diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index c3ffa31ae4..e98a06d3ad 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -14,19 +14,19 @@ "description": "A checker (site and tool) for CVE-2014-0160", "fork": false, "created_at": "2014-04-07T23:03:09Z", - "updated_at": "2025-01-06T17:00:55Z", + "updated_at": "2025-01-15T19:31:48Z", "pushed_at": "2021-02-24T09:17:24Z", - "stargazers_count": 2304, - "watchers_count": 2304, + "stargazers_count": 2305, + "watchers_count": 2305, "has_discussions": false, - "forks_count": 461, + "forks_count": 462, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 461, - "watchers": 2304, + "forks": 462, + "watchers": 2305, "score": 0, "subscribers_count": 117 }, diff --git a/2017/CVE-2017-5638.json b/2017/CVE-2017-5638.json index df81b5feab..4e7fb6ee1c 100644 --- a/2017/CVE-2017-5638.json +++ b/2017/CVE-2017-5638.json @@ -2238,8 +2238,8 @@ "description": "Proof of concept of CVE-2017-5638 including the whole setup of the Apache vulnerable server", "fork": false, "created_at": "2024-12-08T17:22:38Z", - "updated_at": "2024-12-10T17:11:02Z", - "pushed_at": "2024-12-10T17:10:58Z", + "updated_at": "2025-01-15T19:45:00Z", + "pushed_at": "2025-01-15T19:44:58Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2018/CVE-2018-16763.json b/2018/CVE-2018-16763.json index b8a18a4fa3..5323678ed3 100644 --- a/2018/CVE-2018-16763.json +++ b/2018/CVE-2018-16763.json @@ -513,5 +513,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 916783216, + "name": "CVE-2018-16763", + "full_name": "Kz0x-337\/CVE-2018-16763", + "owner": { + "login": "Kz0x-337", + "id": 193463900, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/193463900?v=4", + "html_url": "https:\/\/github.com\/Kz0x-337", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Kz0x-337\/CVE-2018-16763", + "description": null, + "fork": false, + "created_at": "2025-01-14T18:48:30Z", + "updated_at": "2025-01-15T18:22:35Z", + "pushed_at": "2025-01-15T18:22:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-9992.json b/2020/CVE-2020-9992.json index 030f56bb05..ff2e4c3c54 100644 --- a/2020/CVE-2020-9992.json +++ b/2020/CVE-2020-9992.json @@ -28,6 +28,6 @@ "forks": 11, "watchers": 66, "score": 0, - "subscribers_count": 7 + "subscribers_count": 6 } ] \ No newline at end of file diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 29e989b072..e68926ac95 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -967,10 +967,10 @@ "description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation", "fork": false, "created_at": "2022-01-26T14:26:10Z", - "updated_at": "2025-01-13T01:09:22Z", + "updated_at": "2025-01-15T20:03:57Z", "pushed_at": "2022-06-21T14:52:05Z", - "stargazers_count": 1105, - "watchers_count": 1105, + "stargazers_count": 1106, + "watchers_count": 1106, "has_discussions": false, "forks_count": 194, "allow_forking": true, @@ -981,7 +981,7 @@ ], "visibility": "public", "forks": 194, - "watchers": 1105, + "watchers": 1106, "score": 0, "subscribers_count": 14 }, diff --git a/2022/CVE-2022-0332.json b/2022/CVE-2022-0332.json index 303a00cb76..8fa6e094d8 100644 --- a/2022/CVE-2022-0332.json +++ b/2022/CVE-2022-0332.