Skip to content

Commit

Permalink
Updated by CVEDB-BOT 🤖
Browse files Browse the repository at this point in the history
  • Loading branch information
CVEDB-BOT committed Nov 5, 2024
1 parent f0d0dcd commit 63e19f5
Show file tree
Hide file tree
Showing 2 changed files with 6 additions and 1 deletion.
Binary file modified db/cve.sqlite
Binary file not shown.
7 changes: 6 additions & 1 deletion docs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

> Automatic monitor github cve using Github Actions

Last generated : 2024-11-05 14:23:52.450761
Last generated : 2024-11-05 15:25:08.741538

| CVE | Name | Description | Date |
|---|---|---|---|
Expand All @@ -16,6 +16,7 @@
| [CVE-2024-9955](https://www.cve.org/CVERecord?id=CVE-2024-9955) | [ShawtyTwo/CVE-2024-9955-POC](https://github.com/ShawtyTwo/CVE-2024-9955-POC) | CVE-2024-9955-POC | 2024-10-31T20:51:38Z|
| [CVE-2024-9954](https://www.cve.org/CVERecord?id=CVE-2024-9954) | [zetraxz/CVE-2024-9954](https://github.com/zetraxz/CVE-2024-9954) | no description | 2024-10-29T17:04:59Z|
| [CVE-2024-9954](https://www.cve.org/CVERecord?id=CVE-2024-9954) | [famixcm/CVE-2024-9954](https://github.com/famixcm/CVE-2024-9954) | no description | 2024-10-30T19:31:48Z|
| [CVE-2024-9932](https://www.cve.org/CVERecord?id=CVE-2024-9932) | [RandomRobbieBF/CVE-2024-9932](https://github.com/RandomRobbieBF/CVE-2024-9932) | Wux Blog Editor <= 3.0.0 - Unauthenticated Arbitrary File Upload | 2024-11-05T15:00:39Z|
| [CVE-2024-9926](https://www.cve.org/CVERecord?id=CVE-2024-9926) | [m3ssap0/wordpress-jetpack-broken-access-control-exploit](https://github.com/m3ssap0/wordpress-jetpack-broken-access-control-exploit) | Exploits Jetpack < 13.9.1 broken access control (CVE-2024-9926). | 2024-11-01T14:03:55Z|
| [CVE-2024-9926](https://www.cve.org/CVERecord?id=CVE-2024-9926) | [m3ssap0/wordpress-jetpack-broken-access-control-vulnerable-application](https://github.com/m3ssap0/wordpress-jetpack-broken-access-control-vulnerable-application) | WARNING: This is a vulnerable application to test the exploit for the Jetpack < 13.9.1 broken access control (CVE-2024-9926). Run it at your own risk! | 2024-10-23T19:12:55Z|
| [CVE-2024-9821](https://www.cve.org/CVERecord?id=CVE-2024-9821) | [RandomRobbieBF/CVE-2024-9821](https://github.com/RandomRobbieBF/CVE-2024-9821) | Bot for Telegram on WooCommerce <= 1.2.4 - Authenticated (Subscriber+) Telegram Bot Token Disclosure to Authentication Bypass | 2024-10-11T15:35:39Z|
Expand Down Expand Up @@ -594,6 +595,8 @@
| [CVE-2024-4320](https://www.cve.org/CVERecord?id=CVE-2024-4320) | [bolkv/CVE-2024-4320](https://github.com/bolkv/CVE-2024-4320) | no description | 2024-08-08T03:54:38Z|
| [CVE-2024-43160](https://www.cve.org/CVERecord?id=CVE-2024-43160) | [KTN1990/CVE-2024-43160](https://github.com/KTN1990/CVE-2024-43160) | The BerqWP – Automated All-In-One PageSpeed Optimization Plugin for Core Web Vitals, Cache, CDN, Images, CSS, and JavaScript plugin for WordPress is vulnerable to arbitrary file uploads | 2024-09-17T04:19:54Z|
| [CVE-2024-43160](https://www.cve.org/CVERecord?id=CVE-2024-43160) | [maybeheisenberg/PoC-for-CVE-2024-43160](https://github.com/maybeheisenberg/PoC-for-CVE-2024-43160) | no description | 2024-09-18T14:48:38Z|
| [CVE-2024-43093](https://www.cve.org/CVERecord?id=CVE-2024-43093) | [hatvix1/CVE-2024-43093](https://github.com/hatvix1/CVE-2024-43093) | CVE-2024-43093 | 2024-11-05T15:06:52Z|
| [CVE-2024-43093](https://www.cve.org/CVERecord?id=CVE-2024-43093) | [exploitsecure/CVE-2024-43093](https://github.com/exploitsecure/CVE-2024-43093) | no description | 2024-11-05T14:40:29Z|
| [CVE-2024-43044](https://www.cve.org/CVERecord?id=CVE-2024-43044) | [HwMex0/CVE-2024-43044](https://github.com/HwMex0/CVE-2024-43044) | no description | 2024-08-08T08:28:26Z|
| [CVE-2024-43044](https://www.cve.org/CVERecord?id=CVE-2024-43044) | [jenkinsci-cert/SECURITY-3430](https://github.com/jenkinsci-cert/SECURITY-3430) | This repository provides a workaround preventing exploitation of SECURITY-3430 / CVE-2024-43044 | 2024-08-08T11:55:32Z|
| [CVE-2024-43044](https://www.cve.org/CVERecord?id=CVE-2024-43044) | [v9d0g/CVE-2024-43044-POC](https://github.com/v9d0g/CVE-2024-43044-POC) | CVE-2024-43044的利用方式 | 2024-08-13T07:32:35Z|
