From 716c0520f0fab5da8d0c428f9873bf0518adf221 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sun, 8 Dec 2024 09:31:53 +0900 Subject: [PATCH] Auto Update 2024/12/08 00:31:53 --- 2018/CVE-2018-9995.json | 4 ++-- 2019/CVE-2019-16253.json | 2 +- 2020/CVE-2020-17087.json | 8 ++++---- 2021/CVE-2021-1675.json | 8 ++++---- 2021/CVE-2021-34527.json | 8 ++++---- 2021/CVE-2021-44228.json | 4 ++-- 2022/CVE-2022-0847.json | 8 ++++---- 2022/CVE-2022-22965.json | 8 ++++---- 2023/CVE-2023-28121.json | 8 ++++---- 2023/CVE-2023-32243.json | 8 ++++---- 2023/CVE-2023-34960.json | 8 ++++---- 2023/CVE-2023-45866.json | 8 ++++---- 2023/CVE-2023-5808.json | 8 ++++---- 2024/CVE-2024-10508.json | 8 ++++---- 2024/CVE-2024-11393.json | 4 ++-- 2024/CVE-2024-11680.json | 8 ++++---- 2024/CVE-2024-32002.json | 12 ++++++------ 2024/CVE-2024-42327.json | 31 +++++++++++++++++++++++++++++++ 2024/CVE-2024-49039.json | 8 ++++---- 2024/CVE-2024-50677.json | 4 ++-- 2024/CVE-2024-54679.json | 8 ++++---- 2024/CVE-2024-8856.json | 8 ++++---- README.md | 1 + 23 files changed, 107 insertions(+), 75 deletions(-) diff --git a/2018/CVE-2018-9995.json b/2018/CVE-2018-9995.json index aadb3192b7..a036f6c7cb 100644 --- a/2018/CVE-2018-9995.json +++ b/2018/CVE-2018-9995.json @@ -767,8 +767,8 @@ "description": null, "fork": false, "created_at": "2024-05-09T09:03:42Z", - "updated_at": "2024-10-20T10:45:58Z", - "pushed_at": "2024-10-20T10:45:55Z", + "updated_at": "2024-12-07T20:58:22Z", + "pushed_at": "2024-12-07T20:58:19Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2019/CVE-2019-16253.json b/2019/CVE-2019-16253.json index 6e35f2a602..e540b793ac 100644 --- a/2019/CVE-2019-16253.json +++ b/2019/CVE-2019-16253.json @@ -35,6 +35,6 @@ "forks": 15, "watchers": 77, "score": 0, - "subscribers_count": 11 + "subscribers_count": 12 } ] \ No newline at end of file diff --git a/2020/CVE-2020-17087.json b/2020/CVE-2020-17087.json index d1af6072a5..b2f02162e2 100644 --- a/2020/CVE-2020-17087.json +++ b/2020/CVE-2020-17087.json @@ -76,10 +76,10 @@ "description": "Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow", "fork": false, "created_at": "2021-07-02T16:03:16Z", - "updated_at": "2024-12-07T07:51:31Z", + "updated_at": "2024-12-07T18:58:23Z", "pushed_at": "2022-09-01T06:33:36Z", - "stargazers_count": 182, - "watchers_count": 182, + "stargazers_count": 183, + "watchers_count": 183, "has_discussions": false, "forks_count": 49, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 49, - "watchers": 182, + "watchers": 183, "score": 0, "subscribers_count": 7 }, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 12cfafbfad..3fb373cf38 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -1004,10 +1004,10 @@ "description": "Python implementation for PrintNightmare (CVE-2021-1675 \/ CVE-2021-34527)", "fork": false, "created_at": "2021-09-26T13:53:10Z", - "updated_at": "2024-12-04T12:19:38Z", + "updated_at": "2024-12-07T19:58:00Z", "pushed_at": "2021-10-17T13:29:56Z", - "stargazers_count": 181, - "watchers_count": 181, + "stargazers_count": 182, + "watchers_count": 182, "has_discussions": false, "forks_count": 30, "allow_forking": true, @@ -1019,7 +1019,7 @@ ], "visibility": "public", "forks": 30, - "watchers": 181, + "watchers": 182, "score": 0, "subscribers_count": 6 }, diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json index 64520b8e31..3cfd114b7b 100644 --- a/2021/CVE-2021-34527.json +++ b/2021/CVE-2021-34527.json @@ -113,10 +113,10 @@ "description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits", "fork": false, "created_at": "2021-07-03T15:15:12Z", - "updated_at": "2024-12-02T21:23:37Z", + "updated_at": "2024-12-07T20:17:00Z", "pushed_at": "2021-09-13T12:12:17Z", - "stargazers_count": 