diff --git a/2014/CVE-2014-3566.json b/2014/CVE-2014-3566.json index 1a77995875..41932cdff9 100644 --- a/2014/CVE-2014-3566.json +++ b/2014/CVE-2014-3566.json @@ -182,7 +182,7 @@ "fork": false, "created_at": "2024-11-14T04:35:59Z", "updated_at": "2025-01-05T15:26:10Z", - "pushed_at": "2025-01-14T12:58:33Z", + "pushed_at": "2025-01-14T23:24:18Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2014/CVE-2014-6271.json b/2014/CVE-2014-6271.json index c0973bec7f..90c9e04b23 100644 --- a/2014/CVE-2014-6271.json +++ b/2014/CVE-2014-6271.json @@ -1197,10 +1197,10 @@ "description": "Shellshock exploit + vulnerable environment", "fork": false, "created_at": "2016-12-07T23:38:50Z", - "updated_at": "2025-01-14T11:01:08Z", + "updated_at": "2025-01-14T21:31:10Z", "pushed_at": "2023-05-11T02:12:25Z", - "stargazers_count": 206, - "watchers_count": 206, + "stargazers_count": 207, + "watchers_count": 207, "has_discussions": false, "forks_count": 56, "allow_forking": true, @@ -1216,7 +1216,7 @@ ], "visibility": "public", "forks": 56, - "watchers": 206, + "watchers": 207, "score": 0, "subscribers_count": 5 }, diff --git a/2017/CVE-2017-12149.json b/2017/CVE-2017-12149.json index 75b082e820..38c2193b6a 100644 --- a/2017/CVE-2017-12149.json +++ b/2017/CVE-2017-12149.json @@ -81,13 +81,13 @@ "stargazers_count": 15, "watchers_count": 15, "has_discussions": false, - "forks_count": 12, + "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 12, + "forks": 13, "watchers": 15, "score": 0, "subscribers_count": 4 diff --git a/2018/CVE-2018-13379.json b/2018/CVE-2018-13379.json index 204a1b375a..27bdbf27d6 100644 --- a/2018/CVE-2018-13379.json +++ b/2018/CVE-2018-13379.json @@ -45,10 +45,10 @@ "description": "Fortigate CVE-2018-13379 - Tool to search for vulnerable Fortigate hosts in Rapid7 Project Sonar data anonymously through The Tor network.", "fork": false, "created_at": "2019-08-18T19:24:48Z", - "updated_at": "2024-01-23T11:44:08Z", + "updated_at": "2025-01-14T19:50:00Z", "pushed_at": "2024-01-23T11:44:08Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -64,7 +64,7 @@ ], "visibility": "public", "forks": 5, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 }, diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json index 8f7129ec57..11742babac 100644 --- a/2018/CVE-2018-14847.json +++ b/2018/CVE-2018-14847.json @@ -272,13 +272,13 @@ "stargazers_count": 50, "watchers_count": 50, "has_discussions": false, - "forks_count": 23, + "forks_count": 24, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 23, + "forks": 24, "watchers": 50, "score": 0, "subscribers_count": 3 diff --git a/2018/CVE-2018-16763.json b/2018/CVE-2018-16763.json index b8a18a4fa3..d5cdb6d3d1 100644 --- a/2018/CVE-2018-16763.json +++ b/2018/CVE-2018-16763.json @@ -513,5 +513,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 916783216, + "name": "CVE-2018-16763", + "full_name": "Kz0x-337\/CVE-2018-16763", + "owner": { + "login": "Kz0x-337", + "id": 193463900, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/193463900?v=4", + "html_url": "https:\/\/github.com\/Kz0x-337", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Kz0x-337\/CVE-2018-16763", + "description": null, + "fork": false, + "created_at": "2025-01-14T18:48:30Z", + "updated_at": "2025-01-14T21:50:00Z", + "pushed_at": "2025-01-14T21:49:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-6242.json b/2018/CVE-2018-6242.json index 6070440530..7087b5c840 100644 --- a/2018/CVE-2018-6242.json +++ b/2018/CVE-2018-6242.json @@ -19,7 +19,7 @@ "stargazers_count": 528, "watchers_count": 528, "has_discussions": false, - "forks_count": 55, + "forks_count": 52, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -32,7 +32,7 @@ "usb" ], "visibility": "public", - "forks": 55, + "forks": 52, "watchers": 528, "score": 0, "subscribers_count": 55 diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index b4e6979942..6e2eddaf97 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -176,10 +176,10 @@ "description": "Exploit for zerologon cve-2020-1472", "fork": false, "created_at": "2020-09-14T19:19:07Z", - "updated_at": "2025-01-03T07:40:54Z", + "updated_at": "2025-01-14T19:17:32Z", "pushed_at": "2020-10-15T18:31:15Z", - "stargazers_count": 643, - "watchers_count": 643, + "stargazers_count": 644, + "watchers_count": 644, "has_discussions": false, "forks_count": 146, "allow_forking": true, @@ -188,7 +188,7 @@ "topics": [], "visibility": "public", "forks": 146, - "watchers": 643, + "watchers": 644, "score": 0, "subscribers_count": 12 }, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index e436998756..a3c76eafea 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -725,10 +725,10 @@ "description": "Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527", "fork": false, "created_at": "2021-07-07T08:32:09Z", - "updated_at": "2024-08-24T16:04:57Z", + "updated_at": "2025-01-14T18:54:41Z", "pushed_at": "2021-07-12T09:28:16Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 19, + "watchers_count": 19, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -737,7 +737,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 18, + "watchers": 19, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-22204.json b/2021/CVE-2021-22204.json index af05a35c76..ee42414903 100644 --- a/2021/CVE-2021-22204.json +++ b/2021/CVE-2021-22204.json @@ -327,8 +327,8 @@ "description": "Exploit for CVE-2021-22204 (ExifTool) - Arbitrary Code Execution", "fork": false, "created_at": "2022-04-16T22:49:47Z", - "updated_at": "2024-10-02T07:11:43Z", - "pushed_at": "2022-06-07T23:09:29Z", + "updated_at": "2025-01-14T18:36:38Z", + "pushed_at": "2025-01-14T18:36:34Z", "stargazers_count": 39, "watchers_count": 39, "has_discussions": true, diff --git a/2022/CVE-2022-27254.json b/2022/CVE-2022-27254.json index af12cc971d..0681bd7ec5 100644 --- a/2022/CVE-2022-27254.json +++ b/2022/CVE-2022-27254.json @@ -14,10 +14,10 @@ "description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)", "fork": false, "created_at": "2022-03-23T15:03:09Z", - "updated_at": "2025-01-04T05:44:42Z", + "updated_at": "2025-01-14T19:00:22Z", "pushed_at": "2022-03-26T05:52:15Z", - "stargazers_count": 453, - "watchers_count": 453, + "stargazers_count": 454, + "watchers_count": 454, "has_discussions": false, "forks_count": 56, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 56, - "watchers": 453, + "watchers": 454, "score": 0, "subscribers_count": 21 } diff --git a/2022/CVE-2022-33679.json b/2022/CVE-2022-33679.json index e9184c0157..88ca1fa094 100644 --- a/2022/CVE-2022-33679.json +++ b/2022/CVE-2022-33679.json @@ -14,10 +14,10 @@ "description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html", "fork": false, "created_at": "2022-11-02T18:38:01Z", - "updated_at": "2024-12-13T21:06:58Z", + "updated_at": "2025-01-14T18:51:26Z", "pushed_at": "2024-11-10T17:21:28Z", - "stargazers_count": 396, - "watchers_count": 396, + "stargazers_count": 397, + "watchers_count": 397, "has_discussions": false, "forks_count": 69, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 69, - "watchers": 396, + "watchers": 397, "score": 0, "subscribers_count": 8 }, diff --git a/2023/CVE-2023-46805.json b/2023/CVE-2023-46805.json index ae82c322d5..f94e7f06aa 100644 --- a/2023/CVE-2023-46805.json +++ b/2023/CVE-2023-46805.json @@ -271,8 +271,8 @@ "description": "Parses the System Snapshot from an Ivanti Connect Secure applicance to identify possible IOCs related to CVE-2023-46805, CVE-2024-21887 and CVE-2025-0282.", "fork": false, "created_at": "2025-01-14T12:54:19Z", - "updated_at": "2025-01-14T13:36:46Z", - "pushed_at": "2025-01-14T13:36:43Z", + "updated_at": "2025-01-14T22:44:39Z", + "pushed_at": "2025-01-14T22:44:35Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-0012.json b/2024/CVE-2024-0012.json deleted file mode 100644 index ed4e3b40fc..0000000000 --- a/2024/CVE-2024-0012.json +++ /dev/null @@ -1,286 +0,0 @@ -[ - { - "id": 890817341, - "name": "palo-alto-panos-cve-2024-0012", - "full_name": "watchtowrlabs\/palo-alto-panos-cve-2024-0012", - "owner": { - "login": "watchtowrlabs", - "id": 99977116, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99977116?v=4", - "html_url": "https:\/\/github.com\/watchtowrlabs", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/watchtowrlabs\/palo-alto-panos-cve-2024-0012", - "description": null, - "fork": false, - "created_at": "2024-11-19T08:29:32Z", - "updated_at": "2025-01-02T13:11:27Z", - "pushed_at": "2024-11-19T09:28:42Z", - "stargazers_count": 25, - "watchers_count": 25, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 25, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 890899855, - "name": "CVE-2024-0012-POC", - "full_name": "Sachinart\/CVE-2024-0012-POC", - "owner": { - "login": "Sachinart", - "id": 18497191, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18497191?v=4", - "html_url": "https:\/\/github.com\/Sachinart", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Sachinart\/CVE-2024-0012-POC", - "description": "CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC", - "fork": false, - "created_at": "2024-11-19T11:30:25Z", - "updated_at": "2024-12-05T00:53:26Z", - "pushed_at": "2024-11-19T11:37:09Z", - "stargazers_count": 15, - "watchers_count": 15, - "has_discussions": false, - "forks_count": 5, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 5, - "watchers": 15, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 891583314, - "name": "CVE-2024-0012", - "full_name": "greaselovely\/CVE-2024-0012", - "owner": { - "login": "greaselovely", - "id": 71092239, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71092239?v=4", - "html_url": "https:\/\/github.com\/greaselovely", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/greaselovely\/CVE-2024-0012", - "description": "PANW NGFW CVE-2024-0012", - "fork": false, - "created_at": "2024-11-20T15:35:29Z", - "updated_at": "2024-11-22T20:10:24Z", - "pushed_at": "2024-11-22T20:10:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 891832016, - "name": "CVE-2024-0012", - "full_name": "VegetableLasagne\/CVE-2024-0012", - "owner": { - "login": "VegetableLasagne", - "id": 118773543, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118773543?v=4", - "html_url": "https:\/\/github.com\/VegetableLasagne", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/VegetableLasagne\/CVE-2024-0012", - "description": "Palo Alto CVE-2024-0012 Exploit POC", - "fork": false, - "created_at": "2024-11-21T03:08:00Z", - "updated_at": "2024-11-21T03:08:47Z", - "pushed_at": "2024-11-21T03:08:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 892487345, - "name": "CVE-2024-0012-poc", - "full_name": "iSee857\/CVE-2024-0012-poc", - "owner": { - "login": "iSee857", - "id": 73977770, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73977770?v=4", - "html_url": "https:\/\/github.com\/iSee857", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/iSee857\/CVE-2024-0012-poc", - "description": "CVE-2024-0012批量检测脚本", - "fork": false, - "created_at": "2024-11-22T07:52:11Z", - "updated_at": "2024-11-26T07:38:23Z", - "pushed_at": "2024-11-26T07:38:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 892650578, - "name": "cve-2024-0012-poc", - "full_name": "XiaomingX\/cve-2024-0012-poc", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-0012-poc", - "description": "CVE-2024-0012是Palo Alto Networks PAN-OS软件中的一个身份验证绕过漏洞。该漏洞允许未经身份验证的攻击者通过网络访问管理Web界面,获取PAN-OS管理员权限,从而执行管理操作、篡改配置,或利用其他需要身份验证的特权提升漏洞(如CVE-2024-9474) ", - "fork": false, - "created_at": "2024-11-22T14:11:56Z", - "updated_at": "2025-01-13T18:17:29Z", - "pushed_at": "2024-11-22T14:37:04Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 892819901, - "name": "Paloalto-CVE-2024-0012", - "full_name": "punitdarji\/Paloalto-CVE-2024-0012", - "owner": { - "login": "punitdarji", - "id": 38101321, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38101321?v=4", - "html_url": "https:\/\/github.com\/punitdarji", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/punitdarji\/Paloalto-CVE-2024-0012", - "description": null, - "fork": false, - "created_at": "2024-11-22T20:58:17Z", - "updated_at": "2024-11-22T21:00:08Z", - "pushed_at": "2024-11-22T21:00:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 896532665, - "name": "CVE-2024-0012", - "full_name": "0xjessie21\/CVE-2024-0012", - "owner": { - "login": "0xjessie21", - "id": 2928054, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2928054?v=4", - "html_url": "https:\/\/github.com\/0xjessie21", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/0xjessie21\/CVE-2024-0012", - "description": "CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC", - "fork": false, - "created_at": "2024-11-30T16:06:02Z", - "updated_at": "2024-12-02T02:33:44Z", - "pushed_at": "2024-12-02T02:33:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2024-0012", - "exploit", - "paloaltonetworks" - ], - "visibility": "public", - "forks": 3, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 902007048, - "name": "CVE-2024-0012_CVE-2024-9474_PoC", - "full_name": "TalatumLabs\/CVE-2024-0012_CVE-2024-9474_PoC", - "owner": { - "login": "TalatumLabs", - "id": 191394406, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/191394406?v=4", - "html_url": "https:\/\/github.com\/TalatumLabs", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/TalatumLabs\/CVE-2024-0012_CVE-2024-9474_PoC", - "description": "This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This script automates the exploitation process, including payload creation, chunked delivery, and seamless command execution.", - "fork": false, - "created_at": "2024-12-11T18:13:32Z", - "updated_at": "2024-12-14T02:34:33Z", - "pushed_at": "2024-12-12T15:48:10Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-0023.json b/2024/CVE-2024-0023.json index 685e63f00c..4b8e5de2a1 100644 --- a/2024/CVE-2024-0023.json +++ b/2024/CVE-2024-0023.json @@ -1,35 +1,4 @@ [ - { - "id": 835151018, - "name": "G3_Frameworks_av_CVE-2024-0023", - "full_name": "AbrarKhan\/G3_Frameworks_av_CVE-2024-0023", - "owner": { - "login": "AbrarKhan", - "id": 3054615, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3054615?v=4", - "html_url": "https:\/\/github.com\/AbrarKhan", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/AbrarKhan\/G3_Frameworks_av_CVE-2024-0023", - "description": null, - "fork": false, - "created_at": "2024-07-29T09:06:34Z", - "updated_at": "2024-07-29T10:47:59Z", - "pushed_at": "2024-07-29T10:48:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 851627563, "name": "frameworks_av_android10_r33_CVE-2024-0023", diff --git a/2024/CVE-2024-0030.json b/2024/CVE-2024-0030.json deleted file mode 100644 index e1185bcbf1..0000000000 --- a/2024/CVE-2024-0030.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 840219760, - "name": "system_bt_CVE-2024-0030", - "full_name": "uthrasri\/system_bt_CVE-2024-0030", - "owner": { - "login": "uthrasri", - "id": 145666390, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4", - "html_url": "https:\/\/github.com\/uthrasri", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/uthrasri\/system_bt_CVE-2024-0030", - "description": null, - "fork": false, - "created_at": "2024-08-09T08:17:31Z", - "updated_at": "2024-08-09T08:54:42Z", - "pushed_at": "2024-08-09T08:18:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-0040.json b/2024/CVE-2024-0040.json deleted file mode 100644 index ae8819cfc5..0000000000 --- a/2024/CVE-2024-0040.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 835214655, - "name": "frameworks_av_AOSP10_r33_CVE-2024-0040", - "full_name": "nidhihcl75\/frameworks_av_AOSP10_r33_CVE-2024-0040", - "owner": { - "login": "nidhihcl75", - "id": 176363052, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176363052?v=4", - "html_url": "https:\/\/github.com\/nidhihcl75", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/nidhihcl75\/frameworks_av_AOSP10_r33_CVE-2024-0040", - "description": null, - "fork": false, - "created_at": "2024-07-29T11:45:41Z", - "updated_at": "2024-07-29T11:48:59Z", - "pushed_at": "2024-07-29T11:48:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 838678998, - "name": "frameworks_av_CVE-2024-0040", - "full_name": "uthrasri\/frameworks_av_CVE-2024-0040", - "owner": { - "login": "uthrasri", - "id": 145666390, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4", - "html_url": "https:\/\/github.com\/uthrasri", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/uthrasri\/frameworks_av_CVE-2024-0040", - "description": null, - "fork": false, - "created_at": "2024-08-06T06:13:59Z", - "updated_at": "2024-08-08T06:18:28Z", - "pushed_at": "2024-08-08T06:18:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index fc27b02914..e0c27700e0 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -92,161 +92,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 827491098, - "name": "c-CVE-2024-0044", - "full_name": "007CRIPTOGRAFIA\/c-CVE-2024-0044", - "owner": { - "login": "007CRIPTOGRAFIA", - "id": 122584002, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122584002?v=4", - "html_url": "https:\/\/github.com\/007CRIPTOGRAFIA", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/007CRIPTOGRAFIA\/c-CVE-2024-0044", - "description": "CVE-2024-0044: uma vulnerabilidade de alta gravidade do tipo \"executar como qualquer aplicativo\" que afeta as versões 12 e 13 do Android", - "fork": false, - "created_at": "2024-07-11T18:46:45Z", - "updated_at": "2024-12-21T23:23:38Z", - "pushed_at": "2024-07-11T18:51:19Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 828846934, - "name": "CVE-2024-0044-EXP", - "full_name": "Kai2er\/CVE-2024-0044-EXP", - "owner": { - "login": "Kai2er", - "id": 40434718, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40434718?v=4", - "html_url": "https:\/\/github.com\/Kai2er", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Kai2er\/CVE-2024-0044-EXP", - "description": "利用CVE-2024-0044 在Android12、13 没有root'下进行数据备份 用法.\/CVE-2024-0044-EXP.sh ", - "fork": false, - "created_at": "2024-07-15T08:45:44Z", - "updated_at": "2024-07-15T13:20:04Z", - "pushed_at": "2024-07-15T09:00:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 836910059, - "name": "cve_2024_0044", - "full_name": "hunter24x24\/cve_2024_0044", - "owner": { - "login": "hunter24x24", - "id": 117602676, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117602676?v=4", - "html_url": "https:\/\/github.com\/hunter24x24", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/hunter24x24\/cve_2024_0044", - "description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13", - "fork": false, - "created_at": "2024-08-01T20:14:22Z", - "updated_at": "2024-08-09T00:09:24Z", - "pushed_at": "2024-08-01T20:18:19Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 837927961, - "name": "EvilDroid", - "full_name": "nexussecelite\/EvilDroid", - "owner": { - "login": "nexussecelite", - "id": 92028299, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92028299?v=4", - "html_url": "https:\/\/github.com\/nexussecelite", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/nexussecelite\/EvilDroid", - "description": "EvilDroid automates the exploitation of CVE-2024-0044, installing malicious payloads on a target device and extracting sensitive data. It features automated ADB connection checks, APK pushing, UID extraction, payload generation, and real-time progress updates, providing a seamless and professional user experience.", - "fork": false, - "created_at": "2024-08-04T13:14:10Z", - "updated_at": "2024-12-21T23:23:19Z", - "pushed_at": "2024-08-05T14:13:18Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 842052431, - "name": "CVE-2024-0044", - "full_name": "nahid0x1\/CVE-2024-0044", - "owner": { - "login": "nahid0x1", - "id": 76641588, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76641588?v=4", - "html_url": "https:\/\/github.com\/nahid0x1", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/nahid0x1\/CVE-2024-0044", - "description": "a vulnerability affecting Android version 12 & 13", - "fork": false, - "created_at": "2024-08-13T15:15:47Z", - "updated_at": "2024-12-21T23:23:45Z", - "pushed_at": "2024-08-13T15:20:44Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 5, - "score": 0, - "subscribers_count": 1 - }, { "id": 844326639, "name": "cve-2024-0044", @@ -312,36 +157,5 @@ "watchers": 133, "score": 0, "subscribers_count": 3 - }, - { - "id": 900948558, - "name": "CVE-2024-0044-", - "full_name": "Dit-Developers\/CVE-2024-0044-", - "owner": { - "login": "Dit-Developers", - "id": 173141993, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173141993?v=4", - "html_url": "https:\/\/github.com\/Dit-Developers", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Dit-Developers\/CVE-2024-0044-", - "description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13", - "fork": false, - "created_at": "2024-12-09T19:05:57Z", - "updated_at": "2024-12-09T19:16:22Z", - "pushed_at": "2024-12-09T19:16:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-0049.json b/2024/CVE-2024-0049.json index ab12d9810d..f81d0c3d70 100644 --- a/2024/CVE-2024-0049.json +++ b/2024/CVE-2024-0049.json @@ -1,35 +1,4 @@ [ - { - "id": 835201651, - "name": "frameworks_av_AOSP10_r33_CVE-2024-0049", - "full_name": "nidhihcl75\/frameworks_av_AOSP10_r33_CVE-2024-0049", - "owner": { - "login": "nidhihcl75", - "id": 176363052, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176363052?v=4", - "html_url": "https:\/\/github.com\/nidhihcl75", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/nidhihcl75\/frameworks_av_AOSP10_r33_CVE-2024-0049", - "description": null, - "fork": false, - "created_at": "2024-07-29T11:12:32Z", - "updated_at": "2024-07-29T11:15:32Z", - "pushed_at": "2024-07-29T11:15:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 851611620, "name": "frameworks_av_android10_r33_CVE-2024-0049", diff --git a/2024/CVE-2024-0311.json b/2024/CVE-2024-0311.json deleted file mode 100644 index c831bfc313..0000000000 --- a/2024/CVE-2024-0311.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 880277050, - "name": "CVE-2024-0311", - "full_name": "calligraf0\/CVE-2024-0311", - "owner": { - "login": "calligraf0", - "id": 115566010, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115566010?v=4", - "html_url": "https:\/\/github.com\/calligraf0", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/calligraf0\/CVE-2024-0311", - "description": "Exploit for CVE-2024-0311", - "fork": false, - "created_at": "2024-10-29T12:47:18Z", - "updated_at": "2025-01-12T17:02:00Z", - "pushed_at": "2024-10-30T16:07:45Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 8, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-0582.json b/2024/CVE-2024-0582.json index 3b36ef483e..87ac7a95f3 100644 --- a/2024/CVE-2024-0582.json +++ b/2024/CVE-2024-0582.json @@ -91,81 +91,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 866966019, - "name": "CVE-2024-0582", - "full_name": "geniuszly\/CVE-2024-0582", - "owner": { - "login": "geniuszly", - "id": 137893386, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4", - "html_url": "https:\/\/github.com\/geniuszly", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-0582", - "description": "is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)", - "fork": false, - "created_at": "2024-10-03T07:56:36Z", - "updated_at": "2024-12-30T14:40:46Z", - "pushed_at": "2024-10-03T07:58:47Z", - "stargazers_count": 11, - "watchers_count": 11, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "buffer-overflow", - "cve", - "cve-2024-0582", - "ethical-hacking", - "exploit", - "exploit-development", - "iouring", - "iouring-exploit", - "poc", - "security", - "vuln", - "vulnerability", - "vulnerability-research" - ], - "visibility": "public", - "forks": 1, - "watchers": 11, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 903915508, - "name": "CVE-2024-0582", - "full_name": "101010zyl\/CVE-2024-0582", - "owner": { - "login": "101010zyl", - "id": 64526492, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64526492?v=4", - "html_url": "https:\/\/github.com\/101010zyl", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/101010zyl\/CVE-2024-0582", - "description": "A data-only attack based on CVE-2024-0582", - "fork": false, - "created_at": "2024-12-15T21:56:41Z", - "updated_at": "2024-12-15T22:21:17Z", - "pushed_at": "2024-12-15T22:21:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-0741.json b/2024/CVE-2024-0741.json deleted file mode 100644 index 5e95a889e0..0000000000 --- a/2024/CVE-2024-0741.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 841296829, - "name": "Firefox-ANGLE-CVE-2024-0741", - "full_name": "HyHy100\/Firefox-ANGLE-CVE-2024-0741", - "owner": { - "login": "HyHy100", - "id": 21271840, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21271840?v=4", - "html_url": "https:\/\/github.com\/HyHy100", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/HyHy100\/Firefox-ANGLE-CVE-2024-0741", - "description": "PoC for an OOB write vulnerability I reported to Mozilla in ANGLE Translator (aka WebGL Shader Compiler).", - "fork": false, - "created_at": "2024-08-12T05:57:34Z", - "updated_at": "2024-09-11T13:40:15Z", - "pushed_at": "2024-08-12T07:26:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10015.json b/2024/CVE-2024-10015.json deleted file mode 100644 index e519511f19..0000000000 --- a/2024/CVE-2024-10015.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 890490572, - "name": "CVE-2024-10015", - "full_name": "windz3r0day\/CVE-2024-10015", - "owner": { - "login": "windz3r0day", - "id": 179751303, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179751303?v=4", - "html_url": "https:\/\/github.com\/windz3r0day", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-10015", - "description": "CVE-2024-10015 poc exploit", - "fork": false, - "created_at": "2024-11-18T16:53:43Z", - "updated_at": "2024-11-24T07:51:55Z", - "pushed_at": "2024-11-18T19:56:03Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10124.json b/2024/CVE-2024-10124.json deleted file mode 100644 index 6948313c01..0000000000 --- a/2024/CVE-2024-10124.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 902440180, - "name": "CVE-2024-10124", - "full_name": "RandomRobbieBF\/CVE-2024-10124", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10124", - "description": "Vayu Blocks – Gutenberg Blocks for WordPress & WooCommerce <= 1.1.1 - Missing Authorization to Unauthenticated Arbitrary Plugin Installation\/Activation", - "fork": false, - "created_at": "2024-12-12T15:13:30Z", - "updated_at": "2024-12-13T10:33:26Z", - "pushed_at": "2024-12-12T15:14:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 912532095, - "name": "CVE-2024-10124-Poc", - "full_name": "Nxploited\/CVE-2024-10124-Poc", - "owner": { - "login": "Nxploited", - "id": 188819918, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4", - "html_url": "https:\/\/github.com\/Nxploited", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-10124-Poc", - "description": null, - "fork": false, - "created_at": "2025-01-05T20:42:10Z", - "updated_at": "2025-01-05T21:12:38Z", - "pushed_at": "2025-01-05T21:12:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10140.json b/2024/CVE-2024-10140.json deleted file mode 100644 index b7e81d3c4c..0000000000 --- a/2024/CVE-2024-10140.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 875667904, - "name": "CVE-2024-10140", - "full_name": "holypryx\/CVE-2024-10140", - "owner": { - "login": "holypryx", - "id": 182792867, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/182792867?v=4", - "html_url": "https:\/\/github.com\/holypryx", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/holypryx\/CVE-2024-10140", - "description": null, - "fork": false, - "created_at": "2024-10-20T15:29:14Z", - "updated_at": "2024-10-22T10:02:17Z", - "pushed_at": "2024-10-20T15:31:02Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10220.json b/2024/CVE-2024-10220.json deleted file mode 100644 index a0fbb0852c..0000000000 --- a/2024/CVE-2024-10220.json +++ /dev/null @@ -1,157 +0,0 @@ -[ - { - "id": 891905563, - "name": "CVE-2024-10220-githooks", - "full_name": "mochizuki875\/CVE-2024-10220-githooks", - "owner": { - "login": "mochizuki875", - "id": 37737691, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37737691?v=4", - "html_url": "https:\/\/github.com\/mochizuki875", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/mochizuki875\/CVE-2024-10220-githooks", - "description": "CVE-2024-10220 Test repo", - "fork": false, - "created_at": "2024-11-21T06:59:21Z", - "updated_at": "2024-11-21T08:25:57Z", - "pushed_at": "2024-11-21T07:28:49Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 895963991, - "name": "cve-2024-10220", - "full_name": "any2sec\/cve-2024-10220", - "owner": { - "login": "any2sec", - "id": 43882657, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43882657?v=4", - "html_url": "https:\/\/github.com\/any2sec", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/any2sec\/cve-2024-10220", - "description": null, - "fork": false, - "created_at": "2024-11-29T09:20:30Z", - "updated_at": "2024-11-29T11:24:03Z", - "pushed_at": "2024-11-29T11:24:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 896713036, - "name": "cve-2024-10220-githooks", - "full_name": "XiaomingX\/cve-2024-10220-githooks", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-10220-githooks", - "description": "CVE-2024-10220 Test repo", - "fork": false, - "created_at": "2024-12-01T05:15:25Z", - "updated_at": "2025-01-13T18:16:22Z", - "pushed_at": "2024-12-01T05:18:39Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 903715059, - "name": "CVE-2024-10220", - "full_name": "filipzag\/CVE-2024-10220", - "owner": { - "login": "filipzag", - "id": 35038922, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35038922?v=4", - "html_url": "https:\/\/github.com\/filipzag", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/filipzag\/CVE-2024-10220", - "description": null, - "fork": false, - "created_at": "2024-12-15T11:25:42Z", - "updated_at": "2024-12-15T11:34:25Z", - "pushed_at": "2024-12-15T11:34:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 904610222, - "name": "poc-CVE-2024-10220", - "full_name": "candranapits\/poc-CVE-2024-10220", - "owner": { - "login": "candranapits", - "id": 6848647, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6848647?v=4", - "html_url": "https:\/\/github.com\/candranapits", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/candranapits\/poc-CVE-2024-10220", - "description": "CVE-2024-10220 POC", - "fork": false, - "created_at": "2024-12-17T08:17:58Z", - "updated_at": "2024-12-17T08:22:35Z", - "pushed_at": "2024-12-17T08:19:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10245.json b/2024/CVE-2024-10245.json deleted file mode 100644 index ff2cfd2e8d..0000000000 --- a/2024/CVE-2024-10245.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 889946220, - "name": "CVE-2024-10245", - "full_name": "RandomRobbieBF\/CVE-2024-10245", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10245", - "description": "Relais 2FA <= 1.0 - Authentication Bypass", - "fork": false, - "created_at": "2024-11-17T16:34:28Z", - "updated_at": "2024-11-17T16:35:09Z", - "pushed_at": "2024-11-17T16:35:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10354.json b/2024/CVE-2024-10354.json deleted file mode 100644 index 46cb5d6152..0000000000 --- a/2024/CVE-2024-10354.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 877188085, - "name": "CVE-2024-10354", - "full_name": "K1nakoo\/CVE-2024-10354", - "owner": { - "login": "K1nakoo", - "id": 105909793, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105909793?v=4", - "html_url": "https:\/\/github.com\/K1nakoo", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/K1nakoo\/CVE-2024-10354", - "description": null, - "fork": false, - "created_at": "2024-10-23T08:37:18Z", - "updated_at": "2024-10-26T13:50:18Z", - "pushed_at": "2024-10-23T08:37:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10355.json b/2024/CVE-2024-10355.json deleted file mode 100644 index 0ca04ad996..0000000000 --- a/2024/CVE-2024-10355.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 877198778, - "name": "CVE-2024-10355", - "full_name": "K1nakoo\/CVE-2024-10355", - "owner": { - "login": "K1nakoo", - "id": 105909793, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105909793?v=4", - "html_url": "https:\/\/github.com\/K1nakoo", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/K1nakoo\/CVE-2024-10355", - "description": null, - "fork": false, - "created_at": "2024-10-23T08:59:51Z", - "updated_at": "2024-10-26T13:50:29Z", - "pushed_at": "2024-10-23T09:00:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10400.json b/2024/CVE-2024-10400.json deleted file mode 100644 index bb66f1b7ee..0000000000 --- a/2024/CVE-2024-10400.json +++ /dev/null @@ -1,36 +0,0 @@ -[ - { - "id": 910972988, - "name": "CVE-2024-10400", - "full_name": "k0ns0l\/CVE-2024-10400", - "owner": { - "login": "k0ns0l", - "id": 55334728, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55334728?v=4", - "html_url": "https:\/\/github.com\/k0ns0l", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/k0ns0l\/CVE-2024-10400", - "description": "[POC][Exploit] CVE-2024-10400", - "fork": false, - "created_at": "2025-01-02T00:12:53Z", - "updated_at": "2025-01-07T10:09:30Z", - "pushed_at": "2025-01-02T00:31:14Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "tutor-lms", - "wordpress" - ], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10410.json b/2024/CVE-2024-10410.json deleted file mode 100644 index 7d224a899f..0000000000 --- a/2024/CVE-2024-10410.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 878506568, - "name": "CVE-2024-10410", - "full_name": "K1nakoo\/CVE-2024-10410", - "owner": { - "login": "K1nakoo", - "id": 105909793, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105909793?v=4", - "html_url": "https:\/\/github.com\/K1nakoo", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/K1nakoo\/CVE-2024-10410", - "description": null, - "fork": false, - "created_at": "2024-10-25T14:15:56Z", - "updated_at": "2024-10-26T13:44:39Z", - "pushed_at": "2024-10-25T14:16:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10448.json b/2024/CVE-2024-10448.json deleted file mode 100644 index 1f8677fd5c..0000000000 --- a/2024/CVE-2024-10448.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 879406614, - "name": "CVE-2024-10448", - "full_name": "bevennyamande\/CVE-2024-10448", - "owner": { - "login": "bevennyamande", - "id": 10162710, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10162710?v=4", - "html_url": "https:\/\/github.com\/bevennyamande", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/bevennyamande\/CVE-2024-10448", - "description": "Blood bank CSRF Attack POC", - "fork": false, - "created_at": "2024-10-27T20:18:35Z", - "updated_at": "2024-10-28T18:48:37Z", - "pushed_at": "2024-10-27T22:12:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10449.json b/2024/CVE-2024-10449.json deleted file mode 100644 index 208d6f814a..0000000000 --- a/2024/CVE-2024-10449.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 883977165, - "name": "CVE-2024-10449-patch", - "full_name": "g-u-i-d\/CVE-2024-10449-patch", - "owner": { - "login": "g-u-i-d", - "id": 3040892, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3040892?v=4", - "html_url": "https:\/\/github.com\/g-u-i-d", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/g-u-i-d\/CVE-2024-10449-patch", - "description": null, - "fork": false, - "created_at": "2024-11-05T23:06:49Z", - "updated_at": "2024-11-05T23:15:23Z", - "pushed_at": "2024-11-05T23:15:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10470.json b/2024/CVE-2024-10470.json deleted file mode 100644 index fb2b0cbcd5..0000000000 --- a/2024/CVE-2024-10470.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 885543843, - "name": "CVE-2024-10470", - "full_name": "RandomRobbieBF\/CVE-2024-10470", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10470", - "description": "WPLMS Learning Management System for WordPress <= 4.962 – Unauthenticated Arbitrary File Read and Deletion", - "fork": false, - "created_at": "2024-11-08T19:47:34Z", - "updated_at": "2024-11-08T19:50:12Z", - "pushed_at": "2024-11-08T19:50:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 896308178, - "name": "CVE-2024-10470", - "full_name": "0xshoriful\/CVE-2024-10470", - "owner": { - "login": "0xshoriful", - "id": 167082207, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167082207?v=4", - "html_url": "https:\/\/github.com\/0xshoriful", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/0xshoriful\/CVE-2024-10470", - "description": null, - "fork": false, - "created_at": "2024-11-30T02:45:52Z", - "updated_at": "2024-11-30T02:46:38Z", - "pushed_at": "2024-11-30T02:46:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10508.json b/2024/CVE-2024-10508.json deleted file mode 100644 index da79c8bab5..0000000000 --- a/2024/CVE-2024-10508.json +++ /dev/null @@ -1,76 +0,0 @@ -[ - { - "id": 890697251, - "name": "CVE-2024-10508", - "full_name": "ubaii\/CVE-2024-10508", - "owner": { - "login": "ubaii", - "id": 31325580, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31325580?v=4", - "html_url": "https:\/\/github.com\/ubaii", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ubaii\/CVE-2024-10508", - "description": null, - "fork": false, - "created_at": "2024-11-19T02:47:59Z", - "updated_at": "2024-11-19T02:50:12Z", - "pushed_at": "2024-11-19T02:50:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 891857006, - "name": "CVE-2024-10508", - "full_name": "Jenderal92\/CVE-2024-10508", - "owner": { - "login": "Jenderal92", - "id": 59664965, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59664965?v=4", - "html_url": "https:\/\/github.com\/Jenderal92", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Jenderal92\/CVE-2024-10508", - "description": "This tool scans WordPress sites for vulnerabilities in the \"RegistrationMagic\" plugin (CVE-2024-10508). It checks for the presence of a specific version (`6.0.2.6`) and marks the site as vulnerable if found. The results are saved in a file (`vuln.txt`) for further analysis.", - "fork": false, - "created_at": "2024-11-21T04:32:19Z", - "updated_at": "2024-12-07T21:27:48Z", - "pushed_at": "2024-11-21T04:39:49Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-10508", - "cve-scanner", - "plugin-security", - "python", - "registrationmagic", - "security-tools", - "vulnerability", - "vulnerability-detection", - "vulnerability-scanner", - "wordpress", - "wordpress-security" - ], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10511.json b/2024/CVE-2024-10511.json deleted file mode 100644 index b16396cd68..0000000000 --- a/2024/CVE-2024-10511.