Auto Update 2024/11/18 00:30:50

This commit is contained in:
motikan2010-bot 2024-11-18 09:30:50 +09:00
parent dda0c2872a
commit 0a9e90580e
27 changed files with 265 additions and 149 deletions

View file

@ -14,10 +14,10 @@
"description": "CVE-2014-10069",
"fork": false,
"created_at": "2018-01-07T14:37:29Z",
"updated_at": "2024-02-22T00:18:36Z",
"updated_at": "2024-11-17T20:08:00Z",
"pushed_at": "2018-01-07T16:36:31Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": true,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 11,
"watchers": 10,
"score": 0,
"subscribers_count": 6
}

View file

@ -89,7 +89,7 @@
"description": "An exploit for CVE-2018-5955 GitStack 2.3.10 Unauthenticated RCE",
"fork": false,
"created_at": "2023-06-23T20:25:47Z",
"updated_at": "2024-11-15T16:36:31Z",
"updated_at": "2024-11-17T20:05:51Z",
"pushed_at": "2024-11-15T16:36:27Z",
"stargazers_count": 10,
"watchers_count": 10,

View file

@ -2667,37 +2667,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 852063962,
"name": "cve-2018-6574",
"full_name": "ttyA0\/cve-2018-6574",
"owner": {
"login": "ttyA0",
"id": 96278236,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96278236?v=4",
"html_url": "https:\/\/github.com\/ttyA0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ttyA0\/cve-2018-6574",
"description": null,
"fork": false,
"created_at": "2024-09-04T06:55:16Z",
"updated_at": "2024-09-04T06:57:31Z",
"pushed_at": "2024-09-04T06:57:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 852845799,
"name": "CVE-2018-6574",

View file

@ -76,10 +76,10 @@
"description": "This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I\/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and recalulated the fields offsets",
"fork": false,
"created_at": "2024-08-05T16:55:40Z",
"updated_at": "2024-11-15T20:45:36Z",
"updated_at": "2024-11-17T19:29:01Z",
"pushed_at": "2024-08-05T18:31:16Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 1
}

View file

@ -274,10 +274,10 @@
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
"updated_at": "2024-10-25T12:58:36Z",
"updated_at": "2024-11-17T19:28:30Z",
"pushed_at": "2020-03-21T05:44:48Z",
"stargazers_count": 351,
"watchers_count": 351,
"stargazers_count": 352,
"watchers_count": 352,
"has_discussions": false,
"forks_count": 79,
"allow_forking": true,
@ -286,7 +286,7 @@
"topics": [],
"visibility": "public",
"forks": 79,
"watchers": 351,
"watchers": 352,
"score": 0,
"subscribers_count": 9
},

View file

@ -45,10 +45,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2024-11-16T11:36:18Z",
"updated_at": "2024-11-17T21:55:36Z",
"pushed_at": "2023-07-20T10:51:42Z",
"stargazers_count": 1730,
"watchers_count": 1730,
"stargazers_count": 1731,
"watchers_count": 1731,
"has_discussions": false,
"forks_count": 359,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 359,
"watchers": 1730,
"watchers": 1731,
"score": 0,
"subscribers_count": 86
},

View file

@ -14,8 +14,8 @@
"description": "CVE-2021-34081",
"fork": false,
"created_at": "2024-11-17T18:17:01Z",
"updated_at": "2024-11-17T18:18:11Z",
"pushed_at": "2024-11-17T18:17:01Z",
"updated_at": "2024-11-17T18:21:06Z",
"pushed_at": "2024-11-17T18:21:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -1603,37 +1603,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 452478414,
"name": "CVE-2021-4034",
"full_name": "ch4rum\/CVE-2021-4034",
"owner": {
"login": "ch4rum",
"id": 98498025,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98498025?v=4",
"html_url": "https:\/\/github.com\/ch4rum",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ch4rum\/CVE-2021-4034",
"description": null,
"fork": false,
"created_at": "2022-01-26T23:46:28Z",
"updated_at": "2022-01-27T05:23:59Z",
"pushed_at": "2022-01-27T02:12:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 452496340,
"name": "CVE-2021-4034",
@ -2029,6 +1998,37 @@
"score": 0,
"subscribers_count": 6
},
{
"id": 452738641,
"name": "CVE-2021-4034",
"full_name": "NULL0B\/CVE-2021-4034",
"owner": {
"login": "NULL0B",
"id": 26231330,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26231330?v=4",
"html_url": "https:\/\/github.com\/NULL0B",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/NULL0B\/CVE-2021-4034",
"description": null,
"fork": false,
"created_at": "2022-01-27T15:33:17Z",
"updated_at": "2022-01-27T05:23:59Z",
"pushed_at": "2022-01-27T02:12:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 452753346,
"name": "CVE-2021-4034",

