Auto Update 2024/03/04 12:27:12

This commit is contained in:
motikan2010-bot 2024-03-04 21:27:12 +09:00
parent 02bfa29faa
commit c0d77dd5b2
28 changed files with 197 additions and 119 deletions

View file

@ -1043,13 +1043,13 @@
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 42,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 42,
"forks": 43,
"watchers": 77,
"score": 0,
"subscribers_count": 6

View file

@ -48,13 +48,13 @@
"stargazers_count": 495,
"watchers_count": 495,
"has_discussions": false,
"forks_count": 122,
"forks_count": 121,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 122,
"forks": 121,
"watchers": 495,
"score": 0,
"subscribers_count": 22

View file

@ -890,10 +890,10 @@
"description": "SSH Username Enumeration ",
"fork": false,
"created_at": "2023-09-17T22:40:49Z",
"updated_at": "2023-09-18T02:40:09Z",
"updated_at": "2024-03-04T11:18:05Z",
"pushed_at": "2023-09-27T16:52:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -902,7 +902,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2018-4280: Mach port replacement vulnerability in launchd on macOS 10.13.5 leading to local privilege escalation and SIP bypass.",
"fork": false,
"created_at": "2018-01-22T06:22:59Z",
"updated_at": "2024-02-24T11:42:06Z",
"updated_at": "2024-03-04T07:24:38Z",
"pushed_at": "2018-10-28T20:23:30Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 59,
"watchers": 60,
"score": 0,
"subscribers_count": 7
},

File diff suppressed because one or more lines are too long

View file

@ -13,10 +13,10 @@
"description": "telegram bug that discloses user's hidden phone number (still unpatched) (exploit included) ",
"fork": false,
"created_at": "2021-12-21T19:23:09Z",
"updated_at": "2024-02-28T16:07:13Z",
"updated_at": "2024-03-04T08:46:40Z",
"pushed_at": "2021-12-19T18:18:36Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 0
}

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-03-03T03:12:55Z",
"updated_at": "2024-03-04T06:29:40Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3996,
"watchers_count": 3996,
"stargazers_count": 3997,
"watchers_count": 3997,
"has_discussions": false,
"forks_count": 1079,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1079,
"watchers": 3996,
"watchers": 3997,
"score": 0,
"subscribers_count": 152
},

View file

@ -1690,10 +1690,10 @@
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
"fork": false,
"created_at": "2020-06-10T16:44:39Z",
"updated_at": "2024-02-24T07:06:54Z",
"updated_at": "2024-03-04T10:51:19Z",
"pushed_at": "2022-03-30T14:02:04Z",
"stargazers_count": 242,
"watchers_count": 242,
"stargazers_count": 241,
"watchers_count": 241,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
@ -1702,7 +1702,7 @@
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 242,
"watchers": 241,
"score": 0,
"subscribers_count": 7
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-03-03T03:12:55Z",
"updated_at": "2024-03-04T06:29:40Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3996,
"watchers_count": 3996,
"stargazers_count": 3997,
"watchers_count": 3997,
"has_discussions": false,
"forks_count": 1079,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1079,
"watchers": 3996,
"watchers": 3997,
"score": 0,
"subscribers_count": 152
},
@ -63,10 +63,10 @@
"description": "CVE-202014882、CVE-202014883",
"fork": false,
"created_at": "2020-10-28T11:43:37Z",
"updated_at": "2024-02-22T12:11:37Z",
"updated_at": "2024-03-04T07:00:51Z",
"pushed_at": "2020-11-16T04:23:09Z",
"stargazers_count": 280,
"watchers_count": 280,
"stargazers_count": 281,
"watchers_count": 281,
"has_discussions": false,
"forks_count": 63,
"allow_forking": true,
@ -75,7 +75,7 @@
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 280,
"watchers": 281,
"score": 0,
"subscribers_count": 8
},
@ -723,7 +723,7 @@
"description": "Check YouTube - https:\/\/youtu.be\/O0ZnLXRY5Wo",
"fork": false,
"created_at": "2021-05-10T21:32:36Z",
"updated_at": "2024-02-05T10:40:36Z",
"updated_at": "2024-03-04T10:36:55Z",
"pushed_at": "2021-09-16T07:25:22Z",
"stargazers_count": 4,
"watchers_count": 4,

View file

@ -13,10 +13,10 @@
"description": "[CVE-2020-14882] Oracle WebLogic Server Authenticated Remote Code Execution (RCE)",
"fork": false,
"created_at": "2020-11-09T15:26:28Z",
"updated_at": "2024-02-20T04:09:58Z",
"updated_at": "2024-03-04T07:19:55Z",
"pushed_at": "2020-11-09T17:21:45Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,12 +13,12 @@
"description": "Demonstration of the WP Visitor Statistics plugin exploit",
"fork": false,
"created_at": "2022-01-14T21:19:43Z",
"updated_at": "2022-01-25T10:27:14Z",
"updated_at": "2024-03-04T06:29:35Z",
"pushed_at": "2022-01-18T08:59:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -27,8 +27,8 @@
"wordpress"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -752,10 +752,10 @@
"description": "CVE-2021-3129",
"fork": false,
"created_at": "2024-01-15T07:12:07Z",
"updated_at": "2024-02-06T02:11:03Z",
"updated_at": "2024-03-04T10:12:53Z",
"pushed_at": "2024-01-15T07:15:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -764,7 +764,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
"updated_at": "2024-02-27T03:00:34Z",
"updated_at": "2024-03-04T08:48:02Z",
"pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 222,
"watchers_count": 222,
"stargazers_count": 223,
"watchers_count": 223,
"has_discussions": false,
"forks_count": 73,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 73,
"watchers": 222,
"watchers": 223,
"score": 0,
"subscribers_count": 5
},

