Auto Update 2025/01/25 00:32:04

This commit is contained in:
motikan2010-bot 2025-01-25 09:32:04 +09:00
parent 565bf2a7b1
commit f8ad18b680
35 changed files with 155 additions and 147 deletions

View file

@ -448,37 +448,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 576075642,
"name": "CTF_CVE-2016-10033",
"full_name": "eb613819\/CTF_CVE-2016-10033",
"owner": {
"login": "eb613819",
"id": 70245295,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70245295?v=4",
"html_url": "https:\/\/github.com\/eb613819",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/eb613819\/CTF_CVE-2016-10033",
"description": "CTF based around CVE-2016-10033",
"fork": false,
"created_at": "2022-12-09T00:28:24Z",
"updated_at": "2022-12-09T01:25:05Z",
"pushed_at": "2022-12-09T01:25:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 801707781,
"name": "CVE-2016-10033",

View file

@ -14,10 +14,10 @@
"description": "frp bypass without account overwrite",
"fork": false,
"created_at": "2017-10-08T12:26:23Z",
"updated_at": "2024-11-25T09:57:25Z",
"updated_at": "2025-01-24T22:49:08Z",
"pushed_at": "2017-10-08T12:26:24Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 5
}

View file

@ -308,13 +308,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0

View file

@ -3148,10 +3148,10 @@
"description": "CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7",
"fork": false,
"created_at": "2020-03-15T19:33:53Z",
"updated_at": "2025-01-13T10:48:31Z",
"updated_at": "2025-01-24T23:25:09Z",
"pushed_at": "2022-03-28T04:10:20Z",
"stargazers_count": 132,
"watchers_count": 132,
"stargazers_count": 133,
"watchers_count": 133,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -3160,7 +3160,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 132,
"watchers": 133,
"score": 0,
"subscribers_count": 4
},

View file

@ -61,8 +61,8 @@
"description": "Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)",
"fork": false,
"created_at": "2025-01-23T20:21:00Z",
"updated_at": "2025-01-24T18:05:25Z",
"pushed_at": "2025-01-24T18:05:22Z",
"updated_at": "2025-01-25T00:09:22Z",
"pushed_at": "2025-01-25T00:09:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -90,6 +90,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"",
"fork": false,
"created_at": "2021-06-29T04:38:24Z",
"updated_at": "2025-01-21T08:12:08Z",
"updated_at": "2025-01-24T20:44:50Z",
"pushed_at": "2022-04-14T03:17:44Z",
"stargazers_count": 450,
"watchers_count": 450,
"stargazers_count": 451,
"watchers_count": 451,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 46,
"watchers": 450,
"watchers": 451,
"score": 0,
"subscribers_count": 6
},

View file

@ -14,8 +14,8 @@
"description": "A repository of proof-of-concept files demonstrating disclosed and patched vulnerabilities in pngcheck (2.4.0 - 3.0.1), including CVE-2020-27818, CVE-2020-35511 and other vulns.",
"fork": false,
"created_at": "2025-01-19T18:33:13Z",
"updated_at": "2025-01-24T16:46:56Z",
"pushed_at": "2025-01-24T16:45:27Z",
"updated_at": "2025-01-24T18:54:16Z",
"pushed_at": "2025-01-24T18:54:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -76,10 +76,10 @@
"description": null,
"fork": false,
"created_at": "2021-01-25T08:42:28Z",
"updated_at": "2025-01-04T08:46:41Z",
"updated_at": "2025-01-24T20:19:13Z",
"pushed_at": "2021-01-25T08:49:59Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 71,
"watchers": 72,
"score": 0,
"subscribers_count": 1
},
@ -204,10 +204,10 @@
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
"fork": false,
"created_at": "2021-02-18T05:42:13Z",
"updated_at": "2025-01-21T06:53:59Z",
"updated_at": "2025-01-24T20:37:32Z",
"pushed_at": "2021-12-14T05:12:17Z",
"stargazers_count": 150,
"watchers_count": 150,
"stargazers_count": 151,
"watchers_count": 151,
"has_discussions": false,
"forks_count": 58,
"allow_forking": true,
@ -216,7 +216,7 @@
"topics": [],
"visibility": "public",
"forks": 58,
"watchers": 150,
"watchers": 151,
"score": 0,
"subscribers_count": 1
},