View file

@ -14,10 +14,10 @@
"description": "The FreeBSD ICMP buffer overflow, freebsd buffer overflow poc",
"fork": false,
"created_at": "2023-03-02T20:18:54Z",
"updated_at": "2024-06-21T06:03:43Z",
"updated_at": "2024-11-17T22:17:14Z",
"pushed_at": "2023-03-25T17:41:13Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -38,7 +38,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},

View file

@ -312,13 +312,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 0

View file

@ -143,11 +143,11 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Jenderal92\/WP-CVE-2023-28121",
"description": "Python 2.7",
"description": "Wordpress CVE-2023-28121",
"fork": false,
"created_at": "2023-11-03T01:19:09Z",
"updated_at": "2024-11-08T23:09:36Z",
"pushed_at": "2023-11-03T01:21:15Z",
"updated_at": "2024-11-17T23:56:36Z",
"pushed_at": "2024-11-17T23:45:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
@ -155,7 +155,15 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"bot-auto-scanner-vuln",
"bot-auto-upload-shell",
"cve-2023-28121",
"cve-wordpress",
"exploit",
"vulnerability",
"wordpress"
],
"visibility": "public",
"forks": 3,
"watchers": 1,

View file

@ -263,22 +263,28 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Jenderal92\/WP-CVE-2023-32243",
"description": "Python 2.7",
"description": "Wordpress CVE-2023-32243",
"fork": false,
"created_at": "2023-07-03T04:16:16Z",
"updated_at": "2024-07-16T13:10:27Z",
"pushed_at": "2023-07-03T04:17:45Z",
"stargazers_count": 3,
"watchers_count": 3,
"updated_at": "2024-11-18T00:07:33Z",
"pushed_at": "2024-11-17T23:46:50Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"cve-2023-32243",
"exploit-wordpress",
"wordpress",
"wordpress-exploit",
"wordpress-vulnerability"
],
"visibility": "public",
"forks": 7,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -42,22 +42,29 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Jenderal92\/CHAMILO-CVE-2023-34960",
"description": "Python 2.7",
"description": "Wordpress CVE-2023-34960",
"fork": false,
"created_at": "2023-07-03T11:17:42Z",
"updated_at": "2024-02-05T17:52:47Z",
"pushed_at": "2023-07-03T11:19:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2024-11-18T00:05:08Z",
"pushed_at": "2024-11-17T23:46:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"cve-2023-34960",
"exploit",
"exploit-wordpress",
"vulnerability",
"wordpress",
"wordpress-vulnerability"
],
"visibility": "public",
"forks": 3,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -179,11 +179,11 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Jenderal92\/WP-CVE-2023-5360",
"description": "Python 2.7",
"description": "Wordpress CVE-2023-5360",
"fork": false,
"created_at": "2023-11-03T00:58:36Z",
"updated_at": "2024-07-20T17:41:02Z",
"pushed_at": "2024-02-05T10:57:32Z",
"updated_at": "2024-11-17T23:52:22Z",
"pushed_at": "2024-11-17T23:43:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -191,7 +191,13 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"bot-auto-upload",
"bot-scanner-python",
"cve-2023-5360",
"exploit",
"exploit-2023"
],
"visibility": "public",
"forks": 0,
"watchers": 0,

View file

@ -1,6 +1,6 @@
[
{
"id": 889986626,
"id": 889993152,
"name": "CVE-2024-10793",
"full_name": "windz3r0day\/CVE-2024-10793",
"owner": {
@ -13,11 +13,11 @@
"html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-10793",
"description": "CVE-2024-10793 poc exploit",
"fork": false,
"created_at": "2024-11-17T18:25:35Z",
"updated_at": "2024-11-17T18:29:25Z",
"pushed_at": "2024-11-17T18:29:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"created_at": "2024-11-17T18:44:53Z",
"updated_at": "2024-11-17T19:51:56Z",
"pushed_at": "2024-11-17T19:51:53Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -29,5 +29,36 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 890042652,
"name": "CVE-2024-10924",
"full_name": "FoKiiin\/CVE-2024-10924",
"owner": {
"login": "FoKiiin",
"id": 186207976,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186207976?v=4",
"html_url": "https:\/\/github.com\/FoKiiin",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/FoKiiin\/CVE-2024-10924",
"description": "CVE-2024-10924 Authentication Bypass Using an Alternate Path or Channel (CWE-288)",
"fork": false,
"created_at": "2024-11-17T21:29:58Z",
"updated_at": "2024-11-17T21:35:57Z",
"pushed_at": "2024-11-17T21:35:29Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -19,13 +19,13 @@
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 32,
"score": 0,
"subscribers_count": 4

