Auto Update 2024/12/16 18:32:52

This commit is contained in:
motikan2010-bot 2024-12-17 03:32:52 +09:00
parent faa4a96fec
commit 240a568e4f
30 changed files with 218 additions and 114 deletions

View file

@ -19,13 +19,13 @@
"stargazers_count": 74, "stargazers_count": 74,
"watchers_count": 74, "watchers_count": 74,
"has_discussions": false, "has_discussions": false,
"forks_count": 14, "forks_count": 15,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 14, "forks": 15,
"watchers": 74, "watchers": 74,
"score": 0, "score": 0,
"subscribers_count": 7 "subscribers_count": 7

View file

@ -156,7 +156,7 @@
"forks": 0, "forks": 0,
"watchers": 1, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
}, },
{ {
"id": 903995896, "id": 903995896,
@ -187,6 +187,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -138,10 +138,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false, "fork": false,
"created_at": "2021-03-11T22:49:17Z", "created_at": "2021-03-11T22:49:17Z",
"updated_at": "2024-11-27T17:40:14Z", "updated_at": "2024-12-16T13:58:02Z",
"pushed_at": "2023-05-11T14:36:58Z", "pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1079, "stargazers_count": 1080,
"watchers_count": 1079, "watchers_count": 1080,
"has_discussions": false, "has_discussions": false,
"forks_count": 318, "forks_count": 318,
"allow_forking": true, "allow_forking": true,
@ -154,7 +154,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 318, "forks": 318,
"watchers": 1079, "watchers": 1080,
"score": 0, "score": 0,
"subscribers_count": 36 "subscribers_count": 36
}, },

View file

@ -14,10 +14,10 @@
"description": "Proof of Concept (PoC) for CVE-2020-5248.", "description": "Proof of Concept (PoC) for CVE-2020-5248.",
"fork": false, "fork": false,
"created_at": "2020-10-09T12:31:19Z", "created_at": "2020-10-09T12:31:19Z",
"updated_at": "2024-02-09T21:18:08Z", "updated_at": "2024-12-16T16:23:20Z",
"pushed_at": "2022-12-14T20:05:35Z", "pushed_at": "2022-12-14T20:05:35Z",
"stargazers_count": 2, "stargazers_count": 3,
"watchers_count": 2, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 2, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
}, },

View file

@ -138,10 +138,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false, "fork": false,
"created_at": "2021-03-11T22:49:17Z", "created_at": "2021-03-11T22:49:17Z",
"updated_at": "2024-11-27T17:40:14Z", "updated_at": "2024-12-16T13:58:02Z",
"pushed_at": "2023-05-11T14:36:58Z", "pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1079, "stargazers_count": 1080,
"watchers_count": 1079, "watchers_count": 1080,
"has_discussions": false, "has_discussions": false,
"forks_count": 318, "forks_count": 318,
"allow_forking": true, "allow_forking": true,
@ -154,7 +154,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 318, "forks": 318,
"watchers": 1079, "watchers": 1080,
"score": 0, "score": 0,
"subscribers_count": 36 "subscribers_count": 36
}, },

