Auto Update 2024/12/05 00:32:14

This commit is contained in:
motikan2010-bot 2024-12-05 09:32:14 +09:00
parent a81adc1cfe
commit 7009f19e56
26 changed files with 174 additions and 138 deletions

View file

@ -2176,10 +2176,10 @@
"description": "This project demonstrates a Web Application Firewall (WAF) simulation using Flask and a vulnerability checker for CVE-2017-5638. The WAF middleware blocks HTTP requests containing specific patterns, and the vulnerability checker tests for and exploits the Apache Struts 2 vulnerability (CVE-2017-5638).", "description": "This project demonstrates a Web Application Firewall (WAF) simulation using Flask and a vulnerability checker for CVE-2017-5638. The WAF middleware blocks HTTP requests containing specific patterns, and the vulnerability checker tests for and exploits the Apache Struts 2 vulnerability (CVE-2017-5638).",
"fork": false, "fork": false,
"created_at": "2024-07-11T15:16:56Z", "created_at": "2024-07-11T15:16:56Z",
"updated_at": "2024-07-11T15:19:54Z", "updated_at": "2024-12-04T20:21:40Z",
"pushed_at": "2024-07-11T15:19:51Z", "pushed_at": "2024-07-11T15:19:51Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -2188,7 +2188,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -169,10 +169,10 @@
"description": "DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995", "description": "DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995",
"fork": false, "fork": false,
"created_at": "2018-09-23T20:58:40Z", "created_at": "2018-09-23T20:58:40Z",
"updated_at": "2024-09-29T20:16:07Z", "updated_at": "2024-12-04T18:15:20Z",
"pushed_at": "2018-10-11T16:54:31Z", "pushed_at": "2018-10-11T16:54:31Z",
"stargazers_count": 107, "stargazers_count": 108,
"watchers_count": 107, "watchers_count": 108,
"has_discussions": false, "has_discussions": false,
"forks_count": 37, "forks_count": 37,
"allow_forking": true, "allow_forking": true,
@ -181,7 +181,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 37, "forks": 37,
"watchers": 107, "watchers": 108,
"score": 0, "score": 0,
"subscribers_count": 15 "subscribers_count": 15
}, },

View file

@ -14,10 +14,10 @@
"description": "https:\/\/medium.com\/@mansoorr\/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8", "description": "https:\/\/medium.com\/@mansoorr\/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8",
"fork": false, "fork": false,
"created_at": "2020-10-10T17:50:01Z", "created_at": "2020-10-10T17:50:01Z",
"updated_at": "2024-10-01T05:06:09Z", "updated_at": "2024-12-04T19:59:04Z",
"pushed_at": "2020-10-12T09:57:28Z", "pushed_at": "2020-10-12T09:57:28Z",
"stargazers_count": 57, "stargazers_count": 58,
"watchers_count": 57, "watchers_count": 58,
"has_discussions": false, "has_discussions": false,
"forks_count": 24, "forks_count": 24,
"allow_forking": true, "allow_forking": true,
@ -30,7 +30,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 24, "forks": 24,
"watchers": 57, "watchers": 58,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -102,13 +102,13 @@
"stargazers_count": 211, "stargazers_count": 211,
"watchers_count": 211, "watchers_count": 211,
"has_discussions": false, "has_discussions": false,
"forks_count": 49, "forks_count": 45,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 49, "forks": 45,
"watchers": 211, "watchers": 211,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 5

View file

@ -14,10 +14,10 @@
"description": "The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813", "description": "The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813",
"fork": false, "fork": false,
"created_at": "2020-02-22T16:27:41Z", "created_at": "2020-02-22T16:27:41Z",
"updated_at": "2024-08-12T19:58:00Z", "updated_at": "2024-12-04T19:11:57Z",
"pushed_at": "2020-02-22T16:33:31Z", "pushed_at": "2020-02-22T16:33:31Z",
"stargazers_count": 67, "stargazers_count": 68,
"watchers_count": 67, "watchers_count": 68,
"has_discussions": false, "has_discussions": false,
"forks_count": 20, "forks_count": 20,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 20, "forks": 20,
"watchers": 67, "watchers": 68,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

