Auto Update 2024/12/13 12:33:10

This commit is contained in:
motikan2010-bot 2024-12-13 21:33:10 +09:00
parent d7129173d8
commit 1dcb9d92a4
38 changed files with 249 additions and 113 deletions

View file

@ -14,10 +14,10 @@
"description": "PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282",
"fork": false,
"created_at": "2021-05-17T04:39:32Z",
"updated_at": "2024-10-07T18:03:33Z",
"updated_at": "2024-12-13T10:41:40Z",
"pushed_at": "2024-05-27T02:44:38Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -42,7 +42,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 45,
"watchers": 46,
"score": 0,
"subscribers_count": 4
}

View file

@ -314,5 +314,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 902838403,
"name": "CVE-2017-12617",
"full_name": "DevaDJ\/CVE-2017-12617",
"owner": {
"login": "DevaDJ",
"id": 56772318,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56772318?v=4",
"html_url": "https:\/\/github.com\/DevaDJ",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/DevaDJ\/CVE-2017-12617",
"description": "Improved version of PikaChu CVE",
"fork": false,
"created_at": "2024-12-13T11:22:38Z",
"updated_at": "2024-12-13T11:31:35Z",
"pushed_at": "2024-12-13T11:31:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -324,8 +324,8 @@
"description": "This repo contains both the exploit and the explaination of how this vulnerability is exploited",
"fork": false,
"created_at": "2024-12-11T13:33:42Z",
"updated_at": "2024-12-12T20:40:34Z",
"pushed_at": "2024-12-12T20:40:30Z",
"updated_at": "2024-12-13T08:29:49Z",
"pushed_at": "2024-12-13T08:29:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -45,10 +45,10 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2024-12-10T10:06:00Z",
"updated_at": "2024-12-13T08:33:01Z",
"pushed_at": "2022-01-05T04:09:42Z",
"stargazers_count": 641,
"watchers_count": 641,
"stargazers_count": 642,
"watchers_count": 642,
"has_discussions": false,
"forks_count": 163,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 163,
"watchers": 641,
"watchers": 642,
"score": 0,
"subscribers_count": 13
},

View file

@ -169,10 +169,10 @@
"description": "Read my blog for more info - ",
"fork": false,
"created_at": "2021-04-25T12:55:15Z",
"updated_at": "2024-08-21T03:39:34Z",
"updated_at": "2024-12-13T08:08:44Z",
"pushed_at": "2021-04-27T21:13:18Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 32,
"watchers": 33,
"score": 0,
"subscribers_count": 2
},

View file

@ -262,10 +262,10 @@
"description": "VMware vCenter Server任意文件上传漏洞 \/ Code By:Jun_sheng",
"fork": false,
"created_at": "2021-10-27T08:36:21Z",
"updated_at": "2024-10-28T02:18:43Z",
"updated_at": "2024-12-13T12:10:18Z",
"pushed_at": "2022-07-08T09:17:14Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -274,7 +274,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 19,
"watchers": 20,
"score": 0,
"subscribers_count": 1
},

View file

@ -204,10 +204,10 @@
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
"fork": false,
"created_at": "2021-02-18T05:42:13Z",
"updated_at": "2024-12-08T07:44:09Z",
"updated_at": "2024-12-13T08:25:21Z",
"pushed_at": "2021-12-14T05:12:17Z",
"stargazers_count": 148,
"watchers_count": 148,
"stargazers_count": 149,
"watchers_count": 149,
"has_discussions": false,
"forks_count": 58,
"allow_forking": true,
@ -216,7 +216,7 @@
"topics": [],
"visibility": "public",
"forks": 58,
"watchers": 148,
"watchers": 149,
"score": 0,
"subscribers_count": 1
},

View file

@ -1265,10 +1265,10 @@
"description": "CVE-2021-3156 - Sudo Baron Samedit",
"fork": false,
"created_at": "2021-04-29T06:29:26Z",
"updated_at": "2024-12-05T20:01:29Z",
"updated_at": "2024-12-13T08:10:23Z",
"pushed_at": "2022-02-12T19:33:07Z",
"stargazers_count": 221,
"watchers_count": 221,
"stargazers_count": 222,
"watchers_count": 222,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -1277,7 +1277,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 221,
"watchers": 222,
"score": 0,
"subscribers_count": 8
},

View file

@ -967,10 +967,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2024-12-09T15:53:46Z",
"updated_at": "2024-12-13T11:37:03Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 1089,
"watchers_count": 1089,
"stargazers_count": 1090,
"watchers_count": 1090,
"has_discussions": false,
"forks_count": 190,
"allow_forking": true,
@ -981,7 +981,7 @@
],
"visibility": "public",
"forks": 190,
"watchers": 1089,
"watchers": 1090,
"score": 0,
"subscribers_count": 13
},

