diff --git a/2018/CVE-2018-1000531.json b/2018/CVE-2018-1000531.json index 2e5c038cd9..e80c019be2 100644 --- a/2018/CVE-2018-1000531.json +++ b/2018/CVE-2018-1000531.json @@ -14,10 +14,10 @@ "description": "Jwt Bruteforcer with CVE-2018-1000531 Test", "fork": false, "created_at": "2024-11-15T21:00:24Z", - "updated_at": "2024-11-15T21:05:48Z", + "updated_at": "2024-11-17T13:52:56Z", "pushed_at": "2024-11-15T21:05:45Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 5bb4408ffd..9baebfa9ba 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -1009,7 +1009,7 @@ "stargazers_count": 181, "watchers_count": 181, "has_discussions": false, - "forks_count": 29, + "forks_count": 30, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -1018,7 +1018,7 @@ "cve-2021-34527" ], "visibility": "public", - "forks": 29, + "forks": 30, "watchers": 181, "score": 0, "subscribers_count": 6 diff --git a/2021/CVE-2021-34081.json b/2021/CVE-2021-34081.json new file mode 100644 index 0000000000..ca5fc85ff7 --- /dev/null +++ b/2021/CVE-2021-34081.json @@ -0,0 +1,33 @@ +[ + { + "id": 889983489, + "name": "CVEX-Record", + "full_name": "jason-rodrigues\/CVEX-Record", + "owner": { + "login": "jason-rodrigues", + "id": 97640916, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97640916?v=4", + "html_url": "https:\/\/github.com\/jason-rodrigues", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/jason-rodrigues\/CVEX-Record", + "description": "CVE-2021-34081", + "fork": false, + "created_at": "2024-11-17T18:17:01Z", + "updated_at": "2024-11-17T18:18:11Z", + "pushed_at": "2024-11-17T18:17:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index b61e65b6ca..f6c3f91600 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -55,13 +55,13 @@ "stargazers_count": 802, "watchers_count": 802, "has_discussions": false, - "forks_count": 122, + "forks_count": 123, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 122, + "forks": 123, "watchers": 802, "score": 0, "subscribers_count": 13 diff --git a/2021/CVE-2021-43798.json b/2021/CVE-2021-43798.json index cd5674c533..521d606885 100644 --- a/2021/CVE-2021-43798.json +++ b/2021/CVE-2021-43798.json @@ -699,37 +699,6 @@ "score": 0, "subscribers_count": 2 }, - { - "id": 445007761, - "name": "CVE-2021-43798", - "full_name": "light-Life\/CVE-2021-43798", - "owner": { - "login": "light-Life", - "id": 53685855, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53685855?v=4", - "html_url": "https:\/\/github.com\/light-Life", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/light-Life\/CVE-2021-43798", - "description": "运用golang写的grafana批量验证脚本,内置48个验证", - "fork": false, - "created_at": "2022-01-06T01:54:26Z", - "updated_at": "2022-08-15T15:41:35Z", - "pushed_at": "2022-01-11T08:12:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 449447091, "name": "CVE-2021-43798_exploit", diff --git a/2022/CVE-2022-25845.json b/2022/CVE-2022-25845.json index 379cae076b..c4e2c14244 100644 --- a/2022/CVE-2022-25845.json +++ b/2022/CVE-2022-25845.json @@ -107,10 +107,10 @@ "description": "CVE-2022-25845(fastjson1.2.80) exploit in Spring Env!", "fork": false, "created_at": "2024-11-07T13:06:44Z", - "updated_at": "2024-11-15T01:27:32Z", + "updated_at": "2024-11-17T13:31:01Z", "pushed_at": "2024-11-07T13:38:18Z", - "stargazers_count": 63, - "watchers_count": 63, + "stargazers_count": 64, + "watchers_count": 64, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 63, + "watchers": 64, "score": 0, "subscribers_count": 3 } diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json index 9b4070b4eb..fd00f2fced 