33
2024/CVE-2024-27821.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 890033348,
"name": "CVE-2024-27821",
"full_name": "0xilis\/CVE-2024-27821",
"owner": {
"login": "0xilis",
"id": 109871561,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109871561?v=4",
"html_url": "https:\/\/github.com\/0xilis",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xilis\/CVE-2024-27821",
"description": "Writeup and PoC of CVE-2024-27821, for education purposes.",
"fork": false,
"created_at": "2024-11-17T20:56:41Z",
"updated_at": "2024-11-17T21:43:39Z",
"pushed_at": "2024-11-17T21:43:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "The tool helps in quickly identifying vulnerabilities by examining a comprehensive list of potential paths on a website, making it useful for security assessments.",
"fork": false,
"created_at": "2024-08-03T14:40:08Z",
"updated_at": "2024-11-13T20:48:08Z",
"updated_at": "2024-11-17T22:49:17Z",
"pushed_at": "2024-09-24T00:27:08Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-34102: Unauthenticated Magento XXE",
"fork": false,
"created_at": "2024-06-27T18:10:13Z",
"updated_at": "2024-08-20T21:27:09Z",
"updated_at": "2024-11-17T22:47:14Z",
"pushed_at": "2024-08-14T15:10:47Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},
@ -169,10 +169,10 @@
"description": "CosmicSting (CVE-2024-34102)",
"fork": false,
"created_at": "2024-06-28T23:33:21Z",
"updated_at": "2024-11-08T09:32:37Z",
"updated_at": "2024-11-17T23:35:44Z",
"pushed_at": "2024-09-05T18:38:46Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 40,
"watchers": 41,
"score": 0,
"subscribers_count": 1
},

View file

@ -265,10 +265,10 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
"updated_at": "2024-11-17T12:18:49Z",
"updated_at": "2024-11-17T20:38:53Z",
"pushed_at": "2024-08-27T12:22:39Z",
"stargazers_count": 620,
"watchers_count": 620,
"stargazers_count": 621,
"watchers_count": 621,
"has_discussions": false,
"forks_count": 113,
"allow_forking": true,
@ -277,7 +277,7 @@
"topics": [],
"visibility": "public",
"forks": 113,
"watchers": 620,
"watchers": 621,
"score": 0,
"subscribers_count": 4
},
@ -799,8 +799,8 @@
"description": "PoC for Windows' IPv6 CVE-2024-38063",
"fork": false,
"created_at": "2024-11-16T17:22:08Z",
"updated_at": "2024-11-16T17:25:39Z",
"pushed_at": "2024-11-16T17:25:07Z",
"updated_at": "2024-11-17T22:36:00Z",
"pushed_at": "2024-11-17T22:35:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -808,7 +808,16 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"bsod",
"bsod-crashes",
"cve",
"cvepoc",
"dos",
"ipv6",
"ipv6-network",
"poc"
],
"visibility": "public",
"forks": 0,
"watchers": 0,

33
2024/CVE-2024-4351.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 890044743,
"name": "CVE-2024-4351",
"full_name": "ZSECURE\/CVE-2024-4351",
"owner": {
"login": "ZSECURE",
"id": 46941177,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46941177?v=4",
"html_url": "https:\/\/github.com\/ZSECURE",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ZSECURE\/CVE-2024-4351",
"description": null,
"fork": false,
"created_at": "2024-11-17T21:37:55Z",
"updated_at": "2024-11-17T21:39:06Z",
"pushed_at": "2024-11-17T21:39:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575",
"fork": false,
"created_at": "2024-11-07T21:03:30Z",
"updated_at": "2024-11-17T14:25:31Z",
"updated_at": "2024-11-17T19:35:45Z",
"pushed_at": "2024-11-14T16:25:52Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 45,
"watchers": 46,
"score": 0,
"subscribers_count": 0
},

View file

@ -14,8 +14,8 @@
"description": null,
"fork": false,
"created_at": "2024-11-13T16:09:14Z",
"updated_at": "2024-11-13T20:11:58Z",
"pushed_at": "2024-11-13T17:30:07Z",
"updated_at": "2024-11-17T21:17:07Z",
"pushed_at": "2024-11-17T21:17:03Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -19,13 +19,13 @@
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 38,
"score": 0,
"subscribers_count": 3