View file

@ -14,10 +14,10 @@
"description": "A download of code without integrity check vulnerability in the \"execute restore src-vis\" command of FortiOS before 7.0.3.",
"fork": false,
"created_at": "2023-02-08T07:30:52Z",
"updated_at": "2024-11-14T23:09:52Z",
"updated_at": "2024-12-13T11:14:49Z",
"pushed_at": "2023-10-18T17:15:55Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 18,
"watchers": 19,
"score": 0,
"subscribers_count": 1
}

View file

@ -7201,10 +7201,10 @@
"description": "Small example repo for looking into log4j CVE-2021-44228",
"fork": false,
"created_at": "2021-12-15T19:59:38Z",
"updated_at": "2024-09-24T16:59:09Z",
"updated_at": "2024-12-13T08:10:30Z",
"pushed_at": "2021-12-24T15:44:53Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 68,
"watchers_count": 68,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -7213,7 +7213,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 67,
"watchers": 68,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2024-12-12T17:05:24Z",
"updated_at": "2024-12-13T06:37:28Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1172,
"watchers_count": 1172,
"stargazers_count": 1171,
"watchers_count": 1171,
"has_discussions": true,
"forks_count": 190,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 190,
"watchers": 1172,
"watchers": 1171,
"score": 0,
"subscribers_count": 19
},

View file

@ -14,8 +14,8 @@
"description": "Demonstrate some functionalities of Morion by generating an exploit for CVE-2022-27646 (stack buffer overflow on Netgear R6700v3 routers).",
"fork": false,
"created_at": "2023-06-01T05:10:56Z",
"updated_at": "2024-10-28T07:04:26Z",
"pushed_at": "2024-10-28T07:04:22Z",
"updated_at": "2024-12-13T08:49:45Z",
"pushed_at": "2024-12-13T08:49:41Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -203,10 +203,10 @@
"description": "A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read",
"fork": false,
"created_at": "2023-02-05T18:42:27Z",
"updated_at": "2024-12-08T11:46:06Z",
"updated_at": "2024-12-13T12:14:00Z",
"pushed_at": "2023-02-05T19:35:03Z",
"stargazers_count": 215,
"watchers_count": 215,
"stargazers_count": 214,
"watchers_count": 214,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -215,7 +215,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 215,
"watchers": 214,
"score": 0,
"subscribers_count": 2
},

View file

@ -45,10 +45,10 @@
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
"fork": false,
"created_at": "2023-02-24T13:54:42Z",
"updated_at": "2024-11-28T15:29:10Z",
"updated_at": "2024-12-13T10:50:47Z",
"pushed_at": "2023-02-24T13:29:38Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 108,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 108,
"watchers": 57,
"watchers": 58,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing",
"fork": false,
"created_at": "2023-06-16T20:15:36Z",
"updated_at": "2024-12-04T10:43:06Z",
"updated_at": "2024-12-13T06:37:07Z",
"pushed_at": "2024-05-08T16:17:07Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 130,
"watchers_count": 130,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 131,
"watchers": 130,
"score": 0,
"subscribers_count": 3
},

View file

@ -91,5 +91,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 902845679,
"name": "CVE-2023-40028",
"full_name": "sudlit\/CVE-2023-40028",
"owner": {
"login": "sudlit",
"id": 18578688,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18578688?v=4",
"html_url": "https:\/\/github.com\/sudlit",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sudlit\/CVE-2023-40028",
"description": null,
"fork": false,
"created_at": "2024-12-13T11:42:51Z",
"updated_at": "2024-12-13T11:55:14Z",
"pushed_at": "2024-12-13T11:55:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-10124.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 902440180,
"name": "CVE-2024-10124",
"full_name": "RandomRobbieBF\/CVE-2024-10124",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10124",
"description": "Vayu Blocks Gutenberg Blocks for WordPress & WooCommerce <= 1.1.1 - Missing Authorization to Unauthenticated Arbitrary Plugin Installation\/Activation",
"fork": false,
"created_at": "2024-12-12T15:13:30Z",
"updated_at": "2024-12-13T10:33:26Z",
"pushed_at": "2024-12-12T15:14:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -91,5 +91,36 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 902781667,
"name": "CVE-2024-10220",
"full_name": "filipzag\/CVE-2024-10220",
"owner": {
"login": "filipzag",
"id": 35038922,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35038922?v=4",
"html_url": "https:\/\/github.com\/filipzag",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/filipzag\/CVE-2024-10220",
"description": null,
"fork": false,
"created_at": "2024-12-13T08:59:23Z",
"updated_at": "2024-12-13T08:59:53Z",
"pushed_at": "2024-12-13T08:59:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis",
"fork": false,
"created_at": "2024-11-29T06:13:36Z",
"updated_at": "2024-12-13T04:19:43Z",
"updated_at": "2024-12-13T08:07:54Z",
"pushed_at": "2024-12-04T01:01:28Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 42,
"watchers": 43,
"score": 0,
"subscribers_count": 1
}