View file

@ -152,13 +152,13 @@
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": false,
"forks_count": 50,
"forks_count": 49,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 50,
"forks": 49,
"watchers": 114,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2025-01-24T14:23:21Z",
"updated_at": "2025-01-24T18:34:05Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1179,
"watchers_count": 1179,
"stargazers_count": 1177,
"watchers_count": 1177,
"has_discussions": true,
"forks_count": 188,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 188,
"watchers": 1179,
"watchers": 1177,
"score": 0,
"subscribers_count": 19
},

View file

@ -332,19 +332,19 @@
"description": "CobaltStrike <= 4.7.1 RCE",
"fork": false,
"created_at": "2022-10-14T11:46:01Z",
"updated_at": "2025-01-17T09:16:07Z",
"updated_at": "2025-01-24T18:54:15Z",
"pushed_at": "2022-10-25T05:32:54Z",
"stargazers_count": 379,
"watchers_count": 379,
"stargazers_count": 380,
"watchers_count": 380,
"has_discussions": false,
"forks_count": 77,
"forks_count": 76,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 77,
"watchers": 379,
"forks": 76,
"watchers": 380,
"score": 0,
"subscribers_count": 7
},

View file

@ -743,10 +743,10 @@
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
"fork": false,
"created_at": "2025-01-16T06:54:15Z",
"updated_at": "2025-01-24T15:32:22Z",
"updated_at": "2025-01-24T19:44:57Z",
"pushed_at": "2025-01-16T09:56:36Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -755,7 +755,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 75,
"watchers": 76,
"score": 0,
"subscribers_count": 7
},
@ -805,8 +805,8 @@
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
"fork": false,
"created_at": "2025-01-18T15:32:21Z",
"updated_at": "2025-01-24T18:22:42Z",
"pushed_at": "2025-01-24T18:22:38Z",
"updated_at": "2025-01-25T00:06:50Z",
"pushed_at": "2025-01-25T00:06:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "Exploit for the CVE-2023-23397",
"fork": false,
"created_at": "2023-03-15T17:03:38Z",
"updated_at": "2024-09-02T05:24:27Z",
"updated_at": "2025-01-24T18:53:25Z",
"pushed_at": "2023-03-15T17:53:53Z",
"stargazers_count": 158,
"watchers_count": 158,
"stargazers_count": 159,
"watchers_count": 159,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 158,
"watchers": 159,
"score": 0,
"subscribers_count": 2
},

View file

@ -77,7 +77,7 @@
"fork": false,
"created_at": "2024-04-17T13:36:34Z",
"updated_at": "2024-10-30T14:55:15Z",
"pushed_at": "2025-01-02T22:30:21Z",
"pushed_at": "2025-01-24T23:08:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -15,7 +15,7 @@
"fork": false,
"created_at": "2023-09-16T09:11:21Z",
"updated_at": "2025-01-09T03:49:30Z",
"pushed_at": "2025-01-02T18:32:11Z",
"pushed_at": "2025-01-24T18:57:47Z",
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,

View file

@ -19,7 +19,7 @@
"stargazers_count": 68,
"watchers_count": 68,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -36,7 +36,7 @@
"cve-2024-39573"
],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 68,
"score": 0,
"subscribers_count": 1

View file

@ -19,7 +19,7 @@
"stargazers_count": 95,
"watchers_count": 95,
"has_discussions": false,
"forks_count": 26,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -34,7 +34,7 @@
"screenconnect"
],
"visibility": "public",
"forks": 26,
"forks": 27,
"watchers": 95,
"score": 0,
"subscribers_count": 4