File diff suppressed because one or more lines are too long

View file

@ -45,10 +45,10 @@
"description": "Laravel debug rce", "description": "Laravel debug rce",
"fork": false, "fork": false,
"created_at": "2021-01-22T05:12:21Z", "created_at": "2021-01-22T05:12:21Z",
"updated_at": "2024-11-17T07:18:34Z", "updated_at": "2024-12-04T21:47:14Z",
"pushed_at": "2021-01-24T05:28:07Z", "pushed_at": "2021-01-24T05:28:07Z",
"stargazers_count": 125, "stargazers_count": 126,
"watchers_count": 125, "watchers_count": 126,
"has_discussions": false, "has_discussions": false,
"forks_count": 49, "forks_count": 49,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 49, "forks": 49,
"watchers": 125, "watchers": 126,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },
@ -938,8 +938,8 @@
"description": "Modified version of laravel ignition RCE (CVE-2021-3129) exploit script for Hour of Hack Session-4", "description": "Modified version of laravel ignition RCE (CVE-2021-3129) exploit script for Hour of Hack Session-4",
"fork": false, "fork": false,
"created_at": "2024-12-04T17:04:03Z", "created_at": "2024-12-04T17:04:03Z",
"updated_at": "2024-12-04T18:08:39Z", "updated_at": "2024-12-04T19:32:49Z",
"pushed_at": "2024-12-04T18:08:34Z", "pushed_at": "2024-12-04T19:32:46Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -231,10 +231,10 @@
"description": "CVE-2021-40444 PoC", "description": "CVE-2021-40444 PoC",
"fork": false, "fork": false,
"created_at": "2021-09-10T16:55:53Z", "created_at": "2021-09-10T16:55:53Z",
"updated_at": "2024-12-04T10:06:55Z", "updated_at": "2024-12-04T22:45:31Z",
"pushed_at": "2021-12-25T18:31:02Z", "pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1601, "stargazers_count": 1602,
"watchers_count": 1601, "watchers_count": 1602,
"has_discussions": false, "has_discussions": false,
"forks_count": 482, "forks_count": 482,
"allow_forking": true, "allow_forking": true,
@ -243,7 +243,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 482, "forks": 482,
"watchers": 1601, "watchers": 1602,
"score": 0, "score": 0,
"subscribers_count": 28 "subscribers_count": 28
}, },

View file

@ -50,10 +50,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false, "fork": false,
"created_at": "2021-12-13T10:28:12Z", "created_at": "2021-12-13T10:28:12Z",
"updated_at": "2024-12-04T13:16:44Z", "updated_at": "2024-12-04T19:54:55Z",
"pushed_at": "2023-01-29T03:31:27Z", "pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 813, "stargazers_count": 814,
"watchers_count": 813, "watchers_count": 814,
"has_discussions": false, "has_discussions": false,
"forks_count": 124, "forks_count": 124,
"allow_forking": true, "allow_forking": true,
@ -62,7 +62,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 124, "forks": 124,
"watchers": 813, "watchers": 814,
"score": 0, "score": 0,
"subscribers_count": 13 "subscribers_count": 13
}, },

View file

@ -14,10 +14,10 @@
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)", "description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
"fork": false, "fork": false,
"created_at": "2022-09-12T19:22:44Z", "created_at": "2022-09-12T19:22:44Z",
"updated_at": "2024-11-21T05:23:30Z", "updated_at": "2024-12-04T22:50:12Z",
"pushed_at": "2022-09-19T19:41:34Z", "pushed_at": "2022-09-19T19:41:34Z",
"stargazers_count": 300, "stargazers_count": 299,
"watchers_count": 300, "watchers_count": 299,
"has_discussions": false, "has_discussions": false,
"forks_count": 41, "forks_count": 41,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 41, "forks": 41,
"watchers": 300, "watchers": 299,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
}, },