View file

@ -1160,7 +1160,7 @@
"description": null,
"fork": false,
"created_at": "2024-06-03T13:30:31Z",
"updated_at": "2024-10-03T05:17:54Z",
"updated_at": "2024-12-13T07:06:39Z",
"pushed_at": "2024-07-27T12:46:44Z",
"stargazers_count": 6,
"watchers_count": 6,

View file

@ -231,10 +231,10 @@
"description": "CVE-2024-28955 Exploitation PoC ",
"fork": false,
"created_at": "2024-07-01T11:49:51Z",
"updated_at": "2024-09-12T08:51:31Z",
"updated_at": "2024-12-13T10:42:54Z",
"pushed_at": "2024-07-01T12:53:21Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -252,7 +252,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 34,
"watchers": 35,
"score": 0,
"subscribers_count": 2
},

View file

@ -952,10 +952,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-12-11T16:22:09Z",
"updated_at": "2024-12-13T12:09:59Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3500,
"watchers_count": 3500,
"stargazers_count": 3499,
"watchers_count": 3499,
"has_discussions": false,
"forks_count": 240,
"allow_forking": true,
@ -964,7 +964,7 @@
"topics": [],
"visibility": "public",
"forks": 240,
"watchers": 3500,
"watchers": 3499,
"score": 0,
"subscribers_count": 38
},

View file

@ -76,10 +76,10 @@
"description": "Exploit PoC for CVE-2024-32002",
"fork": false,
"created_at": "2024-05-17T19:33:08Z",
"updated_at": "2024-12-12T16:39:07Z",
"updated_at": "2024-12-13T10:10:23Z",
"pushed_at": "2024-05-19T07:12:00Z",
"stargazers_count": 517,
"watchers_count": 517,
"stargazers_count": 518,
"watchers_count": 518,
"has_discussions": false,
"forks_count": 145,
"allow_forking": true,
@ -93,7 +93,7 @@
],
"visibility": "public",
"forks": 145,
"watchers": 517,
"watchers": 518,
"score": 0,
"subscribers_count": 3
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 113,
"watchers_count": 113,
"has_discussions": false,
"forks_count": 20,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 20,
"forks": 21,
"watchers": 113,
"score": 0,
"subscribers_count": 2

