Auto Update 2025/01/06 12:33:02

This commit is contained in:
motikan2010-bot 2025-01-06 21:33:02 +09:00
parent 14663efc14
commit 2aab3d7312
42 changed files with 399 additions and 163 deletions

View file

@ -45,10 +45,10 @@
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan支持检测路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
"fork": false,
"created_at": "2022-06-19T13:16:55Z",
"updated_at": "2024-12-11T04:14:32Z",
"updated_at": "2025-01-06T07:33:02Z",
"pushed_at": "2023-01-23T13:00:34Z",
"stargazers_count": 149,
"watchers_count": 149,
"stargazers_count": 150,
"watchers_count": 150,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 149,
"watchers": 150,
"score": 0,
"subscribers_count": 2
}

View file

@ -417,12 +417,12 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2025-01-06T00:43:41Z",
"updated_at": "2025-01-06T09:40:48Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 170,
"watchers_count": 170,
"stargazers_count": 171,
"watchers_count": 171,
"has_discussions": false,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -436,8 +436,8 @@
"tools"
],
"visibility": "public",
"forks": 15,
"watchers": 170,
"forks": 16,
"watchers": 171,
"score": 0,
"subscribers_count": 2
},

View file

@ -107,10 +107,10 @@
"description": "All about CVE-2018-14667; From what it is to how to successfully exploit it.",
"fork": false,
"created_at": "2018-11-30T04:06:08Z",
"updated_at": "2024-10-28T16:19:32Z",
"updated_at": "2025-01-06T06:56:32Z",
"pushed_at": "2018-11-30T07:10:44Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 49,
"watchers": 50,
"score": 0,
"subscribers_count": 2
},

View file

@ -45,10 +45,10 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2024-12-28T12:58:43Z",
"updated_at": "2025-01-06T08:51:16Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 648,
"watchers_count": 648,
"stargazers_count": 649,
"watchers_count": 649,
"has_discussions": false,
"forks_count": 128,
"allow_forking": true,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 128,
"watchers": 648,
"watchers": 649,
"score": 0,
"subscribers_count": 16
},

View file

@ -14,10 +14,10 @@
"description": "win32k use-after-free poc",
"fork": false,
"created_at": "2020-04-22T13:11:16Z",
"updated_at": "2024-08-12T20:00:35Z",
"updated_at": "2025-01-06T07:13:49Z",
"pushed_at": "2020-04-22T13:11:27Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 70,
"watchers": 71,
"score": 0,
"subscribers_count": 5
}

View file

@ -981,12 +981,12 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2025-01-06T00:43:41Z",
"updated_at": "2025-01-06T09:40:48Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 170,
"watchers_count": 170,
"stargazers_count": 171,
"watchers_count": 171,
"has_discussions": false,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1000,8 +1000,8 @@
"tools"
],
"visibility": "public",
"forks": 15,
"watchers": 170,
"forks": 16,
"watchers": 171,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,19 +14,19 @@
"description": "0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020\/2021 CVE-2021-2119",
"fork": false,
"created_at": "2021-01-15T17:32:24Z",
"updated_at": "2024-10-09T21:12:00Z",
"updated_at": "2025-01-06T07:24:36Z",
"pushed_at": "2021-01-23T01:25:22Z",
"stargazers_count": 138,
"watchers_count": 138,
"stargazers_count": 139,
"watchers_count": 139,
"has_discussions": false,
"forks_count": 21,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 138,
"forks": 22,
"watchers": 139,
"score": 0,
"subscribers_count": 10
},

View file

@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2021-05-21T03:13:58Z",
"updated_at": "2024-10-05T16:20:40Z",
"updated_at": "2025-01-06T07:27:17Z",
"pushed_at": "2021-05-21T03:24:25Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 25,
"watchers": 26,
"score": 0,
"subscribers_count": 3
},

View file

@ -171,10 +171,10 @@
"description": "CVE-2021-22986 & F5 BIG-IP RCE",
"fork": false,
"created_at": "2021-03-22T07:13:50Z",
"updated_at": "2024-11-23T01:54:42Z",
"updated_at": "2025-01-06T08:54:41Z",
"pushed_at": "2021-04-03T12:56:37Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 89,
"watchers_count": 89,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -186,7 +186,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 88,
"watchers": 89,
"score": 0,
"subscribers_count": 5
},