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 908003038, - "name": "CVE-2024-10511", - "full_name": "revengsmK\/CVE-2024-10511", - "owner": { - "login": "revengsmK", - "id": 95986479, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95986479?v=4", - "html_url": "https:\/\/github.com\/revengsmK", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/revengsmK\/CVE-2024-10511", - "description": "Schneider Electric PowerChute Serial Shutdown vulnerability.", - "fork": false, - "created_at": "2024-12-24T20:50:20Z", - "updated_at": "2024-12-24T20:59:13Z", - "pushed_at": "2024-12-24T20:54:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10516.json b/2024/CVE-2024-10516.json deleted file mode 100644 index 28ec9500f1..0000000000 --- a/2024/CVE-2024-10516.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 899490028, - "name": "CVE-2024-10516", - "full_name": "RandomRobbieBF\/CVE-2024-10516", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10516", - "description": "Swift Performance Lite <= 2.3.7.1 - Unauthenticated Local PHP File Inclusion via 'ajaxify'", - "fork": false, - "created_at": "2024-12-06T11:24:19Z", - "updated_at": "2024-12-06T15:42:17Z", - "pushed_at": "2024-12-06T11:25:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10542.json b/2024/CVE-2024-10542.json deleted file mode 100644 index d997fd0d30..0000000000 --- a/2024/CVE-2024-10542.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 894757253, - "name": "CVE-2024-10542", - "full_name": "ubaii\/CVE-2024-10542", - "owner": { - "login": "ubaii", - "id": 31325580, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31325580?v=4", - "html_url": "https:\/\/github.com\/ubaii", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ubaii\/CVE-2024-10542", - "description": "WordPress Spam protection, AntiSpam, FireWall by CleanTalk Plugin <= 6.43.2 is vulnerable to Unauthenticated Arbitrary Plugin Installation", - "fork": false, - "created_at": "2024-11-26T23:47:17Z", - "updated_at": "2024-11-28T11:51:19Z", - "pushed_at": "2024-11-26T23:49:15Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10557.json b/2024/CVE-2024-10557.json deleted file mode 100644 index 8d65df2645..0000000000 --- a/2024/CVE-2024-10557.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 879936174, - "name": "CVE-2024-10557", - "full_name": "bevennyamande\/CVE-2024-10557", - "owner": { - "login": "bevennyamande", - "id": 10162710, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10162710?v=4", - "html_url": "https:\/\/github.com\/bevennyamande", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/bevennyamande\/CVE-2024-10557", - "description": "A CSRF POC for Updating the Profile of a Hospital leading to Account Takeover", - "fork": false, - "created_at": "2024-10-28T20:14:45Z", - "updated_at": "2024-10-30T21:38:18Z", - "pushed_at": "2024-10-28T20:40:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10571.json b/2024/CVE-2024-10571.json deleted file mode 100644 index 5cde6e7cf3..0000000000 --- a/2024/CVE-2024-10571.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 916037793, - "name": "CVE-2024-10571", - "full_name": "RandomRobbieBF\/CVE-2024-10571", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10571", - "description": "Chartify – WordPress Chart Plugin <= 2.9.5 - Unauthenticated Local File Inclusion via source", - "fork": false, - "created_at": "2025-01-13T10:38:31Z", - "updated_at": "2025-01-14T12:39:22Z", - "pushed_at": "2025-01-13T10:38:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10586.json b/2024/CVE-2024-10586.json deleted file mode 100644 index bdd689d8b8..0000000000 --- a/2024/CVE-2024-10586.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 886165127, - "name": "CVE-2024-10586", - "full_name": "RandomRobbieBF\/CVE-2024-10586", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10586", - "description": "Debug Tool <= 2.2 - Unauthenticated Arbitrary File Creation", - "fork": false, - "created_at": "2024-11-10T11:30:05Z", - "updated_at": "2024-11-15T13:24:00Z", - "pushed_at": "2024-11-10T11:30:46Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 915504134, - "name": "CVE-2024-10586-Poc", - "full_name": "Nxploited\/CVE-2024-10586-Poc", - "owner": { - "login": "Nxploited", - "id": 188819918, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4", - "html_url": "https:\/\/github.com\/Nxploited", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-10586-Poc", - "description": null, - "fork": false, - "created_at": "2025-01-12T02:41:24Z", - "updated_at": "2025-01-12T03:10:42Z", - "pushed_at": "2025-01-12T03:10:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10592.json b/2024/CVE-2024-10592.json deleted file mode 100644 index dbfffaebc4..0000000000 --- a/2024/CVE-2024-10592.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 890584132, - "name": "CVE-2024-10592", - "full_name": "windz3r0day\/CVE-2024-10592", - "owner": { - "login": "windz3r0day", - "id": 179751303, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179751303?v=4", - "html_url": "https:\/\/github.com\/windz3r0day", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-10592", - "description": "CVE-2024-10592 poc exploit ", - "fork": false, - "created_at": "2024-11-18T20:34:38Z", - "updated_at": "2024-11-18T20:51:34Z", - "pushed_at": "2024-11-18T20:39:29Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10605.json b/2024/CVE-2024-10605.json deleted file mode 100644 index c9577a23ca..0000000000 --- a/2024/CVE-2024-10605.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 881099968, - "name": "CVE-2024-10605", - "full_name": "bevennyamande\/CVE-2024-10605", - "owner": { - "login": "bevennyamande", - "id": 10162710, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10162710?v=4", - "html_url": "https:\/\/github.com\/bevennyamande", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/bevennyamande\/CVE-2024-10605", - "description": null, - "fork": false, - "created_at": "2024-10-30T22:56:24Z", - "updated_at": "2024-11-03T23:41:01Z", - "pushed_at": "2024-10-30T23:06:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10629.json b/2024/CVE-2024-10629.json deleted file mode 100644 index ea1ffa96c8..0000000000 --- a/2024/CVE-2024-10629.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 887379678, - "name": "CVE-2024-10629", - "full_name": "RandomRobbieBF\/CVE-2024-10629", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10629", - "description": "GPX Viewer <= 2.2.8 - Authenticated (Subscriber+) Arbitrary File Creation", - "fork": false, - "created_at": "2024-11-12T16:36:20Z", - "updated_at": "2024-11-12T16:38:23Z", - "pushed_at": "2024-11-12T16:38:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10654.json b/2024/CVE-2024-10654.json deleted file mode 100644 index 593ff98f9e..0000000000 --- a/2024/CVE-2024-10654.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 881183952, - "name": "IoT_vuln", - "full_name": "c0nyy\/IoT_vuln", - "owner": { - "login": "c0nyy", - "id": 146458543, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146458543?v=4", - "html_url": "https:\/\/github.com\/c0nyy", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/c0nyy\/IoT_vuln", - "description": "POC CVE-2024-10654", - "fork": false, - "created_at": "2024-10-31T03:48:22Z", - "updated_at": "2024-11-01T14:25:39Z", - "pushed_at": "2024-11-01T14:18:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-1071.json b/2024/CVE-2024-1071.json index 41e4c77e19..9d2539379e 100644 --- a/2024/CVE-2024-1071.json +++ b/2024/CVE-2024-1071.json @@ -184,36 +184,5 @@ "watchers": 2, "score": 0, "subscribers_count": 1 - }, - { - "id": 881948753, - "name": "CVE-2024-1071-PoC-Script", - "full_name": "Spid3heX\/CVE-2024-1071-PoC-Script", - "owner": { - "login": "Spid3heX", - "id": 183846301, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/183846301?v=4", - "html_url": "https:\/\/github.com\/Spid3heX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Spid3heX\/CVE-2024-1071-PoC-Script", - "description": "wp\/ultimate-member - SQL Injection Vulnerability Exploit Script.", - "fork": false, - "created_at": "2024-11-01T14:57:34Z", - "updated_at": "2024-11-03T03:53:40Z", - "pushed_at": "2024-11-01T18:14:34Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-10728.json b/2024/CVE-2024-10728.json deleted file mode 100644 index 90ac245fe5..0000000000 --- a/2024/CVE-2024-10728.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 889424362, - "name": "CVE-2024-10728", - "full_name": "RandomRobbieBF\/CVE-2024-10728", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10728", - "description": "PostX <= 4.1.16 - Missing Authorization to Arbitrary Plugin Installation\/Activation", - "fork": false, - "created_at": "2024-11-16T10:51:56Z", - "updated_at": "2024-11-16T11:00:46Z", - "pushed_at": "2024-11-16T11:00:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10793.json b/2024/CVE-2024-10793.json deleted file mode 100644 index bc08d59321..0000000000 --- a/2024/CVE-2024-10793.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 889993152, - "name": "CVE-2024-10793", - "full_name": "windz3r0day\/CVE-2024-10793", - "owner": { - "login": "windz3r0day", - "id": 179751303, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179751303?v=4", - "html_url": "https:\/\/github.com\/windz3r0day", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-10793", - "description": "CVE-2024-10793 poc exploit", - "fork": false, - "created_at": "2024-11-17T18:44:53Z", - "updated_at": "2025-01-03T14:51:08Z", - "pushed_at": "2024-11-17T19:51:53Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 8, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 905828907, - "name": "CVE-2024-10793", - "full_name": "MAHajian\/CVE-2024-10793", - "owner": { - "login": "MAHajian", - "id": 139576061, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139576061?v=4", - "html_url": "https:\/\/github.com\/MAHajian", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/MAHajian\/CVE-2024-10793", - "description": null, - "fork": false, - "created_at": "2024-12-19T15:50:53Z", - "updated_at": "2024-12-19T16:38:19Z", - "pushed_at": "2024-12-19T16:38:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 88da66167f..9026c70b3e 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -159,67 +159,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 824093061, - "name": "CVE-2024-1086", - "full_name": "xzx482\/CVE-2024-1086", - "owner": { - "login": "xzx482", - "id": 46856523, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46856523?v=4", - "html_url": "https:\/\/github.com\/xzx482", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/xzx482\/CVE-2024-1086", - "description": null, - "fork": false, - "created_at": "2024-07-04T10:51:35Z", - "updated_at": "2024-07-04T10:54:26Z", - "pushed_at": "2024-07-04T10:54:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 904336421, - "name": "CVE-2024-1086", - "full_name": "LLfam\/CVE-2024-1086", - "owner": { - "login": "LLfam", - "id": 43279891, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43279891?v=4", - "html_url": "https:\/\/github.com\/LLfam", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/LLfam\/CVE-2024-1086", - "description": null, - "fork": false, - "created_at": "2024-12-16T17:33:13Z", - "updated_at": "2025-01-12T18:35:09Z", - "pushed_at": "2024-12-16T17:38:23Z", - "stargazers_count": 12, - "watchers_count": 12, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 12, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-10914.json b/2024/CVE-2024-10914.json deleted file mode 100644 index 5c6dad627d..0000000000 --- a/2024/CVE-2024-10914.json +++ /dev/null @@ -1,331 +0,0 @@ -[ - { - "id": 885936481, - "name": "CVE-2024-10914", - "full_name": "imnotcha0s\/CVE-2024-10914", - "owner": { - "login": "imnotcha0s", - "id": 64480742, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64480742?v=4", - "html_url": "https:\/\/github.com\/imnotcha0s", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/imnotcha0s\/CVE-2024-10914", - "description": "Exploit for cve-2024-10914: D-Link DNS-320, DNS-320LW, DNS-325, DNS-340L Version 1.00, Version 1.01.0914.2012, Version 1.01, Version 1.02, Version 1.08 Command Injection", - "fork": false, - "created_at": "2024-11-09T19:30:39Z", - "updated_at": "2024-11-27T14:57:29Z", - "pushed_at": "2024-11-09T19:31:42Z", - "stargazers_count": 11, - "watchers_count": 11, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 11, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 886174538, - "name": "CVE-2024-10914", - "full_name": "verylazytech\/CVE-2024-10914", - "owner": { - "login": "verylazytech", - "id": 172168670, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4", - "html_url": "https:\/\/github.com\/verylazytech", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/verylazytech\/CVE-2024-10914", - "description": "POC - CVE-2024–10914- Command Injection Vulnerability in `name` parameter for D-Link NAS", - "fork": false, - "created_at": "2024-11-10T12:01:21Z", - "updated_at": "2025-01-13T09:55:07Z", - "pushed_at": "2024-11-27T08:26:29Z", - "stargazers_count": 43, - "watchers_count": 43, - "has_discussions": false, - "forks_count": 12, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-10914", - "d-link-nas", - "lfi", - "lfi-exploitation", - "poc", - "rce-exploit", - "unauthenticated-rce" - ], - "visibility": "public", - "forks": 12, - "watchers": 43, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 887759528, - "name": "CVE-2024-10914", - "full_name": "Egi08\/CVE-2024-10914", - "owner": { - "login": "Egi08", - "id": 60685799, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60685799?v=4", - "html_url": "https:\/\/github.com\/Egi08", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Egi08\/CVE-2024-10914", - "description": "CVE-2024-10914_Manual testing with burpsuite ", - "fork": false, - "created_at": "2024-11-13T08:33:16Z", - "updated_at": "2024-11-16T04:27:57Z", - "pushed_at": "2024-11-13T09:39:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 888892906, - "name": "D-Link-NAS-CVE-2024-10914-", - "full_name": "Bu0uCat\/D-Link-NAS-CVE-2024-10914-", - "owner": { - "login": "Bu0uCat", - "id": 169526025, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169526025?v=4", - "html_url": "https:\/\/github.com\/Bu0uCat", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Bu0uCat\/D-Link-NAS-CVE-2024-10914-", - "description": "这是一个D-Link rce漏洞 检测程序", - "fork": false, - "created_at": "2024-11-15T07:56:21Z", - "updated_at": "2024-11-15T07:59:44Z", - "pushed_at": "2024-11-15T07:59:36Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 889560261, - "name": "CVE-2024-10914", - "full_name": "ThemeHackers\/CVE-2024-10914", - "owner": { - "login": "ThemeHackers", - "id": 107047730, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107047730?v=4", - "html_url": "https:\/\/github.com\/ThemeHackers", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ThemeHackers\/CVE-2024-10914", - "description": "CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.", - "fork": false, - "created_at": "2024-11-16T16:32:05Z", - "updated_at": "2025-01-02T08:18:01Z", - "pushed_at": "2025-01-02T08:17:57Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 895213023, - "name": "cve-2024-10914-port", - "full_name": "retuci0\/cve-2024-10914-port", - "owner": { - "login": "retuci0", - "id": 165311393, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165311393?v=4", - "html_url": "https:\/\/github.com\/retuci0", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/retuci0\/cve-2024-10914-port", - "description": "dlink vulnerability thing in python and rust", - "fork": false, - "created_at": "2024-11-27T19:11:55Z", - "updated_at": "2024-11-27T19:12:49Z", - "pushed_at": "2024-11-27T19:12:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 895284938, - "name": "CVE-2024-10914-EXPLOIT", - "full_name": "K3ysTr0K3R\/CVE-2024-10914-EXPLOIT", - "owner": { - "login": "K3ysTr0K3R", - "id": 70909693, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4", - "html_url": "https:\/\/github.com\/K3ysTr0K3R", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2024-10914-EXPLOIT", - "description": "A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)", - "fork": false, - "created_at": "2024-11-27T23:10:20Z", - "updated_at": "2024-11-27T23:33:14Z", - "pushed_at": "2024-11-27T23:31:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-10914", - "ethical-hacking", - "exploit", - "exploitation", - "hacking", - "proof-of-concept" - ], - "visibility": "public", - "forks": 2, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 898276056, - "name": "CVE-2024-10914-Exploit", - "full_name": "jahithoque\/CVE-2024-10914-Exploit", - "owner": { - "login": "jahithoque", - "id": 61009126, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61009126?v=4", - "html_url": "https:\/\/github.com\/jahithoque", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/jahithoque\/CVE-2024-10914-Exploit", - "description": "CVE-2024-10914 is a critical vulnerability affecting the D-Link DNS-320, DNS-320LW, DNS-325, and DNS-340L up to version 20241028. The function cgi_user_add in the file \/cgi-bin\/account_mgr.cgi?cmd=cgi_user_add is the culprit, allowing attackers to inject operating system commands remotely.", - "fork": false, - "created_at": "2024-12-04T05:27:36Z", - "updated_at": "2024-12-04T05:31:27Z", - "pushed_at": "2024-12-04T05:31:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 899673788, - "name": "D-Link", - "full_name": "redspy-sec\/D-Link", - "owner": { - "login": "redspy-sec", - "id": 142095788, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142095788?v=4", - "html_url": "https:\/\/github.com\/redspy-sec", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/redspy-sec\/D-Link", - "description": "CVE-2024-10914 D-Link Remote Code Execution (RCE)", - "fork": false, - "created_at": "2024-12-06T19:03:34Z", - "updated_at": "2025-01-12T18:34:06Z", - "pushed_at": "2024-12-07T07:32:30Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024", - "poc", - "rce-exploit" - ], - "visibility": "public", - "forks": 1, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 907765018, - "name": "CVE-2024-10914", - "full_name": "dragonXZH\/CVE-2024-10914", - "owner": { - "login": "dragonXZH", - "id": 191017577, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/191017577?v=4", - "html_url": "https:\/\/github.com\/dragonXZH", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/dragonXZH\/CVE-2024-10914", - "description": "A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)", - "fork": false, - "created_at": "2024-12-24T10:32:48Z", - "updated_at": "2024-12-24T10:42:23Z", - "pushed_at": "2024-12-24T10:42:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10924.json b/2024/CVE-2024-10924.json deleted file mode 100644 index 533c68e25a..0000000000 --- a/2024/CVE-2024-10924.json +++ /dev/null @@ -1,344 +0,0 @@ -[ - { - "id": 888592127, - "name": "CVE-2024-10924", - "full_name": "RandomRobbieBF\/CVE-2024-10924", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10924", - "description": " Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 – 9.1.1.1 – Authentication Bypass", - "fork": false, - "created_at": "2024-11-14T16:59:52Z", - "updated_at": "2025-01-12T18:31:17Z", - "pushed_at": "2024-11-14T17:00:59Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 890585149, - "name": "wordpress-really-simple-security-authn-bypass-vulnerable-application", - "full_name": "m3ssap0\/wordpress-really-simple-security-authn-bypass-vulnerable-application", - "owner": { - "login": "m3ssap0", - "id": 705120, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4", - "html_url": "https:\/\/github.com\/m3ssap0", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/m3ssap0\/wordpress-really-simple-security-authn-bypass-vulnerable-application", - "description": "WARNING: This is a vulnerable application to test the exploit for the Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924). Run it at your own risk!", - "fork": false, - "created_at": "2024-11-18T20:37:07Z", - "updated_at": "2024-11-25T19:14:25Z", - "pushed_at": "2024-11-19T12:19:36Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "authentication-bypass", - "cve-2024-10924", - "really-simple-security", - "vulnerable-application", - "wordpress" - ], - "visibility": "public", - "forks": 0, - "watchers": 7, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 890703149, - "name": "CVE-2024-10924", - "full_name": "MattJButler\/CVE-2024-10924", - "owner": { - "login": "MattJButler", - "id": 90148954, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90148954?v=4", - "html_url": "https:\/\/github.com\/MattJButler", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/MattJButler\/CVE-2024-10924", - "description": "Simple Python script", - "fork": false, - "created_at": "2024-11-19T03:06:49Z", - "updated_at": "2024-11-19T03:08:57Z", - "pushed_at": "2024-11-19T03:08:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 890862229, - "name": "wordpress-really-simple-security-authn-bypass-exploit", - "full_name": "m3ssap0\/wordpress-really-simple-security-authn-bypass-exploit", - "owner": { - "login": "m3ssap0", - "id": 705120, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4", - "html_url": "https:\/\/github.com\/m3ssap0", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/m3ssap0\/wordpress-really-simple-security-authn-bypass-exploit", - "description": "Exploits Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924).", - "fork": false, - "created_at": "2024-11-19T10:07:28Z", - "updated_at": "2025-01-05T19:08:18Z", - "pushed_at": "2024-11-19T12:20:16Z", - "stargazers_count": 18, - "watchers_count": 18, - "has_discussions": false, - "forks_count": 14, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-10924", - "exploit", - "really-simple-security", - "security", - "security-tools", - "vulnerability", - "vulnerability-scan", - "wordpress" - ], - "visibility": "public", - "forks": 14, - "watchers": 18, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 891508423, - "name": "CVE-2024-10924", - "full_name": "julesbsz\/CVE-2024-10924", - "owner": { - "login": "julesbsz", - "id": 38622433, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38622433?v=4", - "html_url": "https:\/\/github.com\/julesbsz", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/julesbsz\/CVE-2024-10924", - "description": "POC for CVE-2024-10924 written in Python", - "fork": false, - "created_at": "2024-11-20T13:13:15Z", - "updated_at": "2024-11-20T19:40:44Z", - "pushed_at": "2024-11-20T14:00:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-10924", - "python", - "really-simple-security", - "wordpress" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 891621160, - "name": "CVE-2024-10924-Wordpress-Docker", - "full_name": "Trackflaw\/CVE-2024-10924-Wordpress-Docker", - "owner": { - "login": "Trackflaw", - "id": 78696986, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78696986?v=4", - "html_url": "https:\/\/github.com\/Trackflaw", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Trackflaw\/CVE-2024-10924-Wordpress-Docker", - "description": "Vulnerable docker container for Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 – 9.1.1.1 – Authentication Bypass CVE-2023-50164", - "fork": false, - "created_at": "2024-11-20T16:50:24Z", - "updated_at": "2024-11-25T19:41:23Z", - "pushed_at": "2024-11-22T09:28:08Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 894993174, - "name": "CVE-2024-10924-PoC", - "full_name": "Maalfer\/CVE-2024-10924-PoC", - "owner": { - "login": "Maalfer", - "id": 96432001, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96432001?v=4", - "html_url": "https:\/\/github.com\/Maalfer", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Maalfer\/CVE-2024-10924-PoC", - "description": "Bypass del MFA en WordPress con el plugin Really Simple Security instalado entre las versiones 9.0.0 – 9.1.1.1.", - "fork": false, - "created_at": "2024-11-27T11:19:47Z", - "updated_at": "2024-11-30T06:27:28Z", - "pushed_at": "2024-11-27T14:13:57Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 896883913, - "name": "CVE-2024-10924-Bypass-MFA-Wordpress-LAB", - "full_name": "D1se0\/CVE-2024-10924-Bypass-MFA-Wordpress-LAB", - "owner": { - "login": "D1se0", - "id": 164921056, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164921056?v=4", - "html_url": "https:\/\/github.com\/D1se0", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/D1se0\/CVE-2024-10924-Bypass-MFA-Wordpress-LAB", - "description": null, - "fork": false, - "created_at": "2024-12-01T14:43:16Z", - "updated_at": "2024-12-04T11:29:31Z", - "pushed_at": "2024-12-02T08:32:47Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "bypass", - "bypass-mfa", - "bypass-wordpress", - "cibersecurity", - "cve", - "cve-2024-10924", - "exploit", - "hacking", - "hacking-etico", - "really-simple-security", - "wordpress" - ], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 897912004, - "name": "CVE-2024-10924-PoC", - "full_name": "Hunt3r850\/CVE-2024-10924-PoC", - "owner": { - "login": "Hunt3r850", - "id": 108004077, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108004077?v=4", - "html_url": "https:\/\/github.com\/Hunt3r850", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Hunt3r850\/CVE-2024-10924-PoC", - "description": null, - "fork": false, - "created_at": "2024-12-03T13:09:46Z", - "updated_at": "2024-12-03T13:13:07Z", - "pushed_at": "2024-12-03T13:10:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 897913649, - "name": "CVE-2024-10924-Wordpress-Docker", - "full_name": "Hunt3r850\/CVE-2024-10924-Wordpress-Docker", - "owner": { - "login": "Hunt3r850", - "id": 108004077, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108004077?v=4", - "html_url": "https:\/\/github.com\/Hunt3r850", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Hunt3r850\/CVE-2024-10924-Wordpress-Docker", - "description": null, - "fork": false, - "created_at": "2024-12-03T13:12:58Z", - "updated_at": "2024-12-03T13:18:30Z", - "pushed_at": "2024-12-03T13:14:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-10958.json b/2024/CVE-2024-10958.json deleted file mode 100644 index 0423b28798..0000000000 --- a/2024/CVE-2024-10958.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 886253464, - "name": "CVE-2024-10958-WPPA-Exploit", - "full_name": "reinh3rz\/CVE-2024-10958-WPPA-Exploit", - "owner": { - "login": "reinh3rz", - "id": 144375735, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144375735?v=4", - "html_url": "https:\/\/github.com\/reinh3rz", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/reinh3rz\/CVE-2024-10958-WPPA-Exploit", - "description": null, - "fork": false, - "created_at": "2024-11-10T15:43:14Z", - "updated_at": "2024-11-11T11:53:02Z", - "pushed_at": "2024-11-10T16:41:57Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11003.json b/2024/CVE-2024-11003.json deleted file mode 100644 index 8713c63323..0000000000 --- a/2024/CVE-2024-11003.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 895398083, - "name": "CVE-2024-11003-PoC", - "full_name": "unknown-user-from\/CVE-2024-11003-PoC", - "owner": { - "login": "unknown-user-from", - "id": 51774599, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51774599?v=4", - "html_url": "https:\/\/github.com\/unknown-user-from", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/unknown-user-from\/CVE-2024-11003-PoC", - "description": "CVE-2024-11003 Perl Poc", - "fork": false, - "created_at": "2024-11-28T06:13:42Z", - "updated_at": "2024-11-28T06:22:35Z", - "pushed_at": "2024-11-28T06:22:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-1112.json b/2024/CVE-2024-1112.json deleted file mode 100644 index f42479b552..0000000000 --- a/2024/CVE-2024-1112.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 837931543, - "name": "CVE-2024-1112", - "full_name": "enessakircolak\/CVE-2024-1112", - "owner": { - "login": "enessakircolak", - "id": 69612461, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69612461?v=4", - "html_url": "https:\/\/github.com\/enessakircolak", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/enessakircolak\/CVE-2024-1112", - "description": null, - "fork": false, - "created_at": "2024-08-04T13:26:46Z", - "updated_at": "2024-08-13T18:12:30Z", - "pushed_at": "2024-08-13T18:12:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11199.json b/2024/CVE-2024-11199.json deleted file mode 100644 index 045b020a18..0000000000 --- a/2024/CVE-2024-11199.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 893229030, - "name": "CVE-2024-11199", - "full_name": "windz3r0day\/CVE-2024-11199", - "owner": { - "login": "windz3r0day", - "id": 179751303, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179751303?v=4", - "html_url": "https:\/\/github.com\/windz3r0day", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-11199", - "description": "CVE-2024-11199 poc exploit", - "fork": false, - "created_at": "2024-11-23T21:43:20Z", - "updated_at": "2024-11-23T21:52:42Z", - "pushed_at": "2024-11-23T21:44:58Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11201.json b/2024/CVE-2024-11201.json deleted file mode 100644 index e030eab4f6..0000000000 --- a/2024/CVE-2024-11201.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 892997604, - "name": "CVE-2024-11201", - "full_name": "NSQAQ\/CVE-2024-11201", - "owner": { - "login": "NSQAQ", - "id": 41403864, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41403864?v=4", - "html_url": "https:\/\/github.com\/NSQAQ", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/NSQAQ\/CVE-2024-11201", - "description": "TEST", - "fork": false, - "created_at": "2024-11-23T09:00:58Z", - "updated_at": "2024-11-23T09:01:02Z", - "pushed_at": "2024-11-23T09:00:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11252.json b/2024/CVE-2024-11252.json deleted file mode 100644 index f95865560b..0000000000 --- a/2024/CVE-2024-11252.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 896497712, - "name": "CVE-2024-11252-Sassy-Social-Share-XSS", - "full_name": "reinh3rz\/CVE-2024-11252-Sassy-Social-Share-XSS", - "owner": { - "login": "reinh3rz", - "id": 144375735, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144375735?v=4", - "html_url": "https:\/\/github.com\/reinh3rz", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/reinh3rz\/CVE-2024-11252-Sassy-Social-Share-XSS", - "description": null, - "fork": false, - "created_at": "2024-11-30T14:20:57Z", - "updated_at": "2024-11-30T14:30:34Z", - "pushed_at": "2024-11-30T14:30:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11281.json b/2024/CVE-2024-11281.json deleted file mode 100644 index 3ff8dd3604..0000000000 --- a/2024/CVE-2024-11281.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 908326183, - "name": "CVE-2024-11281", - "full_name": "McTavishSue\/CVE-2024-11281", - "owner": { - "login": "McTavishSue", - "id": 186207823, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186207823?v=4", - "html_url": "https:\/\/github.com\/McTavishSue", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/McTavishSue\/CVE-2024-11281", - "description": "Missing Authorization (CWE-862)", - "fork": false, - "created_at": "2024-12-25T18:38:46Z", - "updated_at": "2025-01-03T05:35:27Z", - "pushed_at": "2024-12-25T18:49:41Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11320.json b/2024/CVE-2024-11320.json deleted file mode 100644 index 8bd592cb6c..0000000000 --- a/2024/CVE-2024-11320.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 896840057, - "name": "CVE-2024-11320", - "full_name": "mhaskar\/CVE-2024-11320", - "owner": { - "login": "mhaskar", - "id": 6861215, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4", - "html_url": "https:\/\/github.com\/mhaskar", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/mhaskar\/CVE-2024-11320", - "description": "Exploit for Pandora FMS Remote Code Execution CVE-2024-11320", - "fork": false, - "created_at": "2024-12-01T12:39:49Z", - "updated_at": "2025-01-06T14:55:16Z", - "pushed_at": "2024-12-01T12:48:08Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 7, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 7, - "watchers": 7, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11381.json b/2024/CVE-2024-11381.json deleted file mode 100644 index e6bdae6137..0000000000 --- a/2024/CVE-2024-11381.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 892726115, - "name": "CVE-2024-11381", - "full_name": "windz3r0day\/CVE-2024-11381", - "owner": { - "login": "windz3r0day", - "id": 179751303, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179751303?v=4", - "html_url": "https:\/\/github.com\/windz3r0day", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-11381", - "description": "CVE-2024-11381 poc exploit ", - "fork": false, - "created_at": "2024-11-22T16:53:14Z", - "updated_at": "2024-11-22T17:22:38Z", - "pushed_at": "2024-11-22T16:54:06Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11387.json b/2024/CVE-2024-11387.json deleted file mode 100644 index f8495f86b2..0000000000 --- a/2024/CVE-2024-11387.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 893617166, - "name": "CVE-2024-11387", - "full_name": "windz3r0day\/CVE-2024-11387", - "owner": { - "login": "windz3r0day", - "id": 179751303, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179751303?v=4", - "html_url": "https:\/\/github.com\/windz3r0day", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-11387", - "description": "CVE-2024-11387 poc exploit", - "fork": false, - "created_at": "2024-11-24T22:14:03Z", - "updated_at": "2024-11-25T08:04:10Z", - "pushed_at": "2024-11-24T22:15:03Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11388.json b/2024/CVE-2024-11388.json deleted file mode 100644 index 81da15ff8b..0000000000 --- a/2024/CVE-2024-11388.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 892723947, - "name": "CVE-2024-11388", - "full_name": "windz3r0day\/CVE-2024-11388", - "owner": { - "login": "windz3r0day", - "id": 179751303, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179751303?v=4", - "html_url": "https:\/\/github.com\/windz3r0day", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-11388", - "description": "CVE-2024-11388 poc exploit ", - "fork": false, - "created_at": "2024-11-22T16:48:21Z", - "updated_at": "2024-11-22T17:22:12Z", - "pushed_at": "2024-11-22T16:49:25Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11392.json b/2024/CVE-2024-11392.json deleted file mode 100644 index 1eccf66353..0000000000 --- a/2024/CVE-2024-11392.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 899915043, - "name": "CVE-2024-11392", - "full_name": "Piyush-Bhor\/CVE-2024-11392", - "owner": { - "login": "Piyush-Bhor", - "id": 131725874, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131725874?v=4", - "html_url": "https:\/\/github.com\/Piyush-Bhor", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Piyush-Bhor\/CVE-2024-11392", - "description": "Technical Details and Exploit for CVE-2024-11392", - "fork": false, - "created_at": "2024-12-07T11:14:21Z", - "updated_at": "2024-12-07T11:23:00Z", - "pushed_at": "2024-12-07T11:22:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11393.json b/2024/CVE-2024-11393.json deleted file mode 100644 index be430f2158..0000000000 --- a/2024/CVE-2024-11393.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 899917856, - "name": "CVE-2024-11393", - "full_name": "Piyush-Bhor\/CVE-2024-11393", - "owner": { - "login": "Piyush-Bhor", - "id": 131725874, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131725874?v=4", - "html_url": "https:\/\/github.com\/Piyush-Bhor", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Piyush-Bhor\/CVE-2024-11393", - "description": "Technical Details and Exploit for CVE-2024-11393", - "fork": false, - "created_at": "2024-12-07T11:24:06Z", - "updated_at": "2024-12-10T04:18:23Z", - "pushed_at": "2024-12-08T00:31:25Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11394.json b/2024/CVE-2024-11394.json deleted file mode 100644 index a079dc0e7e..0000000000 --- a/2024/CVE-2024-11394.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 899918238, - "name": "CVE-2024-11394", - "full_name": "Piyush-Bhor\/CVE-2024-11394", - "owner": { - "login": "Piyush-Bhor", - "id": 131725874, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131725874?v=4", - "html_url": "https:\/\/github.com\/Piyush-Bhor", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Piyush-Bhor\/CVE-2024-11394", - "description": "Technical Details and Exploit for CVE-2024-11394", - "fork": false, - "created_at": "2024-12-07T11:25:32Z", - "updated_at": "2024-12-08T00:46:49Z", - "pushed_at": "2024-12-08T00:46:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11396.json b/2024/CVE-2024-11396.json deleted file mode 100644 index 199dcbd847..0000000000 --- a/2024/CVE-2024-11396.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 916075937, - "name": "CVE-2024-11396", - "full_name": "RandomRobbieBF\/CVE-2024-11396", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-11396", - "description": "Event monster <= 1.4.3 - Information Exposure Via Visitors List Export", - "fork": false, - "created_at": "2025-01-13T12:12:12Z", - "updated_at": "2025-01-14T12:38:39Z", - "pushed_at": "2025-01-13T12:12:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11412.json b/2024/CVE-2024-11412.json deleted file mode 100644 index 7f6614a469..0000000000 --- a/2024/CVE-2024-11412.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 892724705, - "name": "CVE-2024-11412", - "full_name": "windz3r0day\/CVE-2024-11412", - "owner": { - "login": "windz3r0day", - "id": 179751303, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179751303?v=4", - "html_url": "https:\/\/github.com\/windz3r0day", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-11412", - "description": "CVE-2024-11412 poc exploit ", - "fork": false, - "created_at": "2024-11-22T16:50:08Z", - "updated_at": "2024-11-22T17:22:26Z", - "pushed_at": "2024-11-22T16:51:08Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11423.json b/2024/CVE-2024-11423.json deleted file mode 100644 index 96558ea873..0000000000 --- a/2024/CVE-2024-11423.json +++ /dev/null @@ -1,35 +0,0 @@ -[ - { - "id": 913693077, - "name": "CVE-2024-11423", - "full_name": "RandomRobbieBF\/CVE-2024-11423", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-11423", - "description": "Ultimate Gift Cards for WooCommerce <= 3.0.6 - Missing Authorization to Infinite Money Glitch", - "fork": false, - "created_at": "2025-01-08T07:12:08Z", - "updated_at": "2025-01-09T10:06:03Z", - "pushed_at": "2025-01-08T07:12:46Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-11423" - ], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11428.json b/2024/CVE-2024-11428.json deleted file mode 100644 index b630dd8f2d..0000000000 --- a/2024/CVE-2024-11428.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 892725472, - "name": "CVE-2024-11428", - "full_name": "windz3r0day\/CVE-2024-11428", - "owner": { - "login": "windz3r0day", - "id": 179751303, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179751303?v=4", - "html_url": "https:\/\/github.com\/windz3r0day", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-11428", - "description": "CVE-2024-11428 poc exploit ", - "fork": false, - "created_at": "2024-11-22T16:51:47Z", - "updated_at": "2024-11-22T17:22:29Z", - "pushed_at": "2024-11-22T16:52:39Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11432.json b/2024/CVE-2024-11432.json deleted file mode 100644 index 8d25ebcc56..0000000000 --- a/2024/CVE-2024-11432.