100644 --- a/2022/CVE-2022-30190.json +++ b/2022/CVE-2022-30190.json @@ -405,7 +405,7 @@ "stargazers_count": 18, "watchers_count": 18, "has_discussions": false, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -417,7 +417,7 @@ "ms-msdt" ], "visibility": "public", - "forks": 5, + "forks": 6, "watchers": 18, "score": 0, "subscribers_count": 3 diff --git a/2022/CVE-2022-32947.json b/2022/CVE-2022-32947.json index 2857f71895..68c4a2070a 100644 --- a/2022/CVE-2022-32947.json +++ b/2022/CVE-2022-32947.json @@ -14,10 +14,10 @@ "description": "CVE-2022-32947 walkthough and demo", "fork": false, "created_at": "2023-09-17T08:21:47Z", - "updated_at": "2024-11-08T14:39:16Z", + "updated_at": "2024-11-17T15:51:27Z", "pushed_at": "2023-09-18T03:04:48Z", - "stargazers_count": 152, - "watchers_count": 152, + "stargazers_count": 153, + "watchers_count": 153, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 152, + "watchers": 153, "score": 0, "subscribers_count": 5 } diff --git a/2022/CVE-2022-3368.json b/2022/CVE-2022-3368.json index 5ca93e48f0..15f77e19a3 100644 --- a/2022/CVE-2022-3368.json +++ b/2022/CVE-2022-3368.json @@ -42,10 +42,10 @@ "user_view_type": "public" }, "html_url": "https:\/\/github.com\/byt3n33dl3\/CrackAVFee", - "description": "it's a CVE-2022-3368 ( patched ), but feel free to use it for check any outdated software or reseach", + "description": "it's a CVE-2022-3368 (Patched), but feel free to use it for check any outdated software or reseach", "fork": false, "created_at": "2024-03-05T18:31:29Z", - "updated_at": "2024-11-15T06:31:07Z", + "updated_at": "2024-11-17T16:50:59Z", "pushed_at": "2024-07-08T16:18:51Z", "stargazers_count": 7, "watchers_count": 7, diff --git a/2023/CVE-2023-22894.json b/2023/CVE-2023-22894.json index b95475d3f9..ad420f0973 100644 --- a/2023/CVE-2023-22894.json +++ b/2023/CVE-2023-22894.json @@ -14,10 +14,10 @@ "description": "CVE-2023-22894", "fork": false, "created_at": "2023-04-24T23:26:13Z", - "updated_at": "2024-07-08T04:47:57Z", + "updated_at": "2024-11-17T16:05:28Z", "pushed_at": "2023-04-24T23:38:15Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-2640.json b/2023/CVE-2023-2640.json index 29910ee974..b62989a620 100644 --- a/2023/CVE-2023-2640.json +++ b/2023/CVE-2023-2640.json @@ -76,10 +76,10 @@ "description": "GameOver(lay) Ubuntu Privilege Escalation", "fork": false, "created_at": "2023-10-09T22:02:42Z", - "updated_at": "2024-11-06T11:38:43Z", + "updated_at": "2024-11-17T18:13:18Z", "pushed_at": "2023-10-09T22:44:21Z", - "stargazers_count": 117, - "watchers_count": 117, + "stargazers_count": 118, + "watchers_count": 118, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 117, + "watchers": 118, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-28229.json b/2023/CVE-2023-28229.json index a35b31792c..a9fbddebdd 100644 --- a/2023/CVE-2023-28229.json +++ b/2023/CVE-2023-28229.json @@ -42,10 +42,10 @@ "user_view_type": "public" }, "html_url": "https:\/\/github.com\/byt3n33dl3\/CrackKeyIso", - "description": "it's a CVE-2023-28229 ( patched ), but feel free to use it for check any outdated software or reseach", + "description": "it's a CVE-2023-28229 (Patched), but feel free to use it for check any outdated software or reseach", "fork": false, "created_at": "2024-03-27T20:57:46Z", - "updated_at": "2024-09-20T08:39:15Z", + "updated_at": "2024-11-17T16:51:16Z", "pushed_at": "2024-07-08T16:04:59Z", "stargazers_count": 6, "watchers_count": 6, diff --git a/2023/CVE-2023-28252.json b/2023/CVE-2023-28252.json index 382afab4da..e778c68144 100644 --- a/2023/CVE-2023-28252.json +++ b/2023/CVE-2023-28252.json @@ -166,10 +166,10 @@ "user_view_type": "public" }, "html_url": "https:\/\/github.com\/byt3n33dl3\/CLFS", - "description": "it's a CVE-2023-28252 ( patched ), but feel free to use it for check any outdated software or reseach", + "description": "it's a CVE-2023-28252 (Patched), but feel free to use it for check any outdated software or reseach", "fork": false, "created_at": "2024-03-21T16:16:52Z", - "updated_at": "2024-09-20T08:39:09Z", + "updated_at": "2024-11-17T16:50:38Z", "pushed_at": "2024-07-09T03:43:41Z", "stargazers_count": 7, "watchers_count": 7, diff --git a/2023/CVE-2023-38646.json b/2023/CVE-2023-38646.json index d314c971d6..3f9e912bcd 100644 --- a/2023/CVE-2023-38646.json +++ b/2023/CVE-2023-38646.json @@ -514,10 +514,10 @@ "description": "This is a script written in Python that allows the exploitation of the Metabase's software security flaw described in CVE-2023-38646.", "fork": false, "created_at": "2023-10-09T00:26:38Z", - "updated_at": "2024-11-11T11:31:19Z", + "updated_at": "2024-11-17T18:13:36Z", "pushed_at": "2024-07-07T17:44:16Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -532,7 +532,7 @@ ], "visibility": "public", "forks": 5, - "watchers": 25, + "watchers": 26, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-44487.json b/2023/CVE-2023-44487.json index f4931b1744..2d04a6d3ab 100644 --- a/2023/CVE-2023-44487.json +++ b/2023/CVE-2023-44487.json @@ -146,10 +146,10 @@ "description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)", "fork": false, "created_at": "2023-10-13T23:55:32Z", - "updated_at": "2024-11-16T19:52:05Z", + "updated_at": "2024-11-17T12:51:41Z", "pushed_at": "2023-10-30T20:22:37Z", - "stargazers_count": 60, - "watchers_count": 60, + "stargazers_count": 61, + "watchers_count": 61, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -158,7 +158,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 60, + "watchers": 61, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-46604.json b/2023/CVE-2023-46604.json index 4efc66c30e..c5d84b0060 100644 --- a/2023/CVE-2023-46604.json +++ b/2023/CVE-2023-46604.json @@ -138,7 +138,7 @@ "description": null, "fork": false, "created_at": "2023-11-04T11:58:21Z", - "updated_at": "2024-11-06T15:48:25Z", + "updated_at": "2024-11-17T13:12:16Z", "pushed_at": "2023-11-06T07:26:30Z", "stargazers_count": 27, "watchers_count": 27, diff --git a/2024/CVE-2024-10245.json b/2024/CVE-2024-10245.json new file mode 100644 index 0000000000..dbed9ceb6b --- /dev/null +++ b/2024/CVE-2024-10245.json @@ -0,0 +1,33 @@ +[ + { + "id": 889946220, + "name": "CVE-2024-10245", + "full_name": "RandomRobbieBF\/CVE-2024-10245", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10245", + "description": "Relais 2FA <= 1.0 - Authentication Bypass", + "fork": false, + "created_at": "2024-11-17T16:34:28Z", + "updated_at": "2024-11-17T16:35:09Z", + "pushed_at": "2024-11-17T16:35:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-10793.json b/2024/CVE-2024-10793.json new file mode 100644 index 0000000000..47ccc59792 --- /dev/null +++ b/2024/CVE-2024-10793.json @@ -0,0 +1,33 @@ +[ + { + "id": 889986626, + "name": "CVE-2024-10793", + "full_name": "windz3r0day\/CVE-2024-10793", + "owner": { + "login": "windz3r0day", + "id": 179751303, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179751303?v=4", + "html_url": "https:\/\/github.com\/windz3r0day", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-10793", + "description": "CVE-2024-10793 poc