Auto Update 2024/12/06 18:32:17

This commit is contained in:
motikan2010-bot 2024-12-07 03:32:17 +09:00
parent a0ec5db0db
commit 160711f2c0
25 changed files with 225 additions and 109 deletions

View file

@ -116,7 +116,7 @@
"stargazers_count": 251,
"watchers_count": 251,
"has_discussions": false,
"forks_count": 74,
"forks_count": 75,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -130,7 +130,7 @@
"sslv3"
],
"visibility": "public",
"forks": 74,
"forks": 75,
"watchers": 251,
"score": 0,
"subscribers_count": 17

View file

@ -272,7 +272,7 @@
"description": "A CVE-2016-5195 exploit example.",
"fork": false,
"created_at": "2016-10-23T00:16:33Z",
"updated_at": "2024-12-06T06:15:55Z",
"updated_at": "2024-12-06T15:04:46Z",
"pushed_at": "2017-03-21T16:46:38Z",
"stargazers_count": 316,
"watchers_count": 316,
@ -462,10 +462,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2024-11-26T21:35:00Z",
"updated_at": "2024-12-06T16:30:16Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 862,
"watchers_count": 862,
"stargazers_count": 863,
"watchers_count": 863,
"has_discussions": false,
"forks_count": 428,
"allow_forking": true,
@ -478,7 +478,7 @@
],
"visibility": "public",
"forks": 428,
"watchers": 862,
"watchers": 863,
"score": 0,
"subscribers_count": 9
},

View file

@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2020-05-21T00:41:06Z",
"updated_at": "2024-11-16T13:03:27Z",
"updated_at": "2024-12-06T15:27:26Z",
"pushed_at": "2021-10-28T02:31:04Z",
"stargazers_count": 128,
"watchers_count": 128,
"stargazers_count": 127,
"watchers_count": 127,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 128,
"watchers": 127,
"score": 0,
"subscribers_count": 5
},

View file

@ -231,10 +231,10 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2024-12-04T22:45:31Z",
"updated_at": "2024-12-06T12:17:35Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1602,
"watchers_count": 1602,
"stargazers_count": 1603,
"watchers_count": 1603,
"has_discussions": false,
"forks_count": 482,
"allow_forking": true,
@ -243,7 +243,7 @@
"topics": [],
"visibility": "public",
"forks": 482,
"watchers": 1602,
"watchers": 1603,
"score": 0,
"subscribers_count": 28
},

View file

@ -123,37 +123,6 @@
"score": 0,
"subscribers_count": 17
},
{
"id": 467240173,
"name": "CVE-2022-0847",
"full_name": "2xYuan\/CVE-2022-0847",
"owner": {
"login": "2xYuan",
"id": 101141051,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101141051?v=4",
"html_url": "https:\/\/github.com\/2xYuan",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/2xYuan\/CVE-2022-0847",
"description": "66666",
"fork": false,
"created_at": "2022-03-07T19:56:37Z",
"updated_at": "2022-03-20T07:34:45Z",
"pushed_at": "2022-03-07T19:56:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 467257098,
"name": "Dirty-Pipe",

View file

@ -14,10 +14,10 @@
"description": "exploit for CVE-2022-2588",
"fork": false,
"created_at": "2022-08-11T06:01:24Z",
"updated_at": "2024-12-05T04:30:09Z",
"updated_at": "2024-12-06T15:24:04Z",
"pushed_at": "2023-03-04T05:52:28Z",
"stargazers_count": 471,
"watchers_count": 471,
"stargazers_count": 473,
"watchers_count": 473,
"has_discussions": false,
"forks_count": 68,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 68,
"watchers": 471,
"watchers": 473,
"score": 0,
"subscribers_count": 49
},

View file

@ -122,5 +122,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 899547899,
"name": "CVE-2022-32250",
"full_name": "seadragnol\/CVE-2022-32250",
"owner": {
"login": "seadragnol",
"id": 55611051,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55611051?v=4",
"html_url": "https:\/\/github.com\/seadragnol",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/seadragnol\/CVE-2022-32250",
"description": null,
"fork": false,
"created_at": "2024-12-06T13:49:38Z",
"updated_at": "2024-12-06T14:20:18Z",
"pushed_at": "2024-12-06T14:14:29Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -114,10 +114,10 @@
"description": null,
"fork": false,
"created_at": "2023-12-22T08:42:00Z",
"updated_at": "2024-07-04T11:00:31Z",
"updated_at": "2024-12-06T15:00:26Z",
"pushed_at": "2023-12-22T08:49:59Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -126,7 +126,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -699,7 +699,7 @@
"fork": false,
"created_at": "2024-04-17T13:10:34Z",
"updated_at": "2024-10-30T15:47:10Z",
"pushed_at": "2024-11-22T16:50:12Z",
"pushed_at": "2024-12-06T16:20:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -222,7 +222,7 @@
"fork": false,
"created_at": "2024-01-09T16:58:06Z",
"updated_at": "2024-11-22T23:28:43Z",
"pushed_at": "2024-11-22T17:26:31Z",
"pushed_at": "2024-12-06T17:19:32Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,

