Auto Update 2024/06/23 12:29:09

This commit is contained in:
motikan2010-bot 2024-06-23 21:29:09 +09:00
parent 67e0b6294c
commit 5650dcebd4
29 changed files with 215 additions and 139 deletions

View file

@ -107,10 +107,10 @@
"description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:",
"fork": false,
"created_at": "2015-02-03T20:28:27Z",
"updated_at": "2024-05-07T08:37:52Z",
"updated_at": "2024-06-23T06:48:47Z",
"pushed_at": "2023-10-06T16:11:26Z",
"stargazers_count": 243,
"watchers_count": 243,
"stargazers_count": 244,
"watchers_count": 244,
"has_discussions": false,
"forks_count": 74,
"allow_forking": true,
@ -127,7 +127,7 @@
],
"visibility": "public",
"forks": 74,
"watchers": 243,
"watchers": 244,
"score": 0,
"subscribers_count": 17
},

View file

@ -3017,10 +3017,10 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2024-05-20T02:25:56Z",
"updated_at": "2024-06-23T06:19:10Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 323,
"watchers_count": 323,
"stargazers_count": 322,
"watchers_count": 322,
"has_discussions": false,
"forks_count": 69,
"allow_forking": true,
@ -3029,7 +3029,7 @@
"topics": [],
"visibility": "public",
"forks": 69,
"watchers": 323,
"watchers": 322,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": "PoC code for CVE-2019-0841 Privilege Escalation vulnerability",
"fork": false,
"created_at": "2019-04-05T12:53:52Z",
"updated_at": "2023-12-28T06:38:20Z",
"updated_at": "2024-06-23T09:32:01Z",
"pushed_at": "2019-04-09T16:49:19Z",
"stargazers_count": 242,
"watchers_count": 242,
"stargazers_count": 243,
"watchers_count": 243,
"has_discussions": false,
"forks_count": 99,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 99,
"watchers": 242,
"watchers": 243,
"score": 0,
"subscribers_count": 4
},

View file

@ -73,10 +73,10 @@
"description": "Poc for CVE-2019-1253",
"fork": false,
"created_at": "2019-09-11T20:40:15Z",
"updated_at": "2023-09-28T11:06:07Z",
"updated_at": "2024-06-23T10:15:35Z",
"pushed_at": "2021-12-23T16:29:43Z",
"stargazers_count": 154,
"watchers_count": 154,
"stargazers_count": 155,
"watchers_count": 155,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 154,
"watchers": 155,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
"fork": false,
"created_at": "2019-11-21T06:26:27Z",
"updated_at": "2024-05-15T17:23:05Z",
"updated_at": "2024-06-23T12:02:31Z",
"pushed_at": "2019-11-21T09:27:59Z",
"stargazers_count": 183,
"watchers_count": 183,
"stargazers_count": 184,
"watchers_count": 184,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 183,
"watchers": 184,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322",
"fork": false,
"created_at": "2019-11-13T16:34:03Z",
"updated_at": "2024-05-20T16:39:56Z",
"updated_at": "2024-06-23T12:05:47Z",
"pushed_at": "2019-11-14T14:16:54Z",
"stargazers_count": 348,
"watchers_count": 348,
"stargazers_count": 349,
"watchers_count": 349,
"has_discussions": false,
"forks_count": 81,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 81,
"watchers": 348,
"watchers": 349,
"score": 0,
"subscribers_count": 12
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
"fork": false,
"created_at": "2020-02-11T16:42:34Z",
"updated_at": "2024-05-14T11:49:59Z",
"updated_at": "2024-06-23T09:35:40Z",
"pushed_at": "2021-12-23T16:28:28Z",
"stargazers_count": 338,
"watchers_count": 338,
"stargazers_count": 339,
"watchers_count": 339,
"has_discussions": false,
"forks_count": 58,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 58,
"watchers": 338,
"watchers": 339,
"score": 0,
"subscribers_count": 9
}

View file

@ -84,7 +84,7 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -94,7 +94,7 @@
"iot"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1