View file

@ -138,10 +138,10 @@
"description": "海康威视RCE漏洞 批量检测和利用工具",
"fork": false,
"created_at": "2022-08-03T17:27:59Z",
"updated_at": "2024-12-12T06:52:14Z",
"updated_at": "2025-01-06T10:44:12Z",
"pushed_at": "2022-08-05T19:57:30Z",
"stargazers_count": 144,
"watchers_count": 144,
"stargazers_count": 145,
"watchers_count": 145,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -153,7 +153,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 144,
"watchers": 145,
"score": 0,
"subscribers_count": 2
},

View file

@ -331,10 +331,10 @@
"description": "F5 BIG-IP RCE exploitation (CVE-2022-1388)",
"fork": false,
"created_at": "2022-05-09T10:34:38Z",
"updated_at": "2024-08-16T11:43:21Z",
"updated_at": "2025-01-06T07:29:21Z",
"pushed_at": "2022-05-16T12:40:51Z",
"stargazers_count": 87,
"watchers_count": 87,
"stargazers_count": 88,
"watchers_count": 88,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -343,7 +343,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 87,
"watchers": 88,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,12 +14,12 @@
"description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability",
"fork": false,
"created_at": "2022-08-09T15:53:48Z",
"updated_at": "2025-01-05T19:08:04Z",
"updated_at": "2025-01-06T07:28:42Z",
"pushed_at": "2023-09-27T06:44:27Z",
"stargazers_count": 317,
"watchers_count": 317,
"stargazers_count": 318,
"watchers_count": 318,
"has_discussions": false,
"forks_count": 61,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -33,8 +33,8 @@
"windows-boot"
],
"visibility": "public",
"forks": 61,
"watchers": 317,
"forks": 62,
"watchers": 318,
"score": 0,
"subscribers_count": 11
},

View file

@ -1913,10 +1913,10 @@
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan支持检测路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
"fork": false,
"created_at": "2022-06-19T13:16:55Z",
"updated_at": "2024-12-11T04:14:32Z",
"updated_at": "2025-01-06T07:33:02Z",
"pushed_at": "2023-01-23T13:00:34Z",
"stargazers_count": 149,
"watchers_count": 149,
"stargazers_count": 150,
"watchers_count": 150,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -1925,7 +1925,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 149,
"watchers": 150,
"score": 0,
"subscribers_count": 2
},

View file

@ -107,10 +107,10 @@
"description": "检测域内常见一把梭漏洞包括NoPac、ZeroLogon、CVE-2022-26923、PrintNightMare",
"fork": false,
"created_at": "2023-10-17T06:29:44Z",
"updated_at": "2025-01-04T02:46:15Z",
"updated_at": "2025-01-06T08:04:10Z",
"pushed_at": "2023-10-23T04:47:11Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 42,
"watchers": 43,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3",
"fork": false,
"created_at": "2022-10-28T09:51:41Z",
"updated_at": "2024-12-21T03:51:05Z",
"updated_at": "2025-01-06T11:40:10Z",
"pushed_at": "2022-11-18T15:47:17Z",
"stargazers_count": 530,
"watchers_count": 530,
"stargazers_count": 531,
"watchers_count": 531,
"has_discussions": false,
"forks_count": 110,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 110,
"watchers": 530,
"watchers": 531,
"score": 0,
"subscribers_count": 46
},

View file

@ -557,10 +557,10 @@
"description": "An authentication bypass using an alternate path or channel in Fortinet product",
"fork": false,
"created_at": "2022-10-27T15:11:27Z",
"updated_at": "2024-02-05T15:50:36Z",
"updated_at": "2025-01-06T06:29:15Z",
"pushed_at": "2022-10-27T15:32:53Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -569,7 +569,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 3
},

View file

@ -1053,8 +1053,8 @@
"description": "Cacti v1.2.22: Unauthenticated Command Injection Vulnerability (CVE-2022-46169)",
"fork": false,
"created_at": "2025-01-04T21:53:47Z",
"updated_at": "2025-01-04T21:57:20Z",
"pushed_at": "2025-01-04T21:57:17Z",
"updated_at": "2025-01-06T11:49:57Z",
"pushed_at": "2025-01-06T11:49:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -50,13 +50,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 1

View file

@ -14,19 +14,19 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2025-01-05T23:29:00Z",
"updated_at": "2025-01-06T08:21:21Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1361,
"watchers_count": 1361,
"stargazers_count": 1362,
"watchers_count": 1362,
"has_discussions": false,
"forks_count": 229,
"forks_count": 230,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 229,
"watchers": 1361,
"forks": 230,
"watchers": 1362,
"score": 0,
"subscribers_count": 21
},