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2022-01-25T23:58:17Z", - "updated_at": "2024-08-12T20:20:04Z", + "updated_at": "2025-01-15T18:26:52Z", "pushed_at": "2022-01-26T00:18:26Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 45, + "watchers_count": 45, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 44, + "watchers": 45, "score": 0, "subscribers_count": 4 } diff --git a/2023/CVE-2023-23752.json b/2023/CVE-2023-23752.json index f6c3a560fe..70d1bba395 100644 --- a/2023/CVE-2023-23752.json +++ b/2023/CVE-2023-23752.json @@ -421,10 +421,10 @@ "description": "Joomla! < 4.2.8 - Unauthenticated information disclosure", "fork": false, "created_at": "2023-03-24T11:50:16Z", - "updated_at": "2024-12-17T04:46:40Z", + "updated_at": "2025-01-15T22:38:05Z", "pushed_at": "2023-12-27T11:30:46Z", - "stargazers_count": 81, - "watchers_count": 81, + "stargazers_count": 82, + "watchers_count": 82, "has_discussions": false, "forks_count": 17, "allow_forking": true, @@ -440,7 +440,7 @@ ], "visibility": "public", "forks": 17, - "watchers": 81, + "watchers": 82, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index e453cf2d96..9a2e55ca26 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,10 +14,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2025-01-15T06:22:32Z", + "updated_at": "2025-01-15T20:51:33Z", "pushed_at": "2024-08-18T08:26:46Z", - "stargazers_count": 1385, - "watchers_count": 1385, + "stargazers_count": 1387, + "watchers_count": 1387, "has_discussions": false, "forks_count": 238, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 238, - "watchers": 1385, + "watchers": 1387, "score": 0, "subscribers_count": 21 }, diff --git a/2023/CVE-2023-46805.json b/2023/CVE-2023-46805.json index 7965c081f9..32308abba3 100644 --- a/2023/CVE-2023-46805.json +++ b/2023/CVE-2023-46805.json @@ -272,7 +272,7 @@ "fork": false, "created_at": "2025-01-14T12:54:19Z", "updated_at": "2025-01-14T22:44:39Z", - "pushed_at": "2025-01-15T15:29:40Z", + "pushed_at": "2025-01-15T19:28:03Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-46818.json b/2023/CVE-2023-46818.json index a22de02f82..50d17e7eef 100644 --- a/2023/CVE-2023-46818.json +++ b/2023/CVE-2023-46818.json @@ -14,10 +14,10 @@ "description": "CVE-2023-46818 IPSConfig Python exploit", "fork": false, "created_at": "2024-10-08T11:22:16Z", - "updated_at": "2024-10-08T11:46:57Z", + "updated_at": "2025-01-15T22:47:02Z", "pushed_at": "2024-10-08T11:46:54Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-21887.json b/2024/CVE-2024-21887.json index f5d9a53ea1..ab2d27fc01 100644 --- a/2024/CVE-2024-21887.json +++ b/2024/CVE-2024-21887.json @@ -232,7 +232,7 @@ "fork": false, "created_at": "2025-01-14T12:54:19Z", "updated_at": "2025-01-14T22:44:39Z", - "pushed_at": "2025-01-15T15:29:40Z", + "pushed_at": "2025-01-15T19:28:03Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json index 63549bc49a..9e016315dc 100644 --- a/2024/CVE-2024-30088.json +++ b/2024/CVE-2024-30088.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-06-24T10:37:26Z", - "updated_at": "2025-01-05T12:50:13Z", + "updated_at": "2025-01-15T19:04:55Z", "pushed_at": "2024-07-31T19:11:55Z", - "stargazers_count": 246, - "watchers_count": 246, + "stargazers_count": 247, + "watchers_count": 247, "has_discussions": false, "forks_count": 54, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 54, - "watchers": 246, + "watchers": 247, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index 86827f04f9..64daa481ef 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -1779,10 +1779,10 @@ "description": "SSH EXPLOIT BYPASS AUTH SSH", "fork": false, "created_at": "2024-07-05T12:02:10Z", - "updated_at": "2024-08-06T14:09:40Z", + "updated_at": "2025-01-15T23:40:18Z", "pushed_at": "2024-07-05T12:03:22Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -1791,7 +1791,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-41018.json b/2024/CVE-2024-41018.json new file mode 100644 index 0000000000..44ccb0be98 --- /dev/null +++ b/2024/CVE-2024-41018.json @@ -0,0 +1,33 @@ +[ + { + "id": 917314342, + "name": "CVE-2024-41018", + "full_name": "LLfam\/CVE-2024-41018", + "owner": { + "login": "LLfam", + "id": 43279891, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43279891?v=4", + "html_url": "https:\/\/github.com\/LLfam", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/LLfam\/CVE-2024-41018", + "description": null, + "fork": false, + "created_at": "2025-01-15T18:49:24Z", + "updated_at": "2025-01-15T18:49:25Z", + "pushed_at": "2025-01-15T18:49:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-49138.json b/2024/CVE-2024-49138.json index 2b97e82e1f..7af300d39a 100644 --- a/2024/CVE-2024-49138.json +++ b/2024/CVE-2024-49138.json @@ -14,12 +14,12 @@ "description": "POC exploit for CVE-2024-49138", "fork": false, "created_at": "2025-01-15T00:43:37Z", - "updated_at": "2025-01-15T18:30:27Z", + "updated_at": "2025-01-16T00:26:21Z", "pushed_at": "2025-01-15T01:01:21Z", - "stargazers_count": 63, - "watchers_count": 63, + "stargazers_count": 82, + "watchers_count": 82, "has_discussions": false, - "forks_count": 8, + "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -30,8 +30,8 @@ "windows" ], "visibility": "public", - "forks": 8, - "watchers": 63, + "forks": 12, + "watchers": 82, "score": 0, "subscribers_count": 0 }, @@ -50,8 +50,8 @@ "description": "POC exploit for CVE-2024-49138", "fork": false, "created_at": "2025-01-15T16:14:34Z", - "updated_at": "2025-01-15T18:22:48Z", - "pushed_at": "2025-01-15T18:22:47Z", + "updated_at": "2025-01-16T00:25:09Z", + "pushed_at": "2025-01-16T00:25:08Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-50603.json b/2024/CVE-2024-50603.json index d7c3ce5271..1d4d33082a 100644 --- a/2024/CVE-2024-50603.json +++ b/2024/CVE-2024-50603.json @@ -14,19 +14,19 @@ "description": "CVE-2024-50603-nuclei-poc", "fork": false, "created_at": "2025-01-08T12:00:38Z", - "updated_at": "2025-01-10T20:45:22Z", + "updated_at": "2025-01-15T20:53:09Z", "pushed_at": "2025-01-08T12:08:46Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 3, + "forks": 2, + "watchers": 4, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-53691.json b/2024/CVE-2024-53691.json index 039f9109ce..b08adf3ed8 100644 --- a/2024/CVE-2024-53691.json +++ b/2024/CVE-2024-53691.json @@ -19,13 +19,13 @@ "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-54910.json b/2024/CVE-2024-54910.json index 8ae361b142..9b41889ba9 100644 --- a/2024/CVE-2024-54910.json +++ b/2024/CVE-2024-54910.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2025-01-07T18:24:46Z", - "updated_at": "2025-01-10T23:07:09Z", + "updated_at": "2025-01-15T22:11:56Z", "pushed_at": "2025-01-10T23:07:06Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-55968.json b/2024/CVE-2024-55968.json index 1017f299b2..3502c49177 100644 --- a/2024/CVE-2024-55968.json +++ b/2024/CVE-2024-55968.json @@ -14,8 +14,8 @@ "description": "Exploit POC Code for CVE-2024-55968", "fork": false, "created_at": "2024-12-17T21:07:59Z", - "updated_at": "2024-12-19T04:47:33Z", - "pushed_at": "2024-12-19T04:47:30Z", + "updated_at": "2025-01-15T22:14:20Z", + "pushed_at": "2025-01-15T22:14:19Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, @@ -45,8 +45,8 @@ "description": "POC for DTEX LPE (CVE-2024-55968)", "fork": false, "created_at": "2024-12-17T21:08:11Z", - "updated_at": "2024-12-17T21:28:14Z", - "pushed_at": "2024-12-17T21:14:29Z", + "updated_at": "2025-01-15T22:13:36Z", + "pushed_at": "2025-01-15T22:13:34Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, diff --git a/2024/CVE-2024-57522.json b/2024/CVE-2024-57522.json new file mode 100644 index 0000000000..ac6ff3100f --- /dev/null +++ b/2024/CVE-2024-57522.json @@ -0,0 +1,33 @@ +[ + { + "id": 917312774, + "name": "CVE-2024-57522", + "full_name": "HackWidMaddy\/CVE-2024-57522", + "owner": { + "login": "HackWidMaddy", + "id": 90766106, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90766106?v=4", + "html_url": "https:\/\/github.com\/HackWidMaddy", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/HackWidMaddy\/CVE-2024-57522", + "description": null, + "fork": false, + "created_at": "2025-01-15T18:45:35Z", + "updated_at": "2025-01-15T19:13:45Z", + "pushed_at": "2025-01-15T19:13:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-57523.json b/2024/CVE-2024-57523.json new file mode 100644 index 0000000000..01cd1a319b --- /dev/null +++ b/2024/CVE-2024-57523.json @@ -0,0 +1,33 @@ +[ + { + "id": 917317371, + "name": "CVE-2024-57523.", + "full_name": "HackWidMaddy\/CVE-2024-57523.", + "owner": { + "login": "HackWidMaddy", + "id": 90766106, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90766106?v=4", + "html_url": "https:\/\/github.com\/HackWidMaddy", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/HackWidMaddy\/CVE-2024-57523.", + "description": null, + "fork": false, + "created_at": "2025-01-15T18:56:30Z", + "updated_at": "2025-01-15T19:10:38Z", + "pushed_at": "2025-01-15T19:10:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2025/CVE-2025-0282.json b/2025/CVE-2025-0282.json index e098c20cfc..86079879e4 100644 --- a/2025/CVE-2025-0282.json +++ b/2025/CVE-2025-0282.json @@ -14,8 +14,8 @@ "description": "Safely detect if an Ivanti server is vulnerable to CVE-2025-0282", "fork": false, "created_at": "2025-01-09T18:43:08Z", - "updated_at": "2025-01-14T14:23:44Z", - "pushed_at": "2025-01-10T21:27:47Z", + "updated_at": "2025-01-15T20:25:53Z", + "pushed_at": "2025-01-15T20:25:51Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, @@ -108,7 +108,7 @@ "fork": false, "created_at": "2025-01-14T12:54:19Z", "updated_at": "2025-01-14T22:44:39Z", - "pushed_at": "2025-01-15T15:29:40Z", + "pushed_at": "2025-01-15T19:28:03Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2025/CVE-2025-21385.json b/2025/CVE-2025-21385.json new file mode 100644 index 0000000000..dab9232ade --- /dev/null +++ b/2025/CVE-2025-21385.json @@ -0,0 +1,33 @@ +[ + { + "id": 917419058, + "name": "CVE-2025-21385", + "full_name": "Pauloxc6\/CVE-2025-21385", + "owner": { + "login": "Pauloxc6", + "id": 94982491, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94982491?v=4", + "html_url": "https:\/\/github.com\/Pauloxc6", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Pauloxc6\/CVE-2025-21385", + "description": "The SSRF vulnerability in Microsoft Purview", + "fork": false, + "created_at": "2025-01-16T00:14:12Z", + "updated_at": "2025-01-16T00:21:15Z", + "pushed_at": "2025-01-16T00:17:00Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/README.md b/README.md index da74d03513..f68c2a0f03 100644 --- a/README.md +++ b/README.md @@ -11,6 +11,13 @@ - [AnonStorks/CVE-2025-0282-Full-version](https://github.com/AnonStorks/CVE-2025-0282-Full-version) - [rxwx/pulse-meter](https://github.com/rxwx/pulse-meter) +### CVE-2025-21385 (2025-01-09) + +A Server-Side Request Forgery (SSRF) vulnerability in Microsoft Purview