Skip to content

Commit

Permalink
Updated by CVEDB-BOT 🤖
Browse files Browse the repository at this point in the history
  • Loading branch information
CVEDB-BOT committed Feb 13, 2025
1 parent a98f9de commit c6b3185
Show file tree
Hide file tree
Showing 2 changed files with 4 additions and 1 deletion.
Binary file modified db/cve.sqlite
Binary file not shown.
5 changes: 4 additions & 1 deletion docs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

> Automatic monitor github cve using Github Actions

Last generated : 2025-02-13 06:32:13.663881
Last generated : 2025-02-13 07:22:06.111398

| CVE | Name | Description | Date |
|---|---|---|---|
Expand All @@ -19,6 +19,7 @@
| [CVE-2025-24085](https://www.cve.org/CVERecord?id=CVE-2025-24085) | [clidanc/CVE-2025-24085](https://github.com/clidanc/CVE-2025-24085) | no description | 2025-01-28T12:53:54Z|
| [CVE-2025-24085](https://www.cve.org/CVERecord?id=CVE-2025-24085) | [clidancc1/CVE-2025-24085](https://github.com/clidancc1/CVE-2025-24085) | CVE-2025-24085: Incorrect Default Permissions (CWE-276) | 2025-01-29T21:00:33Z|
| [CVE-2025-24085](https://www.cve.org/CVERecord?id=CVE-2025-24085) | [bronsoneaver/CVE-2025-24085](https://github.com/bronsoneaver/CVE-2025-24085) | CVE-2025-24085: Incorrect Default Permissions (CWE-276) | 2025-01-30T11:08:45Z|
| [CVE-2025-24016](https://www.cve.org/CVERecord?id=CVE-2025-24016) | [huseyinstif/CVE-2025-24016-Nuclei-Template](https://github.com/huseyinstif/CVE-2025-24016-Nuclei-Template) | no description | 2025-02-13T06:38:43Z|
| [CVE-2025-23369](https://www.cve.org/CVERecord?id=CVE-2025-23369) | [hakivvi/CVE-2025-23369](https://github.com/hakivvi/CVE-2025-23369) | GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit | 2025-02-08T18:13:04Z|
| [CVE-2025-23369](https://www.cve.org/CVERecord?id=CVE-2025-23369) | [Arian91/CVE-2025-23369_SAML_bypass](https://github.com/Arian91/CVE-2025-23369_SAML_bypass) | bypass SAML authentication on GitHub Enterprise | 2025-02-09T04:47:09Z|
| [CVE-2025-23040](https://www.cve.org/CVERecord?id=CVE-2025-23040) | [GabrieleDattile/CVE-2025-23040](https://github.com/GabrieleDattile/CVE-2025-23040) | no description | 2025-01-31T21:27:42Z|
Expand Down Expand Up @@ -49,6 +50,7 @@
| [CVE-2025-0282](https://www.cve.org/CVERecord?id=CVE-2025-0282) | [sfewer-r7/CVE-2025-0282](https://github.com/sfewer-r7/CVE-2025-0282) | PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways | 2025-01-16T14:45:53Z|
| [CVE-2025-0282](https://www.cve.org/CVERecord?id=CVE-2025-0282) | [chiefchainer/CVE-2025-0282](https://github.com/chiefchainer/CVE-2025-0282) | Exploit for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways | 2025-01-22T08:14:54Z|
| [CVE-2025-0282](https://www.cve.org/CVERecord?id=CVE-2025-0282) | [AdaniKamal/CVE-2025-0282](https://github.com/AdaniKamal/CVE-2025-0282) | Ivanti Connect Secure, Policy Secure & ZTA Gateways - CVE-2025-0282 | 2025-01-28T07:56:05Z|
| [CVE-2025-0108](https://www.cve.org/CVERecord?id=CVE-2025-0108) | [iSee857/CVE-2025-0108-PoC](https://github.com/iSee857/CVE-2025-0108-PoC) | Palo Alto Networks PAN-OS 身份验证绕过漏洞批量检测脚本(CVE-2025-0108) | 2025-02-13T06:39:25Z|
| [CVE-2024-99999](https://www.cve.org/CVERecord?id=CVE-2024-99999) | [labc-dev/CVE-2024-99999](https://github.com/labc-dev/CVE-2024-99999) | CVE-2024-99999 | 2024-07-20T09:25:01Z|
| [CVE-2024-9988](https://www.cve.org/CVERecord?id=CVE-2024-9988) | [hatvix1/CVE-2024-9988](https://github.com/hatvix1/CVE-2024-9988) | Authentication Bypass Using an Alternate Path or Channel | 2024-11-04T10:22:47Z|
| [CVE-2024-9955](https://www.cve.org/CVERecord?id=CVE-2024-9955) | [amfg145/CVE-2024-9955-POC](https://github.com/amfg145/CVE-2024-9955-POC) | Fortinet Privilege Escalation Advisory (Hypothetical CVE-2024-XXXXX): Elevation to Domain Admin on FortiOS and FortiProxy | 2024-10-31T20:23:15Z|
Expand Down Expand Up @@ -18468,6 +18470,7 @@
| [CVE-2016-6922](https://www.cve.org/CVERecord?id=CVE-2016-6922) | [Live-Hack-CVE/CVE-2016-6922](https://github.com/Live-Hack-CVE/CVE-2016-6922) | This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-6922 Made by Sn0wAlice. ❤️ | 2022-12-23T20:24:44Z|
| [CVE-2016-6922](https://www.cve.org/CVERecord?id=CVE-2016-6922) | [Live-Hack-CVE/CVE-2016-6922](https://github.com/Live-Hack-CVE/CVE-2016-6922) | Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-427 CVE project by @Sn0wAlice | 2022-12-28T10:06:40Z|
| [CVE-2016-6921](https://www.cve.org/CVERecord?id=CVE-2016-6921) | [Live-Hack-CVE/CVE-2016-6921](https://github.com/Live-Hack-CVE/CVE-2016-6921) | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6923, CVE-2016-6925, CVE project by @Sn0wAlice | 2023-01-31T19:57:42Z|
| [CVE-2016-6914](https://www.cve.org/CVERecord?id=CVE-2016-6914) | [CybermonkX/CVE-2016-6914-UniFiVideo-LPE](https://github.com/CybermonkX/CVE-2016-6914-UniFiVideo-LPE) | CVE-2016-6914-UniFiVideo-LPE | 2025-02-13T06:53:39Z|
| [CVE-2016-6664](https://www.cve.org/CVERecord?id=CVE-2016-6664) | [Live-Hack-CVE/CVE-2016-6664](https://github.com/Live-Hack-CVE/CVE-2016-6664) | mysqld_safe in Oracle MySQL through 5.5.51, 5.6.x through 5.6.32, and 5.7.x through 5.7.14; MariaDB; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17, when using file-based logg CVE project by @Sn0wAlice | 2023-01-24T17:40:16Z|
| [CVE-2016-6515](https://www.cve.org/CVERecord?id=CVE-2016-6515) | [cved-sources/cve-2016-6515](https://github.com/cved-sources/cve-2016-6515) | cve-2016-6515 | 2019-01-06T22:07:47Z|
| [CVE-2016-6515](https://www.cve.org/CVERecord?id=CVE-2016-6515) | [Live-Hack-CVE/CVE-2016-6515](https://github.com/Live-Hack-CVE/CVE-2016-6515) | This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-6515 Made by Sn0wAlice. ❤️ | 2022-12-23T00:28:54Z|
Expand Down

0 comments on commit c6b3185

Please sign in to comment.