Auto Update 2024/12/16 18:32:52

This commit is contained in:
motikan2010-bot 2024-12-17 03:32:52 +09:00
parent faa4a96fec
commit 240a568e4f
30 changed files with 218 additions and 114 deletions

View file

@ -19,13 +19,13 @@
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"forks": 15,
"watchers": 74,
"score": 0,
"subscribers_count": 7

View file

@ -156,7 +156,7 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 903995896,
@ -187,6 +187,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -138,10 +138,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2024-11-27T17:40:14Z",
"updated_at": "2024-12-16T13:58:02Z",
"pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1079,
"watchers_count": 1079,
"stargazers_count": 1080,
"watchers_count": 1080,
"has_discussions": false,
"forks_count": 318,
"allow_forking": true,
@ -154,7 +154,7 @@
],
"visibility": "public",
"forks": 318,
"watchers": 1079,
"watchers": 1080,
"score": 0,
"subscribers_count": 36
},

View file

@ -14,10 +14,10 @@
"description": "Proof of Concept (PoC) for CVE-2020-5248.",
"fork": false,
"created_at": "2020-10-09T12:31:19Z",
"updated_at": "2024-02-09T21:18:08Z",
"updated_at": "2024-12-16T16:23:20Z",
"pushed_at": "2022-12-14T20:05:35Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},

View file

@ -138,10 +138,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2024-11-27T17:40:14Z",
"updated_at": "2024-12-16T13:58:02Z",
"pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1079,
"watchers_count": 1079,
"stargazers_count": 1080,
"watchers_count": 1080,
"has_discussions": false,
"forks_count": 318,
"allow_forking": true,
@ -154,7 +154,7 @@
],
"visibility": "public",
"forks": 318,
"watchers": 1079,
"watchers": 1080,
"score": 0,
"subscribers_count": 36
},

View file

@ -744,10 +744,10 @@
"description": "CVE-2021-26855 & CVE-2021-27065",
"fork": false,
"created_at": "2021-03-15T09:02:40Z",
"updated_at": "2024-08-12T20:11:13Z",
"updated_at": "2024-12-16T17:23:48Z",
"pushed_at": "2021-03-15T09:19:45Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -760,7 +760,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 2
},

View file

@ -572,10 +572,10 @@
"description": "CVE-2022-0847",
"fork": false,
"created_at": "2022-03-08T20:18:28Z",
"updated_at": "2024-05-09T02:22:32Z",
"updated_at": "2024-12-16T14:36:05Z",
"pushed_at": "2022-03-08T20:41:15Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -584,7 +584,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
@ -1972,10 +1972,10 @@
"description": "An eBPF detection program for CVE-2022-0847",
"fork": false,
"created_at": "2022-07-05T07:20:59Z",
"updated_at": "2024-08-09T11:36:06Z",
"updated_at": "2024-12-16T13:13:20Z",
"pushed_at": "2022-07-05T14:25:46Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -1984,7 +1984,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 27,
"watchers": 28,
"score": 0,
"subscribers_count": 9
},

View file

@ -138,10 +138,10 @@
"description": "[CVE-2022-22980] Spring Data MongoDB SpEL Expression Injection",
"fork": false,
"created_at": "2022-06-28T21:42:35Z",
"updated_at": "2024-08-12T20:24:35Z",
"updated_at": "2024-12-16T16:42:14Z",
"pushed_at": "2022-06-28T22:27:58Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2022-25636",
"fork": false,
"created_at": "2022-03-07T13:38:41Z",
"updated_at": "2024-09-27T13:47:21Z",
"updated_at": "2024-12-16T14:15:56Z",
"pushed_at": "2022-03-07T17:18:19Z",
"stargazers_count": 426,
"watchers_count": 426,
"stargazers_count": 427,
"watchers_count": 427,
"has_discussions": false,
"forks_count": 83,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 83,
"watchers": 426,
"watchers": 427,
"score": 0,
"subscribers_count": 6
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2