View file

@ -595,10 +595,10 @@
"description": "This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.", "description": "This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.",
"fork": false, "fork": false,
"created_at": "2023-05-01T20:00:23Z", "created_at": "2023-05-01T20:00:23Z",
"updated_at": "2024-09-09T23:16:52Z", "updated_at": "2024-12-04T19:11:59Z",
"pushed_at": "2023-09-11T17:56:27Z", "pushed_at": "2023-09-11T17:56:27Z",
"stargazers_count": 38, "stargazers_count": 39,
"watchers_count": 38, "watchers_count": 39,
"has_discussions": false, "has_discussions": false,
"forks_count": 8, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
@ -607,7 +607,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 8,
"watchers": 38, "watchers": 39,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -14,10 +14,10 @@
"description": "A script to automate privilege escalation with CVE-2023-22809 vulnerability", "description": "A script to automate privilege escalation with CVE-2023-22809 vulnerability",
"fork": false, "fork": false,
"created_at": "2023-01-21T15:19:23Z", "created_at": "2023-01-21T15:19:23Z",
"updated_at": "2024-11-10T14:49:25Z", "updated_at": "2024-12-04T23:26:48Z",
"pushed_at": "2023-02-15T18:10:53Z", "pushed_at": "2023-02-15T18:10:53Z",
"stargazers_count": 148, "stargazers_count": 149,
"watchers_count": 148, "watchers_count": 149,
"has_discussions": false, "has_discussions": false,
"forks_count": 36, "forks_count": 36,
"allow_forking": true, "allow_forking": true,
@ -35,7 +35,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 36, "forks": 36,
"watchers": 148, "watchers": 149,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -14,10 +14,10 @@
"description": "PoC CVE-2023-28205: Apple WebKit Use-After-Free Vulnerability", "description": "PoC CVE-2023-28205: Apple WebKit Use-After-Free Vulnerability",
"fork": false, "fork": false,
"created_at": "2024-11-30T12:25:47Z", "created_at": "2024-11-30T12:25:47Z",
"updated_at": "2024-12-03T23:39:02Z", "updated_at": "2024-12-04T22:34:18Z",
"pushed_at": "2024-12-01T16:08:19Z", "pushed_at": "2024-12-01T16:08:19Z",
"stargazers_count": 7, "stargazers_count": 8,
"watchers_count": 7, "watchers_count": 8,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -35,7 +35,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 7, "watchers": 8,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -655,5 +655,36 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 898709513,
"name": "CVE-2023-4220",
"full_name": "MikeyPPPPPPPP\/CVE-2023-4220",
"owner": {
"login": "MikeyPPPPPPPP",
"id": 50926811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50926811?v=4",
"html_url": "https:\/\/github.com\/MikeyPPPPPPPP",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MikeyPPPPPPPP\/CVE-2023-4220",
"description": "Remote command execution exploit made for redteamers.",
"fork": false,
"created_at": "2024-12-04T22:16:12Z",
"updated_at": "2024-12-05T00:00:21Z",
"pushed_at": "2024-12-05T00:00:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false, "fork": false,
"created_at": "2024-01-16T06:52:02Z", "created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-12-03T21:28:40Z", "updated_at": "2024-12-04T23:00:01Z",
"pushed_at": "2024-08-18T08:26:46Z", "pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1284, "stargazers_count": 1285,
"watchers_count": 1284, "watchers_count": 1285,
"has_discussions": false, "has_discussions": false,
"forks_count": 218, "forks_count": 218,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 218, "forks": 218,
"watchers": 1284, "watchers": 1285,
"score": 0, "score": 0,
"subscribers_count": 21 "subscribers_count": 21
}, },

33
2024/CVE-2024-11680.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 898635585,
"name": "CVE-2024-11680_PoC_Exploit",
"full_name": "D3N14LD15K\/CVE-2024-11680_PoC_Exploit",
"owner": {
"login": "D3N14LD15K",
"id": 155617205,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155617205?v=4",
"html_url": "https:\/\/github.com\/D3N14LD15K",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/D3N14LD15K\/CVE-2024-11680_PoC_Exploit",
"description": "This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues.",
"fork": false,
"created_at": "2024-12-04T18:42:43Z",
"updated_at": "2024-12-05T00:24:01Z",
"pushed_at": "2024-12-04T19:25:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1,33 +1,33 @@
[ [
{ {
"id": 890642037, "id": 897795595,
"name": "CVE-2024-38193", "name": "CVE-2024-38193-Nephster",
"full_name": "Nephster\/CVE-2024-38193", "full_name": "killvxk\/CVE-2024-38193-Nephster",
"owner": { "owner": {
"login": "Nephster", "login": "killvxk",
"id": 7522000, "id": 309424,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7522000?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/309424?v=4",
"html_url": "https:\/\/github.com\/Nephster", "html_url": "https:\/\/github.com\/killvxk",
"user_view_type": "public" "user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Nephster\/CVE-2024-38193", "html_url": "https:\/\/github.com\/killvxk\/CVE-2024-38193-Nephster",
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-11-18T23:34:34Z", "created_at": "2024-12-03T08:56:59Z",
"updated_at": "2024-12-04T15:35:36Z", "updated_at": "2024-12-03T09:05:33Z",
"pushed_at": "2024-11-18T23:48:31Z", "pushed_at": "2024-11-18T23:48:31Z",
"stargazers_count": 30, "stargazers_count": 0,
"watchers_count": 30, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 3,
"watchers": 30, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 0
} }
] ]

