Skip to content

Commit

Permalink
Updated by CVEDB-BOT 🤖
Browse files Browse the repository at this point in the history
  • Loading branch information
CVEDB-BOT committed Dec 21, 2024
1 parent ef22075 commit 5c321b0
Show file tree
Hide file tree
Showing 2 changed files with 4 additions and 1 deletion.
Binary file modified db/cve.sqlite
Binary file not shown.
5 changes: 4 additions & 1 deletion docs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

> Automatic monitor github cve using Github Actions

Last generated : 2024-12-21 01:47:57.978010
Last generated : 2024-12-21 02:50:05.569918

| CVE | Name | Description | Date |
|---|---|---|---|
Expand Down Expand Up @@ -840,6 +840,7 @@
| [CVE-2024-41992](https://www.cve.org/CVERecord?id=CVE-2024-41992) | [fj016/CVE-2024-41992-PoC](https://github.com/fj016/CVE-2024-41992-PoC) | PoC for the CVE-2024-41992 (RCE on devices running WiFi-TestSuite-DUT) | 2024-08-23T23:48:01Z|
| [CVE-2024-41958](https://www.cve.org/CVERecord?id=CVE-2024-41958) | [OrangeJuiceHU/CVE-2024-41958-PoC](https://github.com/OrangeJuiceHU/CVE-2024-41958-PoC) | This is a small proof of concept for CVE-2024-41958 | 2024-08-05T19:10:08Z|
| [CVE-2024-41713](https://www.cve.org/CVERecord?id=CVE-2024-41713) | [watchtowrlabs/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713](https://github.com/watchtowrlabs/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713) | no description | 2024-12-05T06:13:57Z|
| [CVE-2024-41713](https://www.cve.org/CVERecord?id=CVE-2024-41713) | [zxj-hub/CVE-2024-41713POC](https://github.com/zxj-hub/CVE-2024-41713POC) | Mitel MiCollab 企业协作平台 任意文件读取漏洞(CVE-2024-41713)由于Mitel MiCollab软件的 NuPoint 统一消息 (NPM) 组件中存在身份验证绕过漏洞,并且输入验证不足,未经身份验证的远程攻击者可利用该漏洞执行路径遍历攻击,成功利用可能导致未授权访问、破坏或删除用户的数据和系统配置。影响范围:version < MiCollab 9.8 SP2 (9.8.2.12) | 2024-12-21T02:26:26Z|
| [CVE-2024-41662](https://www.cve.org/CVERecord?id=CVE-2024-41662) | [sh3bu/CVE-2024-41662](https://github.com/sh3bu/CVE-2024-41662) | Markdown XSS leads to RCE in VNote version <=3.18.1 | 2024-07-23T17:21:12Z|
| [CVE-2024-41651](https://www.cve.org/CVERecord?id=CVE-2024-41651) | [Fckroun/CVE-2024-41651](https://github.com/Fckroun/CVE-2024-41651) | CVE-2024-41651 | 2024-08-08T17:25:30Z|
| [CVE-2024-41628](https://www.cve.org/CVERecord?id=CVE-2024-41628) | [Redshift-CyberSecurity/CVE-2024-41628](https://github.com/Redshift-CyberSecurity/CVE-2024-41628) | no description | 2024-07-29T07:12:14Z|
Expand Down Expand Up @@ -2008,6 +2009,7 @@
| [CVE-2024-24919](https://www.cve.org/CVERecord?id=CVE-2024-24919) | [geniuszlyy/CVE-2024-24919](https://github.com/geniuszlyy/CVE-2024-24919) | PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing server responses | 2024-09-29T08:20:56Z|
| [CVE-2024-24919](https://www.cve.org/CVERecord?id=CVE-2024-24919) | [skyrowalker/CVE-2024-24919](https://github.com/skyrowalker/CVE-2024-24919) | no description | 2024-10-09T17:54:28Z|
| [CVE-2024-24919](https://www.cve.org/CVERecord?id=CVE-2024-24919) | [sar-3mar/CVE-2024-24919_POC](https://github.com/sar-3mar/CVE-2024-24919_POC) | It's Proof of Concept on CVE-2024-24919-POC , i made it after it's discoverd | 2024-10-28T21:54:41Z|