exploit", + "fork": false, + "created_at": "2024-11-17T18:25:35Z", + "updated_at": "2024-11-17T18:29:25Z", + "pushed_at": "2024-11-17T18:29:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-10914.json b/2024/CVE-2024-10914.json index 12399c43c5..75934198cf 100644 --- a/2024/CVE-2024-10914.json +++ b/2024/CVE-2024-10914.json @@ -146,10 +146,10 @@ "description": "CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.", "fork": false, "created_at": "2024-11-16T16:32:05Z", - "updated_at": "2024-11-16T17:42:57Z", + "updated_at": "2024-11-17T13:51:10Z", "pushed_at": "2024-11-16T16:38:10Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -158,7 +158,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-26229.json b/2024/CVE-2024-26229.json index c946900886..66b9a74356 100644 --- a/2024/CVE-2024-26229.json +++ b/2024/CVE-2024-26229.json @@ -45,10 +45,10 @@ "description": "Windows LPE", "fork": false, "created_at": "2024-06-11T08:03:29Z", - "updated_at": "2024-11-17T11:19:39Z", + "updated_at": "2024-11-17T13:18:50Z", "pushed_at": "2024-06-11T20:41:59Z", - "stargazers_count": 103, - "watchers_count": 103, + "stargazers_count": 104, + "watchers_count": 104, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 103, + "watchers": 104, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-2876.json b/2024/CVE-2024-2876.json index 7378607461..b3d12659ef 100644 --- a/2024/CVE-2024-2876.json +++ b/2024/CVE-2024-2876.json @@ -138,10 +138,10 @@ "description": "WP-SQL-Injection CVE-2024-2876 AND 2024-CVE-2024-3495", "fork": false, "created_at": "2024-11-15T22:39:48Z", - "updated_at": "2024-11-15T22:51:46Z", + "updated_at": "2024-11-17T13:51:56Z", "pushed_at": "2024-11-15T22:50:43Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -150,7 +150,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index 8c42477e9a..05f1c81aa0 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -952,10 +952,10 @@ "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)", "fork": false, "created_at": "2024-04-01T14:28:09Z", - "updated_at": "2024-11-16T19:47:51Z", + "updated_at": "2024-11-17T18:12:20Z", "pushed_at": "2024-04-03T04:58:50Z", - "stargazers_count": 3495, - "watchers_count": 3495, + "stargazers_count": 3496, + "watchers_count": 3496, "has_discussions": false, "forks_count": 239, "allow_forking": true, @@ -964,7 +964,7 @@ "topics": [], "visibility": "public", "forks": 239, - "watchers": 3495, + "watchers": 3496, "score": 0, "subscribers_count": 38 }, diff --git a/2024/CVE-2024-44625.json b/2024/CVE-2024-44625.json index 54df3f8043..b2735f6681 100644 --- a/2024/CVE-2024-44625.json +++ b/2024/CVE-2024-44625.json @@ -14,10 +14,10 @@ "description": "Symbolic link path traversal vulnerability in Gogs", "fork": false, "created_at": "2024-11-13T16:16:31Z", - "updated_at": "2024-11-16T03:52:06Z", + "updated_at": "2024-11-17T14:07:54Z", "pushed_at": "2024-11-14T02:54:13Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-47575.json b/2024/CVE-2024-47575.json index 6b591fcd7f..5489597957 100644 --- a/2024/CVE-2024-47575.json +++ b/2024/CVE-2024-47575.json @@ -14,10 +14,10 @@ "description": "Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575", "fork": false, "created_at": "2024-11-07T21:03:30Z", - "updated_at": "2024-11-16T18:49:23Z", + "updated_at": "2024-11-17T14:25:31Z", "pushed_at": "2024-11-14T16:25:52Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 45, + "watchers_count": 45, "has_discussions": false, "forks_count": 20, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 20, - "watchers": 44, + "watchers": 45, "score": 0, "subscribers_count": 0 }, diff --git a/2024/CVE-2024-49379.json b/2024/CVE-2024-49379.json index 3d051e35a7..89ba8f2456 100644 --- a/2024/CVE-2024-49379.json +++ b/2024/CVE-2024-49379.json @@ -14,10 +14,10 @@ "description": "CVE-2024-49379 PoC", "fork": false, "created_at": "2024-11-16T19:05:28Z", - "updated_at": "2024-11-16T19:31:54Z", + "updated_at": "2024-11-17T13:46:42Z", "pushed_at": "2024-11-16T19:31:50Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/README.md b/README.md index bf86748350..afeba87bb0 100644 --- a/README.md +++ b/README.md @@ -1906,6 +1906,13 @@ - [holypryx/CVE-2024-10140](https://github.com/holypryx/CVE-2024-10140) +### CVE-2024-10245 (2024-11-12) + +The Relais 2FA plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.0. This is due to incorrect authentication and capability checking in the 'rl_do_ajax' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email. + + +- [RandomRobbieBF/CVE-2024-10245](https://github.com/RandomRobbieBF/CVE-2024-10245) + ### CVE-2024-10354 (2024-10-25) In SourceCodester Petrol Pump Management Software 1.0 wurde eine kritische Schwachstelle entdeckt. Das betrifft eine unbekannte Funktionalität der Datei /admin/print.php. Mit der Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung. @@ -1990,6 +1997,13 @@ - [RandomRobbieBF/CVE-2024-10728](https://github.com/RandomRobbieBF/CVE-2024-10728) +### CVE-2024-10793 (2024-11-15) + +The WP Activity Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the user_id parameter in all versions up to, and including, 5.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrative user accesses an injected page. + + +- [windz3r0day/CVE-2024-10793](https://github.com/windz3r0day/CVE-2024-10793) + ### CVE-2024-10914 (2024-11-06) In D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L bis 20241028 wurde eine kritische Schwachstelle ausgemacht. Hierbei betrifft es die Funktion cgi_user_add der Datei /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. Durch Manipulation des Arguments name mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Die Komplexität eines Angriffs ist eher hoch. Sie gilt als schwierig ausnutzbar. Der Exploit steht zur öffentlichen Verfügung. @@ -25457,6 +25471,13 @@ - [Al1ex/CVE-2021-34045](https://github.com/Al1ex/CVE-2021-34045) - [kenuosec/CVE-2021-34045](https://github.com/kenuosec/CVE-2021-34045) +### CVE-2021-34081 (2022-06-01) + +OS Command Injection vulnerability in bbultman gitsome through 0.2.3 allows attackers to execute arbitrary commands via a crafted tag name of the target git repository. + + +- [jason-rodrigues/CVEX-Record](https://github.com/jason-rodrigues/CVEX-Record) + ### CVE-2021-34371 (2021-08-05) Neo4j through 3.4.18 (with the shell server enabled) exposes an RMI service that arbitrarily deserializes Java objects, e.g., through setSessionVariable. An attacker can abuse this for remote code execution because there are dependencies with exploitable gadget chains. @@ -27502,7 +27523,6 @@ - [k3rwin/CVE-2021-43798-Grafana](https://github.com/k3rwin/CVE-2021-43798-Grafana) - [gps1949/CVE-2021-43798](https://github.com/gps1949/CVE-2021-43798) - [halencarjunior/grafana-CVE-2021-43798](https://github.com/halencarjunior/grafana-CVE-2021-43798) -- [light-Life/CVE-2021-43798](https://github.com/light-Life/CVE-2021-43798) - [aymenbouferroum/CVE-2021-43798_exploit](https://github.com/aymenbouferroum/CVE-2021-43798_exploit) - [Jroo1053/GrafanaDirInclusion](https://github.com/Jroo1053/GrafanaDirInclusion) - [yasindce1998/grafana-cve-2021-43798](https://github.com/yasindce1998/grafana-cve-2021-43798)