Auto Update 2024/12/12 18:33:03

This commit is contained in:
motikan2010-bot 2024-12-13 03:33:03 +09:00
parent eca778046c
commit 145ce69511
49 changed files with 190 additions and 154 deletions

View file

@ -19,13 +19,13 @@
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 14,
"score": 0,
"subscribers_count": 4

View file

@ -59,7 +59,7 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 108
"subscribers_count": 107
},
{
"id": 7564614,

View file

@ -28,6 +28,6 @@
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 110
"subscribers_count": 109
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 109
"subscribers_count": 108
}
]

View file

@ -417,10 +417,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-12-08T08:50:03Z",
"updated_at": "2024-12-12T15:55:33Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 157,
"watchers_count": 157,
"stargazers_count": 158,
"watchers_count": 158,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -437,7 +437,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 157,
"watchers": 158,
"score": 0,
"subscribers_count": 2
},

View file

@ -205,10 +205,10 @@
"description": "iis6 exploit 2017 CVE-2017-7269",
"fork": false,
"created_at": "2017-04-05T23:21:12Z",
"updated_at": "2024-11-18T05:25:32Z",
"updated_at": "2024-12-12T16:04:23Z",
"pushed_at": "2023-02-04T09:09:35Z",
"stargazers_count": 87,
"watchers_count": 87,
"stargazers_count": 88,
"watchers_count": 88,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -217,7 +217,7 @@
"topics": [],
"visibility": "public",
"forks": 55,
"watchers": 87,
"watchers": 88,
"score": 0,
"subscribers_count": 3
},
@ -391,10 +391,10 @@
"description": null,
"fork": false,
"created_at": "2018-04-28T04:11:45Z",
"updated_at": "2024-08-12T19:38:07Z",
"updated_at": "2024-12-12T16:02:23Z",
"pushed_at": "2018-04-28T04:47:05Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -403,7 +403,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 2
},

View file

@ -76,10 +76,10 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2024-12-07T06:34:43Z",
"updated_at": "2024-12-12T12:16:18Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 212,
"watchers_count": 212,
"stargazers_count": 211,
"watchers_count": 211,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 57,
"watchers": 212,
"watchers": 211,
"score": 0,
"subscribers_count": 9
}

View file

@ -14,10 +14,10 @@
"description": "Social Network Tabs Wordpress Plugin Vulnerability - CVE-2018-20555",
"fork": false,
"created_at": "2019-01-16T14:45:44Z",
"updated_at": "2024-08-12T19:44:55Z",
"updated_at": "2024-12-12T12:22:56Z",
"pushed_at": "2020-10-20T14:30:01Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 75,
"watchers": 74,
"score": 0,
"subscribers_count": 3
}

View file

@ -28,6 +28,6 @@
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 7
"subscribers_count": 6
}
]

View file

@ -50,7 +50,7 @@
"stargazers_count": 311,
"watchers_count": 311,
"has_discussions": false,
"forks_count": 94,
"forks_count": 88,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -67,7 +67,7 @@
"security-1266"
],
"visibility": "public",
"forks": 94,
"forks": 88,
"watchers": 311,
"score": 0,
"subscribers_count": 4

View file

@ -180,13 +180,13 @@
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 23,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 23,
"forks": 22,
"watchers": 36,
"score": 0,
"subscribers_count": 4

View file

@ -14,10 +14,10 @@
"description": "USB device fuzzing on Android Phone",
"fork": false,
"created_at": "2020-04-05T05:45:29Z",
"updated_at": "2024-08-12T19:59:44Z",
"updated_at": "2024-12-12T14:13:19Z",
"pushed_at": "2021-10-16T15:23:41Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 29,
"watchers": 30,
"score": 0,
"subscribers_count": 3
}

View file

@ -324,8 +324,8 @@
"description": "This repo contains both the exploit and the explaination of how this vulnerability is exploited",
"fork": false,
"created_at": "2024-12-11T13:33:42Z",
"updated_at": "2024-12-11T13:33:46Z",
"pushed_at": "2024-12-11T13:33:42Z",
"updated_at": "2024-12-12T16:25:42Z",
"pushed_at": "2024-12-12T16:25:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -981,10 +981,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-12-08T08:50:03Z",
"updated_at": "2024-12-12T15:55:33Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 157,
"watchers_count": 157,
"stargazers_count": 158,
"watchers_count": 158,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -1001,7 +1001,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 157,
"watchers": 158,
"score": 0,
"subscribers_count": 2
}

View file

@ -49,7 +49,7 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2024-12-05T15:38:57Z",
"updated_at": "2024-12-12T17:05:22Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1973,
"watchers_count": 1973,

