From 2aab3d7312f94527b55e0a9e434302eba214664e Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Mon, 6 Jan 2025 21:33:02 +0900 Subject: [PATCH] Auto Update 2025/01/06 12:33:02 --- 2016/CVE-2016-4977.json | 8 +++--- 2017/CVE-2017-12615.json | 12 ++++----- 2018/CVE-2018-14667.json | 8 +++--- 2018/CVE-2018-5955.json | 8 +++--- 2020/CVE-2020-0624.json | 8 +++--- 2020/CVE-2020-1938.json | 12 ++++----- 2021/CVE-2021-2119.json | 12 ++++----- 2021/CVE-2021-21551.json | 8 +++--- 2021/CVE-2021-22986.json | 8 +++--- 2021/CVE-2021-36260.json | 8 +++--- 2022/CVE-2022-1388.json | 8 +++--- 2022/CVE-2022-21894.json | 12 ++++----- 2022/CVE-2022-22965.json | 8 +++--- 2022/CVE-2022-26923.json | 8 +++--- 2022/CVE-2022-3602.json | 8 +++--- 2022/CVE-2022-40684.json | 8 +++--- 2022/CVE-2022-46169.json | 4 +-- 2023/CVE-2023-29489.json | 4 +-- 2023/CVE-2023-45866.json | 12 ++++----- 2024/CVE-2024-0044.json | 16 ++++++------ 2024/CVE-2024-1086.json | 8 +++--- 2024/CVE-2024-10924.json | 4 +-- 2024/CVE-2024-21182.json | 12 ++++----- 2024/CVE-2024-26229.json | 8 +++--- 2024/CVE-2024-36877.json | 8 +++--- 2024/CVE-2024-37383.json | 8 +++--- 2024/CVE-2024-42327.json | 20 +++++++-------- 2024/CVE-2024-45409.json | 4 +-- 2024/CVE-2024-49113.json | 55 +++++++++++++++++++++++++++++++--------- 2024/CVE-2024-50379.json | 8 +++--- 2024/CVE-2024-52940.json | 8 +++--- 2024/CVE-2024-53677.json | 8 +++--- 2024/CVE-2024-54369.json | 33 ++++++++++++++++++++++++ 2024/CVE-2024-55972.json | 33 ++++++++++++++++++++++++ 2024/CVE-2024-55976.json | 33 ++++++++++++++++++++++++ 2024/CVE-2024-55981.json | 33 ++++++++++++++++++++++++ 2024/CVE-2024-55982.json | 33 ++++++++++++++++++++++++ 2024/CVE-2024-56145.json | 8 +++--- 2024/CVE-2024-56433.json | 4 +-- 2024/CVE-2024-6387.json | 4 +-- 2024/CVE-2024-6769.json | 8 +++--- README.md | 42 +++++++++++++++++++++++++++++- 42 files changed, 399 insertions(+), 163 deletions(-) create mode 100644 2024/CVE-2024-54369.json create mode 100644 2024/CVE-2024-55972.json create mode 100644 2024/CVE-2024-55976.json create mode 100644 2024/CVE-2024-55981.json create mode 100644 2024/CVE-2024-55982.json diff --git a/2016/CVE-2016-4977.json b/2016/CVE-2016-4977.json index c6bd3eb703..09f93ea600 100644 --- a/2016/CVE-2016-4977.json +++ b/2016/CVE-2016-4977.json @@ -45,10 +45,10 @@ "description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan:支持检测:路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977", "fork": false, "created_at": "2022-06-19T13:16:55Z", - "updated_at": "2024-12-11T04:14:32Z", + "updated_at": "2025-01-06T07:33:02Z", "pushed_at": "2023-01-23T13:00:34Z", - "stargazers_count": 149, - "watchers_count": 149, + "stargazers_count": 150, + "watchers_count": 150, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 149, + "watchers": 150, "score": 0, "subscribers_count": 2 } diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json index b313f7e59f..0bbd02e006 100644 --- a/2017/CVE-2017-12615.json +++ b/2017/CVE-2017-12615.json @@ -417,12 +417,12 @@ "description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "fork": false, "created_at": "2024-08-29T06:38:16Z", - "updated_at": "2025-01-06T00:43:41Z", + "updated_at": "2025-01-06T09:40:48Z", "pushed_at": "2024-11-13T03:12:58Z", - "stargazers_count": 170, - "watchers_count": 170, + "stargazers_count": 171, + "watchers_count": 171, "has_discussions": false, - "forks_count": 15, + "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -436,8 +436,8 @@ "tools" ], "visibility": "public", - "forks": 15, - "watchers": 170, + "forks": 16, + "watchers": 171, "score": 0, "subscribers_count": 2 }, diff --git a/2018/CVE-2018-14667.json b/2018/CVE-2018-14667.json index 66209054ce..5a6e05ce73 100644 --- a/2018/CVE-2018-14667.json +++ b/2018/CVE-2018-14667.json @@ -107,10 +107,10 @@ "description": "All about CVE-2018-14667; From what it is to how to successfully exploit it.", "fork": false, "created_at": "2018-11-30T04:06:08Z", - "updated_at": "2024-10-28T16:19:32Z", + "updated_at": "2025-01-06T06:56:32Z", "pushed_at": "2018-11-30T07:10:44Z", - "stargazers_count": 