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 892723142, - "name": "CVE-2024-11432", - "full_name": "windz3r0day\/CVE-2024-11432", - "owner": { - "login": "windz3r0day", - "id": 179751303, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179751303?v=4", - "html_url": "https:\/\/github.com\/windz3r0day", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-11432", - "description": "CVE-2024-11432 poc exploit ", - "fork": false, - "created_at": "2024-11-22T16:46:24Z", - "updated_at": "2024-11-22T17:22:05Z", - "pushed_at": "2024-11-22T16:47:38Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11477.json b/2024/CVE-2024-11477.json deleted file mode 100644 index d43bd19f65..0000000000 --- a/2024/CVE-2024-11477.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 895895052, - "name": "cve-2024-11477-writeup", - "full_name": "TheN00bBuilder\/cve-2024-11477-writeup", - "owner": { - "login": "TheN00bBuilder", - "id": 41171807, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41171807?v=4", - "html_url": "https:\/\/github.com\/TheN00bBuilder", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/TheN00bBuilder\/cve-2024-11477-writeup", - "description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis", - "fork": false, - "created_at": "2024-11-29T06:13:36Z", - "updated_at": "2025-01-10T12:44:00Z", - "pushed_at": "2024-12-04T01:01:28Z", - "stargazers_count": 49, - "watchers_count": 49, - "has_discussions": false, - "forks_count": 11, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 11, - "watchers": 49, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11613.json b/2024/CVE-2024-11613.json deleted file mode 100644 index 4aba5b40e9..0000000000 --- a/2024/CVE-2024-11613.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 913765661, - "name": "CVE-2024-11613-wp-file-upload", - "full_name": "Sachinart\/CVE-2024-11613-wp-file-upload", - "owner": { - "login": "Sachinart", - "id": 18497191, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18497191?v=4", - "html_url": "https:\/\/github.com\/Sachinart", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Sachinart\/CVE-2024-11613-wp-file-upload", - "description": "Exploit by Chirag Artani for CVE-2024-11613 in WordPress File Upload", - "fork": false, - "created_at": "2025-01-08T10:06:00Z", - "updated_at": "2025-01-08T10:15:52Z", - "pushed_at": "2025-01-08T10:15:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11616.json b/2024/CVE-2024-11616.json deleted file mode 100644 index d960428471..0000000000 --- a/2024/CVE-2024-11616.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 909318592, - "name": "CVE-2024-11616", - "full_name": "inb1ts\/CVE-2024-11616", - "owner": { - "login": "inb1ts", - "id": 87979502, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87979502?v=4", - "html_url": "https:\/\/github.com\/inb1ts", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/inb1ts\/CVE-2024-11616", - "description": "Crash PoC for exploiting Netskope Endpoint DLP double-fetch.", - "fork": false, - "created_at": "2024-12-28T10:48:23Z", - "updated_at": "2025-01-02T14:47:02Z", - "pushed_at": "2024-12-28T11:39:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11643.json b/2024/CVE-2024-11643.json deleted file mode 100644 index a649507984..0000000000 --- a/2024/CVE-2024-11643.json +++ /dev/null @@ -1,36 +0,0 @@ -[ - { - "id": 898924664, - "name": "CVE-2024-11643", - "full_name": "RandomRobbieBF\/CVE-2024-11643", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-11643", - "description": "Accessibility by AllAccessible <= 1.3.4 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Option Update", - "fork": false, - "created_at": "2024-12-05T09:47:31Z", - "updated_at": "2025-01-06T13:39:02Z", - "pushed_at": "2024-12-05T09:49:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-11643", - "wordpress" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11680.json b/2024/CVE-2024-11680.json deleted file mode 100644 index d8bf0999b2..0000000000 --- a/2024/CVE-2024-11680.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 898635585, - "name": "CVE-2024-11680_PoC_Exploit", - "full_name": "D3N14LD15K\/CVE-2024-11680_PoC_Exploit", - "owner": { - "login": "D3N14LD15K", - "id": 155617205, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155617205?v=4", - "html_url": "https:\/\/github.com\/D3N14LD15K", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/D3N14LD15K\/CVE-2024-11680_PoC_Exploit", - "description": "This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues.", - "fork": false, - "created_at": "2024-12-04T18:42:43Z", - "updated_at": "2025-01-09T08:12:50Z", - "pushed_at": "2024-12-11T23:45:31Z", - "stargazers_count": 13, - "watchers_count": 13, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 13, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11728.json b/2024/CVE-2024-11728.json deleted file mode 100644 index 2b4a9f9797..0000000000 --- a/2024/CVE-2024-11728.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 901848070, - "name": "CVE-2024-11728", - "full_name": "samogod\/CVE-2024-11728", - "owner": { - "login": "samogod", - "id": 81412659, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81412659?v=4", - "html_url": "https:\/\/github.com\/samogod", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/samogod\/CVE-2024-11728", - "description": "KiviCare – Clinic & Patient Management System (EHR) WordPress Plugin Unauthenticated SQL Injection PoC", - "fork": false, - "created_at": "2024-12-11T12:33:46Z", - "updated_at": "2024-12-11T15:11:30Z", - "pushed_at": "2024-12-11T15:11:26Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-11972.json b/2024/CVE-2024-11972.json deleted file mode 100644 index 9e5bdef81d..0000000000 --- a/2024/CVE-2024-11972.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 903941456, - "name": "exploit-CVE-2024-11972", - "full_name": "JunTakemura\/exploit-CVE-2024-11972", - "owner": { - "login": "JunTakemura", - "id": 76585599, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76585599?v=4", - "html_url": "https:\/\/github.com\/JunTakemura", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/JunTakemura\/exploit-CVE-2024-11972", - "description": "Exploit for CVE-2024-11972, Hunk Companion < 1.9.0 Unauthenticated Plugin Installation", - "fork": false, - "created_at": "2024-12-15T23:54:15Z", - "updated_at": "2025-01-13T16:55:26Z", - "pushed_at": "2024-12-28T16:44:15Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-12025.json b/2024/CVE-2024-12025.json deleted file mode 100644 index 5aa7dbf234..0000000000 --- a/2024/CVE-2024-12025.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 905785373, - "name": "CVE-2024-12025", - "full_name": "RandomRobbieBF\/CVE-2024-12025", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12025", - "description": "Collapsing Categories <= 3.0.8 - Unauthenticated SQL Injection", - "fork": false, - "created_at": "2024-12-19T14:15:29Z", - "updated_at": "2024-12-31T06:46:57Z", - "pushed_at": "2024-12-19T14:16:35Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-1207.json b/2024/CVE-2024-1207.json deleted file mode 100644 index 1f9abf4417..0000000000 --- a/2024/CVE-2024-1207.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 869417848, - "name": "CVE-2024-1207", - "full_name": "sahar042\/CVE-2024-1207", - "owner": { - "login": "sahar042", - "id": 49879157, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49879157?v=4", - "html_url": "https:\/\/github.com\/sahar042", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/sahar042\/CVE-2024-1207", - "description": "The WP Booking Calendar plugin for WordPress is vulnerable to SQL Injection via the 'calendar_request_params[dates_ddmmyy_csv]' parameter in all versions up to, and including, 9.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attac", - "fork": false, - "created_at": "2024-10-08T09:05:16Z", - "updated_at": "2024-10-08T09:16:33Z", - "pushed_at": "2024-10-08T09:08:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-1212.json b/2024/CVE-2024-1212.json index 4c4d82d970..4143a69917 100644 --- a/2024/CVE-2024-1212.json +++ b/2024/CVE-2024-1212.json @@ -60,36 +60,5 @@ "watchers": 0, "score": 0, "subscribers_count": 0 - }, - { - "id": 908236253, - "name": "Exploiting-RCE-Cyber_Project_CVE-2024-1212", - "full_name": "Rehan07-Human\/Exploiting-RCE-Cyber_Project_CVE-2024-1212", - "owner": { - "login": "Rehan07-Human", - "id": 192799473, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192799473?v=4", - "html_url": "https:\/\/github.com\/Rehan07-Human", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Rehan07-Human\/Exploiting-RCE-Cyber_Project_CVE-2024-1212", - "description": "Demonstrating the exploitation of the Remote Code Execution (RCE) vulnerability in Kemp LoadMaster (CVE-2024-1212). This project covers reconnaissance, vulnerability scanning using Nuclei, and exploitation processes, while also highlighting mitigation strategies to secure affected systems", - "fork": false, - "created_at": "2024-12-25T14:33:25Z", - "updated_at": "2024-12-26T16:22:14Z", - "pushed_at": "2024-12-25T14:39:40Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-12155.json b/2024/CVE-2024-12155.json deleted file mode 100644 index 0aef757853..0000000000 --- a/2024/CVE-2024-12155.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 899528238, - "name": "CVE-2024-12155", - "full_name": "McTavishSue\/CVE-2024-12155", - "owner": { - "login": "McTavishSue", - "id": 186207823, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186207823?v=4", - "html_url": "https:\/\/github.com\/McTavishSue", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/McTavishSue\/CVE-2024-12155", - "description": "CVE-2024-12155 Missing Authorization (CWE-862)", - "fork": false, - "created_at": "2024-12-06T13:03:09Z", - "updated_at": "2024-12-14T20:28:42Z", - "pushed_at": "2024-12-06T13:13:21Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-12157.json b/2024/CVE-2024-12157.json deleted file mode 100644 index 505a958a58..0000000000 --- a/2024/CVE-2024-12157.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 913334922, - "name": "CVE-2024-12157", - "full_name": "RandomRobbieBF\/CVE-2024-12157", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12157", - "description": "Popup – MailChimp, GetResponse and ActiveCampaign Intergrations <= 3.2.6 - Unauthenticated SQL Injection", - "fork": false, - "created_at": "2025-01-07T13:40:05Z", - "updated_at": "2025-01-14T12:42:29Z", - "pushed_at": "2025-01-07T13:41:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-12172.json b/2024/CVE-2024-12172.json deleted file mode 100644 index 35c27e487d..0000000000 --- a/2024/CVE-2024-12172.json +++ /dev/null @@ -1,36 +0,0 @@ -[ - { - "id": 904457773, - "name": "CVE-2024-12172", - "full_name": "RandomRobbieBF\/CVE-2024-12172", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12172", - "description": "WP Courses LMS – Online Courses Builder, eLearning Courses, Courses Solution, Education Courses <= 3.2.21 - Missing Authorization to Authenticated (Subscriber+) Arbitrary User Meta Update", - "fork": false, - "created_at": "2024-12-16T23:39:17Z", - "updated_at": "2025-01-06T13:18:45Z", - "pushed_at": "2024-12-16T23:40:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-12172", - "wordpress" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-12209.json b/2024/CVE-2024-12209.json deleted file mode 100644 index 4bd1299bf6..0000000000 --- a/2024/CVE-2024-12209.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 900744942, - "name": "CVE-2024-12209", - "full_name": "RandomRobbieBF\/CVE-2024-12209", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12209", - "description": "WP Umbrella: Update Backup Restore & Monitoring <= 2.17.0 - Unauthenticated Local File Inclusion", - "fork": false, - "created_at": "2024-12-09T11:51:10Z", - "updated_at": "2024-12-11T03:22:18Z", - "pushed_at": "2024-12-09T11:52:10Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 907641379, - "name": "CVE-2024-12209", - "full_name": "Nxploited\/CVE-2024-12209", - "owner": { - "login": "Nxploited", - "id": 188819918, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4", - "html_url": "https:\/\/github.com\/Nxploited", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-12209", - "description": "Unauthenticated Local File Inclusion", - "fork": false, - "created_at": "2024-12-24T03:59:15Z", - "updated_at": "2025-01-01T02:56:57Z", - "pushed_at": "2024-12-24T04:19:57Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-12252.json b/2024/CVE-2024-12252.json deleted file mode 100644 index 0d0210e183..0000000000 --- a/2024/CVE-2024-12252.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 913410162, - "name": "CVE-2024-12252", - "full_name": "RandomRobbieBF\/CVE-2024-12252", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12252", - "description": "SEO LAT Auto Post <= 2.2.1 - Missing Authorization to File Overwrite\/Upload (Remote Code Execution)", - "fork": false, - "created_at": "2025-01-07T16:22:35Z", - "updated_at": "2025-01-14T12:42:05Z", - "pushed_at": "2025-01-07T16:28:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-12270.json b/2024/CVE-2024-12270.json deleted file mode 100644 index e7a0456e49..0000000000 --- a/2024/CVE-2024-12270.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 900786065, - "name": "CVE-2024-12270", - "full_name": "RandomRobbieBF\/CVE-2024-12270", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12270", - "description": "Beautiful Taxonomy Filters <= 2.4.3 - Unauthenticated SQL Injection", - "fork": false, - "created_at": "2024-12-09T13:22:10Z", - "updated_at": "2024-12-09T17:13:59Z", - "pushed_at": "2024-12-09T13:24:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-12345.json b/2024/CVE-2024-12345.json deleted file mode 100644 index 193a6f74ec..0000000000 --- a/2024/CVE-2024-12345.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 896006811, - "name": "CVE-2024-12345-POC", - "full_name": "RoyaRadin\/CVE-2024-12345-POC", - "owner": { - "login": "RoyaRadin", - "id": 190079804, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/190079804?v=4", - "html_url": "https:\/\/github.com\/RoyaRadin", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RoyaRadin\/CVE-2024-12345-POC", - "description": null, - "fork": false, - "created_at": "2024-11-29T11:04:57Z", - "updated_at": "2024-11-29T11:04:58Z", - "pushed_at": "2024-11-29T11:04:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-12404.json b/2024/CVE-2024-12404.json deleted file mode 100644 index 1f9963cd02..0000000000 --- a/2024/CVE-2024-12404.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 914905137, - "name": "CVE-2024-12404", - "full_name": "RandomRobbieBF\/CVE-2024-12404", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12404", - "description": "CF Internal Link Shortcode <= 1.1.0 - Unauthenticated SQL Injection", - "fork": false, - "created_at": "2025-01-10T14:52:22Z", - "updated_at": "2025-01-14T12:41:00Z", - "pushed_at": "2025-01-10T14:53:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-12471.json b/2024/CVE-2024-12471.json deleted file mode 100644 index e7336d166a..0000000000 --- a/2024/CVE-2024-12471.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 913357660, - "name": "CVE-2024-12471", - "full_name": "RandomRobbieBF\/CVE-2024-12471", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12471", - "description": "Post Saint: ChatGPT, GPT4, DALL-E, Stable Diffusion, Pexels, Dezgo AI Text & Image Generator <= 1.3.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary File Upload", - "fork": false, - "created_at": "2025-01-07T14:30:08Z", - "updated_at": "2025-01-10T13:56:26Z", - "pushed_at": "2025-01-07T14:31:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-12484.json b/2024/CVE-2024-12484.json deleted file mode 100644 index 4fa5b19008..0000000000 --- a/2024/CVE-2024-12484.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 900580012, - "name": "CVE-2024-12484", - "full_name": "LiChaser\/CVE-2024-12484", - "owner": { - "login": "LiChaser", - "id": 127033061, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127033061?v=4", - "html_url": "https:\/\/github.com\/LiChaser", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/LiChaser\/CVE-2024-12484", - "description": "CVE-poc", - "fork": false, - "created_at": "2024-12-09T04:42:19Z", - "updated_at": "2024-12-24T08:49:04Z", - "pushed_at": "2024-12-09T05:56:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-12535.json b/2024/CVE-2024-12535.json deleted file mode 100644 index 70c9c52310..0000000000 --- a/2024/CVE-2024-12535.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 913375484, - "name": "CVE-2024-12535", - "full_name": "RandomRobbieBF\/CVE-2024-12535", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12535", - "description": "Host PHP Info <= 1.0.4 - Missing Authorization to Unauthenticated Sensitive Information Disclosure", - "fork": false, - "created_at": "2025-01-07T15:08:14Z", - "updated_at": "2025-01-14T12:42:19Z", - "pushed_at": "2025-01-07T15:09:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-12542.json b/2024/CVE-2024-12542.json deleted file mode 100644 index feb1b8782b..0000000000 --- a/2024/CVE-2024-12542.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 914772395, - "name": "CVE-2024-12542", - "full_name": "RandomRobbieBF\/CVE-2024-12542", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12542", - "description": "linkID <= 0.1.2 - Missing Authorization to Unauthenticated Sensitive Information Exposure", - "fork": false, - "created_at": "2025-01-10T09:23:18Z", - "updated_at": "2025-01-10T09:24:17Z", - "pushed_at": "2025-01-10T09:24:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-12558.json b/2024/CVE-2024-12558.json deleted file mode 100644 index c7d7c9cc57..0000000000 --- a/2024/CVE-2024-12558.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 912762940, - "name": "CVE-2024-12558", - "full_name": "RandomRobbieBF\/CVE-2024-12558", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12558", - "description": "WP BASE Booking of Appointments, Services and Events <= 4.9.2 - Missing Authorization to Authenticated (Subscriber+) Sensitive Information Exposure via app_export_db", - "fork": false, - "created_at": "2025-01-06T10:45:29Z", - "updated_at": "2025-01-10T13:55:30Z", - "pushed_at": "2025-01-06T10:47:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 915119296, - "name": "CVE-2024-12558-exploit", - "full_name": "Nxploited\/CVE-2024-12558-exploit", - "owner": { - "login": "Nxploited", - "id": 188819918, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4", - "html_url": "https:\/\/github.com\/Nxploited", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-12558-exploit", - "description": null, - "fork": false, - "created_at": "2025-01-11T02:50:14Z", - "updated_at": "2025-01-11T05:05:09Z", - "pushed_at": "2025-01-11T05:05:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-12594.json b/2024/CVE-2024-12594.json deleted file mode 100644 index 954f421453..0000000000 --- a/2024/CVE-2024-12594.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 912770578, - "name": "CVE-2024-12594", - "full_name": "RandomRobbieBF\/CVE-2024-12594", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12594", - "description": "ALL In One Custom Login Page <= 7.1.1 - Missing Authorization to Authenticated (Subscriber+)Privilege Escalation", - "fork": false, - "created_at": "2025-01-06T11:05:21Z", - "updated_at": "2025-01-10T13:55:51Z", - "pushed_at": "2025-01-06T11:06:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-12849.json b/2024/CVE-2024-12849.json deleted file mode 100644 index 2a2a7143a3..0000000000 --- a/2024/CVE-2024-12849.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 913331319, - "name": "CVE-2024-12849", - "full_name": "RandomRobbieBF\/CVE-2024-12849", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12849", - "description": "Error Log Viewer By WP Guru <= 1.0.1.3 - Missing Authorization to Unauthenticated Arbitrary File Read", - "fork": false, - "created_at": "2025-01-07T13:32:30Z", - "updated_at": "2025-01-07T13:33:13Z", - "pushed_at": "2025-01-07T13:33:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 913426666, - "name": "CVE-2024-12849-Poc", - "full_name": "Nxploited\/CVE-2024-12849-Poc", - "owner": { - "login": "Nxploited", - "id": 188819918, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4", - "html_url": "https:\/\/github.com\/Nxploited", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-12849-Poc", - "description": null, - "fork": false, - "created_at": "2025-01-07T16:57:48Z", - "updated_at": "2025-01-08T06:46:21Z", - "pushed_at": "2025-01-08T06:46:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-12856.json b/2024/CVE-2024-12856.json deleted file mode 100644 index d00031900d..0000000000 --- a/2024/CVE-2024-12856.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 915391325, - "name": "CVE-2024-12856", - "full_name": "nu113d\/CVE-2024-12856", - "owner": { - "login": "nu113d", - "id": 103531438, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103531438?v=4", - "html_url": "https:\/\/github.com\/nu113d", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/nu113d\/CVE-2024-12856", - "description": "An exploit for Four-Faith routers to get a reverse shell", - "fork": false, - "created_at": "2025-01-11T18:14:03Z", - "updated_at": "2025-01-11T18:14:08Z", - "pushed_at": "2025-01-11T18:14:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-12970.json b/2024/CVE-2024-12970.json deleted file mode 100644 index 7b62e5ba09..0000000000 --- a/2024/CVE-2024-12970.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 911569071, - "name": "CVE-2024-12970", - "full_name": "osmancanvural\/CVE-2024-12970", - "owner": { - "login": "osmancanvural", - "id": 123651825, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123651825?v=4", - "html_url": "https:\/\/github.com\/osmancanvural", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/osmancanvural\/CVE-2024-12970", - "description": "Pardus My Computer Os Command Injection", - "fork": false, - "created_at": "2025-01-03T10:23:44Z", - "updated_at": "2025-01-13T22:41:32Z", - "pushed_at": "2025-01-13T22:27:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-12986.json b/2024/CVE-2024-12986.json deleted file mode 100644 index da2fc44437..0000000000 --- a/2024/CVE-2024-12986.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 912059429, - "name": "CVE-2024-12986", - "full_name": "Aether-0\/CVE-2024-12986", - "owner": { - "login": "Aether-0", - "id": 143575444, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143575444?v=4", - "html_url": "https:\/\/github.com\/Aether-0", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Aether-0\/CVE-2024-12986", - "description": null, - "fork": false, - "created_at": "2025-01-04T14:47:09Z", - "updated_at": "2025-01-07T00:35:54Z", - "pushed_at": "2025-01-04T14:58:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-1698.json b/2024/CVE-2024-1698.json index bfd2ffa6d2..7a20c89e59 100644 --- a/2024/CVE-2024-1698.json +++ b/2024/CVE-2024-1698.json @@ -29,67 +29,5 @@ "watchers": 8, "score": 0, "subscribers_count": 1 - }, - { - "id": 872446949, - "name": "CVE-2024-1698", - "full_name": "shanglyu\/CVE-2024-1698", - "owner": { - "login": "shanglyu", - "id": 62023200, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62023200?v=4", - "html_url": "https:\/\/github.com\/shanglyu", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/shanglyu\/CVE-2024-1698", - "description": null, - "fork": false, - "created_at": "2024-10-14T13:02:26Z", - "updated_at": "2024-10-14T13:09:39Z", - "pushed_at": "2024-10-14T13:09:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 889535406, - "name": "WordPress-NotificationX-CVE-2024-1698", - "full_name": "jesicatjan\/WordPress-NotificationX-CVE-2024-1698", - "owner": { - "login": "jesicatjan", - "id": 122602674, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122602674?v=4", - "html_url": "https:\/\/github.com\/jesicatjan", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/jesicatjan\/WordPress-NotificationX-CVE-2024-1698", - "description": null, - "fork": false, - "created_at": "2024-11-16T15:21:24Z", - "updated_at": "2024-11-20T03:35:53Z", - "pushed_at": "2024-11-19T05:06:33Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-1709.json b/2024/CVE-2024-1709.json index 035cc091ec..45ee6e1230 100644 --- a/2024/CVE-2024-1709.json +++ b/2024/CVE-2024-1709.json @@ -162,36 +162,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 873464505, - "name": "Mass-CVE-2024-1709", - "full_name": "AMRICHASFUCK\/Mass-CVE-2024-1709", - "owner": { - "login": "AMRICHASFUCK", - "id": 92443330, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92443330?v=4", - "html_url": "https:\/\/github.com\/AMRICHASFUCK", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/AMRICHASFUCK\/Mass-CVE-2024-1709", - "description": "ScreenConnect AuthBypass Mass RCE", - "fork": false, - "created_at": "2024-10-16T08:05:35Z", - "updated_at": "2024-10-18T16:53:30Z", - "pushed_at": "2024-10-16T08:38:05Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-1931.json b/2024/CVE-2024-1931.json deleted file mode 100644 index d47aaa0f8a..0000000000 --- a/2024/CVE-2024-1931.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 842021663, - "name": "CVE-2024-1931-reproduction", - "full_name": "passer12\/CVE-2024-1931-reproduction", - "owner": { - "login": "passer12", - "id": 93042040, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93042040?v=4", - "html_url": "https:\/\/github.com\/passer12", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/passer12\/CVE-2024-1931-reproduction", - "description": "CVE-2024-1931-reproduction", - "fork": false, - "created_at": "2024-08-13T14:09:20Z", - "updated_at": "2024-08-13T14:10:30Z", - "pushed_at": "2024-08-13T14:10:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-20137.json b/2024/CVE-2024-20137.json deleted file mode 100644 index 0d848ffff4..0000000000 --- a/2024/CVE-2024-20137.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 908244562, - "name": "CVE-2024-20137", - "full_name": "takistmr\/CVE-2024-20137", - "owner": { - "login": "takistmr", - "id": 30937876, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30937876?v=4", - "html_url": "https:\/\/github.com\/takistmr", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/takistmr\/CVE-2024-20137", - "description": "Python code for expoiting of vulnerability in wlan driver of MediaTek SOCs MT6890, MT7622, MT7915, MT7916, MT7981, MT7986", - "fork": false, - "created_at": "2024-12-25T15:01:38Z", - "updated_at": "2024-12-28T16:47:15Z", - "pushed_at": "2024-12-25T16:57:34Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-20666.json b/2024/CVE-2024-20666.json index 553d6f81c8..50cad484a6 100644 --- a/2024/CVE-2024-20666.json +++ b/2024/CVE-2024-20666.json @@ -35,36 +35,5 @@ "watchers": 4, "score": 0, "subscribers_count": 1 - }, - { - "id": 822528570, - "name": "CVE-2024-20666", - "full_name": "invaderslabs\/CVE-2024-20666", - "owner": { - "login": "invaderslabs", - "id": 149894888, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149894888?v=4", - "html_url": "https:\/\/github.com\/invaderslabs", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/invaderslabs\/CVE-2024-20666", - "description": "CVE-2024-20666 vulnerability Solution patch failures in the Windows Recovery Environment (WinRE).", - "fork": false, - "created_at": "2024-07-01T10:14:40Z", - "updated_at": "2024-08-29T13:31:14Z", - "pushed_at": "2024-07-21T13:36:38Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-21006.json b/2024/CVE-2024-21006.json index 0926150e2d..aaacf68600 100644 --- a/2024/CVE-2024-21006.json +++ b/2024/CVE-2024-21006.json @@ -29,67 +29,5 @@ "watchers": 12, "score": 0, "subscribers_count": 1 - }, - { - "id": 822946778, - "name": "CVE-2024-21006_jar", - "full_name": "lightr3d\/CVE-2024-21006_jar", - "owner": { - "login": "lightr3d", - "id": 113666792, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113666792?v=4", - "html_url": "https:\/\/github.com\/lightr3d", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/lightr3d\/CVE-2024-21006_jar", - "description": "CVE-2024-21006 exp", - "fork": false, - "created_at": "2024-07-02T06:25:14Z", - "updated_at": "2024-12-03T03:25:22Z", - "pushed_at": "2024-07-29T19:39:15Z", - "stargazers_count": 18, - "watchers_count": 18, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 18, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 833388994, - "name": "CVE-2024-21006", - "full_name": "dadvlingd\/CVE-2024-21006", - "owner": { - "login": "dadvlingd", - "id": 61039959, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61039959?v=4", - "html_url": "https:\/\/github.com\/dadvlingd", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/dadvlingd\/CVE-2024-21006", - "description": null, - "fork": false, - "created_at": "2024-07-25T00:32:00Z", - "updated_at": "2024-11-01T13:03:01Z", - "pushed_at": "2024-07-25T00:39:52Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 7, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-21182.json b/2024/CVE-2024-21182.json deleted file mode 100644 index 9e534c65f5..0000000000 --- a/2024/CVE-2024-21182.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 909779451, - "name": "CVE-2024-21182", - "full_name": "kursadalsan\/CVE-2024-21182", - "owner": { - "login": "kursadalsan", - "id": 108494826, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108494826?v=4", - "html_url": "https:\/\/github.com\/kursadalsan", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/kursadalsan\/CVE-2024-21182", - "description": "PoC for CVE-2024-21182", - "fork": false, - "created_at": "2024-12-29T18:45:22Z", - "updated_at": "2025-01-06T09:49:55Z", - "pushed_at": "2024-12-29T15:56:14Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 8, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 8, - "watchers": 1, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-21305.json b/2024/CVE-2024-21305.json index 37e6eb3ac3..54614fbf8c 100644 --- a/2024/CVE-2024-21305.json +++ b/2024/CVE-2024-21305.json @@ -14,10 +14,10 @@ "description": "Report and exploit of CVE-2024-21305. ", "fork": false, "created_at": "2023-12-16T23:27:34Z", - "updated_at": "2024-11-28T15:39:56Z", + "updated_at": "2025-01-14T22:42:30Z", "pushed_at": "2024-01-14T17:21:42Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 36, + "watchers_count": 36, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 35, + "watchers": 36, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-21306.json b/2024/CVE-2024-21306.json index 1941356786..d0ea6c8cd7 100644 --- a/2024/CVE-2024-21306.json +++ b/2024/CVE-2024-21306.json @@ -60,36 +60,5 @@ "watchers": 8, "score": 0, "subscribers_count": 2 - }, - { - "id": 903599533, - "name": "blueXploit", - "full_name": "Danyw24\/blueXploit", - "owner": { - "login": "Danyw24", - "id": 81335686, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81335686?v=4", - "html_url": "https:\/\/github.com\/Danyw24", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Danyw24\/blueXploit", - "description": "Exploit basado en vulnerabilidades criticas Bluetooth (CVE-2023-45866, CVE-2024-21306)", - "fork": false, - "created_at": "2024-12-15T03:00:47Z", - "updated_at": "2025-01-06T02:41:59Z", - "pushed_at": "2024-12-15T06:41:13Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 7, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-21320.json b/2024/CVE-2024-21320.json deleted file mode 100644 index 67b6e07292..0000000000 --- a/2024/CVE-2024-21320.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 880686304, - "name": "CVE-2024-21320-POC", - "full_name": "sxyrxyy\/CVE-2024-21320-POC", - "owner": { - "login": "sxyrxyy", - "id": 125439203, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125439203?v=4", - "html_url": "https:\/\/github.com\/sxyrxyy", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/sxyrxyy\/CVE-2024-21320-POC", - "description": null, - "fork": false, - "created_at": "2024-10-30T06:58:19Z", - "updated_at": "2024-12-06T07:24:00Z", - "pushed_at": "2024-10-30T06:58:59Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-21338.json b/2024/CVE-2024-21338.json index b66057f385..8227c932ee 100644 --- a/2024/CVE-2024-21338.json +++ b/2024/CVE-2024-21338.json @@ -153,72 +153,5 @@ "watchers": 38, "score": 0, "subscribers_count": 2 - }, - { - "id": 835255581, - "name": "CVE-2024-21338", - "full_name": "Crowdfense\/CVE-2024-21338", - "owner": { - "login": "Crowdfense", - "id": 176018566, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176018566?v=4", - "html_url": "https:\/\/github.com\/Crowdfense", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Crowdfense\/CVE-2024-21338", - "description": "Windows AppLocker Driver (appid.sys) LPE", - "fork": false, - "created_at": "2024-07-29T13:18:06Z", - "updated_at": "2025-01-12T09:27:29Z", - "pushed_at": "2024-07-29T13:29:59Z", - "stargazers_count": 47, - "watchers_count": 47, - "has_discussions": false, - "forks_count": 13, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "exploit", - "kernel", - "lpe", - "windowd" - ], - "visibility": "public", - "forks": 13, - "watchers": 47, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 915547586, - "name": "kcfg-bypass", - "full_name": "hackyboiz\/kcfg-bypass", - "owner": { - "login": "hackyboiz", - "id": 65108701, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65108701?v=4", - "html_url": "https:\/\/github.com\/hackyboiz", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/hackyboiz\/kcfg-bypass", - "description": "kcfg bypass example - CVE-2024-21338", - "fork": false, - "created_at": "2025-01-12T06:16:30Z", - "updated_at": "2025-01-12T06:23:22Z", - "pushed_at": "2025-01-12T06:23:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 2 } ] \ No newline at end of file diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json index 27834e8612..8dc21536c6 100644 --- a/2024/CVE-2024-21413.json +++ b/2024/CVE-2024-21413.json @@ -402,37 +402,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 823551343, - "name": "Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-Landscape", - "full_name": "Redfox-Secuirty\/Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-Landscape", - "owner": { - "login": "Redfox-Secuirty", - "id": 173128884, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173128884?v=4", - "html_url": "https:\/\/github.com\/Redfox-Secuirty", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Redfox-Secuirty\/Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-Landscape", - "description": null, - "fork": false, - "created_at": "2024-07-03T08:45:05Z", - "updated_at": "2024-07-03T08:45:08Z", - "pushed_at": "2024-07-03T08:45:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 850327133, "name": "CVE-2024-21413", @@ -463,45 +432,5 @@ "watchers": 9, "score": 0, "subscribers_count": 1 - }, - { - "id": 898401287, - "name": "CVE-2024-21413-Vulnerabilidad-Outlook-LAB", - "full_name": "D1se0\/CVE-2024-21413-Vulnerabilidad-Outlook-LAB", - "owner": { - "login": "D1se0", - "id": 164921056, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164921056?v=4", - "html_url": "https:\/\/github.com\/D1se0", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/D1se0\/CVE-2024-21413-Vulnerabilidad-Outlook-LAB", - "description": null, - "fork": false, - "created_at": "2024-12-04T10:26:37Z", - "updated_at": "2024-12-05T09:51:00Z", - "pushed_at": "2024-12-05T09:50:57Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cibersecurity", - "cve", - "cve-2024-21413", - "exploit", - "hacking", - "hacking-etico", - "lab", - "outlook" - ], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-21534.json b/2024/CVE-2024-21534.json deleted file mode 100644 index bf983117f8..0000000000 --- a/2024/CVE-2024-21534.json +++ /dev/null @@ -1,106 +0,0 @@ -[ - { - "id": 887743822, - "name": "CVE-2024-21534", - "full_name": "pabloopez\/CVE-2024-21534", - "owner": { - "login": "pabloopez", - "id": 56795889, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56795889?v=4", - "html_url": "https:\/\/github.com\/pabloopez", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/pabloopez\/CVE-2024-21534", - "description": "Proof-of-concept (PoC) exploit for JSONPath-plus vulnerability", - "fork": false, - "created_at": "2024-11-13T07:56:10Z", - "updated_at": "2024-11-27T08:01:39Z", - "pushed_at": "2024-11-27T08:01:35Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 892949211, - "name": "cve-2024-21534-poc", - "full_name": "XiaomingX\/cve-2024-21534-poc", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-21534-poc", - "description": "jsonpath-plus 包(版本 <=10.0.7)存在严重的远程代码执行(RCE)漏洞,允许攻击者通过 Node.js 的 VM 模块执行任意代码。该漏洞由于输入验证不严格导致,影响版本为 10.0.7 以下,CVSS 分数为 9.8(极其严重)。漏洞首次公开于 2024 年 10 月 11 日。", - "fork": false, - "created_at": "2024-11-23T05:54:24Z", - "updated_at": "2025-01-13T18:17:27Z", - "pushed_at": "2024-11-23T05:57:35Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "exp", - "poc", - "rce" - ], - "visibility": "public", - "forks": 1, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 895697212, - "name": "cve-2024-21534", - "full_name": "verylazytech\/cve-2024-21534", - "owner": { - "login": "verylazytech", - "id": 172168670, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4", - "html_url": "https:\/\/github.com\/verylazytech", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/verylazytech\/cve-2024-21534", - "description": "POC - CVE-2024-21534 Jsonpath-plus vulnerable to Remote Code Execution (RCE) due to improper input sanitization", - "fork": false, - "created_at": "2024-11-28T17:47:53Z", - "updated_at": "2025-01-12T18:33:09Z", - "pushed_at": "2024-11-28T18:07:14Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-21534", - "jsonpath", - "rce", - "rce-exploit", - "remote-code-execution", - "sanitization" - ], - "visibility": "public", - "forks": 1, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-21542.json b/2024/CVE-2024-21542.json deleted file mode 100644 index 5d1121477b..0000000000 --- a/2024/CVE-2024-21542.