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2025-01-03T11:27:43Z",
"updated_at": "2025-01-06T12:17:23Z",
"pushed_at": "2024-12-02T06:29:52Z",
"stargazers_count": 265,
"watchers_count": 265,
"stargazers_count": 267,
"watchers_count": 267,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 62,
"watchers": 265,
"watchers": 267,
"score": 0,
"subscribers_count": 7
},
@ -297,10 +297,10 @@
"description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app",
"fork": false,
"created_at": "2024-09-27T09:02:08Z",
"updated_at": "2025-01-04T02:45:30Z",
"updated_at": "2025-01-06T12:27:07Z",
"pushed_at": "2024-09-30T12:48:08Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 132,
"watchers_count": 132,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -309,7 +309,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 131,
"watchers": 132,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2025-01-06T06:10:32Z",
"updated_at": "2025-01-06T08:02:56Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2321,
"watchers_count": 2321,
"stargazers_count": 2322,
"watchers_count": 2322,
"has_discussions": false,
"forks_count": 300,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 300,
"watchers": 2321,
"watchers": 2322,
"score": 0,
"subscribers_count": 26
},

View file

@ -118,7 +118,7 @@
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -133,7 +133,7 @@
"wordpress"
],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 18,
"score": 0,
"subscribers_count": 1

View file

@ -14,19 +14,19 @@
"description": "PoC for CVE-2024-21182",
"fork": false,
"created_at": "2024-12-29T18:45:22Z",
"updated_at": "2024-12-29T18:45:22Z",
"updated_at": "2025-01-06T09:49:55Z",
"pushed_at": "2024-12-29T15:56:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 0,
"forks": 8,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -45,10 +45,10 @@
"description": "Windows LPE",
"fork": false,
"created_at": "2024-06-11T08:03:29Z",
"updated_at": "2025-01-02T06:02:52Z",
"updated_at": "2025-01-06T11:32:04Z",
"pushed_at": "2024-06-11T20:41:59Z",
"stargazers_count": 112,
"watchers_count": 112,
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 112,
"watchers": 114,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "Exploit POC for CVE-2024-36877",
"fork": false,
"created_at": "2024-08-09T15:33:04Z",
"updated_at": "2024-12-01T01:16:18Z",
"updated_at": "2025-01-06T08:20:54Z",
"pushed_at": "2024-08-14T15:26:18Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 45,
"watchers": 46,
"score": 0,
"subscribers_count": 1
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
@ -50,13 +50,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "cve-2024-42327 ZBX-25623",
"fork": false,
"created_at": "2024-12-01T00:15:27Z",
"updated_at": "2024-12-24T16:47:55Z",
"updated_at": "2025-01-06T08:25:25Z",
"pushed_at": "2024-12-01T01:18:36Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 1
},
@ -200,19 +200,19 @@
"description": "Zabbix CVE-2024-42327 PoC",
"fork": false,
"created_at": "2025-01-01T18:25:44Z",
"updated_at": "2025-01-06T05:03:29Z",
"updated_at": "2025-01-06T11:53:22Z",
"pushed_at": "2025-01-03T13:49:03Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 14,
"forks": 4,
"watchers": 19,
"score": 0,
"subscribers_count": 1
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 74,
"score": 0,
"subscribers_count": 1