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-40711-exp",
"fork": false,
"created_at": "2024-10-16T05:02:27Z",
"updated_at": "2024-12-13T02:57:02Z",
"updated_at": "2024-12-13T08:34:45Z",
"pushed_at": "2024-10-17T01:06:42Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 34,
"watchers": 35,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "cve-2024-42327 ZBX-25623",
"fork": false,
"created_at": "2024-12-01T00:15:27Z",
"updated_at": "2024-12-10T22:15:23Z",
"updated_at": "2024-12-13T06:43:33Z",
"pushed_at": "2024-12-01T01:18:36Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 25,
"watchers": 26,
"score": 0,
"subscribers_count": 1
},
@ -50,13 +50,13 @@
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 3,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 5,
"watchers": 16,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "The script checks Jenkins endpoints for CVE-2024-43044 by retrieving the Jenkins version from the innstance and comparing it against known vulnerable version ranges.",
"fork": false,
"created_at": "2024-08-08T08:28:26Z",
"updated_at": "2024-12-09T08:34:29Z",
"updated_at": "2024-12-13T07:00:44Z",
"pushed_at": "2024-08-08T09:32:00Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,8 +14,8 @@
"description": "This repository details a SQL Injection vulnerability in Inventio Lite v4's, including exploitation steps and a Python script to automate the attack. It provides information on the vulnerable code, recommended fixes, and how to extract and decrypt administrative credentials.",
"fork": false,
"created_at": "2024-08-07T08:45:43Z",
"updated_at": "2024-09-12T06:46:16Z",
"pushed_at": "2024-09-12T06:46:12Z",
"updated_at": "2024-12-13T12:02:08Z",
"pushed_at": "2024-12-13T12:02:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -60,13 +60,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation \/ Arbitrary Code Execution Vulnerability",
"fork": false,
"created_at": "2024-08-24T08:51:08Z",
"updated_at": "2024-12-11T14:35:20Z",
"updated_at": "2024-12-13T09:37:44Z",
"pushed_at": "2024-11-05T02:57:25Z",
"stargazers_count": 178,
"watchers_count": 178,
"stargazers_count": 179,
"watchers_count": 179,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 178,
"watchers": 179,
"score": 0,
"subscribers_count": 8
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 90,
"watchers_count": 90,
"has_discussions": false,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"forks": 17,
"watchers": 90,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)",
"fork": false,
"created_at": "2024-12-11T14:19:55Z",
"updated_at": "2024-12-13T04:51:20Z",
"updated_at": "2024-12-13T08:33:10Z",
"pushed_at": "2024-12-11T14:23:19Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 0
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 17,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "s2-067(CVE-2024-53677)",
"fork": false,
"created_at": "2024-12-12T08:30:14Z",
"updated_at": "2024-12-13T04:39:09Z",
"updated_at": "2024-12-13T09:18:45Z",
"pushed_at": "2024-12-12T08:33:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,8 +14,8 @@
"description": "CVE-2024-55875 | GHSA-7mj5-hjjj-8rgw | http4k first CVE",
"fork": false,
"created_at": "2024-12-13T06:21:36Z",
"updated_at": "2024-12-13T06:22:39Z",
"pushed_at": "2024-12-13T06:22:08Z",
"updated_at": "2024-12-13T07:28:37Z",
"pushed_at": "2024-12-13T07:28:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,8 +14,8 @@
"description": "Proof-of-Concept for CVE-2024-5932 GiveWP PHP Object Injection ",
"fork": false,
"created_at": "2024-08-21T09:51:21Z",
"updated_at": "2024-12-11T23:50:45Z",
"pushed_at": "2024-08-22T15:20:46Z",
"updated_at": "2024-12-13T10:58:23Z",
"pushed_at": "2024-12-13T10:58:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -1986,6 +1986,13 @@
- [windz3r0day/CVE-2024-10015](https://github.com/windz3r0day/CVE-2024-10015)
### CVE-2024-10124 (2024-12-12)
<code>The Vayu Blocks Gutenberg Blocks for WordPress &amp; WooCommerce plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation and activation due to a missing capability check on the tp_install() function in all versions up to, and including, 1.1.1. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated. This vulnerability was partially patched in version 1.1.1.
</code>
- [RandomRobbieBF/CVE-2024-10124](https://github.com/RandomRobbieBF/CVE-2024-10124)
### CVE-2024-10140 (2024-10-19)
<code>Eine kritische Schwachstelle wurde in code-projects Pharmacy Management System 1.0 entdeckt. Betroffen davon ist ein unbekannter Prozess der Datei /manage_supplier.php. Durch Beeinflussen des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
@ -2001,6 +2008,7 @@
- [mochizuki875/CVE-2024-10220-githooks](https://github.com/mochizuki875/CVE-2024-10220-githooks)
- [any2sec/cve-2024-10220](https://github.com/any2sec/cve-2024-10220)
- [XiaomingX/cve-2024-10220-githooks](https://github.com/XiaomingX/cve-2024-10220-githooks)
- [filipzag/CVE-2024-10220](https://github.com/filipzag/CVE-2024-10220)
### CVE-2024-10245 (2024-11-12)
@ -13263,6 +13271,7 @@
- [0xyassine/CVE-2023-40028](https://github.com/0xyassine/CVE-2023-40028)
- [BBSynapse/CVE-2023-40028](https://github.com/BBSynapse/CVE-2023-40028)
- [0xDTC/Ghost-5.58-Arbitrary-File-Read-CVE-2023-40028](https://github.com/0xDTC/Ghost-5.58-Arbitrary-File-Read-CVE-2023-40028)
- [sudlit/CVE-2023-40028](https://github.com/sudlit/CVE-2023-40028)
### CVE-2023-40031 (2023-08-25)
@ -43958,6 +43967,7 @@
- [K3ysTr0K3R/CVE-2017-12617-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2017-12617-EXPLOIT)
- [scirusvulgaris/CVE-2017-12617](https://github.com/scirusvulgaris/CVE-2017-12617)
- [yZ1337/CVE-2017-12617](https://github.com/yZ1337/CVE-2017-12617)
- [DevaDJ/CVE-2017-12617](https://github.com/DevaDJ/CVE-2017-12617)
### CVE-2017-12624 (2017-11-14)