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 903920080, - "name": "Poc-CVE-2024-21542", - "full_name": "L3ster1337\/Poc-CVE-2024-21542", - "owner": { - "login": "L3ster1337", - "id": 44538226, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44538226?v=4", - "html_url": "https:\/\/github.com\/L3ster1337", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/L3ster1337\/Poc-CVE-2024-21542", - "description": null, - "fork": false, - "created_at": "2024-12-15T22:17:15Z", - "updated_at": "2024-12-16T01:29:20Z", - "pushed_at": "2024-12-15T22:32:58Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-21626.json b/2024/CVE-2024-21626.json index 42cc90b20d..4dc7b3490b 100644 --- a/2024/CVE-2024-21626.json +++ b/2024/CVE-2024-21626.json @@ -370,67 +370,5 @@ "watchers": 1, "score": 0, "subscribers_count": 1 - }, - { - "id": 884775064, - "name": "CVE-2024-21626-old-docker-versions", - "full_name": "Sk3pper\/CVE-2024-21626-old-docker-versions", - "owner": { - "login": "Sk3pper", - "id": 13051136, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13051136?v=4", - "html_url": "https:\/\/github.com\/Sk3pper", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Sk3pper\/CVE-2024-21626-old-docker-versions", - "description": null, - "fork": false, - "created_at": "2024-11-07T11:17:45Z", - "updated_at": "2024-11-08T14:53:54Z", - "pushed_at": "2024-11-08T14:53:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 892837460, - "name": "little-joke", - "full_name": "adaammmeeee\/little-joke", - "owner": { - "login": "adaammmeeee", - "id": 72557819, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72557819?v=4", - "html_url": "https:\/\/github.com\/adaammmeeee", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/adaammmeeee\/little-joke", - "description": "Some scripts to simulate an attack (used for CVE-2024-21626)", - "fork": false, - "created_at": "2024-11-22T21:55:11Z", - "updated_at": "2024-11-22T23:37:00Z", - "pushed_at": "2024-11-22T23:36:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-21683.json b/2024/CVE-2024-21683.json index 01360f3e24..5749df88a0 100644 --- a/2024/CVE-2024-21683.json +++ b/2024/CVE-2024-21683.json @@ -157,36 +157,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 896065802, - "name": "cve-2024-21683-rce", - "full_name": "XiaomingX\/cve-2024-21683-rce", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-21683-rce", - "description": "CVE-2024-21683 Confluence Post Auth RCE", - "fork": false, - "created_at": "2024-11-29T13:27:37Z", - "updated_at": "2025-01-13T18:16:26Z", - "pushed_at": "2024-11-29T13:33:23Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 4, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json index 7b0db7b009..6a8f8228c7 100644 --- a/2024/CVE-2024-21762.json +++ b/2024/CVE-2024-21762.json @@ -45,7 +45,7 @@ "description": "This script performs vulnerability scanning for CVE-2024-21762, a Fortinet SSL VPN remote code execution vulnerability. It checks whether a given server is vulnerable to this CVE by sending specific requests and analyzing the responses.", "fork": false, "created_at": "2024-03-11T12:28:05Z", - "updated_at": "2025-01-07T23:28:56Z", + "updated_at": "2025-01-14T22:18:44Z", "pushed_at": "2024-03-25T11:28:23Z", "stargazers_count": 10, "watchers_count": 10, @@ -184,36 +184,5 @@ "watchers": 1, "score": 0, "subscribers_count": 1 - }, - { - "id": 893344306, - "name": "cve-2024-21762-poc", - "full_name": "XiaomingX\/cve-2024-21762-poc", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-21762-poc", - "description": "CVE-2024-21762 是 Fortinet 公司的 FortiOS 和 FortiProxy 产品中的一个严重漏洞,存在于其 SSL VPN 组件中。", - "fork": false, - "created_at": "2024-11-24T07:20:45Z", - "updated_at": "2025-01-13T18:17:24Z", - "pushed_at": "2024-11-24T08:07:19Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 7, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-21887.json b/2024/CVE-2024-21887.json index ac478db409..c3d027af13 100644 --- a/2024/CVE-2024-21887.json +++ b/2024/CVE-2024-21887.json @@ -215,36 +215,5 @@ "watchers": 2, "score": 0, "subscribers_count": 1 - }, - { - "id": 916614674, - "name": "pulse-meter", - "full_name": "rxwx\/pulse-meter", - "owner": { - "login": "rxwx", - "id": 2202542, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202542?v=4", - "html_url": "https:\/\/github.com\/rxwx", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/rxwx\/pulse-meter", - "description": "Parses the System Snapshot from an Ivanti Connect Secure applicance to identify possible IOCs related to CVE-2023-46805, CVE-2024-21887 and CVE-2025-0282.", - "fork": false, - "created_at": "2025-01-14T12:54:19Z", - "updated_at": "2025-01-14T13:36:46Z", - "pushed_at": "2025-01-14T13:36:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-22017.json b/2024/CVE-2024-22017.json deleted file mode 100644 index 047eff78b1..0000000000 --- a/2024/CVE-2024-22017.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 915666150, - "name": "cve-2024-22017_to_test", - "full_name": "SpiralBL0CK\/cve-2024-22017_to_test", - "owner": { - "login": "SpiralBL0CK", - "id": 25670930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25670930?v=4", - "html_url": "https:\/\/github.com\/SpiralBL0CK", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/SpiralBL0CK\/cve-2024-22017_to_test", - "description": null, - "fork": false, - "created_at": "2025-01-12T13:40:16Z", - "updated_at": "2025-01-12T13:40:34Z", - "pushed_at": "2025-01-12T13:40:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-22120.json b/2024/CVE-2024-22120.json index d441ae282e..50c90727a2 100644 --- a/2024/CVE-2024-22120.json +++ b/2024/CVE-2024-22120.json @@ -34,37 +34,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 842041393, - "name": "CVE-2024-22120-RCE-with-gopher", - "full_name": "isPique\/CVE-2024-22120-RCE-with-gopher", - "owner": { - "login": "isPique", - "id": 139041426, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139041426?v=4", - "html_url": "https:\/\/github.com\/isPique", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/isPique\/CVE-2024-22120-RCE-with-gopher", - "description": "This is my exploit for CVE-2024-22120, which involves an SSRF vulnerability inside an XXE with a Gopher payload.", - "fork": false, - "created_at": "2024-08-13T14:51:44Z", - "updated_at": "2024-11-18T20:54:20Z", - "pushed_at": "2024-08-13T14:56:42Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 0 - }, { "id": 842565397, "name": "CVE-2024-22120-RCE-with-gopher", diff --git a/2024/CVE-2024-22198.json b/2024/CVE-2024-22198.json deleted file mode 100644 index a62b1970f5..0000000000 --- a/2024/CVE-2024-22198.json +++ /dev/null @@ -1,36 +0,0 @@ -[ - { - "id": 833176749, - "name": "CVE-2024-22198_Checker", - "full_name": "xiw1ll\/CVE-2024-22198_Checker", - "owner": { - "login": "xiw1ll", - "id": 69167284, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69167284?v=4", - "html_url": "https:\/\/github.com\/xiw1ll", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/xiw1ll\/CVE-2024-22198_Checker", - "description": "Identify Nginx-ui version and check if it's vulnerable to CVE-2024-22198", - "fork": false, - "created_at": "2024-07-24T13:59:51Z", - "updated_at": "2024-08-05T08:46:39Z", - "pushed_at": "2024-07-24T14:02:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "checker", - "cve-2024-22198" - ], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-22262.json b/2024/CVE-2024-22262.json deleted file mode 100644 index c402f06e2d..0000000000 --- a/2024/CVE-2024-22262.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 891146409, - "name": "CVE-2024-22262", - "full_name": "Performant-Labs\/CVE-2024-22262", - "owner": { - "login": "Performant-Labs", - "id": 35463594, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35463594?v=4", - "html_url": "https:\/\/github.com\/Performant-Labs", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Performant-Labs\/CVE-2024-22262", - "description": null, - "fork": false, - "created_at": "2024-11-19T20:08:57Z", - "updated_at": "2024-11-22T17:56:59Z", - "pushed_at": "2024-11-22T17:56:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-22274.json b/2024/CVE-2024-22274.json deleted file mode 100644 index b7987a951a..0000000000 --- a/2024/CVE-2024-22274.json +++ /dev/null @@ -1,144 +0,0 @@ -[ - { - "id": 825079199, - "name": "CVE-2024-22274", - "full_name": "mbadanoiu\/CVE-2024-22274", - "owner": { - "login": "mbadanoiu", - "id": 18383407, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4", - "html_url": "https:\/\/github.com\/mbadanoiu", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2024-22274", - "description": "CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server", - "fork": false, - "created_at": "2024-07-06T17:55:25Z", - "updated_at": "2025-01-04T19:32:26Z", - "pushed_at": "2024-07-06T18:10:20Z", - "stargazers_count": 37, - "watchers_count": 37, - "has_discussions": false, - "forks_count": 10, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "0-day", - "authenticated", - "cve", - "cve-2024-22274", - "cves", - "remote-code-execution" - ], - "visibility": "public", - "forks": 10, - "watchers": 37, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 827123627, - "name": "CVE-2024-22274", - "full_name": "ninhpn1337\/CVE-2024-22274", - "owner": { - "login": "ninhpn1337", - "id": 26117234, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26117234?v=4", - "html_url": "https:\/\/github.com\/ninhpn1337", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ninhpn1337\/CVE-2024-22274", - "description": null, - "fork": false, - "created_at": "2024-07-11T04:13:59Z", - "updated_at": "2024-07-11T04:19:52Z", - "pushed_at": "2024-07-11T04:19:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 828815621, - "name": "CVE-2024-22274-RCE", - "full_name": "l0n3m4n\/CVE-2024-22274-RCE", - "owner": { - "login": "l0n3m4n", - "id": 143868630, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143868630?v=4", - "html_url": "https:\/\/github.com\/l0n3m4n", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/l0n3m4n\/CVE-2024-22274-RCE", - "description": "PoC - Authenticated Remote Code Execution in VMware vCenter Server (Exploit)", - "fork": false, - "created_at": "2024-07-15T07:26:59Z", - "updated_at": "2024-12-31T07:44:51Z", - "pushed_at": "2024-07-16T23:22:14Z", - "stargazers_count": 40, - "watchers_count": 40, - "has_discussions": false, - "forks_count": 7, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "bash", - "ctf-challenges", - "exploit", - "pentesting", - "proof-of-concept", - "python", - "redteaming", - "vmware", - "vmware-vcenter", - "vulnerability" - ], - "visibility": "public", - "forks": 7, - "watchers": 40, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 830366409, - "name": "CVE-2024-22274-RCE", - "full_name": "Mustafa1986\/CVE-2024-22274-RCE", - "owner": { - "login": "Mustafa1986", - "id": 27927358, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27927358?v=4", - "html_url": "https:\/\/github.com\/Mustafa1986", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Mustafa1986\/CVE-2024-22274-RCE", - "description": null, - "fork": false, - "created_at": "2024-07-18T06:18:57Z", - "updated_at": "2024-07-18T10:12:25Z", - "pushed_at": "2024-07-18T10:12:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-22275.json b/2024/CVE-2024-22275.json deleted file mode 100644 index 055a836271..0000000000 --- a/2024/CVE-2024-22275.json +++ /dev/null @@ -1,40 +0,0 @@ -[ - { - "id": 825084431, - "name": "CVE-2024-22275", - "full_name": "mbadanoiu\/CVE-2024-22275", - "owner": { - "login": "mbadanoiu", - "id": 18383407, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4", - "html_url": "https:\/\/github.com\/mbadanoiu", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2024-22275", - "description": "CVE-2024-22275: Partial File Read in VMware vCenter Server", - "fork": false, - "created_at": "2024-07-06T18:14:28Z", - "updated_at": "2024-07-11T03:00:33Z", - "pushed_at": "2024-07-06T18:24:53Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "0-day", - "authenticated", - "cve", - "cve-2024-22275", - "cves", - "file-read" - ], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-2242.json b/2024/CVE-2024-2242.json deleted file mode 100644 index ebe69afe42..0000000000 --- a/2024/CVE-2024-2242.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 888883677, - "name": "CVE-2024-2242", - "full_name": "RandomRobbieBF\/CVE-2024-2242", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-2242", - "description": "Contact Form 7 <= 5.9 - Reflected Cross-Site Scripting", - "fork": false, - "created_at": "2024-11-15T07:32:31Z", - "updated_at": "2024-11-15T07:34:53Z", - "pushed_at": "2024-11-15T07:34:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-22734.json b/2024/CVE-2024-22734.json deleted file mode 100644 index 2c2f90bbac..0000000000 --- a/2024/CVE-2024-22734.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 896950815, - "name": "CVE-2024-22734", - "full_name": "securekomodo\/CVE-2024-22734", - "owner": { - "login": "securekomodo", - "id": 4809643, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4809643?v=4", - "html_url": "https:\/\/github.com\/securekomodo", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/securekomodo\/CVE-2024-22734", - "description": "Exploit POC for CVE-2024-22734 affecting AMCS Trux Software", - "fork": false, - "created_at": "2024-12-01T17:47:16Z", - "updated_at": "2024-12-10T05:31:10Z", - "pushed_at": "2024-12-01T17:48:24Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-23002.json b/2024/CVE-2024-23002.json deleted file mode 100644 index 7938ae0373..0000000000 --- a/2024/CVE-2024-23002.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 825318356, - "name": "CVE-2024-23002", - "full_name": "xiaomaoxxx\/CVE-2024-23002", - "owner": { - "login": "xiaomaoxxx", - "id": 99456979, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99456979?v=4", - "html_url": "https:\/\/github.com\/xiaomaoxxx", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/xiaomaoxxx\/CVE-2024-23002", - "description": "this is test POC for git_rce ", - "fork": false, - "created_at": "2024-07-07T12:55:29Z", - "updated_at": "2024-07-07T13:18:11Z", - "pushed_at": "2024-07-07T13:18:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-23113.json b/2024/CVE-2024-23113.json deleted file mode 100644 index 1e1eb26829..0000000000 --- a/2024/CVE-2024-23113.json +++ /dev/null @@ -1,224 +0,0 @@ -[ - { - "id": 871074826, - "name": "cve-2024-23113", - "full_name": "OxLmahdi\/cve-2024-23113", - "owner": { - "login": "OxLmahdi", - "id": 159675795, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/159675795?v=4", - "html_url": "https:\/\/github.com\/OxLmahdi", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/OxLmahdi\/cve-2024-23113", - "description": null, - "fork": false, - "created_at": "2024-10-11T08:13:10Z", - "updated_at": "2024-10-11T08:33:58Z", - "pushed_at": "2024-10-11T08:33:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 871254396, - "name": "CVE-2024-23113", - "full_name": "CheckCve2\/CVE-2024-23113", - "owner": { - "login": "CheckCve2", - "id": 184666422, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/184666422?v=4", - "html_url": "https:\/\/github.com\/CheckCve2", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/CheckCve2\/CVE-2024-23113", - "description": "test_private_CVE", - "fork": false, - "created_at": "2024-10-11T15:16:00Z", - "updated_at": "2024-10-11T15:49:21Z", - "pushed_at": "2024-10-11T15:49:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 0, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 876057743, - "name": "CVE-2024-23113", - "full_name": "p33d\/CVE-2024-23113", - "owner": { - "login": "p33d", - "id": 123099747, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123099747?v=4", - "html_url": "https:\/\/github.com\/p33d", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/p33d\/CVE-2024-23113", - "description": null, - "fork": false, - "created_at": "2024-10-21T10:27:52Z", - "updated_at": "2025-01-07T12:37:20Z", - "pushed_at": "2024-10-27T17:49:33Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 6, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 881252874, - "name": "CVE-2024-23113", - "full_name": "puckiestyle\/CVE-2024-23113", - "owner": { - "login": "puckiestyle", - "id": 57447087, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4", - "html_url": "https:\/\/github.com\/puckiestyle", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/puckiestyle\/CVE-2024-23113", - "description": null, - "fork": false, - "created_at": "2024-10-31T07:44:06Z", - "updated_at": "2024-10-31T07:46:06Z", - "pushed_at": "2024-10-31T07:46:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 889028391, - "name": "CVE-2024-23113", - "full_name": "expl0itsecurity\/CVE-2024-23113", - "owner": { - "login": "expl0itsecurity", - "id": 185355311, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/185355311?v=4", - "html_url": "https:\/\/github.com\/expl0itsecurity", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/expl0itsecurity\/CVE-2024-23113", - "description": null, - "fork": false, - "created_at": "2024-11-15T13:23:19Z", - "updated_at": "2024-12-14T20:30:28Z", - "pushed_at": "2024-11-15T13:25:50Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 892373700, - "name": "cve-2024-23113-exp", - "full_name": "XiaomingX\/cve-2024-23113-exp", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-23113-exp", - "description": "CVE-2024-23113 是一个严重的安全漏洞,影响 Fortinet 的多款产品,包括 FortiOS、FortiProxy、FortiPAM 和 FortiSwitchManager。该漏洞允许未经身份验证的远程攻击者通过特制的请求,在受影响的设备上执行任意代码或命令,可能导致系统被完全控制。", - "fork": false, - "created_at": "2024-11-22T01:46:58Z", - "updated_at": "2025-01-13T18:17:50Z", - "pushed_at": "2024-11-22T01:53:45Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "exp", - "poc", - "rce" - ], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 895404057, - "name": "cve-2024-23113-poc", - "full_name": "XiaomingX\/cve-2024-23113-poc", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-23113-poc", - "description": "CVE-2024-23113 是一个在 Linux Kernel 中被发现的漏洞,它属于 任意代码执行漏洞,影响了 bpf (Berkeley Packet Filter) 子系统。具体来说,这个漏洞影响了 bpf 程序的 bpf_prog 类型的对象,并且可以允许攻击者通过构造恶意的 BPF 程序来在内核空间执行恶意代码。", - "fork": false, - "created_at": "2024-11-28T06:30:02Z", - "updated_at": "2025-01-13T18:16:41Z", - "pushed_at": "2024-11-28T06:35:22Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-23298.json b/2024/CVE-2024-23298.json deleted file mode 100644 index 43226993be..0000000000 --- a/2024/CVE-2024-23298.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 905388354, - "name": "CVE-2024-23298.app", - "full_name": "p1tsi\/CVE-2024-23298.app", - "owner": { - "login": "p1tsi", - "id": 87305534, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87305534?v=4", - "html_url": "https:\/\/github.com\/p1tsi", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/p1tsi\/CVE-2024-23298.app", - "description": "PoC for CVE-2024-23298", - "fork": false, - "created_at": "2024-12-18T18:12:10Z", - "updated_at": "2024-12-20T08:39:25Z", - "pushed_at": "2024-12-18T18:15:28Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-23334.json b/2024/CVE-2024-23334.json index e227940961..cccc8dc4dc 100644 --- a/2024/CVE-2024-23334.json +++ b/2024/CVE-2024-23334.json @@ -218,191 +218,5 @@ "watchers": 4, "score": 0, "subscribers_count": 1 - }, - { - "id": 875667799, - "name": "CVE-2024-23334", - "full_name": "wizarddos\/CVE-2024-23334", - "owner": { - "login": "wizarddos", - "id": 69435721, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69435721?v=4", - "html_url": "https:\/\/github.com\/wizarddos", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/wizarddos\/CVE-2024-23334", - "description": "Proof-of-Concept for LFI\/Path Traversal vulnerability in Aiohttp =< 3.9.1", - "fork": false, - "created_at": "2024-10-20T15:28:58Z", - "updated_at": "2025-01-12T10:53:19Z", - "pushed_at": "2024-10-20T16:48:53Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 885051210, - "name": "CVE-2024-23334", - "full_name": "Pylonet\/CVE-2024-23334", - "owner": { - "login": "Pylonet", - "id": 135266995, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135266995?v=4", - "html_url": "https:\/\/github.com\/Pylonet", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Pylonet\/CVE-2024-23334", - "description": null, - "fork": false, - "created_at": "2024-11-07T21:37:05Z", - "updated_at": "2024-11-24T14:33:40Z", - "pushed_at": "2024-11-24T14:33:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 885827821, - "name": "CVE-2024-23334-PoC", - "full_name": "Arc4he\/CVE-2024-23334-PoC", - "owner": { - "login": "Arc4he", - "id": 168012496, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168012496?v=4", - "html_url": "https:\/\/github.com\/Arc4he", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Arc4he\/CVE-2024-23334-PoC", - "description": "Proof of concept of the parh traversal in python AioHTTP library =< 3.9.1", - "fork": false, - "created_at": "2024-11-09T13:59:28Z", - "updated_at": "2024-11-20T16:31:09Z", - "pushed_at": "2024-11-09T14:18:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 888709297, - "name": "LFI-aiohttp-CVE-2024-23334-PoC", - "full_name": "TheRedP4nther\/LFI-aiohttp-CVE-2024-23334-PoC", - "owner": { - "login": "TheRedP4nther", - "id": 136336480, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/136336480?v=4", - "html_url": "https:\/\/github.com\/TheRedP4nther", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/TheRedP4nther\/LFI-aiohttp-CVE-2024-23334-PoC", - "description": "Bash script to automate Local File Inclusion (LFI) attacks on aiohttp server version 3.9.1.", - "fork": false, - "created_at": "2024-11-14T21:43:29Z", - "updated_at": "2025-01-08T15:21:06Z", - "pushed_at": "2025-01-08T15:21:02Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 900621696, - "name": "CVE-2024-23334-PoC", - "full_name": "Betan423\/CVE-2024-23334-PoC", - "owner": { - "login": "Betan423", - "id": 125627171, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125627171?v=4", - "html_url": "https:\/\/github.com\/Betan423", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Betan423\/CVE-2024-23334-PoC", - "description": "This repository is a proof of concept (POC) for CVE-2024-23334, demonstrating an attempt to replicate the bug in aiohttp that leads to Local File Inclusion (LFI).", - "fork": false, - "created_at": "2024-12-09T06:51:13Z", - "updated_at": "2024-12-11T02:39:50Z", - "pushed_at": "2024-12-09T09:25:16Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 908206696, - "name": "CVE-2024-23334-PoC", - "full_name": "BestDevOfc\/CVE-2024-23334-PoC", - "owner": { - "login": "BestDevOfc", - "id": 164618346, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164618346?v=4", - "html_url": "https:\/\/github.com\/BestDevOfc", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/BestDevOfc\/CVE-2024-23334-PoC", - "description": "A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1", - "fork": false, - "created_at": "2024-12-25T12:50:59Z", - "updated_at": "2024-12-27T11:21:40Z", - "pushed_at": "2024-12-27T11:21:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-23346.json b/2024/CVE-2024-23346.json deleted file mode 100644 index 9933c245dc..0000000000 --- a/2024/CVE-2024-23346.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 883761601, - "name": "CVE-2024-23346", - "full_name": "9carlo6\/CVE-2024-23346", - "owner": { - "login": "9carlo6", - "id": 45871476, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45871476?v=4", - "html_url": "https:\/\/github.com\/9carlo6", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/9carlo6\/CVE-2024-23346", - "description": "This repository contains a Crystallographic Information File (CIF) intended for use on the \"Chemistry\" machine on Hack The Box (HTB).", - "fork": false, - "created_at": "2024-11-05T14:27:06Z", - "updated_at": "2024-12-30T10:41:03Z", - "pushed_at": "2024-11-05T14:32:57Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 901021337, - "name": "CVE-2024-23346", - "full_name": "MAWK0235\/CVE-2024-23346", - "owner": { - "login": "MAWK0235", - "id": 90433993, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90433993?v=4", - "html_url": "https:\/\/github.com\/MAWK0235", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/MAWK0235\/CVE-2024-23346", - "description": "This is an exploit for CVE-2024-23346 that acts as a \"terminal\" (tested on chemistry.htb)", - "fork": false, - "created_at": "2024-12-09T22:34:44Z", - "updated_at": "2024-12-09T23:08:47Z", - "pushed_at": "2024-12-09T22:52:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-23653.json b/2024/CVE-2024-23653.json deleted file mode 100644 index 52b1aec9dd..0000000000 --- a/2024/CVE-2024-23653.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 903010615, - "name": "CVE-2024-23653", - "full_name": "666asd\/CVE-2024-23653", - "owner": { - "login": "666asd", - "id": 16465586, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16465586?v=4", - "html_url": "https:\/\/github.com\/666asd", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/666asd\/CVE-2024-23653", - "description": null, - "fork": false, - "created_at": "2024-12-13T18:27:39Z", - "updated_at": "2024-12-18T17:32:00Z", - "pushed_at": "2024-12-18T17:31:56Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-23692.json b/2024/CVE-2024-23692.json index 2a875aad01..a8f038df48 100644 --- a/2024/CVE-2024-23692.json +++ b/2024/CVE-2024-23692.json @@ -247,37 +247,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 826630505, - "name": "Rejetto-HFS-2.x-RCE-CVE-2024-23692", - "full_name": "pradeepboo\/Rejetto-HFS-2.x-RCE-CVE-2024-23692", - "owner": { - "login": "pradeepboo", - "id": 66199235, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66199235?v=4", - "html_url": "https:\/\/github.com\/pradeepboo", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/pradeepboo\/Rejetto-HFS-2.x-RCE-CVE-2024-23692", - "description": "Rejetto HTTP File Server (HFS) 2.x - Unauthenticated RCE exploit module (CVE-2024-23692)", - "fork": false, - "created_at": "2024-07-10T04:44:27Z", - "updated_at": "2024-08-04T03:30:48Z", - "pushed_at": "2024-07-10T04:55:58Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, { "id": 857714170, "name": "CVE-2024-23692", @@ -313,67 +282,5 @@ "watchers": 35, "score": 0, "subscribers_count": 1 - }, - { - "id": 892922028, - "name": "cve-2024-23692-poc", - "full_name": "XiaomingX\/cve-2024-23692-poc", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-23692-poc", - "description": "CVE-2024-23692 是影响 Rejetto HTTP File Server(HFS)2.3m 及之前版本的模板注入漏洞。该漏洞允许远程未授权的攻击者通过发送特制的 HTTP 请求,在受影响的系统上执行任意命令。", - "fork": false, - "created_at": "2024-11-23T03:59:13Z", - "updated_at": "2025-01-13T18:17:27Z", - "pushed_at": "2024-11-23T04:00:55Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 5, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 906538490, - "name": "HFS2.3_poc", - "full_name": "NingXin2002\/HFS2.3_poc", - "owner": { - "login": "NingXin2002", - "id": 138864342, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138864342?v=4", - "html_url": "https:\/\/github.com\/NingXin2002", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/NingXin2002\/HFS2.3_poc", - "description": "HFS2.3未经身份验证的远程代码执行(CVE-2024-23692)", - "fork": false, - "created_at": "2024-12-21T07:13:11Z", - "updated_at": "2024-12-26T16:21:28Z", - "pushed_at": "2024-12-21T07:14:26Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-23708.json b/2024/CVE-2024-23708.json deleted file mode 100644 index 0a46ca3797..0000000000 --- a/2024/CVE-2024-23708.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 839858072, - "name": "CVE-2024-23708", - "full_name": "uthrasri\/CVE-2024-23708", - "owner": { - "login": "uthrasri", - "id": 145666390, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4", - "html_url": "https:\/\/github.com\/uthrasri", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/uthrasri\/CVE-2024-23708", - "description": null, - "fork": false, - "created_at": "2024-08-08T13:16:58Z", - "updated_at": "2024-08-08T13:28:22Z", - "pushed_at": "2024-08-08T13:28:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-23709.json b/2024/CVE-2024-23709.json deleted file mode 100644 index 844dacce68..0000000000 --- a/2024/CVE-2024-23709.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 841887434, - "name": "external_sonivox_CVE-2024-23709", - "full_name": "AbrarKhan\/external_sonivox_CVE-2024-23709", - "owner": { - "login": "AbrarKhan", - "id": 3054615, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3054615?v=4", - "html_url": "https:\/\/github.com\/AbrarKhan", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/AbrarKhan\/external_sonivox_CVE-2024-23709", - "description": null, - "fork": false, - "created_at": "2024-08-13T08:44:25Z", - "updated_at": "2024-10-22T08:57:01Z", - "pushed_at": "2024-08-13T08:52:23Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-23897.json b/2024/CVE-2024-23897.json index 2c1f008257..718e008c48 100644 --- a/2024/CVE-2024-23897.json +++ b/2024/CVE-2024-23897.json @@ -1035,76 +1035,5 @@ "watchers": 6, "score": 0, "subscribers_count": 1 - }, - { - "id": 900230397, - "name": "CVE-2024-23897-Vulnerabilidad-Jenkins", - "full_name": "D1se0\/CVE-2024-23897-Vulnerabilidad-Jenkins", - "owner": { - "login": "D1se0", - "id": 164921056, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164921056?v=4", - "html_url": "https:\/\/github.com\/D1se0", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/D1se0\/CVE-2024-23897-Vulnerabilidad-Jenkins", - "description": null, - "fork": false, - "created_at": "2024-12-08T08:13:34Z", - "updated_at": "2024-12-08T08:46:39Z", - "pushed_at": "2024-12-08T08:46:36Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "auto-mount", - "cve-2024-23897", - "docker", - "docker-container", - "ethical-hacking", - "hacking", - "jenkins", - "laboratory" - ], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 911010933, - "name": "jenkins-lfi", - "full_name": "Marouane133\/jenkins-lfi", - "owner": { - "login": "Marouane133", - "id": 164184419, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164184419?v=4", - "html_url": "https:\/\/github.com\/Marouane133", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Marouane133\/jenkins-lfi", - "description": "Jenkins CVE-2024-23897 POC : Arbitrary File Read Vulnerability Leading to RCE", - "fork": false, - "created_at": "2025-01-02T03:28:56Z", - "updated_at": "2025-01-03T02:56:41Z", - "pushed_at": "2025-01-03T02:56:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-24549.json b/2024/CVE-2024-24549.json index 9be23802b6..4b8f2739bb 100644 --- a/2024/CVE-2024-24549.json +++ b/2024/CVE-2024-24549.json @@ -29,36 +29,5 @@ "watchers": 5, "score": 0, "subscribers_count": 1 - }, - { - "id": 900584602, - "name": "CVE-2024-24549", - "full_name": "JFOZ1010\/CVE-2024-24549", - "owner": { - "login": "JFOZ1010", - "id": 82562585, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82562585?v=4", - "html_url": "https:\/\/github.com\/JFOZ1010", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/JFOZ1010\/CVE-2024-24549", - "description": "Proof of concept of the CVE-2024-24549, Exploit in Python. ", - "fork": false, - "created_at": "2024-12-09T04:59:07Z", - "updated_at": "2025-01-13T01:24:19Z", - "pushed_at": "2024-12-16T23:48:12Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 6, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-24590.json b/2024/CVE-2024-24590.json index 6a201b2152..239585a8e9 100644 --- a/2024/CVE-2024-24590.json +++ b/2024/CVE-2024-24590.json @@ -122,98 +122,5 @@ "watchers": 1, "score": 0, "subscribers_count": 1 - }, - { - "id": 831603638, - "name": "ClearML-CVE-2024-24590-RCE", - "full_name": "sviim\/ClearML-CVE-2024-24590-RCE", - "owner": { - "login": "sviim", - "id": 172663851, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172663851?v=4", - "html_url": "https:\/\/github.com\/sviim", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/sviim\/ClearML-CVE-2024-24590-RCE", - "description": "With this script you can exploit the CVE-2024-24590", - "fork": false, - "created_at": "2024-07-21T04:16:24Z", - "updated_at": "2024-11-20T16:30:57Z", - "pushed_at": "2024-07-21T04:48:47Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 840977646, - "name": "cve-2024-24590", - "full_name": "Bigb972003\/cve-2024-24590", - "owner": { - "login": "Bigb972003", - "id": 139943997, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139943997?v=4", - "html_url": "https:\/\/github.com\/Bigb972003", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Bigb972003\/cve-2024-24590", - "description": null, - "fork": false, - "created_at": "2024-08-11T09:21:08Z", - "updated_at": "2024-08-11T09:21:08Z", - "pushed_at": "2024-08-11T09:21:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 869071531, - "name": "CVE-2024-24590", - "full_name": "j3r1ch0123\/CVE-2024-24590", - "owner": { - "login": "j3r1ch0123", - "id": 110147529, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110147529?v=4", - "html_url": "https:\/\/github.com\/j3r1ch0123", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/j3r1ch0123\/CVE-2024-24590", - "description": "Created this exploit for the Hack The Box machine, Blurry.", - "fork": false, - "created_at": "2024-10-07T17:07:10Z", - "updated_at": "2024-10-07T17:18:24Z", - "pushed_at": "2024-10-07T17:18:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-24684.json b/2024/CVE-2024-24684.json deleted file mode 100644 index 3090d31259..0000000000 --- a/2024/CVE-2024-24684.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 873286914, - "name": "CVE-2024-24684", - "full_name": "SpiralBL0CK\/CVE-2024-24684", - "owner": { - "login": "SpiralBL0CK", - "id": 25670930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25670930?v=4", - "html_url": "https:\/\/github.com\/SpiralBL0CK", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/SpiralBL0CK\/CVE-2024-24684", - "description": "Crash File ( Poc for CVE-2024-24684)", - "fork": false, - "created_at": "2024-10-15T23:04:32Z", - "updated_at": "2024-10-15T23:05:12Z", - "pushed_at": "2024-10-15T23:05:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-24685.json b/2024/CVE-2024-24685.json deleted file mode 100644 index 57eed979b3..0000000000 --- a/2024/CVE-2024-24685.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 873290083, - "name": "CVE-2024-24685", - "full_name": "SpiralBL0CK\/CVE-2024-24685", - "owner": { - "login": "SpiralBL0CK", - "id": 25670930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25670930?v=4", - "html_url": "https:\/\/github.com\/SpiralBL0CK", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/SpiralBL0CK\/CVE-2024-24685", - "description": "Crash File ( Poc for CVE-2024-24685)", - "fork": false, - "created_at": "2024-10-15T23:16:05Z", - "updated_at": "2024-10-15T23:16:35Z", - "pushed_at": "2024-10-15T23:16:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-24686.json b/2024/CVE-2024-24686.json deleted file mode 100644 index 7981c62316..0000000000 --- a/2024/CVE-2024-24686.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 873291160, - "name": "CVE-2024-24686", - "full_name": "SpiralBL0CK\/CVE-2024-24686", - "owner": { - "login": "SpiralBL0CK", - "id": 25670930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25670930?v=4", - "html_url": "https:\/\/github.com\/SpiralBL0CK", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/SpiralBL0CK\/CVE-2024-24686", - "description": "Crash File ( Poc for CVE-2024-24686)", - "fork": false, - "created_at": "2024-10-15T23:20:34Z", - "updated_at": "2024-10-16T08:47:37Z", - "pushed_at": "2024-10-15T23:20:47Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-24725.json b/2024/CVE-2024-24725.json deleted file mode 100644 index e72493732a..0000000000 --- a/2024/CVE-2024-24725.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 877945371, - "name": "CVE-2024-24725-PoC", - "full_name": "MelkorW\/CVE-2024-24725-PoC", - "owner": { - "login": "MelkorW", - "id": 144314304, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144314304?v=4", - "html_url": "https:\/\/github.com\/MelkorW", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/MelkorW\/CVE-2024-24725-PoC", - "description": null, - "fork": false, - "created_at": "2024-10-24T14:07:47Z", - "updated_at": "2024-10-25T07:04:17Z", - "pushed_at": "2024-10-24T14:08:15Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-24919.json b/2024/CVE-2024-24919.json index 231a53fb89..507b7b3fde 100644 --- a/2024/CVE-2024-24919.json +++ b/2024/CVE-2024-24919.json @@ -1472,99 +1472,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 828696142, - "name": "CVE-2024-24919", - "full_name": "ShadowByte1\/CVE-2024-24919", - "owner": { - "login": "ShadowByte1", - "id": 155693555, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155693555?v=4", - "html_url": "https:\/\/github.com\/ShadowByte1", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ShadowByte1\/CVE-2024-24919", - "description": null, - "fork": false, - "created_at": "2024-07-14T23:26:51Z", - "updated_at": "2024-07-14T23:33:02Z", - "pushed_at": "2024-07-14T23:33:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 831985405, - "name": "CVE-2024-24919", - "full_name": "H3KEY\/CVE-2024-24919", - "owner": { - "login": "H3KEY", - "id": 176267746, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176267746?v=4", - "html_url": "https:\/\/github.com\/H3KEY", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/H3KEY\/CVE-2024-24919", - "description": "Hello everyone, I am sharing a modified script from CVE-2024-24919 which can extract paths categorized as critical.", - "fork": false, - "created_at": "2024-07-22T06:04:13Z", - "updated_at": "2024-07-22T06:07:47Z", - "pushed_at": "2024-07-22T06:07:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 834172359, - "name": "cve-2024-24919", - "full_name": "Jutrm\/cve-2024-24919", - "owner": { - "login": "Jutrm", - "id": 84643295, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84643295?v=4", - "html_url": "https:\/\/github.com\/Jutrm", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Jutrm\/cve-2024-24919", - "description": null, - "fork": false, - "created_at": "2024-07-26T15:17:58Z", - "updated_at": "2024-07-26T15:23:05Z", - "pushed_at": "2024-07-26T15:23:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 849356755, "name": "Arbitrary-File-Read-CVE-2024-24919", @@ -1672,98 +1579,5 @@ "watchers": 6, "score": 0, "subscribers_count": 1 - }, - { - "id": 870254088, - "name": "CVE-2024-24919", - "full_name": "skyrowalker\/CVE-2024-24919", - "owner": { - "login": "skyrowalker", - "id": 156471538, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156471538?v=4", - "html_url": "https:\/\/github.com\/skyrowalker", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/skyrowalker\/CVE-2024-24919", - "description": null, - "fork": false, - "created_at": "2024-10-09T17:54:28Z", - "updated_at": "2024-10-11T00:53:35Z", - "pushed_at": "2024-10-10T13:34:31Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 879969031, - "name": "CVE-2024-24919_POC", - "full_name": "sar-3mar\/CVE-2024-24919_POC", - "owner": { - "login": "sar-3mar", - "id": 105809777, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105809777?v=4", - "html_url": "https:\/\/github.com\/sar-3mar", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/sar-3mar\/CVE-2024-24919_POC", - "description": "It's Proof of Concept on CVE-2024-24919-POC , i made it after it's discoverd ", - "fork": false, - "created_at": "2024-10-28T21:54:41Z", - "updated_at": "2024-10-28T22:08:32Z", - "pushed_at": "2024-10-28T22:08:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 906477862, - "name": "Check-Point_poc", - "full_name": "NingXin2002\/Check-Point_poc", - "owner": { - "login": "NingXin2002", - "id": 138864342, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138864342?v=4", - "html_url": "https:\/\/github.com\/NingXin2002", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/NingXin2002\/Check-Point_poc", - "description": "Check-Point安全网关任意文件读取漏洞(CVE-2024-24919)", - "fork": false, - "created_at": "2024-12-21T02:42:10Z", - "updated_at": "2024-12-26T16:21:11Z", - "pushed_at": "2024-12-21T02:43:40Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-24926.json b/2024/CVE-2024-24926.json deleted file mode 100644 index b18a21e8e8..0000000000 --- a/2024/CVE-2024-24926.