View file

@ -744,10 +744,10 @@
"description": "CVE-2021-26855 & CVE-2021-27065", "description": "CVE-2021-26855 & CVE-2021-27065",
"fork": false, "fork": false,
"created_at": "2021-03-15T09:02:40Z", "created_at": "2021-03-15T09:02:40Z",
"updated_at": "2024-08-12T20:11:13Z", "updated_at": "2024-12-16T17:23:48Z",
"pushed_at": "2021-03-15T09:19:45Z", "pushed_at": "2021-03-15T09:19:45Z",
"stargazers_count": 26, "stargazers_count": 27,
"watchers_count": 26, "watchers_count": 27,
"has_discussions": false, "has_discussions": false,
"forks_count": 10, "forks_count": 10,
"allow_forking": true, "allow_forking": true,
@ -760,7 +760,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 10, "forks": 10,
"watchers": 26, "watchers": 27,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -572,10 +572,10 @@
"description": "CVE-2022-0847", "description": "CVE-2022-0847",
"fork": false, "fork": false,
"created_at": "2022-03-08T20:18:28Z", "created_at": "2022-03-08T20:18:28Z",
"updated_at": "2024-05-09T02:22:32Z", "updated_at": "2024-12-16T14:36:05Z",
"pushed_at": "2022-03-08T20:41:15Z", "pushed_at": "2022-03-08T20:41:15Z",
"stargazers_count": 2, "stargazers_count": 3,
"watchers_count": 2, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -584,7 +584,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 2, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -1972,10 +1972,10 @@
"description": "An eBPF detection program for CVE-2022-0847", "description": "An eBPF detection program for CVE-2022-0847",
"fork": false, "fork": false,
"created_at": "2022-07-05T07:20:59Z", "created_at": "2022-07-05T07:20:59Z",
"updated_at": "2024-08-09T11:36:06Z", "updated_at": "2024-12-16T13:13:20Z",
"pushed_at": "2022-07-05T14:25:46Z", "pushed_at": "2022-07-05T14:25:46Z",
"stargazers_count": 27, "stargazers_count": 28,
"watchers_count": 27, "watchers_count": 28,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
@ -1984,7 +1984,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 27, "watchers": 28,
"score": 0, "score": 0,
"subscribers_count": 9 "subscribers_count": 9
}, },

View file

@ -138,10 +138,10 @@
"description": "[CVE-2022-22980] Spring Data MongoDB SpEL Expression Injection", "description": "[CVE-2022-22980] Spring Data MongoDB SpEL Expression Injection",
"fork": false, "fork": false,
"created_at": "2022-06-28T21:42:35Z", "created_at": "2022-06-28T21:42:35Z",
"updated_at": "2024-08-12T20:24:35Z", "updated_at": "2024-12-16T16:42:14Z",
"pushed_at": "2022-06-28T22:27:58Z", "pushed_at": "2022-06-28T22:27:58Z",
"stargazers_count": 4, "stargazers_count": 5,
"watchers_count": 4, "watchers_count": 5,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
@ -150,7 +150,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 4, "watchers": 5,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -14,10 +14,10 @@
"description": "CVE-2022-25636", "description": "CVE-2022-25636",
"fork": false, "fork": false,
"created_at": "2022-03-07T13:38:41Z", "created_at": "2022-03-07T13:38:41Z",
"updated_at": "2024-09-27T13:47:21Z", "updated_at": "2024-12-16T14:15:56Z",
"pushed_at": "2022-03-07T17:18:19Z", "pushed_at": "2022-03-07T17:18:19Z",
"stargazers_count": 426, "stargazers_count": 427,
"watchers_count": 426, "watchers_count": 427,
"has_discussions": false, "has_discussions": false,
"forks_count": 83, "forks_count": 83,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 83, "forks": 83,
"watchers": 426, "watchers": 427,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
}, },