View file

@ -297,10 +297,10 @@
"description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app",
"fork": false,
"created_at": "2024-09-27T09:02:08Z",
"updated_at": "2024-12-04T02:24:12Z",
"updated_at": "2024-12-06T17:52:28Z",
"pushed_at": "2024-09-30T12:48:08Z",
"stargazers_count": 119,
"watchers_count": 119,
"stargazers_count": 120,
"watchers_count": 120,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -309,7 +309,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 119,
"watchers": 120,
"score": 0,
"subscribers_count": 3
}

33
2024/CVE-2024-10516.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 899490028,
"name": "CVE-2024-10516",
"full_name": "RandomRobbieBF\/CVE-2024-10516",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10516",
"description": "Swift Performance Lite <= 2.3.7.1 - Unauthenticated Local PHP File Inclusion via 'ajaxify'",
"fork": false,
"created_at": "2024-12-06T11:24:19Z",
"updated_at": "2024-12-06T15:42:17Z",
"pushed_at": "2024-12-06T11:25:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-12155.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 899528238,
"name": "CVE-2024-12155",
"full_name": "McTavishSue\/CVE-2024-12155",
"owner": {
"login": "McTavishSue",
"id": 186207823,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186207823?v=4",
"html_url": "https:\/\/github.com\/McTavishSue",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/McTavishSue\/CVE-2024-12155",
"description": "CVE-2024-12155 Missing Authorization (CWE-862)",
"fork": false,
"created_at": "2024-12-06T13:03:09Z",
"updated_at": "2024-12-06T13:15:58Z",
"pushed_at": "2024-12-06T13:13:21Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -76,10 +76,10 @@
"description": "CVE-2024-23897",
"fork": false,
"created_at": "2024-01-26T09:44:32Z",
"updated_at": "2024-11-27T22:38:24Z",
"updated_at": "2024-12-06T13:03:02Z",
"pushed_at": "2024-01-28T06:47:28Z",
"stargazers_count": 194,
"watchers_count": 194,
"stargazers_count": 195,
"watchers_count": 195,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 194,
"watchers": 195,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-31317",
"fork": false,
"created_at": "2024-12-05T01:36:59Z",
"updated_at": "2024-12-06T05:23:41Z",
"updated_at": "2024-12-06T13:11:25Z",
"pushed_at": "2024-12-05T01:52:45Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -181,13 +181,13 @@
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 14,
"score": 0,
"subscribers_count": 0

View file

@ -14,19 +14,19 @@
"description": null,
"fork": false,
"created_at": "2024-12-05T06:13:57Z",
"updated_at": "2024-12-06T09:16:50Z",
"updated_at": "2024-12-06T14:22:50Z",
"pushed_at": "2024-12-05T07:55:04Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"forks": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": "cve-2024-42327 ZBX-25623",
"fork": false,
"created_at": "2024-12-01T00:15:27Z",
"updated_at": "2024-12-06T08:32:05Z",
"updated_at": "2024-12-06T16:51:32Z",
"pushed_at": "2024-12-01T01:18:36Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 1
},
@ -60,5 +60,36 @@
"watchers": 15,
"score": 0,
"subscribers_count": 1
},
{
"id": 899606694,
"name": "CVE-2024-42327",
"full_name": "depers-rus\/CVE-2024-42327",
"owner": {
"login": "depers-rus",
"id": 173357545,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173357545?v=4",
"html_url": "https:\/\/github.com\/depers-rus",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/depers-rus\/CVE-2024-42327",
"description": null,
"fork": false,
"created_at": "2024-12-06T16:06:00Z",
"updated_at": "2024-12-06T16:45:38Z",
"pushed_at": "2024-12-06T16:45:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575",
"fork": false,
"created_at": "2024-11-07T21:03:30Z",
"updated_at": "2024-12-05T20:21:58Z",
"updated_at": "2024-12-06T17:32:23Z",
"pushed_at": "2024-11-14T16:25:52Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 72,
"watchers": 73,
"score": 0,
"subscribers_count": 0
},

View file

@ -14,10 +14,10 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false,
"created_at": "2024-11-19T08:57:18Z",
"updated_at": "2024-12-06T08:32:40Z",
"updated_at": "2024-12-06T13:32:47Z",
"pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 72,
"watchers": 73,
"score": 0,
"subscribers_count": 1
}