View file

@ -14,10 +14,10 @@
"description": "cve-2024-42327 ZBX-25623", "description": "cve-2024-42327 ZBX-25623",
"fork": false, "fork": false,
"created_at": "2024-12-01T00:15:27Z", "created_at": "2024-12-01T00:15:27Z",
"updated_at": "2024-12-04T18:29:22Z", "updated_at": "2024-12-04T22:18:19Z",
"pushed_at": "2024-12-01T01:18:36Z", "pushed_at": "2024-12-01T01:18:36Z",
"stargazers_count": 15, "stargazers_count": 17,
"watchers_count": 15, "watchers_count": 17,
"has_discussions": false, "has_discussions": false,
"forks_count": 8, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 8,
"watchers": 15, "watchers": 17,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -45,10 +45,10 @@
"description": "PoC for CVE-2024-42327 \/ ZBX-25623", "description": "PoC for CVE-2024-42327 \/ ZBX-25623",
"fork": false, "fork": false,
"created_at": "2024-12-03T12:44:07Z", "created_at": "2024-12-03T12:44:07Z",
"updated_at": "2024-12-04T14:31:56Z", "updated_at": "2024-12-04T23:45:49Z",
"pushed_at": "2024-12-03T12:56:52Z", "pushed_at": "2024-12-03T12:56:52Z",
"stargazers_count": 10, "stargazers_count": 11,
"watchers_count": 10, "watchers_count": 11,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 10, "watchers": 11,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -14,7 +14,7 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-12-02T04:09:04Z", "created_at": "2024-12-02T04:09:04Z",
"updated_at": "2024-12-03T03:57:36Z", "updated_at": "2024-12-05T00:10:27Z",
"pushed_at": "2024-12-02T04:16:09Z", "pushed_at": "2024-12-02T04:16:09Z",
"stargazers_count": 2, "stargazers_count": 2,
"watchers_count": 2, "watchers_count": 2,

View file

@ -14,10 +14,10 @@
"description": "Pre-Authentication Heap Overflow in Xlight SFTP server <= 3.9.4.2", "description": "Pre-Authentication Heap Overflow in Xlight SFTP server <= 3.9.4.2",
"fork": false, "fork": false,
"created_at": "2024-10-18T11:46:14Z", "created_at": "2024-10-18T11:46:14Z",
"updated_at": "2024-11-14T08:20:38Z", "updated_at": "2024-12-04T22:39:12Z",
"pushed_at": "2024-10-18T12:29:36Z", "pushed_at": "2024-10-18T12:29:36Z",
"stargazers_count": 11, "stargazers_count": 12,
"watchers_count": 11, "watchers_count": 12,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 11, "watchers": 12,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -14,10 +14,10 @@
"description": "Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575", "description": "Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575",
"fork": false, "fork": false,
"created_at": "2024-11-07T21:03:30Z", "created_at": "2024-11-07T21:03:30Z",
"updated_at": "2024-11-29T01:40:56Z", "updated_at": "2024-12-04T22:33:44Z",
"pushed_at": "2024-11-14T16:25:52Z", "pushed_at": "2024-11-14T16:25:52Z",
"stargazers_count": 70, "stargazers_count": 71,
"watchers_count": 70, "watchers_count": 71,
"has_discussions": false, "has_discussions": false,
"forks_count": 22, "forks_count": 22,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 22, "forks": 22,
"watchers": 70, "watchers": 71,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
}, },

