From 805112190a43fb7c6b5880aea50cfd713a2b393f Mon Sep 17 00:00:00 2001 From: CVEDB-BOT Date: Thu, 19 Dec 2024 03:39:17 +0000 Subject: [PATCH] =?UTF-8?q?Updated=20by=20CVEDB-BOT=20=F0=9F=A4=96?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- db/cve.sqlite | Bin 6238208 -> 6238208 bytes docs/README.md | 3 ++- 2 files changed, 2 insertions(+), 1 deletion(-) diff --git a/db/cve.sqlite b/db/cve.sqlite index cd5f4cd91987a44b180e33e49d4da19cfe6258da..d11d8bdefc6c3be01c9a57effee868439718014c 100644 GIT binary patch delta 444 zcma*ay-rgB06<|cMJuR95K$9Yf+_sedh$2)}P?4X4fC5JcjR^@MAt7-P7|yN( zxOVUrOy9tj_y)d)iGwcg4(ChG{?Ffa`+xhC40b+umV=!GB#=6ZNxhtuQxccc(jbj; zM$XDPNl25Nmu6{^3(_hVrA;o$WoefVNlK@5$rb6AtI{La zLK&1Hi6ku<$;zGntX+ zGAna3FAGwUMOl&;vMejIDlg@gtjYQ}HokT@#uAkiO&=4-iAt@fn))8pqH3!4UmniJ z_S$w2s+;lpeE(XmFZb)s(TDBL@ZI~jUtTw?48{M=kFE9AWF|}(D^a!-6-w#iYI$ig S%tV>ta3ovE*Nz7_(!n3*9G$cP delta 373 zcma*XwN*m_06fhZowtEySqE&?U0@W#p|J`zQ4L z=d~e7zBR4|$rmJ$kc1^$awJ#sBqI4zAcayS#S)bgDU~uQmkOzrDyfzlsg*jZmj-E+ zCTW%yX_YouH{B< Automatic monitor github cve using Github Actions - Last generated : 2024-12-19 03:01:11.124385 + Last generated : 2024-12-19 03:34:50.285981 | CVE | Name | Description | Date | |---|---|---|---| @@ -293,6 +293,7 @@ | [CVE-2024-6387](https://www.cve.org/CVERecord?id=CVE-2024-6387) | [identity-threat-labs/Article-RegreSSHion-CVE-2024-6387](https://github.com/identity-threat-labs/Article-RegreSSHion-CVE-2024-6387) | In an era where digital security is crucial, a new vulnerability in OpenSSH, identified as CVE-2024-6387, has drawn the attention of system administrators and security professionals worldwide. Named "regreSSHion," this severe security flaw allows remote code execution (RCE) and could significant threat to the integrity of vulnerable systems. | 2024-08-29T15:00:56Z| | [CVE-2024-6387](https://www.cve.org/CVERecord?id=CVE-2024-6387) | [YassDEV221608/CVE-2024-6387](https://github.com/YassDEV221608/CVE-2024-6387) | no description | 2024-11-24T17:12:26Z| | [CVE-2024-6387](https://www.cve.org/CVERecord?id=CVE-2024-6387) | [oxapavan/CVE-2024-6387](https://github.com/oxapavan/CVE-2024-6387) | Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387) | 2024-11-30T19:14:05Z| +| [CVE-2024-6387](https://www.cve.org/CVERecord?id=CVE-2024-6387) | [zql-gif/CVE-2024-6387](https://github.com/zql-gif/CVE-2024-6387) | no description | 2024-12-19T03:08:19Z| | [CVE-2024-6386](https://www.cve.org/CVERecord?id=CVE-2024-6386) | [realbotnet/CVE-2024-6386](https://github.com/realbotnet/CVE-2024-6386) | CVE-2024-6386 - Wordpress WPML (WordPress Multilingual Plugin) ≤ 4.6.12. RCE Exploit 0Day (300K Sites Vulnerability) -- Telegram: @bl4ckhatx | 2024-08-27T04:01:03Z| | [CVE-2024-6386](https://www.cve.org/CVERecord?id=CVE-2024-6386) | [realbotnet/CVE-2024-6386](https://github.com/realbotnet/CVE-2024-6386) | CVE-2024-6386 - Wordpress WPML (WordPress Multilingual Plugin) ≤ 4.6.12. RCE Exploit 0Day (300K Sites Vulnerability) -- Telegram: @bl4ckhatx | 2024-08-30T18:54:01Z| | [CVE-2024-6386](https://www.cve.org/CVERecord?id=CVE-2024-6386) | [Argendo/CVE-2024-6386](https://github.com/Argendo/CVE-2024-6386) | Research and PoC for CVE-2024-6386 | 2024-09-05T14:44:36Z|