Auto Update 2024/12/21 06:31:48

This commit is contained in:
motikan2010-bot 2024-12-21 15:31:48 +09:00
parent 55cdbd4753
commit 2304645eb8
26 changed files with 211 additions and 74 deletions

View file

@ -14,10 +14,10 @@
"description": "An implementation of CVE-2009-0689 for the Nintendo Wii.",
"fork": false,
"created_at": "2018-12-18T04:24:43Z",
"updated_at": "2024-12-08T13:18:23Z",
"updated_at": "2024-12-21T04:54:44Z",
"pushed_at": "2019-09-30T23:38:11Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 75,
"watchers_count": 75,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 74,
"watchers": 75,
"score": 0,
"subscribers_count": 7
}

View file

@ -1652,10 +1652,10 @@
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
"fork": false,
"created_at": "2020-06-10T16:44:39Z",
"updated_at": "2024-12-07T16:57:52Z",
"updated_at": "2024-12-21T05:10:57Z",
"pushed_at": "2022-03-30T14:02:04Z",
"stargazers_count": 271,
"watchers_count": 271,
"stargazers_count": 272,
"watchers_count": 272,
"has_discussions": false,
"forks_count": 51,
"allow_forking": true,
@ -1664,7 +1664,7 @@
"topics": [],
"visibility": "public",
"forks": 51,
"watchers": 271,
"watchers": 272,
"score": 0,
"subscribers_count": 7
},

View file

@ -2182,7 +2182,7 @@
"forks": 20,
"watchers": 77,
"score": 0,
"subscribers_count": 0
"subscribers_count": 3
},
{
"id": 452924557,

View file

@ -19,7 +19,7 @@
"stargazers_count": 317,
"watchers_count": 317,
"has_discussions": false,
"forks_count": 60,
"forks_count": 61,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -33,7 +33,7 @@
"windows-boot"
],
"visibility": "public",
"forks": 60,
"forks": 61,
"watchers": 317,
"score": 0,
"subscribers_count": 12

View file

@ -441,10 +441,10 @@
"description": null,
"fork": false,
"created_at": "2022-06-05T20:35:38Z",
"updated_at": "2024-12-15T22:44:39Z",
"updated_at": "2024-12-21T04:26:27Z",
"pushed_at": "2022-06-08T15:35:44Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -453,7 +453,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3",
"fork": false,
"created_at": "2022-10-28T09:51:41Z",
"updated_at": "2024-11-13T18:00:42Z",
"updated_at": "2024-12-21T03:51:05Z",
"pushed_at": "2022-11-18T15:47:17Z",
"stargazers_count": 529,
"watchers_count": 529,
"stargazers_count": 530,
"watchers_count": 530,
"has_discussions": false,
"forks_count": 110,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 110,
"watchers": 529,
"watchers": 530,
"score": 0,
"subscribers_count": 46
},
@ -180,10 +180,10 @@
"description": null,
"fork": false,
"created_at": "2022-11-02T17:33:26Z",
"updated_at": "2023-04-07T08:25:52Z",
"updated_at": "2024-12-21T03:53:31Z",
"pushed_at": "2022-11-02T17:33:46Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -192,7 +192,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 2
},

View file

@ -45,19 +45,19 @@
"description": "harbor unauthorized detection",
"fork": false,
"created_at": "2023-03-21T10:40:19Z",
"updated_at": "2024-12-20T12:32:30Z",
"updated_at": "2024-12-21T04:46:10Z",
"pushed_at": "2024-12-12T07:37:01Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 27,
"forks": 6,
"watchers": 28,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,10 +14,10 @@
"description": "pocs & exploit for CVE-2023-24871 (rce + lpe)",
"fork": false,
"created_at": "2024-06-21T15:01:15Z",
"updated_at": "2024-08-28T15:24:50Z",
"updated_at": "2024-12-21T05:46:27Z",
"pushed_at": "2024-07-17T12:34:16Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 44,
"watchers": 45,
"score": 0,
"subscribers_count": 2
}

View file

@ -49,10 +49,10 @@
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
"fork": false,
"created_at": "2023-05-22T03:06:31Z",
"updated_at": "2024-12-14T21:15:43Z",
"updated_at": "2024-12-21T04:57:34Z",
"pushed_at": "2024-08-24T13:38:50Z",
"stargazers_count": 273,
"watchers_count": 273,
"stargazers_count": 274,
"watchers_count": 274,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -69,7 +69,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 273,
"watchers": 274,
"score": 0,
"subscribers_count": 4
},

