Auto Update 2024/12/25 18:31:27

This commit is contained in:
motikan2010-bot 2024-12-26 03:31:27 +09:00
parent 07fbf7908c
commit 348ae24698
19 changed files with 167 additions and 59 deletions

View file

@ -107,10 +107,10 @@
"description": "This python file will decrypt the configurationFile used by hikvision cameras vulnerable to CVE-2017-7921.",
"fork": false,
"created_at": "2021-01-29T16:08:35Z",
"updated_at": "2024-12-08T16:46:27Z",
"updated_at": "2024-12-25T13:08:20Z",
"pushed_at": "2021-01-29T16:22:39Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 99,
"watchers": 100,
"score": 0,
"subscribers_count": 3
},

View file

@ -51,10 +51,10 @@
"description": "Updated python3 exploit for CVE-2018-10583 (LibreOffice\/Open Office - '.odt' Information Disclosure )",
"fork": false,
"created_at": "2024-05-13T17:13:17Z",
"updated_at": "2024-09-26T08:38:12Z",
"updated_at": "2024-12-25T16:00:42Z",
"pushed_at": "2024-05-13T17:31:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -63,7 +63,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -123,10 +123,10 @@
"description": "Multi-threaded, IPv6 aware, wordlists\/single-user username enumeration via CVE-2018-15473",
"fork": false,
"created_at": "2018-10-03T10:18:04Z",
"updated_at": "2024-11-16T19:55:28Z",
"updated_at": "2024-12-25T16:16:29Z",
"pushed_at": "2024-04-29T13:17:43Z",
"stargazers_count": 104,
"watchers_count": 104,
"stargazers_count": 105,
"watchers_count": 105,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -135,7 +135,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 104,
"watchers": 105,
"score": 0,
"subscribers_count": 1
},

View file

@ -107,10 +107,10 @@
"description": null,
"fork": false,
"created_at": "2019-06-24T15:33:50Z",
"updated_at": "2024-12-17T08:25:38Z",
"updated_at": "2024-12-25T14:32:19Z",
"pushed_at": "2020-11-09T07:33:12Z",
"stargazers_count": 287,
"watchers_count": 287,
"stargazers_count": 288,
"watchers_count": 288,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 55,
"watchers": 287,
"watchers": 288,
"score": 0,
"subscribers_count": 8
},

View file

@ -93,10 +93,10 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
"updated_at": "2024-12-25T11:43:15Z",
"updated_at": "2024-12-25T16:01:08Z",
"pushed_at": "2023-06-08T04:01:33Z",
"stargazers_count": 488,
"watchers_count": 488,
"stargazers_count": 490,
"watchers_count": 490,
"has_discussions": false,
"forks_count": 148,
"allow_forking": true,
@ -107,7 +107,7 @@
],
"visibility": "public",
"forks": 148,
"watchers": 488,
"watchers": 490,
"score": 0,
"subscribers_count": 8
},

View file

@ -107,10 +107,10 @@
"description": "Verifed Proof of Concept on CVE-2022-24086",
"fork": false,
"created_at": "2022-05-19T01:15:57Z",
"updated_at": "2024-08-12T20:23:22Z",
"updated_at": "2024-12-25T13:30:15Z",
"pushed_at": "2022-08-06T08:33:51Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 2
},

View file

@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2024-05-14T11:22:35Z",
"updated_at": "2024-11-28T02:23:56Z",
"updated_at": "2024-12-25T13:37:08Z",
"pushed_at": "2024-05-14T13:37:00Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 37,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 37,
"forks": 36,
"watchers": 47,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-12-25T11:49:55Z",
"updated_at": "2024-12-25T17:01:10Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2310,
"watchers_count": 2310,
"stargazers_count": 2311,
"watchers_count": 2311,
"has_discussions": false,
"forks_count": 299,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 299,
"watchers": 2310,
"watchers": 2311,
"score": 0,
"subscribers_count": 26
},