View file

@ -231,10 +231,10 @@
"description": "CVE-2021-40438 Apache <= 2.4.48 SSRF exploit",
"fork": false,
"created_at": "2023-12-12T11:56:23Z",
"updated_at": "2024-10-25T15:20:44Z",
"updated_at": "2024-12-12T14:13:00Z",
"pushed_at": "2023-12-12T12:29:24Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -251,7 +251,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 1346,
"watchers_count": 1346,
"has_discussions": false,
"forks_count": 323,
"forks_count": 322,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 323,
"forks": 322,
"watchers": 1346,
"score": 0,
"subscribers_count": 27

View file

@ -1307,7 +1307,7 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2024-12-11T08:54:15Z",
"updated_at": "2024-12-12T17:05:21Z",
"pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 802,
"watchers_count": 802,

View file

@ -58,13 +58,13 @@
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 12,
"score": 0,
"subscribers_count": 2

View file

@ -143,13 +143,13 @@
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 12,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"forks": 11,
"watchers": 13,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "CVE-2022-2586: Linux kernel nft_object UAF",
"fork": false,
"created_at": "2022-09-03T19:04:31Z",
"updated_at": "2024-12-11T15:49:41Z",
"updated_at": "2024-12-12T15:10:18Z",
"pushed_at": "2022-09-03T19:06:45Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2024-12-11T02:33:29Z",
"updated_at": "2024-12-12T17:05:24Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1176,
"watchers_count": 1176,
"stargazers_count": 1172,
"watchers_count": 1172,
"has_discussions": true,
"forks_count": 190,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 190,
"watchers": 1176,
"watchers": 1172,
"score": 0,
"subscribers_count": 19
},

View file

@ -852,7 +852,7 @@
"description": "CVE-2022-30190-follina.py-修改版可以自定义word模板方便实战中钓鱼使用。",
"fork": false,
"created_at": "2022-06-02T12:33:18Z",
"updated_at": "2024-11-27T14:51:07Z",
"updated_at": "2024-12-12T17:05:24Z",
"pushed_at": "2023-04-13T16:46:26Z",
"stargazers_count": 396,
"watchers_count": 396,

View file

@ -391,10 +391,10 @@
"description": "通过 jvm 启动参数 以及 jps pid进行拦截非法参数",
"fork": false,
"created_at": "2022-10-20T13:05:24Z",
"updated_at": "2024-01-12T15:42:59Z",
"updated_at": "2024-12-12T14:31:34Z",
"pushed_at": "2022-10-21T03:46:50Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -405,7 +405,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2023-03-11T15:04:51Z",
"updated_at": "2024-12-12T02:23:56Z",
"updated_at": "2024-12-12T17:05:08Z",
"pushed_at": "2024-01-09T21:11:58Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 2
}

View file

@ -541,15 +541,15 @@
{
"id": 617968206,
"name": "CVE-2023-23397",
"full_name": "shaolinsec\/CVE-2023-23397",
"full_name": "stevesec\/CVE-2023-23397",
"owner": {
"login": "shaolinsec",
"login": "stevesec",
"id": 80222096,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80222096?v=4",
"html_url": "https:\/\/github.com\/shaolinsec",
"html_url": "https:\/\/github.com\/stevesec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/shaolinsec\/CVE-2023-23397",
"html_url": "https:\/\/github.com\/stevesec\/CVE-2023-23397",
"description": null,
"fork": false,
"created_at": "2023-03-23T13:40:18Z",

View file

@ -663,10 +663,10 @@
"description": "This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script is executed, leading to code execution.",
"fork": false,
"created_at": "2023-09-03T21:14:05Z",
"updated_at": "2024-12-12T07:41:54Z",
"updated_at": "2024-12-12T17:05:26Z",
"pushed_at": "2023-09-08T06:15:42Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -675,7 +675,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 2
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 1290,
"watchers_count": 1290,
"has_discussions": false,
"forks_count": 219,
"forks_count": 220,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 219,
"forks": 220,
"watchers": 1290,
"score": 0,
"subscribers_count": 21

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-6241 for Pixel 8",
"fork": false,
"created_at": "2024-05-02T02:17:31Z",
"updated_at": "2024-11-19T16:35:45Z",
"updated_at": "2024-12-12T16:41:59Z",
"pushed_at": "2024-10-17T19:39:45Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 2
}

