Auto Update 2024/11/26 00:31:42

This commit is contained in:
motikan2010-bot 2024-11-26 09:31:42 +09:00
parent 5334f00c3d
commit 52e8fdcc1c
27 changed files with 206 additions and 84 deletions

View file

@ -596,10 +596,10 @@
"description": "OpenSSH 2.3 < 7.7 - Username Enumeration",
"fork": false,
"created_at": "2020-11-29T17:36:11Z",
"updated_at": "2024-08-29T10:14:51Z",
"updated_at": "2024-11-25T22:20:11Z",
"pushed_at": "2023-09-04T20:57:42Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -608,7 +608,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 38,
"watchers": 39,
"score": 0,
"subscribers_count": 3
},

View file

@ -500,6 +500,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -90,6 +90,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,7 +28,7 @@
"forks": 16,
"watchers": 48,
"score": 0,
"subscribers_count": 3
"subscribers_count": 0
},
{
"id": 341906843,

View file

@ -1130,7 +1130,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 278562778,
@ -1192,7 +1192,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 278670349,

View file

@ -2171,7 +2171,7 @@
"description": "An All-In-One Pure Python PoC for CVE-2021-44228",
"fork": false,
"created_at": "2021-12-12T02:57:49Z",
"updated_at": "2024-10-15T07:28:52Z",
"updated_at": "2024-11-25T23:28:13Z",
"pushed_at": "2021-12-16T18:34:46Z",
"stargazers_count": 175,
"watchers_count": 175,

View file

@ -1194,10 +1194,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2024-11-25T10:16:30Z",
"updated_at": "2024-11-25T23:10:09Z",
"pushed_at": "2023-05-20T05:55:45Z",
"stargazers_count": 553,
"watchers_count": 553,
"stargazers_count": 554,
"watchers_count": 554,
"has_discussions": false,
"forks_count": 140,
"allow_forking": true,
@ -1206,7 +1206,7 @@
"topics": [],
"visibility": "public",
"forks": 140,
"watchers": 553,
"watchers": 554,
"score": 0,
"subscribers_count": 15
},

View file

@ -107,10 +107,10 @@
"description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-10-23T18:33:41Z",
"updated_at": "2024-10-22T20:23:28Z",
"updated_at": "2024-11-25T21:57:30Z",
"pushed_at": "2023-10-26T11:44:46Z",
"stargazers_count": 110,
"watchers_count": 110,
"stargazers_count": 111,
"watchers_count": 111,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 110,
"watchers": 111,
"score": 0,
"subscribers_count": 3
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 1274,
"watchers_count": 1274,
"has_discussions": false,
"forks_count": 217,
"forks_count": 218,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 217,
"forks": 218,
"watchers": 1274,
"score": 0,
"subscribers_count": 20

View file

@ -423,19 +423,19 @@
"description": "Vulnerable docker container for Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 9.1.1.1 Authentication Bypass CVE-2023-50164",
"fork": false,
"created_at": "2024-11-20T16:50:24Z",
"updated_at": "2024-11-22T09:28:11Z",
"updated_at": "2024-11-25T19:41:23Z",
"pushed_at": "2024-11-22T09:28:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "WARNING: This is a vulnerable application to test the exploit for the Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924). Run it at your own risk!",
"fork": false,
"created_at": "2024-11-18T20:37:07Z",
"updated_at": "2024-11-20T08:51:12Z",
"updated_at": "2024-11-25T19:14:25Z",
"pushed_at": "2024-11-19T12:19:36Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -63,7 +63,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
@ -113,10 +113,10 @@
"description": "Exploits Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924).",
"fork": false,
"created_at": "2024-11-19T10:07:28Z",
"updated_at": "2024-11-25T03:44:56Z",
"updated_at": "2024-11-25T19:14:18Z",
"pushed_at": "2024-11-19T12:20:16Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -134,7 +134,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 1
},
@ -189,19 +189,19 @@
"description": "Vulnerable docker container for Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 9.1.1.1 Authentication Bypass CVE-2023-50164",
"fork": false,
"created_at": "2024-11-20T16:50:24Z",
"updated_at": "2024-11-22T09:28:11Z",
"updated_at": "2024-11-25T19:41:23Z",
"pushed_at": "2024-11-22T09:28:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2024-11-25T17:27:56Z",
"updated_at": "2024-11-25T23:19:00Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 700,
"watchers_count": 700,
"stargazers_count": 701,
"watchers_count": 701,
"has_discussions": false,
"forks_count": 153,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 153,
"watchers": 700,
"watchers": 701,
"score": 0,
"subscribers_count": 10
},