49, - "watchers_count": 49, + "stargazers_count": 50, + "watchers_count": 50, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 49, + "watchers": 50, "score": 0, "subscribers_count": 2 }, diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index 12cb4ff8ea..b07e38b006 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -45,10 +45,10 @@ "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "fork": false, "created_at": "2019-12-21T22:45:55Z", - "updated_at": "2024-12-28T12:58:43Z", + "updated_at": "2025-01-06T08:51:16Z", "pushed_at": "2020-01-05T21:46:25Z", - "stargazers_count": 648, - "watchers_count": 648, + "stargazers_count": 649, + "watchers_count": 649, "has_discussions": false, "forks_count": 128, "allow_forking": true, @@ -70,7 +70,7 @@ ], "visibility": "public", "forks": 128, - "watchers": 648, + "watchers": 649, "score": 0, "subscribers_count": 16 }, diff --git a/2020/CVE-2020-0624.json b/2020/CVE-2020-0624.json index 99b7f6c8bb..8efd105cbc 100644 --- a/2020/CVE-2020-0624.json +++ b/2020/CVE-2020-0624.json @@ -14,10 +14,10 @@ "description": "win32k use-after-free poc", "fork": false, "created_at": "2020-04-22T13:11:16Z", - "updated_at": "2024-08-12T20:00:35Z", + "updated_at": "2025-01-06T07:13:49Z", "pushed_at": "2020-04-22T13:11:27Z", - "stargazers_count": 70, - "watchers_count": 70, + "stargazers_count": 71, + "watchers_count": 71, "has_discussions": false, "forks_count": 38, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 38, - "watchers": 70, + "watchers": 71, "score": 0, "subscribers_count": 5 } diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index a5c2f92fd9..d7867da859 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -981,12 +981,12 @@ "description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "fork": false, "created_at": "2024-08-29T06:38:16Z", - "updated_at": "2025-01-06T00:43:41Z", + "updated_at": "2025-01-06T09:40:48Z", "pushed_at": "2024-11-13T03:12:58Z", - "stargazers_count": 170, - "watchers_count": 170, + "stargazers_count": 171, + "watchers_count": 171, "has_discussions": false, - "forks_count": 15, + "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -1000,8 +1000,8 @@ "tools" ], "visibility": "public", - "forks": 15, - "watchers": 170, + "forks": 16, + "watchers": 171, "score": 0, "subscribers_count": 2 } diff --git a/2021/CVE-2021-2119.json b/2021/CVE-2021-2119.json index bab387520a..1ade68ae6d 100644 --- a/2021/CVE-2021-2119.json +++ b/2021/CVE-2021-2119.json @@ -14,19 +14,19 @@ "description": "0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020\/2021 CVE-2021-2119", "fork": false, "created_at": "2021-01-15T17:32:24Z", - "updated_at": "2024-10-09T21:12:00Z", + "updated_at": "2025-01-06T07:24:36Z", "pushed_at": "2021-01-23T01:25:22Z", - "stargazers_count": 138, - "watchers_count": 138, + "stargazers_count": 139, + "watchers_count": 139, "has_discussions": false, - "forks_count": 21, + "forks_count": 22, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 21, - "watchers": 138, + "forks": 22, + "watchers": 139, "score": 0, "subscribers_count": 10 }, diff --git a/2021/CVE-2021-21551.json b/2021/CVE-2021-21551.json index d0f21b32f2..7ff5508dca 100644 --- a/2021/CVE-2021-21551.json +++ b/2021/CVE-2021-21551.json @@ -45,10 +45,10 @@ "description": null, "fork": false, "created_at": "2021-05-21T03:13:58Z", - "updated_at": "2024-10-05T16:20:40Z", + "updated_at": "2025-01-06T07:27:17Z", "pushed_at": "2021-05-21T03:24:25Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 25, + "watchers": 26, "score": 0, "subscribers_count": 3 }, diff --git a/2021/CVE-2021-22986.json b/2021/CVE-2021-22986.json index 7ecdc77e5a..cc99698333 100644 --- a/2021/CVE-2021-22986.json +++ b/2021/CVE-2021-22986.json @@ -171,10 +171,10 @@ "description": "CVE-2021-22986 & F5 BIG-IP RCE", "fork": false, "created_at": "2021-03-22T07:13:50Z", - "updated_at": "2024-11-23T01:54:42Z", + "updated_at": "2025-01-06T08:54:41Z", "pushed_at": "2021-04-03T12:56:37Z", - "stargazers_count": 88, - "watchers_count": 88, + "stargazers_count": 89, + "watchers_count": 89, "has_discussions": false, "forks_count": 33, "allow_forking": true, @@ -186,7 +186,7 @@ ], "visibility": "public", "forks": 33, - "watchers": 88, + "watchers": 89, "score": 0, "subscribers_count": 5 }, diff --git a/2021/CVE-2021-36260.json b/2021/CVE-2021-36260.json index a28f81c3cc..a4613b1b87 100644 --- a/2021/CVE-2021-36260.json +++ b/2021/CVE-2021-36260.json @@ -138,10 +138,10 @@ "description": "海康威视RCE漏洞 批量检测和利用工具", "fork": false, "created_at": "2022-08-03T17:27:59Z", - "updated_at": "2024-12-12T06:52:14Z", + "updated_at": "2025-01-06T10:44:12Z", "pushed_at": "2022-08-05T19:57:30Z", - "stargazers_count": 144, - "watchers_count": 144, + "stargazers_count": 145, + "watchers_count": 145, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -153,7 +153,7 @@ ], "visibility": "public", "forks": 24, - "watchers": 144, + "watchers": 145, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json index 37793fe7fd..8ced2a85e8 100644 --- a/2022/CVE-2022-1388.json +++ b/2022/CVE-2022-1388.json @@ -331,10 +331,10 @@ "description": "F5 BIG-IP RCE exploitation (CVE-2022-1388)", "fork": false, "created_at": "2022-05-09T10:34:38Z", - "updated_at": "2024-08-16T11:43:21Z", + "updated_at": "2025-01-06T07:29:21Z", "pushed_at": "2022-05-16T12:40:51Z", - "stargazers_count": 87, - "watchers_count": 87, + "stargazers_count": 88, + "watchers_count": 88, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -343,7 +343,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 87, + "watchers": 88, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-21894.json b/2022/CVE-2022-21894.json index 99c23b9718..b78bfb3da1 100644 --- a/2022/CVE-2022-21894.json +++ b/2022/CVE-2022-21894.json @@ -14,12 +14,12 @@ "description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability", "fork": false, "created_at": "2022-08-09T15:53:48Z", - "updated_at": "2025-01-05T19:08:04Z", + "updated_at": "2025-01-06T07:28:42Z", "pushed_at": "2023-09-27T06:44:27Z", - "stargazers_count": 317, - "watchers_count": 317, + "stargazers_count": 318, + "watchers_count": 318, "has_discussions": false, - "forks_count": 61, + "forks_count": 62, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -33,8 +33,8 @@ "windows-boot" ], "visibility": "public", - "forks": 61, - "watchers": 317, + "forks": 62, + "watchers": 318, "score": 0, "subscribers_count": 11 }, diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index 5de133caaf..f66762b571 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -1913,10 +1913,10 @@ "description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan:支持检测:路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977", "fork": false, "created_at": "2022-06-19T13:16:55Z", - "updated_at": "2024-12-11T04:14:32Z", + "updated_at": "2025-01-06T07:33:02Z", "pushed_at": "2023-01-23T13:00:34Z", - "stargazers_count": 149, - "watchers_count": 149, + "stargazers_count": 150, + "watchers_count": 150, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -1925,7 +1925,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 149, + "watchers": 150, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-26923.json b/2022/CVE-2022-26923.json index d0045fee5b..ce91fd94e5 100644 --- a/2022/CVE-2022-26923.json +++ b/2022/CVE-2022-26923.json @@ -107,10 +107,10 @@ "description": "检测域内常见一把梭漏洞,包括:NoPac、ZeroLogon、CVE-2022-26923、PrintNightMare", "fork": false, "created_at": "2023-10-17T06:29:44Z", - "updated_at": "2025-01-04T02:46:15Z", + "updated_at": "2025-01-06T08:04:10Z", "pushed_at": "2023-10-23T04:47:11Z", - "stargazers_count": 42, - "watchers_count": 42, + "stargazers_count": 43, + "watchers_count": 43, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 42, + "watchers": 43, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-3602.json b/2022/CVE-2022-3602.json index 1e02a156f7..fc9d9bbb85 100644 --- a/2022/CVE-2022-3602.json +++ b/2022/CVE-2022-3602.json @@ -14,10 +14,10 @@ "description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3", "fork": false, "created_at": "2022-10-28T09:51:41Z", - "updated_at": "2024-12-21T03:51:05Z", + "updated_at": "2025-01-06T11:40:10Z", "pushed_at": "2022-11-18T15:47:17Z", - "stargazers_count": 530, - "watchers_count": 530, + "stargazers_count": 531, + "watchers_count": 531, "has_discussions": false, "forks_count": 110, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 110, - "watchers": 530, + "watchers": 531, "score": 0, "subscribers_count": 46 }, diff --git a/2022/CVE-2022-40684.json b/2022/CVE-2022-40684.json index 6d30c8dc4e..b7d09a7624 100644 --- a/2022/CVE-2022-40684.json +++ b/2022/CVE-2022-40684.json @@ -557,10 +557,10 @@ "description": "An authentication bypass using an alternate path or channel in Fortinet product", "fork": false, "created_at": "2022-10-27T15:11:27Z", - "updated_at": "2024-02-05T15:50:36Z", + "updated_at": "2025-01-06T06:29:15Z", "pushed_at": "2022-10-27T15:32:53Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 14, + "watchers_count": 14, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -569,7 +569,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 13, + "watchers": 14, "score": 0, "subscribers_count": 3 }, diff --git a/2022/CVE-2022-46169.json b/2022/CVE-2022-46169.json index 8115263bf8..68c2c303cb 100644 --- a/2022/CVE-2022-46169.json +++ b/2022/CVE-2022-46169.json @@ -1053,8 +1053,8 @@ "description": "Cacti v1.2.22: Unauthenticated Command Injection Vulnerability (CVE-2022-46169)", "fork": false, "created_at": "2025-01-04T21:53:47Z", - "updated_at": "2025-01-04T21:57:20Z", - "pushed_at": "2025-01-04T21:57:17Z", + "updated_at": "2025-01-06T11:49:57Z", + "pushed_at": "2025-01-06T11:49:54Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-29489.json b/2023/CVE-2023-29489.json index 8cad358bd1..0b96e8379c 100644 --- a/2023/CVE-2023-29489.json +++ b/2023/CVE-2023-29489.json @@ -50,13 +50,13 @@ "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 3, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 5464d7f852..3a7a86250a 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,19 +14,19 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2025-01-05T23:29:00Z", + "updated_at": "2025-01-06T08:21:21Z", "pushed_at": "2024-08-18T08:26:46Z", - "stargazers_count": 1361, - "watchers_count": 1361, + "stargazers_count": 1362, + "watchers_count": 1362, "has_discussions": false, - "forks_count": 229, + "forks_count": 230, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 229, - "watchers": 1361, + "forks": 230, + "watchers": 1362, "score": 0, "subscribers_count": 21 }, diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index ac20ec5797..27223d709c 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -45,10 +45,10 @@ "description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13", "fork": false, "created_at": "2024-06-18T12:30:53Z", - "updated_at": "2025-01-03T11:27:43Z", + "updated_at": "2025-01-06T12:17:23Z", "pushed_at": "2024-12-02T06:29:52Z", - "stargazers_count": 265, - "watchers_count": 265, + "stargazers_count": 267, + "watchers_count": 267, "has_discussions": false, "forks_count": 62, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 62, - "watchers": 265, + "watchers": 267, "score": 0, "subscribers_count": 7 }, @@ -297,10 +297,10 @@ "description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app", "fork": false, "created_at": "2024-09-27T09:02:08Z", - "updated_at": "2025-01-04T02:45:30Z", + "updated_at": "2025-01-06T12:27:07Z", "pushed_at": "2024-09-30T12:48:08Z", - "stargazers_count": 131, - "watchers_count": 131, + "stargazers_count": 132, + "watchers_count": 132, "has_discussions": false, "forks_count": 17, "allow_forking": true, @@ -309,7 +309,7 @@ "topics": [], "visibility": "public", "forks": 17, - "watchers": 131, + "watchers": 132, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 0a5aa56d3d..8f31df17a9 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -14,10 +14,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2025-01-06T06:10:32Z", + "updated_at": "2025-01-06T08:02:56Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 2321, - "watchers_count": 2321, + "stargazers_count": 2322, + "watchers_count": 2322, "has_discussions": false, "forks_count": 300, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 300, - "watchers": 2321, + "watchers": 2322, "score": 0, "subscribers_count": 26 }, diff --git a/2024/CVE-2024-10924.json b/2024/CVE-2024-10924.json index 613e72ef7c..4584696f4f 100644 --- a/2024/CVE-2024-10924.json +++ b/2024/CVE-2024-10924.json @@ -118,7 +118,7 @@ "stargazers_count": 18, "watchers_count": 18, "has_discussions": false, - "forks_count": 13, + "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -133,7 +133,7 @@ "wordpress" ], "visibility": "public", - "forks": 13, + "forks": 14, "watchers": 18, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-21182.json b/2024/CVE-2024-21182.json index 9806bbcd79..9e534c65f5 100644 --- a/2024/CVE-2024-21182.json +++ b/2024/CVE-2024-21182.json @@ -14,19 +14,19 @@ "description": "PoC for CVE-2024-21182", "fork": false, "created_at": "2024-12-29T18:45:22Z", - "updated_at": "2024-12-29T18:45:22Z", + "updated_at": "2025-01-06T09:49:55Z", "pushed_at": "2024-12-29T15:56:14Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, - "forks_count": 7, + "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 7, - "watchers": 0, + "forks": 8, + "watchers": 1, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-26229.json b/2024/CVE-2024-26229.json index f5c0ecd94a..7869a9f0b8 100644 --- a/2024/CVE-2024-26229.json +++ b/2024/CVE-2024-26229.json @@ -45,10 +45,10 @@ "description": "Windows LPE", "fork": false, "created_at": "2024-06-11T08:03:29Z", - "updated_at": "2025-01-02T06:02:52Z", + "updated_at": "2025-01-06T11:32:04Z", "pushed_at": "2024-06-11T20:41:59Z", - "stargazers_count": 112, - "watchers_count": 112, + "stargazers_count": 114, + "watchers_count": 114, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 112, + "watchers": 114, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-36877.json b/2024/CVE-2024-36877.json index 17bb663ce9..9bccab8cad 100644 --- a/2024/CVE-2024-36877.json +++ b/2024/CVE-2024-36877.json @@ -14,10 +14,10 @@ "description": "Exploit POC for CVE-2024-36877", "fork": false, "created_at": "2024-08-09T15:33:04Z", - "updated_at": "2024-12-01T01:16:18Z", + "updated_at": "2025-01-06T08:20:54Z", "pushed_at": "2024-08-14T15:26:18Z", - "stargazers_count": 45, - "watchers_count": 45, + "stargazers_count": 46, + "watchers_count": 46, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 45, + "watchers": 46, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-37383.json b/2024/CVE-2024-37383.json index 9a5631879f..9a9e5f6139 100644 --- a/2024/CVE-2024-37383.json +++ b/2024/CVE-2024-37383.json @@ -19,13 +19,13 @@ "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 1 @@ -50,13 +50,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-42327.json b/2024/CVE-2024-42327.json index 342eb20b60..84eea8a10d 100644 --- a/2024/CVE-2024-42327.json +++ b/2024/CVE-2024-42327.json @@ -14,10 +14,10 @@ "description": "cve-2024-42327 ZBX-25623", "fork": false, "created_at": "2024-12-01T00:15:27Z", - "updated_at": "2024-12-24T16:47:55Z", + "updated_at": "2025-01-06T08:25:25Z", "pushed_at": "2024-12-01T01:18:36Z", - "stargazers_count": 28, - "watchers_count": 28, + "stargazers_count": 29, + "watchers_count": 29, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 28, + "watchers": 29, "score": 0, "subscribers_count": 1 }, @@ -200,19 +200,19 @@ "description": "Zabbix CVE-2024-42327 PoC", "fork": false, "created_at": "2025-01-01T18:25:44Z", - "updated_at": "2025-01-06T05:03:29Z", + "updated_at": "2025-01-06T11:53:22Z", "pushed_at": "2025-01-03T13:49:03Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 19, + "watchers_count": 19, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, - "watchers": 14, + "forks": 4, + "watchers": 19, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-45409.json b/2024/CVE-2024-45409.json index 236a220818..bf0dae2e55 100644 --- a/2024/CVE-2024-45409.json +++ b/2024/CVE-2024-45409.json @@ -19,13 +19,13 @@ "stargazers_count": 74, "watchers_count": 74, "has_discussions": false, - "forks_count": 13, + "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 13, + "forks": 14, "watchers": 74, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-49113.json b/2024/CVE-2024-49113.json index bbafd3afab..b4ef46bd75 100644 --- a/2024/CVE-2024-49113.json +++ b/2024/CVE-2024-49113.json @@ -14,19 +14,19 @@ "description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113", "fork": false, "created_at": "2025-01-01T15:48:38Z", - "updated_at": "2025-01-06T04:53:52Z", + "updated_at": "2025-01-06T11:58:13Z", "pushed_at": "2025-01-02T16:07:23Z", - "stargazers_count": 354, - "watchers_count": 354, + "stargazers_count": 361, + "watchers_count": 361, "has_discussions": false, - "forks_count": 80, + "forks_count": 83, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 80, - "watchers": 354, + "forks": 83, + "watchers": 361, "score": 0, "subscribers_count": 3 }, @@ -45,10 +45,10 @@ "description": null, "fork": false, "created_at": "2025-01-03T07:05:33Z", - "updated_at": "2025-01-06T01:34:07Z", + "updated_at": "2025-01-06T08:31:05Z", "pushed_at": "2025-01-03T08:20:03Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 }, @@ -76,8 +76,8 @@ "description": "CVE-2024-49113에 대한 익스플로잇. Windows Lightweight Directory Access Protocol(LDAP)의 취약성.", "fork": false, "created_at": "2025-01-05T01:32:03Z", - "updated_at": "2025-01-05T01:34:36Z", - "pushed_at": "2025-01-05T01:34:33Z", + "updated_at": "2025-01-06T08:04:48Z", + "pushed_at": "2025-01-06T08:04:45Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -91,5 +91,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 912790659, + "name": "CVE-2024-49113-Checker", + "full_name": "Sachinart\/CVE-2024-49113-Checker", + "owner": { + "login": "Sachinart", + "id": 18497191, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18497191?v=4", + "html_url": "https:\/\/github.com\/Sachinart", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Sachinart\/CVE-2024-49113-Checker", + "description": "Hi, This is to check targets vulnerable for CVE-2024-49113 in bulk, faster.", + "fork": false, + "created_at": "2025-01-06T11:59:02Z", + "updated_at": "2025-01-06T12:04:05Z", + "pushed_at": "2025-01-06T12:04:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-50379.json b/2024/CVE-2024-50379.json index fc0ee8a7a7..737911ed90 100644 --- a/2024/CVE-2024-50379.json +++ b/2024/CVE-2024-50379.json @@ -200,10 +200,10 @@ "description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp", "fork": false, "created_at": "2024-12-23T07:20:47Z", - "updated_at": "2025-01-04T19:19:32Z", + "updated_at": "2025-01-06T09:45:01Z", "pushed_at": "2024-12-23T07:30:27Z", - "stargazers_count": 60, - "watchers_count": 60, + "stargazers_count": 61, + "watchers_count": 61, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -212,7 +212,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 60, + "watchers": 61, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-52940.json b/2024/CVE-2024-52940.json index 4e1b012555..7f95cc3ac4 100644 --- a/2024/CVE-2024-52940.json +++ b/2024/CVE-2024-52940.json @@ -14,10 +14,10 @@ "description": "CVE-2024-52940 - A zero-day vulnerability in AnyDesk's \"Allow Direct Connections\" feature, discovered and registered by Ebrahim Shafiei (EbraSha), exposing public and private IP addresses. For details, visit the NVD, Tenable, or MITRE pages.", "fork": false, "created_at": "2024-10-27T15:29:56Z", - "updated_at": "2024-12-20T11:42:38Z", + "updated_at": "2025-01-06T07:29:26Z", "pushed_at": "2024-11-18T15:09:32Z", - "stargazers_count": 29, - "watchers_count": 29, + "stargazers_count": 30, + "watchers_count": 30, "has_discussions": true, "forks_count": 9, "allow_forking": true, @@ -38,7 +38,7 @@ ], "visibility": "public", "forks": 9, - "watchers": 29, + "watchers": 30, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json index eeb1e16c8b..2fe37aa1c2 100644 --- a/2024/CVE-2024-53677.json +++ b/2024/CVE-2024-53677.json @@ -262,10 +262,10 @@ "description": "Proof-of-Concept for