View file

@ -14,8 +14,8 @@
"description": "Exploit for Grafana arbitrary file-read (CVE-2024-9264)",
"fork": false,
"created_at": "2024-10-19T13:50:52Z",
"updated_at": "2024-11-13T07:11:18Z",
"pushed_at": "2024-10-19T16:01:12Z",
"updated_at": "2024-11-17T19:40:22Z",
"pushed_at": "2024-11-17T19:40:19Z",
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": false,

View file

@ -888,6 +888,13 @@
- [d0rb/CVE-2024-4323](https://github.com/d0rb/CVE-2024-4323)
- [yuansec/CVE-2024-4323-dos_poc](https://github.com/yuansec/CVE-2024-4323-dos_poc)
### CVE-2024-4351 (2024-05-16)
<code>The Tutor LMS Pro plugin for WordPress is vulnerable to unauthorized access of data, modification of data, loss of data due to a missing capability check on the 'authenticate' function in all versions up to, and including, 2.7.0. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to gain control of an existing administrator account.
</code>
- [ZSECURE/CVE-2024-4351](https://github.com/ZSECURE/CVE-2024-4351)
### CVE-2024-4352 (2024-05-16)
<code>The Tutor LMS Pro plugin for WordPress is vulnerable to unauthorized access of data, modification of data, loss of data due to a missing capability check on the 'get_calendar_materials' function. The plugin is also vulnerable to SQL Injection via the year parameter of that function due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
@ -2021,6 +2028,7 @@
</code>
- [RandomRobbieBF/CVE-2024-10924](https://github.com/RandomRobbieBF/CVE-2024-10924)
- [FoKiiin/CVE-2024-10924](https://github.com/FoKiiin/CVE-2024-10924)
### CVE-2024-10958 (2024-11-10)
@ -3675,6 +3683,13 @@
- [jprx/CVE-2024-27815](https://github.com/jprx/CVE-2024-27815)
### CVE-2024-27821 (2024-05-13)
<code>A path handling issue was addressed with improved validation. This issue is fixed in iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. A shortcut may output sensitive user data without consent.
</code>
- [0xilis/CVE-2024-27821](https://github.com/0xilis/CVE-2024-27821)
### CVE-2024-27914 (2024-03-18)
<code>GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An unauthenticated user can provide a malicious link to a GLPI administrator in order to exploit a reflected XSS vulnerability. The XSS will only trigger if the administrator navigates through the debug bar. This issue has been patched in version 10.0.13.\n
@ -23036,7 +23051,6 @@
- [vilasboasph/CVE-2021-4034](https://github.com/vilasboasph/CVE-2021-4034)
- [nobelh/CVE-2021-4034](https://github.com/nobelh/CVE-2021-4034)
- [callrbx/pkexec-lpe-poc](https://github.com/callrbx/pkexec-lpe-poc)
- [ch4rum/CVE-2021-4034](https://github.com/ch4rum/CVE-2021-4034)
- [cd80-ctf/CVE-2021-4034](https://github.com/cd80-ctf/CVE-2021-4034)
- [Al1ex/CVE-2021-4034](https://github.com/Al1ex/CVE-2021-4034)
- [ashutoshrohilla/CVE-2021-4034](https://github.com/ashutoshrohilla/CVE-2021-4034)
@ -23049,6 +23063,7 @@
- [tahaafarooq/poppy](https://github.com/tahaafarooq/poppy)
- [DosAmp/pkwned](https://github.com/DosAmp/pkwned)
- [PwnFunction/CVE-2021-4034](https://github.com/PwnFunction/CVE-2021-4034)
- [NULL0B/CVE-2021-4034](https://github.com/NULL0B/CVE-2021-4034)
- [locksec/CVE-2021-4034](https://github.com/locksec/CVE-2021-4034)
- [deoxykev/CVE-2021-4034-Rust](https://github.com/deoxykev/CVE-2021-4034-Rust)
- [c3c/CVE-2021-4034](https://github.com/c3c/CVE-2021-4034)
@ -39007,7 +39022,6 @@
- [Dannners/CVE-2018-6574-go-get-RCE](https://github.com/Dannners/CVE-2018-6574-go-get-RCE)
- [bme2003/CVE-2018-6574](https://github.com/bme2003/CVE-2018-6574)
- [iNoSec2/cve-2018-6574](https://github.com/iNoSec2/cve-2018-6574)
- [ttyA0/cve-2018-6574](https://github.com/ttyA0/cve-2018-6574)
- [faqihudin13/CVE-2018-6574](https://github.com/faqihudin13/CVE-2018-6574)
- [lisu60/cve-2018-6574](https://github.com/lisu60/cve-2018-6574)
- [Saboor-Hakimi/CVE-2018-6574](https://github.com/Saboor-Hakimi/CVE-2018-6574)