View file

@ -14,10 +14,10 @@
"description": "Unauthenticated Remote Code Execution Bricks <= 1.9.6",
"fork": false,
"created_at": "2024-02-20T20:16:09Z",
"updated_at": "2025-01-09T09:32:54Z",
"updated_at": "2025-01-24T22:14:28Z",
"pushed_at": "2024-02-25T21:50:09Z",
"stargazers_count": 154,
"watchers_count": 154,
"stargazers_count": 156,
"watchers_count": 156,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 154,
"watchers": 156,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-08-14T16:20:38Z",
"updated_at": "2025-01-24T06:31:22Z",
"updated_at": "2025-01-24T18:50:01Z",
"pushed_at": "2024-09-05T23:21:00Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 118,
"watchers_count": 118,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 117,
"watchers": 118,
"score": 0,
"subscribers_count": 3
}

33
2024/CVE-2024-3673.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 921921508,
"name": "CVE-2024-3673",
"full_name": "Nxploited\/CVE-2024-3673",
"owner": {
"login": "Nxploited",
"id": 188819918,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4",
"html_url": "https:\/\/github.com\/Nxploited",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-3673",
"description": "CVE-2024-3673 Exploit: Local File Inclusion in Web Directory Free WordPress Plugin ( before 1.7.3 )",
"fork": false,
"created_at": "2025-01-24T21:50:55Z",
"updated_at": "2025-01-24T21:56:36Z",
"pushed_at": "2025-01-24T21:56:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Kernel pointers copied to output user mode buffer with ioctl 0x22A014 in the appid.sys driver.",
"fork": false,
"created_at": "2024-07-21T02:29:18Z",
"updated_at": "2024-12-27T13:05:29Z",
"updated_at": "2025-01-24T18:31:46Z",
"pushed_at": "2024-07-21T02:35:59Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 2
}

View file

@ -270,13 +270,13 @@
"stargazers_count": 646,
"watchers_count": 646,
"has_discussions": false,
"forks_count": 116,
"forks_count": 117,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 116,
"forks": 117,
"watchers": 646,
"score": 0,
"subscribers_count": 5

View file

@ -50,7 +50,7 @@
"stargazers_count": 68,
"watchers_count": 68,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -67,7 +67,7 @@
"cve-2024-39573"
],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 68,
"score": 0,
"subscribers_count": 1

View file

@ -45,10 +45,10 @@
"description": "Havoc SSRF to RCE",
"fork": false,
"created_at": "2025-01-19T14:48:41Z",
"updated_at": "2025-01-22T15:32:57Z",
"updated_at": "2025-01-24T19:46:03Z",
"pushed_at": "2025-01-20T01:32:54Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,19 +14,19 @@
"description": "CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious shortcuts.",
"fork": false,
"created_at": "2025-01-20T15:30:55Z",
"updated_at": "2025-01-24T17:23:51Z",
"updated_at": "2025-01-24T18:52:47Z",
"pushed_at": "2025-01-21T12:40:13Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -174,13 +174,13 @@
"stargazers_count": 246,
"watchers_count": 246,
"has_discussions": false,
"forks_count": 54,
"forks_count": 55,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 54,
"forks": 55,
"watchers": 246,
"score": 0,
"subscribers_count": 4