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 901496601, - "name": "CVE-2024-24926", - "full_name": "moften\/CVE-2024-24926", - "owner": { - "login": "moften", - "id": 4262359, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4262359?v=4", - "html_url": "https:\/\/github.com\/moften", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/moften\/CVE-2024-24926", - "description": "Vulnerabilidad CVE-2024-24926 afecta al tema Brooklyn de WordPress", - "fork": false, - "created_at": "2024-12-10T19:08:03Z", - "updated_at": "2024-12-11T16:39:06Z", - "pushed_at": "2024-12-11T16:39:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-25600.json b/2024/CVE-2024-25600.json index 457ab51c46..6da15bb886 100644 --- a/2024/CVE-2024-25600.json +++ b/2024/CVE-2024-25600.json @@ -327,37 +327,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 835649473, - "name": "CVE-2024-25600-Bricks-Builder-WordPress", - "full_name": "KaSooMi0228\/CVE-2024-25600-Bricks-Builder-WordPress", - "owner": { - "login": "KaSooMi0228", - "id": 171640266, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171640266?v=4", - "html_url": "https:\/\/github.com\/KaSooMi0228", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/KaSooMi0228\/CVE-2024-25600-Bricks-Builder-WordPress", - "description": null, - "fork": false, - "created_at": "2024-07-30T09:02:31Z", - "updated_at": "2024-07-30T09:04:34Z", - "pushed_at": "2024-07-30T09:04:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 845015155, "name": "CVE-2024-25600", diff --git a/2024/CVE-2024-25641.json b/2024/CVE-2024-25641.json index 2eb7f3b5b8..716340f639 100644 --- a/2024/CVE-2024-25641.json +++ b/2024/CVE-2024-25641.json @@ -139,67 +139,5 @@ "watchers": 7, "score": 0, "subscribers_count": 1 - }, - { - "id": 892647431, - "name": "cve-2024-25641-poc", - "full_name": "XiaomingX\/cve-2024-25641-poc", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-25641-poc", - "description": "PoC for CVE-2024-25641 Authenticated RCE on Cacti v1.2.26", - "fork": false, - "created_at": "2024-11-22T14:05:37Z", - "updated_at": "2025-01-13T18:17:48Z", - "pushed_at": "2024-11-22T14:09:15Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 912544022, - "name": "CVE-2024-25641", - "full_name": "D3Ext\/CVE-2024-25641", - "owner": { - "login": "D3Ext", - "id": 67125397, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67125397?v=4", - "html_url": "https:\/\/github.com\/D3Ext", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/D3Ext\/CVE-2024-25641", - "description": "POC exploit for CVE-2024-25641", - "fork": false, - "created_at": "2025-01-05T21:33:18Z", - "updated_at": "2025-01-06T22:33:40Z", - "pushed_at": "2025-01-06T18:50:17Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-25897.json b/2024/CVE-2024-25897.json deleted file mode 100644 index ee34cbc857..0000000000 --- a/2024/CVE-2024-25897.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 839988308, - "name": "CVE-2024-25897", - "full_name": "i-100-user\/CVE-2024-25897", - "owner": { - "login": "i-100-user", - "id": 171415197, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171415197?v=4", - "html_url": "https:\/\/github.com\/i-100-user", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/i-100-user\/CVE-2024-25897", - "description": "exploit que vulnera Jenkins hecho en Python ", - "fork": false, - "created_at": "2024-08-08T18:21:44Z", - "updated_at": "2024-11-20T16:31:00Z", - "pushed_at": "2024-08-09T00:09:48Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-26160.json b/2024/CVE-2024-26160.json deleted file mode 100644 index b37c07c7e4..0000000000 --- a/2024/CVE-2024-26160.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 868851090, - "name": "CVE-2024-26160", - "full_name": "CrackerCat\/CVE-2024-26160", - "owner": { - "login": "CrackerCat", - "id": 17995064, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4", - "html_url": "https:\/\/github.com\/CrackerCat", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/CrackerCat\/CVE-2024-26160", - "description": "cldflt.sys information disclosure vulnerability (KB5034765 - KB5035853, Win 11).", - "fork": false, - "created_at": "2024-10-07T09:46:09Z", - "updated_at": "2024-10-07T09:46:09Z", - "pushed_at": "2024-10-04T00:14:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-26229.json b/2024/CVE-2024-26229.json index a836096f62..044a5e06af 100644 --- a/2024/CVE-2024-26229.json +++ b/2024/CVE-2024-26229.json @@ -153,36 +153,5 @@ "watchers": 36, "score": 0, "subscribers_count": 3 - }, - { - "id": 871953279, - "name": "CVE-2024-26229", - "full_name": "mqxmm\/CVE-2024-26229", - "owner": { - "login": "mqxmm", - "id": 79595418, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79595418?v=4", - "html_url": "https:\/\/github.com\/mqxmm", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/mqxmm\/CVE-2024-26229", - "description": null, - "fork": false, - "created_at": "2024-10-13T12:10:35Z", - "updated_at": "2024-10-13T12:11:24Z", - "pushed_at": "2024-10-13T12:11:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-26304.json b/2024/CVE-2024-26304.json deleted file mode 100644 index e8c9646b7c..0000000000 --- a/2024/CVE-2024-26304.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 867909796, - "name": "CVE-2024-26304-RCE-exploit", - "full_name": "X-Projetion\/CVE-2024-26304-RCE-exploit", - "owner": { - "login": "X-Projetion", - "id": 161194427, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161194427?v=4", - "html_url": "https:\/\/github.com\/X-Projetion", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/X-Projetion\/CVE-2024-26304-RCE-exploit", - "description": "CVE-2024-26304 is a critical vulnerability (CVSS score of 9.8) affecting ArubaOS", - "fork": false, - "created_at": "2024-10-05T01:38:36Z", - "updated_at": "2024-10-21T06:16:38Z", - "pushed_at": "2024-10-05T01:51:59Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-26308.json b/2024/CVE-2024-26308.json deleted file mode 100644 index 8293b3f564..0000000000 --- a/2024/CVE-2024-26308.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 841056629, - "name": "cve", - "full_name": "crazycatMyopic\/cve", - "owner": { - "login": "crazycatMyopic", - "id": 70164315, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70164315?v=4", - "html_url": "https:\/\/github.com\/crazycatMyopic", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/crazycatMyopic\/cve", - "description": "Docker Deskop giving issue CVE-2024-26308 for maven [reproduce]", - "fork": false, - "created_at": "2024-08-11T14:10:14Z", - "updated_at": "2024-08-11T20:25:10Z", - "pushed_at": "2024-08-11T20:25:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-2667.json b/2024/CVE-2024-2667.json index edf473c35e..dbbc28bf3b 100644 --- a/2024/CVE-2024-2667.json +++ b/2024/CVE-2024-2667.json @@ -29,36 +29,5 @@ "watchers": 2, "score": 0, "subscribers_count": 1 - }, - { - "id": 912431927, - "name": "CVE-2024-2667-Poc", - "full_name": "Nxploited\/CVE-2024-2667-Poc", - "owner": { - "login": "Nxploited", - "id": 188819918, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4", - "html_url": "https:\/\/github.com\/Nxploited", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-2667-Poc", - "description": null, - "fork": false, - "created_at": "2025-01-05T15:03:50Z", - "updated_at": "2025-01-05T16:21:03Z", - "pushed_at": "2025-01-05T16:21:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-27115.json b/2024/CVE-2024-27115.json deleted file mode 100644 index c31404a4e3..0000000000 --- a/2024/CVE-2024-27115.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 913334263, - "name": "CVE-2024-27115-Exploit", - "full_name": "theexploiters\/CVE-2024-27115-Exploit", - "owner": { - "login": "theexploiters", - "id": 185040501, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/185040501?v=4", - "html_url": "https:\/\/github.com\/theexploiters", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/theexploiters\/CVE-2024-27115-Exploit", - "description": "Exploit For SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated)", - "fork": false, - "created_at": "2025-01-07T13:38:34Z", - "updated_at": "2025-01-12T21:19:20Z", - "pushed_at": "2025-01-07T14:16:47Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-27130.json b/2024/CVE-2024-27130.json index b6cf2ca62d..6dc43df38d 100644 --- a/2024/CVE-2024-27130.json +++ b/2024/CVE-2024-27130.json @@ -60,36 +60,5 @@ "watchers": 1, "score": 0, "subscribers_count": 2 - }, - { - "id": 892653629, - "name": "cve-2024-27130-poc", - "full_name": "XiaomingX\/cve-2024-27130-poc", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-27130-poc", - "description": "CVE-2024-27130是影响QNAP网络附加存储(NAS)设备的一个严重漏洞。该漏洞源于QTS操作系统中share.cgi脚本的No_Support_ACL函数中不安全地使用strcpy函数,导致堆栈缓冲区溢出。攻击者可以利用此漏洞,通过精心构造的请求在目标系统上执行任意代码,进而完全控制受影响的设备。 ", - "fork": false, - "created_at": "2024-11-22T14:18:08Z", - "updated_at": "2025-01-13T18:17:47Z", - "pushed_at": "2024-11-22T14:20:28Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 4, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-27198.json b/2024/CVE-2024-27198.json index 8b3955dec0..9850b10e71 100644 --- a/2024/CVE-2024-27198.json +++ b/2024/CVE-2024-27198.json @@ -315,37 +315,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 831484050, - "name": "CVE-2024-27198", - "full_name": "HPT-Intern-Task-Submission\/CVE-2024-27198", - "owner": { - "login": "HPT-Intern-Task-Submission", - "id": 169382051, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169382051?v=4", - "html_url": "https:\/\/github.com\/HPT-Intern-Task-Submission", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/HPT-Intern-Task-Submission\/CVE-2024-27198", - "description": null, - "fork": false, - "created_at": "2024-07-20T17:26:13Z", - "updated_at": "2024-07-20T17:28:45Z", - "pushed_at": "2024-07-20T17:28:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - }, { "id": 843255325, "name": "CVE-2024-27198", @@ -376,67 +345,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 870123268, - "name": "CVE-2024-27198", - "full_name": "geniuszly\/CVE-2024-27198", - "owner": { - "login": "geniuszly", - "id": 137893386, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4", - "html_url": "https:\/\/github.com\/geniuszly", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-27198", - "description": "is a PoC tool that targets a vulnerability in the TeamCity server (CVE-2024-27198)", - "fork": false, - "created_at": "2024-10-09T13:36:56Z", - "updated_at": "2024-10-21T08:14:55Z", - "pushed_at": "2024-10-09T13:37:56Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 872559049, - "name": "CVE-2024-27198_POC", - "full_name": "Cythonic1\/CVE-2024-27198_POC", - "owner": { - "login": "Cythonic1", - "id": 163199970, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/163199970?v=4", - "html_url": "https:\/\/github.com\/Cythonic1", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Cythonic1\/CVE-2024-27198_POC", - "description": "a proof of concept of the CVE-2024-27198 which infect jetbrains teamCity", - "fork": false, - "created_at": "2024-10-14T16:40:58Z", - "updated_at": "2024-10-21T13:17:52Z", - "pushed_at": "2024-10-21T10:05:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-27292.json b/2024/CVE-2024-27292.json deleted file mode 100644 index 6e8c8ed91a..0000000000 --- a/2024/CVE-2024-27292.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 822912763, - "name": "CVE-2024-27292", - "full_name": "th3gokul\/CVE-2024-27292", - "owner": { - "login": "th3gokul", - "id": 89386101, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89386101?v=4", - "html_url": "https:\/\/github.com\/th3gokul", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/th3gokul\/CVE-2024-27292", - "description": "CVE-2024-27292 : Docassemble V1.4.96 Unauthenticated Path Traversal", - "fork": false, - "created_at": "2024-07-02T04:41:35Z", - "updated_at": "2024-08-01T14:45:11Z", - "pushed_at": "2024-07-02T11:39:54Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 8, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 906487773, - "name": "Docassemble_poc", - "full_name": "NingXin2002\/Docassemble_poc", - "owner": { - "login": "NingXin2002", - "id": 138864342, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138864342?v=4", - "html_url": "https:\/\/github.com\/NingXin2002", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/NingXin2002\/Docassemble_poc", - "description": "Docassemble任意文件读取漏洞(CVE-2024-27292)", - "fork": false, - "created_at": "2024-12-21T03:35:19Z", - "updated_at": "2024-12-26T16:21:16Z", - "pushed_at": "2024-12-21T03:36:49Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-27821.json b/2024/CVE-2024-27821.json deleted file mode 100644 index 9a2202a98b..0000000000 --- a/2024/CVE-2024-27821.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 890033348, - "name": "CVE-2024-27821", - "full_name": "0xilis\/CVE-2024-27821", - "owner": { - "login": "0xilis", - "id": 109871561, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109871561?v=4", - "html_url": "https:\/\/github.com\/0xilis", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/0xilis\/CVE-2024-27821", - "description": "Writeup and PoC of CVE-2024-27821, for education purposes.", - "fork": false, - "created_at": "2024-11-17T20:56:41Z", - "updated_at": "2024-12-02T12:59:18Z", - "pushed_at": "2024-11-17T21:43:36Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-27954.json b/2024/CVE-2024-27954.json deleted file mode 100644 index 26a59185eb..0000000000 --- a/2024/CVE-2024-27954.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 880016834, - "name": "CVE-2024-27954", - "full_name": "gh-ost00\/CVE-2024-27954", - "owner": { - "login": "gh-ost00", - "id": 153366162, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153366162?v=4", - "html_url": "https:\/\/github.com\/gh-ost00", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/gh-ost00\/CVE-2024-27954", - "description": "Automatic Plugin for WordPress < 3.92.1 Multiples Vulnerabilities", - "fork": false, - "created_at": "2024-10-29T00:46:35Z", - "updated_at": "2024-12-17T20:19:31Z", - "pushed_at": "2024-10-29T02:47:13Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 880766464, - "name": "CVE-2024-27954", - "full_name": "Quantum-Hacker\/CVE-2024-27954", - "owner": { - "login": "Quantum-Hacker", - "id": 140636140, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140636140?v=4", - "html_url": "https:\/\/github.com\/Quantum-Hacker", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Quantum-Hacker\/CVE-2024-27954", - "description": null, - "fork": false, - "created_at": "2024-10-30T10:14:54Z", - "updated_at": "2024-10-30T10:33:37Z", - "pushed_at": "2024-10-30T10:32:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-27956.json b/2024/CVE-2024-27956.json index bb6a3f8ba9..84f2952875 100644 --- a/2024/CVE-2024-27956.json +++ b/2024/CVE-2024-27956.json @@ -369,98 +369,5 @@ "watchers": 0, "score": 0, "subscribers_count": 0 - }, - { - "id": 827369395, - "name": "CVE-2024-27956", - "full_name": "ThatNotEasy\/CVE-2024-27956", - "owner": { - "login": "ThatNotEasy", - "id": 25004320, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4", - "html_url": "https:\/\/github.com\/ThatNotEasy", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2024-27956", - "description": "Perform with massive Wordpress SQLI 2 RCE", - "fork": false, - "created_at": "2024-07-11T14:17:23Z", - "updated_at": "2024-10-30T04:42:06Z", - "pushed_at": "2024-07-11T14:20:59Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 7, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 832540537, - "name": "EXPLOITING-CVE-2024-27956", - "full_name": "CERTologists\/EXPLOITING-CVE-2024-27956", - "owner": { - "login": "CERTologists", - "id": 176203032, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176203032?v=4", - "html_url": "https:\/\/github.com\/CERTologists", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/CERTologists\/EXPLOITING-CVE-2024-27956", - "description": null, - "fork": false, - "created_at": "2024-07-23T08:24:56Z", - "updated_at": "2024-07-23T08:27:15Z", - "pushed_at": "2024-07-23T08:27:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 906111399, - "name": "CVE-2024-27956-for-fscan", - "full_name": "7aRanchi\/CVE-2024-27956-for-fscan", - "owner": { - "login": "7aRanchi", - "id": 96373545, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96373545?v=4", - "html_url": "https:\/\/github.com\/7aRanchi", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/7aRanchi\/CVE-2024-27956-for-fscan", - "description": "Yaml PoC rule for fscan.", - "fork": false, - "created_at": "2024-12-20T07:30:24Z", - "updated_at": "2024-12-20T08:09:11Z", - "pushed_at": "2024-12-20T08:09:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-28116.json b/2024/CVE-2024-28116.json index 5657a14dbb..b7f4230595 100644 --- a/2024/CVE-2024-28116.json +++ b/2024/CVE-2024-28116.json @@ -70,36 +70,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 868072354, - "name": "GenGravSSTIExploit", - "full_name": "geniuszly\/GenGravSSTIExploit", - "owner": { - "login": "geniuszly", - "id": 137893386, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4", - "html_url": "https:\/\/github.com\/geniuszly", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/geniuszly\/GenGravSSTIExploit", - "description": "is a PoC Python script that exploits an authenticated Server-Side Template Injection (SSTI) vulnerability in Grav CMS versions <= 1.7.44 (CVE-2024-28116)", - "fork": false, - "created_at": "2024-10-05T12:05:06Z", - "updated_at": "2025-01-12T18:29:06Z", - "pushed_at": "2024-10-05T12:08:37Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 7, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-2876.json b/2024/CVE-2024-2876.json index 6289ee15d5..bb442beb02 100644 --- a/2024/CVE-2024-2876.json +++ b/2024/CVE-2024-2876.json @@ -91,67 +91,5 @@ "watchers": 2, "score": 0, "subscribers_count": 1 - }, - { - "id": 870293883, - "name": "CVE-2024-2876", - "full_name": "skyrowalker\/CVE-2024-2876", - "owner": { - "login": "skyrowalker", - "id": 156471538, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156471538?v=4", - "html_url": "https:\/\/github.com\/skyrowalker", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/skyrowalker\/CVE-2024-2876", - "description": null, - "fork": false, - "created_at": "2024-10-09T19:24:53Z", - "updated_at": "2024-12-31T13:26:25Z", - "pushed_at": "2024-10-11T20:09:16Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 889247775, - "name": "CVE-2024-2876", - "full_name": "issamjr\/CVE-2024-2876", - "owner": { - "login": "issamjr", - "id": 101994309, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101994309?v=4", - "html_url": "https:\/\/github.com\/issamjr", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/issamjr\/CVE-2024-2876", - "description": "WP-SQL-Injection CVE-2024-2876 AND 2024-CVE-2024-3495", - "fork": false, - "created_at": "2024-11-15T22:39:48Z", - "updated_at": "2024-11-20T16:31:11Z", - "pushed_at": "2024-11-15T22:50:43Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-28987.json b/2024/CVE-2024-28987.json index 33e4445c44..e0598511c1 100644 --- a/2024/CVE-2024-28987.json +++ b/2024/CVE-2024-28987.json @@ -91,36 +91,5 @@ "watchers": 2, "score": 0, "subscribers_count": 1 - }, - { - "id": 889030458, - "name": "CVE-2024-28987", - "full_name": "expl0itsecurity\/CVE-2024-28987", - "owner": { - "login": "expl0itsecurity", - "id": 185355311, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/185355311?v=4", - "html_url": "https:\/\/github.com\/expl0itsecurity", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/expl0itsecurity\/CVE-2024-28987", - "description": null, - "fork": false, - "created_at": "2024-11-15T13:27:46Z", - "updated_at": "2024-12-14T20:30:29Z", - "pushed_at": "2024-11-15T13:31:14Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-28995.json b/2024/CVE-2024-28995.json index 7995b6f8aa..674ebb958b 100644 --- a/2024/CVE-2024-28995.json +++ b/2024/CVE-2024-28995.json @@ -216,46 +216,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 822568244, - "name": "CVE-2024-28995", - "full_name": "Stuub\/CVE-2024-28995", - "owner": { - "login": "Stuub", - "id": 60468836, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60468836?v=4", - "html_url": "https:\/\/github.com\/Stuub", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Stuub\/CVE-2024-28995", - "description": "CVE-2024-28955 Exploitation PoC ", - "fork": false, - "created_at": "2024-07-01T11:49:51Z", - "updated_at": "2024-12-13T10:42:54Z", - "pushed_at": "2024-07-01T12:53:21Z", - "stargazers_count": 35, - "watchers_count": 35, - "has_discussions": false, - "forks_count": 5, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2024", - "cve-2024-28995", - "exploit", - "nist", - "owasp", - "poc", - "solarwinds" - ], - "visibility": "public", - "forks": 5, - "watchers": 35, - "score": 0, - "subscribers_count": 2 - }, { "id": 847037561, "name": "CVE-2024-28995", diff --git a/2024/CVE-2024-29050.json b/2024/CVE-2024-29050.json deleted file mode 100644 index ca46cc49af..0000000000 --- a/2024/CVE-2024-29050.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 867522608, - "name": "CVE-2024-29050", - "full_name": "Akrachli\/CVE-2024-29050", - "owner": { - "login": "Akrachli", - "id": 75633934, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75633934?v=4", - "html_url": "https:\/\/github.com\/Akrachli", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Akrachli\/CVE-2024-29050", - "description": "CVE-2024-29050 is a vulnerability found in the Windows Cryptographic Services.", - "fork": false, - "created_at": "2024-10-04T08:19:11Z", - "updated_at": "2024-10-07T14:07:37Z", - "pushed_at": "2024-10-04T08:24:47Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-29269.json b/2024/CVE-2024-29269.json index 96258f5368..1d63077fc3 100644 --- a/2024/CVE-2024-29269.json +++ b/2024/CVE-2024-29269.json @@ -123,57 +123,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 822837368, - "name": "CVE-2024-29269-EXPLOIT", - "full_name": "K3ysTr0K3R\/CVE-2024-29269-EXPLOIT", - "owner": { - "login": "K3ysTr0K3R", - "id": 70909693, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4", - "html_url": "https:\/\/github.com\/K3ysTr0K3R", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2024-29269-EXPLOIT", - "description": "A PoC exploit for CVE-2024-29269 - Telesquare TLR-2005KSH Remote Code Execution (RCE)", - "fork": false, - "created_at": "2024-07-01T23:49:59Z", - "updated_at": "2024-11-26T16:10:08Z", - "pushed_at": "2024-07-02T00:00:59Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "bugs", - "critical", - "cve-2024-29269", - "devices", - "exploit", - "exploitation", - "exploits", - "iot", - "poc", - "proof-of-concept", - "rce", - "rce-exploit", - "rce-scanner", - "remote-code-execution", - "router", - "telesquare", - "tlr-2005ksh", - "vulnerabilities", - "vulnerability" - ], - "visibility": "public", - "forks": 3, - "watchers": 5, - "score": 0, - "subscribers_count": 1 - }, { "id": 854044213, "name": "CVE-2024-29269-RCE", diff --git a/2024/CVE-2024-2928.json b/2024/CVE-2024-2928.json deleted file mode 100644 index 05c08ea526..0000000000 --- a/2024/CVE-2024-2928.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 885154667, - "name": "CVE-2024-2928", - "full_name": "nuridincersaygili\/CVE-2024-2928", - "owner": { - "login": "nuridincersaygili", - "id": 45103481, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45103481?v=4", - "html_url": "https:\/\/github.com\/nuridincersaygili", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/nuridincersaygili\/CVE-2024-2928", - "description": "Arbitrary file read exploit for CVE-2024-2928 in mlflow ", - "fork": false, - "created_at": "2024-11-08T03:55:08Z", - "updated_at": "2024-11-20T12:08:00Z", - "pushed_at": "2024-11-08T04:11:07Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-29404.json b/2024/CVE-2024-29404.json deleted file mode 100644 index 289d4ccfce..0000000000 --- a/2024/CVE-2024-29404.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 893452720, - "name": "CVE-2024-29404_Razer", - "full_name": "mansk1es\/CVE-2024-29404_Razer", - "owner": { - "login": "mansk1es", - "id": 74832816, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74832816?v=4", - "html_url": "https:\/\/github.com\/mansk1es", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/mansk1es\/CVE-2024-29404_Razer", - "description": null, - "fork": false, - "created_at": "2024-11-24T13:43:36Z", - "updated_at": "2024-12-20T15:01:41Z", - "pushed_at": "2024-11-27T12:02:59Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-29415.json b/2024/CVE-2024-29415.json deleted file mode 100644 index c9276ad194..0000000000 --- a/2024/CVE-2024-29415.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 824470499, - "name": "node-ip-vex", - "full_name": "felipecruz91\/node-ip-vex", - "owner": { - "login": "felipecruz91", - "id": 15997951, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15997951?v=4", - "html_url": "https:\/\/github.com\/felipecruz91", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/felipecruz91\/node-ip-vex", - "description": "Sample project that uses VEX to supress CVE-2024-29415.", - "fork": false, - "created_at": "2024-07-05T07:50:29Z", - "updated_at": "2024-09-18T22:48:03Z", - "pushed_at": "2024-07-05T09:49:24Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-29510.json b/2024/CVE-2024-29510.json deleted file mode 100644 index 4c508e003f..0000000000 --- a/2024/CVE-2024-29510.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 826318568, - "name": "CVE-2024-29510", - "full_name": "swsmith2391\/CVE-2024-29510", - "owner": { - "login": "swsmith2391", - "id": 50335205, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50335205?v=4", - "html_url": "https:\/\/github.com\/swsmith2391", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/swsmith2391\/CVE-2024-29510", - "description": "POC code for CVE-2024-29510 and demo VulnApp", - "fork": false, - "created_at": "2024-07-09T13:27:40Z", - "updated_at": "2024-07-10T17:37:31Z", - "pushed_at": "2024-07-10T17:34:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-29671.json b/2024/CVE-2024-29671.json deleted file mode 100644 index 24d7efe84c..0000000000 --- a/2024/CVE-2024-29671.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 892033272, - "name": "CVE-2024-29671-POC", - "full_name": "laskdjlaskdj12\/CVE-2024-29671-POC", - "owner": { - "login": "laskdjlaskdj12", - "id": 16471540, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16471540?v=4", - "html_url": "https:\/\/github.com\/laskdjlaskdj12", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/laskdjlaskdj12\/CVE-2024-29671-POC", - "description": "This is POC of CVE-2024-29671", - "fork": false, - "created_at": "2024-11-21T11:51:04Z", - "updated_at": "2024-12-17T12:22:28Z", - "pushed_at": "2024-12-17T12:22:24Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-29863.json b/2024/CVE-2024-29863.json deleted file mode 100644 index b45d731dc6..0000000000 --- a/2024/CVE-2024-29863.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 832020588, - "name": "qlikview-poc-CVE-2024-29863", - "full_name": "pawlokk\/qlikview-poc-CVE-2024-29863", - "owner": { - "login": "pawlokk", - "id": 93943097, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93943097?v=4", - "html_url": "https:\/\/github.com\/pawlokk", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/pawlokk\/qlikview-poc-CVE-2024-29863", - "description": "PoC for LPE with QlikView", - "fork": false, - "created_at": "2024-07-22T07:38:34Z", - "updated_at": "2024-07-22T07:40:44Z", - "pushed_at": "2024-07-22T07:40:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-29973.json b/2024/CVE-2024-29973.json index 67685c5f16..8dd47e5e3c 100644 --- a/2024/CVE-2024-29973.json +++ b/2024/CVE-2024-29973.json @@ -153,36 +153,5 @@ "watchers": 5, "score": 0, "subscribers_count": 1 - }, - { - "id": 870929719, - "name": "CVE-2024-29973", - "full_name": "skyrowalker\/CVE-2024-29973", - "owner": { - "login": "skyrowalker", - "id": 156471538, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156471538?v=4", - "html_url": "https:\/\/github.com\/skyrowalker", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/skyrowalker\/CVE-2024-29973", - "description": null, - "fork": false, - "created_at": "2024-10-10T23:48:55Z", - "updated_at": "2024-10-11T20:10:47Z", - "pushed_at": "2024-10-11T20:10:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-30052.json b/2024/CVE-2024-30052.json deleted file mode 100644 index e525e73612..0000000000 --- a/2024/CVE-2024-30052.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 867811373, - "name": "CVE-2024-30052", - "full_name": "ynwarcs\/CVE-2024-30052", - "owner": { - "login": "ynwarcs", - "id": 108408574, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108408574?v=4", - "html_url": "https:\/\/github.com\/ynwarcs", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ynwarcs\/CVE-2024-30052", - "description": "Materials for CVE-2024-30052.", - "fork": false, - "created_at": "2024-10-04T19:09:45Z", - "updated_at": "2024-12-21T05:56:21Z", - "pushed_at": "2024-10-04T20:28:39Z", - "stargazers_count": 11, - "watchers_count": 11, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 11, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-30085.json b/2024/CVE-2024-30085.json deleted file mode 100644 index 62fa850ace..0000000000 --- a/2024/CVE-2024-30085.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 908098736, - "name": "CVE-2024-30085", - "full_name": "Adamkadaban\/CVE-2024-30085", - "owner": { - "login": "Adamkadaban", - "id": 34610663, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34610663?v=4", - "html_url": "https:\/\/github.com\/Adamkadaban", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Adamkadaban\/CVE-2024-30085", - "description": "CVE-2024-30085", - "fork": false, - "created_at": "2024-12-25T06:03:45Z", - "updated_at": "2025-01-13T01:11:28Z", - "pushed_at": "2024-12-27T02:08:14Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 909306710, - "name": "Exploit-PoC-para-CVE-2024-30085", - "full_name": "murdok1982\/Exploit-PoC-para-CVE-2024-30085", - "owner": { - "login": "murdok1982", - "id": 14059710, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14059710?v=4", - "html_url": "https:\/\/github.com\/murdok1982", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/murdok1982\/Exploit-PoC-para-CVE-2024-30085", - "description": " Exploit en Python diseñado para aprovechar la vulnerabilidad de elevación de privilegios CVE-2024-30085", - "fork": false, - "created_at": "2024-12-28T10:03:26Z", - "updated_at": "2024-12-28T10:12:41Z", - "pushed_at": "2024-12-28T10:12:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json index 698bed2a2e..37b5bedb58 100644 --- a/2024/CVE-2024-30088.json +++ b/2024/CVE-2024-30088.json @@ -61,37 +61,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 824657284, - "name": "CVE-2024-30088-Windows-poc", - "full_name": "Zombie-Kaiser\/CVE-2024-30088-Windows-poc", - "owner": { - "login": "Zombie-Kaiser", - "id": 141570642, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141570642?v=4", - "html_url": "https:\/\/github.com\/Zombie-Kaiser", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Zombie-Kaiser\/CVE-2024-30088-Windows-poc", - "description": "该漏洞存在于 NtQueryInformationToken 函数中,特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。", - "fork": false, - "created_at": "2024-07-05T16:02:56Z", - "updated_at": "2025-01-13T09:56:20Z", - "pushed_at": "2024-07-05T16:06:16Z", - "stargazers_count": 35, - "watchers_count": 35, - "has_discussions": false, - "forks_count": 15, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 15, - "watchers": 35, - "score": 0, - "subscribers_count": 1 - }, { "id": 828831210, "name": "collateral-damage", @@ -107,10 +76,10 @@ "description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088", "fork": false, "created_at": "2024-07-15T08:07:05Z", - "updated_at": "2025-01-12T12:25:35Z", + "updated_at": "2025-01-14T19:52:07Z", "pushed_at": "2024-09-08T21:23:34Z", - "stargazers_count": 435, - "watchers_count": 435, + "stargazers_count": 436, + "watchers_count": 436, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -119,41 +88,10 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 435, + "watchers": 436, "score": 0, "subscribers_count": 21 }, - { - "id": 834461917, - "name": "CVE-2024-30088", - "full_name": "Admin9961\/CVE-2024-30088", - "owner": { - "login": "Admin9961", - "id": 121270287, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121270287?v=4", - "html_url": "https:\/\/github.com\/Admin9961", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Admin9961\/CVE-2024-30088", - "description": "Questa repository contiene una replica (tentativo di replica) scritto in Python per CVE-2024-30088.", - "fork": false, - "created_at": "2024-07-27T10:41:33Z", - "updated_at": "2024-08-20T19:17:32Z", - "pushed_at": "2024-07-27T16:30:36Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, { "id": 847302794, "name": "exploits-forsale-collateral-damage", diff --git a/2024/CVE-2024-30090.json b/2024/CVE-2024-30090.json deleted file mode 100644 index 234d66904c..0000000000 --- a/2024/CVE-2024-30090.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 874092793, - "name": "CVE-2024-30090", - "full_name": "Dor00tkit\/CVE-2024-30090", - "owner": { - "login": "Dor00tkit", - "id": 47893732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47893732?v=4", - "html_url": "https:\/\/github.com\/Dor00tkit", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Dor00tkit\/CVE-2024-30090", - "description": "CVE-2024-30090 - LPE PoC", - "fork": false, - "created_at": "2024-10-17T08:38:47Z", - "updated_at": "2024-12-29T15:35:38Z", - "pushed_at": "2024-10-17T09:53:33Z", - "stargazers_count": 103, - "watchers_count": 103, - "has_discussions": false, - "forks_count": 22, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 22, - "watchers": 103, - "score": 0, - "subscribers_count": 3 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index 86827f04f9..36d10f5fc8 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -1764,37 +1764,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 824564785, - "name": "CVE-2024-3094", - "full_name": "DANO-AMP\/CVE-2024-3094", - "owner": { - "login": "DANO-AMP", - "id": 40738457, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40738457?v=4", - "html_url": "https:\/\/github.com\/DANO-AMP", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/DANO-AMP\/CVE-2024-3094", - "description": "SSH EXPLOIT BYPASS AUTH SSH", - "fork": false, - "created_at": "2024-07-05T12:02:10Z", - "updated_at": "2024-08-06T14:09:40Z", - "pushed_at": "2024-07-05T12:03:22Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, { "id": 824707729, "name": "ifuncd-up", @@ -1840,36 +1809,5 @@ "watchers": 12, "score": 0, "subscribers_count": 1 - }, - { - "id": 896714567, - "name": "cve-2024-3094-xz-backdoor-exploit", - "full_name": "XiaomingX\/cve-2024-3094-xz-backdoor-exploit", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-3094-xz-backdoor-exploit", - "description": "CVE-2024-3094 (XZ Backdoor) Tools", - "fork": false, - "created_at": "2024-12-01T05:22:08Z", - "updated_at": "2025-01-13T18:16:22Z", - "pushed_at": "2024-12-01T05:30:15Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 6, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-3105.json b/2024/CVE-2024-3105.json deleted file mode 100644 index 539e462ec5..0000000000 --- a/2024/CVE-2024-3105.json +++ /dev/null @@ -1,41 +0,0 @@ -[ - { - "id": 840743710, - "name": "CVE-2024-3105-PoC", - "full_name": "hunThubSpace\/CVE-2024-3105-PoC", - "owner": { - "login": "hunThubSpace", - "id": 49031710, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49031710?v=4", - "html_url": "https:\/\/github.com\/hunThubSpace", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/hunThubSpace\/CVE-2024-3105-PoC", - "description": "A PoC Exploit for CVE-2024-3105 - The Woody code snippets – Insert Header Footer Code, AdSense Ads plugin for WordPress Remote Code Execution (RCE)", - "fork": false, - "created_at": "2024-08-10T14:52:44Z", - "updated_at": "2024-10-02T19:21:21Z", - "pushed_at": "2024-08-10T15:22:07Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "bugbounty", - "cve", - "cve-2024-3105", - "ethical-hacking", - "exploit", - "penetration-testing", - "web" - ], - "visibility": "public", - "forks": 2, - "watchers": 2, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-31211.json b/2024/CVE-2024-31211.json deleted file mode 100644 index cf5e1a2c3a..0000000000 --- a/2024/CVE-2024-31211.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 837708625, - "name": "-CVE-2024-31211", - "full_name": "Abdurahmon3236\/-CVE-2024-31211", - "owner": { - "login": "Abdurahmon3236", - "id": 76862934, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76862934?v=4", - "html_url": "https:\/\/github.com\/Abdurahmon3236", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Abdurahmon3236\/-CVE-2024-31211", - "description": null, - "fork": false, - "created_at": "2024-08-03T19:26:55Z", - "updated_at": "2024-08-29T13:31:15Z", - "pushed_at": "2024-08-03T19:29:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-31317.json b/2024/CVE-2024-31317.json deleted file mode 100644 index 1909db4997..0000000000 --- a/2024/CVE-2024-31317.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 898761841, - "name": "CVE-2024-31317", - "full_name": "fuhei\/CVE-2024-31317", - "owner": { - "login": "fuhei", - "id": 21951803, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21951803?v=4", - "html_url": "https:\/\/github.com\/fuhei", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/fuhei\/CVE-2024-31317", - "description": "CVE-2024-31317", - "fork": false, - "created_at": "2024-12-05T01:36:59Z", - "updated_at": "2025-01-14T05:34:46Z", - "pushed_at": "2024-12-05T01:52:45Z", - "stargazers_count": 15, - "watchers_count": 15, - "has_discussions": false, - "forks_count": 5, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 5, - "watchers": 15, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-31319.json b/2024/CVE-2024-31319.json deleted file mode 100644 index 88e94897d8..0000000000 --- a/2024/CVE-2024-31319.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 870013225, - "name": "fix-02-failure-CVE-2024-31319-CVE-2024-0039", - "full_name": "MssGmz99\/fix-02-failure-CVE-2024-31319-CVE-2024-0039", - "owner": { - "login": "MssGmz99", - "id": 184337003, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/184337003?v=4", - "html_url": "https:\/\/github.com\/MssGmz99", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/MssGmz99\/fix-02-failure-CVE-2024-31319-CVE-2024-0039", - "description": null, - "fork": false, - "created_at": "2024-10-09T09:40:10Z", - "updated_at": "2024-10-09T09:40:10Z", - "pushed_at": "2024-08-23T09:34:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-31989.json b/2024/CVE-2024-31989.json deleted file mode 100644 index ed585364ff..0000000000 --- a/2024/CVE-2024-31989.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 830068924, - "name": "CVE-2024-31989", - "full_name": "vt0x78\/CVE-2024-31989", - "owner": { - "login": "vt0x78", - "id": 140315902, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140315902?v=4", - "html_url": "https:\/\/github.com\/vt0x78", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/vt0x78\/CVE-2024-31989", - "description": "Exploit for CVE-2024-31989.", - "fork": false, - "created_at": "2024-07-17T14:23:52Z", - "updated_at": "2024-08-08T18:35:48Z", - "pushed_at": "2024-07-24T12:06:55Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json index 86c0c7dbfa..e8b5a9bcb3 100644 --- a/2024/CVE-2024-32002.json +++ b/2024/CVE-2024-32002.json @@ -248,7 +248,7 @@ "stargazers_count": 104, "watchers_count": 104, "has_discussions": false, - "forks_count": 25, + "forks_count": 26, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -258,7 +258,7 @@ "rce" ], "visibility": "public", - "forks": 25, + "forks": 26, "watchers": 104, "score": 0, "subscribers_count": 3 @@ -1451,230 +1451,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 825352916, - "name": "CVE-2024-32002-hook", - "full_name": "sysonlai\/CVE-2024-32002-hook", - "owner": { - "login": "sysonlai", - "id": 23263310, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23263310?v=4", - "html_url": "https:\/\/github.com\/sysonlai", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/sysonlai\/CVE-2024-32002-hook", - "description": null, - "fork": false, - "created_at": "2024-07-07T14:50:23Z", - "updated_at": "2024-07-07T15:06:42Z", - "pushed_at": "2024-07-07T15:06:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 831254914, - "name": "CVE-2024-32002-git-rce-father-poc", - "full_name": "TSY244\/CVE-2024-32002-git-rce-father-poc", - "owner": { - "login": "TSY244", - "id": 115205751, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115205751?v=4", - "html_url": "https:\/\/github.com\/TSY244", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/TSY244\/CVE-2024-32002-git-rce-father-poc", - "description": null, - "fork": false, - "created_at": "2024-07-20T03:59:35Z", - "updated_at": "2024-07-20T03:59:43Z", - "pushed_at": "2024-07-20T03:59:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 831261401, - "name": "CVE-2024-32002-git-rce", - "full_name": "TSY244\/CVE-2024-32002-git-rce", - "owner": { - "login": "TSY244", - "id": 115205751, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115205751?v=4", - "html_url": "https:\/\/github.com\/TSY244", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/TSY244\/CVE-2024-32002-git-rce", - "description": null, - "fork": false, - "created_at": "2024-07-20T04:31:26Z", - "updated_at": "2024-07-20T04:31:34Z", - "pushed_at": "2024-07-20T04:31:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 834651199, - "name": "CVE-2024-32002", - "full_name": "blackninja23\/CVE-2024-32002", - "owner": { - "login": "blackninja23", - "id": 78839207, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78839207?v=4", - "html_url": "https:\/\/github.com\/blackninja23", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/blackninja23\/CVE-2024-32002", - "description": null, - "fork": false, - "created_at": "2024-07-27T23:44:25Z", - "updated_at": "2024-07-27T23:56:40Z", - "pushed_at": "2024-07-27T23:56:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 834840343, - "name": "CVE-2024-32002", - "full_name": "daemon-reconfig\/CVE-2024-32002", - "owner": { - "login": "daemon-reconfig", - "id": 69844188, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69844188?v=4", - "html_url": "https:\/\/github.com\/daemon-reconfig", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/daemon-reconfig\/CVE-2024-32002", - "description": "A Reverse shell generator for gitlab-shell vulnerability cve 2024-32002", - "fork": false, - "created_at": "2024-07-28T14:22:01Z", - "updated_at": "2024-08-02T09:25:53Z", - "pushed_at": "2024-08-02T09:25:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 835173287, - "name": "CVE-2024-32002", - "full_name": "charlesgargasson\/CVE-2024-32002", - "owner": { - "login": "charlesgargasson", - "id": 26895987, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26895987?v=4", - "html_url": "https:\/\/github.com\/charlesgargasson", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/charlesgargasson\/CVE-2024-32002", - "description": "GIT RCE CVE-2024-32002", - "fork": false, - "created_at": "2024-07-29T10:00:41Z", - "updated_at": "2024-11-16T10:58:35Z", - "pushed_at": "2024-07-30T23:27:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-32002", - "exploit", - "htb", - "linux", - "poc", - "windows" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 835802048, - "name": "CVE-2024-32002-PoC", - "full_name": "NishanthAnand21\/CVE-2024-32002-PoC", - "owner": { - "login": "NishanthAnand21", - "id": 87749392, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87749392?v=4", - "html_url": "https:\/\/github.com\/NishanthAnand21", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/NishanthAnand21\/CVE-2024-32002-PoC", - "description": "PoC of CVE-2024-32002 - Remote Code Execution while cloning special-crafted local repositories", - "fork": false, - "created_at": "2024-07-30T14:58:00Z", - "updated_at": "2024-12-24T09:45:12Z", - "pushed_at": "2024-07-30T16:01:17Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, { "id": 835952440, "name": "CVE-2024-32002", @@ -1706,68 +1482,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 835980205, - "name": "CVE-2024-32002", - "full_name": "SpycioKon\/CVE-2024-32002", - "owner": { - "login": "SpycioKon", - "id": 77606941, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77606941?v=4", - "html_url": "https:\/\/github.com\/SpycioKon", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/SpycioKon\/CVE-2024-32002", - "description": "Just small script to exploit CVE-2024-32002", - "fork": false, - "created_at": "2024-07-30T23:20:51Z", - "updated_at": "2024-07-30T23:26:17Z", - "pushed_at": "2024-07-30T23:26:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 837343866, - "name": "running-CVE-2024-32002-locally-for-tesing", - "full_name": "chrisWalker11\/running-CVE-2024-32002-locally-for-tesing", - "owner": { - "login": "chrisWalker11", - "id": 51098965, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51098965?v=4", - "html_url": "https:\/\/github.com\/chrisWalker11", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/chrisWalker11\/running-CVE-2024-32002-locally-for-tesing", - "description": "adapting CVE-2024-32002 for running offline and locally", - "fork": false, - "created_at": "2024-08-02T18:44:00Z", - "updated_at": "2024-08-04T17:39:52Z", - "pushed_at": "2024-08-04T17:38:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 843863510, "name": "CVE-2024-32002", @@ -1891,129 +1605,5 @@ "watchers": 1, "score": 0, "subscribers_count": 1 - }, - { - "id": 869470523, - "name": "hook_CVE-2024-32002", - "full_name": "Julian-gmz\/hook_CVE-2024-32002", - "owner": { - "login": "Julian-gmz", - "id": 77108278, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77108278?v=4", - "html_url": "https:\/\/github.com\/Julian-gmz", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Julian-gmz\/hook_CVE-2024-32002", - "description": "hihihihaa", - "fork": false, - "created_at": "2024-10-08T10:57:17Z", - "updated_at": "2024-12-04T16:21:49Z", - "pushed_at": "2024-12-04T16:21:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 876714741, - "name": "CVE-2024-32002", - "full_name": "grecosamuel\/CVE-2024-32002", - "owner": { - "login": "grecosamuel", - "id": 97310811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97310811?v=4", - "html_url": "https:\/\/github.com\/grecosamuel", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/grecosamuel\/CVE-2024-32002", - "description": null, - "fork": false, - "created_at": "2024-10-22T12:44:44Z", - "updated_at": "2024-12-10T13:26:47Z", - "pushed_at": "2024-11-25T10:35:21Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 892923707, - "name": "cve-2024-32002-poc", - "full_name": "XiaomingX\/cve-2024-32002-poc", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-32002-poc", - "description": "CVE-2024-32002 是 Git 中的一个严重漏洞,允许攻击者在用户执行 git clone 操作时远程执行任意代码(RCE)。", - "fork": false, - "created_at": "2024-11-23T04:06:33Z", - "updated_at": "2025-01-13T18:17:28Z", - "pushed_at": "2024-11-23T04:07:03Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 901717526, - "name": "donald", - "full_name": "jolibb55\/donald", - "owner": { - "login": "jolibb55", - "id": 183569041, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/183569041?v=4", - "html_url": "https:\/\/github.com\/jolibb55", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/jolibb55\/donald", - "description": "An example of a repo that would make use of the CVE-2024-32002", - "fork": false, - "created_at": "2024-12-11T07:22:59Z", - "updated_at": "2024-12-11T08:44:17Z", - "pushed_at": "2024-12-11T07:22:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-32104.json b/2024/CVE-2024-32104.json deleted file mode 100644 index c954d84830..0000000000 --- a/2024/CVE-2024-32104.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 836230704, - "name": "CVE-2024-32104", - "full_name": "Cerberus-HiproPlus\/CVE-2024-32104", - "owner": { - "login": "Cerberus-HiproPlus", - "id": 176384180, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176384180?v=4", - "html_url": "https:\/\/github.com\/Cerberus-HiproPlus", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Cerberus-HiproPlus\/CVE-2024-32104", - "description": null, - "fork": false, - "created_at": "2024-07-31T12:20:07Z", - "updated_at": "2024-08-01T07:08:09Z", - "pushed_at": "2024-08-01T07:08:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-32113.json b/2024/CVE-2024-32113.json index 5c737512c8..883b5901bd 100644 --- a/2024/CVE-2024-32113.json +++ b/2024/CVE-2024-32113.json @@ -70,67 +70,5 @@ "watchers": 24, "score": 0, "subscribers_count": 1 - }, - { - "id": 839216934, - "name": "CVE-2024-32113", - "full_name": "YongYe-Security\/CVE-2024-32113", - "owner": { - "login": "YongYe-Security", - "id": 90460865, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90460865?v=4", - "html_url": "https:\/\/github.com\/YongYe-Security", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/YongYe-Security\/CVE-2024-32113", - "description": "CVE-2024-32113 Apache OFBIZ Batch Scanning", - "fork": false, - "created_at": "2024-08-07T07:12:56Z", - "updated_at": "2024-11-30T07:58:18Z", - "pushed_at": "2024-08-07T07:16:26Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 5, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 907739057, - "name": "CVE-2024-32113", - "full_name": "MikeyPPPPPPPP\/CVE-2024-32113", - "owner": { - "login": "MikeyPPPPPPPP", - "id": 50926811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50926811?v=4", - "html_url": "https:\/\/github.com\/MikeyPPPPPPPP", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/MikeyPPPPPPPP\/CVE-2024-32113", - "description": "CVE-2024-32113 PoC", - "fork": false, - "created_at": "2024-12-24T09:16:23Z", - "updated_at": "2024-12-25T03:04:01Z", - "pushed_at": "2024-12-25T03:03:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-32640.json b/2024/CVE-2024-32640.json index bd3f2fd7de..b0a8e98292 100644 --- a/2024/CVE-2024-32640.json +++ b/2024/CVE-2024-32640.json @@ -103,36 +103,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 887494835, - "name": "CVE-2024-32640", - "full_name": "pizza-power\/CVE-2024-32640", - "owner": { - "login": "pizza-power", - "id": 6135659, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6135659?v=4", - "html_url": "https:\/\/github.com\/pizza-power", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/pizza-power\/CVE-2024-32640", - "description": "Python POC for CVE-2024-32640 Mura CMS SQLi", - "fork": false, - "created_at": "2024-11-12T20:50:11Z", - "updated_at": "2024-11-16T12:30:55Z", - "pushed_at": "2024-11-15T16:30:18Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-32700.json b/2024/CVE-2024-32700.json deleted file mode 100644 index df3ee36565..0000000000 --- a/2024/CVE-2024-32700.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 837513457, - "name": "CVE-2024-32700", - "full_name": "nastar-id\/CVE-2024-32700", - "owner": { - "login": "nastar-id", - "id": 57721604, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57721604?v=4", - "html_url": "https:\/\/github.com\/nastar-id", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/nastar-id\/CVE-2024-32700", - "description": null, - "fork": false, - "created_at": "2024-08-03T07:41:30Z", - "updated_at": "2024-08-05T17:20:40Z", - "pushed_at": "2024-08-05T17:20:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-33231.json b/2024/CVE-2024-33231.json deleted file mode 100644 index 29038e16de..0000000000 --- a/2024/CVE-2024-33231.json +++ /dev/null @@ -1,37 +0,0 @@ -[ - { - "id": 875006628, - "name": "CVE-2024-33231", - "full_name": "fdzdev\/CVE-2024-33231", - "owner": { - "login": "fdzdev", - "id": 17630462, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17630462?v=4", - "html_url": "https:\/\/github.com\/fdzdev", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/fdzdev\/CVE-2024-33231", - "description": "XSS Vulnerability via File Upload in Ferozo Webmail Application", - "fork": false, - "created_at": "2024-10-18T22:09:27Z", - "updated_at": "2024-11-13T07:54:01Z", - "pushed_at": "2024-10-18T22:13:32Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2024-33231", - "cves" - ], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-33297.json b/2024/CVE-2024-33297.json deleted file mode 100644 index 6d577add27..0000000000 --- a/2024/CVE-2024-33297.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 914929938, - "name": "CVE-2024-33297", - "full_name": "MathSabo\/CVE-2024-33297", - "owner": { - "login": "MathSabo", - "id": 110696037, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110696037?v=4", - "html_url": "https:\/\/github.com\/MathSabo", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/MathSabo\/CVE-2024-33297", - "description": "Stored Cross Site Scripting vulnerability in Microweber < 2.0.9", - "fork": false, - "created_at": "2025-01-10T15:48:20Z", - "updated_at": "2025-01-10T16:15:22Z", - "pushed_at": "2025-01-10T16:15:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-33298.json b/2024/CVE-2024-33298.json deleted file mode 100644 index f8967165ec..0000000000 --- a/2024/CVE-2024-33298.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 914938551, - "name": "CVE-2024-33298", - "full_name": "MathSabo\/CVE-2024-33298", - "owner": { - "login": "MathSabo", - "id": 110696037, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110696037?v=4", - "html_url": "https:\/\/github.com\/MathSabo", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/MathSabo\/CVE-2024-33298", - "description": "Stored Cross Site Scripting vulnerability in Microweber < 2.0.9", - "fork": false, - "created_at": "2025-01-10T16:08:42Z", - "updated_at": "2025-01-10T16:15:14Z", - "pushed_at": "2025-01-10T16:15:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-33299.json b/2024/CVE-2024-33299.json deleted file mode 100644 index c243d80aaf..0000000000 --- a/2024/CVE-2024-33299.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 914941872, - "name": "CVE-2024-33299", - "full_name": "MathSabo\/CVE-2024-33299", - "owner": { - "login": "MathSabo", - "id": 110696037, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110696037?v=4", - "html_url": "https:\/\/github.com\/MathSabo", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/MathSabo\/CVE-2024-33299", - "description": "Stored Cross Site Scripting vulnerability in Microweber < 2.0.9", - "fork": false, - "created_at": "2025-01-10T16:16:39Z", - "updated_at": "2025-01-10T16:19:33Z", - "pushed_at": "2025-01-10T16:19:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-33352.json b/2024/CVE-2024-33352.json deleted file mode 100644 index 3343ecf72a..0000000000 --- a/2024/CVE-2024-33352.json +++ /dev/null @@ -1,41 +0,0 @@ -[ - { - "id": 829319256, - "name": "CVE-2024-33352", - "full_name": "mmiszczyk\/CVE-2024-33352", - "owner": { - "login": "mmiszczyk", - "id": 20739931, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20739931?v=4", - "html_url": "https:\/\/github.com\/mmiszczyk", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/mmiszczyk\/CVE-2024-33352", - "description": "BlueStacks privilege escalation through VM backdooring", - "fork": false, - "created_at": "2024-07-16T07:38:19Z", - "updated_at": "2024-12-08T12:11:30Z", - "pushed_at": "2024-07-16T09:12:57Z", - "stargazers_count": 19, - "watchers_count": 19, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "advisory", - "android-emulator", - "cve", - "exploit", - "privilege-escalation", - "security", - "vm-escape" - ], - "visibility": "public", - "forks": 3, - "watchers": 19, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-33901.json b/2024/CVE-2024-33901.json deleted file mode 100644 index efd27dc2fb..0000000000 --- a/2024/CVE-2024-33901.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 893321019, - "name": "CVE-2024-33901-ProofOfConcept", - "full_name": "gmikisilva\/CVE-2024-33901-ProofOfConcept", - "owner": { - "login": "gmikisilva", - "id": 101853134, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101853134?v=4", - "html_url": "https:\/\/github.com\/gmikisilva", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/gmikisilva\/CVE-2024-33901-ProofOfConcept", - "description": "Short program that demonstrates the vulnerability CVE-2024-33901 in KeePassXC version 2.7.7", - "fork": false, - "created_at": "2024-11-24T05:43:27Z", - "updated_at": "2024-11-25T06:15:40Z", - "pushed_at": "2024-11-24T23:34:03Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-3393.json b/2024/CVE-2024-3393.json deleted file mode 100644 index d26bce9748..0000000000 --- a/2024/CVE-2024-3393.json +++ /dev/null @@ -1,73 +0,0 @@ -[ - { - "id": 911931261, - "name": "-CVE-2024-3393", - "full_name": "FelixFoxf\/-CVE-2024-3393", - "owner": { - "login": "FelixFoxf", - "id": 114032917, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114032917?v=4", - "html_url": "https:\/\/github.com\/FelixFoxf", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/FelixFoxf\/-CVE-2024-3393", - "description": " CVE-2024-3393 EXPLOIT", - "fork": false, - "created_at": "2025-01-04T08:18:06Z", - "updated_at": "2025-01-09T17:11:33Z", - "pushed_at": "2025-01-04T08:19:36Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 914582236, - "name": "CVE-2024-3393", - "full_name": "waived\/CVE-2024-3393", - "owner": { - "login": "waived", - "id": 165493645, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165493645?v=4", - "html_url": "https:\/\/github.com\/waived", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/waived\/CVE-2024-3393", - "description": "PAN-OS: Firewall Denial-of-Service exploit via malicious DNS query", - "fork": false, - "created_at": "2025-01-09T22:03:07Z", - "updated_at": "2025-01-09T23:12:43Z", - "pushed_at": "2025-01-09T22:05:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-3393", - "denial-of-service", - "dns-attack", - "exploit", - "palo-alto-networks", - "pan-os", - "proof-of-concept", - "python3" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-3400.json b/2024/CVE-2024-3400.json index 8f30fb4730..9fbde71699 100644 --- a/2024/CVE-2024-3400.json +++ b/2024/CVE-2024-3400.json @@ -1098,98 +1098,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 887034499, - "name": "CVE-2024-3400", - "full_name": "workshop748\/CVE-2024-3400", - "owner": { - "login": "workshop748", - "id": 101908212, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101908212?v=4", - "html_url": "https:\/\/github.com\/workshop748", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/workshop748\/CVE-2024-3400", - "description": "Attempt at making the CVE-2024-3400 initial exploit (for educational purposes)", - "fork": false, - "created_at": "2024-11-12T03:46:39Z", - "updated_at": "2024-11-12T03:47:21Z", - "pushed_at": "2024-11-12T03:47:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 896349076, - "name": "CVE-2024-3400", - "full_name": "nanwinata\/CVE-2024-3400", - "owner": { - "login": "nanwinata", - "id": 50732289, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50732289?v=4", - "html_url": "https:\/\/github.com\/nanwinata", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/nanwinata\/CVE-2024-3400", - "description": "CVE-2024-3400 PAN-OS Vulnerability Scanner.", - "fork": false, - "created_at": "2024-11-30T05:47:12Z", - "updated_at": "2024-11-30T05:48:45Z", - "pushed_at": "2024-11-30T05:48:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 914642331, - "name": "CVE-2024-3400-poc", - "full_name": "XiaomingX\/CVE-2024-3400-poc", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/CVE-2024-3400-poc", - "description": "CVE-2024-3400的攻击脚本", - "fork": false, - "created_at": "2025-01-10T02:20:26Z", - "updated_at": "2025-01-13T18:15:02Z", - "pushed_at": "2025-01-10T02:22:27Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 5, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-34102.json b/2024/CVE-2024-34102.json index f78a3d1878..70102434f6 100644 --- a/2024/CVE-2024-34102.json +++ b/2024/CVE-2024-34102.json @@ -216,340 +216,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 822404350, - "name": "CVE-2024-34102", - "full_name": "cmsec423\/CVE-2024-34102", - "owner": { - "login": "cmsec423", - "id": 174170165, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174170165?v=4", - "html_url": "https:\/\/github.com\/cmsec423", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/cmsec423\/CVE-2024-34102", - "description": "Magento XXE", - "fork": false, - "created_at": "2024-07-01T05:06:42Z", - "updated_at": "2024-07-01T05:06:42Z", - "pushed_at": "2024-07-01T05:06:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 822404987, - "name": "Magento-XXE-CVE-2024-34102", - "full_name": "cmsec423\/Magento-XXE-CVE-2024-34102", - "owner": { - "login": "cmsec423", - "id": 174170165, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174170165?v=4", - "html_url": "https:\/\/github.com\/cmsec423", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/cmsec423\/Magento-XXE-CVE-2024-34102", - "description": null, - "fork": false, - "created_at": "2024-07-01T05:08:37Z", - "updated_at": "2024-07-01T05:08:37Z", - "pushed_at": "2024-07-01T05:08:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 822475682, - "name": "CVE-2024-34102-CosmicSting-XXE-in-Adobe-Commerce-and-Magento", - "full_name": "jakabakos\/CVE-2024-34102-CosmicSting-XXE-in-Adobe-Commerce-and-Magento", - "owner": { - "login": "jakabakos", - "id": 42498816, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4", - "html_url": "https:\/\/github.com\/jakabakos", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/jakabakos\/CVE-2024-34102-CosmicSting-XXE-in-Adobe-Commerce-and-Magento", - "description": "CosmicSting: critical unauthenticated XXE vulnerability in Adobe Commerce and Magento (CVE-2024-34102)", - "fork": false, - "created_at": "2024-07-01T08:19:28Z", - "updated_at": "2025-01-12T19:20:20Z", - "pushed_at": "2024-07-05T09:26:02Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 6, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 825491938, - "name": "cosmicsting-validator", - "full_name": "SamJUK\/cosmicsting-validator", - "owner": { - "login": "SamJUK", - "id": 7872420, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7872420?v=4", - "html_url": "https:\/\/github.com\/SamJUK", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/SamJUK\/cosmicsting-validator", - "description": "CosmicSting (CVE-2024-34102) POC \/ Patch Validator", - "fork": false, - "created_at": "2024-07-07T23:35:18Z", - "updated_at": "2024-07-13T16:59:26Z", - "pushed_at": "2024-07-13T16:59:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cosmicsting", - "cve-2024-34102", - "devsecops", - "magento", - "magento-security-patches", - "poc", - "proof-of-concept", - "security" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 825723072, - "name": "poc", - "full_name": "unknownzerobit\/poc", - "owner": { - "login": "unknownzerobit", - "id": 62531811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62531811?v=4", - "html_url": "https:\/\/github.com\/unknownzerobit", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/unknownzerobit\/poc", - "description": "poc for CVE-2024-34102 ", - "fork": false, - "created_at": "2024-07-08T11:23:12Z", - "updated_at": "2024-07-08T11:41:56Z", - "pushed_at": "2024-07-08T11:41:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 827307888, - "name": "CVE-2024-34102", - "full_name": "crynomore\/CVE-2024-34102", - "owner": { - "login": "crynomore", - "id": 27213554, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27213554?v=4", - "html_url": "https:\/\/github.com\/crynomore", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/crynomore\/CVE-2024-34102", - "description": "Burp Extension to test for CVE-2024-34102", - "fork": false, - "created_at": "2024-07-11T11:54:08Z", - "updated_at": "2024-07-11T11:54:43Z", - "pushed_at": "2024-07-11T11:54:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 828170201, - "name": "CVE-2024-34102", - "full_name": "bughuntar\/CVE-2024-34102", - "owner": { - "login": "bughuntar", - "id": 99727538, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99727538?v=4", - "html_url": "https:\/\/github.com\/bughuntar", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/bughuntar\/CVE-2024-34102", - "description": "Exploitation CVE-2024-34102", - "fork": false, - "created_at": "2024-07-13T10:25:23Z", - "updated_at": "2024-08-26T01:45:05Z", - "pushed_at": "2024-07-15T04:16:03Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2024-34102", - "exploitation" - ], - "visibility": "public", - "forks": 2, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 828292663, - "name": "CVE-2024-34102-Python", - "full_name": "bughuntar\/CVE-2024-34102-Python", - "owner": { - "login": "bughuntar", - "id": 99727538, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99727538?v=4", - "html_url": "https:\/\/github.com\/bughuntar", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/bughuntar\/CVE-2024-34102-Python", - "description": "CVE-2024-34102 Exploiter based on Python", - "fork": false, - "created_at": "2024-07-13T17:31:10Z", - "updated_at": "2024-07-15T04:16:38Z", - "pushed_at": "2024-07-15T04:16:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-34102" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 828468155, - "name": "CVE-2024-34102", - "full_name": "Phantom-IN\/CVE-2024-34102", - "owner": { - "login": "Phantom-IN", - "id": 65243646, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65243646?v=4", - "html_url": "https:\/\/github.com\/Phantom-IN", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Phantom-IN\/CVE-2024-34102", - "description": null, - "fork": false, - "created_at": "2024-07-14T08:40:59Z", - "updated_at": "2024-10-08T05:22:23Z", - "pushed_at": "2024-07-14T08:42:46Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 839724541, - "name": "magento2-cosmic-sting-patch", - "full_name": "wubinworks\/magento2-cosmic-sting-patch", - "owner": { - "login": "wubinworks", - "id": 127310257, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127310257?v=4", - "html_url": "https:\/\/github.com\/wubinworks", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/wubinworks\/magento2-cosmic-sting-patch", - "description": "Magento 2 patch for CVE-2024-34102(aka CosmicSting). Another way(as an extension) to hotfix the security hole if you cannot apply the official patch or cannot upgrade Magento.", - "fork": false, - "created_at": "2024-08-08T07:47:24Z", - "updated_at": "2024-10-25T10:44:59Z", - "pushed_at": "2024-08-08T08:31:17Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "bug", - "cosmicsting", - "cve-2024-34102", - "extension", - "hotfix", - "magento2", - "patch", - "security-hole" - ], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, { "id": 841861554, "name": "CVE-2024-34102", @@ -611,107 +277,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 869658204, - "name": "magento-cve-2024-34102-exploit-cosmicstring", - "full_name": "bka\/magento-cve-2024-34102-exploit-cosmicstring", - "owner": { - "login": "bka", - "id": 584644, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/584644?v=4", - "html_url": "https:\/\/github.com\/bka", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/bka\/magento-cve-2024-34102-exploit-cosmicstring", - "description": null, - "fork": false, - "created_at": "2024-10-08T17:02:11Z", - "updated_at": "2024-10-09T12:33:40Z", - "pushed_at": "2024-10-09T12:33:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 898539017, - "name": "magento2-encryption-key-manager-cli", - "full_name": "wubinworks\/magento2-encryption-key-manager-cli", - "owner": { - "login": "wubinworks", - "id": 127310257, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127310257?v=4", - "html_url": "https:\/\/github.com\/wubinworks", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/wubinworks\/magento2-encryption-key-manager-cli", - "description": "A utility for Magento 2 encryption key rotation and management. CVE-2024-34102(aka Cosmic Sting) victims can use it as an aftercare.", - "fork": false, - "created_at": "2024-12-04T15:19:19Z", - "updated_at": "2024-12-04T15:52:29Z", - "pushed_at": "2024-12-04T15:47:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cli", - "cosmic-sting", - "cve-2024-34102", - "deployment-automation", - "encryption-key", - "key-generation", - "key-rotation", - "magento2" - ], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 913421139, - "name": "CVE-2024-34102", - "full_name": "mksundaram69\/CVE-2024-34102", - "owner": { - "login": "mksundaram69", - "id": 55274010, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55274010?v=4", - "html_url": "https:\/\/github.com\/mksundaram69", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/mksundaram69\/CVE-2024-34102", - "description": null, - "fork": false, - "created_at": "2025-01-07T16:46:02Z", - "updated_at": "2025-01-07T16:47:53Z", - "pushed_at": "2025-01-07T16:47:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-34144.json b/2024/CVE-2024-34144.json deleted file mode 100644 index 3b86caa7cd..0000000000 --- a/2024/CVE-2024-34144.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 835035053, - "name": "CVE-2024-34144", - "full_name": "MXWXZ\/CVE-2024-34144", - "owner": { - "login": "MXWXZ", - "id": 16700613, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16700613?v=4", - "html_url": "https:\/\/github.com\/MXWXZ", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/MXWXZ\/CVE-2024-34144", - "description": "PoC for CVE-2024-34144", - "fork": false, - "created_at": "2024-07-29T03:02:39Z", - "updated_at": "2024-09-23T08:58:10Z", - "pushed_at": "2024-07-29T11:23:53Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-34329.json b/2024/CVE-2024-34329.json deleted file mode 100644 index 68f0df2360..0000000000 --- a/2024/CVE-2024-34329.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 832282458, - "name": "CVE-2024-34329", - "full_name": "pamoutaf\/CVE-2024-34329", - "owner": { - "login": "pamoutaf", - "id": 78760061, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78760061?v=4", - "html_url": "https:\/\/github.com\/pamoutaf", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/pamoutaf\/CVE-2024-34329", - "description": null, - "fork": false, - "created_at": "2024-07-22T17:39:06Z", - "updated_at": "2024-07-22T17:39:24Z", - "pushed_at": "2024-07-22T17:39:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-34361.json b/2024/CVE-2024-34361.json deleted file mode 100644 index 6e53b87f6c..0000000000 --- a/2024/CVE-2024-34361.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 825467646, - "name": "CVE-2024-34361-PiHole-SSRF-to-RCE", - "full_name": "T0X1Cx\/CVE-2024-34361-PiHole-SSRF-to-RCE", - "owner": { - "login": "T0X1Cx", - "id": 71453093, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71453093?v=4", - "html_url": "https:\/\/github.com\/T0X1Cx", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/T0X1Cx\/CVE-2024-34361-PiHole-SSRF-to-RCE", - "description": "This repository contains an exploit for CVE-2024-34361, a critical Pi-hole vulnerability (CVSS 8.6). It uses SSRF to achieve RCE by exploiting improper URL validation, allowing attackers to send arbitrary requests and execute commands on the system. Disclaimer: For educational and ethical security testing only. Unauthorized use is illegal.", - "fork": false, - "created_at": "2024-07-07T21:22:36Z", - "updated_at": "2024-10-12T15:18:59Z", - "pushed_at": "2024-07-07T21:41:38Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-34693.json b/2024/CVE-2024-34693.json deleted file mode 100644 index f8ed2f4288..0000000000 --- a/2024/CVE-2024-34693.json +++ /dev/null @@ -1,70 +0,0 @@ -[ - { - "id": 834629281, - "name": "CVE-2024-34693", - "full_name": "mbadanoiu\/CVE-2024-34693", - "owner": { - "login": "mbadanoiu", - "id": 18383407, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4", - "html_url": "https:\/\/github.com\/mbadanoiu", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2024-34693", - "description": "CVE-2024-34693: Server Arbitrary File Read in Apache Superset", - "fork": false, - "created_at": "2024-07-27T21:28:11Z", - "updated_at": "2024-11-20T16:30:59Z", - "pushed_at": "2024-07-27T21:58:04Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "0-day", - "arbitrary-file-read", - "cve", - "cve-2024-34693", - "cves" - ], - "visibility": "public", - "forks": 1, - "watchers": 8, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 835883162, - "name": "CVE-2024-34693", - "full_name": "Mr-r00t11\/CVE-2024-34693", - "owner": { - "login": "Mr-r00t11", - "id": 68824333, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68824333?v=4", - "html_url": "https:\/\/github.com\/Mr-r00t11", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Mr-r00t11\/CVE-2024-34693", - "description": null, - "fork": false, - "created_at": "2024-07-30T18:02:25Z", - "updated_at": "2024-07-30T18:07:54Z", - "pushed_at": "2024-07-30T18:07:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-34716.json b/2024/CVE-2024-34716.json index e4a1d7b155..d927f554ca 100644 --- a/2024/CVE-2024-34716.json +++ b/2024/CVE-2024-34716.json @@ -29,36 +29,5 @@ "watchers": 12, "score": 0, "subscribers_count": 2 - }, - { - "id": 879884108, - "name": "Prestashop-CVE-2024-34716", - "full_name": "0xDTC\/Prestashop-CVE-2024-34716", - "owner": { - "login": "0xDTC", - "id": 95960398, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95960398?v=4", - "html_url": "https:\/\/github.com\/0xDTC", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/0xDTC\/Prestashop-CVE-2024-34716", - "description": null, - "fork": false, - "created_at": "2024-10-28T18:03:30Z", - "updated_at": "2025-01-07T12:51:47Z", - "pushed_at": "2025-01-07T12:51:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-34739.json b/2024/CVE-2024-34739.json deleted file mode 100644 index 90e76cc9a7..0000000000 --- a/2024/CVE-2024-34739.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 867557806, - "name": "CVE-2024-34739", - "full_name": "uthrasri\/CVE-2024-34739", - "owner": { - "login": "uthrasri", - "id": 145666390, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4", - "html_url": "https:\/\/github.com\/uthrasri", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/uthrasri\/CVE-2024-34739", - "description": null, - "fork": false, - "created_at": "2024-10-04T09:40:59Z", - "updated_at": "2024-10-04T09:43:47Z", - "pushed_at": "2024-10-04T09:43:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-34741.json b/2024/CVE-2024-34741.json deleted file mode 100644 index 24e3880dac..0000000000 --- a/2024/CVE-2024-34741.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 867664225, - "name": "CVE-2024-34741", - "full_name": "uthrasri\/CVE-2024-34741", - "owner": { - "login": "uthrasri", - "id": 145666390, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4", - "html_url": "https:\/\/github.com\/uthrasri", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/uthrasri\/CVE-2024-34741", - "description": null, - "fork": false, - "created_at": "2024-10-04T13:41:09Z", - "updated_at": "2024-10-04T13:44:01Z", - "pushed_at": "2024-10-04T13:44:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-35133.json b/2024/CVE-2024-35133.json deleted file mode 100644 index 7a3f4a5b6e..0000000000 --- a/2024/CVE-2024-35133.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 874697408, - "name": "Ozozuz-IBM-Security-Verify-CVE-2024-35133", - "full_name": "Ozozuz\/Ozozuz-IBM-Security-Verify-CVE-2024-35133", - "owner": { - "login": "Ozozuz", - "id": 32651700, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32651700?v=4", - "html_url": "https:\/\/github.com\/Ozozuz", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Ozozuz\/Ozozuz-IBM-Security-Verify-CVE-2024-35133", - "description": "Security Bulletin for CVE-2024-35133 - With PoC", - "fork": false, - "created_at": "2024-10-18T09:49:27Z", - "updated_at": "2024-10-21T09:48:43Z", - "pushed_at": "2024-10-18T09:50:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-35176.json b/2024/CVE-2024-35176.json deleted file mode 100644 index 73afff07f0..0000000000 --- a/2024/CVE-2024-35176.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 905906674, - "name": "CVE-2024-35176", - "full_name": "SpiralBL0CK\/CVE-2024-35176", - "owner": { - "login": "SpiralBL0CK", - "id": 25670930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25670930?v=4", - "html_url": "https:\/\/github.com\/SpiralBL0CK", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/SpiralBL0CK\/CVE-2024-35176", - "description": "CVE-2024-35176 poc full", - "fork": false, - "created_at": "2024-12-19T19:01:53Z", - "updated_at": "2025-01-08T15:53:12Z", - "pushed_at": "2024-12-19T22:16:06Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 5, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-35242.json b/2024/CVE-2024-35242.json deleted file mode 100644 index 70959de644..0000000000 --- a/2024/CVE-2024-35242.