View file

@ -19,13 +19,13 @@
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2

View file

@ -265,8 +265,8 @@
"description": "Cái này dựng lên với mục đích cho ae tham khảo, chê thì đừng có xem. :))))", "description": "Cái này dựng lên với mục đích cho ae tham khảo, chê thì đừng có xem. :))))",
"fork": false, "fork": false,
"created_at": "2024-12-11T07:38:22Z", "created_at": "2024-12-11T07:38:22Z",
"updated_at": "2024-12-12T01:40:38Z", "updated_at": "2024-12-16T13:51:41Z",
"pushed_at": "2024-12-12T01:40:33Z", "pushed_at": "2024-12-16T13:51:36Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -14,12 +14,12 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false, "fork": false,
"created_at": "2024-10-05T20:32:45Z", "created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-16T09:57:04Z", "updated_at": "2024-12-16T15:06:10Z",
"pushed_at": "2024-10-05T20:37:02Z", "pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 31, "stargazers_count": 32,
"watchers_count": 31, "watchers_count": 32,
"has_discussions": false, "has_discussions": false,
"forks_count": 6, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -36,8 +36,8 @@
"cve-2024-39573" "cve-2024-39573"
], ],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 7,
"watchers": 31, "watchers": 32,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -45,10 +45,10 @@
"description": "CVE-2023-38831 winrar exploit generator", "description": "CVE-2023-38831 winrar exploit generator",
"fork": false, "fork": false,
"created_at": "2023-08-25T09:44:08Z", "created_at": "2023-08-25T09:44:08Z",
"updated_at": "2024-12-09T18:18:45Z", "updated_at": "2024-12-16T14:43:13Z",
"pushed_at": "2023-11-26T06:46:44Z", "pushed_at": "2023-11-26T06:46:44Z",
"stargazers_count": 783, "stargazers_count": 784,
"watchers_count": 783, "watchers_count": 784,
"has_discussions": false, "has_discussions": false,
"forks_count": 139, "forks_count": 139,
"allow_forking": true, "allow_forking": true,
@ -61,7 +61,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 139, "forks": 139,
"watchers": 783, "watchers": 784,
"score": 0, "score": 0,
"subscribers_count": 9 "subscribers_count": 9
}, },
@ -1620,8 +1620,8 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-12-03T11:13:37Z", "created_at": "2024-12-03T11:13:37Z",
"updated_at": "2024-12-03T11:17:23Z", "updated_at": "2024-12-16T15:10:50Z",
"pushed_at": "2024-12-03T11:17:20Z", "pushed_at": "2024-12-16T15:10:46Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false, "fork": false,
"created_at": "2024-01-16T06:52:02Z", "created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-12-16T12:18:00Z", "updated_at": "2024-12-16T13:26:52Z",
"pushed_at": "2024-08-18T08:26:46Z", "pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1295, "stargazers_count": 1297,
"watchers_count": 1295, "watchers_count": 1297,
"has_discussions": false, "has_discussions": false,
"forks_count": 221, "forks_count": 221,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 221, "forks": 221,
"watchers": 1295, "watchers": 1297,
"score": 0, "score": 0,
"subscribers_count": 21 "subscribers_count": 21
}, },
@ -200,10 +200,10 @@
"description": "Exploit basado en vulnerabilidades criticas Bluetooth (CVE-2023-45866, CVE-2024-21306)", "description": "Exploit basado en vulnerabilidades criticas Bluetooth (CVE-2023-45866, CVE-2024-21306)",
"fork": false, "fork": false,
"created_at": "2024-12-15T03:00:47Z", "created_at": "2024-12-15T03:00:47Z",
"updated_at": "2024-12-15T06:45:36Z", "updated_at": "2024-12-16T12:33:43Z",
"pushed_at": "2024-12-15T06:41:13Z", "pushed_at": "2024-12-15T06:41:13Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -212,7 +212,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -19,13 +19,13 @@
"stargazers_count": 3, "stargazers_count": 3,
"watchers_count": 3, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 3, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -14,12 +14,12 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false, "fork": false,
"created_at": "2024-03-20T21:16:41Z", "created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-12-10T09:00:58Z", "updated_at": "2024-12-16T13:59:35Z",
"pushed_at": "2024-04-17T16:09:54Z", "pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2299, "stargazers_count": 2300,
"watchers_count": 2299, "watchers_count": 2300,
"has_discussions": false, "has_discussions": false,
"forks_count": 299, "forks_count": 297,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -31,8 +31,8 @@
"poc" "poc"
], ],
"visibility": "public", "visibility": "public",
"forks": 299, "forks": 297,
"watchers": 2299, "watchers": 2300,
"score": 0, "score": 0,
"subscribers_count": 26 "subscribers_count": 26
}, },
@ -190,5 +190,36 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 904336421,
"name": "CVE-2024-1086",
"full_name": "LLfam\/CVE-2024-1086",
"owner": {
"login": "LLfam",
"id": 43279891,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43279891?v=4",
"html_url": "https:\/\/github.com\/LLfam",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/LLfam\/CVE-2024-1086",
"description": null,
"fork": false,
"created_at": "2024-12-16T17:33:13Z",
"updated_at": "2024-12-16T17:38:28Z",
"pushed_at": "2024-12-16T17:38:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -146,8 +146,8 @@
"description": "CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.", "description": "CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.",
"fork": false, "fork": false,
"created_at": "2024-11-16T16:32:05Z", "created_at": "2024-11-16T16:32:05Z",
"updated_at": "2024-12-16T11:58:05Z", "updated_at": "2024-12-16T14:08:57Z",
"pushed_at": "2024-12-16T11:58:00Z", "pushed_at": "2024-12-16T14:08:53Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,