View file

@ -410,10 +410,10 @@
"description": "POC - CVE-20244956 - Nexus Repository Manager 3 Unauthenticated Path Traversal",
"fork": false,
"created_at": "2024-06-09T10:57:29Z",
"updated_at": "2024-11-26T21:34:44Z",
"updated_at": "2024-12-06T13:37:45Z",
"pushed_at": "2024-11-26T14:46:24Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -426,7 +426,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},
@ -507,10 +507,10 @@
"description": "Simple hash cracker for Apache Shiro hashes written in Golang. Useful for exploiting CVE-2024-4956.",
"fork": false,
"created_at": "2024-10-04T19:54:05Z",
"updated_at": "2024-10-06T16:27:05Z",
"updated_at": "2024-12-06T13:38:19Z",
"pushed_at": "2024-10-04T20:38:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -519,7 +519,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "This repository presents a proof-of-concept of CVE-2024-50677",
"fork": false,
"created_at": "2024-12-06T01:04:44Z",
"updated_at": "2024-12-06T08:10:02Z",
"pushed_at": "2024-12-06T01:16:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"updated_at": "2024-12-06T16:38:29Z",
"pushed_at": "2024-12-06T16:28:44Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -11,10 +11,10 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hotplugin0x01\/CVE-2024-54679",
"description": "CVE-2024-54679 - CyberPanel (aka Cyber Panel) Denial of Service",
"description": "CVE-2024-54679 - CyberPanel (aka Cyber Panel) Denial of Service (https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-54679)",
"fork": false,
"created_at": "2024-12-06T06:02:34Z",
"updated_at": "2024-12-06T06:19:46Z",
"updated_at": "2024-12-06T16:41:35Z",
"pushed_at": "2024-12-06T06:19:42Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -2211,10 +2211,10 @@
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
"fork": false,
"created_at": "2024-07-08T11:27:49Z",
"updated_at": "2024-12-06T11:07:10Z",
"updated_at": "2024-12-06T12:31:35Z",
"pushed_at": "2024-08-22T08:50:25Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -2223,7 +2223,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 51,
"watchers": 52,
"score": 0,
"subscribers_count": 2
},

View file

@ -2064,6 +2064,13 @@
- [ubaii/CVE-2024-10508](https://github.com/ubaii/CVE-2024-10508)
- [Jenderal92/CVE-2024-10508](https://github.com/Jenderal92/CVE-2024-10508)
### CVE-2024-10516 (2024-12-06)
<code>The Swift Performance Lite plugin for WordPress is vulnerable to Local PHP File Inclusion in all versions up to, and including, 2.3.7.1 via the 'ajaxify' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
</code>
- [RandomRobbieBF/CVE-2024-10516](https://github.com/RandomRobbieBF/CVE-2024-10516)
### CVE-2024-10542 (2024-11-26)
<code>The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS spoofing on the checkWithoutToken function in all versions up to, and including, 6.43.2. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated.
@ -2261,6 +2268,13 @@
- [D3N14LD15K/CVE-2024-11680_PoC_Exploit](https://github.com/D3N14LD15K/CVE-2024-11680_PoC_Exploit)
### CVE-2024-12155 (2024-12-06)
<code>The SV100 Companion plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the settings_import() function in all versions up to, and including, 2.0.02. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
</code>
- [McTavishSue/CVE-2024-12155](https://github.com/McTavishSue/CVE-2024-12155)
### CVE-2024-12345
- [RoyaRadin/CVE-2024-12345-POC](https://github.com/RoyaRadin/CVE-2024-12345-POC)
@ -6057,6 +6071,7 @@
- [aramosf/cve-2024-42327](https://github.com/aramosf/cve-2024-42327)
- [compr00t/CVE-2024-42327](https://github.com/compr00t/CVE-2024-42327)
- [depers-rus/CVE-2024-42327](https://github.com/depers-rus/CVE-2024-42327)
### CVE-2024-42346 (2024-09-20)
@ -6973,7 +6988,11 @@
- [SAHALLL/CVE-2024-50657](https://github.com/SAHALLL/CVE-2024-50657)
### CVE-2024-50677
### CVE-2024-50677 (2024-12-06)
<code>A cross-site scripting (XSS) vulnerability in OroPlatform CMS v5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Search parameter.
</code>
- [ZumiYumi/CVE-2024-50677](https://github.com/ZumiYumi/CVE-2024-50677)
### CVE-2024-50803 (2024-11-19)
@ -15928,7 +15947,6 @@
- [xndpxs/CVE-2022-0847](https://github.com/xndpxs/CVE-2022-0847)
- [r1is/CVE-2022-0847](https://github.com/r1is/CVE-2022-0847)
- [Arinerron/CVE-2022-0847-DirtyPipe-Exploit](https://github.com/Arinerron/CVE-2022-0847-DirtyPipe-Exploit)
- [2xYuan/CVE-2022-0847](https://github.com/2xYuan/CVE-2022-0847)
- [crowsec-edtech/Dirty-Pipe](https://github.com/crowsec-edtech/Dirty-Pipe)
- [lucksec/CVE-2022-0847](https://github.com/lucksec/CVE-2022-0847)
- [si1ent-le/CVE-2022-0847](https://github.com/si1ent-le/CVE-2022-0847)
@ -20154,6 +20172,7 @@
- [ysanatomic/CVE-2022-32250-LPE](https://github.com/ysanatomic/CVE-2022-32250-LPE)
- [Decstor5/2022-32250LPE](https://github.com/Decstor5/2022-32250LPE)
- [Kristal-g/CVE-2022-32250](https://github.com/Kristal-g/CVE-2022-32250)
- [seadragnol/CVE-2022-32250](https://github.com/seadragnol/CVE-2022-32250)
### CVE-2022-32532 (2022-06-28)