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 829004547, - "name": "CVE-2024-35242", - "full_name": "KKkai0315\/CVE-2024-35242", - "owner": { - "login": "KKkai0315", - "id": 113790723, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113790723?v=4", - "html_url": "https:\/\/github.com\/KKkai0315", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/KKkai0315\/CVE-2024-35242", - "description": "A test repository for the vulnerability CVE-2024-35242's PoC", - "fork": false, - "created_at": "2024-07-15T15:01:31Z", - "updated_at": "2024-07-15T15:02:09Z", - "pushed_at": "2024-07-16T03:39:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-35250.json b/2024/CVE-2024-35250.json deleted file mode 100644 index 799ce6eab9..0000000000 --- a/2024/CVE-2024-35250.json +++ /dev/null @@ -1,130 +0,0 @@ -[ - { - "id": 872102343, - "name": "CVE-2024-35250", - "full_name": "varwara\/CVE-2024-35250", - "owner": { - "login": "varwara", - "id": 167913816, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167913816?v=4", - "html_url": "https:\/\/github.com\/varwara", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/varwara\/CVE-2024-35250", - "description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver", - "fork": false, - "created_at": "2024-10-13T19:30:20Z", - "updated_at": "2025-01-12T18:27:15Z", - "pushed_at": "2024-11-29T16:56:23Z", - "stargazers_count": 261, - "watchers_count": 261, - "has_discussions": false, - "forks_count": 58, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 58, - "watchers": 261, - "score": 0, - "subscribers_count": 8 - }, - { - "id": 878394797, - "name": "CVE-2024-35250-BOF", - "full_name": "ro0tmylove\/CVE-2024-35250-BOF", - "owner": { - "login": "ro0tmylove", - "id": 87022727, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87022727?v=4", - "html_url": "https:\/\/github.com\/ro0tmylove", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ro0tmylove\/CVE-2024-35250-BOF", - "description": "Cobalt Strike 的 CVE-2024-35250 的 BOF。(请给我加个星,谢谢。) ", - "fork": false, - "created_at": "2024-10-25T10:06:09Z", - "updated_at": "2025-01-09T10:56:25Z", - "pushed_at": "2024-10-21T04:15:27Z", - "stargazers_count": 14, - "watchers_count": 14, - "has_discussions": false, - "forks_count": 5, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 5, - "watchers": 14, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 893053192, - "name": "CVE-2024-35250-BOF", - "full_name": "yinsel\/CVE-2024-35250-BOF", - "owner": { - "login": "yinsel", - "id": 91541985, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91541985?v=4", - "html_url": "https:\/\/github.com\/yinsel", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/yinsel\/CVE-2024-35250-BOF", - "description": "CVE-2024-35250 的 Beacon Object File (BOF) 实现。", - "fork": false, - "created_at": "2024-11-23T12:12:00Z", - "updated_at": "2025-01-12T18:32:23Z", - "pushed_at": "2024-11-28T09:23:35Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cobalt-strike", - "cve-2024-35250", - "cve-2024-35250-bof" - ], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 916248338, - "name": "GiveMeKernel", - "full_name": "Brentlyw\/GiveMeKernel", - "owner": { - "login": "Brentlyw", - "id": 104942265, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104942265?v=4", - "html_url": "https:\/\/github.com\/Brentlyw", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Brentlyw\/GiveMeKernel", - "description": "CVE-2024-35250 PoC - Optimized & Condensed Form of Varwara's PoC", - "fork": false, - "created_at": "2025-01-13T18:24:48Z", - "updated_at": "2025-01-14T16:51:38Z", - "pushed_at": "2025-01-14T16:51:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-35286.json b/2024/CVE-2024-35286.json deleted file mode 100644 index 4882cfc745..0000000000 --- a/2024/CVE-2024-35286.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 899750477, - "name": "CVE-2024-35286_scan.nse", - "full_name": "lu4m575\/CVE-2024-35286_scan.nse", - "owner": { - "login": "lu4m575", - "id": 29789496, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29789496?v=4", - "html_url": "https:\/\/github.com\/lu4m575", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/lu4m575\/CVE-2024-35286_scan.nse", - "description": null, - "fork": false, - "created_at": "2024-12-06T23:44:44Z", - "updated_at": "2024-12-06T23:44:44Z", - "pushed_at": "2024-12-06T23:44:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-35584.json b/2024/CVE-2024-35584.json deleted file mode 100644 index 58bc90b390..0000000000 --- a/2024/CVE-2024-35584.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 872579006, - "name": "CVE-2024-35584", - "full_name": "whwhwh96\/CVE-2024-35584", - "owner": { - "login": "whwhwh96", - "id": 42708408, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42708408?v=4", - "html_url": "https:\/\/github.com\/whwhwh96", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/whwhwh96\/CVE-2024-35584", - "description": "OpenSIS SQLi Injection", - "fork": false, - "created_at": "2024-10-14T17:24:01Z", - "updated_at": "2024-10-28T19:27:47Z", - "pushed_at": "2024-10-14T17:42:11Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-3596.json b/2024/CVE-2024-3596.json deleted file mode 100644 index 9057fbfaf3..0000000000 --- a/2024/CVE-2024-3596.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 826482682, - "name": "CVE-2024-3596-Detector", - "full_name": "alperenugurlu\/CVE-2024-3596-Detector", - "owner": { - "login": "alperenugurlu", - "id": 64872731, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64872731?v=4", - "html_url": "https:\/\/github.com\/alperenugurlu", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/alperenugurlu\/CVE-2024-3596-Detector", - "description": null, - "fork": false, - "created_at": "2024-07-09T19:44:40Z", - "updated_at": "2024-11-04T12:09:42Z", - "pushed_at": "2024-07-09T20:21:22Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 7, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-3605.json b/2024/CVE-2024-3605.json deleted file mode 100644 index cd82a0ea9a..0000000000 --- a/2024/CVE-2024-3605.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 915570014, - "name": "CVE-2024-3605", - "full_name": "RandomRobbieBF\/CVE-2024-3605", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-3605", - "description": "WP Hotel Booking <= 2.1.0 - Unauthenticated SQL Injection", - "fork": false, - "created_at": "2025-01-12T07:53:02Z", - "updated_at": "2025-01-14T12:40:20Z", - "pushed_at": "2025-01-12T07:54:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-36401.json b/2024/CVE-2024-36401.json index c24cba2211..8884bfacc7 100644 --- a/2024/CVE-2024-36401.json +++ b/2024/CVE-2024-36401.json @@ -1,259 +1,4 @@ [ - { - "id": 824152890, - "name": "CVE-2024-36401", - "full_name": "bigb0x\/CVE-2024-36401", - "owner": { - "login": "bigb0x", - "id": 13532434, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4", - "html_url": "https:\/\/github.com\/bigb0x", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-36401", - "description": "POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets.", - "fork": false, - "created_at": "2024-07-04T13:19:47Z", - "updated_at": "2024-12-06T09:40:42Z", - "pushed_at": "2024-07-04T19:18:04Z", - "stargazers_count": 32, - "watchers_count": 32, - "has_discussions": false, - "forks_count": 18, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 18, - "watchers": 32, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 824386148, - "name": "CVE-2024-36401", - "full_name": "Niuwoo\/CVE-2024-36401", - "owner": { - "login": "Niuwoo", - "id": 57100441, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57100441?v=4", - "html_url": "https:\/\/github.com\/Niuwoo", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Niuwoo\/CVE-2024-36401", - "description": "POC", - "fork": false, - "created_at": "2024-07-05T03:02:30Z", - "updated_at": "2024-11-20T16:30:53Z", - "pushed_at": "2024-07-05T03:05:39Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 824643210, - "name": "CVE-2024-36401", - "full_name": "RevoltSecurities\/CVE-2024-36401", - "owner": { - "login": "RevoltSecurities", - "id": 119435129, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119435129?v=4", - "html_url": "https:\/\/github.com\/RevoltSecurities", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RevoltSecurities\/CVE-2024-36401", - "description": "Exploiter a Vulnerability detection and Exploitation tool for GeoServer Unauthenticated Remote Code Execution CVE-2024-36401.", - "fork": false, - "created_at": "2024-07-05T15:24:50Z", - "updated_at": "2024-07-20T21:01:18Z", - "pushed_at": "2024-07-05T15:33:09Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 824794128, - "name": "CVE-2024-36401", - "full_name": "Mr-xn\/CVE-2024-36401", - "owner": { - "login": "Mr-xn", - "id": 18260135, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4", - "html_url": "https:\/\/github.com\/Mr-xn", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Mr-xn\/CVE-2024-36401", - "description": "Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions with multies ways to exploit", - "fork": false, - "created_at": "2024-07-06T01:10:28Z", - "updated_at": "2024-12-18T15:53:25Z", - "pushed_at": "2024-07-06T01:57:58Z", - "stargazers_count": 44, - "watchers_count": 44, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2024-36401", - "geoserver", - "poc", - "rce", - "vulnerabilities" - ], - "visibility": "public", - "forks": 6, - "watchers": 44, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 827686717, - "name": "CVE-2024-36401-GeoServer-RCE", - "full_name": "jakabakos\/CVE-2024-36401-GeoServer-RCE", - "owner": { - "login": "jakabakos", - "id": 42498816, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4", - "html_url": "https:\/\/github.com\/jakabakos", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/jakabakos\/CVE-2024-36401-GeoServer-RCE", - "description": null, - "fork": false, - "created_at": "2024-07-12T07:01:12Z", - "updated_at": "2024-07-12T07:07:18Z", - "pushed_at": "2024-07-12T07:07:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 829775784, - "name": "geoserver-", - "full_name": "ahisec\/geoserver-", - "owner": { - "login": "ahisec", - "id": 3255339, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3255339?v=4", - "html_url": "https:\/\/github.com\/ahisec", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ahisec\/geoserver-", - "description": "geoserver CVE-2024-36401漏洞利用工具", - "fork": false, - "created_at": "2024-07-17T02:25:21Z", - "updated_at": "2025-01-14T08:01:08Z", - "pushed_at": "2024-07-24T15:33:03Z", - "stargazers_count": 17, - "watchers_count": 17, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 17, - "score": 0, - "subscribers_count": 0 - }, - { - "id": 835900082, - "name": "CVE-2024-36401", - "full_name": "Chocapikk\/CVE-2024-36401", - "owner": { - "login": "Chocapikk", - "id": 88535377, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", - "html_url": "https:\/\/github.com\/Chocapikk", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-36401", - "description": "GeoServer Remote Code Execution", - "fork": false, - "created_at": "2024-07-30T18:43:40Z", - "updated_at": "2024-12-26T04:35:42Z", - "pushed_at": "2024-08-02T14:57:26Z", - "stargazers_count": 77, - "watchers_count": 77, - "has_discussions": false, - "forks_count": 12, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 12, - "watchers": 77, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 836929821, - "name": "CVE-2024-36401-PoC", - "full_name": "yisas93\/CVE-2024-36401-PoC", - "owner": { - "login": "yisas93", - "id": 115517295, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115517295?v=4", - "html_url": "https:\/\/github.com\/yisas93", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/yisas93\/CVE-2024-36401-PoC", - "description": null, - "fork": false, - "created_at": "2024-08-01T21:22:51Z", - "updated_at": "2024-08-01T21:30:07Z", - "pushed_at": "2024-08-01T21:30:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 848340676, "name": "geoexplorer", @@ -346,160 +91,5 @@ "watchers": 2, "score": 0, "subscribers_count": 1 - }, - { - "id": 868038376, - "name": "CVE-2024-36401", - "full_name": "netuseradministrator\/CVE-2024-36401", - "owner": { - "login": "netuseradministrator", - "id": 96680088, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96680088?v=4", - "html_url": "https:\/\/github.com\/netuseradministrator", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/netuseradministrator\/CVE-2024-36401", - "description": "geoserver图形化漏洞利用工具", - "fork": false, - "created_at": "2024-10-05T10:08:55Z", - "updated_at": "2025-01-11T10:30:26Z", - "pushed_at": "2024-10-08T03:16:26Z", - "stargazers_count": 33, - "watchers_count": 33, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 33, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 872538624, - "name": "CVE-2024-36401", - "full_name": "kkhackz0013\/CVE-2024-36401", - "owner": { - "login": "kkhackz0013", - "id": 183632565, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/183632565?v=4", - "html_url": "https:\/\/github.com\/kkhackz0013", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/kkhackz0013\/CVE-2024-36401", - "description": null, - "fork": false, - "created_at": "2024-10-14T15:57:06Z", - "updated_at": "2024-10-14T17:16:07Z", - "pushed_at": "2024-10-14T17:16:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 892410177, - "name": "CVE-2024-36401-WoodpeckerPlugin", - "full_name": "thestar0\/CVE-2024-36401-WoodpeckerPlugin", - "owner": { - "login": "thestar0", - "id": 97114131, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97114131?v=4", - "html_url": "https:\/\/github.com\/thestar0", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/thestar0\/CVE-2024-36401-WoodpeckerPlugin", - "description": "CVE-2024-36401-GeoServer Property 表达式注入 Rce woodpecker-framework 插件", - "fork": false, - "created_at": "2024-11-22T03:57:12Z", - "updated_at": "2024-12-18T20:13:38Z", - "pushed_at": "2024-11-23T08:24:26Z", - "stargazers_count": 12, - "watchers_count": 12, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 12, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 892655439, - "name": "cve-2024-36401-poc", - "full_name": "XiaomingX\/cve-2024-36401-poc", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-36401-poc", - "description": "CVE-2024-36401是GeoServer中的一个高危远程代码执行漏洞。GeoServer是一款开源的地理数据服务器软件,主要用于发布、共享和处理各种地理空间数据。 ALIYUN 漏洞原理: 该漏洞源于GeoServer在处理属性名称时,将其不安全地解析为XPath表达式。具体而言,GeoServer调用的GeoTools库API在评估要素类型的属性名称时,以不安全的方式将其传递给commons-jxpath库。由于commons-jxpath库在解析XPath表达式时允许执行任意代码,攻击者可以通过构造特定的输入,利用多个OGC请求参数(如WFS GetFeature、WFS GetPropertyValue、WMS GetMap等),在未经身份验证的情况下远程执行任意代码。 ", - "fork": false, - "created_at": "2024-11-22T14:21:53Z", - "updated_at": "2025-01-13T18:17:29Z", - "pushed_at": "2024-11-22T14:22:57Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 895213731, - "name": "CVE-2024-36401", - "full_name": "0x0d3ad\/CVE-2024-36401", - "owner": { - "login": "0x0d3ad", - "id": 18898977, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18898977?v=4", - "html_url": "https:\/\/github.com\/0x0d3ad", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/0x0d3ad\/CVE-2024-36401", - "description": "CVE-2024-36401 (GeoServer Remote Code Execution)", - "fork": false, - "created_at": "2024-11-27T19:13:49Z", - "updated_at": "2024-11-30T19:28:17Z", - "pushed_at": "2024-11-30T19:28:14Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-36424.json b/2024/CVE-2024-36424.json deleted file mode 100644 index e64ffbedca..0000000000 --- a/2024/CVE-2024-36424.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 841733200, - "name": "CVE-2024-36424", - "full_name": "secunnix\/CVE-2024-36424", - "owner": { - "login": "secunnix", - "id": 104568161, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104568161?v=4", - "html_url": "https:\/\/github.com\/secunnix", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/secunnix\/CVE-2024-36424", - "description": "K7 Ultimate Security < v17.0.2019 \"K7RKScan.sys\" Null Pointer Dereference PoC ", - "fork": false, - "created_at": "2024-08-13T00:06:17Z", - "updated_at": "2024-11-20T16:31:01Z", - "pushed_at": "2024-08-13T00:26:08Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-36539.json b/2024/CVE-2024-36539.json deleted file mode 100644 index 545e1bbb94..0000000000 --- a/2024/CVE-2024-36539.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 837496814, - "name": "CVE-2024-36539", - "full_name": "Abdurahmon3236\/CVE-2024-36539", - "owner": { - "login": "Abdurahmon3236", - "id": 76862934, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76862934?v=4", - "html_url": "https:\/\/github.com\/Abdurahmon3236", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Abdurahmon3236\/CVE-2024-36539", - "description": null, - "fork": false, - "created_at": "2024-08-03T06:37:21Z", - "updated_at": "2024-08-03T06:37:57Z", - "pushed_at": "2024-08-03T06:37:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-3656.json b/2024/CVE-2024-3656.json deleted file mode 100644 index f532ed72b2..0000000000 --- a/2024/CVE-2024-3656.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 871549647, - "name": "CVE-2024-3656", - "full_name": "h4x0r-dz\/CVE-2024-3656", - "owner": { - "login": "h4x0r-dz", - "id": 26070859, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26070859?v=4", - "html_url": "https:\/\/github.com\/h4x0r-dz", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/h4x0r-dz\/CVE-2024-3656", - "description": "Keycloak admin API allows low privilege users to use administrative functions", - "fork": false, - "created_at": "2024-10-12T09:17:00Z", - "updated_at": "2024-10-25T06:06:55Z", - "pushed_at": "2024-10-12T09:48:10Z", - "stargazers_count": 23, - "watchers_count": 23, - "has_discussions": false, - "forks_count": 10, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 10, - "watchers": 23, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-36823.json b/2024/CVE-2024-36823.json deleted file mode 100644 index 27418c6510..0000000000 --- a/2024/CVE-2024-36823.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 882521071, - "name": "CVE-2024-36823-POC", - "full_name": "JAckLosingHeart\/CVE-2024-36823-POC", - "owner": { - "login": "JAckLosingHeart", - "id": 57932150, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57932150?v=4", - "html_url": "https:\/\/github.com\/JAckLosingHeart", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/JAckLosingHeart\/CVE-2024-36823-POC", - "description": "Ninja Framework sensitive information leak due to weak encryption", - "fork": false, - "created_at": "2024-11-03T01:56:11Z", - "updated_at": "2024-12-13T06:24:14Z", - "pushed_at": "2024-11-03T01:56:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-36840.json b/2024/CVE-2024-36840.json deleted file mode 100644 index d1ce141ae7..0000000000 --- a/2024/CVE-2024-36840.json +++ /dev/null @@ -1,42 +0,0 @@ -[ - { - "id": 914938311, - "name": "CVE-2024-36840-Exploit", - "full_name": "theexploiters\/CVE-2024-36840-Exploit", - "owner": { - "login": "theexploiters", - "id": 185040501, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/185040501?v=4", - "html_url": "https:\/\/github.com\/theexploiters", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/theexploiters\/CVE-2024-36840-Exploit", - "description": "Exploit For: CVE-2024-36840: SQL Injection Vulnerability in Boelter Blue System Management (Version 1.3)", - "fork": false, - "created_at": "2025-01-10T16:08:07Z", - "updated_at": "2025-01-12T21:19:18Z", - "pushed_at": "2025-01-10T16:12:31Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "boelter-blue-system", - "boelter-blue-system-exploit", - "cve-2024-36840", - "cve-2024-36840-exploit", - "cve-exploit", - "cve-exploits", - "exploit", - "google-dorking" - ], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-36877.json b/2024/CVE-2024-36877.json index 9bccab8cad..a180237a0d 100644 --- a/2024/CVE-2024-36877.json +++ b/2024/CVE-2024-36877.json @@ -1,35 +1,4 @@ [ - { - "id": 840386878, - "name": "CVE-2024-36877", - "full_name": "jjensn\/CVE-2024-36877", - "owner": { - "login": "jjensn", - "id": 5910157, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5910157?v=4", - "html_url": "https:\/\/github.com\/jjensn", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/jjensn\/CVE-2024-36877", - "description": "Exploit POC for CVE-2024-36877", - "fork": false, - "created_at": "2024-08-09T15:33:04Z", - "updated_at": "2025-01-06T08:20:54Z", - "pushed_at": "2024-08-14T15:26:18Z", - "stargazers_count": 46, - "watchers_count": 46, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 6, - "watchers": 46, - "score": 0, - "subscribers_count": 1 - }, { "id": 843925784, "name": "POC-CVE-2024-36877", diff --git a/2024/CVE-2024-3690.json b/2024/CVE-2024-3690.json deleted file mode 100644 index 50a1c62eb8..0000000000 --- a/2024/CVE-2024-3690.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 903200657, - "name": "CVE-2024-3690", - "full_name": "taeseongk\/CVE-2024-3690", - "owner": { - "login": "taeseongk", - "id": 102262849, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102262849?v=4", - "html_url": "https:\/\/github.com\/taeseongk", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/taeseongk\/CVE-2024-3690", - "description": null, - "fork": false, - "created_at": "2024-12-14T01:26:56Z", - "updated_at": "2024-12-14T01:44:49Z", - "pushed_at": "2024-12-14T01:44:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-36991.json b/2024/CVE-2024-36991.json deleted file mode 100644 index f365e5f8db..0000000000 --- a/2024/CVE-2024-36991.json +++ /dev/null @@ -1,163 +0,0 @@ -[ - { - "id": 824790619, - "name": "CVE-2024-36991", - "full_name": "bigb0x\/CVE-2024-36991", - "owner": { - "login": "bigb0x", - "id": 13532434, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4", - "html_url": "https:\/\/github.com\/bigb0x", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-36991", - "description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.", - "fork": false, - "created_at": "2024-07-06T00:49:40Z", - "updated_at": "2024-12-26T06:26:46Z", - "pushed_at": "2024-07-12T00:41:36Z", - "stargazers_count": 113, - "watchers_count": 113, - "has_discussions": false, - "forks_count": 21, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 21, - "watchers": 113, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 824792553, - "name": "CVE-2024-36991", - "full_name": "Mr-xn\/CVE-2024-36991", - "owner": { - "login": "Mr-xn", - "id": 18260135, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4", - "html_url": "https:\/\/github.com\/Mr-xn", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Mr-xn\/CVE-2024-36991", - "description": "Path Traversal On The \"\/Modules\/Messaging\/\" Endpoint In Splunk Enterprise On Windows", - "fork": false, - "created_at": "2024-07-06T01:00:57Z", - "updated_at": "2024-07-08T13:21:27Z", - "pushed_at": "2024-07-06T01:07:32Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2024", - "cve-2024-36991", - "path-traversal", - "splunk" - ], - "visibility": "public", - "forks": 2, - "watchers": 7, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 825033678, - "name": "CVE-2024-36991", - "full_name": "th3gokul\/CVE-2024-36991", - "owner": { - "login": "th3gokul", - "id": 89386101, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89386101?v=4", - "html_url": "https:\/\/github.com\/th3gokul", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/th3gokul\/CVE-2024-36991", - "description": "CVE-2024-36991: Path traversal that affects Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10.", - "fork": false, - "created_at": "2024-07-06T15:24:24Z", - "updated_at": "2024-07-31T07:00:23Z", - "pushed_at": "2024-07-06T15:53:55Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 825068060, - "name": "CVE-2024-36991", - "full_name": "sardine-web\/CVE-2024-36991", - "owner": { - "login": "sardine-web", - "id": 80635620, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80635620?v=4", - "html_url": "https:\/\/github.com\/sardine-web", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/sardine-web\/CVE-2024-36991", - "description": "Path traversal vulnerability in Splunk Enterprise on Windows", - "fork": false, - "created_at": "2024-07-06T17:15:39Z", - "updated_at": "2024-07-06T17:24:14Z", - "pushed_at": "2024-07-06T17:24:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 826744857, - "name": "CVE-2024-36991", - "full_name": "Cappricio-Securities\/CVE-2024-36991", - "owner": { - "login": "Cappricio-Securities", - "id": 102907425, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4", - "html_url": "https:\/\/github.com\/Cappricio-Securities", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2024-36991", - "description": "Path traversal vulnerability in Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10 that allows reading sensitive files.", - "fork": false, - "created_at": "2024-07-10T09:42:08Z", - "updated_at": "2024-07-21T08:58:48Z", - "pushed_at": "2024-07-10T09:42:37Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-37032.json b/2024/CVE-2024-37032.json index 26bd53aaa2..644089870d 100644 --- a/2024/CVE-2024-37032.json +++ b/2024/CVE-2024-37032.json @@ -29,36 +29,5 @@ "watchers": 20, "score": 0, "subscribers_count": 1 - }, - { - "id": 826686892, - "name": "CVE-2024-37032-scanner", - "full_name": "ahboon\/CVE-2024-37032-scanner", - "owner": { - "login": "ahboon", - "id": 7101707, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7101707?v=4", - "html_url": "https:\/\/github.com\/ahboon", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ahboon\/CVE-2024-37032-scanner", - "description": "CVE-2024-37032 scanner", - "fork": false, - "created_at": "2024-07-10T07:24:09Z", - "updated_at": "2024-07-10T15:15:38Z", - "pushed_at": "2024-07-10T07:26:21Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-37081.json b/2024/CVE-2024-37081.json deleted file mode 100644 index 078246b188..0000000000 --- a/2024/CVE-2024-37081.json +++ /dev/null @@ -1,133 +0,0 @@ -[ - { - "id": 825088581, - "name": "CVE-2024-37081", - "full_name": "mbadanoiu\/CVE-2024-37081", - "owner": { - "login": "mbadanoiu", - "id": 18383407, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4", - "html_url": "https:\/\/github.com\/mbadanoiu", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2024-37081", - "description": "CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server", - "fork": false, - "created_at": "2024-07-06T18:29:13Z", - "updated_at": "2024-08-29T13:31:14Z", - "pushed_at": "2024-07-06T18:38:16Z", - "stargazers_count": 10, - "watchers_count": 10, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "0-day", - "authenticated", - "cve", - "cve-2024-37081", - "cves", - "local-privilege-escalation" - ], - "visibility": "public", - "forks": 2, - "watchers": 10, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 826394284, - "name": "CVE-2024-37081", - "full_name": "Mr-r00t11\/CVE-2024-37081", - "owner": { - "login": "Mr-r00t11", - "id": 68824333, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68824333?v=4", - "html_url": "https:\/\/github.com\/Mr-r00t11", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Mr-r00t11\/CVE-2024-37081", - "description": null, - "fork": false, - "created_at": "2024-07-09T16:14:41Z", - "updated_at": "2025-01-10T04:14:15Z", - "pushed_at": "2024-07-09T16:22:15Z", - "stargazers_count": 55, - "watchers_count": 55, - "has_discussions": false, - "forks_count": 15, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 15, - "watchers": 55, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 831660859, - "name": "-CVE-2024-37081-POC", - "full_name": "CERTologists\/-CVE-2024-37081-POC", - "owner": { - "login": "CERTologists", - "id": 176203032, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176203032?v=4", - "html_url": "https:\/\/github.com\/CERTologists", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/CERTologists\/-CVE-2024-37081-POC", - "description": null, - "fork": false, - "created_at": "2024-07-21T08:41:40Z", - "updated_at": "2024-07-21T08:41:40Z", - "pushed_at": "2024-07-21T08:41:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 831661049, - "name": "Modified-CVE-2024-37081-POC", - "full_name": "CERTologists\/Modified-CVE-2024-37081-POC", - "owner": { - "login": "CERTologists", - "id": 176203032, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176203032?v=4", - "html_url": "https:\/\/github.com\/CERTologists", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/CERTologists\/Modified-CVE-2024-37081-POC", - "description": null, - "fork": false, - "created_at": "2024-07-21T08:42:23Z", - "updated_at": "2024-07-21T08:48:29Z", - "pushed_at": "2024-07-21T08:48:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-37084.json b/2024/CVE-2024-37084.json index fd6821b33c..92c95c22ca 100644 --- a/2024/CVE-2024-37084.json +++ b/2024/CVE-2024-37084.json @@ -60,103 +60,5 @@ "watchers": 1, "score": 0, "subscribers_count": 1 - }, - { - "id": 872838076, - "name": "CVE-2024-37084-Exp", - "full_name": "Ly4j\/CVE-2024-37084-Exp", - "owner": { - "login": "Ly4j", - "id": 73785589, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73785589?v=4", - "html_url": "https:\/\/github.com\/Ly4j", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Ly4j\/CVE-2024-37084-Exp", - "description": "Spring Cloud Data Flow CVE-2024-37084 exp", - "fork": false, - "created_at": "2024-10-15T06:55:05Z", - "updated_at": "2025-01-12T18:27:27Z", - "pushed_at": "2024-10-16T02:27:53Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 873195770, - "name": "CVE-2024-37084-Exp", - "full_name": "A0be\/CVE-2024-37084-Exp", - "owner": { - "login": "A0be", - "id": 184107161, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/184107161?v=4", - "html_url": "https:\/\/github.com\/A0be", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/A0be\/CVE-2024-37084-Exp", - "description": "Spring Cloud Data Flow CVE-2024-37084 exp", - "fork": false, - "created_at": "2024-10-15T18:54:25Z", - "updated_at": "2024-10-15T19:09:22Z", - "pushed_at": "2024-10-15T18:56:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 892641642, - "name": "cve-2024-37084-Poc", - "full_name": "XiaomingX\/cve-2024-37084-Poc", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-37084-Poc", - "description": "CVE-2024-37084是Spring Cloud Data Flow中的一个高危漏洞,影响版本为2.11.0至2.11.3。该漏洞允许具有Skipper服务器API访问权限的攻击者通过精心构造的上传请求,将任意文件写入服务器文件系统的任意位置,进而可能导致远程代码执行,严重威胁服务器安全。", - "fork": false, - "created_at": "2024-11-22T13:53:42Z", - "updated_at": "2025-01-13T18:17:48Z", - "pushed_at": "2024-11-22T14:02:35Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "exp", - "poc", - "rce" - ], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-37085.json b/2024/CVE-2024-37085.json index aff7287b08..521dd5d0b2 100644 --- a/2024/CVE-2024-37085.json +++ b/2024/CVE-2024-37085.json @@ -1,97 +1,4 @@ [ - { - "id": 837225608, - "name": "CVE-2024-37085", - "full_name": "mahmutaymahmutay\/CVE-2024-37085", - "owner": { - "login": "mahmutaymahmutay", - "id": 171496549, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171496549?v=4", - "html_url": "https:\/\/github.com\/mahmutaymahmutay", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/mahmutaymahmutay\/CVE-2024-37085", - "description": "Vulnerability Scanner for CVE-2024-37085 and Exploits ( For Educational Purpose only)", - "fork": false, - "created_at": "2024-08-02T13:31:59Z", - "updated_at": "2024-09-02T19:21:10Z", - "pushed_at": "2024-08-02T13:45:33Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 838984689, - "name": "CVE-2024-37085-RCE-POC", - "full_name": "Florian-Hoth\/CVE-2024-37085-RCE-POC", - "owner": { - "login": "Florian-Hoth", - "id": 177672507, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/177672507?v=4", - "html_url": "https:\/\/github.com\/Florian-Hoth", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Florian-Hoth\/CVE-2024-37085-RCE-POC", - "description": "CVE-2024-37085 VMware ESXi RCE Vulnerability", - "fork": false, - "created_at": "2024-08-06T18:23:43Z", - "updated_at": "2025-01-02T22:34:34Z", - "pushed_at": "2024-08-06T18:25:19Z", - "stargazers_count": 11, - "watchers_count": 11, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 11, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 841585434, - "name": "Vmware-ESXI", - "full_name": "WTN-arny\/Vmware-ESXI", - "owner": { - "login": "WTN-arny", - "id": 178199794, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/178199794?v=4", - "html_url": "https:\/\/github.com\/WTN-arny", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/WTN-arny\/Vmware-ESXI", - "description": "CVE-2024-37085 unauthenticated shell upload to full administrator on domain-joined esxi hypervisors.", - "fork": false, - "created_at": "2024-08-12T17:44:17Z", - "updated_at": "2024-08-12T17:47:43Z", - "pushed_at": "2024-08-12T17:47:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 844208301, "name": "CVE-2024-37085", diff --git a/2024/CVE-2024-37147.json b/2024/CVE-2024-37147.json deleted file mode 100644 index a483c314c1..0000000000 --- a/2024/CVE-2024-37147.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 827270291, - "name": "CVE-2024-37147-PoC", - "full_name": "0xmupa\/CVE-2024-37147-PoC", - "owner": { - "login": "0xmupa", - "id": 61334200, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61334200?v=4", - "html_url": "https:\/\/github.com\/0xmupa", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/0xmupa\/CVE-2024-37147-PoC", - "description": null, - "fork": false, - "created_at": "2024-07-11T10:20:00Z", - "updated_at": "2024-07-11T10:20:14Z", - "pushed_at": "2024-07-11T10:20:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-37383.json b/2024/CVE-2024-37383.json deleted file mode 100644 index 9a9e5f6139..0000000000 --- a/2024/CVE-2024-37383.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 877680662, - "name": "CVE-2024-37383-POC", - "full_name": "bartfroklage\/CVE-2024-37383-POC", - "owner": { - "login": "bartfroklage", - "id": 4425568, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4425568?v=4", - "html_url": "https:\/\/github.com\/bartfroklage", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/bartfroklage\/CVE-2024-37383-POC", - "description": "Proof of concept for CVE-2024-37383", - "fork": false, - "created_at": "2024-10-24T04:01:03Z", - "updated_at": "2024-12-10T07:33:20Z", - "pushed_at": "2024-10-24T05:48:34Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 882582274, - "name": "CVE-2024-37383-exploit", - "full_name": "amirzargham\/CVE-2024-37383-exploit", - "owner": { - "login": "amirzargham", - "id": 133110721, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/133110721?v=4", - "html_url": "https:\/\/github.com\/amirzargham", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/amirzargham\/CVE-2024-37383-exploit", - "description": "Roundcube mail server exploit for CVE-2024-37383 (Stored XSS)", - "fork": false, - "created_at": "2024-11-03T07:16:46Z", - "updated_at": "2024-12-07T12:59:05Z", - "pushed_at": "2024-12-07T12:59:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-37726.json b/2024/CVE-2024-37726.json index 5e43bd8fdd..054374b33f 100644 --- a/2024/CVE-2024-37726.json +++ b/2024/CVE-2024-37726.json @@ -29,36 +29,5 @@ "watchers": 33, "score": 0, "subscribers_count": 2 - }, - { - "id": 825258239, - "name": "CVE-2024-37726-MSI-Center-Local-Privilege-Escalation", - "full_name": "NextGenPentesters\/CVE-2024-37726-MSI-Center-Local-Privilege-Escalation", - "owner": { - "login": "NextGenPentesters", - "id": 169174200, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169174200?v=4", - "html_url": "https:\/\/github.com\/NextGenPentesters", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/NextGenPentesters\/CVE-2024-37726-MSI-Center-Local-Privilege-Escalation", - "description": null, - "fork": false, - "created_at": "2024-07-07T09:21:21Z", - "updated_at": "2024-07-07T09:25:56Z", - "pushed_at": "2024-07-07T09:25:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-37762.json b/2024/CVE-2024-37762.json deleted file mode 100644 index eaa83c8d3c..0000000000 --- a/2024/CVE-2024-37762.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 822535716, - "name": "cve-2024-37762", - "full_name": "Atreb92\/cve-2024-37762", - "owner": { - "login": "Atreb92", - "id": 36992456, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36992456?v=4", - "html_url": "https:\/\/github.com\/Atreb92", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Atreb92\/cve-2024-37762", - "description": null, - "fork": false, - "created_at": "2024-07-01T10:28:56Z", - "updated_at": "2024-08-04T09:52:47Z", - "pushed_at": "2024-07-01T10:33:12Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-37763.json b/2024/CVE-2024-37763.json deleted file mode 100644 index 54688e1661..0000000000 --- a/2024/CVE-2024-37763.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 822538828, - "name": "cve-2024-37763", - "full_name": "Atreb92\/cve-2024-37763", - "owner": { - "login": "Atreb92", - "id": 36992456, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36992456?v=4", - "html_url": "https:\/\/github.com\/Atreb92", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Atreb92\/cve-2024-37763", - "description": null, - "fork": false, - "created_at": "2024-07-01T10:35:51Z", - "updated_at": "2024-08-04T09:55:59Z", - "pushed_at": "2024-07-01T10:36:35Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-37764.json b/2024/CVE-2024-37764.json deleted file mode 100644 index 69491191c9..0000000000 --- a/2024/CVE-2024-37764.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 822539510, - "name": "cve-2024-37764", - "full_name": "Atreb92\/cve-2024-37764", - "owner": { - "login": "Atreb92", - "id": 36992456, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36992456?v=4", - "html_url": "https:\/\/github.com\/Atreb92", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Atreb92\/cve-2024-37764", - "description": null, - "fork": false, - "created_at": "2024-07-01T10:37:21Z", - "updated_at": "2024-08-04T09:56:02Z", - "pushed_at": "2024-07-01T10:38:45Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-37765.json b/2024/CVE-2024-37765.json deleted file mode 100644 index e3d132fc9c..0000000000 --- a/2024/CVE-2024-37765.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 822540396, - "name": "cve-2024-37765", - "full_name": "Atreb92\/cve-2024-37765", - "owner": { - "login": "Atreb92", - "id": 36992456, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36992456?v=4", - "html_url": "https:\/\/github.com\/Atreb92", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Atreb92\/cve-2024-37765", - "description": null, - "fork": false, - "created_at": "2024-07-01T10:39:40Z", - "updated_at": "2024-08-04T09:52:45Z", - "pushed_at": "2024-07-01T10:42:52Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-37770.json b/2024/CVE-2024-37770.json deleted file mode 100644 index d5d93004e7..0000000000 --- a/2024/CVE-2024-37770.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 824660920, - "name": "CVE-2024-37770", - "full_name": "k3ppf0r\/CVE-2024-37770", - "owner": { - "login": "k3ppf0r", - "id": 63085409, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63085409?v=4", - "html_url": "https:\/\/github.com\/k3ppf0r", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/k3ppf0r\/CVE-2024-37770", - "description": "CVE-2024-37770", - "fork": false, - "created_at": "2024-07-05T16:13:34Z", - "updated_at": "2024-07-22T06:49:45Z", - "pushed_at": "2024-07-09T07:21:55Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-38041.json b/2024/CVE-2024-38041.json deleted file mode 100644 index 71b21cad15..0000000000 --- a/2024/CVE-2024-38041.