View file

@ -76,10 +76,10 @@
"description": "Exploit basado en vulnerabilidades criticas Bluetooth (CVE-2023-45866, CVE-2024-21306)", "description": "Exploit basado en vulnerabilidades criticas Bluetooth (CVE-2023-45866, CVE-2024-21306)",
"fork": false, "fork": false,
"created_at": "2024-12-15T03:00:47Z", "created_at": "2024-12-15T03:00:47Z",
"updated_at": "2024-12-15T06:45:36Z", "updated_at": "2024-12-16T12:33:43Z",
"pushed_at": "2024-12-15T06:41:13Z", "pushed_at": "2024-12-15T06:41:13Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -88,7 +88,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -45,10 +45,10 @@
"description": "Unauthenticated RCE Flaw in Rejetto HTTP File Server (CVE-2024-23692)", "description": "Unauthenticated RCE Flaw in Rejetto HTTP File Server (CVE-2024-23692)",
"fork": false, "fork": false,
"created_at": "2024-06-13T06:00:24Z", "created_at": "2024-06-13T06:00:24Z",
"updated_at": "2024-11-11T12:02:29Z", "updated_at": "2024-12-16T15:23:00Z",
"pushed_at": "2024-06-13T07:00:23Z", "pushed_at": "2024-06-13T07:00:23Z",
"stargazers_count": 8, "stargazers_count": 9,
"watchers_count": 8, "watchers_count": 9,
"has_discussions": false, "has_discussions": false,
"forks_count": 6, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 6,
"watchers": 8, "watchers": 9,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -293,10 +293,10 @@
"description": "POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692 ", "description": "POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692 ",
"fork": false, "fork": false,
"created_at": "2024-09-15T12:15:35Z", "created_at": "2024-09-15T12:15:35Z",
"updated_at": "2024-12-05T09:44:16Z", "updated_at": "2024-12-16T15:09:24Z",
"pushed_at": "2024-11-26T14:45:12Z", "pushed_at": "2024-11-26T14:45:12Z",
"stargazers_count": 35, "stargazers_count": 36,
"watchers_count": 35, "watchers_count": 36,
"has_discussions": false, "has_discussions": false,
"forks_count": 15, "forks_count": 15,
"allow_forking": true, "allow_forking": true,
@ -310,7 +310,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 15, "forks": 15,
"watchers": 35, "watchers": 36,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -45,12 +45,12 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false, "fork": false,
"created_at": "2024-10-05T20:32:45Z", "created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-16T09:57:04Z", "updated_at": "2024-12-16T15:06:10Z",
"pushed_at": "2024-10-05T20:37:02Z", "pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 31, "stargazers_count": 32,
"watchers_count": 31, "watchers_count": 32,
"has_discussions": false, "has_discussions": false,
"forks_count": 6, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -67,8 +67,8 @@
"cve-2024-39573" "cve-2024-39573"
], ],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 7,
"watchers": 31, "watchers": 32,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -19,13 +19,13 @@
"stargazers_count": 16, "stargazers_count": 16,
"watchers_count": 16, "watchers_count": 16,
"has_discussions": false, "has_discussions": false,
"forks_count": 5, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 7,
"watchers": 16, "watchers": 16,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2

