Auto Update 2024/11/05 18:32:02

This commit is contained in:
motikan2010-bot 2024-11-06 03:32:02 +09:00
parent ba309ec965
commit 015c9fc357
34 changed files with 351 additions and 175 deletions

View file

@ -81,7 +81,7 @@
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 16,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -97,7 +97,7 @@
"spoofed-packets"
],
"visibility": "public",
"forks": 16,
"forks": 13,
"watchers": 10,
"score": 0,
"subscribers_count": 2

View file

@ -28,7 +28,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 883132068,
@ -59,7 +59,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 883138310,
@ -90,6 +90,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -60,5 +60,36 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 883778692,
"name": "Exploitation-de-la-vuln-rabilit-CVE-2015-5254-",
"full_name": "guigui237\/Exploitation-de-la-vuln-rabilit-CVE-2015-5254-",
"owner": {
"login": "guigui237",
"id": 184559460,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/184559460?v=4",
"html_url": "https:\/\/github.com\/guigui237",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/guigui237\/Exploitation-de-la-vuln-rabilit-CVE-2015-5254-",
"description": "La vulnérabilité CVE-2015-5254 est une faille de sécurité dans Apache ActiveMQ, un serveur de messages open source largement utilisé pour la communication entre applications. Cette vulnérabilité touche les versions d'ActiveMQ jusqu'à 5.13.0 et réside dans le manque de filtrage sur les données d'entrées JMS ObjectMessage enyoyées ",
"fork": false,
"created_at": "2024-11-05T14:58:30Z",
"updated_at": "2024-11-05T16:14:53Z",
"pushed_at": "2024-11-05T16:14:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -467,7 +467,7 @@
"stargazers_count": 858,
"watchers_count": 858,
"has_discussions": false,
"forks_count": 428,
"forks_count": 427,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -477,7 +477,7 @@
"exploit"
],
"visibility": "public",
"forks": 428,
"forks": 427,
"watchers": 858,
"score": 0,
"subscribers_count": 9

View file

@ -28,6 +28,6 @@
"forks": 5,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -396,10 +396,10 @@
"description": null,
"fork": false,
"created_at": "2024-02-02T03:27:31Z",
"updated_at": "2024-07-09T08:34:42Z",
"updated_at": "2024-11-05T15:16:54Z",
"pushed_at": "2024-02-07T10:01:30Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -408,7 +408,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
"fork": false,
"created_at": "2018-06-24T05:34:05Z",
"updated_at": "2024-10-26T20:58:01Z",
"updated_at": "2024-11-05T12:33:59Z",
"pushed_at": "2020-10-16T12:09:45Z",
"stargazers_count": 507,
"watchers_count": 507,
"stargazers_count": 508,
"watchers_count": 508,
"has_discussions": false,
"forks_count": 453,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 453,
"watchers": 507,
"watchers": 508,
"score": 0,
"subscribers_count": 58
},

View file

@ -1,33 +0,0 @@
[
{
"id": 883215413,
"name": "CVE-2018-16451_tcpdump_AOSP_R33",
"full_name": "uthrasri\/CVE-2018-16451_tcpdump_AOSP_R33",
"owner": {
"login": "uthrasri",
"id": 145666390,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
"html_url": "https:\/\/github.com\/uthrasri",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/uthrasri\/CVE-2018-16451_tcpdump_AOSP_R33",
"description": null,
"fork": false,
"created_at": "2024-11-04T15:18:33Z",
"updated_at": "2024-11-05T10:28:54Z",
"pushed_at": "2024-11-05T10:28:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -76,10 +76,10 @@
"description": "Arbitrary code execution with kernel privileges using CVE-2018-8897.",
"fork": false,
"created_at": "2018-05-13T19:34:17Z",
"updated_at": "2024-09-27T22:36:33Z",
"updated_at": "2024-11-05T14:50:43Z",
"pushed_at": "2018-05-18T12:26:53Z",
"stargazers_count": 410,
"watchers_count": 410,
"stargazers_count": 411,
"watchers_count": 411,
"has_discussions": false,
"forks_count": 112,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 112,
"watchers": 410,
"watchers": 411,
"score": 0,
"subscribers_count": 16
},

View file

@ -3184,13 +3184,13 @@
"stargazers_count": 130,
"watchers_count": 130,
"has_discussions": false,
"forks_count": 20,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 20,
"forks": 21,
"watchers": 130,
"score": 0,
"subscribers_count": 4

