Auto Update 2024/11/16 00:30:57

This commit is contained in:
motikan2010-bot 2024-11-16 09:30:57 +09:00
parent 90c99e225c
commit 6ef753f92b
36 changed files with 407 additions and 95 deletions

View file

@ -14,10 +14,10 @@
"description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. ",
"fork": false,
"created_at": "2021-06-05T18:59:28Z",
"updated_at": "2024-11-13T18:00:29Z",
"updated_at": "2024-11-15T18:13:01Z",
"pushed_at": "2021-06-06T09:41:51Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 53,
"watchers": 54,
"score": 0,
"subscribers_count": 4
},

View file

@ -76,19 +76,19 @@
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-04-17T08:10:07Z",
"updated_at": "2024-11-14T03:21:45Z",
"updated_at": "2024-11-15T18:46:57Z",
"pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 722,
"watchers_count": 722,
"stargazers_count": 723,
"watchers_count": 723,
"has_discussions": false,
"forks_count": 259,
"forks_count": 260,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 259,
"watchers": 722,
"forks": 260,
"watchers": 723,
"score": 0,
"subscribers_count": 46
},

View file

@ -0,0 +1,33 @@
[
{
"id": 889219295,
"name": "JWT-Bruteforcer",
"full_name": "realbatuhan\/JWT-Bruteforcer",
"owner": {
"login": "realbatuhan",
"id": 68564239,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68564239?v=4",
"html_url": "https:\/\/github.com\/realbatuhan",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/realbatuhan\/JWT-Bruteforcer",
"description": "Jwt Bruteforcer with CVE-2018-1000531 Test",
"fork": false,
"created_at": "2024-11-15T21:00:24Z",
"updated_at": "2024-11-15T21:05:48Z",
"pushed_at": "2024-11-15T21:05:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -45,8 +45,8 @@
"description": "A tool for retrieving login credentials from Netwave IP cameras using a memory dump vulnerability (CVE-2018-17240)",
"fork": false,
"created_at": "2024-01-04T21:44:21Z",
"updated_at": "2024-11-14T17:14:40Z",
"pushed_at": "2024-11-15T09:26:20Z",
"updated_at": "2024-11-15T18:18:23Z",
"pushed_at": "2024-11-15T18:18:22Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
"fork": false,
"created_at": "2018-04-28T11:50:00Z",
"updated_at": "2024-11-13T08:27:26Z",
"updated_at": "2024-11-15T22:29:23Z",
"pushed_at": "2022-12-11T10:44:39Z",
"stargazers_count": 526,
"watchers_count": 526,
"stargazers_count": 527,
"watchers_count": 527,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 55,
"watchers": 526,
"watchers": 527,
"score": 0,
"subscribers_count": 55
},

View file

@ -76,10 +76,10 @@
"description": "This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I\/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and recalulated the fields offsets",
"fork": false,
"created_at": "2024-08-05T16:55:40Z",
"updated_at": "2024-09-25T13:58:39Z",
"updated_at": "2024-11-15T20:45:36Z",
"pushed_at": "2024-08-05T18:31:16Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -128,6 +128,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 6,
"watchers": 56,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
}
]

View file

@ -78,10 +78,10 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-27T02:54:27Z",
"updated_at": "2024-11-01T02:37:51Z",
"updated_at": "2024-11-15T22:45:21Z",
"pushed_at": "2023-07-04T05:16:05Z",
"stargazers_count": 320,
"watchers_count": 320,
"stargazers_count": 321,
"watchers_count": 321,
"has_discussions": false,
"forks_count": 86,
"allow_forking": true,
@ -90,7 +90,7 @@
"topics": [],
"visibility": "public",
"forks": 86,
"watchers": 320,
"watchers": 321,
"score": 0,
"subscribers_count": 10
},
@ -584,10 +584,10 @@
"description": "Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys",
"fork": false,
"created_at": "2021-01-04T10:48:40Z",
"updated_at": "2024-05-02T10:58:20Z",
"updated_at": "2024-11-15T22:39:55Z",
"pushed_at": "2021-06-06T16:03:53Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -596,7 +596,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 19,
"watchers": 20,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "shiro-cve-2020-17523 漏洞的两种绕过姿势分析 以及配套的漏洞环境",
"fork": false,
"created_at": "2021-02-03T08:14:03Z",
"updated_at": "2024-10-23T08:49:39Z",
"updated_at": "2024-11-15T22:58:27Z",
"pushed_at": "2021-02-07T09:42:36Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 113,
"watchers": 114,
"score": 0,
"subscribers_count": 3
}

