diff --git a/2014/CVE-2014-5460.json b/2014/CVE-2014-5460.json index f6082fe671..1c0e293e4c 100644 --- a/2014/CVE-2014-5460.json +++ b/2014/CVE-2014-5460.json @@ -2,15 +2,15 @@ { "id": 589996875, "name": "CVE-2014-5460", - "full_name": "brookeses69\/CVE-2014-5460", + "full_name": "F-0x57\/CVE-2014-5460", "owner": { - "login": "brookeses69", + "login": "F-0x57", "id": 83194919, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83194919?v=4", - "html_url": "https:\/\/github.com\/brookeses69", + "html_url": "https:\/\/github.com\/F-0x57", "user_view_type": "public" }, - "html_url": "https:\/\/github.com\/brookeses69\/CVE-2014-5460", + "html_url": "https:\/\/github.com\/F-0x57\/CVE-2014-5460", "description": "CVE-2014-5460", "fork": false, "created_at": "2023-01-17T12:35:56Z", diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 473eaa7ed6..d469392cd5 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -143,7 +143,7 @@ "stargazers_count": 669, "watchers_count": 669, "has_discussions": false, - "forks_count": 197, + "forks_count": 196, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -151,7 +151,7 @@ "cve-2020-0796" ], "visibility": "public", - "forks": 197, + "forks": 196, "watchers": 669, "score": 0, "subscribers_count": 26 diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 68198dfd3e..8ffd27af57 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -176,10 +176,10 @@ "description": "Exploit for zerologon cve-2020-1472", "fork": false, "created_at": "2020-09-14T19:19:07Z", - "updated_at": "2024-12-18T20:38:18Z", + "updated_at": "2024-12-28T12:03:52Z", "pushed_at": "2020-10-15T18:31:15Z", - "stargazers_count": 639, - "watchers_count": 639, + "stargazers_count": 640, + "watchers_count": 640, "has_discussions": false, "forks_count": 147, "allow_forking": true, @@ -188,7 +188,7 @@ "topics": [], "visibility": "public", "forks": 147, - "watchers": 639, + "watchers": 640, "score": 0, "subscribers_count": 12 }, diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json index aaf076f6bb..0cd641b597 100644 --- a/2021/CVE-2021-22205.json +++ b/2021/CVE-2021-22205.json @@ -458,10 +458,10 @@ "description": "GitLab CE\/EE Preauth RCE using ExifTool", "fork": false, "created_at": "2021-11-11T04:34:07Z", - "updated_at": "2024-12-14T11:47:23Z", + "updated_at": "2024-12-28T09:16:22Z", "pushed_at": "2022-01-16T15:54:14Z", - "stargazers_count": 221, - "watchers_count": 221, + "stargazers_count": 222, + "watchers_count": 222, "has_discussions": false, "forks_count": 39, "allow_forking": true, @@ -477,7 +477,7 @@ ], "visibility": "public", "forks": 39, - "watchers": 221, + "watchers": 222, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index 5225233896..8abf70f0d7 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -204,10 +204,10 @@ "description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)", "fork": false, "created_at": "2021-02-18T05:42:13Z", - "updated_at": "2024-12-13T08:25:21Z", + "updated_at": "2024-12-28T07:43:36Z", "pushed_at": "2021-12-14T05:12:17Z", - "stargazers_count": 149, - "watchers_count": 149, + "stargazers_count": 150, + "watchers_count": 150, "has_discussions": false, "forks_count": 58, "allow_forking": true, @@ -216,7 +216,7 @@ "topics": [], "visibility": "public", "forks": 58, - "watchers": 149, + "watchers": 150, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 19925a5c71..edd74613d3 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -831,10 +831,10 @@ "description": "Root shell PoC for CVE-2021-3156", "fork": false, "created_at": "2021-02-03T19:57:56Z", - "updated_at": "2024-12-17T20:19:20Z", + "updated_at": "2024-12-28T11:22:59Z", "pushed_at": "2022-02-13T12:21:53Z", - "stargazers_count": 145, - "watchers_count": 145, + "stargazers_count": 146, + "watchers_count": 146, "has_discussions": false, "forks_count": 61, "allow_forking": true, @@ -843,7 +843,7 @@ "topics": [], "visibility": "public", "forks": 61, - "watchers": 145, + "watchers": 146, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index a737b80960..35289713cc 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -386,7 +386,7 @@ "stargazers_count": 1110, "watchers_count": 1110, "has_discussions": false, - "forks_count": 535, + "forks_count": 534, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -394,7 +394,7 @@ "log4shell" ], "visibility": "public", - "forks": 535, + "forks": 534, "watchers": 1110, "score": 0, "subscribers_count": 23 diff --git a/2022/CVE-2022-46463.json b/2022/CVE-2022-46463.json index db02b63488..5b3031784b 100644 --- a/2022/CVE-2022-46463.json +++ b/2022/CVE-2022-46463.json @@ -76,10 +76,10 @@ "description": "CVE-2022-46463 harbor公开镜像全自动下载脚本", "fork": false, "created_at": "2024-12-23T08:35:30Z", - "updated_at": "2024-12-24T11:26:52Z", + "updated_at": "2024-12-28T07:21:03Z", "pushed_at": "2024-12-23T08:40:16Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-32315.json b/2023/CVE-2023-32315.json index 36e04d67db..0ece21866a 100644 --- a/2023/CVE-2023-32315.json +++ b/2023/CVE-2023-32315.json @@ -50,13 +50,13 @@ "stargazers_count": 129, "watchers_count": 129, "has_discussions": false, - "forks_count": 31, + "forks_count": 32, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 31, + "forks": 32, "watchers": 129, "score": 0, "subscribers_count": 5 @@ -271,7 +271,7 @@ "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -281,7 +281,7 @@ "openfire" ], "visibility": "public", - "forks": 2, + "forks": 3, "watchers": 7, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-40028.json b/2023/CVE-2023-40028.json index a80937d238..f983b3757e 100644 --- a/2023/CVE-2023-40028.json +++ b/2023/CVE-2023-40028.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-03-23T15:25:49Z", - "updated_at": "2024-12-27T00:34:26Z", + "updated_at": "2024-12-28T09:53:36Z", "pushed_at": "2024-03-23T18:59:30Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 8dac45b378..e537a44885 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,10 +14,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-12-26T11:15:44Z", + "updated_at": "2024-12-28T11:30:43Z", "pushed_at": "2024-08-18T08:26:46Z", - "stargazers_count": 1312, - "watchers_count": 1312, + "stargazers_count": 1313, + "watchers_count": 1313, "has_discussions": false, "forks_count": 222, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 222, - "watchers": 1312, + "watchers": 1313, "score": 0, "subscribers_count": 21 }, diff --git a/2023/CVE-2023-46604.json b/2023/CVE-2023-46604.json index 231a4de4ce..442e508838 100644 --- a/2023/CVE-2023-46604.json +++ b/2023/CVE-2023-46604.json @@ -45,10 +45,10 @@ "description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具", "fork": false, "created_at": "2023-10-27T05:57:21Z", - "updated_at": "2024-12-27T08:11:46Z", + "updated_at": "2024-12-28T10:59:12Z", "pushed_at": "2024-01-29T02:28:11Z", - "stargazers_count": 234, - "watchers_count": 234, + "stargazers_count": 235, + "watchers_count": 235, "has_discussions": false, "forks_count": 29, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 29, - "watchers": 234, + "watchers": 235, "score": 0, "subscribers_count": 4 }, diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 14c80669a7..2fd019d87b 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -14,10 +14,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-12-25T17:01:10Z", + "updated_at": "2024-12-28T09:50:45Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 2311, - "watchers_count": 2311, + "stargazers_count": 2312, + "watchers_count": 2312, "has_discussions": false, "forks_count": 299, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 299, - "watchers": 2311, + "watchers": 2312, "score": 0, "subscribers_count": 26 }, diff --git a/2024/CVE-2024-11616.json b/2024/CVE-2024-11616.json new file mode 100644 index 0000000000..86060b4018 --- /dev/null +++ b/2024/CVE-2024-11616.json @@ -0,0 +1,33 @@ +[ + { + "id": 909318592, + "name": "CVE-2024-11616", + "full_name": "inb1ts\/CVE-2024-11616", + "owner": { + "login": "inb1ts", + "id": 87979502, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87979502?v=4", + "html_url": "https:\/\/github.com\/inb1ts", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/inb1ts\/CVE-2024-11616", + "description": "Crash PoC for exploiting Netskope Endpoint DLP double-fetch.", + "fork": false, + "created_at": "2024-12-28T10:48:23Z", + "updated_at": "2024-12-28T11:41:56Z", + "pushed_at": "2024-12-28T11:39:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-29824.json b/2024/CVE-2024-29824.json