diff --git a/db/cve.sqlite b/db/cve.sqlite index 1e1b502b7..1581a31ba 100644 Binary files a/db/cve.sqlite and b/db/cve.sqlite differ diff --git a/docs/README.md b/docs/README.md index 18fa1603c..7a0575290 100644 --- a/docs/README.md +++ b/docs/README.md @@ -2,7 +2,7 @@ > Automatic monitor github cve using Github Actions - Last generated : 2025-02-13 06:32:13.663881 + Last generated : 2025-02-13 07:22:06.111398 | CVE | Name | Description | Date | |---|---|---|---| @@ -19,6 +19,7 @@ | [CVE-2025-24085](https://www.cve.org/CVERecord?id=CVE-2025-24085) | [clidanc/CVE-2025-24085](https://github.com/clidanc/CVE-2025-24085) | no description | 2025-01-28T12:53:54Z| | [CVE-2025-24085](https://www.cve.org/CVERecord?id=CVE-2025-24085) | [clidancc1/CVE-2025-24085](https://github.com/clidancc1/CVE-2025-24085) | CVE-2025-24085: Incorrect Default Permissions (CWE-276) | 2025-01-29T21:00:33Z| | [CVE-2025-24085](https://www.cve.org/CVERecord?id=CVE-2025-24085) | [bronsoneaver/CVE-2025-24085](https://github.com/bronsoneaver/CVE-2025-24085) | CVE-2025-24085: Incorrect Default Permissions (CWE-276) | 2025-01-30T11:08:45Z| +| [CVE-2025-24016](https://www.cve.org/CVERecord?id=CVE-2025-24016) | [huseyinstif/CVE-2025-24016-Nuclei-Template](https://github.com/huseyinstif/CVE-2025-24016-Nuclei-Template) | no description | 2025-02-13T06:38:43Z| | [CVE-2025-23369](https://www.cve.org/CVERecord?id=CVE-2025-23369) | [hakivvi/CVE-2025-23369](https://github.com/hakivvi/CVE-2025-23369) | GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit | 2025-02-08T18:13:04Z| | [CVE-2025-23369](https://www.cve.org/CVERecord?id=CVE-2025-23369) | [Arian91/CVE-2025-23369_SAML_bypass](https://github.com/Arian91/CVE-2025-23369_SAML_bypass) | bypass SAML authentication on GitHub Enterprise | 2025-02-09T04:47:09Z| | [CVE-2025-23040](https://www.cve.org/CVERecord?id=CVE-2025-23040) | [GabrieleDattile/CVE-2025-23040](https://github.com/GabrieleDattile/CVE-2025-23040) | no description | 2025-01-31T21:27:42Z| @@ -49,6 +50,7 @@ | [CVE-2025-0282](https://www.cve.org/CVERecord?id=CVE-2025-0282) | [sfewer-r7/CVE-2025-0282](https://github.com/sfewer-r7/CVE-2025-0282) | PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways | 2025-01-16T14:45:53Z| | [CVE-2025-0282](https://www.cve.org/CVERecord?id=CVE-2025-0282) | [chiefchainer/CVE-2025-0282](https://github.com/chiefchainer/CVE-2025-0282) | Exploit for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways | 2025-01-22T08:14:54Z| | [CVE-2025-0282](https://www.cve.org/CVERecord?id=CVE-2025-0282) | [AdaniKamal/CVE-2025-0282](https://github.com/AdaniKamal/CVE-2025-0282) | Ivanti Connect Secure, Policy Secure & ZTA Gateways - CVE-2025-0282 | 2025-01-28T07:56:05Z| +| [CVE-2025-0108](https://www.cve.org/CVERecord?id=CVE-2025-0108) | [iSee857/CVE-2025-0108-PoC](https://github.com/iSee857/CVE-2025-0108-PoC) | Palo Alto Networks PAN-OS 身份验证绕过漏洞批量检测脚本(CVE-2025-0108) | 2025-02-13T06:39:25Z| | [CVE-2024-99999](https://www.cve.org/CVERecord?id=CVE-2024-99999) | [labc-dev/CVE-2024-99999](https://github.com/labc-dev/CVE-2024-99999) | CVE-2024-99999 | 2024-07-20T09:25:01Z| | [CVE-2024-9988](https://www.cve.org/CVERecord?id=CVE-2024-9988) | [hatvix1/CVE-2024-9988](https://github.com/hatvix1/CVE-2024-9988) | Authentication Bypass Using an Alternate Path or Channel | 2024-11-04T10:22:47Z| | [CVE-2024-9955](https://www.cve.org/CVERecord?id=CVE-2024-9955) | [amfg145/CVE-2024-9955-POC](https://github.com/amfg145/CVE-2024-9955-POC) | Fortinet Privilege Escalation Advisory (Hypothetical CVE-2024-XXXXX): Elevation to Domain Admin on FortiOS and FortiProxy | 2024-10-31T20:23:15Z| @@ -18468,6 +18470,7 @@ | [CVE-2016-6922](https://www.cve.org/CVERecord?id=CVE-2016-6922) | [Live-Hack-CVE/CVE-2016-6922](https://github.com/Live-Hack-CVE/CVE-2016-6922) | This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-6922 Made by Sn0wAlice. ❤️ | 2022-12-23T20:24:44Z| | [CVE-2016-6922](https://www.cve.org/CVERecord?id=CVE-2016-6922) | [Live-Hack-CVE/CVE-2016-6922](https://github.com/Live-Hack-CVE/CVE-2016-6922) | Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-427 CVE project by @Sn0wAlice | 2022-12-28T10:06:40Z| | [CVE-2016-6921](https://www.cve.org/CVERecord?id=CVE-2016-6921) | [Live-Hack-CVE/CVE-2016-6921](https://github.com/Live-Hack-CVE/CVE-2016-6921) | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6923, CVE-2016-6925, CVE project by @Sn0wAlice | 2023-01-31T19:57:42Z| +| [CVE-2016-6914](https://www.cve.org/CVERecord?id=CVE-2016-6914) | [CybermonkX/CVE-2016-6914-UniFiVideo-LPE](https://github.com/CybermonkX/CVE-2016-6914-UniFiVideo-LPE) | CVE-2016-6914-UniFiVideo-LPE | 2025-02-13T06:53:39Z| | [CVE-2016-6664](https://www.cve.org/CVERecord?id=CVE-2016-6664) | [Live-Hack-CVE/CVE-2016-6664](https://github.com/Live-Hack-CVE/CVE-2016-6664) | mysqld_safe in Oracle MySQL through 5.5.51, 5.6.x through 5.6.32, and 5.7.x through 5.7.14; MariaDB; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17, when using file-based logg CVE project by @Sn0wAlice | 2023-01-24T17:40:16Z| | [CVE-2016-6515](https://www.cve.org/CVERecord?id=CVE-2016-6515) | [cved-sources/cve-2016-6515](https://github.com/cved-sources/cve-2016-6515) | cve-2016-6515 | 2019-01-06T22:07:47Z| | [CVE-2016-6515](https://www.cve.org/CVERecord?id=CVE-2016-6515) | [Live-Hack-CVE/CVE-2016-6515](https://github.com/Live-Hack-CVE/CVE-2016-6515) | This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-6515 Made by Sn0wAlice. ❤️ | 2022-12-23T00:28:54Z|