CVE-2024-46538", "fork": false, "created_at": "2025-01-03T02:30:53Z", - "updated_at": "2025-01-03T18:51:23Z", + "updated_at": "2025-01-06T10:20:48Z", "pushed_at": "2025-01-03T18:51:20Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -274,7 +274,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-54369.json b/2024/CVE-2024-54369.json new file mode 100644 index 0000000000..37450b2a76 --- /dev/null +++ b/2024/CVE-2024-54369.json @@ -0,0 +1,33 @@ +[ + { + "id": 905823638, + "name": "CVE-2024-54369", + "full_name": "RandomRobbieBF\/CVE-2024-54369", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-54369", + "description": "Zita Site Builder <= 1.0.2 - Missing Authorization to Arbitrary Plugin Installation", + "fork": false, + "created_at": "2024-12-19T15:38:41Z", + "updated_at": "2025-01-06T09:23:39Z", + "pushed_at": "2024-12-19T15:39:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-55972.json b/2024/CVE-2024-55972.json new file mode 100644 index 0000000000..236bee48d3 --- /dev/null +++ b/2024/CVE-2024-55972.json @@ -0,0 +1,33 @@ +[ + { + "id": 911617043, + "name": "CVE-2024-55972", + "full_name": "RandomRobbieBF\/CVE-2024-55972", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-55972", + "description": "eTemplates <= 0.2.1 - Unauthenticated SQL Injection", + "fork": false, + "created_at": "2025-01-03T12:47:01Z", + "updated_at": "2025-01-06T09:25:28Z", + "pushed_at": "2025-01-03T12:48:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-55976.json b/2024/CVE-2024-55976.json new file mode 100644 index 0000000000..e73b439b57 --- /dev/null +++ b/2024/CVE-2024-55976.json @@ -0,0 +1,33 @@ +[ + { + "id": 911633099, + "name": "CVE-2024-55976", + "full_name": "RandomRobbieBF\/CVE-2024-55976", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-55976", + "description": "Critical Site Intel <= 1.0 - Unauthenticated SQL Injection", + "fork": false, + "created_at": "2025-01-03T13:32:11Z", + "updated_at": "2025-01-06T09:26:23Z", + "pushed_at": "2025-01-03T13:33:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-55981.json b/2024/CVE-2024-55981.json new file mode 100644 index 0000000000..b818376f35 --- /dev/null +++ b/2024/CVE-2024-55981.json @@ -0,0 +1,33 @@ +[ + { + "id": 911614124, + "name": "CVE-2024-55981", + "full_name": "RandomRobbieBF\/CVE-2024-55981", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-55981", + "description": "Nabz Image Gallery <= v1.00 - Unauthenticated SQL Injection", + "fork": false, + "created_at": "2025-01-03T12:38:29Z", + "updated_at": "2025-01-06T09:27:13Z", + "pushed_at": "2025-01-03T12:39:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-55982.json b/2024/CVE-2024-55982.json new file mode 100644 index 0000000000..5c6c618c7d --- /dev/null +++ b/2024/CVE-2024-55982.json @@ -0,0 +1,33 @@ +[ + { + "id": 911609279, + "name": "CVE-2024-55982", + "full_name": "RandomRobbieBF\/CVE-2024-55982", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-55982", + "description": "Share Buttons – Social Media <= 1.0.2 - Unauthenticated SQL Injection", + "fork": false, + "created_at": "2025-01-03T12:23:50Z", + "updated_at": "2025-01-06T09:28:03Z", + "pushed_at": "2025-01-03T12:25:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-56145.json b/2024/CVE-2024-56145.json index 617e86524d..0aee28eb13 100644 --- a/2024/CVE-2024-56145.json +++ b/2024/CVE-2024-56145.json @@ -14,10 +14,10 @@ "description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled", "fork": false, "created_at": "2024-12-20T03:34:01Z", - "updated_at": "2025-01-06T02:43:29Z", + "updated_at": "2025-01-06T08:44:09Z", "pushed_at": "2024-12-23T12:51:54Z", - "stargazers_count": 34, - "watchers_count": 34, + "stargazers_count": 35, + "watchers_count": 35, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 34, + "watchers": 35, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-56433.json b/2024/CVE-2024-56433.json index c464c97955..d7e9e79f09 100644 --- a/2024/CVE-2024-56433.json +++ b/2024/CVE-2024-56433.json @@ -14,8 +14,8 @@ "description": "CVE-2024-56433 - shadow-utils Default subordinate ID for local users creates risk of