View file

@ -14,19 +14,19 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
"fork": false,
"created_at": "2025-01-01T15:48:38Z",
"updated_at": "2025-01-06T04:53:52Z",
"updated_at": "2025-01-06T11:58:13Z",
"pushed_at": "2025-01-02T16:07:23Z",
"stargazers_count": 354,
"watchers_count": 354,
"stargazers_count": 361,
"watchers_count": 361,
"has_discussions": false,
"forks_count": 80,
"forks_count": 83,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 80,
"watchers": 354,
"forks": 83,
"watchers": 361,
"score": 0,
"subscribers_count": 3
},
@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2025-01-03T07:05:33Z",
"updated_at": "2025-01-06T01:34:07Z",
"updated_at": "2025-01-06T08:31:05Z",
"pushed_at": "2025-01-03T08:20:03Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
@ -76,8 +76,8 @@
"description": "CVE-2024-49113에 대한 익스플로잇. Windows Lightweight Directory Access Protocol(LDAP)의 취약성.",
"fork": false,
"created_at": "2025-01-05T01:32:03Z",
"updated_at": "2025-01-05T01:34:36Z",
"pushed_at": "2025-01-05T01:34:33Z",
"updated_at": "2025-01-06T08:04:48Z",
"pushed_at": "2025-01-06T08:04:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -91,5 +91,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 912790659,
"name": "CVE-2024-49113-Checker",
"full_name": "Sachinart\/CVE-2024-49113-Checker",
"owner": {
"login": "Sachinart",
"id": 18497191,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18497191?v=4",
"html_url": "https:\/\/github.com\/Sachinart",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Sachinart\/CVE-2024-49113-Checker",
"description": "Hi, This is to check targets vulnerable for CVE-2024-49113 in bulk, faster.",
"fork": false,
"created_at": "2025-01-06T11:59:02Z",
"updated_at": "2025-01-06T12:04:05Z",
"pushed_at": "2025-01-06T12:04:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -200,10 +200,10 @@
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
"fork": false,
"created_at": "2024-12-23T07:20:47Z",
"updated_at": "2025-01-04T19:19:32Z",
"updated_at": "2025-01-06T09:45:01Z",
"pushed_at": "2024-12-23T07:30:27Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 60,
"watchers": 61,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-52940 - A zero-day vulnerability in AnyDesk's \"Allow Direct Connections\" feature, discovered and registered by Ebrahim Shafiei (EbraSha), exposing public and private IP addresses. For details, visit the NVD, Tenable, or MITRE pages.",
"fork": false,
"created_at": "2024-10-27T15:29:56Z",
"updated_at": "2024-12-20T11:42:38Z",
"updated_at": "2025-01-06T07:29:26Z",
"pushed_at": "2024-11-18T15:09:32Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": true,
"forks_count": 9,
"allow_forking": true,
@ -38,7 +38,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 29,
"watchers": 30,
"score": 0,
"subscribers_count": 1
},

View file

@ -262,10 +262,10 @@
"description": "Proof-of-Concept for CVE-2024-46538",
"fork": false,
"created_at": "2025-01-03T02:30:53Z",
"updated_at": "2025-01-03T18:51:23Z",
"updated_at": "2025-01-06T10:20:48Z",
"pushed_at": "2025-01-03T18:51:20Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -274,7 +274,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

33
2024/CVE-2024-54369.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 905823638,
"name": "CVE-2024-54369",
"full_name": "RandomRobbieBF\/CVE-2024-54369",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-54369",
"description": "Zita Site Builder <= 1.0.2 - Missing Authorization to Arbitrary Plugin Installation",
"fork": false,
"created_at": "2024-12-19T15:38:41Z",
"updated_at": "2025-01-06T09:23:39Z",
"pushed_at": "2024-12-19T15:39:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-55972.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 911617043,
"name": "CVE-2024-55972",
"full_name": "RandomRobbieBF\/CVE-2024-55972",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-55972",
"description": "eTemplates <= 0.2.1 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2025-01-03T12:47:01Z",
"updated_at": "2025-01-06T09:25:28Z",
"pushed_at": "2025-01-03T12:48:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-55976.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 911633099,
"name": "CVE-2024-55976",
"full_name": "RandomRobbieBF\/CVE-2024-55976",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-55976",
"description": "Critical Site Intel <= 1.0 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2025-01-03T13:32:11Z",
"updated_at": "2025-01-06T09:26:23Z",
"pushed_at": "2025-01-03T13:33:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-55981.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 911614124,
"name": "CVE-2024-55981",
"full_name": "RandomRobbieBF\/CVE-2024-55981",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-55981",
"description": "Nabz Image Gallery <= v1.00 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2025-01-03T12:38:29Z",
"updated_at": "2025-01-06T09:27:13Z",
"pushed_at": "2025-01-03T12:39:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-55982.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 911609279,
"name": "CVE-2024-55982",
"full_name": "RandomRobbieBF\/CVE-2024-55982",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-55982",
"description": "Share Buttons Social Media <= 1.0.2 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2025-01-03T12:23:50Z",
"updated_at": "2025-01-06T09:28:03Z",
"pushed_at": "2025-01-03T12:25:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled",
"fork": false,
"created_at": "2024-12-20T03:34:01Z",
"updated_at": "2025-01-06T02:43:29Z",
"updated_at": "2025-01-06T08:44:09Z",
"pushed_at": "2024-12-23T12:51:54Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 34,
"watchers": 35,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,8 +14,8 @@
"description": "CVE-2024-56433 - shadow-utils Default subordinate ID for local users creates risk of collision",
"fork": false,
"created_at": "2025-01-03T13:11:25Z",
"updated_at": "2025-01-03T13:44:45Z",
"pushed_at": "2025-01-03T13:44:42Z",
"updated_at": "2025-01-06T12:02:43Z",
"pushed_at": "2025-01-06T12:02:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -2936,13 +2936,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)",
"fork": false,
"created_at": "2024-08-29T16:40:49Z",
"updated_at": "2025-01-02T15:53:20Z",
"updated_at": "2025-01-06T10:05:17Z",
"pushed_at": "2024-09-29T21:58:19Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 58,
"watchers": 59,
"score": 0,
"subscribers_count": 3
}