View file

@ -14,10 +14,10 @@
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
"fork": false,
"created_at": "2019-09-03T15:08:49Z",
"updated_at": "2024-11-01T04:44:24Z",
"updated_at": "2024-11-05T15:17:55Z",
"pushed_at": "2019-09-08T06:09:11Z",
"stargazers_count": 794,
"watchers_count": 794,
"stargazers_count": 795,
"watchers_count": 795,
"has_discussions": false,
"forks_count": 69,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 69,
"watchers": 794,
"watchers": 795,
"score": 0,
"subscribers_count": 34
}

View file

@ -1039,10 +1039,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2024-11-03T23:28:49Z",
"updated_at": "2024-11-05T14:56:52Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1301,
"watchers_count": 1301,
"stargazers_count": 1302,
"watchers_count": 1302,
"has_discussions": false,
"forks_count": 343,
"allow_forking": true,
@ -1057,7 +1057,7 @@
],
"visibility": "public",
"forks": 343,
"watchers": 1301,
"watchers": 1302,
"score": 0,
"subscribers_count": 34
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 14,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"forks": 9,
"watchers": 40,
"score": 0,
"subscribers_count": 1

View file

@ -2449,5 +2449,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 883824974,
"name": "Expoitation-de-la-vuln-rabilit-CVE-2022-22965",
"full_name": "guigui237\/Expoitation-de-la-vuln-rabilit-CVE-2022-22965",
"owner": {
"login": "guigui237",
"id": 184559460,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/184559460?v=4",
"html_url": "https:\/\/github.com\/guigui237",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/guigui237\/Expoitation-de-la-vuln-rabilit-CVE-2022-22965",
"description": null,
"fork": false,
"created_at": "2024-11-05T16:30:00Z",
"updated_at": "2024-11-05T16:30:04Z",
"pushed_at": "2024-11-05T16:30:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-06T17:29:04Z",
"updated_at": "2024-09-24T22:32:18Z",
"updated_at": "2024-11-05T13:11:56Z",
"pushed_at": "2022-08-30T13:23:51Z",
"stargazers_count": 275,
"watchers_count": 275,
"stargazers_count": 276,
"watchers_count": 276,
"has_discussions": false,
"forks_count": 51,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 51,
"watchers": 275,
"watchers": 276,
"score": 0,
"subscribers_count": 15
},

View file

@ -50,7 +50,7 @@
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 22,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -61,7 +61,7 @@
"zimbra-exploit"
],
"visibility": "public",
"forks": 22,
"forks": 19,
"watchers": 56,
"score": 0,
"subscribers_count": 4

View file

@ -14,10 +14,10 @@
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
"fork": false,
"created_at": "2022-12-17T16:45:24Z",
"updated_at": "2024-10-31T13:33:20Z",
"updated_at": "2024-11-05T14:35:13Z",
"pushed_at": "2022-12-21T17:53:19Z",
"stargazers_count": 392,
"watchers_count": 392,
"stargazers_count": 393,
"watchers_count": 393,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 392,
"watchers": 393,
"score": 0,
"subscribers_count": 11
},

View file

@ -639,37 +639,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 637773004,
"name": "Joomla-CVE-2023-23752",
"full_name": "wibuheker\/Joomla-CVE-2023-23752",
"owner": {
"login": "wibuheker",
"id": 62054656,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62054656?v=4",
"html_url": "https:\/\/github.com\/wibuheker",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/wibuheker\/Joomla-CVE-2023-23752",
"description": null,
"fork": false,
"created_at": "2023-05-08T11:31:02Z",
"updated_at": "2023-05-08T11:31:37Z",
"pushed_at": "2023-05-08T11:35:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 654473257,
"name": "CVE-2023-23752",

View file

@ -49,10 +49,10 @@
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
"fork": false,
"created_at": "2023-05-22T03:06:31Z",
"updated_at": "2024-11-02T07:59:09Z",
"updated_at": "2024-11-05T15:32:26Z",
"pushed_at": "2024-08-24T13:38:50Z",
"stargazers_count": 268,
"watchers_count": 268,
"stargazers_count": 269,
"watchers_count": 269,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -69,7 +69,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 268,
"watchers": 269,
"score": 0,
"subscribers_count": 4
},