View file

@ -265,8 +265,8 @@
"description": "Cái này dựng lên với mục đích cho ae tham khảo, chê thì đừng có xem. :))))",
"fork": false,
"created_at": "2024-12-11T07:38:22Z",
"updated_at": "2024-12-12T01:40:38Z",
"pushed_at": "2024-12-12T01:40:33Z",
"updated_at": "2024-12-16T13:51:41Z",
"pushed_at": "2024-12-16T13:51:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,12 +14,12 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-16T09:57:04Z",
"updated_at": "2024-12-16T15:06:10Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -36,8 +36,8 @@
"cve-2024-39573"
],
"visibility": "public",
"forks": 6,
"watchers": 31,
"forks": 7,
"watchers": 32,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
"updated_at": "2024-12-09T18:18:45Z",
"updated_at": "2024-12-16T14:43:13Z",
"pushed_at": "2023-11-26T06:46:44Z",
"stargazers_count": 783,
"watchers_count": 783,
"stargazers_count": 784,
"watchers_count": 784,
"has_discussions": false,
"forks_count": 139,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 139,
"watchers": 783,
"watchers": 784,
"score": 0,
"subscribers_count": 9
},
@ -1620,8 +1620,8 @@
"description": null,
"fork": false,
"created_at": "2024-12-03T11:13:37Z",
"updated_at": "2024-12-03T11:17:23Z",
"pushed_at": "2024-12-03T11:17:20Z",
"updated_at": "2024-12-16T15:10:50Z",
"pushed_at": "2024-12-16T15:10:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-12-16T12:18:00Z",
"updated_at": "2024-12-16T13:26:52Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1295,
"watchers_count": 1295,
"stargazers_count": 1297,
"watchers_count": 1297,
"has_discussions": false,
"forks_count": 221,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 221,
"watchers": 1295,
"watchers": 1297,
"score": 0,
"subscribers_count": 21
},
@ -200,10 +200,10 @@
"description": "Exploit basado en vulnerabilidades criticas Bluetooth (CVE-2023-45866, CVE-2024-21306)",
"fork": false,
"created_at": "2024-12-15T03:00:47Z",
"updated_at": "2024-12-15T06:45:36Z",
"updated_at": "2024-12-16T12:33:43Z",
"pushed_at": "2024-12-15T06:41:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1

View file

@ -14,12 +14,12 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-12-10T09:00:58Z",
"updated_at": "2024-12-16T13:59:35Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2299,
"watchers_count": 2299,
"stargazers_count": 2300,
"watchers_count": 2300,
"has_discussions": false,
"forks_count": 299,
"forks_count": 297,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -31,8 +31,8 @@
"poc"
],
"visibility": "public",
"forks": 299,
"watchers": 2299,
"forks": 297,
"watchers": 2300,
"score": 0,
"subscribers_count": 26
},
@ -190,5 +190,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 904336421,
"name": "CVE-2024-1086",
"full_name": "LLfam\/CVE-2024-1086",
"owner": {
"login": "LLfam",
"id": 43279891,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43279891?v=4",
"html_url": "https:\/\/github.com\/LLfam",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/LLfam\/CVE-2024-1086",
"description": null,
"fork": false,
"created_at": "2024-12-16T17:33:13Z",
"updated_at": "2024-12-16T17:38:28Z",
"pushed_at": "2024-12-16T17:38:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -146,8 +146,8 @@
"description": "CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.",
"fork": false,
"created_at": "2024-11-16T16:32:05Z",
"updated_at": "2024-12-16T11:58:05Z",
"pushed_at": "2024-12-16T11:58:00Z",
"updated_at": "2024-12-16T14:08:57Z",
"pushed_at": "2024-12-16T14:08:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -76,10 +76,10 @@
"description": "Exploit basado en vulnerabilidades criticas Bluetooth (CVE-2023-45866, CVE-2024-21306)",
"fork": false,
"created_at": "2024-12-15T03:00:47Z",
"updated_at": "2024-12-15T06:45:36Z",
"updated_at": "2024-12-16T12:33:43Z",
"pushed_at": "2024-12-15T06:41:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "Unauthenticated RCE Flaw in Rejetto HTTP File Server (CVE-2024-23692)",
"fork": false,
"created_at": "2024-06-13T06:00:24Z",
"updated_at": "2024-11-11T12:02:29Z",
"updated_at": "2024-12-16T15:23:00Z",
"pushed_at": "2024-06-13T07:00:23Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},
@ -293,10 +293,10 @@
"description": "POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692 ",
"fork": false,
"created_at": "2024-09-15T12:15:35Z",
"updated_at": "2024-12-05T09:44:16Z",
"updated_at": "2024-12-16T15:09:24Z",
"pushed_at": "2024-11-26T14:45:12Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -310,7 +310,7 @@
],
"visibility": "public",
"forks": 15,
"watchers": 35,
"watchers": 36,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,12 +45,12 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-16T09:57:04Z",
"updated_at": "2024-12-16T15:06:10Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -67,8 +67,8 @@
"cve-2024-39573"
],
"visibility": "public",
"forks": 6,
"watchers": 31,
"forks": 7,
"watchers": 32,
"score": 0,
"subscribers_count": 1
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 5,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 7,
"watchers": 16,
"score": 0,
"subscribers_count": 2

View file

@ -2,15 +2,15 @@
{
"id": 902615056,
"name": "PP_CVE-2024-38998",
"full_name": "AlbedoPrime\/PP_CVE-2024-38998",
"full_name": "z3ldr1\/PP_CVE-2024-38998",
"owner": {
"login": "AlbedoPrime",
"login": "z3ldr1",
"id": 128452420,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128452420?v=4",
"html_url": "https:\/\/github.com\/AlbedoPrime",
"html_url": "https:\/\/github.com\/z3ldr1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AlbedoPrime\/PP_CVE-2024-38998",
"html_url": "https:\/\/github.com\/z3ldr1\/PP_CVE-2024-38998",
"description": "Uma vulnerabilidade (CVE-2024-38998) foi identificada na versão 2.3.6 do módulo JavaScript requirejs. Ela explora prototype pollution na função config, permitindo que invasores modifiquem Object.prototype com entradas maliciosas. Isso pode causar DoS, execução remota de código (RCE) ou XSS. A gravidade é crítica (CVSS 9.8). ",
"fork": false,
"created_at": "2024-12-12T23:19:44Z",