View file

@ -14,10 +14,10 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
"fork": false,
"created_at": "2025-01-01T15:48:38Z",
"updated_at": "2025-01-24T14:24:46Z",
"updated_at": "2025-01-24T19:07:19Z",
"pushed_at": "2025-01-02T16:07:23Z",
"stargazers_count": 460,
"watchers_count": 460,
"stargazers_count": 461,
"watchers_count": 461,
"has_discussions": false,
"forks_count": 106,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 106,
"watchers": 460,
"watchers": 461,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": "POC exploit for CVE-2024-49138",
"fork": false,
"created_at": "2025-01-15T00:43:37Z",
"updated_at": "2025-01-24T14:25:34Z",
"updated_at": "2025-01-24T20:26:05Z",
"pushed_at": "2025-01-23T14:59:40Z",
"stargazers_count": 215,
"watchers_count": 215,
"stargazers_count": 216,
"watchers_count": 216,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 43,
"watchers": 215,
"watchers": 216,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "An integer type confusion in XNU",
"fork": false,
"created_at": "2025-01-23T20:40:47Z",
"updated_at": "2025-01-24T05:36:53Z",
"updated_at": "2025-01-24T20:17:21Z",
"pushed_at": "2025-01-23T20:50:46Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -81,13 +81,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 3

View file

@ -14,10 +14,10 @@
"description": "TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.",
"fork": false,
"created_at": "2024-09-29T10:58:15Z",
"updated_at": "2025-01-23T05:27:37Z",
"updated_at": "2025-01-24T18:44:30Z",
"pushed_at": "2024-12-22T21:34:26Z",
"stargazers_count": 134,
"watchers_count": 134,
"stargazers_count": 135,
"watchers_count": 135,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 134,
"watchers": 135,
"score": 0,
"subscribers_count": 2
}

View file

@ -61,8 +61,8 @@
"description": "Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)",
"fork": false,
"created_at": "2025-01-23T20:21:00Z",
"updated_at": "2025-01-24T18:25:40Z",
"pushed_at": "2025-01-24T18:25:36Z",
"updated_at": "2025-01-25T00:28:16Z",
"pushed_at": "2025-01-25T00:28:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,12 +14,12 @@
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
"fork": false,
"created_at": "2025-01-22T14:40:34Z",
"updated_at": "2025-01-24T15:29:33Z",
"updated_at": "2025-01-24T23:18:37Z",
"pushed_at": "2025-01-22T15:08:56Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -32,8 +32,8 @@
"poc"
],
"visibility": "public",
"forks": 10,
"watchers": 56,
"forks": 11,
"watchers": 57,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,19 +14,19 @@
"description": "Proof of concept & details for CVE-2025-21298",
"fork": false,
"created_at": "2025-01-20T18:16:51Z",
"updated_at": "2025-01-24T18:08:16Z",
"updated_at": "2025-01-24T23:08:32Z",
"pushed_at": "2025-01-20T18:22:01Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 12,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 41,
"forks": 14,
"watchers": 44,
"score": 0,
"subscribers_count": 0
}

View file

@ -940,6 +940,13 @@
- [h4x0r-dz/CVE-2024-3656](https://github.com/h4x0r-dz/CVE-2024-3656)
### CVE-2024-3673 (2024-08-30)
<code>The Web Directory Free WordPress plugin before 1.7.3 does not validate a parameter before using it in an include(), which could lead to Local File Inclusion issues.
</code>
- [Nxploited/CVE-2024-3673](https://github.com/Nxploited/CVE-2024-3673)
### CVE-2024-3690 (2024-04-12)
<code>In PHPGurukul Small CRM 3.0 wurde eine kritische Schwachstelle entdeckt. Hierbei betrifft es unbekannten Programmcode der Komponente Change Password Handler. Durch Beeinflussen mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung.
@ -47292,7 +47299,6 @@
- [j4k0m/CVE-2016-10033](https://github.com/j4k0m/CVE-2016-10033)
- [zeeshanbhattined/exploit-CVE-2016-10033](https://github.com/zeeshanbhattined/exploit-CVE-2016-10033)
- [CAOlvchonger/CVE-2016-10033](https://github.com/CAOlvchonger/CVE-2016-10033)
- [eb613819/CTF_CVE-2016-10033](https://github.com/eb613819/CTF_CVE-2016-10033)
- [ElnurBDa/CVE-2016-10033](https://github.com/ElnurBDa/CVE-2016-10033)
- [Astrowmist/POC-CVE-2016-10033](https://github.com/Astrowmist/POC-CVE-2016-10033)