View file

@ -2448,7 +2448,11 @@
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
### CVE-2024-12970
### CVE-2024-12970 (2025-01-06)
<code>Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in TUBITAK BILGEM Pardus OS My Computer allows OS Command Injection.This issue affects Pardus OS My Computer: before 0.7.2.
</code>
- [osmancanvural/CVE-2024-12970](https://github.com/osmancanvural/CVE-2024-12970)
### CVE-2024-12986 (2024-12-27)
@ -7166,6 +7170,7 @@
- [SafeBreach-Labs/CVE-2024-49113](https://github.com/SafeBreach-Labs/CVE-2024-49113)
- [barcrange/CVE-2024-49113-Checker](https://github.com/barcrange/CVE-2024-49113-Checker)
- [YoonJae-rep/CVE-2024-49113](https://github.com/YoonJae-rep/CVE-2024-49113)
- [Sachinart/CVE-2024-49113-Checker](https://github.com/Sachinart/CVE-2024-49113-Checker)
### CVE-2024-49117 (2024-12-10)
@ -7777,6 +7782,13 @@
- [RandomRobbieBF/CVE-2024-54330](https://github.com/RandomRobbieBF/CVE-2024-54330)
### CVE-2024-54369 (2024-12-16)
<code>Missing Authorization vulnerability in ThemeHunk Zita Site Builder allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Zita Site Builder: from n/a through 1.0.2.
</code>
- [RandomRobbieBF/CVE-2024-54369](https://github.com/RandomRobbieBF/CVE-2024-54369)
### CVE-2024-54679 (2024-12-05)
<code>CyberPanel (aka Cyber Panel) before 6778ad1 does not require the FilemanagerAdmin capability for restartMySQL actions.
@ -7822,6 +7834,34 @@
- [Wi1DN00B/CVE-2024-55968](https://github.com/Wi1DN00B/CVE-2024-55968)
- [null-event/CVE-2024-55968](https://github.com/null-event/CVE-2024-55968)
### CVE-2024-55972 (2024-12-16)
<code>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Chris Carvache eTemplates allows SQL Injection.This issue affects eTemplates: from n/a through 0.2.1.
</code>
- [RandomRobbieBF/CVE-2024-55972](https://github.com/RandomRobbieBF/CVE-2024-55972)
### CVE-2024-55976 (2024-12-16)
<code>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mike Leembruggen Critical Site Intel allows SQL Injection.This issue affects Critical Site Intel: from n/a through 1.0.
</code>
- [RandomRobbieBF/CVE-2024-55976](https://github.com/RandomRobbieBF/CVE-2024-55976)
### CVE-2024-55981 (2024-12-16)
<code>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nabajit Roy Nabz Image Gallery allows SQL Injection.This issue affects Nabz Image Gallery: from n/a through v1.00.
</code>
- [RandomRobbieBF/CVE-2024-55981](https://github.com/RandomRobbieBF/CVE-2024-55981)
### CVE-2024-55982 (2024-12-16)
<code>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in richteam Share Buttons Social Media allows Blind SQL Injection.This issue affects Share Buttons Social Media: from n/a through 1.0.2.
</code>
- [RandomRobbieBF/CVE-2024-55982](https://github.com/RandomRobbieBF/CVE-2024-55982)
### CVE-2024-55988 (2024-12-16)
<code>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Amol Nirmala Waman Navayan CSV Export allows Blind SQL Injection.This issue affects Navayan CSV Export: from n/a through 1.0.9.