View file

@ -311,10 +311,10 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2024-11-09T22:43:25Z",
"updated_at": "2024-11-16T00:03:54Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 1013,
"watchers_count": 1013,
"stargazers_count": 1014,
"watchers_count": 1014,
"has_discussions": false,
"forks_count": 230,
"allow_forking": true,
@ -323,7 +323,7 @@
"topics": [],
"visibility": "public",
"forks": 230,
"watchers": 1013,
"watchers": 1014,
"score": 0,
"subscribers_count": 26
},

View file

@ -176,7 +176,7 @@
"description": "CVE-2021-21985 vmware 6.7-9.8 RCE",
"fork": false,
"created_at": "2021-06-04T01:15:14Z",
"updated_at": "2024-08-12T20:13:36Z",
"updated_at": "2024-11-15T19:24:39Z",
"pushed_at": "2023-11-27T18:36:50Z",
"stargazers_count": 2,
"watchers_count": 2,

View file

@ -1109,13 +1109,13 @@
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 17,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"forks": 16,
"watchers": 45,
"score": 0,
"subscribers_count": 18

View file

@ -14,7 +14,7 @@
"description": "CVE-2021-30461",
"fork": false,
"created_at": "2021-05-06T22:50:32Z",
"updated_at": "2024-08-12T20:12:46Z",
"updated_at": "2024-11-15T19:25:24Z",
"pushed_at": "2023-11-27T18:36:49Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -14,10 +14,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-11-13T15:27:18Z",
"updated_at": "2024-11-15T20:43:51Z",
"pushed_at": "2024-08-01T15:09:15Z",
"stargazers_count": 291,
"watchers_count": 291,
"stargazers_count": 292,
"watchers_count": 292,
"has_discussions": true,
"forks_count": 42,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 42,
"watchers": 291,
"watchers": 292,
"score": 0,
"subscribers_count": 7
},

33
2022/CVE-2022-39275.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 889242972,
"name": "CVE-2022-39275",
"full_name": "omar2535\/CVE-2022-39275",
"owner": {
"login": "omar2535",
"id": 9442294,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9442294?v=4",
"html_url": "https:\/\/github.com\/omar2535",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/omar2535\/CVE-2022-39275",
"description": "CVE-2022-39275 Setup and POC",
"fork": false,
"created_at": "2024-11-15T22:21:16Z",
"updated_at": "2024-11-15T22:24:28Z",
"pushed_at": "2024-11-15T22:24:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit",
"fork": false,
"created_at": "2023-01-30T12:57:48Z",
"updated_at": "2024-11-07T03:54:09Z",
"updated_at": "2024-11-15T19:21:38Z",
"pushed_at": "2023-12-05T12:21:02Z",
"stargazers_count": 266,
"watchers_count": 266,
"stargazers_count": 267,
"watchers_count": 267,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 60,
"watchers": 266,
"watchers": 267,
"score": 0,
"subscribers_count": 5
},

View file

@ -675,10 +675,10 @@
"description": "NSE script for checking the presence of CVE-2023-22515",
"fork": false,
"created_at": "2024-04-26T17:57:33Z",
"updated_at": "2024-09-18T19:46:55Z",
"updated_at": "2024-11-15T21:14:17Z",
"pushed_at": "2024-04-26T17:58:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -687,7 +687,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -50,13 +50,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 2

View file

@ -45,10 +45,10 @@
"description": "POC - CVE-202410914- Command Injection Vulnerability in `name` parameter for D-Link NAS",
"fork": false,
"created_at": "2024-11-10T12:01:21Z",
"updated_at": "2024-11-15T13:24:02Z",
"updated_at": "2024-11-15T21:58:01Z",
"pushed_at": "2024-11-10T12:13:16Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -65,7 +65,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 1
},

View file

@ -76,10 +76,10 @@
"description": null,
"fork": false,
"created_at": "2024-10-21T10:27:52Z",
"updated_at": "2024-11-13T22:55:58Z",
"updated_at": "2024-11-15T19:48:46Z",
"pushed_at": "2024-10-27T17:49:33Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -2,15 +2,15 @@
{
"id": 867371823,
"name": "CVE-2024-26160",
"full_name": "0x00Alchemist\/CVE-2024-26160",
"full_name": "xsh3llsh0ck\/CVE-2024-26160",
"owner": {
"login": "0x00Alchemist",
"login": "xsh3llsh0ck",
"id": 45564102,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45564102?v=4",
"html_url": "https:\/\/github.com\/0x00Alchemist",
"html_url": "https:\/\/github.com\/xsh3llsh0ck",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0x00Alchemist\/CVE-2024-26160",
"html_url": "https:\/\/github.com\/xsh3llsh0ck\/CVE-2024-26160",
"description": "cldflt.sys information disclosure vulnerability (KB5034765 - KB5035853, Win 11).",
"fork": false,
"created_at": "2024-10-04T00:04:42Z",