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-03-04T00:51:46Z",
"updated_at": "2024-03-04T10:51:22Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1722,
"watchers_count": 1722,
"stargazers_count": 1721,
"watchers_count": 1721,
"has_discussions": false,
"forks_count": 509,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 509,
"watchers": 1722,
"watchers": 1721,
"score": 0,
"subscribers_count": 28
},
@ -3671,13 +3671,13 @@
"stargazers_count": 3336,
"watchers_count": 3336,
"has_discussions": true,
"forks_count": 738,
"forks_count": 739,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 738,
"forks": 739,
"watchers": 3336,
"score": 0,
"subscribers_count": 58
@ -8850,10 +8850,10 @@
"description": "Exploiting CVE-2021-44228 in vCenter for remote code execution and more. ",
"fork": false,
"created_at": "2021-12-19T14:48:30Z",
"updated_at": "2024-01-25T08:55:14Z",
"updated_at": "2024-03-04T09:03:13Z",
"pushed_at": "2021-12-22T15:56:21Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -8862,7 +8862,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 93,
"watchers": 94,
"score": 0,
"subscribers_count": 7
},

View file

@ -257,10 +257,10 @@
"description": "警惕 一种针对红队的新型溯源手段!",
"fork": false,
"created_at": "2022-07-27T15:48:19Z",
"updated_at": "2024-02-02T09:12:26Z",
"updated_at": "2024-03-04T08:09:39Z",
"pushed_at": "2022-07-27T15:55:01Z",
"stargazers_count": 378,
"watchers_count": 378,
"stargazers_count": 379,
"watchers_count": 379,
"has_discussions": false,
"forks_count": 85,
"allow_forking": true,
@ -269,7 +269,7 @@
"topics": [],
"visibility": "public",
"forks": 85,
"watchers": 378,
"watchers": 379,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,19 +13,19 @@
"description": "PoC script for CVE-2023-20110 - Cisco Smart Software Manager On-Prem SQL Injection Vulnerability",
"fork": false,
"created_at": "2023-07-16T10:53:51Z",
"updated_at": "2023-08-17T01:25:00Z",
"updated_at": "2024-03-04T10:01:29Z",
"pushed_at": "2023-07-16T11:11:33Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 5,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 16,
"forks": 4,
"watchers": 17,
"score": 0,
"subscribers_count": 1
}

View file

@ -667,7 +667,7 @@
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -677,7 +677,7 @@
"masscan"
],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 33,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "POC for Veeam Backup and Replication CVE-2023-27532",
"fork": false,
"created_at": "2023-03-18T16:20:53Z",
"updated_at": "2024-03-01T09:31:59Z",
"updated_at": "2024-03-04T09:47:41Z",
"pushed_at": "2023-03-28T18:21:55Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 53,
"watchers": 54,
"score": 0,
"subscribers_count": 4
},

View file

@ -43,10 +43,10 @@
"description": "POC FortiOS SSL-VPN buffer overflow vulnerability",
"fork": false,
"created_at": "2023-06-16T03:25:19Z",
"updated_at": "2024-02-29T11:58:15Z",
"updated_at": "2024-03-04T09:07:15Z",
"pushed_at": "2023-06-16T03:28:34Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 22,
"watchers": 23,
"score": 0,
"subscribers_count": 1
},
@ -73,10 +73,10 @@
"description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing",
"fork": false,
"created_at": "2023-06-16T20:15:36Z",
"updated_at": "2024-02-29T11:58:21Z",
"updated_at": "2024-03-04T08:46:29Z",
"pushed_at": "2023-06-20T21:32:56Z",
"stargazers_count": 116,
"watchers_count": 116,
"stargazers_count": 117,
"watchers_count": 117,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 116,
"watchers": 117,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-02-07T03:51:34Z",
"updated_at": "2024-02-28T13:13:17Z",
"updated_at": "2024-03-04T07:36:50Z",
"pushed_at": "2024-02-07T06:34:02Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite \"Lazy Bundle\" mitigation",
"fork": false,
"created_at": "2024-01-20T07:14:06Z",
"updated_at": "2024-03-04T00:14:10Z",
"updated_at": "2024-03-04T06:29:57Z",
"pushed_at": "2024-01-21T05:04:01Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 56,
"watchers": 57,
"score": 0,
"subscribers_count": 3
}

