Auto Update 2024/09/30 06:30:47

This commit is contained in:
motikan2010-bot 2024-09-30 15:30:47 +09:00
parent a85826dcae
commit 70b4d324b2
36 changed files with 166 additions and 125 deletions

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-09-30T00:01:36Z",
"updated_at": "2024-09-30T01:59:09Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1983,
"watchers_count": 1983,
"stargazers_count": 1984,
"watchers_count": 1984,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1983,
"watchers": 1984,
"score": 0,
"subscribers_count": 36
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-09-30T00:01:36Z",
"updated_at": "2024-09-30T01:59:09Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1983,
"watchers_count": 1983,
"stargazers_count": 1984,
"watchers_count": 1984,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1983,
"watchers": 1984,
"score": 0,
"subscribers_count": 36
},

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-09-30T00:01:36Z",
"updated_at": "2024-09-30T01:59:09Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1983,
"watchers_count": 1983,
"stargazers_count": 1984,
"watchers_count": 1984,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1983,
"watchers": 1984,
"score": 0,
"subscribers_count": 36
},

View file

@ -557,10 +557,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-09-30T00:01:36Z",
"updated_at": "2024-09-30T01:59:09Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1983,
"watchers_count": 1983,
"stargazers_count": 1984,
"watchers_count": 1984,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -590,7 +590,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1983,
"watchers": 1984,
"score": 0,
"subscribers_count": 36
},

View file

@ -13,12 +13,12 @@
"description": "Exploit I discovered in October of 2022 with androids Package manager binary (pm) and the way it handled debugging flags, patched out by march 2023. Uses CVE-2019-16253 as a payload to obtain a system shell. ",
"fork": false,
"created_at": "2023-01-19T19:47:13Z",
"updated_at": "2024-09-26T15:42:11Z",
"updated_at": "2024-09-30T01:16:37Z",
"pushed_at": "2024-03-20T19:12:39Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 78,
"watchers_count": 78,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": true,
@ -31,8 +31,8 @@
"system"
],
"visibility": "public",
"forks": 13,
"watchers": 77,
"forks": 14,
"watchers": 78,
"score": 0,
"subscribers_count": 12
}

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-09-30T00:01:36Z",
"updated_at": "2024-09-30T01:59:09Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1983,
"watchers_count": 1983,
"stargazers_count": 1984,
"watchers_count": 1984,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1983,
"watchers": 1984,
"score": 0,
"subscribers_count": 36
}

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-09-30T00:01:36Z",
"updated_at": "2024-09-30T01:59:09Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1983,
"watchers_count": 1983,
"stargazers_count": 1984,
"watchers_count": 1984,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1983,
"watchers": 1984,
"score": 0,
"subscribers_count": 36
},

View file

@ -862,6 +862,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-08-20T03:01:30Z",
"updated_at": "2024-09-26T14:02:18Z",
"updated_at": "2024-09-30T03:01:23Z",
"pushed_at": "2023-02-20T23:29:21Z",
"stargazers_count": 153,
"watchers_count": 153,
"stargazers_count": 154,
"watchers_count": 154,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 153,
"watchers": 154,
"score": 0,
"subscribers_count": 12
}

View file

@ -34,6 +34,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -33,6 +33,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -795,7 +795,7 @@
"description": "Atlassian Confluence- Unauthenticated OGNL injection vulnerability (RCE) ",
"fork": false,
"created_at": "2022-06-07T11:55:37Z",
"updated_at": "2024-09-09T08:31:56Z",
"updated_at": "2024-09-30T00:51:35Z",
"pushed_at": "2022-06-07T22:19:34Z",
"stargazers_count": 1,
"watchers_count": 1,
@ -1185,10 +1185,10 @@
"description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated Remote code execution (RCE)",
"fork": false,
"created_at": "2022-07-05T04:30:42Z",
"updated_at": "2024-08-23T18:52:54Z",
"updated_at": "2024-09-30T00:57:45Z",
"pushed_at": "2024-08-23T18:52:52Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -1202,7 +1202,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 25,
"watchers": 26,
"score": 0,
"subscribers_count": 1
},