View file

@ -122,5 +122,36 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 889247775,
"name": "CVE-2024-2876",
"full_name": "issamiso\/CVE-2024-2876",
"owner": {
"login": "issamiso",
"id": 101994309,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101994309?v=4",
"html_url": "https:\/\/github.com\/issamiso",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/issamiso\/CVE-2024-2876",
"description": "WP-SQL-Injection CVE-2024-2876 AND 2024-CVE-2024-3495",
"fork": false,
"created_at": "2024-11-15T22:39:48Z",
"updated_at": "2024-11-15T22:51:46Z",
"pushed_at": "2024-11-15T22:50:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "The public reference that contains the minimum require information for the vulnerability covered by CVE-2024-36821",
"fork": false,
"created_at": "2024-06-10T15:52:02Z",
"updated_at": "2024-07-25T08:18:18Z",
"updated_at": "2024-11-15T19:16:54Z",
"pushed_at": "2024-06-10T16:07:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -265,10 +265,10 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
"updated_at": "2024-11-11T09:03:33Z",
"updated_at": "2024-11-15T22:24:35Z",
"pushed_at": "2024-08-27T12:22:39Z",
"stargazers_count": 618,
"watchers_count": 618,
"stargazers_count": 619,
"watchers_count": 619,
"has_discussions": false,
"forks_count": 113,
"allow_forking": true,
@ -277,7 +277,7 @@
"topics": [],
"visibility": "public",
"forks": 113,
"watchers": 618,
"watchers": 619,
"score": 0,
"subscribers_count": 4
},

View file

@ -111,10 +111,10 @@
"description": "Exploit for the vulnerability CVE-2024-43044 in Jenkins",
"fork": false,
"created_at": "2024-08-23T20:26:26Z",
"updated_at": "2024-11-15T02:10:17Z",
"updated_at": "2024-11-16T00:17:15Z",
"pushed_at": "2024-10-02T21:58:12Z",
"stargazers_count": 165,
"watchers_count": 165,
"stargazers_count": 166,
"watchers_count": 166,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -123,7 +123,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 165,
"watchers": 166,
"score": 0,
"subscribers_count": 3
}

View file

@ -14,10 +14,10 @@
"description": "Files related to the Pwn2Own Toronto 2023 exploit against the Xiaomi 13 Pro.",
"fork": false,
"created_at": "2024-10-14T09:38:04Z",
"updated_at": "2024-11-15T06:35:00Z",
"updated_at": "2024-11-15T23:07:26Z",
"pushed_at": "2024-10-14T09:43:53Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575",
"fork": false,
"created_at": "2024-11-07T21:03:30Z",
"updated_at": "2024-11-15T16:58:09Z",
"updated_at": "2024-11-16T00:05:53Z",
"pushed_at": "2024-11-14T16:25:52Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 34,
"watchers": 38,
"score": 0,
"subscribers_count": 0
},
@ -45,8 +45,8 @@
"description": null,
"fork": false,
"created_at": "2024-11-15T13:19:33Z",
"updated_at": "2024-11-15T13:32:45Z",
"pushed_at": "2024-11-15T13:22:50Z",
"updated_at": "2024-11-15T18:56:04Z",
"pushed_at": "2024-11-15T18:56:01Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,