32
2023/CVE-2023-6548.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 766855313,
"name": "CVE-2023-6548-POC",
"full_name": "Roonye660\/CVE-2023-6548-POC",
"owner": {
"login": "Roonye660",
"id": 162106909,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/162106909?v=4",
"html_url": "https:\/\/github.com\/Roonye660"
},
"html_url": "https:\/\/github.com\/Roonye660\/CVE-2023-6548-POC",
"description": "0day for Citrix Netscaler ADC and NetScaler Gateway latest versions",
"fork": false,
"created_at": "2024-03-04T08:57:27Z",
"updated_at": "2024-03-04T09:36:33Z",
"pushed_at": "2024-03-04T09:36:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-0519.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 766892942,
"name": "CVE-2024-0519-Chrome-exploit",
"full_name": "JohnHormond\/CVE-2024-0519-Chrome-exploit",
"owner": {
"login": "JohnHormond",
"id": 162117232,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/162117232?v=4",
"html_url": "https:\/\/github.com\/JohnHormond"
},
"html_url": "https:\/\/github.com\/JohnHormond\/CVE-2024-0519-Chrome-exploit",
"description": "Execute arbitrary code on the victims device, compromising data security and system integrity in Chrome 120.0.6099",
"fork": false,
"created_at": "2024-03-04T10:25:06Z",
"updated_at": "2024-03-04T10:40:12Z",
"pushed_at": "2024-03-04T10:40:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC",
"fork": false,
"created_at": "2024-02-15T19:57:38Z",
"updated_at": "2024-03-02T01:19:21Z",
"updated_at": "2024-03-04T09:13:18Z",
"pushed_at": "2024-02-17T07:08:49Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 117,
"watchers_count": 117,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 115,
"watchers": 117,
"score": 0,
"subscribers_count": 4
},

View file

@ -73,10 +73,10 @@
"description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762",
"fork": false,
"created_at": "2024-02-28T21:16:10Z",
"updated_at": "2024-03-04T04:57:33Z",
"updated_at": "2024-03-04T08:34:24Z",
"pushed_at": "2024-03-01T20:02:52Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 24,
"watchers": 25,
"score": 0,
"subscribers_count": 1
},

View file

@ -73,19 +73,19 @@
"description": "CVE-2024-23897",
"fork": false,
"created_at": "2024-01-26T09:44:32Z",
"updated_at": "2024-02-26T02:49:43Z",
"updated_at": "2024-03-04T08:58:40Z",
"pushed_at": "2024-01-28T06:47:28Z",
"stargazers_count": 151,
"watchers_count": 151,
"stargazers_count": 152,
"watchers_count": 152,
"has_discussions": false,
"forks_count": 27,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 151,
"forks": 28,
"watchers": 152,
"score": 0,
"subscribers_count": 2
},
@ -256,10 +256,10 @@
"description": "CVE-2024-23897 - Jenkins 任意文件读取 利用工具",
"fork": false,
"created_at": "2024-01-27T19:34:48Z",
"updated_at": "2024-02-23T07:43:29Z",
"updated_at": "2024-03-04T08:41:42Z",
"pushed_at": "2024-01-28T15:02:45Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -272,7 +272,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 37,
"watchers": 38,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Unauthenticated Remote Code Execution Bricks <= 1.9.6",
"fork": false,
"created_at": "2024-02-20T20:16:09Z",
"updated_at": "2024-03-02T04:02:50Z",
"updated_at": "2024-03-04T11:15:15Z",
"pushed_at": "2024-02-25T21:50:09Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 95,
"watchers_count": 95,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 94,
"watchers": 95,
"score": 0,
"subscribers_count": 1
},

View file

@ -28,6 +28,13 @@
- [ch4nui/CVE-2024-0402-RCE](https://github.com/ch4nui/CVE-2024-0402-RCE)
### CVE-2024-0519 (2024-01-16)
<code>Out of bounds memory access in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
</code>
- [JohnHormond/CVE-2024-0519-Chrome-exploit](https://github.com/JohnHormond/CVE-2024-0519-Chrome-exploit)
### CVE-2024-0679 (2024-01-20)
<code>The ColorMag theme for WordPress is vulnerable to unauthorized access due to a missing capability check on the plugin_action_callback() function in all versions up to, and including, 3.1.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to install and activate arbitrary plugins.
@ -1909,6 +1916,13 @@
- [Arszilla/CVE-2023-6538](https://github.com/Arszilla/CVE-2023-6538)
### CVE-2023-6548 (2024-01-17)
<code>Improper Control of Generation of Code ('Code Injection') in NetScaler ADC and NetScaler Gateway allows an attacker with access to NSIP, CLIP or SNIP with management interface to perform Authenticated (low privileged) remote code execution on Management Interface.
</code>
- [Roonye660/CVE-2023-6548-POC](https://github.com/Roonye660/CVE-2023-6548-POC)
### CVE-2023-6553 (2023-12-15)
<code>The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file. This is due to an attacker being able to control the values passed to an include, and subsequently leverage that to achieve remote code execution. This makes it possible for unauthenticated attackers to easily execute code on the server.