View file

@ -55,10 +55,10 @@
"description": "based on [EQSTLab](https:\/\/github.com\/EQSTLab)",
"fork": false,
"created_at": "2024-12-04T15:51:40Z",
"updated_at": "2024-12-12T23:58:51Z",
"updated_at": "2024-12-16T14:03:29Z",
"pushed_at": "2024-12-04T16:00:45Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -67,7 +67,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false,
"created_at": "2024-11-19T08:57:18Z",
"updated_at": "2024-12-15T08:29:33Z",
"updated_at": "2024-12-16T13:59:04Z",
"pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 87,
"watchers_count": 87,
"stargazers_count": 88,
"watchers_count": 88,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -26,8 +26,39 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 87,
"watchers": 88,
"score": 0,
"subscribers_count": 1
},
{
"id": 904220023,
"name": "CVE-2024-49039",
"full_name": "Alexandr-bit253\/CVE-2024-49039",
"owner": {
"login": "Alexandr-bit253",
"id": 102812557,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102812557?v=4",
"html_url": "https:\/\/github.com\/Alexandr-bit253",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Alexandr-bit253\/CVE-2024-49039",
"description": null,
"fork": false,
"created_at": "2024-12-16T13:25:56Z",
"updated_at": "2024-12-16T16:07:49Z",
"pushed_at": "2024-12-16T13:28:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-49112.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 904227549,
"name": "poc_monitor",
"full_name": "tnkr\/poc_monitor",
"owner": {
"login": "tnkr",
"id": 24298003,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24298003?v=4",
"html_url": "https:\/\/github.com\/tnkr",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tnkr\/poc_monitor",
"description": "A short scraper looking for a POC of CVE-2024-49112",
"fork": false,
"created_at": "2024-12-16T13:41:40Z",
"updated_at": "2024-12-16T16:12:54Z",
"pushed_at": "2024-12-16T14:12:03Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)",
"fork": false,
"created_at": "2024-12-11T14:19:55Z",
"updated_at": "2024-12-14T15:47:45Z",
"updated_at": "2024-12-16T16:19:14Z",
"pushed_at": "2024-12-11T14:23:19Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 0
}

View file

@ -50,13 +50,13 @@
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 8,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "Proof of Concept Exploit for CVE-2024-9464",
"fork": false,
"created_at": "2024-10-09T16:36:25Z",
"updated_at": "2024-11-25T11:50:34Z",
"updated_at": "2024-12-16T15:16:53Z",
"pushed_at": "2024-10-09T16:41:41Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 43,
"watchers": 44,
"score": 0,
"subscribers_count": 4
}

View file

@ -45,7 +45,7 @@
"description": "WordPress WP-Advanced-Search <= 3.3.9 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2024-11-15T22:55:18Z",
"updated_at": "2024-11-26T14:47:16Z",
"updated_at": "2024-12-16T14:47:33Z",
"pushed_at": "2024-11-15T23:04:07Z",
"stargazers_count": 3,
"watchers_count": 3,

View file

@ -311,6 +311,7 @@
- [kevcooper/CVE-2024-1086-checker](https://github.com/kevcooper/CVE-2024-1086-checker)
- [feely666/CVE-2024-1086](https://github.com/feely666/CVE-2024-1086)
- [xzx482/CVE-2024-1086](https://github.com/xzx482/CVE-2024-1086)
- [LLfam/CVE-2024-1086](https://github.com/LLfam/CVE-2024-1086)
### CVE-2024-1112 (2024-01-31)
@ -5754,7 +5755,7 @@
<code>jrburke requirejs v2.3.6 was discovered to contain a prototype pollution via the function config. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.
</code>
- [AlbedoPrime/PP_CVE-2024-38998](https://github.com/AlbedoPrime/PP_CVE-2024-38998)
- [z3ldr1/PP_CVE-2024-38998](https://github.com/z3ldr1/PP_CVE-2024-38998)
### CVE-2024-39031 (2024-07-09)
@ -6924,6 +6925,14 @@
</code>
- [je5442804/WPTaskScheduler_CVE-2024-49039](https://github.com/je5442804/WPTaskScheduler_CVE-2024-49039)
- [Alexandr-bit253/CVE-2024-49039](https://github.com/Alexandr-bit253/CVE-2024-49039)
### CVE-2024-49112 (2024-12-10)
<code>Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
</code>
- [tnkr/poc_monitor](https://github.com/tnkr/poc_monitor)
### CVE-2024-49203 (2024-11-20)