View file

@ -267,8 +267,8 @@
"description": "This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This script automates the exploitation process, including payload creation, chunked delivery, and seamless command execution.",
"fork": false,
"created_at": "2024-12-11T18:13:32Z",
"updated_at": "2024-12-11T19:30:50Z",
"pushed_at": "2024-12-11T19:22:20Z",
"updated_at": "2024-12-12T15:48:13Z",
"pushed_at": "2024-12-12T15:48:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": " Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 9.1.1.1 Authentication Bypass",
"fork": false,
"created_at": "2024-11-14T16:59:52Z",
"updated_at": "2024-11-21T00:35:21Z",
"updated_at": "2024-12-12T13:40:41Z",
"pushed_at": "2024-11-14T17:00:59Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis",
"fork": false,
"created_at": "2024-11-29T06:13:36Z",
"updated_at": "2024-12-12T06:01:40Z",
"updated_at": "2024-12-12T14:13:59Z",
"pushed_at": "2024-12-04T01:01:28Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 41,
"watchers": 42,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues.",
"fork": false,
"created_at": "2024-12-04T18:42:43Z",
"updated_at": "2024-12-11T23:45:35Z",
"updated_at": "2024-12-12T16:35:40Z",
"pushed_at": "2024-12-11T23:45:31Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-03-08T02:31:41Z",
"updated_at": "2024-11-29T05:01:59Z",
"updated_at": "2024-12-12T13:01:40Z",
"pushed_at": "2024-03-12T13:33:58Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2024-12-12T07:41:57Z",
"updated_at": "2024-12-12T17:05:29Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 707,
"watchers_count": 707,
"stargazers_count": 708,
"watchers_count": 708,
"has_discussions": false,
"forks_count": 153,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 153,
"watchers": 707,
"watchers": 708,
"score": 0,
"subscribers_count": 10
},

View file

@ -45,10 +45,10 @@
"description": "Proof of concept of the CVE-2024-24549, Exploit in Python. ",
"fork": false,
"created_at": "2024-12-09T04:59:07Z",
"updated_at": "2024-12-12T06:53:35Z",
"updated_at": "2024-12-12T13:53:58Z",
"pushed_at": "2024-12-09T05:09:43Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -76,10 +76,10 @@
"description": "Exploit PoC for CVE-2024-32002",
"fork": false,
"created_at": "2024-05-17T19:33:08Z",
"updated_at": "2024-12-12T07:38:14Z",
"updated_at": "2024-12-12T16:39:07Z",
"pushed_at": "2024-05-19T07:12:00Z",
"stargazers_count": 516,
"watchers_count": 516,
"stargazers_count": 517,
"watchers_count": 517,
"has_discussions": false,
"forks_count": 145,
"allow_forking": true,
@ -93,7 +93,7 @@
],
"visibility": "public",
"forks": 145,
"watchers": 516,
"watchers": 517,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-32640 | Automated SQLi Exploitation PoC",
"fork": false,
"created_at": "2024-05-16T01:02:32Z",
"updated_at": "2024-11-20T16:30:46Z",
"updated_at": "2024-12-12T13:46:58Z",
"pushed_at": "2024-05-16T21:07:32Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -38,7 +38,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 60,
"watchers": 61,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false,
"created_at": "2024-10-13T19:30:20Z",
"updated_at": "2024-12-09T21:37:48Z",
"updated_at": "2024-12-12T17:02:29Z",
"pushed_at": "2024-11-29T16:56:23Z",
"stargazers_count": 218,
"watchers_count": 218,
"stargazers_count": 219,
"watchers_count": 219,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 218,
"watchers": 219,
"score": 0,
"subscribers_count": 6
},

View file

@ -50,13 +50,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0

View file

@ -123,6 +123,37 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 901596404,
"name": "Zabbix---CVE-2024-42327",
"full_name": "itform-fr\/Zabbix---CVE-2024-42327",
"owner": {
"login": "itform-fr",
"id": 131718750,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131718750?v=4",
"html_url": "https:\/\/github.com\/itform-fr",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/itform-fr\/Zabbix---CVE-2024-42327",
"description": null,
"fork": false,
"created_at": "2024-12-11T00:39:26Z",
"updated_at": "2024-12-12T16:27:33Z",
"pushed_at": "2024-12-11T00:46:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 902138431,
"name": "CVE-2024-42327",
@ -138,18 +169,18 @@
"description": "writeup cve-2024-42327",
"fork": false,
"created_at": "2024-12-12T01:32:26Z",
"updated_at": "2024-12-12T04:09:28Z",
"pushed_at": "2024-12-12T04:09:24Z",
"updated_at": "2024-12-12T18:15:09Z",
"pushed_at": "2024-12-12T18:15:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0