33
2024/CVE-2024-50848.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 889175343,
"name": "CVE-2024-50848",
"full_name": "Wh1teSnak3\/CVE-2024-50848",
"owner": {
"login": "Wh1teSnak3",
"id": 188617964,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188617964?v=4",
"html_url": "https:\/\/github.com\/Wh1teSnak3",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Wh1teSnak3\/CVE-2024-50848",
"description": null,
"fork": false,
"created_at": "2024-11-15T18:57:25Z",
"updated_at": "2024-11-15T19:29:50Z",
"pushed_at": "2024-11-15T19:29:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-50849.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 889195386,
"name": "CVE-2024-50849",
"full_name": "Wh1teSnak3\/CVE-2024-50849",
"owner": {
"login": "Wh1teSnak3",
"id": 188617964,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188617964?v=4",
"html_url": "https:\/\/github.com\/Wh1teSnak3",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Wh1teSnak3\/CVE-2024-50849",
"description": null,
"fork": false,
"created_at": "2024-11-15T19:51:18Z",
"updated_at": "2024-11-15T21:46:59Z",
"pushed_at": "2024-11-15T21:46:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -29,5 +29,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 889180658,
"name": "CVE-2024-52301-Research",
"full_name": "martinhaunschmid\/CVE-2024-52301-Research",
"owner": {
"login": "martinhaunschmid",
"id": 35374703,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35374703?v=4",
"html_url": "https:\/\/github.com\/martinhaunschmid",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/martinhaunschmid\/CVE-2024-52301-Research",
"description": "A bit of research around CVE-2024-52301",
"fork": false,
"created_at": "2024-11-15T19:11:35Z",
"updated_at": "2024-11-15T19:42:15Z",
"pushed_at": "2024-11-15T19:42:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -29,5 +29,36 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 889262902,
"name": "Palo-Alto-Expedition-Remote-Code-Execution-Exploit-CVE-2024-5910-CVE-2024-9464",
"full_name": "p33d\/Palo-Alto-Expedition-Remote-Code-Execution-Exploit-CVE-2024-5910-CVE-2024-9464",
"owner": {
"login": "p33d",
"id": 123099747,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123099747?v=4",
"html_url": "https:\/\/github.com\/p33d",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/p33d\/Palo-Alto-Expedition-Remote-Code-Execution-Exploit-CVE-2024-5910-CVE-2024-9464",
"description": null,
"fork": false,
"created_at": "2024-11-15T23:46:01Z",
"updated_at": "2024-11-15T23:46:01Z",
"pushed_at": "2024-11-15T23:46:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -684,10 +684,10 @@
"description": "This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH.",
"fork": false,
"created_at": "2024-07-02T06:53:35Z",
"updated_at": "2024-11-11T04:00:50Z",
"updated_at": "2024-11-15T21:43:12Z",
"pushed_at": "2024-07-04T20:04:30Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -696,7 +696,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 1
},

View file

@ -153,5 +153,36 @@
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 889221961,
"name": "CVE-2024-7954",
"full_name": "issamiso\/CVE-2024-7954",
"owner": {
"login": "issamiso",
"id": 101994309,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101994309?v=4",
"html_url": "https:\/\/github.com\/issamiso",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/issamiso\/CVE-2024-7954",
"description": "The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.",
"fork": false,
"created_at": "2024-11-15T21:08:47Z",
"updated_at": "2024-11-15T22:51:47Z",
"pushed_at": "2024-11-15T21:10:55Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -29,5 +29,36 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 889251660,
"name": "CVE-2024-9796",
"full_name": "issamiso\/CVE-2024-9796",
"owner": {
"login": "issamiso",
"id": 101994309,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101994309?v=4",
"html_url": "https:\/\/github.com\/issamiso",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/issamiso\/CVE-2024-9796",
"description": "WordPress WP-Advanced-Search <= 3.3.9 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2024-11-15T22:55:18Z",
"updated_at": "2024-11-15T23:05:22Z",
"pushed_at": "2024-11-15T23:04:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -555,6 +555,7 @@
- [Quantum-Hacker/CVE-2024-2876](https://github.com/Quantum-Hacker/CVE-2024-2876)
- [0xAgun/CVE-2024-2876](https://github.com/0xAgun/CVE-2024-2876)
- [skyrowalker/CVE-2024-2876](https://github.com/skyrowalker/CVE-2024-2876)
- [issamiso/CVE-2024-2876](https://github.com/issamiso/CVE-2024-2876)
### CVE-2024-2879 (2024-04-03)
@ -1212,6 +1213,7 @@
</code>
- [zetraxz/CVE-2024-5910](https://github.com/zetraxz/CVE-2024-5910)
- [p33d/Palo-Alto-Expedition-Remote-Code-Execution-Exploit-CVE-2024-5910-CVE-2024-9464](https://github.com/p33d/Palo-Alto-Expedition-Remote-Code-Execution-Exploit-CVE-2024-5910-CVE-2024-9464)
### CVE-2024-5932 (2024-08-20)
@ -1597,6 +1599,7 @@
- [fa-rrel/CVE-2024-7954-RCE](https://github.com/fa-rrel/CVE-2024-7954-RCE)
- [TheCyberguy-17/RCE_CVE-2024-7954](https://github.com/TheCyberguy-17/RCE_CVE-2024-7954)
- [MuhammadWaseem29/RCE-CVE-2024-7954](https://github.com/MuhammadWaseem29/RCE-CVE-2024-7954)
- [issamiso/CVE-2024-7954](https://github.com/issamiso/CVE-2024-7954)
### CVE-2024-7965 (2024-08-21)
@ -1836,6 +1839,7 @@
</code>
- [RandomRobbieBF/CVE-2024-9796](https://github.com/RandomRobbieBF/CVE-2024-9796)
- [issamiso/CVE-2024-9796](https://github.com/issamiso/CVE-2024-9796)
### CVE-2024-9821 (2024-10-12)
@ -3369,7 +3373,7 @@
<code>Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
</code>
- [0x00Alchemist/CVE-2024-26160](https://github.com/0x00Alchemist/CVE-2024-26160)
- [xsh3llsh0ck/CVE-2024-26160](https://github.com/xsh3llsh0ck/CVE-2024-26160)
### CVE-2024-26218 (2024-04-09)
@ -6516,6 +6520,12 @@
### CVE-2024-50803
- [Praison001/CVE-2024-50803-Redaxo](https://github.com/Praison001/CVE-2024-50803-Redaxo)
### CVE-2024-50848
- [Wh1teSnak3/CVE-2024-50848](https://github.com/Wh1teSnak3/CVE-2024-50848)
### CVE-2024-50849
- [Wh1teSnak3/CVE-2024-50849](https://github.com/Wh1teSnak3/CVE-2024-50849)
### CVE-2024-50961
- [fdzdev/CVE-2024-50961](https://github.com/fdzdev/CVE-2024-50961)
@ -6675,6 +6685,7 @@
</code>
- [Nyamort/CVE-2024-52301](https://github.com/Nyamort/CVE-2024-52301)
- [martinhaunschmid/CVE-2024-52301-Research](https://github.com/martinhaunschmid/CVE-2024-52301-Research)
### CVE-2024-52302 (2024-11-14)
@ -20279,6 +20290,13 @@
- [ssst0n3/docker-cve-2022-39253-poc](https://github.com/ssst0n3/docker-cve-2022-39253-poc)
- [HiImDarwin/NetworkSecurityFinalProject](https://github.com/HiImDarwin/NetworkSecurityFinalProject)
### CVE-2022-39275 (2022-10-06)
<code>Saleor is a headless, GraphQL commerce platform. In affected versions some GraphQL mutations were not properly checking the ID type input which allowed to access database objects that the authenticated user may not be allowed to access. This vulnerability can be used to expose the following information: Estimating database row counts from tables with a sequential primary key or Exposing staff user and customer email addresses and full name through the `assignNavigation()` mutation. This issue has been patched in main and backported to multiple releases (3.7.17, 3.6.18, 3.5.23, 3.4.24, 3.3.26, 3.2.14, 3.1.24). Users are advised to upgrade. There are no known workarounds for this issue.
</code>
- [omar2535/CVE-2022-39275](https://github.com/omar2535/CVE-2022-39275)
### CVE-2022-39299 (2022-10-12)
<code>Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. Users should upgrade to passport-saml version 3.2.2 or newer. The issue was also present in the beta releases of `node-saml` before version 4.0.0-beta.5. If you cannot upgrade, disabling SAML authentication may be done as a workaround.
@ -41295,6 +41313,13 @@
- [martinfrancois/CVE-2018-1000529](https://github.com/martinfrancois/CVE-2018-1000529)
### CVE-2018-1000531 (2018-06-26)
<code>inversoft prime-jwt version prior to commit abb0d479389a2509f939452a6767dc424bb5e6ba contains a CWE-20 vulnerability in JWTDecoder.decode that can result in an incorrect signature validation of a JWT token. This attack can be exploitable when an attacker crafts a JWT token with a valid header using 'none' as algorithm and a body to requests it be validated. This vulnerability was fixed after commit abb0d479389a2509f939452a6767dc424bb5e6ba.
</code>
- [realbatuhan/JWT-Bruteforcer](https://github.com/realbatuhan/JWT-Bruteforcer)
### CVE-2018-1000542 (2018-06-26)
<code>netbeans-mmd-plugin version &lt;= 1.4.3 contains a XML External Entity (XXE) vulnerability in MMD file import that can result in Possible information disclosure, server-side request forgery, or remote code execution. This attack appear to be exploitable via Specially crafted MMD file.