| [CVE-2024-24919](https://www.cve.org/CVERecord?id=CVE-2024-24919) | [NingXin2002/Check-Point_poc](https://github.com/NingXin2002/Check-Point_poc) | Check-Point安全网关任意文件读取漏洞(CVE-2024-24919) | 2024-12-21T02:42:10Z|
| [CVE-2024-24816](https://www.cve.org/CVERecord?id=CVE-2024-24816) | [mmajchrowicz-afine/CVE-2024-24816](https://github.com/mmajchrowicz-afine/CVE-2024-24816) | CKEditor 4 < 4.24.0-lts - XSS vulnerability in samples that use the "preview" feature. | 2024-02-10T10:19:21Z|
| [CVE-2024-24816](https://www.cve.org/CVERecord?id=CVE-2024-24816) | [afine-com/CVE-2024-24816](https://github.com/afine-com/CVE-2024-24816) | CKEditor 4 < 4.24.0-lts - XSS vulnerability in samples that use the "preview" feature. | 2024-02-10T10:26:35Z|
| [CVE-2024-24809](https://www.cve.org/CVERecord?id=CVE-2024-24809) | [fa-rrel/CVE-2024-24809-Proof-of-concept](https://github.com/fa-rrel/CVE-2024-24809-Proof-of-concept) | Critical Flaws in Traccar GPS System Expose Users to Remote Attacks | 2024-09-03T09:56:13Z|
Expand Down Expand Up @@ -3594,6 +3596,7 @@
| [CVE-2023-40028](https://www.cve.org/CVERecord?id=CVE-2023-40028) | [BBSynapse/CVE-2023-40028](https://github.com/BBSynapse/CVE-2023-40028) | CVE-2023-40028 wirkt sich auf Ghost, ein Open-Source-Content-Management-System (CMS) aus. | 2024-12-10T09:12:20Z|
| [CVE-2023-40028](https://www.cve.org/CVERecord?id=CVE-2023-40028) | [0xDTC/Ghost-5.58-Arbitrary-File-Read-CVE-2023-40028](https://github.com/0xDTC/Ghost-5.58-Arbitrary-File-Read-CVE-2023-40028) | CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system. | 2024-12-12T18:50:58Z|
| [CVE-2023-40028](https://www.cve.org/CVERecord?id=CVE-2023-40028) | [sudlit/CVE-2023-40028](https://github.com/sudlit/CVE-2023-40028) | no description | 2024-12-13T11:42:51Z|
| [CVE-2023-40028](https://www.cve.org/CVERecord?id=CVE-2023-40028) | [monke443/CVE-2023-40028-Ghost-Arbitrary-File-Read](https://github.com/monke443/CVE-2023-40028-Ghost-Arbitrary-File-Read) | Arbitrary file read in Ghost-CMS allows an attacker to upload a malicious ZIP file with a symlink. | 2024-12-21T01:53:47Z|
| [CVE-2023-40000](https://www.cve.org/CVERecord?id=CVE-2023-40000) | [rxerium/CVE-2023-40000](https://github.com/rxerium/CVE-2023-40000) | WordPress LiteSpeed Plugin Vulnerability | 2024-02-28T19:36:40Z|
| [CVE-2023-40000](https://www.cve.org/CVERecord?id=CVE-2023-40000) | [quantiom/litespeed-cache-xss-poc](https://github.com/quantiom/litespeed-cache-xss-poc) | PoC for XSS vulnerability in the LiteSpeed Cache WordPress plugin (CVE-2023-40000) allowing elevated privileges. Includes code, explanations, and mitigations. | 2024-05-12T06:13:47Z|
| [CVE-2023-40000](https://www.cve.org/CVERecord?id=CVE-2023-40000) | [iveresk/cve-2023-40000](https://github.com/iveresk/cve-2023-40000) | That's a PoC of cve-2023-40000. Wordpress LiteSpeed Cache exploit. | 2024-05-13T15:25:58Z|
Expand Down

0 comments on commit 5c321b0

Please sign in to comment.