View file

@ -857,10 +857,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2024-06-22T19:33:10Z",
"updated_at": "2024-06-23T06:30:14Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 929,
"watchers_count": 929,
"stargazers_count": 930,
"watchers_count": 930,
"has_discussions": false,
"forks_count": 143,
"allow_forking": true,
@ -889,7 +889,7 @@
],
"visibility": "public",
"forks": 143,
"watchers": 929,
"watchers": 930,
"score": 0,
"subscribers_count": 25
},

View file

@ -163,10 +163,10 @@
"description": null,
"fork": false,
"created_at": "2021-12-29T07:32:30Z",
"updated_at": "2024-05-21T08:49:06Z",
"updated_at": "2024-06-23T08:38:08Z",
"pushed_at": "2021-12-31T08:30:33Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 79,
"watchers_count": 79,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -178,7 +178,7 @@
],
"visibility": "public",
"forks": 31,
"watchers": 78,
"watchers": 79,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-06-21T23:57:20Z",
"updated_at": "2024-06-23T09:18:40Z",
"pushed_at": "2024-04-05T06:46:47Z",
"stargazers_count": 228,
"watchers_count": 228,
"stargazers_count": 229,
"watchers_count": 229,
"has_discussions": true,
"forks_count": 32,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 32,
"watchers": 228,
"watchers": 229,
"score": 0,
"subscribers_count": 6
}

View file

@ -13,10 +13,10 @@
"description": " CVE-2023-21823 PoC",
"fork": false,
"created_at": "2023-04-20T11:26:48Z",
"updated_at": "2024-01-31T06:54:40Z",
"updated_at": "2024-06-23T10:25:02Z",
"pushed_at": "2023-04-20T11:36:55Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
}

View file

@ -107,10 +107,10 @@
"description": "一款用于生成winrar程序RCE即cve-2023-38831的POC的工具。",
"fork": false,
"created_at": "2023-08-27T14:08:36Z",
"updated_at": "2024-06-20T08:10:00Z",
"updated_at": "2024-06-23T07:47:12Z",
"pushed_at": "2023-08-27T14:35:00Z",
"stargazers_count": 107,
"watchers_count": 107,
"stargazers_count": 108,
"watchers_count": 108,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 107,
"watchers": 108,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,8 +13,8 @@
"description": "Exploit for file upload vulnerability in BoidCMS version <=2.0.0",
"fork": false,
"created_at": "2023-08-16T14:30:30Z",
"updated_at": "2024-01-22T17:53:30Z",
"pushed_at": "2023-09-06T05:59:05Z",
"updated_at": "2024-06-23T10:35:19Z",
"pushed_at": "2024-06-23T10:35:16Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely",
"fork": false,
"created_at": "2024-06-18T09:22:59Z",
"updated_at": "2024-06-21T13:48:41Z",
"updated_at": "2024-06-23T08:21:25Z",
"pushed_at": "2024-06-18T09:35:44Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},
@ -43,19 +43,19 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-06-23T05:36:00Z",
"updated_at": "2024-06-23T07:39:36Z",
"pushed_at": "2024-06-19T12:24:50Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 48,
"forks": 8,
"watchers": 51,
"score": 0,
"subscribers_count": 1
}