View file

@ -14,8 +14,8 @@
"description": "Proof-of-concept (PoC) exploit for JSONPath-plus vulnerability",
"fork": false,
"created_at": "2024-11-13T07:56:10Z",
"updated_at": "2024-11-13T09:25:02Z",
"pushed_at": "2024-11-13T09:24:58Z",
"updated_at": "2024-11-25T23:56:28Z",
"pushed_at": "2024-11-25T23:56:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "Example exploitable scenarios for CVE-2024-22243 affecting the Spring framework (open redirect & SSRF).",
"fork": false,
"created_at": "2024-02-21T12:55:22Z",
"updated_at": "2024-11-13T15:22:43Z",
"updated_at": "2024-11-25T20:55:53Z",
"pushed_at": "2024-10-22T16:37:42Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -38,7 +38,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -112,13 +112,13 @@
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 21,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 21,
"forks": 22,
"watchers": 70,
"score": 0,
"subscribers_count": 3

View file

@ -265,10 +265,10 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
"updated_at": "2024-11-25T13:13:25Z",
"updated_at": "2024-11-26T00:08:32Z",
"pushed_at": "2024-08-27T12:22:39Z",
"stargazers_count": 626,
"watchers_count": 626,
"stargazers_count": 627,
"watchers_count": 627,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@ -277,7 +277,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 626,
"watchers": 627,
"score": 0,
"subscribers_count": 4
},

View file

@ -19,7 +19,7 @@
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,7 +30,7 @@
"poc-exploit"
],
"visibility": "public",
"forks": 14,
"forks": 15,
"watchers": 25,
"score": 0,
"subscribers_count": 1

View file

@ -553,13 +553,13 @@
"stargazers_count": 120,
"watchers_count": 120,
"has_discussions": false,
"forks_count": 30,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 30,
"forks": 31,
"watchers": 120,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575",
"fork": false,
"created_at": "2024-11-07T21:03:30Z",
"updated_at": "2024-11-25T07:58:44Z",
"updated_at": "2024-11-25T22:06:53Z",
"pushed_at": "2024-11-14T16:25:52Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 65,
"watchers": 67,
"score": 0,
"subscribers_count": 0
},

View file

@ -14,19 +14,19 @@
"description": "PoC for CVE-2024-48990",
"fork": false,
"created_at": "2024-11-20T18:41:25Z",
"updated_at": "2024-11-25T15:38:22Z",
"updated_at": "2024-11-25T22:44:40Z",
"pushed_at": "2024-11-20T18:49:33Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 69,
"watchers_count": 69,
"has_discussions": false,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 67,
"forks": 12,
"watchers": 69,
"score": 0,
"subscribers_count": 1
},
@ -138,10 +138,10 @@
"description": "Testing POC for use cases",
"fork": false,
"created_at": "2024-11-24T07:33:06Z",
"updated_at": "2024-11-25T18:16:23Z",
"updated_at": "2024-11-25T22:06:08Z",
"pushed_at": "2024-11-24T07:56:49Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false,
"created_at": "2024-11-19T08:57:18Z",
"updated_at": "2024-11-25T14:32:52Z",
"updated_at": "2024-11-25T21:48:33Z",
"pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-25T06:06:25Z",
"updated_at": "2024-11-25T07:15:58Z",
"updated_at": "2024-11-25T22:48:49Z",
"pushed_at": "2024-11-25T06:11:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