View file

@ -151,13 +151,13 @@
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"forks": 16,
"watchers": 57,
"score": 0,
"subscribers_count": 4

View file

@ -419,8 +419,8 @@
"description": null,
"fork": false,
"created_at": "2023-11-20T11:57:24Z",
"updated_at": "2024-11-05T09:40:16Z",
"pushed_at": "2024-11-05T09:40:13Z",
"updated_at": "2024-11-05T13:10:04Z",
"pushed_at": "2024-11-05T13:10:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -185,37 +185,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 879294011,
"name": "CVE-2024-23113",
"full_name": "hatvix1\/CVE-2024-23113",
"owner": {
"login": "hatvix1",
"id": 186392026,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186392026?v=4",
"html_url": "https:\/\/github.com\/hatvix1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hatvix1\/CVE-2024-23113",
"description": "CVE-2024-23113-Private-POC",
"fork": false,
"created_at": "2024-10-27T14:31:05Z",
"updated_at": "2024-11-03T12:29:02Z",
"pushed_at": "2024-11-03T12:28:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 879358553,
"name": "CVE-2024-23113",

33
2024/CVE-2024-23346.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 883761601,
"name": "CVE-2024-23346",
"full_name": "9carlo6\/CVE-2024-23346",
"owner": {
"login": "9carlo6",
"id": 45871476,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45871476?v=4",
"html_url": "https:\/\/github.com\/9carlo6",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/9carlo6\/CVE-2024-23346",
"description": "This repository contains a Crystallographic Information File (CIF) intended for use on the \"Chemistry\" machine on Hack The Box (HTB).",
"fork": false,
"created_at": "2024-11-05T14:27:06Z",
"updated_at": "2024-11-05T14:33:00Z",
"pushed_at": "2024-11-05T14:32:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)",
"fork": false,
"created_at": "2024-06-10T06:12:20Z",
"updated_at": "2024-10-12T16:14:38Z",
"updated_at": "2024-11-05T17:22:11Z",
"pushed_at": "2024-06-13T08:40:57Z",
"stargazers_count": 85,
"watchers_count": 85,
"stargazers_count": 86,
"watchers_count": 86,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 85,
"watchers": 86,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,10 +14,10 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false,
"created_at": "2024-10-13T19:30:20Z",
"updated_at": "2024-11-04T13:26:25Z",
"updated_at": "2024-11-05T14:08:19Z",
"pushed_at": "2024-10-17T18:36:54Z",
"stargazers_count": 195,
"watchers_count": 195,
"stargazers_count": 196,
"watchers_count": 196,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 195,
"watchers": 196,
"score": 0,
"subscribers_count": 6
},

View file

@ -358,10 +358,10 @@
"description": "potential memory corruption vulnerabilities in IPv6 networks.",
"fork": false,
"created_at": "2024-08-28T08:57:23Z",
"updated_at": "2024-11-03T11:48:44Z",
"updated_at": "2024-11-05T16:15:14Z",
"pushed_at": "2024-08-28T09:02:59Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -370,7 +370,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

64
2024/CVE-2024-43093.json Normal file
View file

@ -0,0 +1,64 @@
[
{
"id": 883768867,
"name": "CVE-2024-43093",
"full_name": "exploitsecure\/CVE-2024-43093",
"owner": {
"login": "exploitsecure",
"id": 186581872,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186581872?v=4",
"html_url": "https:\/\/github.com\/exploitsecure",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/exploitsecure\/CVE-2024-43093",
"description": null,
"fork": false,
"created_at": "2024-11-05T14:40:29Z",
"updated_at": "2024-11-05T15:04:30Z",
"pushed_at": "2024-11-05T15:04:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 883783289,
"name": "CVE-2024-43093",
"full_name": "hatvix1\/CVE-2024-43093",
"owner": {
"login": "hatvix1",
"id": 186392026,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186392026?v=4",
"html_url": "https:\/\/github.com\/hatvix1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hatvix1\/CVE-2024-43093",
"description": "CVE-2024-43093",
"fork": false,
"created_at": "2024-11-05T15:06:52Z",
"updated_at": "2024-11-05T16:25:24Z",
"pushed_at": "2024-11-05T16:25:21Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-44258",
"fork": false,
"created_at": "2024-10-29T09:45:03Z",
"updated_at": "2024-11-05T06:54:30Z",
"updated_at": "2024-11-05T16:24:12Z",
"pushed_at": "2024-11-02T19:20:44Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 1
}

