Auto Update 2025/01/01 00:31:29

This commit is contained in:
motikan2010-bot 2025-01-01 09:31:29 +09:00
parent 2cea8ef464
commit 3fbb62dc6a
16 changed files with 81 additions and 45 deletions

View file

@ -417,12 +417,12 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-12-30T18:29:52Z",
"updated_at": "2024-12-31T23:18:30Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 167,
"watchers_count": 167,
"stargazers_count": 168,
"watchers_count": 168,
"has_discussions": false,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -436,8 +436,8 @@
"tools"
],
"visibility": "public",
"forks": 14,
"watchers": 167,
"forks": 15,
"watchers": 168,
"score": 0,
"subscribers_count": 2
},

View file

@ -540,7 +540,7 @@
"forks": 3,
"watchers": 3,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 235000073,
@ -602,7 +602,7 @@
"forks": 16,
"watchers": 77,
"score": 0,
"subscribers_count": 6
"subscribers_count": 7
},
{
"id": 235858699,

View file

@ -35,7 +35,7 @@
"forks": 40,
"watchers": 120,
"score": 0,
"subscribers_count": 6
"subscribers_count": 7
},
{
"id": 473326116,

View file

@ -59,6 +59,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
}
]

View file

@ -981,12 +981,12 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-12-30T18:29:52Z",
"updated_at": "2024-12-31T23:18:30Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 167,
"watchers_count": 167,
"stargazers_count": 168,
"watchers_count": 168,
"has_discussions": false,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1000,8 +1000,8 @@
"tools"
],
"visibility": "public",
"forks": 14,
"watchers": 167,
"forks": 15,
"watchers": 168,
"score": 0,
"subscribers_count": 2
}

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -19,13 +19,13 @@
"stargazers_count": 1348,
"watchers_count": 1348,
"has_discussions": false,
"forks_count": 322,
"forks_count": 323,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 322,
"forks": 323,
"watchers": 1348,
"score": 0,
"subscribers_count": 27

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2023-01-10T15:59:26Z",
"updated_at": "2024-12-17T20:19:27Z",
"updated_at": "2024-12-31T20:57:04Z",
"pushed_at": "2023-01-13T09:01:20Z",
"stargazers_count": 307,
"watchers_count": 307,
"stargazers_count": 308,
"watchers_count": 308,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 307,
"watchers": 308,
"score": 0,
"subscribers_count": 5
},

View file

@ -14,10 +14,10 @@
"description": "It was discovered two reflected cross site scripting (XSS) vulnerabilities in the Squidex open source headless CMS software. The Reflected Cross Site Scripting vulnerabilities affect all versions of Squidex prior to 7.4.0 and affect both authenticated and unauthenticated victim users.",
"fork": false,
"created_at": "2024-12-23T13:10:47Z",
"updated_at": "2024-12-24T15:44:07Z",
"updated_at": "2024-12-31T21:12:30Z",
"pushed_at": "2024-12-23T13:22:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -81,13 +81,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -111,10 +111,10 @@
"description": "The script in this repository only checks whether the vulnerabilities specified in the Ivanti Connect Secure product exist.",
"fork": false,
"created_at": "2024-01-18T13:25:46Z",
"updated_at": "2024-04-30T02:04:11Z",
"updated_at": "2024-12-31T18:42:04Z",
"pushed_at": "2024-03-23T14:52:22Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -123,7 +123,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 26,
"score": 0,
"subscribers_count": 1

View file

@ -107,10 +107,10 @@
"description": "The script in this repository only checks whether the vulnerabilities specified in the Ivanti Connect Secure product exist.",
"fork": false,
"created_at": "2024-01-18T13:25:46Z",
"updated_at": "2024-04-30T02:04:11Z",
"updated_at": "2024-12-31T18:42:04Z",
"pushed_at": "2024-03-23T14:52:22Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

33
2024/CVE-2024-51442.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 910603659,
"name": "CVE-2024-51442",
"full_name": "mselbrede\/CVE-2024-51442",
"owner": {
"login": "mselbrede",
"id": 43323139,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43323139?v=4",
"html_url": "https:\/\/github.com\/mselbrede",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mselbrede\/CVE-2024-51442",
"description": "CVE-2024-51442 write up and example config file",
"fork": false,
"created_at": "2024-12-31T19:27:36Z",
"updated_at": "2024-12-31T19:33:28Z",
"pushed_at": "2024-12-31T19:33:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,19 +14,19 @@
"description": null,
"fork": false,
"created_at": "2024-12-30T01:07:48Z",
"updated_at": "2024-12-31T10:15:57Z",
"updated_at": "2024-12-31T20:49:57Z",
"pushed_at": "2024-12-30T01:08:00Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -7515,6 +7515,9 @@
### CVE-2024-51435
- [bevennyamande/CVE-2024-51435](https://github.com/bevennyamande/CVE-2024-51435)
### CVE-2024-51442
- [mselbrede/CVE-2024-51442](https://github.com/mselbrede/CVE-2024-51442)
### CVE-2024-51567 (2024-10-29)
<code>upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.