-
Notifications
You must be signed in to change notification settings - Fork 16
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Auto-Update: 2024-12-16T05:00:19.264627+00:00
- Loading branch information
1 parent
a7c58de
commit c37785c
Showing
4 changed files
with
72 additions
and
7 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
{ | ||
"id": "CVE-2024-53376", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-12-16T04:15:05.263", | ||
"lastModified": "2024-12-16T04:15:05.263", | ||
"vulnStatus": "Received", | ||
"cveTags": [], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "CyberPanel before 2.3.8 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the phpSelection field to the websites/submitWebsiteCreation URI." | ||
} | ||
], | ||
"metrics": {}, | ||
"references": [ | ||
{ | ||
"url": "https://github.com/ThottySploity/CVE-2024-53376", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "https://github.com/ThottySploity/CVE-2024-53376/blob/aa306187323bd1127d56803cb34cac8820b61484/cyberpanel.py#L70", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "https://thottysploity.github.io/posts/cve-2024-53376", | ||
"source": "[email protected]" | ||
} | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,33 @@ | ||
{ | ||
"id": "CVE-2024-56083", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-12-16T03:15:04.650", | ||
"lastModified": "2024-12-16T03:15:04.650", | ||
"vulnStatus": "Received", | ||
"cveTags": [], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "Cognition Devin before 2024-12-12 provides write access to code by an attacker who discovers the https://vscode-randomly_generated_string.devinapps.com URL (aka the VSCode live share URL) for a specific \"Use Devin's Machine\" session. For example, this URL may be discovered if a customer posts a screenshot of a Devin session to social media, or publicly streams their Devin session." | ||
} | ||
], | ||
"metrics": {}, | ||
"references": [ | ||
{ | ||
"url": "https://news.ycombinator.com/item?id=42420423", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "https://trust.cognition.ai", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "https://www.youtube.com/watch?v=927W6zzvV-c", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "https://x.com/cognition_labs/status/1867351521035530698", | ||
"source": "[email protected]" | ||
} | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters