Auto Update 2024/12/23 06:31:46

This commit is contained in:
motikan2010-bot 2024-12-23 15:31:46 +09:00
parent db783d7640
commit 6e889c086a
31 changed files with 111 additions and 151 deletions

View file

@ -102,13 +102,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 0

View file

@ -46,7 +46,7 @@
"fork": false,
"created_at": "2023-03-30T06:39:25Z",
"updated_at": "2023-11-15T05:13:25Z",
"pushed_at": "2024-12-16T04:07:57Z",
"pushed_at": "2024-12-23T03:21:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "shiro-cve-2020-17523 漏洞的两种绕过姿势分析 以及配套的漏洞环境",
"fork": false,
"created_at": "2021-02-03T08:14:03Z",
"updated_at": "2024-11-15T22:58:27Z",
"updated_at": "2024-12-23T02:06:11Z",
"pushed_at": "2021-02-07T09:42:36Z",
"stargazers_count": 114,
"watchers_count": 114,
"stargazers_count": 115,
"watchers_count": 115,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 114,
"watchers": 115,
"score": 0,
"subscribers_count": 3
}

View file

@ -14,10 +14,10 @@
"description": "Simple CVE-2021-20294 poc",
"fork": false,
"created_at": "2023-01-21T16:15:21Z",
"updated_at": "2024-08-03T22:39:37Z",
"updated_at": "2024-12-23T03:49:31Z",
"pushed_at": "2023-01-21T22:37:16Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "Laravel debug rce",
"fork": false,
"created_at": "2021-01-22T05:12:21Z",
"updated_at": "2024-12-04T21:47:14Z",
"updated_at": "2024-12-23T06:15:54Z",
"pushed_at": "2021-01-24T05:28:07Z",
"stargazers_count": 126,
"watchers_count": 126,
"stargazers_count": 127,
"watchers_count": 127,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 126,
"watchers": 127,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": "vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.",
"fork": false,
"created_at": "2021-05-04T17:15:58Z",
"updated_at": "2024-09-24T07:23:22Z",
"updated_at": "2024-12-23T02:02:34Z",
"pushed_at": "2021-05-10T20:42:33Z",
"stargazers_count": 89,
"watchers_count": 89,
"stargazers_count": 90,
"watchers_count": 90,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 89,
"watchers": 90,
"score": 0,
"subscribers_count": 5
}

View file

@ -14,19 +14,19 @@
"description": "PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)",
"fork": false,
"created_at": "2021-10-12T19:14:29Z",
"updated_at": "2024-10-15T07:32:20Z",
"updated_at": "2024-12-23T05:08:05Z",
"pushed_at": "2021-10-14T19:54:12Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 18,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 71,
"forks": 17,
"watchers": 72,
"score": 0,
"subscribers_count": 4
}

View file

@ -967,12 +967,12 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2024-12-20T18:15:39Z",
"updated_at": "2024-12-23T05:06:46Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 1092,
"watchers_count": 1092,
"stargazers_count": 1093,
"watchers_count": 1093,
"has_discussions": false,
"forks_count": 190,
"forks_count": 191,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -980,8 +980,8 @@
"cve-2021-4034"
],
"visibility": "public",
"forks": 190,
"watchers": 1092,
"forks": 191,
"watchers": 1093,
"score": 0,
"subscribers_count": 13
},

View file

@ -14,12 +14,12 @@
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2021-10-16T16:17:44Z",
"updated_at": "2024-11-29T16:51:36Z",
"updated_at": "2024-12-23T05:05:29Z",
"pushed_at": "2021-11-11T17:09:56Z",
"stargazers_count": 463,
"watchers_count": 463,
"stargazers_count": 464,
"watchers_count": 464,
"has_discussions": false,
"forks_count": 92,
"forks_count": 93,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -27,8 +27,8 @@
"cve-2021-40449"
],
"visibility": "public",
"forks": 92,
"watchers": 463,
"forks": 93,
"watchers": 464,
"score": 0,
"subscribers_count": 13
},

View file

@ -528,10 +528,10 @@
"description": "This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798).",
"fork": false,
"created_at": "2021-12-11T18:49:30Z",
"updated_at": "2024-10-08T03:02:14Z",
"updated_at": "2024-12-23T04:02:44Z",
"pushed_at": "2021-12-11T19:10:03Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -540,7 +540,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 39,
"watchers": 40,
"score": 0,
"subscribers_count": 3
},

View file

@ -935,10 +935,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-12-22T11:26:30Z",
"updated_at": "2024-12-23T05:30:44Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1810,
"watchers_count": 1810,
"stargazers_count": 1811,
"watchers_count": 1811,
"has_discussions": false,
"forks_count": 529,
"allow_forking": true,
@ -952,7 +952,7 @@
],
"visibility": "public",
"forks": 529,
"watchers": 1810,
"watchers": 1811,
"score": 0,
"subscribers_count": 26
},

View file

@ -107,19 +107,19 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2024-12-12T01:49:21Z",
"updated_at": "2024-12-23T05:08:43Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 1094,
"watchers_count": 1094,
"stargazers_count": 1095,
"watchers_count": 1095,
"has_discussions": false,
"forks_count": 218,
"forks_count": 219,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 218,
"watchers": 1094,
"forks": 219,
"watchers": 1095,
"score": 0,
"subscribers_count": 17
},

View file

@ -19,7 +19,7 @@
"stargazers_count": 1172,
"watchers_count": 1172,
"has_discussions": true,
"forks_count": 190,
"forks_count": 188,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -45,7 +45,7 @@
"gui"
],
"visibility": "public",
"forks": 190,
"forks": 188,
"watchers": 1172,
"score": 0,
"subscribers_count": 19

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2022-09-30T16:43:28Z",
"updated_at": "2024-11-29T18:21:22Z",
"updated_at": "2024-12-23T04:53:31Z",
"pushed_at": "2024-01-02T11:55:38Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 46,
"watchers": 47,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "POC of CVE-2023-35086 only DoS",
"fork": false,
"created_at": "2023-07-25T01:36:07Z",
"updated_at": "2024-08-03T22:37:08Z",
"updated_at": "2024-12-23T03:50:15Z",
"pushed_at": "2023-07-25T01:42:02Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 44,
"watchers": 45,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-21T09:53:25Z",
"updated_at": "2024-12-23T02:38:59Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 45,
"watchers": 46,
"score": 0,
"subscribers_count": 1
}

View file

@ -213,10 +213,10 @@
"description": "CVE-2023-41425 (Wonder CMS XSS to RCE) exploit which serves required scripts locally. Good if you're lost at sea and have found a problem with your bike.",
"fork": false,
"created_at": "2024-10-02T14:05:19Z",
"updated_at": "2024-11-18T11:21:43Z",
"updated_at": "2024-12-23T04:25:21Z",
"pushed_at": "2024-10-02T14:20:20Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -225,7 +225,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
@ -382,6 +382,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-12-22T18:57:35Z",
"updated_at": "2024-12-23T05:56:42Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1309,
"watchers_count": 1309,
"stargazers_count": 1311,
"watchers_count": 1311,
"has_discussions": false,
"forks_count": 221,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 221,
"watchers": 1309,
"watchers": 1311,
"score": 0,
"subscribers_count": 21
},

View file

@ -214,6 +214,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 759242372,
"name": "CVE-2024-24520",
"full_name": "xF-9979\/CVE-2024-24520",
"owner": {
"login": "xF-9979",
"id": 108913864,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108913864?v=4",
"html_url": "https:\/\/github.com\/xF-9979",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xF-9979\/CVE-2024-24520",
"description": "Arbitrary code execution vulnerability",
"fork": false,
"created_at": "2024-02-18T03:13:53Z",
"updated_at": "2024-03-17T07:58:21Z",
"pushed_at": "2024-03-17T07:58:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -19,13 +19,13 @@
"stargazers_count": 246,
"watchers_count": 246,
"has_discussions": false,
"forks_count": 55,
"forks_count": 56,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 55,
"forks": 56,
"watchers": 246,
"score": 0,
"subscribers_count": 6

View file

@ -265,10 +265,10 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
"updated_at": "2024-12-21T09:47:59Z",
"updated_at": "2024-12-23T05:02:46Z",
"pushed_at": "2024-08-27T12:22:39Z",
"stargazers_count": 636,
"watchers_count": 636,
"stargazers_count": 638,
"watchers_count": 638,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@ -277,7 +277,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 636,
"watchers": 638,
"score": 0,
"subscribers_count": 4
},

View file

@ -45,10 +45,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-21T09:53:25Z",
"updated_at": "2024-12-23T02:38:59Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -68,7 +68,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 45,
"watchers": 46,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-14T09:22:33Z",
"updated_at": "2024-12-22T08:56:45Z",
"updated_at": "2024-12-23T02:20:40Z",
"pushed_at": "2024-12-14T10:13:45Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 30,
"watchers": 31,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-44258",
"fork": false,
"created_at": "2024-10-29T09:45:03Z",
"updated_at": "2024-12-12T06:52:53Z",
"updated_at": "2024-12-23T03:15:29Z",
"pushed_at": "2024-11-02T19:20:44Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 60,
"watchers": 61,
"score": 0,
"subscribers_count": 1
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"forks": 17,
"watchers": 91,
"score": 0,
"subscribers_count": 1

View file

@ -138,19 +138,19 @@
"description": "RCE through a race condition in Apache Tomcat",
"fork": false,
"created_at": "2024-12-21T05:54:29Z",
"updated_at": "2024-12-22T19:20:55Z",
"updated_at": "2024-12-23T06:06:15Z",
"pushed_at": "2024-12-21T08:56:44Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"forks": 1,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
"fork": false,
"created_at": "2024-12-13T17:42:55Z",
"updated_at": "2024-12-22T16:31:23Z",
"updated_at": "2024-12-23T03:55:08Z",
"pushed_at": "2024-12-20T10:05:15Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 68,
"watchers_count": 68,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 67,
"watchers": 68,
"score": 0,
"subscribers_count": 3
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 26,
"score": 0,
"subscribers_count": 1

View file

@ -405,10 +405,10 @@
"description": "OpenSSH CVE-2024-6387 Vulnerability Checker",
"fork": false,
"created_at": "2024-07-02T01:24:04Z",
"updated_at": "2024-07-02T10:07:48Z",
"updated_at": "2024-12-23T02:13:55Z",
"pushed_at": "2024-07-02T01:31:11Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -417,7 +417,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -3407,13 +3407,6 @@
- [minj-ae/CVE-2024-24488](https://github.com/minj-ae/CVE-2024-24488)
### CVE-2024-24520 (2024-02-29)
<code>An issue in Lepton CMS v.7.0.0 allows a local attacker to execute arbitrary code via the upgrade.php file in the languages place.
</code>
- [xF-9979/CVE-2024-24520](https://github.com/xF-9979/CVE-2024-24520)
### CVE-2024-24549 (2024-03-13)
<code>Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98.\n\nUsers are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.\n\n