View file

@ -14,10 +14,10 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler", "description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false, "fork": false,
"created_at": "2024-11-19T08:57:18Z", "created_at": "2024-11-19T08:57:18Z",
"updated_at": "2024-12-04T18:26:55Z", "updated_at": "2024-12-04T23:54:55Z",
"pushed_at": "2024-11-19T09:15:26Z", "pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 52, "stargazers_count": 53,
"watchers_count": 52, "watchers_count": 53,
"has_discussions": false, "has_discussions": false,
"forks_count": 13, "forks_count": 13,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 13, "forks": 13,
"watchers": 52, "watchers": 53,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -1,33 +0,0 @@
[
{
"id": 897723885,
"name": "CVE-2024-52680",
"full_name": "cyb3res3c\/CVE-2024-52680",
"owner": {
"login": "cyb3res3c",
"id": 109259351,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109259351?v=4",
"html_url": "https:\/\/github.com\/cyb3res3c",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cyb3res3c\/CVE-2024-52680",
"description": null,
"fork": false,
"created_at": "2024-12-03T05:58:44Z",
"updated_at": "2024-12-03T06:16:05Z",
"pushed_at": "2024-12-03T06:16:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "Exploit for Grafana arbitrary file-read and RCE (CVE-2024-9264)", "description": "Exploit for Grafana arbitrary file-read and RCE (CVE-2024-9264)",
"fork": false, "fork": false,
"created_at": "2024-10-19T13:50:52Z", "created_at": "2024-10-19T13:50:52Z",
"updated_at": "2024-11-24T11:10:43Z", "updated_at": "2024-12-04T22:45:28Z",
"pushed_at": "2024-11-21T17:43:56Z", "pushed_at": "2024-11-21T17:43:56Z",
"stargazers_count": 83, "stargazers_count": 84,
"watchers_count": 83, "watchers_count": 84,
"has_discussions": false, "has_discussions": false,
"forks_count": 17, "forks_count": 17,
"allow_forking": true, "allow_forking": true,
@ -38,7 +38,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 17, "forks": 17,
"watchers": 83, "watchers": 84,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -14,10 +14,10 @@
"description": "PAN-OS auth bypass + RCE", "description": "PAN-OS auth bypass + RCE",
"fork": false, "fork": false,
"created_at": "2024-11-19T17:26:27Z", "created_at": "2024-11-19T17:26:27Z",
"updated_at": "2024-12-03T05:18:54Z", "updated_at": "2024-12-04T20:47:07Z",
"pushed_at": "2024-11-19T17:38:29Z", "pushed_at": "2024-11-19T17:38:29Z",
"stargazers_count": 36, "stargazers_count": 37,
"watchers_count": 36, "watchers_count": 37,
"has_discussions": false, "has_discussions": false,
"forks_count": 19, "forks_count": 19,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 19, "forks": 19,
"watchers": 36, "watchers": 37,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -2250,6 +2250,13 @@
- [TheN00bBuilder/cve-2024-11477-writeup](https://github.com/TheN00bBuilder/cve-2024-11477-writeup) - [TheN00bBuilder/cve-2024-11477-writeup](https://github.com/TheN00bBuilder/cve-2024-11477-writeup)
### CVE-2024-11680 (2024-11-26)
<code>ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
</code>
- [D3N14LD15K/CVE-2024-11680_PoC_Exploit](https://github.com/D3N14LD15K/CVE-2024-11680_PoC_Exploit)
### CVE-2024-12345 ### CVE-2024-12345
- [RoyaRadin/CVE-2024-12345-POC](https://github.com/RoyaRadin/CVE-2024-12345-POC) - [RoyaRadin/CVE-2024-12345-POC](https://github.com/RoyaRadin/CVE-2024-12345-POC)
@ -5526,7 +5533,7 @@
<code>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability <code>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
</code> </code>
- [Nephster/CVE-2024-38193](https://github.com/Nephster/CVE-2024-38193) - [killvxk/CVE-2024-38193-Nephster](https://github.com/killvxk/CVE-2024-38193-Nephster)
### CVE-2024-38200 (2024-08-08) ### CVE-2024-38200 (2024-08-08)
@ -7204,9 +7211,6 @@
- [ubaii/CVE-2024-52475](https://github.com/ubaii/CVE-2024-52475) - [ubaii/CVE-2024-52475](https://github.com/ubaii/CVE-2024-52475)
### CVE-2024-52680
- [cyb3res3c/CVE-2024-52680](https://github.com/cyb3res3c/CVE-2024-52680)
### CVE-2024-52711 (2024-11-19) ### CVE-2024-52711 (2024-11-19)
<code>DI-8100 v16.07.26A1 is vulnerable to Buffer Overflow In the ip_position_asp function via the ip parameter. <code>DI-8100 v16.07.26A1 is vulnerable to Buffer Overflow In the ip_position_asp function via the ip parameter.
@ -8146,6 +8150,7 @@
- [H4cking4All/CVE-2023-4220](https://github.com/H4cking4All/CVE-2023-4220) - [H4cking4All/CVE-2023-4220](https://github.com/H4cking4All/CVE-2023-4220)
- [oxapavan/CVE-2023-4220-HTB-PermX](https://github.com/oxapavan/CVE-2023-4220-HTB-PermX) - [oxapavan/CVE-2023-4220-HTB-PermX](https://github.com/oxapavan/CVE-2023-4220-HTB-PermX)
- [numaan911098/CVE-2023-4220](https://github.com/numaan911098/CVE-2023-4220) - [numaan911098/CVE-2023-4220](https://github.com/numaan911098/CVE-2023-4220)
- [MikeyPPPPPPPP/CVE-2023-4220](https://github.com/MikeyPPPPPPPP/CVE-2023-4220)
### CVE-2023-4226 (2023-11-28) ### CVE-2023-4226 (2023-11-28)