Auto Update 2024/12/21 00:31:34

This commit is contained in:
motikan2010-bot 2024-12-21 09:31:34 +09:00
parent e21dc5c7a1
commit 55cdbd4753
24 changed files with 107 additions and 75 deletions

View file

@ -14,10 +14,10 @@
"description": "Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container",
"fork": false,
"created_at": "2017-01-06T17:55:44Z",
"updated_at": "2024-12-06T23:57:25Z",
"updated_at": "2024-12-20T18:58:48Z",
"pushed_at": "2024-04-20T07:38:14Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 44,
"watchers": 45,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
"fork": false,
"created_at": "2018-01-09T13:53:57Z",
"updated_at": "2024-12-02T10:37:56Z",
"updated_at": "2024-12-20T18:58:54Z",
"pushed_at": "2020-08-22T06:15:54Z",
"stargazers_count": 170,
"watchers_count": 170,
"stargazers_count": 171,
"watchers_count": 171,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 170,
"watchers": 171,
"score": 0,
"subscribers_count": 9
},

View file

@ -83,10 +83,10 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2024-12-19T05:22:03Z",
"updated_at": "2024-12-20T22:43:48Z",
"pushed_at": "2021-01-08T10:31:22Z",
"stargazers_count": 582,
"watchers_count": 582,
"stargazers_count": 583,
"watchers_count": 583,
"has_discussions": false,
"forks_count": 173,
"allow_forking": true,
@ -105,7 +105,7 @@
],
"visibility": "public",
"forks": 173,
"watchers": 582,
"watchers": 583,
"score": 0,
"subscribers_count": 23
},

View file

@ -14,10 +14,10 @@
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
"fork": false,
"created_at": "2018-01-09T13:53:57Z",
"updated_at": "2024-12-02T10:37:56Z",
"updated_at": "2024-12-20T18:58:54Z",
"pushed_at": "2020-08-22T06:15:54Z",
"stargazers_count": 170,
"watchers_count": 170,
"stargazers_count": 171,
"watchers_count": 171,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 170,
"watchers": 171,
"score": 0,
"subscribers_count": 9
},

View file

@ -231,10 +231,10 @@
"description": "The exploit is edited to work with different text encodings and Python 3 and is compatible with CMSMS version 2.2.9 and below.",
"fork": false,
"created_at": "2023-05-29T17:59:09Z",
"updated_at": "2024-12-19T23:00:23Z",
"updated_at": "2024-12-20T19:26:42Z",
"pushed_at": "2024-06-09T12:39:47Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -243,7 +243,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -49,7 +49,7 @@
"forks": 340,
"watchers": 2013,
"score": 0,
"subscribers_count": 37
"subscribers_count": 38
},
{
"id": 234696172,

View file

@ -14,8 +14,8 @@
"description": "poc for CVE-2022-32981 under work",
"fork": false,
"created_at": "2024-12-19T21:15:39Z",
"updated_at": "2024-12-20T00:34:36Z",
"pushed_at": "2024-12-20T00:34:33Z",
"updated_at": "2024-12-20T20:37:02Z",
"pushed_at": "2024-12-20T20:36:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "Let's control Secure Boot Chain ourselves.",
"fork": false,
"created_at": "2023-12-01T07:32:18Z",
"updated_at": "2024-12-18T20:35:42Z",
"updated_at": "2024-12-20T22:49:27Z",
"pushed_at": "2024-02-20T09:05:59Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 44,
"watchers": 45,
"score": 0,
"subscribers_count": 5
}

View file

@ -113,8 +113,8 @@
"description": null,
"fork": false,
"created_at": "2024-02-16T18:20:12Z",
"updated_at": "2024-11-01T05:17:51Z",
"pushed_at": "2024-11-01T05:17:47Z",
"updated_at": "2024-12-20T21:09:11Z",
"pushed_at": "2024-12-20T21:09:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-20T11:47:04Z",
"updated_at": "2024-12-20T19:04:31Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 44,
"watchers": 45,
"score": 0,
"subscribers_count": 1
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-12-09T15:35:29Z",
"updated_at": "2024-12-20T20:01:23Z",
"pushed_at": "2024-12-02T06:29:52Z",
"stargazers_count": 264,
"watchers_count": 264,
"stargazers_count": 263,
"watchers_count": 263,
"has_discussions": false,
"forks_count": 61,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 61,
"watchers": 264,
"watchers": 263,
"score": 0,
"subscribers_count": 7
},

View file

@ -45,10 +45,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-20T11:47:04Z",
"updated_at": "2024-12-20T19:04:31Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -68,7 +68,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 44,
"watchers": 45,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "Zimbra - Remote Command Execution (CVE-2024-45519)",
"fork": false,
"created_at": "2024-10-05T00:15:18Z",
"updated_at": "2024-12-06T23:50:56Z",
"updated_at": "2024-12-20T20:40:56Z",
"pushed_at": "2024-11-05T10:10:40Z",
"stargazers_count": 114,
"watchers_count": 114,
"stargazers_count": 115,
"watchers_count": 115,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 114,
"watchers": 115,
"score": 0,
"subscribers_count": 3
},