39
2024/CVE-2024-5057.json Normal file
View file

@ -0,0 +1,39 @@
[
{
"id": 894190256,
"name": "poc-CVE-2024-5057",
"full_name": "g1thubb004\/poc-CVE-2024-5057",
"owner": {
"login": "g1thubb004",
"id": 189642750,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/189642750?v=4",
"html_url": "https:\/\/github.com\/g1thubb004",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/g1thubb004\/poc-CVE-2024-5057",
"description": "poc-CVE-2024-5057",
"fork": false,
"created_at": "2024-11-25T23:10:28Z",
"updated_at": "2024-11-25T23:11:49Z",
"pushed_at": "2024-11-25T23:11:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2024-5057",
"exploit",
"poc",
"poc-cve-2024-5057"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-53375.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 867639922,
"name": "CVE-2024-53375",
"full_name": "ThottySploity\/CVE-2024-53375",
"owner": {
"login": "ThottySploity",
"id": 119318084,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119318084?v=4",
"html_url": "https:\/\/github.com\/ThottySploity",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ThottySploity\/CVE-2024-53375",
"description": "TP-Link Archer AXE75 Authenticated Command Injection",
"fork": false,
"created_at": "2024-10-04T12:49:19Z",
"updated_at": "2024-11-25T19:36:35Z",
"pushed_at": "2024-11-23T00:33:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1391,7 +1391,7 @@
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 26,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1406,7 +1406,7 @@
"rce"
],
"visibility": "public",
"forks": 26,
"forks": 27,
"watchers": 64,
"score": 0,
"subscribers_count": 1

33
2024/CVE-2024-9659.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 894111154,
"name": "CVE-2024-9659",
"full_name": "zetraxz\/CVE-2024-9659",
"owner": {
"login": "zetraxz",
"id": 186395163,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186395163?v=4",
"html_url": "https:\/\/github.com\/zetraxz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zetraxz\/CVE-2024-9659",
"description": "CVE-2024-9659: Unrestricted Upload of File with Dangerous Type (CWE-434)",
"fork": false,
"created_at": "2024-11-25T19:16:58Z",
"updated_at": "2024-11-25T19:36:11Z",
"pushed_at": "2024-11-25T19:35:06Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1115,6 +1115,13 @@
- [sinsinology/CVE-2024-5009](https://github.com/sinsinology/CVE-2024-5009)
- [th3gokul/CVE-2024-5009](https://github.com/th3gokul/CVE-2024-5009)
### CVE-2024-5057 (2024-08-29)
<code>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Easy Digital Downloads allows SQL Injection.This issue affects Easy Digital Downloads: from n/a through 3.2.12.
</code>
- [g1thubb004/poc-CVE-2024-5057](https://github.com/g1thubb004/poc-CVE-2024-5057)
### CVE-2024-5084 (2024-05-23)
<code>The Hash Form Drag &amp; Drop Form Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'file_upload_action' function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
@ -1876,6 +1883,13 @@
- [RandomRobbieBF/CVE-2024-9593](https://github.com/RandomRobbieBF/CVE-2024-9593)
- [0x4f5da2-venom/CVE-2024-9593-EXP](https://github.com/0x4f5da2-venom/CVE-2024-9593-EXP)
### CVE-2024-9659 (2024-11-23)
<code>The School Management System for Wordpress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the mj_smgt_user_avatar_image_upload() function in all versions up to, and including, 91.5.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
</code>
- [zetraxz/CVE-2024-9659](https://github.com/zetraxz/CVE-2024-9659)
### CVE-2024-9680 (2024-10-09)
<code>An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox &lt; 131.0.2, Firefox ESR &lt; 128.3.1, Firefox ESR &lt; 115.16.1, Thunderbird &lt; 131.0.1, Thunderbird &lt; 128.3.1, and Thunderbird &lt; 115.16.0.
@ -7090,6 +7104,9 @@
- [ebrasha/abdal-anydesk-remote-ip-detector](https://github.com/ebrasha/abdal-anydesk-remote-ip-detector)
### CVE-2024-53375
- [ThottySploity/CVE-2024-53375](https://github.com/ThottySploity/CVE-2024-53375)
### CVE-2024-1642470
- [Symbolexe/CVE-2024-1642470](https://github.com/Symbolexe/CVE-2024-1642470)