Expand Down Expand Up @@ -1891,6 +1894,7 @@
| [CVE-2024-23652](https://www.cve.org/CVERecord?id=CVE-2024-23652) | [abian2/CVE-2024-23652](https://github.com/abian2/CVE-2024-23652) | no description | 2024-03-01T09:50:00Z|
| [CVE-2024-23443](https://www.cve.org/CVERecord?id=CVE-2024-23443) | [zhazhalove/osquery_cve-2024-23443](https://github.com/zhazhalove/osquery_cve-2024-23443) | Osqery extension HP BIOS WMI | 2024-02-18T02:15:44Z|
| [CVE-2024-23346](https://www.cve.org/CVERecord?id=CVE-2024-23346) | [bluetoothStrawberry/CVE-2024-23346_poc](https://github.com/bluetoothStrawberry/CVE-2024-23346_poc) | Developed PoC for pymatgen <= 2024.2.8 Insecure Deserialization RCE | 2024-11-02T19:40:01Z|
| [CVE-2024-23346](https://www.cve.org/CVERecord?id=CVE-2024-23346) | [9carlo6/CVE-2024-23346](https://github.com/9carlo6/CVE-2024-23346) | This repository contains a Crystallographic Information File (CIF) intended for use on the "Chemistry" machine on Hack The Box (HTB). | 2024-11-05T14:27:06Z|
| [CVE-2024-23339](https://www.cve.org/CVERecord?id=CVE-2024-23339) | [200101WhoAmI/CVE-2024-23339](https://github.com/200101WhoAmI/CVE-2024-23339) | pp | 2024-08-21T05:03:32Z|
| [CVE-2024-23334](https://www.cve.org/CVERecord?id=CVE-2024-23334) | [ox1111/CVE-2024-23334](https://github.com/ox1111/CVE-2024-23334) | CVE-2024-23334 | 2024-02-28T22:30:21Z|
| [CVE-2024-23334](https://www.cve.org/CVERecord?id=CVE-2024-23334) | [sxyrxyy/aiohttp-exploit-CVE-2024-23334-certstream](https://github.com/sxyrxyy/aiohttp-exploit-CVE-2024-23334-certstream) | no description | 2024-03-17T10:56:02Z|
Expand Down Expand Up @@ -17959,6 +17963,7 @@
| [CVE-2015-5275](https://www.cve.org/CVERecord?id=CVE-2015-5275) | [Live-Hack-CVE/CVE-2015-5275](https://github.com/Live-Hack-CVE/CVE-2015-5275) | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-5257. Reason: This candidate is a reservation duplicate of CVE-2015-5257. Notes: All CVE users should reference CVE-2015-5257 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. CVE project by @Sn0wAlice | 2023-02-12T12:10:52Z|
| [CVE-2015-5254](https://www.cve.org/CVERecord?id=CVE-2015-5254) | [Ma1Dong/ActiveMQ_CVE-2015-5254](https://github.com/Ma1Dong/ActiveMQ_CVE-2015-5254) | ActiveMQ_CVE-2015-5254 | 2020-08-03T05:51:52Z|
| [CVE-2015-5254](https://www.cve.org/CVERecord?id=CVE-2015-5254) | [jas502n/CVE-2015-5254](https://github.com/jas502n/CVE-2015-5254) | ActiveMQ Deserialization RCE | 2019-08-30T06:03:51Z|
| [CVE-2015-5254](https://www.cve.org/CVERecord?id=CVE-2015-5254) | [guigui237/Exploitation-de-la-vuln-rabilit-CVE-2015-5254-](https://github.com/guigui237/Exploitation-de-la-vuln-rabilit-CVE-2015-5254-) | La vulnérabilité CVE-2015-5254 est une faille de sécurité dans Apache ActiveMQ, un serveur de messages open source largement utilisé pour la communication entre applications. Cette vulnérabilité touche les versions d'ActiveMQ jusqu'à 5.13.0 et réside dans le manque de filtrage sur les données d'entrées JMS ObjectMessage enyoyées | 2024-11-05T14:58:30Z|
| [CVE-2015-5252](https://www.cve.org/CVERecord?id=CVE-2015-5252) | [Live-Hack-CVE/CVE-2015-5252](https://github.com/Live-Hack-CVE/CVE-2015-5252) | This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2015-5252 Made by Sn0wAlice. ❤️ | 2022-12-26T05:30:39Z|
| [CVE-2015-5252](https://www.cve.org/CVERecord?id=CVE-2015-5252) | [Live-Hack-CVE/CVE-2015-5252](https://github.com/Live-Hack-CVE/CVE-2015-5252) | vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share. CVE project by @Sn0wAlice | 2022-12-30T01:50:54Z|
| [CVE-2015-5233](https://www.cve.org/CVERecord?id=CVE-2015-5233) | [Live-Hack-CVE/CVE-2015-5233](https://github.com/Live-Hack-CVE/CVE-2015-5233) | Foreman before 1.8.4 and 1.9.x before 1.9.1 do not properly apply view_hosts permissions, which allows (1) remote authenticated users with the view_reports permission to read reports from arbitrary hosts or (2) remote authenticated users with the destroy_reports permission to delete reports from arbitrary hosts via dir CVE project by @Sn0wAlice | 2023-02-13T02:27:39Z|
Expand Down

0 comments on commit 63e19f5

Please sign in to comment.