View file

@ -1411,7 +1411,7 @@
"fork": false,
"created_at": "2024-08-06T13:21:27Z",
"updated_at": "2024-08-06T14:44:37Z",
"pushed_at": "2024-09-16T03:13:51Z",
"pushed_at": "2024-09-30T03:23:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
@ -1523,6 +1523,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -380,10 +380,10 @@
"description": "CVE-2023-4220 PoC Chamilo RCE",
"fork": false,
"created_at": "2024-08-24T05:32:31Z",
"updated_at": "2024-09-23T18:27:34Z",
"updated_at": "2024-09-30T02:19:22Z",
"pushed_at": "2024-09-23T18:27:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -392,7 +392,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},

View file

@ -87,7 +87,7 @@
"forks": 31,
"watchers": 164,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
},
{
"id": 701947383,

View file

@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2024-09-29T14:29:26Z",
"updated_at": "2024-09-29T14:56:40Z",
"pushed_at": "2024-09-29T14:56:36Z",
"updated_at": "2024-09-30T02:43:48Z",
"pushed_at": "2024-09-30T02:43:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -43,19 +43,19 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-09-29T17:25:09Z",
"updated_at": "2024-09-30T00:35:43Z",
"pushed_at": "2024-07-25T18:12:57Z",
"stargazers_count": 229,
"watchers_count": 229,
"stargazers_count": 230,
"watchers_count": 230,
"has_discussions": false,
"forks_count": 53,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 229,
"forks": 54,
"watchers": 230,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "exploits for CVE-2024-20017",
"fork": false,
"created_at": "2024-08-30T05:54:36Z",
"updated_at": "2024-09-29T14:53:49Z",
"updated_at": "2024-09-30T02:52:14Z",
"pushed_at": "2024-09-07T10:11:22Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 111,
"watchers": 112,
"score": 0,
"subscribers_count": 3
}

View file

@ -48,7 +48,7 @@
"stargazers_count": 122,
"watchers_count": 122,
"has_discussions": false,
"forks_count": 32,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -58,7 +58,7 @@
"redteam"
],
"visibility": "public",
"forks": 32,
"forks": 33,
"watchers": 122,
"score": 0,
"subscribers_count": 1

View file

@ -43,10 +43,10 @@
"description": "Windows LPE",
"fork": false,
"created_at": "2024-06-11T08:03:29Z",
"updated_at": "2024-09-24T19:55:58Z",
"updated_at": "2024-09-30T05:14:30Z",
"pushed_at": "2024-06-11T20:41:59Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 93,
"watchers_count": 93,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 92,
"watchers": 93,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855",
"fork": false,
"created_at": "2024-06-13T08:32:55Z",
"updated_at": "2024-09-18T22:48:02Z",
"updated_at": "2024-09-30T05:15:29Z",
"pushed_at": "2024-06-17T10:45:06Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-08-14T16:20:38Z",
"updated_at": "2024-09-29T15:31:38Z",
"updated_at": "2024-09-30T01:53:48Z",
"pushed_at": "2024-09-05T23:21:00Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 93,
"watchers": 94,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-06-24T10:37:26Z",
"updated_at": "2024-09-22T16:54:32Z",
"updated_at": "2024-09-30T05:28:57Z",
"pushed_at": "2024-07-31T19:11:55Z",
"stargazers_count": 205,
"watchers_count": 205,
"stargazers_count": 206,
"watchers_count": 206,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 205,
"watchers": 206,
"score": 0,
"subscribers_count": 3
},

View file

@ -103,10 +103,10 @@
"description": "Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions with multies ways to exploit",
"fork": false,
"created_at": "2024-07-06T01:10:28Z",
"updated_at": "2024-09-18T18:25:27Z",
"updated_at": "2024-09-30T02:10:51Z",
"pushed_at": "2024-07-06T01:57:58Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -122,7 +122,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 39,
"watchers": 40,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 27,
"score": 0,
"subscribers_count": 2

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-38200 - Microsoft Office NTLMv2 Disclosure Vulnerability ",
"fork": false,
"created_at": "2024-09-24T19:24:55Z",
"updated_at": "2024-09-29T16:39:44Z",
"updated_at": "2024-09-30T06:20:41Z",
"pushed_at": "2024-09-25T21:57:51Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 52,
"watchers": 57,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
"fork": false,
"created_at": "2024-05-20T10:02:23Z",
"updated_at": "2024-09-29T02:07:17Z",
"updated_at": "2024-09-30T02:21:53Z",
"pushed_at": "2024-06-07T03:28:00Z",
"stargazers_count": 116,
"watchers_count": 116,
"stargazers_count": 117,
"watchers_count": 117,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 116,
"watchers": 117,
"score": 0,
"subscribers_count": 2
},