View file

@ -28,6 +28,6 @@
"forks": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -211,10 +211,10 @@
"description": "Automatic vuln scanner and exploiter for l7 ddos attacks using Chamilio CVE-2023-34960",
"fork": false,
"created_at": "2024-07-13T08:30:18Z",
"updated_at": "2024-11-06T23:17:03Z",
"updated_at": "2024-12-21T02:53:55Z",
"pushed_at": "2024-10-21T18:24:28Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -239,7 +239,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -122,5 +122,45 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 906469704,
"name": "CVE-2023-40028-Ghost-Arbitrary-File-Read",
"full_name": "monke443\/CVE-2023-40028-Ghost-Arbitrary-File-Read",
"owner": {
"login": "monke443",
"id": 131496421,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131496421?v=4",
"html_url": "https:\/\/github.com\/monke443",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/monke443\/CVE-2023-40028-Ghost-Arbitrary-File-Read",
"description": "Arbitrary file read in Ghost-CMS allows an attacker to upload a malicious ZIP file with a symlink.",
"fork": false,
"created_at": "2024-12-21T01:53:47Z",
"updated_at": "2024-12-21T02:51:46Z",
"pushed_at": "2024-12-21T02:51:43Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2023-40028",
"exploit",
"ghost-cms",
"github",
"pentesting",
"security",
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,7 +14,7 @@
"description": null,
"fork": false,
"created_at": "2023-10-15T12:14:18Z",
"updated_at": "2024-12-07T10:15:42Z",
"updated_at": "2024-12-21T00:56:57Z",
"pushed_at": "2024-03-08T12:57:53Z",
"stargazers_count": 196,
"watchers_count": 196,

View file

@ -245,6 +245,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -231,10 +231,10 @@
"description": null,
"fork": false,
"created_at": "2023-12-18T23:12:25Z",
"updated_at": "2024-11-07T20:36:14Z",
"updated_at": "2024-12-21T01:54:59Z",
"pushed_at": "2024-05-13T17:40:58Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -243,7 +243,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 46,
"watchers": 47,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-12-20T11:54:25Z",
"updated_at": "2024-12-21T00:36:25Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2306,
"watchers_count": 2306,
"stargazers_count": 2307,
"watchers_count": 2307,
"has_discussions": false,
"forks_count": 299,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 299,
"watchers": 2306,
"watchers": 2307,
"score": 0,
"subscribers_count": 26
},

View file

@ -1734,5 +1734,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 906477862,
"name": "Check-Point_poc",
"full_name": "NingXin2002\/Check-Point_poc",
"owner": {
"login": "NingXin2002",
"id": 138864342,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138864342?v=4",
"html_url": "https:\/\/github.com\/NingXin2002",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/NingXin2002\/Check-Point_poc",
"description": "Check-Point安全网关任意文件读取漏洞(CVE-2024-24919)",
"fork": false,
"created_at": "2024-12-21T02:42:10Z",
"updated_at": "2024-12-21T02:43:44Z",
"pushed_at": "2024-12-21T02:43:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -29,5 +29,36 @@
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
{
"id": 906487773,
"name": "Docassemble_poc",
"full_name": "NingXin2002\/Docassemble_poc",
"owner": {
"login": "NingXin2002",
"id": 138864342,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138864342?v=4",
"html_url": "https:\/\/github.com\/NingXin2002",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/NingXin2002\/Docassemble_poc",
"description": "Docassemble任意文件读取漏洞(CVE-2024-27292)",
"fork": false,
"created_at": "2024-12-21T03:35:19Z",
"updated_at": "2024-12-21T03:37:01Z",
"pushed_at": "2024-12-21T03:36:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Materials for CVE-2024-30052.",
"fork": false,
"created_at": "2024-10-04T19:09:45Z",
"updated_at": "2024-10-28T19:44:45Z",
"updated_at": "2024-12-21T05:56:21Z",
"pushed_at": "2024-10-04T20:28:39Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 1
}

