube-cve-2021-44026) | A demo exploit for CVE-2021-44026, a SQL injection in Roundcube | 2023-11-14T11:32:36Z |