38
2024/CVE-2024-45200.json Normal file
View file

@ -0,0 +1,38 @@
[
{
"id": 856653771,
"name": "kartlanpwn",
"full_name": "latte-soft\/kartlanpwn",
"owner": {
"login": "latte-soft",
"id": 87558718,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87558718?v=4",
"html_url": "https:\/\/github.com\/latte-soft"
},
"html_url": "https:\/\/github.com\/latte-soft\/kartlanpwn",
"description": "Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's \"KartLANPwn\" buffer overflow vulnerability",
"fork": false,
"created_at": "2024-09-13T00:41:32Z",
"updated_at": "2024-09-30T06:18:58Z",
"pushed_at": "2024-09-30T01:39:22Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"buffer-overflow",
"cve",
"cve-2024-45200",
"mk8dx",
"nintendo-switch"
],
"visibility": "public",
"forks": 0,
"watchers": 15,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -10,10 +10,10 @@
"html_url": "https:\/\/github.com\/SpiralBL0CK"
},
"html_url": "https:\/\/github.com\/SpiralBL0CK\/CVE-2024-45383",
"description": "Theoretically poc for CVE-2024-45383, needs testing and validation. still not done yet.... ",
"description": " poc for CVE-2024-45383",
"fork": false,
"created_at": "2024-09-18T15:40:19Z",
"updated_at": "2024-09-18T15:40:41Z",
"updated_at": "2024-09-30T06:28:07Z",
"pushed_at": "2024-09-18T15:40:37Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -43,19 +43,19 @@
"description": null,
"fork": false,
"created_at": "2024-09-28T08:29:06Z",
"updated_at": "2024-09-29T22:54:05Z",
"updated_at": "2024-09-30T05:14:54Z",
"pushed_at": "2024-09-28T08:34:05Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 15,
"forks": 4,
"watchers": 17,
"score": 0,
"subscribers_count": 1
}

View file

@ -103,10 +103,10 @@
"description": "Scanner",
"fork": false,
"created_at": "2024-09-28T16:02:41Z",
"updated_at": "2024-09-29T19:44:00Z",
"pushed_at": "2024-09-29T15:08:07Z",
"stargazers_count": 6,
"watchers_count": 6,
"updated_at": "2024-09-30T06:20:02Z",
"pushed_at": "2024-09-30T06:19:59Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,18 +13,18 @@
"description": "PoC honeypot for detecting exploit attempts against CVE-2024-47177",
"fork": false,
"created_at": "2024-09-27T05:18:23Z",
"updated_at": "2024-09-28T17:13:29Z",
"pushed_at": "2024-09-27T05:26:30Z",
"updated_at": "2024-09-30T04:36:34Z",
"pushed_at": "2024-09-30T04:36:30Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 2

View file

@ -43,10 +43,10 @@
"description": "Proof-of-Concept for CVE-2024-5932",
"fork": false,
"created_at": "2024-08-25T11:51:36Z",
"updated_at": "2024-09-21T19:03:09Z",
"updated_at": "2024-09-30T02:41:50Z",
"pushed_at": "2024-08-29T02:13:12Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -66,7 +66,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 50,
"watchers": 51,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,19 +13,19 @@
"description": "Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)",
"fork": false,
"created_at": "2024-08-29T16:40:49Z",
"updated_at": "2024-09-29T21:58:22Z",
"updated_at": "2024-09-30T01:58:33Z",
"pushed_at": "2024-09-29T21:58:19Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 22,
"forks": 6,
"watchers": 25,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Proof-of-Concept for CVE-2024-9014",
"fork": false,
"created_at": "2024-09-26T10:34:34Z",
"updated_at": "2024-09-29T00:42:45Z",
"updated_at": "2024-09-30T04:07:42Z",
"pushed_at": "2024-09-26T10:45:34Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -5126,6 +5126,9 @@
- [0xbhsu/CVE-2024-45058](https://github.com/0xbhsu/CVE-2024-45058)
### CVE-2024-45200
- [latte-soft/kartlanpwn](https://github.com/latte-soft/kartlanpwn)
### CVE-2024-45241 (2024-08-26)
<code>A traversal vulnerability in GeneralDocs.aspx in CentralSquare CryWolf (False Alarm Management) through 2024-08-09 allows unauthenticated attackers to read files outside of the working web directory via the rpt parameter, leading to the disclosure of sensitive information.