View file

@ -169,10 +169,10 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-11-05T00:18:18Z",
"updated_at": "2024-11-05T14:07:37Z",
"pushed_at": "2024-06-22T15:13:52Z",
"stargazers_count": 222,
"watchers_count": 222,
"stargazers_count": 224,
"watchers_count": 224,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 222,
"watchers": 224,
"score": 0,
"subscribers_count": 4
},

33
2024/CVE-2024-50482.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 883725552,
"name": "CVE-2024-50482",
"full_name": "RandomRobbieBF\/CVE-2024-50482",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50482",
"description": "Woocommerce Product Design <= 1.0.0 - Unauthenticated Arbitrary File Upload",
"fork": false,
"created_at": "2024-11-05T13:19:05Z",
"updated_at": "2024-11-05T13:21:18Z",
"pushed_at": "2024-11-05T13:21:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-50485.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 883716846,
"name": "CVE-2024-50485",
"full_name": "RandomRobbieBF\/CVE-2024-50485",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50485",
"description": "Exam Matrix <= 1.5 - Unauthenticated Privilege Escalation",
"fork": false,
"created_at": "2024-11-05T13:02:28Z",
"updated_at": "2024-11-05T13:03:53Z",
"pushed_at": "2024-11-05T13:03:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -87,7 +87,7 @@
"description": null,
"fork": false,
"created_at": "2024-10-11T08:12:38Z",
"updated_at": "2024-10-28T22:46:12Z",
"updated_at": "2024-11-05T16:05:18Z",
"pushed_at": "2024-10-11T08:32:55Z",
"stargazers_count": 1,
"watchers_count": 1,