View file

@ -60,5 +60,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 908236253,
"name": "Exploiting-RCE-Cyber_Project_CVE-2024-1212",
"full_name": "Rehan07-Human\/Exploiting-RCE-Cyber_Project_CVE-2024-1212",
"owner": {
"login": "Rehan07-Human",
"id": 192799473,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192799473?v=4",
"html_url": "https:\/\/github.com\/Rehan07-Human",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Rehan07-Human\/Exploiting-RCE-Cyber_Project_CVE-2024-1212",
"description": "Demonstrating the exploitation of the Remote Code Execution (RCE) vulnerability in Kemp LoadMaster (CVE-2024-1212). This project covers reconnaissance, vulnerability scanning using Nuclei, and exploitation processes, while also highlighting mitigation strategies to secure affected systems",
"fork": false,
"created_at": "2024-12-25T14:33:25Z",
"updated_at": "2024-12-25T14:39:43Z",
"pushed_at": "2024-12-25T14:39:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-20137.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 908244562,
"name": "CVE-2024-20137",
"full_name": "takistmr\/CVE-2024-20137",
"owner": {
"login": "takistmr",
"id": 30937876,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30937876?v=4",
"html_url": "https:\/\/github.com\/takistmr",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/takistmr\/CVE-2024-20137",
"description": "Python code for expoiting of vulnerability in wlan driver of MediaTek SOCs MT6890, MT7622, MT7915, MT7916, MT7981, MT7986",
"fork": false,
"created_at": "2024-12-25T15:01:38Z",
"updated_at": "2024-12-25T16:57:37Z",
"pushed_at": "2024-12-25T16:57:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -373,5 +373,36 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 908206696,
"name": "CVE-2024-23334-PoC",
"full_name": "BestDevOfc\/CVE-2024-23334-PoC",
"owner": {
"login": "BestDevOfc",
"id": 164618346,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164618346?v=4",
"html_url": "https:\/\/github.com\/BestDevOfc",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BestDevOfc\/CVE-2024-23334-PoC",
"description": "A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1",
"fork": false,
"created_at": "2024-12-25T12:50:59Z",
"updated_at": "2024-12-25T12:51:14Z",
"pushed_at": "2024-12-25T12:51:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "This repository automates the process of exploiting CVE-2024-25641 on Cacti 1.2.26",
"fork": false,
"created_at": "2024-08-26T13:34:35Z",
"updated_at": "2024-12-11T23:38:31Z",
"updated_at": "2024-12-25T14:04:12Z",
"pushed_at": "2024-09-05T11:52:22Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -11,10 +11,10 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Adamkadaban\/CVE-2024-30085",
"description": "CVE-2024-30085 (Alex Birnberg)",
"description": "CVE-2024-30085",
"fork": false,
"created_at": "2024-12-25T06:03:45Z",
"updated_at": "2024-12-25T06:05:49Z",
"updated_at": "2024-12-25T12:44:05Z",
"pushed_at": "2024-12-25T06:09:37Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -200,19 +200,19 @@
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
"fork": false,
"created_at": "2024-12-23T07:20:47Z",
"updated_at": "2024-12-25T10:03:11Z",
"updated_at": "2024-12-25T17:35:51Z",
"pushed_at": "2024-12-23T07:30:27Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 9,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 32,
"forks": 11,
"watchers": 33,
"score": 0,
"subscribers_count": 2
},

View file

@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2024-08-29T11:58:25Z",
"updated_at": "2024-12-11T12:50:10Z",
"updated_at": "2024-12-25T13:17:00Z",
"pushed_at": "2024-08-30T01:15:43Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 76,
"watchers": 77,
"score": 0,
"subscribers_count": 2
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 5,
"score": 0,
"subscribers_count": 1

View file

@ -14,19 +14,19 @@
"description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled",
"fork": false,
"created_at": "2024-12-20T03:34:01Z",
"updated_at": "2024-12-25T01:44:42Z",
"updated_at": "2024-12-25T18:13:04Z",
"pushed_at": "2024-12-23T12:51:54Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 27,
"forks": 8,
"watchers": 28,
"score": 0,
"subscribers_count": 1
},

View file

@ -356,6 +356,7 @@
- [Chocapikk/CVE-2024-1212](https://github.com/Chocapikk/CVE-2024-1212)
- [nak000/CVE-2024-1212](https://github.com/nak000/CVE-2024-1212)
- [Rehan07-Human/Exploiting-RCE-Cyber_Project_CVE-2024-1212](https://github.com/Rehan07-Human/Exploiting-RCE-Cyber_Project_CVE-2024-1212)
### CVE-2024-1269 (2024-02-07)
@ -2415,6 +2416,13 @@
- [mellow-hype/cve-2024-20017](https://github.com/mellow-hype/cve-2024-20017)
### CVE-2024-20137 (2024-12-02)
<code>In wlan driver, there is a possible client disconnection due to improper handling of exceptional conditions. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00384543; Issue ID: MSV-1727.
</code>
- [takistmr/CVE-2024-20137](https://github.com/takistmr/CVE-2024-20137)
### CVE-2024-20291 (2024-02-28)
<code>A vulnerability in the access control list (ACL) programming for port channel subinterfaces of Cisco Nexus 3000 and 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, remote attacker to send traffic that should be blocked through an affected device.\r\n\r This vulnerability is due to incorrect hardware programming that occurs when configuration changes are made to port channel member ports. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access network resources that should be protected by an ACL that was applied on port channel subinterfaces.
@ -3075,6 +3083,7 @@
- [Arc4he/CVE-2024-23334-PoC](https://github.com/Arc4he/CVE-2024-23334-PoC)
- [TheRedP4nther/LFI-aiohttp-CVE-2024-23334-PoC](https://github.com/TheRedP4nther/LFI-aiohttp-CVE-2024-23334-PoC)
- [Betan423/CVE-2024-23334-PoC](https://github.com/Betan423/CVE-2024-23334-PoC)
- [BestDevOfc/CVE-2024-23334-PoC](https://github.com/BestDevOfc/CVE-2024-23334-PoC)
### CVE-2024-23339 (2024-01-22)
@ -7731,7 +7740,11 @@
- [griisemine/CVE-2024-56331](https://github.com/griisemine/CVE-2024-56331)
### CVE-2024-56431
### CVE-2024-56431 (2024-12-25)
<code>oc_huff_tree_unpack in huffdec.c in libtheora in Theora through 1.0 7180717 has an invalid negative left shift.
</code>
- [UnionTech-Software/libtheora-CVE-2024-56431-PoC](https://github.com/UnionTech-Software/libtheora-CVE-2024-56431-PoC)
### CVE-2024-1642470