Skip to content

Commit

Permalink
Updated by CVEDB-BOT 🤖
Browse files Browse the repository at this point in the history
  • Loading branch information
CVEDB-BOT committed Dec 19, 2024
1 parent 00c7fd3 commit 8051121
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 1 deletion.
Binary file modified db/cve.sqlite
Binary file not shown.
3 changes: 2 additions & 1 deletion docs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

> Automatic monitor github cve using Github Actions

Last generated : 2024-12-19 03:01:11.124385
Last generated : 2024-12-19 03:34:50.285981

| CVE | Name | Description | Date |
|---|---|---|---|
Expand Down Expand Up @@ -293,6 +293,7 @@
| [CVE-2024-6387](https://www.cve.org/CVERecord?id=CVE-2024-6387) | [identity-threat-labs/Article-RegreSSHion-CVE-2024-6387](https://github.com/identity-threat-labs/Article-RegreSSHion-CVE-2024-6387) | In an era where digital security is crucial, a new vulnerability in OpenSSH, identified as CVE-2024-6387, has drawn the attention of system administrators and security professionals worldwide. Named "regreSSHion," this severe security flaw allows remote code execution (RCE) and could significant threat to the integrity of vulnerable systems. | 2024-08-29T15:00:56Z|
| [CVE-2024-6387](https://www.cve.org/CVERecord?id=CVE-2024-6387) | [YassDEV221608/CVE-2024-6387](https://github.com/YassDEV221608/CVE-2024-6387) | no description | 2024-11-24T17:12:26Z|
| [CVE-2024-6387](https://www.cve.org/CVERecord?id=CVE-2024-6387) | [oxapavan/CVE-2024-6387](https://github.com/oxapavan/CVE-2024-6387) | Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387) | 2024-11-30T19:14:05Z|
| [CVE-2024-6387](https://www.cve.org/CVERecord?id=CVE-2024-6387) | [zql-gif/CVE-2024-6387](https://github.com/zql-gif/CVE-2024-6387) | no description | 2024-12-19T03:08:19Z|
| [CVE-2024-6386](https://www.cve.org/CVERecord?id=CVE-2024-6386) | [realbotnet/CVE-2024-6386](https://github.com/realbotnet/CVE-2024-6386) | CVE-2024-6386 - Wordpress WPML (WordPress Multilingual Plugin) ≤ 4.6.12. RCE Exploit 0Day (300K Sites Vulnerability) -- Telegram: @bl4ckhatx | 2024-08-27T04:01:03Z|
| [CVE-2024-6386](https://www.cve.org/CVERecord?id=CVE-2024-6386) | [realbotnet/CVE-2024-6386](https://github.com/realbotnet/CVE-2024-6386) | CVE-2024-6386 - Wordpress WPML (WordPress Multilingual Plugin) ≤ 4.6.12. RCE Exploit 0Day (300K Sites Vulnerability) -- Telegram: @bl4ckhatx | 2024-08-30T18:54:01Z|
| [CVE-2024-6386](https://www.cve.org/CVERecord?id=CVE-2024-6386) | [Argendo/CVE-2024-6386](https://github.com/Argendo/CVE-2024-6386) | Research and PoC for CVE-2024-6386 | 2024-09-05T14:44:36Z|
Expand Down

0 comments on commit 8051121

Please sign in to comment.