collision", "fork": false, "created_at": "2025-01-03T13:11:25Z", - "updated_at": "2025-01-03T13:44:45Z", - "pushed_at": "2025-01-03T13:44:42Z", + "updated_at": "2025-01-06T12:02:43Z", + "pushed_at": "2025-01-06T12:02:39Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index d928d75850..f2c4a171ac 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -2936,13 +2936,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-6769.json b/2024/CVE-2024-6769.json index c37117147a..09852dc447 100644 --- a/2024/CVE-2024-6769.json +++ b/2024/CVE-2024-6769.json @@ -14,10 +14,10 @@ "description": "Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)", "fork": false, "created_at": "2024-08-29T16:40:49Z", - "updated_at": "2025-01-02T15:53:20Z", + "updated_at": "2025-01-06T10:05:17Z", "pushed_at": "2024-09-29T21:58:19Z", - "stargazers_count": 58, - "watchers_count": 58, + "stargazers_count": 59, + "watchers_count": 59, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 58, + "watchers": 59, "score": 0, "subscribers_count": 3 } diff --git a/README.md b/README.md index 0866f8e029..3a18574044 100644 --- a/README.md +++ b/README.md @@ -2448,7 +2448,11 @@ - [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883) -### CVE-2024-12970 +### CVE-2024-12970 (2025-01-06) + +Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in TUBITAK BILGEM Pardus OS My Computer allows OS Command Injection.This issue affects Pardus OS My Computer: before 0.7.2. + + - [osmancanvural/CVE-2024-12970](https://github.com/osmancanvural/CVE-2024-12970) ### CVE-2024-12986 (2024-12-27) @@ -7166,6 +7170,7 @@ - [SafeBreach-Labs/CVE-2024-49113](https://github.com/SafeBreach-Labs/CVE-2024-49113) - [barcrange/CVE-2024-49113-Checker](https://github.com/barcrange/CVE-2024-49113-Checker) - [YoonJae-rep/CVE-2024-49113](https://github.com/YoonJae-rep/CVE-2024-49113) +- [Sachinart/CVE-2024-49113-Checker](https://github.com/Sachinart/CVE-2024-49113-Checker) ### CVE-2024-49117 (2024-12-10) @@ -7777,6 +7782,13 @@ - [RandomRobbieBF/CVE-2024-54330](https://github.com/RandomRobbieBF/CVE-2024-54330) +### CVE-2024-54369 (2024-12-16) + +Missing Authorization vulnerability in ThemeHunk Zita Site Builder allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Zita Site Builder: from n/a through 1.0.2. + + +- [RandomRobbieBF/CVE-2024-54369](https://github.com/RandomRobbieBF/CVE-2024-54369) + ### CVE-2024-54679 (2024-12-05) CyberPanel (aka Cyber Panel) before 6778ad1 does not require the FilemanagerAdmin capability for restartMySQL actions. @@ -7822,6 +7834,34 @@ - [Wi1DN00B/CVE-2024-55968](https://github.com/Wi1DN00B/CVE-2024-55968) - [null-event/CVE-2024-55968](https://github.com/null-event/CVE-2024-55968) +### CVE-2024-55972 (2024-12-16) + +Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Chris Carvache eTemplates allows SQL Injection.This issue affects eTemplates: from n/a through 0.2.1. + + +- [RandomRobbieBF/CVE-2024-55972](https://github.com/RandomRobbieBF/CVE-2024-55972) + +### CVE-2024-55976 (2024-12-16) + +Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mike Leembruggen Critical Site Intel allows SQL Injection.This issue affects Critical Site Intel: from n/a through 1.0. + + +- [RandomRobbieBF/CVE-2024-55976](https://github.com/RandomRobbieBF/CVE-2024-55976) + +### CVE-2024-55981 (2024-12-16) + +Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nabajit Roy Nabz Image Gallery allows SQL Injection.This issue affects Nabz Image Gallery: from n/a through v1.00. + + +- [RandomRobbieBF/CVE-2024-55981](https://github.com/RandomRobbieBF/CVE-2024-55981) + +### CVE-2024-55982 (2024-12-16) + +Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in richteam Share Buttons – Social Media allows Blind SQL Injection.This issue affects Share Buttons – Social Media: from n/a through 1.0.2. + + +- [RandomRobbieBF/CVE-2024-55982](https://github.com/RandomRobbieBF/CVE-2024-55982) + ### CVE-2024-55988 (2024-12-16) Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Amol Nirmala Waman Navayan CSV Export allows Blind SQL Injection.This issue affects Navayan CSV Export: from n/a through 1.0.9.