View file

@ -239,13 +239,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 1

View file

@ -29,5 +29,36 @@
"watchers": 12,
"score": 0,
"subscribers_count": 1
},
{
"id": 906475087,
"name": "CVE-2024-41713POC",
"full_name": "zxj-hub\/CVE-2024-41713POC",
"owner": {
"login": "zxj-hub",
"id": 192207002,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192207002?v=4",
"html_url": "https:\/\/github.com\/zxj-hub",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zxj-hub\/CVE-2024-41713POC",
"description": "Mitel MiCollab 企业协作平台 任意文件读取漏洞(CVE-2024-41713)由于Mitel MiCollab软件的 NuPoint 统一消息 (NPM) 组件中存在身份验证绕过漏洞并且输入验证不足未经身份验证的远程攻击者可利用该漏洞执行路径遍历攻击成功利用可能导致未授权访问、破坏或删除用户的数据和系统配置。影响范围version < MiCollab 9.8 SP2 (9.8.2.12)",
"fork": false,
"created_at": "2024-12-21T02:26:26Z",
"updated_at": "2024-12-21T02:28:26Z",
"pushed_at": "2024-12-21T02:28:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -76,10 +76,10 @@
"description": "Apache TomcatCVE-2024-50379条件竞争致远程代码执行漏洞批量检测脚本",
"fork": false,
"created_at": "2024-12-20T05:24:10Z",
"updated_at": "2024-12-20T16:26:15Z",
"updated_at": "2024-12-21T02:16:44Z",
"pushed_at": "2024-12-20T05:41:23Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 0
},

View file

@ -11,10 +11,10 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AbdullahAlmutawa\/CVE-2024-50945",
"description": "SimplCommerce is affected by a broken access control vulnerability in the review system, allowing unauthorized users to post reviews for products they have not purchased.",
"description": "SimplCommerce is affected by a Broken Access Control vulnerability in the review system, allowing unauthorized users to post reviews for products they have not purchased.",
"fork": false,
"created_at": "2024-12-20T00:43:18Z",
"updated_at": "2024-12-20T21:18:15Z",
"updated_at": "2024-12-21T01:25:07Z",
"pushed_at": "2024-12-20T21:18:11Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -45,10 +45,10 @@
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
"fork": false,
"created_at": "2024-12-13T17:42:55Z",
"updated_at": "2024-12-21T00:26:13Z",
"updated_at": "2024-12-21T01:51:32Z",
"pushed_at": "2024-12-20T10:05:15Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 65,
"watchers_count": 65,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 64,
"watchers": 65,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,19 +14,19 @@
"description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled",
"fork": false,
"created_at": "2024-12-20T03:34:01Z",
"updated_at": "2024-12-20T21:18:42Z",
"updated_at": "2024-12-21T05:14:20Z",
"pushed_at": "2024-12-20T04:26:44Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 4,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 13,
"forks": 6,
"watchers": 16,
"score": 0,
"subscribers_count": 0
}

View file

@ -3560,6 +3560,7 @@
- [geniuszlyy/CVE-2024-24919](https://github.com/geniuszlyy/CVE-2024-24919)
- [skyrowalker/CVE-2024-24919](https://github.com/skyrowalker/CVE-2024-24919)
- [sar-3mar/CVE-2024-24919_POC](https://github.com/sar-3mar/CVE-2024-24919_POC)
- [NingXin2002/Check-Point_poc](https://github.com/NingXin2002/Check-Point_poc)
### CVE-2024-24926 (2024-02-12)
@ -3930,6 +3931,7 @@
</code>
- [th3gokul/CVE-2024-27292](https://github.com/th3gokul/CVE-2024-27292)
- [NingXin2002/Docassemble_poc](https://github.com/NingXin2002/Docassemble_poc)
### CVE-2024-27316 (2024-04-04)
@ -6210,6 +6212,7 @@
</code>
- [watchtowrlabs/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713](https://github.com/watchtowrlabs/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713)
- [zxj-hub/CVE-2024-41713POC](https://github.com/zxj-hub/CVE-2024-41713POC)
### CVE-2024-41958 (2024-08-05)
@ -13487,6 +13490,7 @@
- [BBSynapse/CVE-2023-40028](https://github.com/BBSynapse/CVE-2023-40028)
- [0xDTC/Ghost-5.58-Arbitrary-File-Read-CVE-2023-40028](https://github.com/0xDTC/Ghost-5.58-Arbitrary-File-Read-CVE-2023-40028)
- [sudlit/CVE-2023-40028](https://github.com/sudlit/CVE-2023-40028)
- [monke443/CVE-2023-40028-Ghost-Arbitrary-File-Read](https://github.com/monke443/CVE-2023-40028-Ghost-Arbitrary-File-Read)
### CVE-2023-40031 (2023-08-25)