View file

@ -14,10 +14,10 @@
"description": "Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's \"KartLANPwn\" buffer overflow vulnerability",
"fork": false,
"created_at": "2024-09-13T00:41:32Z",
"updated_at": "2024-12-08T22:58:04Z",
"updated_at": "2024-12-12T16:00:05Z",
"pushed_at": "2024-10-01T00:57:03Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 53,
"watchers": 52,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,10 +14,10 @@
"description": "PoC for CVE-2024-48990",
"fork": false,
"created_at": "2024-11-20T18:41:25Z",
"updated_at": "2024-12-12T04:14:49Z",
"updated_at": "2024-12-12T13:17:01Z",
"pushed_at": "2024-11-20T18:49:33Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 89,
"watchers_count": 89,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 88,
"watchers": 89,
"score": 0,
"subscribers_count": 1
},

View file

@ -543,13 +543,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0

View file

@ -14,10 +14,10 @@
"description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)",
"fork": false,
"created_at": "2024-12-11T14:19:55Z",
"updated_at": "2024-12-12T09:59:03Z",
"updated_at": "2024-12-12T15:14:47Z",
"pushed_at": "2024-12-11T14:23:19Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 9,
"watchers": 11,
"score": 0,
"subscribers_count": 0
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 0

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-54679 - CyberPanel (aka Cyber Panel) Denial of Service (https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-54679)",
"fork": false,
"created_at": "2024-12-06T06:02:34Z",
"updated_at": "2024-12-08T09:23:19Z",
"updated_at": "2024-12-12T13:07:15Z",
"pushed_at": "2024-12-06T06:19:42Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -76,10 +76,10 @@
"description": "Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12 ",
"fork": false,
"created_at": "2024-09-01T10:59:45Z",
"updated_at": "2024-10-15T14:33:18Z",
"updated_at": "2024-12-12T12:53:59Z",
"pushed_at": "2024-09-01T11:07:15Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -2408,7 +2408,7 @@
### CVE-2024-20767 (2024-03-18)
<code>ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could lead to arbitrary file system read. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access to sensitive files and perform arbitrary file system write. Exploitation of this issue does not require user interaction.
<code>ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. An attacker could leverage this vulnerability to access or modify restricted files. Exploitation of this issue does not require user interaction. Exploitation of this issue requires the admin panel be exposed to the internet.
</code>
- [yoryio/CVE-2024-20767](https://github.com/yoryio/CVE-2024-20767)
@ -6133,6 +6133,7 @@
- [compr00t/CVE-2024-42327](https://github.com/compr00t/CVE-2024-42327)
- [depers-rus/CVE-2024-42327](https://github.com/depers-rus/CVE-2024-42327)
- [watchdog1337/CVE-2024-42327_Zabbix_SQLI](https://github.com/watchdog1337/CVE-2024-42327_Zabbix_SQLI)
- [itform-fr/Zabbix---CVE-2024-42327](https://github.com/itform-fr/Zabbix---CVE-2024-42327)
- [igorbf495/CVE-2024-42327](https://github.com/igorbf495/CVE-2024-42327)
### CVE-2024-42346 (2024-09-20)
@ -7399,7 +7400,11 @@
- [hotplugin0x01/CVE-2024-54679](https://github.com/hotplugin0x01/CVE-2024-54679)
### CVE-2024-55099
### CVE-2024-55099 (2024-12-12)
<code>A SQL Injection vulnerability was found in /admin/index.php in phpgurukul Online Nurse Hiring System v1.0, which allows remote attackers to execute arbitrary SQL commands to get unauthorized database access via the username parameter.
</code>
- [kuzgunaka/CVE-2024-55099-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability-](https://github.com/kuzgunaka/CVE-2024-55099-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability-)
### CVE-2024-55557
@ -9789,7 +9794,7 @@
- [SecCTechs/CVE-2023-23397](https://github.com/SecCTechs/CVE-2023-23397)
- [tiepologian/CVE-2023-23397](https://github.com/tiepologian/CVE-2023-23397)
- [BronzeBee/cve-2023-23397](https://github.com/BronzeBee/cve-2023-23397)
- [shaolinsec/CVE-2023-23397](https://github.com/shaolinsec/CVE-2023-23397)
- [stevesec/CVE-2023-23397](https://github.com/stevesec/CVE-2023-23397)
- [Cyb3rMaddy/CVE-2023-23397-Report](https://github.com/Cyb3rMaddy/CVE-2023-23397-Report)
- [Zeppperoni/CVE-2023-23397-Patch](https://github.com/Zeppperoni/CVE-2023-23397-Patch)
- [jacquesquail/CVE-2023-23397](https://github.com/jacquesquail/CVE-2023-23397)