View file

@ -2,15 +2,15 @@
{ {
"id": 902615056, "id": 902615056,
"name": "PP_CVE-2024-38998", "name": "PP_CVE-2024-38998",
"full_name": "AlbedoPrime\/PP_CVE-2024-38998", "full_name": "z3ldr1\/PP_CVE-2024-38998",
"owner": { "owner": {
"login": "AlbedoPrime", "login": "z3ldr1",
"id": 128452420, "id": 128452420,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128452420?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128452420?v=4",
"html_url": "https:\/\/github.com\/AlbedoPrime", "html_url": "https:\/\/github.com\/z3ldr1",
"user_view_type": "public" "user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/AlbedoPrime\/PP_CVE-2024-38998", "html_url": "https:\/\/github.com\/z3ldr1\/PP_CVE-2024-38998",
"description": "Uma vulnerabilidade (CVE-2024-38998) foi identificada na versão 2.3.6 do módulo JavaScript requirejs. Ela explora prototype pollution na função config, permitindo que invasores modifiquem Object.prototype com entradas maliciosas. Isso pode causar DoS, execução remota de código (RCE) ou XSS. A gravidade é crítica (CVSS 9.8). ", "description": "Uma vulnerabilidade (CVE-2024-38998) foi identificada na versão 2.3.6 do módulo JavaScript requirejs. Ela explora prototype pollution na função config, permitindo que invasores modifiquem Object.prototype com entradas maliciosas. Isso pode causar DoS, execução remota de código (RCE) ou XSS. A gravidade é crítica (CVSS 9.8). ",
"fork": false, "fork": false,
"created_at": "2024-12-12T23:19:44Z", "created_at": "2024-12-12T23:19:44Z",

View file

@ -55,10 +55,10 @@
"description": "based on [EQSTLab](https:\/\/github.com\/EQSTLab)", "description": "based on [EQSTLab](https:\/\/github.com\/EQSTLab)",
"fork": false, "fork": false,
"created_at": "2024-12-04T15:51:40Z", "created_at": "2024-12-04T15:51:40Z",
"updated_at": "2024-12-12T23:58:51Z", "updated_at": "2024-12-16T14:03:29Z",
"pushed_at": "2024-12-04T16:00:45Z", "pushed_at": "2024-12-04T16:00:45Z",
"stargazers_count": 3, "stargazers_count": 4,
"watchers_count": 3, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -67,7 +67,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 3, "watchers": 4,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -14,10 +14,10 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler", "description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false, "fork": false,
"created_at": "2024-11-19T08:57:18Z", "created_at": "2024-11-19T08:57:18Z",
"updated_at": "2024-12-15T08:29:33Z", "updated_at": "2024-12-16T13:59:04Z",
"pushed_at": "2024-11-19T09:15:26Z", "pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 87, "stargazers_count": 88,
"watchers_count": 87, "watchers_count": 88,
"has_discussions": false, "has_discussions": false,
"forks_count": 19, "forks_count": 19,
"allow_forking": true, "allow_forking": true,
@ -26,8 +26,39 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 19, "forks": 19,
"watchers": 87, "watchers": 88,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 904220023,
"name": "CVE-2024-49039",
"full_name": "Alexandr-bit253\/CVE-2024-49039",
"owner": {
"login": "Alexandr-bit253",
"id": 102812557,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102812557?v=4",
"html_url": "https:\/\/github.com\/Alexandr-bit253",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Alexandr-bit253\/CVE-2024-49039",
"description": null,
"fork": false,
"created_at": "2024-12-16T13:25:56Z",
"updated_at": "2024-12-16T16:07:49Z",
"pushed_at": "2024-12-16T13:28:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
} }
] ]

33
2024/CVE-2024-49112.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 904227549,
"name": "poc_monitor",
"full_name": "tnkr\/poc_monitor",
"owner": {
"login": "tnkr",
"id": 24298003,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24298003?v=4",
"html_url": "https:\/\/github.com\/tnkr",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tnkr\/poc_monitor",
"description": "A short scraper looking for a POC of CVE-2024-49112",
"fork": false,
"created_at": "2024-12-16T13:41:40Z",
"updated_at": "2024-12-16T16:12:54Z",
"pushed_at": "2024-12-16T14:12:03Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)", "description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)",
"fork": false, "fork": false,
"created_at": "2024-12-11T14:19:55Z", "created_at": "2024-12-11T14:19:55Z",
"updated_at": "2024-12-14T15:47:45Z", "updated_at": "2024-12-16T16:19:14Z",
"pushed_at": "2024-12-11T14:23:19Z", "pushed_at": "2024-12-11T14:23:19Z",
"stargazers_count": 17, "stargazers_count": 18,
"watchers_count": 17, "watchers_count": 18,
"has_discussions": false, "has_discussions": false,
"forks_count": 5, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 5,
"watchers": 17, "watchers": 18,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
} }