index 8698f47a4a..454203ad14 100644 --- a/2024/CVE-2024-29824.json +++ b/2024/CVE-2024-29824.json @@ -19,13 +19,13 @@ "stargazers_count": 23, "watchers_count": 23, "has_discussions": false, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 5, + "forks": 6, "watchers": 23, "score": 0, "subscribers_count": 5 diff --git a/2024/CVE-2024-30085.json b/2024/CVE-2024-30085.json index e7fb9c417a..76789883fc 100644 --- a/2024/CVE-2024-30085.json +++ b/2024/CVE-2024-30085.json @@ -29,5 +29,36 @@ "watchers": 2, "score": 0, "subscribers_count": 1 + }, + { + "id": 909306710, + "name": "Exploit-PoC-para-CVE-2024-30085", + "full_name": "murdok1982\/Exploit-PoC-para-CVE-2024-30085", + "owner": { + "login": "murdok1982", + "id": 14059710, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14059710?v=4", + "html_url": "https:\/\/github.com\/murdok1982", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/murdok1982\/Exploit-PoC-para-CVE-2024-30085", + "description": " Exploit en Python diseñado para aprovechar la vulnerabilidad de elevación de privilegios CVE-2024-30085", + "fork": false, + "created_at": "2024-12-28T10:03:26Z", + "updated_at": "2024-12-28T10:12:41Z", + "pushed_at": "2024-12-28T10:12:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json index b7b2c0a1e8..add79390a7 100644 --- a/2024/CVE-2024-4577.json +++ b/2024/CVE-2024-4577.json @@ -169,10 +169,10 @@ "description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC", "fork": false, "created_at": "2024-06-07T09:52:54Z", - "updated_at": "2024-12-26T06:26:46Z", + "updated_at": "2024-12-28T06:42:23Z", "pushed_at": "2024-06-22T15:13:52Z", - "stargazers_count": 243, - "watchers_count": 243, + "stargazers_count": 244, + "watchers_count": 244, "has_discussions": false, "forks_count": 52, "allow_forking": true, @@ -181,7 +181,7 @@ "topics": [], "visibility": "public", "forks": 52, - "watchers": 243, + "watchers": 244, "score": 0, "subscribers_count": 4 }, diff --git a/2024/CVE-2024-49039.json b/2024/CVE-2024-49039.json index 387c22dc38..d4e5644f83 100644 --- a/2024/CVE-2024-49039.json +++ b/2024/CVE-2024-49039.json @@ -14,10 +14,10 @@ "description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler", "fork": false, "created_at": "2024-11-19T08:57:18Z", - "updated_at": "2024-12-27T09:39:41Z", + "updated_at": "2024-12-28T09:46:37Z", "pushed_at": "2024-11-19T09:15:26Z", - "stargazers_count": 108, - "watchers_count": 108, + "stargazers_count": 109, + "watchers_count": 109, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 108, + "watchers": 109, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-50379.json b/2024/CVE-2024-50379.json index c3f649dd61..98fd813f1b 100644 --- a/2024/CVE-2024-50379.json +++ b/2024/CVE-2024-50379.json @@ -107,10 +107,10 @@ "description": "Apache Tomcat(CVE-2024-50379)条件竞争致远程代码执行漏洞批量检测脚本", "fork": false, "created_at": "2024-12-20T05:24:10Z", - "updated_at": "2024-12-23T07:43:06Z", + "updated_at": "2024-12-28T09:53:18Z", "pushed_at": "2024-12-20T05:41:23Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 2 }, @@ -200,10 +200,10 @@ "description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp", "fork": false, "created_at": "2024-12-23T07:20:47Z", - "updated_at": "2024-12-27T16:21:41Z", + "updated_at": "2024-12-28T09:53:36Z", "pushed_at": "2024-12-23T07:30:27Z", - "stargazers_count": 50, - "watchers_count": 50, + "stargazers_count": 51, + "watchers_count": 51, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -212,7 +212,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 50, + "watchers": 51, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-53375.json b/2024/CVE-2024-53375.json index 1eedd1d2af..ff1947bbe1 100644 --- a/2024/CVE-2024-53375.json +++ b/2024/CVE-2024-53375.json @@ -19,13 +19,13 @@ "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 7, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-8069.json b/2024/CVE-2024-8069.json index 5cb8737f54..c2d7dfa1dc 100644 --- a/2024/CVE-2024-8069.json +++ b/2024/CVE-2024-8069.json @@ -14,12 +14,12 @@ "description": "Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE", "fork": false, "created_at": "2024-11-13T02:50:56Z", - "updated_at": "2024-12-08T18:32:03Z", + "updated_at": "2024-12-28T07:43:14Z", "pushed_at": "2024-11-29T03:02:09Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -31,8 +31,8 @@ "vulnerability" ], "visibility": "public", - "forks": 0, - "watchers": 3, + "forks": 1, + "watchers": 4, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-8190.json b/2024/CVE-2024-8190.json index de8d79e214..9960083a38 100644 --- a/2024/CVE-2024-8190.json +++ b/2024/CVE-2024-8190.json @@ -19,13 +19,13 @@ "stargazers_count": 12, "watchers_count": 12, "has_discussions": false, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 12, "score": 0, "subscribers_count": 5 diff --git a/2024/CVE-2024-9234.json b/2024/CVE-2024-9234.json index f674762059..3ea2ac36e6 100644 --- a/2024/CVE-2024-9234.json +++ b/2024/CVE-2024-9234.json @@ -60,5 +60,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 909321616, + "name": "CVE-2024-9234", + "full_name": "Nxploited\/CVE-2024-9234", + "owner": { + "login": "Nxploited", + "id": 188819918, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4", + "html_url": "https:\/\/github.com\/Nxploited", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-9234", + "description": null, + "fork": false, + "created_at": "2024-12-28T11:00:02Z", + "updated_at": "2024-12-28T11:11:34Z", + "pushed_at": "2024-12-28T11:11:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-9464.json b/2024/CVE-2024-9464.json index e278efad47..6a88684efb 100644 --- a/2024/CVE-2024-9464.json +++ b/2024/CVE-2024-9464.json @@ -19,13 +19,13 @@ "stargazers_count": 44, "watchers_count": 44, "has_discussions": false, - "forks_count": 11, + "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 11, + "forks": 12, "watchers": 44, "score": 0, "subscribers_count": 4 diff --git a/2024/CVE-2024-9465.json b/2024/CVE-2024-9465.json index 3cf855fc2d..e11e496f1a 100644 --- a/2024/CVE-2024-9465.json +++ b/2024/CVE-2024-9465.json @@ -19,13 +19,13 @@ "stargazers_count": 27, "watchers_count": 27, "has_discussions": false, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 27, "score": 0, "subscribers_count": 4 diff --git a/README.md b/README.md index d018b88373..a05e32db16 100644 --- a/README.md +++ b/README.md @@ -1858,6 +1858,7 @@ - [RandomRobbieBF/CVE-2024-9234](https://github.com/RandomRobbieBF/CVE-2024-9234) - [CallMeBatosay/CVE-2024-9234](https://github.com/CallMeBatosay/CVE-2024-9234) +- [Nxploited/CVE-2024-9234](https://github.com/Nxploited/CVE-2024-9234) ### CVE-2024-9264 (2024-10-18) @@ -2349,6 +2350,13 @@ - [TheN00bBuilder/cve-2024-11477-writeup](https://github.com/TheN00bBuilder/cve-2024-11477-writeup) +### CVE-2024-11616 (2024-12-19) + +Netskope was made aware of a security vulnerability in Netskope Endpoint DLP’s Content Control Driver where a double-fetch issue leads to heap overflow. The vulnerability arises from the fact that the NumberOfBytes argument to ExAllocatePoolWithTag, and the Length argument for RtlCopyMemory, both independently dereference their value from the user supplied input buffer inside the EpdlpSetUsbAction function, known as a double-fetch. If this length value grows to a higher value in between these two calls, it will result in the RtlCopyMemory call copying user-supplied memory contents outside the range of the allocated buffer, resulting in a heap overflow. A malicious attacker will need admin privileges to exploit the issue.\nThis issue affects Endpoint DLP version below R119. + + +- [inb1ts/CVE-2024-11616](https://github.com/inb1ts/CVE-2024-11616) + ### CVE-2024-11680 (2024-11-26) ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript. @@ -4516,6 +4524,7 @@ - [Adamkadaban/CVE-2024-30085](https://github.com/Adamkadaban/CVE-2024-30085) +- [murdok1982/Exploit-PoC-para-CVE-2024-30085](https://github.com/murdok1982/Exploit-PoC-para-CVE-2024-30085) ### CVE-2024-30088 (2024-06-11) @@ -47794,7 +47803,7 @@ Unrestricted file upload vulnerability in the Tribulant Slideshow Gallery plugin before 1.4.7 for WordPress allows remote authenticated users to execute arbitrary code by uploading a PHP file, then accessing it via a direct request to the file in wp-content/uploads/slideshow-gallery/. -- [brookeses69/CVE-2014-5460](https://github.com/brookeses69/CVE-2014-5460) +- [F-0x57/CVE-2014-5460](https://github.com/F-0x57/CVE-2014-5460) ### CVE-2014-6271 (2014-09-24)