View file

@ -91,5 +91,36 @@
"watchers": 4,
"score": 0,
"subscribers_count": 0
},
{
"id": 906416890,
"name": "CVE-2024-50379",
"full_name": "Alchemist3dot14\/CVE-2024-50379",
"owner": {
"login": "Alchemist3dot14",
"id": 63059909,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63059909?v=4",
"html_url": "https:\/\/github.com\/Alchemist3dot14",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Alchemist3dot14\/CVE-2024-50379",
"description": "CVE-2024-50379 is a critical vulnerability affecting multiple versions of Apache Tomcat, an open source web server and servlet container widely used for deploying Java-based web applications. The vulnerability arises from a Time-of-Use (TOCTOU) race condition that occurs when compiling JavaServer Pages (JSPs).",
"fork": false,
"created_at": "2024-12-20T21:30:49Z",
"updated_at": "2024-12-20T21:55:35Z",
"pushed_at": "2024-12-20T21:55:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,8 +14,8 @@
"description": "Integer Overflow in Cart Logic in SimplCommerce allows remote attackers to manipulate product quantities and total prices via crafted inputs that exploit insufficient validation of the quantity parameter.",
"fork": false,
"created_at": "2024-12-19T23:33:21Z",
"updated_at": "2024-12-20T00:29:43Z",
"pushed_at": "2024-12-20T00:29:22Z",
"updated_at": "2024-12-20T21:17:39Z",
"pushed_at": "2024-12-20T21:17:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,8 +14,8 @@
"description": "SimplCommerce is affected by a broken access control vulnerability in the review system, allowing unauthorized users to post reviews for products they have not purchased.",
"fork": false,
"created_at": "2024-12-20T00:43:18Z",
"updated_at": "2024-12-20T00:47:15Z",
"pushed_at": "2024-12-20T00:47:12Z",
"updated_at": "2024-12-20T21:18:15Z",
"pushed_at": "2024-12-20T21:18:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "TP-Link Archer AXE75 Authenticated Command Injection",
"fork": false,
"created_at": "2024-10-04T12:49:19Z",
"updated_at": "2024-12-20T07:46:46Z",
"updated_at": "2024-12-21T00:23:39Z",
"pushed_at": "2024-12-19T09:34:33Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,8 +14,8 @@
"description": "SimplCommerce is affected by a race condition vulnerability in the checkout logic, allowing multiple users to purchase more products than are in stock via simultaneous checkout requests.",
"fork": false,
"created_at": "2024-12-20T00:27:22Z",
"updated_at": "2024-12-20T00:42:44Z",
"pushed_at": "2024-12-20T00:42:40Z",
"updated_at": "2024-12-20T21:18:00Z",
"pushed_at": "2024-12-20T21:17:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -45,10 +45,10 @@
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
"fork": false,
"created_at": "2024-12-13T17:42:55Z",
"updated_at": "2024-12-20T10:05:19Z",
"updated_at": "2024-12-21T00:26:13Z",
"pushed_at": "2024-12-20T10:05:15Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 63,
"watchers": 64,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,19 +14,19 @@
"description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled",
"fork": false,
"created_at": "2024-12-20T03:34:01Z",
"updated_at": "2024-12-20T16:05:03Z",
"updated_at": "2024-12-20T21:18:42Z",
"pushed_at": "2024-12-20T04:26:44Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 10,
"forks": 4,
"watchers": 13,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": "Widget Options The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution",
"fork": false,
"created_at": "2024-12-02T19:59:31Z",
"updated_at": "2024-12-09T04:10:06Z",
"updated_at": "2024-12-20T20:39:53Z",
"pushed_at": "2024-12-02T20:00:09Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "PAN-OS auth bypass + RCE",
"fork": false,
"created_at": "2024-11-19T17:26:27Z",
"updated_at": "2024-12-06T10:25:57Z",
"updated_at": "2024-12-20T20:40:35Z",
"pushed_at": "2024-11-19T17:38:29Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 38,
"watchers": 39,
"score": 0,
"subscribers_count": 1
},

View file

@ -7090,6 +7090,7 @@
- [yiliufeng168/CVE-2024-50379-POC](https://github.com/yiliufeng168/CVE-2024-50379-POC)
- [JFOZ1010/Nuclei-Template-CVE-2024-50379](https://github.com/JFOZ1010/Nuclei-Template-CVE-2024-50379)
- [iSee857/CVE-2024-50379-PoC](https://github.com/iSee857/CVE-2024-50379-PoC)
- [Alchemist3dot14/CVE-2024-50379](https://github.com/Alchemist3dot14/CVE-2024-50379)
### CVE-2024-50395 (2024-11-22)