124, - "watchers_count": 124, + "stargazers_count": 125, + "watchers_count": 125, "has_discussions": false, "forks_count": 39, "allow_forking": true, @@ -132,7 +132,7 @@ ], "visibility": "public", "forks": 39, - "watchers": 124, + "watchers": 125, "score": 0, "subscribers_count": 7 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 5dc28533d7..2602b4234b 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -940,7 +940,7 @@ "stargazers_count": 1810, "watchers_count": 1810, "has_discussions": false, - "forks_count": 527, + "forks_count": 528, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -951,7 +951,7 @@ "security" ], "visibility": "public", - "forks": 527, + "forks": 528, "watchers": 1810, "score": 0, "subscribers_count": 26 diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 9b8fef9d02..6653d50711 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -1163,10 +1163,10 @@ "description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.", "fork": false, "created_at": "2022-03-12T20:57:24Z", - "updated_at": "2024-12-07T08:48:32Z", + "updated_at": "2024-12-07T20:37:29Z", "pushed_at": "2023-05-20T05:55:45Z", - "stargazers_count": 557, - "watchers_count": 557, + "stargazers_count": 558, + "watchers_count": 558, "has_discussions": false, "forks_count": 142, "allow_forking": true, @@ -1175,7 +1175,7 @@ "topics": [], "visibility": "public", "forks": 142, - "watchers": 557, + "watchers": 558, "score": 0, "subscribers_count": 15 }, diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index f760ff999c..db6b48597d 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -1913,10 +1913,10 @@ "description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan:支持检测:路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977", "fork": false, "created_at": "2022-06-19T13:16:55Z", - "updated_at": "2024-09-02T04:19:54Z", + "updated_at": "2024-12-08T00:10:40Z", "pushed_at": "2023-01-23T13:00:34Z", - "stargazers_count": 149, - "watchers_count": 149, + "stargazers_count": 148, + "watchers_count": 148, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -1925,7 +1925,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 149, + "watchers": 148, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-28121.json b/2023/CVE-2023-28121.json index bffe75488e..9fb3bf6cd0 100644 --- a/2023/CVE-2023-28121.json +++ b/2023/CVE-2023-28121.json @@ -146,10 +146,10 @@ "description": "Wordpress CVE-2023-28121", "fork": false, "created_at": "2023-11-03T01:19:09Z", - "updated_at": "2024-11-21T14:57:41Z", + "updated_at": "2024-12-07T21:27:58Z", "pushed_at": "2024-11-17T23:45:17Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -166,7 +166,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-32243.json b/2023/CVE-2023-32243.json index da1d7cea39..939bbf04e5 100644 --- a/2023/CVE-2023-32243.json +++ b/2023/CVE-2023-32243.json @@ -266,10 +266,10 @@ "description": "Wordpress CVE-2023-32243", "fork": false, "created_at": "2023-07-03T04:16:16Z", - "updated_at": "2024-11-18T00:07:33Z", + "updated_at": "2024-12-07T21:27:54Z", "pushed_at": "2024-11-17T23:46:50Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -284,7 +284,7 @@ ], "visibility": "public", "forks": 7, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-34960.json b/2023/CVE-2023-34960.json index a9ad6bd566..8fbdb940e8 100644 --- a/2023/CVE-2023-34960.json +++ b/2023/CVE-2023-34960.json @@ -45,10 +45,10 @@ "description": "Wordpress CVE-2023-34960", "fork": false, "created_at": "2023-07-03T11:17:42Z", - "updated_at": "2024-11-18T00:05:08Z", + "updated_at": "2024-12-07T21:27:55Z", "pushed_at": "2024-11-17T23:46:28Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -64,7 +64,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 017585172b..62fe5e9723 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,10 +14,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-12-07T17:49:21Z", + "updated_at": "2024-12-07T21:41:19Z", "pushed_at": "2024-08-18T08:26:46Z", - "stargazers_count": 1286, - "watchers_count": 1286, + "stargazers_count": 1288, + "watchers_count": 1288, "has_discussions": false, "forks_count": 218, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 218, - "watchers": 1286, + "watchers": 1288, "score": 0, "subscribers_count": 21 }, diff --git a/2023/CVE-2023-5808.json b/2023/CVE-2023-5808.json index f29bd37664..5423dca05b 100644 --- a/2023/CVE-2023-5808.json +++ b/2023/CVE-2023-5808.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2023-12-18T09:24:14Z", - "updated_at": "2023-12-18T09:24:20Z", + "updated_at": "2024-12-07T20:10:13Z", "pushed_at": "2023-12-18T09:24:17Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-10508.json b/2024/CVE-2024-10508.json index d6ffc75d0d..6d0d673ed9 100644 --- a/2024/CVE-2024-10508.json +++ b/2024/CVE-2024-10508.json @@ -45,10 +45,10 @@ "description": "This tool scans WordPress sites for vulnerabilities in the \"RegistrationMagic\" plugin (CVE-2024-10508). It checks for the presence of a specific version (`6.0.2.6`) and marks the site as vulnerable if found. The results are saved in a file (`vuln.txt`) for further analysis.", "fork": false, "created_at": "2024-11-21T04:32:19Z", - "updated_at": "2024-11-24T02:13:06Z", + "updated_at": "2024-12-07T21:27:48Z", "pushed_at": "2024-11-21T04:39:49Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -69,7 +69,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-11393.json b/2024/CVE-2024-11393.json index f021f61edd..ae35f1c96a 100644 --- a/2024/CVE-2024-11393.json +++ b/2024/CVE-2024-11393.json @@ -14,8 +14,8 @@ "description": "Technical Details and Exploit for CVE-2024-11393", "fork": false, "created_at": "2024-12-07T11:24:06Z", - "updated_at": "2024-12-07T11:24:10Z", - "pushed_at": "2024-12-07T11:24:06Z", + "updated_at": "2024-12-08T00:30:51Z", + "pushed_at": "2024-12-08T00:30:48Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-11680.json b/2024/CVE-2024-11680.json index 24612fd4dc..1b210102a6 100644 --- a/2024/CVE-2024-11680.json +++ b/2024/CVE-2024-11680.json @@ -14,10 +14,10 @@ "description": "This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues.", "fork": false, "created_at": "2024-12-04T18:42:43Z", - "updated_at": "2024-12-05T23:11:36Z", + "updated_at": "2024-12-07T21:52:28Z", "pushed_at": "2024-12-04T19:25:34Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json index e07401482a..52c617561d 100644 --- a/2024/CVE-2024-32002.json +++ b/2024/CVE-2024-32002.json @@ -76,12 +76,12 @@ "description": "Exploit PoC for CVE-2024-32002", "fork": false, "created_at": "2024-05-17T19:33:08Z", - "updated_at": "2024-12-02T19:23:32Z", + "updated_at": "2024-12-07T23:52:05Z", "pushed_at": "2024-05-19T07:12:00Z", - "stargazers_count": 516, - "watchers_count": 516, + "stargazers_count": 517, + "watchers_count": 517, "has_discussions": false, - "forks_count": 145, + "forks_count": 144, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -92,8 +92,8 @@ "rce" ], "visibility": "public", - "forks": 145, - "watchers": 516, + "forks": 144, + "watchers": 517, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-42327.json b/2024/CVE-2024-42327.json index 6ae23236ea..8c8951bad6 100644 --- a/2024/CVE-2024-42327.json +++ b/2024/CVE-2024-42327.json @@ -91,5 +91,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 900099379, + "name": "CVE-2024-42327_Zabbix_SQLI", + "full_name": "watchdog1337\/CVE-2024-42327_Zabbix_SQLI", + "owner": { + "login": "watchdog1337", + "id": 63520692, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63520692?v=4", + "html_url": "https:\/\/github.com\/watchdog1337", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/watchdog1337\/CVE-2024-42327_Zabbix_SQLI", + "description": "POC for CVE-2024-42327, an authenticated SQL Injection in Zabbix through the user.get API Method", + "fork": false, + "created_at": "2024-12-07T21:25:40Z", + "updated_at": "2024-12-07T21:57:08Z", + "pushed_at": "2024-12-07T21:57:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-49039.json b/2024/CVE-2024-49039.json index dee3491f06..1a7c23eea0 100644 --- a/2024/CVE-2024-49039.json +++ b/2024/CVE-2024-49039.json @@ -14,10 +14,10 @@ "description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler", "fork": false, "created_at": "2024-11-19T08:57:18Z", - "updated_at": "2024-12-07T01:13:34Z", + "updated_at": "2024-12-07T21:43:21Z", "pushed_at": "2024-11-19T09:15:26Z", - "stargazers_count": 76, - "watchers_count": 76, + "stargazers_count": 77, + "watchers_count": 77, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 76, + "watchers": 77, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-50677.json b/2024/CVE-2024-50677.json index c3fdd3e45a..e04b1c0772 100644 --- a/2024/CVE-2024-50677.json +++ b/2024/CVE-2024-50677.json @@ -14,8 +14,8 @@ "description": "This repository presents a proof-of-concept of CVE-2024-50677", "fork": false, "created_at": "2024-12-06T01:04:44Z", - "updated_at": "2024-12-06T16:38:29Z", - "pushed_at": "2024-12-06T16:28:44Z", + "updated_at": "2024-12-07T22:39:19Z", + "pushed_at": "2024-12-07T22:39:16Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, diff --git a/2024/CVE-2024-54679.json b/2024/CVE-2024-54679.json index 391ec23ce8..c25489ac59 100644 --- a/2024/CVE-2024-54679.json +++ b/2024/CVE-2024-54679.json @@ -14,10 +14,10 @@ "description": "CVE-2024-54679 - CyberPanel (aka Cyber Panel) Denial of Service (https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-54679)", "fork": false, "created_at": "2024-12-06T06:02:34Z", - "updated_at": "2024-12-06T16:41:35Z", + "updated_at": "2024-12-07T22:40:31Z", "pushed_at": "2024-12-06T06:19:42Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-8856.json b/2024/CVE-2024-8856.json index 551f6231f5..6200bb6d62 100644 --- a/2024/CVE-2024-8856.json +++ b/2024/CVE-2024-8856.json @@ -45,10 +45,10 @@ "description": "This tool scans WordPress websites for vulnerabilities in the WP Time Capsule plugin related to CVE-2024-8856. It identifies plugin versions below 1.22.22 as vulnerable and logs results to vuln.txt. Simple and efficient, it helps security researchers and admins detect and address risks quickly.", "fork": false, "created_at": "2024-11-21T04:01:27Z", - "updated_at": "2024-11-21T04:41:29Z", + "updated_at": "2024-12-07T21:27:47Z", "pushed_at": "2024-11-21T04:41:25Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -67,7 +67,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/README.md b/README.md index e89928c32f..c85cac4a65 100644 --- a/README.md +++ b/README.md @@ -6100,6 +6100,7 @@ - [aramosf/cve-2024-42327](https://github.com/aramosf/cve-2024-42327) - [compr00t/CVE-2024-42327](https://github.com/compr00t/CVE-2024-42327) - [depers-rus/CVE-2024-42327](https://github.com/depers-rus/CVE-2024-42327) +- [watchdog1337/CVE-2024-42327_Zabbix_SQLI](https://github.com/watchdog1337/CVE-2024-42327_Zabbix_SQLI) ### CVE-2024-42346 (2024-09-20)