33
2024/CVE-2024-9932.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 883779888,
"name": "CVE-2024-9932",
"full_name": "RandomRobbieBF\/CVE-2024-9932",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-9932",
"description": "Wux Blog Editor <= 3.0.0 - Unauthenticated Arbitrary File Upload",
"fork": false,
"created_at": "2024-11-05T15:00:39Z",
"updated_at": "2024-11-05T15:02:08Z",
"pushed_at": "2024-11-05T15:02:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1711,6 +1711,9 @@
- [m3ssap0/wordpress-jetpack-broken-access-control-vulnerable-application](https://github.com/m3ssap0/wordpress-jetpack-broken-access-control-vulnerable-application)
- [m3ssap0/wordpress-jetpack-broken-access-control-exploit](https://github.com/m3ssap0/wordpress-jetpack-broken-access-control-exploit)
### CVE-2024-9932
- [RandomRobbieBF/CVE-2024-9932](https://github.com/RandomRobbieBF/CVE-2024-9932)
### CVE-2024-9954
- [zetraxz/CVE-2024-9954](https://github.com/zetraxz/CVE-2024-9954)
- [famixcm/CVE-2024-9954](https://github.com/famixcm/CVE-2024-9954)
@ -2347,7 +2350,6 @@
- [maybelookis/CVE-2024-23113](https://github.com/maybelookis/CVE-2024-23113)
- [p33d/CVE-2024-23113](https://github.com/p33d/CVE-2024-23113)
- [groshi/CVE-2024-23113-Private-POC](https://github.com/groshi/CVE-2024-23113-Private-POC)
- [hatvix1/CVE-2024-23113](https://github.com/hatvix1/CVE-2024-23113)
- [zgimszhd61/CVE-2024-23113](https://github.com/zgimszhd61/CVE-2024-23113)
- [puckiestyle/CVE-2024-23113](https://github.com/puckiestyle/CVE-2024-23113)
@ -2400,6 +2402,13 @@
- [200101WhoAmI/CVE-2024-23339](https://github.com/200101WhoAmI/CVE-2024-23339)
### CVE-2024-23346 (2024-02-21)
<code>Pymatgen (Python Materials Genomics) is an open-source Python library for materials analysis. A critical security vulnerability exists in the `JonesFaithfulTransformation.from_transformation_str()` method within the `pymatgen` library prior to version 2024.2.20. This method insecurely utilizes `eval()` for processing input, enabling execution of arbitrary code when parsing untrusted input. Version 2024.2.20 fixes this issue.
</code>
- [9carlo6/CVE-2024-23346](https://github.com/9carlo6/CVE-2024-23346)
### CVE-2024-23443 (2024-06-19)
<code>A high-privileged user, allowed to create custom osquery packs 17 could affect the availability of Kibana by uploading a maliciously crafted osquery pack.
@ -5440,6 +5449,10 @@
- [v9d0g/CVE-2024-43044-POC](https://github.com/v9d0g/CVE-2024-43044-POC)
- [convisolabs/CVE-2024-43044-jenkins](https://github.com/convisolabs/CVE-2024-43044-jenkins)
### CVE-2024-43093
- [exploitsecure/CVE-2024-43093](https://github.com/exploitsecure/CVE-2024-43093)
- [hatvix1/CVE-2024-43093](https://github.com/hatvix1/CVE-2024-43093)
### CVE-2024-43160 (2024-08-13)
<code>Unrestricted Upload of File with Dangerous Type vulnerability in BerqWP allows Code Injection.This issue affects BerqWP: from n/a through 1.7.6.
@ -5806,6 +5819,12 @@
### CVE-2024-50476
- [RandomRobbieBF/CVE-2024-50476](https://github.com/RandomRobbieBF/CVE-2024-50476)
### CVE-2024-50482
- [RandomRobbieBF/CVE-2024-50482](https://github.com/RandomRobbieBF/CVE-2024-50482)
### CVE-2024-50485
- [RandomRobbieBF/CVE-2024-50485](https://github.com/RandomRobbieBF/CVE-2024-50485)
### CVE-2024-50490
- [RandomRobbieBF/CVE-2024-50490](https://github.com/RandomRobbieBF/CVE-2024-50490)
@ -8243,7 +8262,6 @@
- [AkbarWiraN/Joomla-Scanner](https://github.com/AkbarWiraN/Joomla-Scanner)
- [Ge-Per/Scanner-CVE-2023-23752](https://github.com/Ge-Per/Scanner-CVE-2023-23752)
- [ThatNotEasy/CVE-2023-23752](https://github.com/ThatNotEasy/CVE-2023-23752)
- [wibuheker/Joomla-CVE-2023-23752](https://github.com/wibuheker/Joomla-CVE-2023-23752)
- [Sweelg/CVE-2023-23752](https://github.com/Sweelg/CVE-2023-23752)
- [MrP4nda1337/CVE-2023-23752](https://github.com/MrP4nda1337/CVE-2023-23752)
- [lainonz/CVE-2023-23752](https://github.com/lainonz/CVE-2023-23752)
@ -16126,6 +16144,7 @@
- [sohamsharma966/Spring4Shell-CVE-2022-22965](https://github.com/sohamsharma966/Spring4Shell-CVE-2022-22965)
- [LucasPDiniz/CVE-2022-22965](https://github.com/LucasPDiniz/CVE-2022-22965)
- [xsxtw/SpringFramework_CVE-2022-22965_RCE](https://github.com/xsxtw/SpringFramework_CVE-2022-22965_RCE)
- [guigui237/Expoitation-de-la-vuln-rabilit-CVE-2022-22965](https://github.com/guigui237/Expoitation-de-la-vuln-rabilit-CVE-2022-22965)
### CVE-2022-22966 (2022-04-14)
@ -39602,13 +39621,6 @@
- [RHYru9/CVE-2018-16431](https://github.com/RHYru9/CVE-2018-16431)
### CVE-2018-16451 (2019-10-03)
<code>The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN.
</code>
- [uthrasri/CVE-2018-16451_tcpdump_AOSP_R33](https://github.com/uthrasri/CVE-2018-16451_tcpdump_AOSP_R33)
### CVE-2018-16492 (2019-02-01)
<code>A prototype pollution vulnerability was found in module extend &lt;2.0.2, ~&lt;3.0.2 that allows an attacker to inject arbitrary properties onto Object.prototype.
@ -44635,6 +44647,7 @@
- [jas502n/CVE-2015-5254](https://github.com/jas502n/CVE-2015-5254)
- [Ma1Dong/ActiveMQ_CVE-2015-5254](https://github.com/Ma1Dong/ActiveMQ_CVE-2015-5254)
- [guigui237/Exploitation-de-la-vuln-rabilit-CVE-2015-5254-](https://github.com/guigui237/Exploitation-de-la-vuln-rabilit-CVE-2015-5254-)
### CVE-2015-5347 (2016-04-12)