View file

@ -133,19 +133,19 @@
"description": null,
"fork": false,
"created_at": "2024-06-23T06:03:44Z",
"updated_at": "2024-06-23T06:09:13Z",
"updated_at": "2024-06-23T10:34:14Z",
"pushed_at": "2024-06-23T06:09:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 0,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 3,
"watchers": 9,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
"fork": false,
"created_at": "2024-06-10T17:02:03Z",
"updated_at": "2024-06-22T18:03:47Z",
"updated_at": "2024-06-23T09:05:50Z",
"pushed_at": "2024-06-17T19:46:27Z",
"stargazers_count": 240,
"watchers_count": 240,
"stargazers_count": 241,
"watchers_count": 241,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 240,
"watchers": 241,
"score": 0,
"subscribers_count": 2
},
@ -73,10 +73,10 @@
"description": "BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel",
"fork": false,
"created_at": "2024-06-12T11:11:16Z",
"updated_at": "2024-06-22T11:46:19Z",
"updated_at": "2024-06-23T09:11:09Z",
"pushed_at": "2024-06-13T07:30:48Z",
"stargazers_count": 198,
"watchers_count": 198,
"stargazers_count": 200,
"watchers_count": 200,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 198,
"watchers": 200,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,10 +43,10 @@
"description": "PoC for SQL Injection in CVE-2024-27956",
"fork": false,
"created_at": "2024-05-01T01:58:28Z",
"updated_at": "2024-06-17T17:32:31Z",
"updated_at": "2024-06-23T08:43:17Z",
"pushed_at": "2024-05-03T11:28:21Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 61,
"watchers": 62,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.",
"fork": false,
"created_at": "2024-06-19T01:46:33Z",
"updated_at": "2024-06-22T04:20:23Z",
"updated_at": "2024-06-23T10:50:18Z",
"pushed_at": "2024-06-19T01:52:05Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 18,
"watchers": 19,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2024-28999 SolarWinds Platform Race Condition Vulnerability - login page",
"fork": false,
"created_at": "2024-06-22T13:39:56Z",
"updated_at": "2024-06-23T06:22:26Z",
"updated_at": "2024-06-23T08:03:25Z",
"pushed_at": "2024-06-22T17:28:56Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -48,13 +48,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -73,10 +73,10 @@
"description": "POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20",
"fork": false,
"created_at": "2024-06-22T21:20:33Z",
"updated_at": "2024-06-22T22:29:27Z",
"updated_at": "2024-06-23T12:13:13Z",
"pushed_at": "2024-06-22T22:29:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -73,10 +73,10 @@
"description": "Exploit PoC for CVE-2024-32002",
"fork": false,
"created_at": "2024-05-17T19:33:08Z",
"updated_at": "2024-06-22T09:52:34Z",
"updated_at": "2024-06-23T08:04:56Z",
"pushed_at": "2024-05-19T07:12:00Z",
"stargazers_count": 450,
"watchers_count": 450,
"stargazers_count": 451,
"watchers_count": 451,
"has_discussions": false,
"forks_count": 125,
"allow_forking": true,
@ -90,7 +90,7 @@
],
"visibility": "public",
"forks": 125,
"watchers": 450,
"watchers": 451,
"score": 0,
"subscribers_count": 3
},
@ -1494,35 +1494,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 818878097,
"name": "git_rce",
"full_name": "Yitian26\/git_rce",
"owner": {
"login": "Yitian26",
"id": 98572277,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98572277?v=4",
"html_url": "https:\/\/github.com\/Yitian26"
},
"html_url": "https:\/\/github.com\/Yitian26\/git_rce",
"description": "poc for CVE-2024-32002",
"fork": false,
"created_at": "2024-06-23T06:10:06Z",
"updated_at": "2024-06-23T06:17:22Z",
"pushed_at": "2024-06-23T06:17:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -59,6 +59,36 @@
"score": 0,
"subscribers_count": 0
},
{
"id": 786123425,
"name": "CVE-2024-3400",
"full_name": "0x0d3ad\/CVE-2024-3400",
"owner": {
"login": "0x0d3ad",
"id": 18898977,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18898977?v=4",
"html_url": "https:\/\/github.com\/0x0d3ad"
},
"html_url": "https:\/\/github.com\/0x0d3ad\/CVE-2024-3400",
"description": "CVE-2024-3400",
"fork": false,
"created_at": "2024-04-13T14:00:31Z",
"updated_at": "2024-06-15T01:28:40Z",
"pushed_at": "2024-04-18T07:11:17Z",
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 49,
"score": 0,
"subscribers_count": 2
},
{
"id": 786201656,
"name": "CVE-2024-3400",

35
2024/CVE-2024-34312.json Normal file
View file

@ -0,0 +1,35 @@
[
{
"id": 818913831,
"name": "CVE-2024-34312",
"full_name": "vincentscode\/CVE-2024-34312",
"owner": {
"login": "vincentscode",
"id": 26576880,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26576880?v=4",
"html_url": "https:\/\/github.com\/vincentscode"
},
"html_url": "https:\/\/github.com\/vincentscode\/CVE-2024-34312",
"description": "☣️ This repository contains the description and a proof of concept for CVE-2024-34312",
"fork": false,
"created_at": "2024-06-23T08:37:44Z",
"updated_at": "2024-06-23T09:28:30Z",
"pushed_at": "2024-06-23T08:59:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"security-research"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

35
2024/CVE-2024-34313.json Normal file
View file

@ -0,0 +1,35 @@
[
{
"id": 818920157,
"name": "CVE-2024-34313",
"full_name": "vincentscode\/CVE-2024-34313",
"owner": {
"login": "vincentscode",
"id": 26576880,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26576880?v=4",
"html_url": "https:\/\/github.com\/vincentscode"
},
"html_url": "https:\/\/github.com\/vincentscode\/CVE-2024-34313",
"description": "☣️ This repository contains the description and a proof of concept for CVE-2024-34313",
"fork": false,
"created_at": "2024-06-23T09:02:07Z",
"updated_at": "2024-06-23T09:28:48Z",
"pushed_at": "2024-06-23T09:20:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"security-research"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 69,
"watchers_count": 69,
"has_discussions": false,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 12,
"watchers": 69,
"score": 0,
"subscribers_count": 2

View file

@ -163,10 +163,10 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-06-23T03:07:23Z",
"updated_at": "2024-06-23T12:25:08Z",
"pushed_at": "2024-06-22T15:13:52Z",
"stargazers_count": 140,
"watchers_count": 140,
"stargazers_count": 141,
"watchers_count": 141,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 140,
"watchers": 141,
"score": 0,
"subscribers_count": 4
},
@ -1024,10 +1024,10 @@
"description": "CVE-2024-4577 POC",
"fork": false,
"created_at": "2024-06-17T17:53:31Z",
"updated_at": "2024-06-18T06:07:43Z",
"updated_at": "2024-06-23T10:59:38Z",
"pushed_at": "2024-06-17T17:59:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1036,7 +1036,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -515,6 +515,7 @@
- [Yuvvi01/CVE-2024-3400](https://github.com/Yuvvi01/CVE-2024-3400)
- [CerTusHack/CVE-2024-3400-PoC](https://github.com/CerTusHack/CVE-2024-3400-PoC)
- [0x0d3ad/CVE-2024-3400](https://github.com/0x0d3ad/CVE-2024-3400)
- [FoxyProxys/CVE-2024-3400](https://github.com/FoxyProxys/CVE-2024-3400)
- [momika233/CVE-2024-3400](https://github.com/momika233/CVE-2024-3400)
- [MrR0b0t19/CVE-2024-3400](https://github.com/MrR0b0t19/CVE-2024-3400)
@ -2522,7 +2523,6 @@
- [tobelight/cve_2024_32002](https://github.com/tobelight/cve_2024_32002)
- [Basyaact/CVE-2024-32002-PoC_Chinese](https://github.com/Basyaact/CVE-2024-32002-PoC_Chinese)
- [bonnettheo/CVE-2024-32002](https://github.com/bonnettheo/CVE-2024-32002)
- [Yitian26/git_rce](https://github.com/Yitian26/git_rce)
### CVE-2024-32004 (2024-05-14)
@ -2726,6 +2726,12 @@
- [3309899621/CVE-2024-34310](https://github.com/3309899621/CVE-2024-34310)
### CVE-2024-34312
- [vincentscode/CVE-2024-34312](https://github.com/vincentscode/CVE-2024-34312)
### CVE-2024-34313
- [vincentscode/CVE-2024-34313](https://github.com/vincentscode/CVE-2024-34313)
### CVE-2024-34351 (2024-05-09)
<code>Next.js is a React framework that can provide building blocks to create web applications. A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions. If the `Host` header is modified, and the below conditions are also met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself. The required conditions are 1) Next.js is running in a self-hosted manner; 2) the Next.js application makes use of Server Actions; and 3) the Server Action performs a redirect to a relative path which starts with a `/`. This vulnerability was fixed in Next.js `14.1.1`.