View file

@ -50,13 +50,13 @@
"stargazers_count": 8, "stargazers_count": 8,
"watchers_count": 8, "watchers_count": 8,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 5,
"watchers": 8, "watchers": 8,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "Proof of Concept Exploit for CVE-2024-9464", "description": "Proof of Concept Exploit for CVE-2024-9464",
"fork": false, "fork": false,
"created_at": "2024-10-09T16:36:25Z", "created_at": "2024-10-09T16:36:25Z",
"updated_at": "2024-11-25T11:50:34Z", "updated_at": "2024-12-16T15:16:53Z",
"pushed_at": "2024-10-09T16:41:41Z", "pushed_at": "2024-10-09T16:41:41Z",
"stargazers_count": 43, "stargazers_count": 44,
"watchers_count": 43, "watchers_count": 44,
"has_discussions": false, "has_discussions": false,
"forks_count": 11, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 11,
"watchers": 43, "watchers": 44,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
} }

View file

@ -45,7 +45,7 @@
"description": "WordPress WP-Advanced-Search <= 3.3.9 - Unauthenticated SQL Injection", "description": "WordPress WP-Advanced-Search <= 3.3.9 - Unauthenticated SQL Injection",
"fork": false, "fork": false,
"created_at": "2024-11-15T22:55:18Z", "created_at": "2024-11-15T22:55:18Z",
"updated_at": "2024-11-26T14:47:16Z", "updated_at": "2024-12-16T14:47:33Z",
"pushed_at": "2024-11-15T23:04:07Z", "pushed_at": "2024-11-15T23:04:07Z",
"stargazers_count": 3, "stargazers_count": 3,
"watchers_count": 3, "watchers_count": 3,

View file

@ -311,6 +311,7 @@
- [kevcooper/CVE-2024-1086-checker](https://github.com/kevcooper/CVE-2024-1086-checker) - [kevcooper/CVE-2024-1086-checker](https://github.com/kevcooper/CVE-2024-1086-checker)
- [feely666/CVE-2024-1086](https://github.com/feely666/CVE-2024-1086) - [feely666/CVE-2024-1086](https://github.com/feely666/CVE-2024-1086)
- [xzx482/CVE-2024-1086](https://github.com/xzx482/CVE-2024-1086) - [xzx482/CVE-2024-1086](https://github.com/xzx482/CVE-2024-1086)
- [LLfam/CVE-2024-1086](https://github.com/LLfam/CVE-2024-1086)
### CVE-2024-1112 (2024-01-31) ### CVE-2024-1112 (2024-01-31)
@ -5754,7 +5755,7 @@
<code>jrburke requirejs v2.3.6 was discovered to contain a prototype pollution via the function config. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties. <code>jrburke requirejs v2.3.6 was discovered to contain a prototype pollution via the function config. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.
</code> </code>
- [AlbedoPrime/PP_CVE-2024-38998](https://github.com/AlbedoPrime/PP_CVE-2024-38998) - [z3ldr1/PP_CVE-2024-38998](https://github.com/z3ldr1/PP_CVE-2024-38998)
### CVE-2024-39031 (2024-07-09) ### CVE-2024-39031 (2024-07-09)
@ -6924,6 +6925,14 @@
</code> </code>
- [je5442804/WPTaskScheduler_CVE-2024-49039](https://github.com/je5442804/WPTaskScheduler_CVE-2024-49039) - [je5442804/WPTaskScheduler_CVE-2024-49039](https://github.com/je5442804/WPTaskScheduler_CVE-2024-49039)
- [Alexandr-bit253/CVE-2024-49039](https://github.com/Alexandr-bit253/CVE-2024-49039)
### CVE-2024-49112 (2024-12-10)
<code>Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
</code>
- [tnkr/poc_monitor](https://github.com/tnkr/poc_monitor)
### CVE-2024-49203 (2024-11-20) ### CVE-2024-49203 (2024-11-20)