Auto Update 2024/12/25 06:31:34

This commit is contained in:
motikan2010-bot 2024-12-25 15:31:34 +09:00
parent 6f5baae70c
commit 30a8fe023e
38 changed files with 361 additions and 109 deletions

View file

@ -45,10 +45,10 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2024-12-04T06:45:11Z",
"updated_at": "2024-12-25T00:21:28Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 339,
"watchers_count": 339,
"stargazers_count": 340,
"watchers_count": 340,
"has_discussions": false,
"forks_count": 109,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 109,
"watchers": 339,
"watchers": 340,
"score": 0,
"subscribers_count": 48
}

View file

@ -45,10 +45,10 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2024-12-04T06:45:11Z",
"updated_at": "2024-12-25T00:21:28Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 339,
"watchers_count": 339,
"stargazers_count": 340,
"watchers_count": 340,
"has_discussions": false,
"forks_count": 109,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 109,
"watchers": 339,
"watchers": 340,
"score": 0,
"subscribers_count": 48
}

View file

@ -812,13 +812,13 @@
"stargazers_count": 131,
"watchers_count": 131,
"has_discussions": false,
"forks_count": 38,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 38,
"forks": 39,
"watchers": 131,
"score": 0,
"subscribers_count": 1

View file

@ -19,13 +19,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2

View file

@ -138,8 +138,8 @@
"description": "Blueimp's jQuery File Upload",
"fork": false,
"created_at": "2024-12-24T09:26:19Z",
"updated_at": "2024-12-24T09:27:13Z",
"pushed_at": "2024-12-24T09:27:10Z",
"updated_at": "2024-12-25T03:01:56Z",
"pushed_at": "2024-12-25T03:01:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -180,13 +180,13 @@
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 22,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 22,
"forks": 23,
"watchers": 36,
"score": 0,
"subscribers_count": 4

View file

@ -848,10 +848,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-22T12:19:10Z",
"updated_at": "2024-12-25T02:14:55Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1347,
"watchers_count": 1347,
"stargazers_count": 1348,
"watchers_count": 1348,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -867,7 +867,7 @@
],
"visibility": "public",
"forks": 166,
"watchers": 1347,
"watchers": 1348,
"score": 0,
"subscribers_count": 15
}

View file

@ -45,10 +45,10 @@
"description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017",
"fork": false,
"created_at": "2022-06-30T04:39:58Z",
"updated_at": "2024-12-14T07:21:02Z",
"updated_at": "2024-12-25T00:20:37Z",
"pushed_at": "2023-11-12T16:29:03Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -60,7 +60,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 99,
"watchers": 100,
"score": 0,
"subscribers_count": 3
},

View file

@ -142,10 +142,10 @@
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkits pkexec (CVE-2021-4034)",
"fork": false,
"created_at": "2022-01-26T00:56:36Z",
"updated_at": "2024-12-23T15:44:09Z",
"updated_at": "2024-12-25T02:37:35Z",
"pushed_at": "2023-05-04T19:24:39Z",
"stargazers_count": 1061,
"watchers_count": 1061,
"stargazers_count": 1062,
"watchers_count": 1062,
"has_discussions": false,
"forks_count": 306,
"allow_forking": true,
@ -158,7 +158,7 @@
],
"visibility": "public",
"forks": 306,
"watchers": 1061,
"watchers": 1062,
"score": 0,
"subscribers_count": 15
},

View file

@ -50,10 +50,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2024-12-24T14:00:24Z",
"updated_at": "2024-12-25T04:43:07Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 816,
"watchers_count": 816,
"stargazers_count": 818,
"watchers_count": 818,
"has_discussions": false,
"forks_count": 124,
"allow_forking": true,
@ -62,7 +62,7 @@
"topics": [],
"visibility": "public",
"forks": 124,
"watchers": 816,
"watchers": 818,
"score": 0,
"subscribers_count": 13
},

View file

@ -138,10 +138,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Exploiter",
"fork": false,
"created_at": "2022-12-22T06:39:07Z",
"updated_at": "2024-10-30T14:43:37Z",
"updated_at": "2024-12-25T03:08:42Z",
"pushed_at": "2023-01-12T09:05:52Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 1
}

View file

@ -121,7 +121,7 @@
"forks": 219,
"watchers": 1091,
"score": 0,
"subscribers_count": 17
"subscribers_count": 18
},
{
"id": 467257098,

View file

@ -14,10 +14,10 @@
"description": "win32k LPE ",
"fork": false,
"created_at": "2022-01-27T03:44:10Z",
"updated_at": "2024-12-22T04:25:04Z",
"updated_at": "2024-12-25T00:25:48Z",
"pushed_at": "2022-01-27T04:18:18Z",
"stargazers_count": 459,
"watchers_count": 459,
"stargazers_count": 460,
"watchers_count": 460,
"has_discussions": false,
"forks_count": 134,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 134,
"watchers": 459,
"watchers": 460,
"score": 0,
"subscribers_count": 14
},

View file

@ -36,7 +36,7 @@
"forks": 61,
"watchers": 317,
"score": 0,
"subscribers_count": 12
"subscribers_count": 11
},
{
"id": 526405651,

View file

@ -792,10 +792,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-22T12:19:10Z",
"updated_at": "2024-12-25T02:14:55Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1347,
"watchers_count": 1347,
"stargazers_count": 1348,
"watchers_count": 1348,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -811,7 +811,7 @@
],
"visibility": "public",
"forks": 166,
"watchers": 1347,
"watchers": 1348,
"score": 0,
"subscribers_count": 15
}

View file

@ -34,6 +34,6 @@
"forks": 2,
"watchers": 10,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
}
]

View file

@ -107,10 +107,10 @@
"description": "检测域内常见一把梭漏洞包括NoPac、ZeroLogon、CVE-2022-26923、PrintNightMare",
"fork": false,
"created_at": "2023-10-17T06:29:44Z",
"updated_at": "2024-12-03T11:09:01Z",
"updated_at": "2024-12-25T03:01:23Z",
"pushed_at": "2023-10-23T04:47:11Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 40,
"watchers": 41,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM",
"fork": false,
"created_at": "2022-08-17T16:45:13Z",
"updated_at": "2024-11-09T14:36:35Z",
"updated_at": "2024-12-25T04:10:24Z",
"pushed_at": "2022-12-24T10:29:08Z",
"stargazers_count": 162,
"watchers_count": 162,
"stargazers_count": 163,
"watchers_count": 163,
"has_discussions": true,
"forks_count": 26,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 26,
"watchers": 162,
"watchers": 163,
"score": 0,
"subscribers_count": 6
}

View file

@ -98,7 +98,7 @@
"forks": 36,
"watchers": 178,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
},
{
"id": 613567366,

View file

@ -28,7 +28,7 @@
"forks": 21,
"watchers": 92,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 743432242,

View file

@ -14,10 +14,10 @@
"description": "A vulnerable driver exploited by me (BYOVD) that is capable of terminating several EDRs and antivirus software in the market, rendering them ineffective, working for both x32 and x64(CVE-2023-44976).",
"fork": false,
"created_at": "2023-10-01T18:24:38Z",
"updated_at": "2024-10-31T12:22:17Z",
"updated_at": "2024-12-25T02:05:30Z",
"pushed_at": "2024-07-06T23:35:51Z",
"stargazers_count": 89,
"watchers_count": 89,
"stargazers_count": 90,
"watchers_count": 90,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 89,
"watchers": 90,
"score": 0,
"subscribers_count": 2
}

33
2024/CVE-2024-0683.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 908042260,
"name": "CVE-2024-0683",
"full_name": "3474458191\/CVE-2024-0683",
"owner": {
"login": "3474458191",
"id": 187000025,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/187000025?v=4",
"html_url": "https:\/\/github.com\/3474458191",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/3474458191\/CVE-2024-0683",
"description": "测试",
"fork": false,
"created_at": "2024-12-25T00:48:18Z",
"updated_at": "2024-12-25T00:48:41Z",
"pushed_at": "2024-12-25T00:48:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -45,10 +45,10 @@
"description": "PoC and Detection for CVE-2024-21626",
"fork": false,
"created_at": "2024-02-01T15:28:37Z",
"updated_at": "2024-11-21T08:57:55Z",
"updated_at": "2024-12-25T00:50:30Z",
"pushed_at": "2024-02-06T16:09:05Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 70,
"watchers": 71,
"score": 0,
"subscribers_count": 3
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 21,
"score": 0,
"subscribers_count": 1

33
2024/CVE-2024-30085.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 908098736,
"name": "CVE-2024-30085",
"full_name": "Adamkadaban\/CVE-2024-30085",
"owner": {
"login": "Adamkadaban",
"id": 34610663,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34610663?v=4",
"html_url": "https:\/\/github.com\/Adamkadaban",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Adamkadaban\/CVE-2024-30085",
"description": "CVE-2024-30085 (Alex Birnberg)",
"fork": false,
"created_at": "2024-12-25T06:03:45Z",
"updated_at": "2024-12-25T06:05:49Z",
"pushed_at": "2024-12-25T06:09:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -117,8 +117,8 @@
"description": "CVE-2024-32113 PoC",
"fork": false,
"created_at": "2024-12-24T09:16:23Z",
"updated_at": "2024-12-24T09:19:57Z",
"pushed_at": "2024-12-24T09:19:54Z",
"updated_at": "2024-12-25T03:04:01Z",
"pushed_at": "2024-12-25T03:03:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,19 +14,19 @@
"description": null,
"fork": false,
"created_at": "2024-05-14T18:48:41Z",
"updated_at": "2024-12-01T14:52:57Z",
"updated_at": "2024-12-25T03:31:20Z",
"pushed_at": "2024-09-27T10:46:14Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 10,
"forks": 5,
"watchers": 11,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-08-20T12:41:57Z",
"updated_at": "2024-11-28T16:04:55Z",
"updated_at": "2024-12-25T03:23:30Z",
"pushed_at": "2024-08-20T15:36:45Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation \/ Arbitrary Code Execution Vulnerability",
"fork": false,
"created_at": "2024-08-24T08:51:08Z",
"updated_at": "2024-12-20T05:53:09Z",
"updated_at": "2024-12-25T03:22:50Z",
"pushed_at": "2024-11-05T02:57:25Z",
"stargazers_count": 181,
"watchers_count": 181,
"stargazers_count": 182,
"watchers_count": 182,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 181,
"watchers": 182,
"score": 0,
"subscribers_count": 8
}

View file

@ -138,10 +138,10 @@
"description": "Testing POC for use cases",
"fork": false,
"created_at": "2024-11-24T07:33:06Z",
"updated_at": "2024-12-19T12:14:05Z",
"updated_at": "2024-12-25T00:47:09Z",
"pushed_at": "2024-11-24T07:56:49Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},

View file

@ -29,5 +29,36 @@
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
{
"id": 908053971,
"name": "CVE-2024-49112-PoC",
"full_name": "BOl1o\/CVE-2024-49112-PoC",
"owner": {
"login": "BOl1o",
"id": 192742679,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192742679?v=4",
"html_url": "https:\/\/github.com\/BOl1o",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BOl1o\/CVE-2024-49112-PoC",
"description": "CVE-2024-49112 Windows LDAP RCE PoC and Metasploit Module",
"fork": false,
"created_at": "2024-12-25T02:06:53Z",
"updated_at": "2024-12-25T02:08:53Z",
"pushed_at": "2024-12-25T02:08:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1,4 +1,35 @@
[
{
"id": 905424548,
"name": "CVE-2024-50379-POC",
"full_name": "v3153\/CVE-2024-50379-POC",
"owner": {
"login": "v3153",
"id": 93032617,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93032617?v=4",
"html_url": "https:\/\/github.com\/v3153",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/v3153\/CVE-2024-50379-POC",
"description": null,
"fork": false,
"created_at": "2024-12-18T19:53:46Z",
"updated_at": "2024-12-25T05:08:39Z",
"pushed_at": "2024-12-25T05:08:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 905529726,
"name": "CVE-2024-50379-POC",
@ -169,19 +200,19 @@
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
"fork": false,
"created_at": "2024-12-23T07:20:47Z",
"updated_at": "2024-12-25T00:30:07Z",
"updated_at": "2024-12-25T03:57:03Z",
"pushed_at": "2024-12-23T07:30:27Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 22,
"forks": 9,
"watchers": 27,
"score": 0,
"subscribers_count": 2
},
@ -215,5 +246,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 908059795,
"name": "CVE-2024-50379-exp",
"full_name": "lizhianyuguangming\/CVE-2024-50379-exp",
"owner": {
"login": "lizhianyuguangming",
"id": 81677104,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81677104?v=4",
"html_url": "https:\/\/github.com\/lizhianyuguangming",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lizhianyuguangming\/CVE-2024-50379-exp",
"description": "CVE-2024-50379-exp",
"fork": false,
"created_at": "2024-12-25T02:41:31Z",
"updated_at": "2024-12-25T02:43:51Z",
"pushed_at": "2024-12-25T02:43:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "s2-067(CVE-2024-53677)",
"fork": false,
"created_at": "2024-12-12T08:30:14Z",
"updated_at": "2024-12-23T09:55:27Z",
"updated_at": "2024-12-25T05:40:04Z",
"pushed_at": "2024-12-17T10:37:17Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled",
"fork": false,
"created_at": "2024-12-20T03:34:01Z",
"updated_at": "2024-12-23T14:17:05Z",
"updated_at": "2024-12-25T01:44:42Z",
"pushed_at": "2024-12-23T12:51:54Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 1
},
@ -45,10 +45,10 @@
"description": "CVE-2024-56145 SSTI to RCE - twig templates ",
"fork": false,
"created_at": "2024-12-22T11:53:04Z",
"updated_at": "2024-12-22T15:02:11Z",
"updated_at": "2024-12-25T01:44:47Z",
"pushed_at": "2024-12-22T15:02:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

33
2024/CVE-2024-56431.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 908074157,
"name": "libtheora-CVE-2024-56431-PoC",
"full_name": "UnionTech-Software\/libtheora-CVE-2024-56431-PoC",
"owner": {
"login": "UnionTech-Software",
"id": 190581312,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/190581312?v=4",
"html_url": "https:\/\/github.com\/UnionTech-Software",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/UnionTech-Software\/libtheora-CVE-2024-56431-PoC",
"description": null,
"fork": false,
"created_at": "2024-12-25T03:58:50Z",
"updated_at": "2024-12-25T03:59:40Z",
"pushed_at": "2024-12-25T03:59:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Proof-of-Concept for CVE-2024-8353",
"fork": false,
"created_at": "2024-09-30T17:33:59Z",
"updated_at": "2024-10-29T13:40:41Z",
"updated_at": "2024-12-25T02:42:34Z",
"pushed_at": "2024-10-01T00:04:52Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

33
2024/CVE-2024-9047.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 908089020,
"name": "CVE-2024-9047-PoC",
"full_name": "iSee857\/CVE-2024-9047-PoC",
"owner": {
"login": "iSee857",
"id": 73977770,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73977770?v=4",
"html_url": "https:\/\/github.com\/iSee857",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/iSee857\/CVE-2024-9047-PoC",
"description": "WordPress File Upload插件任意文件读取漏洞CVE-2024-9047批量检测脚本",
"fork": false,
"created_at": "2024-12-25T05:19:17Z",
"updated_at": "2024-12-25T05:28:58Z",
"pushed_at": "2024-12-25T05:28:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -228,6 +228,13 @@
- [RandomRobbieBF/CVE-2024-0679](https://github.com/RandomRobbieBF/CVE-2024-0679)
### CVE-2024-0683 (2024-03-13)
<code>The Bulgarisation for WooCommerce plugin for WordPress is vulnerable to unauthorized access due to missing capability checks on several functions in all versions up to, and including, 3.0.14. This makes it possible for unauthenticated and authenticated attackers, with subscriber-level access and above, to generate and delete labels.
</code>
- [3474458191/CVE-2024-0683](https://github.com/3474458191/CVE-2024-0683)
### CVE-2024-0684 (2024-02-06)
<code>A flaw was found in the GNU coreutils &quot;split&quot; program. A heap overflow with user-controlled data of multiple hundred bytes in length could occur in the line_bytes_split() function, potentially leading to an application crash and denial of service.
@ -1800,6 +1807,13 @@
- [EQSTLab/CVE-2024-9014](https://github.com/EQSTLab/CVE-2024-9014)
### CVE-2024-9047 (2024-10-12)
<code>The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier.
</code>
- [iSee857/CVE-2024-9047-PoC](https://github.com/iSee857/CVE-2024-9047-PoC)
### CVE-2024-9061 (2024-10-16)
<code>The The WP Popup Builder Popup Forms and Marketing Lead Generation plugin for WordPress is vulnerable to arbitrary shortcode execution via the wp_ajax_nopriv_shortcode_Api_Add AJAX action in all versions up to, and including, 1.3.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. NOTE: This vulnerability was partially fixed in version 1.3.5 with a nonce check, which effectively prevented access to the affected function. However, version 1.3.6 incorporates the correct authorization check to prevent unauthorized access.
@ -4477,6 +4491,13 @@
- [absholi7ly/Microsoft-Edge-Information-Disclosure](https://github.com/absholi7ly/Microsoft-Edge-Information-Disclosure)
### CVE-2024-30085 (2024-06-11)
<code>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
</code>
- [Adamkadaban/CVE-2024-30085](https://github.com/Adamkadaban/CVE-2024-30085)
### CVE-2024-30088 (2024-06-11)
<code>Windows Kernel Elevation of Privilege Vulnerability
@ -7054,6 +7075,7 @@
</code>
- [tnkr/poc_monitor](https://github.com/tnkr/poc_monitor)
- [BOl1o/CVE-2024-49112-PoC](https://github.com/BOl1o/CVE-2024-49112-PoC)
### CVE-2024-49117 (2024-12-10)
@ -7130,6 +7152,7 @@
<code>Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration).\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nUsers are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.
</code>
- [v3153/CVE-2024-50379-POC](https://github.com/v3153/CVE-2024-50379-POC)
- [yiliufeng168/CVE-2024-50379-POC](https://github.com/yiliufeng168/CVE-2024-50379-POC)
- [JFOZ1010/Nuclei-Template-CVE-2024-50379](https://github.com/JFOZ1010/Nuclei-Template-CVE-2024-50379)
- [iSee857/CVE-2024-50379-PoC](https://github.com/iSee857/CVE-2024-50379-PoC)
@ -7137,6 +7160,7 @@
- [ph0ebus/Tomcat-CVE-2024-50379-Poc](https://github.com/ph0ebus/Tomcat-CVE-2024-50379-Poc)
- [SleepingBag945/CVE-2024-50379](https://github.com/SleepingBag945/CVE-2024-50379)
- [dear-cell/CVE-2024-50379](https://github.com/dear-cell/CVE-2024-50379)
- [lizhianyuguangming/CVE-2024-50379-exp](https://github.com/lizhianyuguangming/CVE-2024-50379-exp)
### CVE-2024-50395 (2024-11-22)
@ -7707,6 +7731,9 @@
- [griisemine/CVE-2024-56331](https://github.com/griisemine/CVE-2024-56331)
### CVE-2024-56431
- [UnionTech-Software/libtheora-CVE-2024-56431-PoC](https://github.com/UnionTech-Software/libtheora-CVE-2024-56431-PoC)
### CVE-2024-1642470
- [Symbolexe/CVE-2024-1642470](https://github.com/Symbolexe/CVE-2024-1642470)