Skip to content
Merged
Show file tree
Hide file tree
Changes from 19 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 5 additions & 1 deletion http/cves/2024/CVE-2024-31621.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -15,8 +15,13 @@ info:
- https://github.com/FlowiseAI/Flowise/releases
- https://flowiseai.com/
classification:
cve-id: CVE-2024-31621
cwe-id: CWE-94
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
cvss-score: 7.6
epss-score: 0.80162
epss-percentile: 0.99086
cpe: cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
Expand All @@ -40,4 +45,3 @@ http:
- type: status
status:
- 200
# digest: 4a0a0047304502206d6282cc64aa4f7489a26b8ac3543d32fde5b8f86eae802291057e7c4c007aea022100a85066fd2e010d19c5d417d3cb3a688ecc513c449bd50bd55773b411f6da1636:922c64590222798bb761d5b6d8e72950
5 changes: 4 additions & 1 deletion http/cves/2024/CVE-2024-32399.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,10 @@ info:
- https://github.com/NN0b0dy/CVE-2024-32399
- https://github.com/nomi-sec/PoC-in-GitHub
classification:
cve-id: CVE-2024-32399
cwe-id: CWE-22
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L
cvss-score: 7.6
epss-score: 0.83509
epss-percentile: 0.99263
cpe: cpe:2.3:a:raidenmaild:raidenmaild:*:*:*:*:*:*:*:*
Expand All @@ -40,4 +44,3 @@ http:
- 'contains(header, "application/octet-stream")'
- 'status_code == 200'
condition: and
# digest: 4a0a00473045022100d9f7f39f97ee18fe7b13ac75955db49d763211974155c3a53a1ed01603ad7ad402204cf2e124c2031c2ee215743519d26c1dcd8981a2b502c570b189bc8b7d92ff67:922c64590222798bb761d5b6d8e72950
5 changes: 4 additions & 1 deletion http/cves/2024/CVE-2024-37152.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,10 @@ info:
- https://github.com/argoproj/argo-cd/security/advisories/GHSA-87p9-x75h-p4j2
- https://nvd.nist.gov/vuln/detail/CVE-2024-37152
classification:
cve-id: CVE-2024-37152
cwe-id: CWE-306
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
epss-score: 0.74253
epss-percentile: 0.98816
cpe: cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*
Expand Down Expand Up @@ -48,4 +52,3 @@ http:
- type: status
status:
- 200
# digest: 490a004630440220689699e6dc72ebab2bcddb0d14e2d72996b757e7aebaa53bc969097143bef14d02204496d3343b79194ed11dd3b8a4dabb2d16566c8ee150c4eb9fe8ec8f67054976:922c64590222798bb761d5b6d8e72950
6 changes: 5 additions & 1 deletion http/cves/2024/CVE-2024-37393.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -14,8 +14,13 @@ info:
- https://www.optistream.io/blogs/tech/securenvoy-cve-2024-37393
- https://securenvoy.com
classification:
cve-id: CVE-2024-37393
cwe-id: CWE-89
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
epss-score: 0.82327
epss-percentile: 0.99199
cpe: cpe:2.3:a:securenvoy:multi-factor_authentication_solutions:*:*:*:*:*:*:*:*
metadata:
verified: true
shodan-query: title:"SecurEnvoy"
Expand Down Expand Up @@ -55,4 +60,3 @@ http:
- "contains(body_2, 'GETPASSCODE')"
- "status_code_2 == 200"
condition: and
# digest: 4a0a00473045022100806e79a904da44725a50ef99f8087e2f47f9e4543fe68d0d3d16888f75cf2e480220242a87b9cf6e084f98640d86997cd27ca6064ed37259ab7f19d1d7785ad3b347:922c64590222798bb761d5b6d8e72950
6 changes: 5 additions & 1 deletion http/cves/2024/CVE-2024-40348.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -15,8 +15,13 @@ info:
- https://www.bazarr.media/
- https://github.com/bigb0x/CVE-2024-40348
classification:
cve-id: CVE-2024-40348
cwe-id: CWE-22
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
cvss-score: 8.2
epss-score: 0.93603
epss-percentile: 0.99829
cpe: cpe:2.3:a:bazarr:bazarr:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
Expand Down Expand Up @@ -61,4 +66,3 @@ http:
- type: status
status:
- 200
# digest: 4a0a0047304502200ae01b3ae88156079a2783b3a2098d62dc72269db49cf7830a8ca4b0601906f2022100cd8975b4f2aea7214bd1699083d3691fe153b87ca00c69a7b39a9ecb7de18a9d:922c64590222798bb761d5b6d8e72950
8 changes: 6 additions & 2 deletions http/cves/2024/CVE-2024-48766.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -15,8 +15,13 @@ info:
- https://github.com/rapid7/metasploit-framework/pull/19881
- https://github.com/jokob-sk/NetAlertX
classification:
cve-id: CVE-2024-48766
cwe-id: CWE-22
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
cvss-score: 8.6
epss-score: 0.77986
epss-percentile: 0.98985
cpe: cpe:2.3:a:netalertx:netalertx:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
Expand All @@ -43,5 +48,4 @@ http:
- "regex('root:.*:0:0:', body)"
- 'contains(body, "Purge log")'
- 'status_code == 200'
condition: and
# digest: 4a0a0047304502210097e5893da337d43762b10a4bba86fd079bd741a20ebeeeef53c8d2ece04b58d3022016b73075f6cb7e5c81999e18ae1a15b6832ede0741f12f7e61b3fe62769ccc44:922c64590222798bb761d5b6d8e72950
condition: and
5 changes: 4 additions & 1 deletion http/cves/2024/CVE-2024-55457.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,10 @@ info:
- https://github.com/h13nh04ng/CVE-2024-55457-PoC
- https://x.com/cyber_advising/status/1876034270852231257
classification:
cve-id: CVE-2024-55457
cwe-id: CWE-22
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
cvss-score: 6.5
epss-score: 0.87182
epss-percentile: 0.99435
metadata:
Expand All @@ -34,4 +38,3 @@ http:
- "regex('root:.*:0:0:', body)"
- "status_code == 200"
condition: and
# digest: 4a0a00473045022026c12a04c9c14adb0d511c6304f2e9cbf61ff1865da3ad0ec0ef349548b34453022100d816707f01a9b10398f7c39a322417a4eb9551691e30dee4634d4d1526f71eb1:922c64590222798bb761d5b6d8e72950
6 changes: 5 additions & 1 deletion http/cves/2024/CVE-2024-56325.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -16,8 +16,13 @@ info:
- https://lists.apache.org/thread/ksf8qsndr1h66otkbjz2wrzsbw992r8v
- http://www.openwall.com/lists/oss-security/2025/03/27/8
classification:
cve-id: CVE-2024-56325
cwe-id: CWE-288
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
epss-score: 0.30273
epss-percentile: 0.96597
cpe: cpe:2.3:a:apache:pinot:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
Expand Down Expand Up @@ -58,4 +63,3 @@ http:
part: header
words:
- 'Pinot-Controller-'
# digest: 4a0a00473045022100c19d8ebcf03ae52a5e24d6d8024083e3532aa845b4245e0ebb6d4f9b84c4566802205faf6e9393efbf5284e06b3b2032ee537fb17c548de981ffc7e9ff78c37c81ec:922c64590222798bb761d5b6d8e72950
6 changes: 5 additions & 1 deletion http/cves/2024/CVE-2024-6235.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -15,8 +15,13 @@ info:
- https://attackerkb.com/topics/7zebEgmGLs/cve-2024-6235
- https://nvd.nist.gov/vuln/detail/cve-2024-6235
classification:
cve-id: CVE-2024-6235
cwe-id: CWE-287
cvss-metrics: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.8
epss-score: 0.87092
epss-percentile: 0.9943
cpe: cpe:2.3:a:citrix:netscaler_console:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
Expand Down Expand Up @@ -54,4 +59,3 @@ http:
name: adm_sessionid_key
json:
- '.mps_secret[0].key_value'
# digest: 490a00463044022056f12497fd384876371818ceb865e22aac1b43ac6041191efabc5101472c8e0102204127eff14f375738ccde53d7a2d3e0b9b18aadd289140223f8f72a62e63854f2:922c64590222798bb761d5b6d8e72950
5 changes: 4 additions & 1 deletion http/cves/2024/CVE-2024-6781.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,10 @@ info:
reference:
- https://starlabs.sg/advisories/24/24-6781/
classification:
cve-id: CVE-2024-6781
cwe-id: CWE-22
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
epss-score: 0.93767
epss-percentile: 0.99848
cpe: cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*
Expand Down Expand Up @@ -63,4 +67,3 @@ http:
- type: status
status:
- 200
# digest: 490a0046304402200877a368b2e3ad9504d0e5ca8c3620437eef91de1b13fcaeaea986e6c35661ec0220258f4f364d730b2cff994a8b1dafcdc365bec78090441178f2c03eb07b1b1825:922c64590222798bb761d5b6d8e72950
5 changes: 4 additions & 1 deletion http/cves/2024/CVE-2024-6782.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,10 @@ info:
reference:
- https://starlabs.sg/advisories/24/24-6781/
classification:
cve-id: CVE-2024-6782
cwe-id: CWE-863
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
epss-score: 0.93876
epss-percentile: 0.99866
cpe: cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*
Expand Down Expand Up @@ -69,4 +73,3 @@ http:
- type: status
status:
- 200
# digest: 4a0a0047304502202084ec8926cb1225738a732604d13c84f6e72af76a221a023eb0230b61dd3f73022100d2a398c197e25598a1cdf64c5892b2162c67c16a83cb13284c628aa6c7a93b53:922c64590222798bb761d5b6d8e72950
5 changes: 4 additions & 1 deletion http/cves/2025/CVE-2025-34026.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,10 @@ info:
- https://security-portal.versa-networks.com/emailbulletins/6830f94328defa375486ff2e
- https://www.cve.org/CVERecord?id=CVE-2025-34026
classification:
cve-id: CVE-2025-34026
cwe-id: CWE-288
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
epss-score: 0.56994
epss-percentile: 0.98093
cpe: cpe:2.3:a:versa-networks:concerto:*:*:*:*:*:*:*:*
Expand Down Expand Up @@ -44,4 +48,3 @@ http:
part: header
words:
- EECP-CSRF-TOKEN
# digest: 4a0a00473045022100f20af9cdc14e33c8d37d0b20caf760e11a698f0ec8de034d11236894859d9ecb022047bb282f04bdd20973098ae97935e22df54cbdd2f0a9329a4ab9c516050737a9:922c64590222798bb761d5b6d8e72950
3 changes: 2 additions & 1 deletion http/cves/2025/CVE-2025-34027.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,8 @@ info:
- https://www.cve.org/CVERecord?id=CVE-2025-34027
- https://security-portal.versa-networks.com/emailbulletins/6830fa3f28defa375486ff2f
classification:
cve-id: CVE-2025-34027
cwe-id: CWE-367
epss-score: 0.04011
epss-percentile: 0.88251
cpe: cpe:2.3:a:versa-networks:concerto:*:*:*:*:*:*:*:*
Expand Down Expand Up @@ -44,4 +46,3 @@ http:
part: header
words:
- EECP-CSRF-TOKEN
# digest: 4a0a00473045022100aed86bcadc9422c41e459e246869429c049b6458a1d7d67821f1de460b7c911c02205053bded47d5bd8537a74d8718994455c48b6064caac206bfd8b467de51a2f63:922c64590222798bb761d5b6d8e72950
3 changes: 2 additions & 1 deletion http/cves/2025/CVE-2025-49596.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,8 @@ info:
- https://github.com/modelcontextprotocol/inspector/security/advisories/GHSA-7f8r-222p-6f5g
- https://www.oligo.security/blog/critical-rce-vulnerability-in-anthropic-mcp-inspector-cve-2025-49596
classification:
cve-id: CVE-2025-49596
cwe-id: CWE-306
epss-score: 0.02542
epss-percentile: 0.85229
metadata:
Expand Down Expand Up @@ -89,4 +91,3 @@ http:
regex:

- '\/message\?sessionId=([a-z0-9-]+)' # Returns: Session ID as proof of execution
# digest: 490a004630440220359c9c458d1568afa8f7f5fc14a3f7113d7420e7b7ffb30575d1524a66cd11c202205e0176bb5771543c1edb9eb72807e449be6f6b320e4000387e7e43352af180d7:922c64590222798bb761d5b6d8e72950
8 changes: 6 additions & 2 deletions http/cves/2025/CVE-2025-5777.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -15,8 +15,13 @@ info:
- https://labs.watchtowr.com/how-much-more-must-we-bleed-citrix-netscaler-memory-disclosure-citrixbleed-2-cve-2025-5777/
- https://nvd.nist.gov/vuln/detail/CVE-2025-5777
classification:
cve-id: CVE-2025-5777
cwe-id: CWE-457
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
epss-score: 0.69815
epss-percentile: 0.98635
epss-percentile: 0.98634
cpe: cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:-:*:*:*,cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*,cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:fips:*:*:*,cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:ndcpp:*:*:*
metadata:
verified: true
max-request: 1
Expand Down Expand Up @@ -68,4 +73,3 @@ http:
- '!contains(to_string(iv), "true")'
- '!regex("^[A-Za-z0-9+/=\\s]+$", iv)'
condition: and
# digest: 4a0a00473045022100e8248d9352f6be32ba951d5d45ce65aa98d6dc0ea4beaa0e27405d25327f126902207f9b0d0f6a7952c4f241cc2e18cd6a5c894d21b20d254cdcce0e7a36484e6330:922c64590222798bb761d5b6d8e72950