Auto Update 2024/12/08 00:31:53

This commit is contained in:
motikan2010-bot 2024-12-08 09:31:53 +09:00
parent 9eb3360cb5
commit 716c0520f0
23 changed files with 107 additions and 75 deletions

View file

@ -767,8 +767,8 @@
"description": null,
"fork": false,
"created_at": "2024-05-09T09:03:42Z",
"updated_at": "2024-10-20T10:45:58Z",
"pushed_at": "2024-10-20T10:45:55Z",
"updated_at": "2024-12-07T20:58:22Z",
"pushed_at": "2024-12-07T20:58:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -35,6 +35,6 @@
"forks": 15,
"watchers": 77,
"score": 0,
"subscribers_count": 11
"subscribers_count": 12
}
]

View file

@ -76,10 +76,10 @@
"description": "Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow",
"fork": false,
"created_at": "2021-07-02T16:03:16Z",
"updated_at": "2024-12-07T07:51:31Z",
"updated_at": "2024-12-07T18:58:23Z",
"pushed_at": "2022-09-01T06:33:36Z",
"stargazers_count": 182,
"watchers_count": 182,
"stargazers_count": 183,
"watchers_count": 183,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 182,
"watchers": 183,
"score": 0,
"subscribers_count": 7
},

View file

@ -1004,10 +1004,10 @@
"description": "Python implementation for PrintNightmare (CVE-2021-1675 \/ CVE-2021-34527)",
"fork": false,
"created_at": "2021-09-26T13:53:10Z",
"updated_at": "2024-12-04T12:19:38Z",
"updated_at": "2024-12-07T19:58:00Z",
"pushed_at": "2021-10-17T13:29:56Z",
"stargazers_count": 181,
"watchers_count": 181,
"stargazers_count": 182,
"watchers_count": 182,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -1019,7 +1019,7 @@
],
"visibility": "public",
"forks": 30,
"watchers": 181,
"watchers": 182,
"score": 0,
"subscribers_count": 6
},

View file

@ -113,10 +113,10 @@
"description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits",
"fork": false,
"created_at": "2021-07-03T15:15:12Z",
"updated_at": "2024-12-02T21:23:37Z",
"updated_at": "2024-12-07T20:17:00Z",
"pushed_at": "2021-09-13T12:12:17Z",
"stargazers_count": 124,
"watchers_count": 124,
"stargazers_count": 125,
"watchers_count": 125,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -132,7 +132,7 @@
],
"visibility": "public",
"forks": 39,
"watchers": 124,
"watchers": 125,
"score": 0,
"subscribers_count": 7
},

View file

@ -940,7 +940,7 @@
"stargazers_count": 1810,
"watchers_count": 1810,
"has_discussions": false,
"forks_count": 527,
"forks_count": 528,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -951,7 +951,7 @@
"security"
],
"visibility": "public",
"forks": 527,
"forks": 528,
"watchers": 1810,
"score": 0,
"subscribers_count": 26

View file

@ -1163,10 +1163,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2024-12-07T08:48:32Z",
"updated_at": "2024-12-07T20:37:29Z",
"pushed_at": "2023-05-20T05:55:45Z",
"stargazers_count": 557,
"watchers_count": 557,
"stargazers_count": 558,
"watchers_count": 558,
"has_discussions": false,
"forks_count": 142,
"allow_forking": true,
@ -1175,7 +1175,7 @@
"topics": [],
"visibility": "public",
"forks": 142,
"watchers": 557,
"watchers": 558,
"score": 0,
"subscribers_count": 15
},

View file

@ -1913,10 +1913,10 @@
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan支持检测路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
"fork": false,
"created_at": "2022-06-19T13:16:55Z",
"updated_at": "2024-09-02T04:19:54Z",
"updated_at": "2024-12-08T00:10:40Z",
"pushed_at": "2023-01-23T13:00:34Z",
"stargazers_count": 149,
"watchers_count": 149,
"stargazers_count": 148,
"watchers_count": 148,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -1925,7 +1925,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 149,
"watchers": 148,
"score": 0,
"subscribers_count": 2
},