allows an authorized attacker to disclose information over a network. + + +- [Pauloxc6/CVE-2025-21385](https://github.com/Pauloxc6/CVE-2025-21385) + ### CVE-2025-22352 (2025-01-07) Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ELEXtensions ELEX WooCommerce Advanced Bulk Edit Products, Prices & Attributes allows Blind SQL Injection.This issue affects ELEX WooCommerce Advanced Bulk Edit Products, Prices & Attributes: from n/a through 1.4.8. @@ -28,7 +35,11 @@ ### CVE-2025-22783 - [DoTTak/CVE-2025-22783](https://github.com/DoTTak/CVE-2025-22783) -### CVE-2025-22964 +### CVE-2025-22964 (2025-01-15) + +SQL Injection vulnerability in DDSN Net Pty Ltd (DDSN Interactive) DDSN Interactive cm3 Acora CMS 10.1.1 allows an attacker to execute arbitrary code via the table parameter. + + - [padayali-JD/CVE-2025-22964](https://github.com/padayali-JD/CVE-2025-22964) ### CVE-2025-22968 (2025-01-15) @@ -6501,6 +6512,13 @@ - [xen0bit/fwbt](https://github.com/xen0bit/fwbt) +### CVE-2024-41018 (2024-07-29) + +In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Add a check for attr_names and oatbl\n\nAdded out-of-bound checking for *ane (ATTR_NAME_ENTRY). + + +- [LLfam/CVE-2024-41018](https://github.com/LLfam/CVE-2024-41018) + ### CVE-2024-41107 (2024-07-19) The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and known or guessed username and other user details of a SAML-enabled CloudStack user-account. In such environments, this can result in a complete compromise of the resources owned and/or accessible by a SAML enabled user-account.\n\nAffected users are recommended to disable the SAML authentication plugin by setting the "saml2.enabled" global setting to "false", or upgrade to version 4.18.2.2, 4.19.1.0 or later, which addresses this issue.\n\n @@ -8083,7 +8101,11 @@ - [ThottySploity/CVE-2024-53376](https://github.com/ThottySploity/CVE-2024-53376) -### CVE-2024-53407 +### CVE-2024-53407 (2025-01-15) + +In Phiewer 4.1.0, a dylib injection leads to Command Execution which allow attackers to inject dylib file potentially leading to remote control and unauthorized access to sensitive user data. + + - [SyFi/CVE-2024-53407](https://github.com/SyFi/CVE-2024-53407) ### CVE-2024-53476 (2024-12-27) @@ -8247,7 +8269,11 @@ ### CVE-2024-55457 - [h13nh04ng/CVE-2024-55457-PoC](https://github.com/h13nh04ng/CVE-2024-55457-PoC) -### CVE-2024-55503 +### CVE-2024-55503 (2025-01-15) + +An issue in termius before v.9.9.0 allows a local attacker to execute arbitrary code via a crafted script to the DYLD_INSERT_LIBRARIES component. + + - [SyFi/CVE-2024-55503](https://github.com/SyFi/CVE-2024-55503) ### CVE-2024-55557 (2024-12-16) @@ -8423,6 +8449,12 @@ - [aaryan-11-x/CVE-2024-57487-and-CVE-2024-57488](https://github.com/aaryan-11-x/CVE-2024-57487-and-CVE-2024-57488) +### CVE-2024-57522 +- [HackWidMaddy/CVE-2024-57522](https://github.com/HackWidMaddy/CVE-2024-57522) + +### CVE-2024-57523 +- [HackWidMaddy/CVE-2024-57523.](https://github.com/HackWidMaddy/CVE-2024-57523.) + ### CVE-2024-1642470 - [Symbolexe/CVE-2024-1642470](https://github.com/Symbolexe/CVE-2024-1642470) @@ -42668,6 +42700,7 @@ - [VitoBonetti/CVE-2018-16763](https://github.com/VitoBonetti/CVE-2018-16763) - [saccles/CVE-2018-16763-Proof-of-Concept](https://github.com/saccles/CVE-2018-16763-Proof-of-Concept) - [altsun/CVE-2018-16763-FuelCMS-1.4.1-RCE](https://github.com/altsun/CVE-2018-16763-FuelCMS-1.4.1-RCE) +- [Kz0x-337/CVE-2018-16763](https://github.com/Kz0x-337/CVE-2018-16763) ### CVE-2018-16809 (2019-03-07)