View file

@ -146,10 +146,10 @@
"description": "Wordpress CVE-2023-28121",
"fork": false,
"created_at": "2023-11-03T01:19:09Z",
"updated_at": "2024-11-21T14:57:41Z",
"updated_at": "2024-12-07T21:27:58Z",
"pushed_at": "2024-11-17T23:45:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -166,7 +166,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -266,10 +266,10 @@
"description": "Wordpress CVE-2023-32243",
"fork": false,
"created_at": "2023-07-03T04:16:16Z",
"updated_at": "2024-11-18T00:07:33Z",
"updated_at": "2024-12-07T21:27:54Z",
"pushed_at": "2024-11-17T23:46:50Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -284,7 +284,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": "Wordpress CVE-2023-34960",
"fork": false,
"created_at": "2023-07-03T11:17:42Z",
"updated_at": "2024-11-18T00:05:08Z",
"updated_at": "2024-12-07T21:27:55Z",
"pushed_at": "2024-11-17T23:46:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -64,7 +64,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-12-07T17:49:21Z",
"updated_at": "2024-12-07T21:41:19Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1286,
"watchers_count": 1286,
"stargazers_count": 1288,
"watchers_count": 1288,
"has_discussions": false,
"forks_count": 218,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 218,
"watchers": 1286,
"watchers": 1288,
"score": 0,
"subscribers_count": 21
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2023-12-18T09:24:14Z",
"updated_at": "2023-12-18T09:24:20Z",
"updated_at": "2024-12-07T20:10:13Z",
"pushed_at": "2023-12-18T09:24:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "This tool scans WordPress sites for vulnerabilities in the \"RegistrationMagic\" plugin (CVE-2024-10508). It checks for the presence of a specific version (`6.0.2.6`) and marks the site as vulnerable if found. The results are saved in a file (`vuln.txt`) for further analysis.",
"fork": false,
"created_at": "2024-11-21T04:32:19Z",
"updated_at": "2024-11-24T02:13:06Z",
"updated_at": "2024-12-07T21:27:48Z",
"pushed_at": "2024-11-21T04:39:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -69,7 +69,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,8 +14,8 @@
"description": "Technical Details and Exploit for CVE-2024-11393",
"fork": false,
"created_at": "2024-12-07T11:24:06Z",
"updated_at": "2024-12-07T11:24:10Z",
"pushed_at": "2024-12-07T11:24:06Z",
"updated_at": "2024-12-08T00:30:51Z",
"pushed_at": "2024-12-08T00:30:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues.",
"fork": false,
"created_at": "2024-12-04T18:42:43Z",
"updated_at": "2024-12-05T23:11:36Z",
"updated_at": "2024-12-07T21:52:28Z",
"pushed_at": "2024-12-04T19:25:34Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}

View file

@ -76,12 +76,12 @@
"description": "Exploit PoC for CVE-2024-32002",
"fork": false,
"created_at": "2024-05-17T19:33:08Z",
"updated_at": "2024-12-02T19:23:32Z",
"updated_at": "2024-12-07T23:52:05Z",
"pushed_at": "2024-05-19T07:12:00Z",
"stargazers_count": 516,
"watchers_count": 516,
"stargazers_count": 517,
"watchers_count": 517,
"has_discussions": false,
"forks_count": 145,
"forks_count": 144,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -92,8 +92,8 @@
"rce"
],
"visibility": "public",
"forks": 145,
"watchers": 516,
"forks": 144,
"watchers": 517,
"score": 0,
"subscribers_count": 3
},

View file

@ -91,5 +91,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 900099379,
"name": "CVE-2024-42327_Zabbix_SQLI",
"full_name": "watchdog1337\/CVE-2024-42327_Zabbix_SQLI",
"owner": {
"login": "watchdog1337",
"id": 63520692,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63520692?v=4",
"html_url": "https:\/\/github.com\/watchdog1337",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/watchdog1337\/CVE-2024-42327_Zabbix_SQLI",
"description": "POC for CVE-2024-42327, an authenticated SQL Injection in Zabbix through the user.get API Method",
"fork": false,
"created_at": "2024-12-07T21:25:40Z",
"updated_at": "2024-12-07T21:57:08Z",
"pushed_at": "2024-12-07T21:57:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false,
"created_at": "2024-11-19T08:57:18Z",
"updated_at": "2024-12-07T01:13:34Z",
"updated_at": "2024-12-07T21:43:21Z",
"pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 76,
"watchers": 77,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,8 +14,8 @@
"description": "This repository presents a proof-of-concept of CVE-2024-50677",
"fork": false,
"created_at": "2024-12-06T01:04:44Z",
"updated_at": "2024-12-06T16:38:29Z",
"pushed_at": "2024-12-06T16:28:44Z",
"updated_at": "2024-12-07T22:39:19Z",
"pushed_at": "2024-12-07T22:39:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-54679 - CyberPanel (aka Cyber Panel) Denial of Service (https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-54679)",
"fork": false,
"created_at": "2024-12-06T06:02:34Z",
"updated_at": "2024-12-06T16:41:35Z",
"updated_at": "2024-12-07T22:40:31Z",
"pushed_at": "2024-12-06T06:19:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "This tool scans WordPress websites for vulnerabilities in the WP Time Capsule plugin related to CVE-2024-8856. It identifies plugin versions below 1.22.22 as vulnerable and logs results to vuln.txt. Simple and efficient, it helps security researchers and admins detect and address risks quickly.",
"fork": false,
"created_at": "2024-11-21T04:01:27Z",
"updated_at": "2024-11-21T04:41:29Z",
"updated_at": "2024-12-07T21:27:47Z",
"pushed_at": "2024-11-21T04:41:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -67,7 +67,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -6100,6 +6100,7 @@
- [aramosf/cve-2024-42327](https://github.com/aramosf/cve-2024-42327)
- [compr00t/CVE-2024-42327](https://github.com/compr00t/CVE-2024-42327)
- [depers-rus/CVE-2024-42327](https://github.com/depers-rus/CVE-2024-42327)
- [watchdog1337/CVE-2024-42327_Zabbix_SQLI](https://github.com/watchdog1337/CVE-2024-42327_Zabbix_SQLI)
### CVE-2024-42346 (2024-09-20)