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 831586036, - "name": "CVE-2024-38041", - "full_name": "varwara\/CVE-2024-38041", - "owner": { - "login": "varwara", - "id": 167913816, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167913816?v=4", - "html_url": "https:\/\/github.com\/varwara", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/varwara\/CVE-2024-38041", - "description": "Kernel pointers copied to output user mode buffer with ioctl 0x22A014 in the appid.sys driver.", - "fork": false, - "created_at": "2024-07-21T02:29:18Z", - "updated_at": "2024-12-27T13:05:29Z", - "pushed_at": "2024-07-21T02:35:59Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 7, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-3806.json b/2024/CVE-2024-3806.json index 49d0d07736..54b57c254c 100644 --- a/2024/CVE-2024-3806.json +++ b/2024/CVE-2024-3806.json @@ -29,36 +29,5 @@ "watchers": 8, "score": 0, "subscribers_count": 1 - }, - { - "id": 890475222, - "name": "CVE-2024-3806", - "full_name": "RandomRobbieBF\/CVE-2024-3806", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-3806", - "description": "Porto <= 7.1.0 - Unauthenticated Local File Inclusion via porto_ajax_posts", - "fork": false, - "created_at": "2024-11-18T16:23:07Z", - "updated_at": "2025-01-06T13:38:17Z", - "pushed_at": "2024-11-18T16:23:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-38063.json b/2024/CVE-2024-38063.json index afd5d1cde1..6158606df1 100644 --- a/2024/CVE-2024-38063.json +++ b/2024/CVE-2024-38063.json @@ -659,262 +659,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 869344169, - "name": "CVE-2024-38063", - "full_name": "becrevex\/CVE-2024-38063", - "owner": { - "login": "becrevex", - "id": 8326868, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8326868?v=4", - "html_url": "https:\/\/github.com\/becrevex", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/becrevex\/CVE-2024-38063", - "description": null, - "fork": false, - "created_at": "2024-10-08T06:24:54Z", - "updated_at": "2024-11-18T05:45:15Z", - "pushed_at": "2024-11-16T06:07:24Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 872589341, - "name": "CVE-2024-38063", - "full_name": "idkwastaken\/CVE-2024-38063", - "owner": { - "login": "idkwastaken", - "id": 180330197, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/180330197?v=4", - "html_url": "https:\/\/github.com\/idkwastaken", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/idkwastaken\/CVE-2024-38063", - "description": null, - "fork": false, - "created_at": "2024-10-14T17:46:58Z", - "updated_at": "2024-10-14T17:59:59Z", - "pushed_at": "2024-10-14T17:59:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 872765524, - "name": "CVE-2024-38063", - "full_name": "thanawee321\/CVE-2024-38063", - "owner": { - "login": "thanawee321", - "id": 53590032, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53590032?v=4", - "html_url": "https:\/\/github.com\/thanawee321", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/thanawee321\/CVE-2024-38063", - "description": "Vulnerability CVE-2024-38063", - "fork": false, - "created_at": "2024-10-15T03:18:51Z", - "updated_at": "2024-11-20T16:31:07Z", - "pushed_at": "2024-10-18T11:48:06Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 884730855, - "name": "cve-2024-38063-Anonyvader", - "full_name": "AliHj98\/cve-2024-38063-Anonyvader", - "owner": { - "login": "AliHj98", - "id": 99630322, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99630322?v=4", - "html_url": "https:\/\/github.com\/AliHj98", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/AliHj98\/cve-2024-38063-Anonyvader", - "description": null, - "fork": false, - "created_at": "2024-11-07T09:36:32Z", - "updated_at": "2024-11-07T10:47:56Z", - "pushed_at": "2024-11-07T10:47:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 889577031, - "name": "CVE-2024-38063", - "full_name": "Dragkob\/CVE-2024-38063", - "owner": { - "login": "Dragkob", - "id": 141576033, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141576033?v=4", - "html_url": "https:\/\/github.com\/Dragkob", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Dragkob\/CVE-2024-38063", - "description": "PoC for Windows' IPv6 CVE-2024-38063", - "fork": false, - "created_at": "2024-11-16T17:22:08Z", - "updated_at": "2024-11-22T00:18:36Z", - "pushed_at": "2024-11-20T13:18:16Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "bsod", - "bsod-crashes", - "cve", - "cvepoc", - "dos", - "ipv6", - "ipv6-network", - "poc" - ], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 890443568, - "name": "CVE-2024-38063", - "full_name": "selenagomez25\/CVE-2024-38063", - "owner": { - "login": "selenagomez25", - "id": 92699085, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92699085?v=4", - "html_url": "https:\/\/github.com\/selenagomez25", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/selenagomez25\/CVE-2024-38063", - "description": "poc for exploiting cve-2024-38063", - "fork": false, - "created_at": "2024-11-18T15:20:24Z", - "updated_at": "2024-11-20T15:30:14Z", - "pushed_at": "2024-11-18T15:21:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 899722656, - "name": "Windows-CVE-2024-38063", - "full_name": "Laukage\/Windows-CVE-2024-38063", - "owner": { - "login": "Laukage", - "id": 46964809, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46964809?v=4", - "html_url": "https:\/\/github.com\/Laukage", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Laukage\/Windows-CVE-2024-38063", - "description": null, - "fork": false, - "created_at": "2024-12-06T21:45:09Z", - "updated_at": "2024-12-06T22:54:04Z", - "pushed_at": "2024-12-06T22:54:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 906855654, - "name": "CVE-2024-38063", - "full_name": "jamesbishop785\/CVE-2024-38063", - "owner": { - "login": "jamesbishop785", - "id": 135285523, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135285523?v=4", - "html_url": "https:\/\/github.com\/jamesbishop785", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/jamesbishop785\/CVE-2024-38063", - "description": null, - "fork": false, - "created_at": "2024-12-22T05:28:56Z", - "updated_at": "2024-12-22T06:27:11Z", - "pushed_at": "2024-12-22T06:27:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-38077.json b/2024/CVE-2024-38077.json index 75620e916f..10da36f8d6 100644 --- a/2024/CVE-2024-38077.json +++ b/2024/CVE-2024-38077.json @@ -1,283 +1,4 @@ [ - { - "id": 840101981, - "name": "CVE-2024-38077-POC", - "full_name": "SecStarBot\/CVE-2024-38077-POC", - "owner": { - "login": "SecStarBot", - "id": 132645723, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132645723?v=4", - "html_url": "https:\/\/github.com\/SecStarBot", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/SecStarBot\/CVE-2024-38077-POC", - "description": null, - "fork": false, - "created_at": "2024-08-09T01:24:59Z", - "updated_at": "2024-12-15T09:56:35Z", - "pushed_at": "2024-08-09T01:19:08Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 223, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 223, - "watchers": 7, - "score": 0, - "subscribers_count": 0 - }, - { - "id": 840155778, - "name": "CVE-2024-38077", - "full_name": "qi4L\/CVE-2024-38077", - "owner": { - "login": "qi4L", - "id": 75202638, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75202638?v=4", - "html_url": "https:\/\/github.com\/qi4L", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/qi4L\/CVE-2024-38077", - "description": "RDL的堆溢出导致的RCE", - "fork": false, - "created_at": "2024-08-09T05:00:44Z", - "updated_at": "2024-12-11T02:09:40Z", - "pushed_at": "2024-08-14T04:43:05Z", - "stargazers_count": 210, - "watchers_count": 210, - "has_discussions": false, - "forks_count": 86, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 86, - "watchers": 210, - "score": 0, - "subscribers_count": 5 - }, - { - "id": 840205980, - "name": "CVE-2024-38077", - "full_name": "Sec-Link\/CVE-2024-38077", - "owner": { - "login": "Sec-Link", - "id": 175936829, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/175936829?v=4", - "html_url": "https:\/\/github.com\/Sec-Link", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Sec-Link\/CVE-2024-38077", - "description": null, - "fork": false, - "created_at": "2024-08-09T07:37:49Z", - "updated_at": "2024-08-09T17:58:46Z", - "pushed_at": "2024-08-09T07:48:07Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 0 - }, - { - "id": 840208671, - "name": "RDL-detect", - "full_name": "murphysecurity\/RDL-detect", - "owner": { - "login": "murphysecurity", - "id": 101661127, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101661127?v=4", - "html_url": "https:\/\/github.com\/murphysecurity", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/murphysecurity\/RDL-detect", - "description": "远程探测 remote desktop licensing 服务开放情况,用于 CVE-2024-38077 漏洞快速排查", - "fork": false, - "created_at": "2024-08-09T07:45:25Z", - "updated_at": "2024-10-28T17:52:40Z", - "pushed_at": "2024-08-09T08:06:19Z", - "stargazers_count": 12, - "watchers_count": 12, - "has_discussions": false, - "forks_count": 10, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 10, - "watchers": 12, - "score": 0, - "subscribers_count": 3 - }, - { - "id": 840208910, - "name": "CVE-2024-38077", - "full_name": "Wlibang\/CVE-2024-38077", - "owner": { - "login": "Wlibang", - "id": 18629232, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18629232?v=4", - "html_url": "https:\/\/github.com\/Wlibang", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Wlibang\/CVE-2024-38077", - "description": "CVE-2024-38077,本仓库仅用作备份,", - "fork": false, - "created_at": "2024-08-09T07:46:09Z", - "updated_at": "2024-12-28T12:45:06Z", - "pushed_at": "2024-08-09T07:45:58Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 4, - "score": 0, - "subscribers_count": 0 - }, - { - "id": 840510667, - "name": "CVE-2024-38077-check", - "full_name": "psl-b\/CVE-2024-38077-check", - "owner": { - "login": "psl-b", - "id": 109031584, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109031584?v=4", - "html_url": "https:\/\/github.com\/psl-b", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/psl-b\/CVE-2024-38077-check", - "description": null, - "fork": false, - "created_at": "2024-08-09T22:01:46Z", - "updated_at": "2024-08-14T08:21:43Z", - "pushed_at": "2024-08-14T08:21:40Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 840545497, - "name": "CVE-2024-38077-RDLCheck", - "full_name": "zhuxi1965\/CVE-2024-38077-RDLCheck", - "owner": { - "login": "zhuxi1965", - "id": 29396844, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29396844?v=4", - "html_url": "https:\/\/github.com\/zhuxi1965", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/zhuxi1965\/CVE-2024-38077-RDLCheck", - "description": "检测RDL服务是否运行,快速排查受影响资产", - "fork": false, - "created_at": "2024-08-10T01:10:06Z", - "updated_at": "2024-10-23T00:13:08Z", - "pushed_at": "2024-08-10T02:19:43Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 6, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 840609471, - "name": "CVE-2024-38077-notes", - "full_name": "lworld0x00\/CVE-2024-38077-notes", - "owner": { - "login": "lworld0x00", - "id": 9474721, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9474721?v=4", - "html_url": "https:\/\/github.com\/lworld0x00", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/lworld0x00\/CVE-2024-38077-notes", - "description": null, - "fork": false, - "created_at": "2024-08-10T06:31:04Z", - "updated_at": "2024-08-10T06:31:08Z", - "pushed_at": "2024-08-10T06:31:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 840708179, - "name": "CVE-2024-38077-check", - "full_name": "atlassion\/CVE-2024-38077-check", - "owner": { - "login": "atlassion", - "id": 49542929, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49542929?v=4", - "html_url": "https:\/\/github.com\/atlassion", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/atlassion\/CVE-2024-38077-check", - "description": "基于135端口检测目标是否存在CVE-2024-38077漏洞", - "fork": false, - "created_at": "2024-08-10T12:49:51Z", - "updated_at": "2024-10-28T17:52:41Z", - "pushed_at": "2024-08-10T09:48:38Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 0 - }, { "id": 842828344, "name": "fyne-gui", @@ -339,78 +60,5 @@ "watchers": 1, "score": 0, "subscribers_count": 1 - }, - { - "id": 869931882, - "name": "CVE-2024-38077", - "full_name": "mrmtwoj\/CVE-2024-38077", - "owner": { - "login": "mrmtwoj", - "id": 22832463, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22832463?v=4", - "html_url": "https:\/\/github.com\/mrmtwoj", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/mrmtwoj\/CVE-2024-38077", - "description": "CVE-2024-38077: Remote Code Execution Vulnerability in Windows Remote Desktop Licensing Service", - "fork": false, - "created_at": "2024-10-09T06:39:21Z", - "updated_at": "2025-01-07T15:58:46Z", - "pushed_at": "2024-10-09T06:42:25Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-38077", - "cve-2024-38077poc", - "licensing-service", - "poc", - "rce", - "rce-exploit", - "remote-code", - "remote-code-execution", - "vulnerability", - "windows-remote-desktop" - ], - "visibility": "public", - "forks": 1, - "watchers": 8, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 884867852, - "name": "CVE-2024-38077", - "full_name": "amfg145\/CVE-2024-38077", - "owner": { - "login": "amfg145", - "id": 16266637, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16266637?v=4", - "html_url": "https:\/\/github.com\/amfg145", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/amfg145\/CVE-2024-38077", - "description": "CVE-2024-38077 private for 10 hands", - "fork": false, - "created_at": "2024-11-07T14:31:42Z", - "updated_at": "2024-11-07T14:39:01Z", - "pushed_at": "2024-11-07T14:38:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-38100.json b/2024/CVE-2024-38100.json deleted file mode 100644 index 4e7e563dd5..0000000000 --- a/2024/CVE-2024-38100.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 838985906, - "name": "CVE-2024-38100-RCE-POC", - "full_name": "Florian-Hoth\/CVE-2024-38100-RCE-POC", - "owner": { - "login": "Florian-Hoth", - "id": 177672507, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/177672507?v=4", - "html_url": "https:\/\/github.com\/Florian-Hoth", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Florian-Hoth\/CVE-2024-38100-RCE-POC", - "description": "CVE-2024-38100 Windows Leaked Wallpaper Escelation to RCE vulnerability", - "fork": false, - "created_at": "2024-08-06T18:26:50Z", - "updated_at": "2025-01-14T04:23:03Z", - "pushed_at": "2024-08-06T18:29:09Z", - "stargazers_count": 10, - "watchers_count": 10, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 10, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-38124.json b/2024/CVE-2024-38124.json deleted file mode 100644 index 04ebc64a25..0000000000 --- a/2024/CVE-2024-38124.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 878525695, - "name": "Detailed-Analysis-and-Mitigation-Strategies-for-CVE-2024-38124-and-CVE-2024-43468", - "full_name": "tadash10\/Detailed-Analysis-and-Mitigation-Strategies-for-CVE-2024-38124-and-CVE-2024-43468", - "owner": { - "login": "tadash10", - "id": 126980610, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/126980610?v=4", - "html_url": "https:\/\/github.com\/tadash10", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/tadash10\/Detailed-Analysis-and-Mitigation-Strategies-for-CVE-2024-38124-and-CVE-2024-43468", - "description": null, - "fork": false, - "created_at": "2024-10-25T14:53:12Z", - "updated_at": "2024-11-07T03:49:52Z", - "pushed_at": "2024-11-07T03:49:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-38193.json b/2024/CVE-2024-38193.json deleted file mode 100644 index 4286895aba..0000000000 --- a/2024/CVE-2024-38193.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 897795595, - "name": "CVE-2024-38193-Nephster", - "full_name": "killvxk\/CVE-2024-38193-Nephster", - "owner": { - "login": "killvxk", - "id": 309424, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/309424?v=4", - "html_url": "https:\/\/github.com\/killvxk", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/killvxk\/CVE-2024-38193-Nephster", - "description": null, - "fork": false, - "created_at": "2024-12-03T08:56:59Z", - "updated_at": "2025-01-13T10:22:54Z", - "pushed_at": "2024-11-18T23:48:31Z", - "stargazers_count": 49, - "watchers_count": 49, - "has_discussions": false, - "forks_count": 24, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 24, - "watchers": 49, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-38472.json b/2024/CVE-2024-38472.json deleted file mode 100644 index e40f01d2b4..0000000000 --- a/2024/CVE-2024-38472.json +++ /dev/null @@ -1,75 +0,0 @@ -[ - { - "id": 837656120, - "name": "CVE-2024-38472", - "full_name": "Abdurahmon3236\/CVE-2024-38472", - "owner": { - "login": "Abdurahmon3236", - "id": 76862934, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76862934?v=4", - "html_url": "https:\/\/github.com\/Abdurahmon3236", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Abdurahmon3236\/CVE-2024-38472", - "description": null, - "fork": false, - "created_at": "2024-08-03T16:08:28Z", - "updated_at": "2024-08-29T13:31:15Z", - "pushed_at": "2024-08-03T19:32:37Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 868234685, - "name": "apache-vulnerability-testing", - "full_name": "mrmtwoj\/apache-vulnerability-testing", - "owner": { - "login": "mrmtwoj", - "id": 22832463, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22832463?v=4", - "html_url": "https:\/\/github.com\/mrmtwoj", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/mrmtwoj\/apache-vulnerability-testing", - "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", - "fork": false, - "created_at": "2024-10-05T20:32:45Z", - "updated_at": "2025-01-09T13:41:00Z", - "pushed_at": "2024-10-05T20:37:02Z", - "stargazers_count": 65, - "watchers_count": 65, - "has_discussions": false, - "forks_count": 13, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "apache", - "apache2", - "cve-2023-3870", - "cve-2024-38472", - "cve-2024-38473", - "cve-2024-38474", - "cve-2024-38475", - "cve-2024-38476", - "cve-2024-38477", - "cve-2024-39573" - ], - "visibility": "public", - "forks": 13, - "watchers": 65, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-38473.json b/2024/CVE-2024-38473.json index e73ac7ee86..3990202fc9 100644 --- a/2024/CVE-2024-38473.json +++ b/2024/CVE-2024-38473.json @@ -1,35 +1,4 @@ [ - { - "id": 837366074, - "name": "CVE-2024-38473", - "full_name": "Abdurahmon3236\/CVE-2024-38473", - "owner": { - "login": "Abdurahmon3236", - "id": 76862934, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76862934?v=4", - "html_url": "https:\/\/github.com\/Abdurahmon3236", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Abdurahmon3236\/CVE-2024-38473", - "description": null, - "fork": false, - "created_at": "2024-08-02T19:57:52Z", - "updated_at": "2024-10-29T00:41:05Z", - "pushed_at": "2024-08-02T20:01:15Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, { "id": 846595537, "name": "CVE-2024-38473-Nuclei-Template", diff --git a/2024/CVE-2024-38475.json b/2024/CVE-2024-38475.json index a91d04ca4d..620959e93a 100644 --- a/2024/CVE-2024-38475.json +++ b/2024/CVE-2024-38475.json @@ -29,36 +29,5 @@ "watchers": 4, "score": 0, "subscribers_count": 1 - }, - { - "id": 902313749, - "name": "CVE-2024-38475", - "full_name": "soltanali0\/CVE-2024-38475", - "owner": { - "login": "soltanali0", - "id": 87374678, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87374678?v=4", - "html_url": "https:\/\/github.com\/soltanali0", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/soltanali0\/CVE-2024-38475", - "description": "exploit CVE-2024-38475(mod_rewrite weakness with filesystem path matching)", - "fork": false, - "created_at": "2024-12-12T10:23:32Z", - "updated_at": "2024-12-12T10:28:30Z", - "pushed_at": "2024-12-12T10:28:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-38537.json b/2024/CVE-2024-38537.json deleted file mode 100644 index a815b8dfa5..0000000000 --- a/2024/CVE-2024-38537.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 825357927, - "name": "Detect_polyfill_CVE-2024-38537-", - "full_name": "Havoc10-sw\/Detect_polyfill_CVE-2024-38537-", - "owner": { - "login": "Havoc10-sw", - "id": 72911792, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72911792?v=4", - "html_url": "https:\/\/github.com\/Havoc10-sw", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Havoc10-sw\/Detect_polyfill_CVE-2024-38537-", - "description": "Here's a Python script that checks if the polyfill.io domain is present in the Content Security Policy (CSP) header of a given web application.", - "fork": false, - "created_at": "2024-07-07T15:06:39Z", - "updated_at": "2024-07-07T16:05:21Z", - "pushed_at": "2024-07-07T16:05:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-38816.json b/2024/CVE-2024-38816.json index 5165817e4a..ae15257090 100644 --- a/2024/CVE-2024-38816.json +++ b/2024/CVE-2024-38816.json @@ -60,98 +60,5 @@ "watchers": 4, "score": 0, "subscribers_count": 0 - }, - { - "id": 872964642, - "name": "cve-2024-38816", - "full_name": "Galaxy-system\/cve-2024-38816", - "owner": { - "login": "Galaxy-system", - "id": 123049563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123049563?v=4", - "html_url": "https:\/\/github.com\/Galaxy-system", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Galaxy-system\/cve-2024-38816", - "description": null, - "fork": false, - "created_at": "2024-10-15T11:33:13Z", - "updated_at": "2024-10-15T11:33:13Z", - "pushed_at": "2024-10-15T11:33:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 897089761, - "name": "App-vulnerable", - "full_name": "Anthony1078\/App-vulnerable", - "owner": { - "login": "Anthony1078", - "id": 96083496, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96083496?v=4", - "html_url": "https:\/\/github.com\/Anthony1078", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Anthony1078\/App-vulnerable", - "description": " CVE-2024-38816", - "fork": false, - "created_at": "2024-12-02T02:14:49Z", - "updated_at": "2024-12-02T02:15:52Z", - "pushed_at": "2024-12-02T02:15:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 911082607, - "name": "spring-framework", - "full_name": "wdragondragon\/spring-framework", - "owner": { - "login": "wdragondragon", - "id": 47441585, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47441585?v=4", - "html_url": "https:\/\/github.com\/wdragondragon", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/wdragondragon\/spring-framework", - "description": "Fixed cve-2024-38816 based on version 5.3.39", - "fork": false, - "created_at": "2025-01-02T07:50:31Z", - "updated_at": "2025-01-02T07:54:08Z", - "pushed_at": "2025-01-02T08:03:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-38819.json b/2024/CVE-2024-38819.json deleted file mode 100644 index 444921fb7e..0000000000 --- a/2024/CVE-2024-38819.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 903312018, - "name": "CVE-2024-38819-POC", - "full_name": "masa42\/CVE-2024-38819-POC", - "owner": { - "login": "masa42", - "id": 46730934, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46730934?v=4", - "html_url": "https:\/\/github.com\/masa42", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/masa42\/CVE-2024-38819-POC", - "description": null, - "fork": false, - "created_at": "2024-12-14T09:22:33Z", - "updated_at": "2025-01-09T16:44:29Z", - "pushed_at": "2024-12-14T10:13:45Z", - "stargazers_count": 36, - "watchers_count": 36, - "has_discussions": false, - "forks_count": 10, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 10, - "watchers": 36, - "score": 0, - "subscribers_count": 3 - }, - { - "id": 904096436, - "name": "CVE-2024-38819", - "full_name": "GhostS3c\/CVE-2024-38819", - "owner": { - "login": "GhostS3c", - "id": 190174780, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/190174780?v=4", - "html_url": "https:\/\/github.com\/GhostS3c", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/GhostS3c\/CVE-2024-38819", - "description": "CVE-2024-38819 nuclei template", - "fork": false, - "created_at": "2024-12-16T08:48:12Z", - "updated_at": "2024-12-18T02:01:48Z", - "pushed_at": "2024-12-16T08:49:02Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-38821.json b/2024/CVE-2024-38821.json deleted file mode 100644 index 5edeac022f..0000000000 --- a/2024/CVE-2024-38821.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 880884921, - "name": "cve-2024-38821", - "full_name": "mouadk\/cve-2024-38821", - "owner": { - "login": "mouadk", - "id": 32769487, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32769487?v=4", - "html_url": "https:\/\/github.com\/mouadk", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/mouadk\/cve-2024-38821", - "description": "cve-2024-38821", - "fork": false, - "created_at": "2024-10-30T14:38:37Z", - "updated_at": "2024-11-14T01:22:38Z", - "pushed_at": "2024-10-30T15:17:54Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-38856.json b/2024/CVE-2024-38856.json index 06ab5d86bc..2fbf66a8db 100644 --- a/2024/CVE-2024-38856.json +++ b/2024/CVE-2024-38856.json @@ -38,37 +38,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 840564456, - "name": "CVE-2024-38856", - "full_name": "ThatNotEasy\/CVE-2024-38856", - "owner": { - "login": "ThatNotEasy", - "id": 25004320, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4", - "html_url": "https:\/\/github.com\/ThatNotEasy", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2024-38856", - "description": "Perform With Massive Apache OFBiz Zero-Day Scanner & RCE", - "fork": false, - "created_at": "2024-08-10T03:05:34Z", - "updated_at": "2024-11-20T16:31:00Z", - "pushed_at": "2024-08-10T03:14:42Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, { "id": 844163753, "name": "CVE-2024-38856-ApacheOfBiz", @@ -192,67 +161,5 @@ "watchers": 2, "score": 0, "subscribers_count": 1 - }, - { - "id": 892921079, - "name": "cve-2024-38856-poc", - "full_name": "XiaomingX\/cve-2024-38856-poc", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-38856-poc", - "description": "CVE-2024-38856 是 Apache OFBiz 中的一个严重漏洞,允许未经身份验证的攻击者在受影响的系统上执行任意代码。 ", - "fork": false, - "created_at": "2024-11-23T03:54:28Z", - "updated_at": "2025-01-13T18:17:29Z", - "pushed_at": "2024-11-23T03:57:02Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 911249722, - "name": "CVE-2024-38856_Scen", - "full_name": "FakesiteSecurity\/CVE-2024-38856_Scen", - "owner": { - "login": "FakesiteSecurity", - "id": 193509744, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/193509744?v=4", - "html_url": "https:\/\/github.com\/FakesiteSecurity", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/FakesiteSecurity\/CVE-2024-38856_Scen", - "description": "Tentang Pemindai & Eksploitasi Apache OFBiz RCE (CVE-2024-38856)", - "fork": false, - "created_at": "2025-01-02T15:25:31Z", - "updated_at": "2025-01-02T20:41:30Z", - "pushed_at": "2025-01-02T15:27:34Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-38998.json b/2024/CVE-2024-38998.json deleted file mode 100644 index 3498b33845..0000000000 --- a/2024/CVE-2024-38998.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 902615056, - "name": "PP_CVE-2024-38998", - "full_name": "z3ldr1\/PP_CVE-2024-38998", - "owner": { - "login": "z3ldr1", - "id": 128452420, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128452420?v=4", - "html_url": "https:\/\/github.com\/z3ldr1", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/z3ldr1\/PP_CVE-2024-38998", - "description": "Uma vulnerabilidade (CVE-2024-38998) foi identificada na versão 2.3.6 do módulo JavaScript requirejs. Ela explora prototype pollution na função config, permitindo que invasores modifiquem Object.prototype com entradas maliciosas. Isso pode causar DoS, execução remota de código (RCE) ou XSS. A gravidade é crítica (CVSS 9.8). ", - "fork": false, - "created_at": "2024-12-12T23:19:44Z", - "updated_at": "2024-12-20T00:37:10Z", - "pushed_at": "2024-12-12T23:20:56Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 913713750, - "name": "PP_CVE-2024-38998", - "full_name": "cesarbtakeda\/PP_CVE-2024-38998", - "owner": { - "login": "cesarbtakeda", - "id": 114227831, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114227831?v=4", - "html_url": "https:\/\/github.com\/cesarbtakeda", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/cesarbtakeda\/PP_CVE-2024-38998", - "description": null, - "fork": false, - "created_at": "2025-01-08T08:04:54Z", - "updated_at": "2025-01-08T08:13:26Z", - "pushed_at": "2025-01-08T08:13:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-39031.json b/2024/CVE-2024-39031.json deleted file mode 100644 index 3f6b6002f7..0000000000 --- a/2024/CVE-2024-39031.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 826000412, - "name": "CVE-2024-39031", - "full_name": "toneemarqus\/CVE-2024-39031", - "owner": { - "login": "toneemarqus", - "id": 85018947, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85018947?v=4", - "html_url": "https:\/\/github.com\/toneemarqus", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/toneemarqus\/CVE-2024-39031", - "description": "Stored Cross-Side Scripting (XSS) leads to privilege escalation in SilverPeas social-networking portal", - "fork": false, - "created_at": "2024-07-08T23:21:52Z", - "updated_at": "2024-07-24T04:41:12Z", - "pushed_at": "2024-07-24T04:41:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-39069.json b/2024/CVE-2024-39069.json deleted file mode 100644 index 4a14054f9c..0000000000 --- a/2024/CVE-2024-39069.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 826264577, - "name": "CVE-2024-39069", - "full_name": "AungSoePaing\/CVE-2024-39069", - "owner": { - "login": "AungSoePaing", - "id": 76258644, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76258644?v=4", - "html_url": "https:\/\/github.com\/AungSoePaing", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/AungSoePaing\/CVE-2024-39069", - "description": "CVE-2024-39069", - "fork": false, - "created_at": "2024-07-09T11:24:44Z", - "updated_at": "2024-07-09T13:29:18Z", - "pushed_at": "2024-07-09T13:29:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-39090.json b/2024/CVE-2024-39090.json deleted file mode 100644 index 4c8ce7e5b5..0000000000 --- a/2024/CVE-2024-39090.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 895097713, - "name": "CVE-2024-39090-PoC", - "full_name": "ghostwirez\/CVE-2024-39090-PoC", - "owner": { - "login": "ghostwirez", - "id": 64195231, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64195231?v=4", - "html_url": "https:\/\/github.com\/ghostwirez", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ghostwirez\/CVE-2024-39090-PoC", - "description": "This PoC script exploits CVE-2024-39090, a CSRF to Stored XSS vulnerability in PHPGurukul Online Shopping Portal v2.0. It automates CSRF attacks to inject persistent JavaScript payloads, which execute when a privileged user accesses the affected page, enabling actions such as session hijacking or credential theft.", - "fork": false, - "created_at": "2024-11-27T14:55:58Z", - "updated_at": "2024-11-29T03:05:46Z", - "pushed_at": "2024-11-29T01:02:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-39123.json b/2024/CVE-2024-39123.json deleted file mode 100644 index 0996d25c33..0000000000 --- a/2024/CVE-2024-39123.json +++ /dev/null @@ -1,36 +0,0 @@ -[ - { - "id": 915026880, - "name": "CVE-2024-39123-Exploit", - "full_name": "theexploiters\/CVE-2024-39123-Exploit", - "owner": { - "login": "theexploiters", - "id": 185040501, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/185040501?v=4", - "html_url": "https:\/\/github.com\/theexploiters", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/theexploiters\/CVE-2024-39123-Exploit", - "description": "Exploit For: CVE-2024-39123: Stored XSS in Calibre-web 0.6.21", - "fork": false, - "created_at": "2025-01-10T20:05:24Z", - "updated_at": "2025-01-12T21:19:16Z", - "pushed_at": "2025-01-10T20:06:55Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-39123", - "cve-2024-39123-exploit" - ], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-39203.json b/2024/CVE-2024-39203.json deleted file mode 100644 index b1a8c7dce2..0000000000 --- a/2024/CVE-2024-39203.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 823919362, - "name": "CVE-2024-39203", - "full_name": "5r1an\/CVE-2024-39203", - "owner": { - "login": "5r1an", - "id": 174668848, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174668848?v=4", - "html_url": "https:\/\/github.com\/5r1an", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/5r1an\/CVE-2024-39203", - "description": "A cross-site scripting (XSS) vulnerability in the Backend Theme. Management module of Z-BlogPHP v1.7.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.", - "fork": false, - "created_at": "2024-07-04T02:30:17Z", - "updated_at": "2024-07-04T02:30:17Z", - "pushed_at": "2024-07-04T02:30:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-39205.json b/2024/CVE-2024-39205.json deleted file mode 100644 index 2255a89ad6..0000000000 --- a/2024/CVE-2024-39205.json +++ /dev/null @@ -1,37 +0,0 @@ -[ - { - "id": 878732098, - "name": "CVE-2024-39205-Pyload-RCE", - "full_name": "Marven11\/CVE-2024-39205-Pyload-RCE", - "owner": { - "login": "Marven11", - "id": 110723864, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110723864?v=4", - "html_url": "https:\/\/github.com\/Marven11", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Marven11\/CVE-2024-39205-Pyload-RCE", - "description": "Pyload RCE with js2py sandbox escape ", - "fork": false, - "created_at": "2024-10-26T01:01:35Z", - "updated_at": "2024-12-02T06:55:31Z", - "pushed_at": "2024-10-26T01:11:57Z", - "stargazers_count": 14, - "watchers_count": 14, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "pyload", - "rce" - ], - "visibility": "public", - "forks": 4, - "watchers": 14, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-39210.json b/2024/CVE-2024-39210.json deleted file mode 100644 index e17a7e3a7b..0000000000 --- a/2024/CVE-2024-39210.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 824474537, - "name": "CVE-2024-39210", - "full_name": "KRookieSec\/CVE-2024-39210", - "owner": { - "login": "KRookieSec", - "id": 43315052, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43315052?v=4", - "html_url": "https:\/\/github.com\/KRookieSec", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/KRookieSec\/CVE-2024-39210", - "description": "Best house rental management system Local file contains vulnerability ", - "fork": false, - "created_at": "2024-07-05T08:01:22Z", - "updated_at": "2024-11-09T13:59:02Z", - "pushed_at": "2024-07-05T08:02:50Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-39211.json b/2024/CVE-2024-39211.json deleted file mode 100644 index efa31f1739..0000000000 --- a/2024/CVE-2024-39211.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 824057577, - "name": "CVE-2024-39211", - "full_name": "artemy-ccrsky\/CVE-2024-39211", - "owner": { - "login": "artemy-ccrsky", - "id": 33719402, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33719402?v=4", - "html_url": "https:\/\/github.com\/artemy-ccrsky", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/artemy-ccrsky\/CVE-2024-39211", - "description": "CVE-2024-39211", - "fork": false, - "created_at": "2024-07-04T09:24:34Z", - "updated_at": "2024-12-05T10:52:00Z", - "pushed_at": "2024-07-08T13:00:44Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 6, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-39250.json b/2024/CVE-2024-39250.json deleted file mode 100644 index c6d26c739b..0000000000 --- a/2024/CVE-2024-39250.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 828336673, - "name": "CVE-2024-39250", - "full_name": "efrann\/CVE-2024-39250", - "owner": { - "login": "efrann", - "id": 44778301, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44778301?v=4", - "html_url": "https:\/\/github.com\/efrann", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/efrann\/CVE-2024-39250", - "description": "CVE-2024-39250 TimeTrax SQLi", - "fork": false, - "created_at": "2024-07-13T20:29:31Z", - "updated_at": "2024-08-02T03:18:34Z", - "pushed_at": "2024-07-23T12:28:31Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-39304.json b/2024/CVE-2024-39304.json deleted file mode 100644 index eee2808a59..0000000000 --- a/2024/CVE-2024-39304.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 836297653, - "name": "CVE-2024-39304", - "full_name": "apena-ba\/CVE-2024-39304", - "owner": { - "login": "apena-ba", - "id": 113431512, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113431512?v=4", - "html_url": "https:\/\/github.com\/apena-ba", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/apena-ba\/CVE-2024-39304", - "description": null, - "fork": false, - "created_at": "2024-07-31T14:48:57Z", - "updated_at": "2024-08-28T06:24:36Z", - "pushed_at": "2024-07-31T15:09:45Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-39306.json b/2024/CVE-2024-39306.json deleted file mode 100644 index fe9783451d..0000000000 --- a/2024/CVE-2024-39306.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 836301150, - "name": "CVE-2024-39306", - "full_name": "apena-ba\/CVE-2024-39306", - "owner": { - "login": "apena-ba", - "id": 113431512, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113431512?v=4", - "html_url": "https:\/\/github.com\/apena-ba", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/apena-ba\/CVE-2024-39306", - "description": null, - "fork": false, - "created_at": "2024-07-31T14:57:03Z", - "updated_at": "2024-08-28T06:24:27Z", - "pushed_at": "2024-07-31T15:07:13Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-39614.json b/2024/CVE-2024-39614.json deleted file mode 100644 index b41488ae4d..0000000000 --- a/2024/CVE-2024-39614.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 837370546, - "name": "-CVE-2024-39614", - "full_name": "Abdurahmon3236\/-CVE-2024-39614", - "owner": { - "login": "Abdurahmon3236", - "id": 76862934, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76862934?v=4", - "html_url": "https:\/\/github.com\/Abdurahmon3236", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Abdurahmon3236\/-CVE-2024-39614", - "description": null, - "fork": false, - "created_at": "2024-08-02T20:11:29Z", - "updated_at": "2024-08-29T13:31:15Z", - "pushed_at": "2024-08-02T20:15:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-39700.json b/2024/CVE-2024-39700.json deleted file mode 100644 index b500780437..0000000000 --- a/2024/CVE-2024-39700.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 835137529, - "name": "CVE-2024-39700-PoC", - "full_name": "LOURC0D3\/CVE-2024-39700-PoC", - "owner": { - "login": "LOURC0D3", - "id": 83567597, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83567597?v=4", - "html_url": "https:\/\/github.com\/LOURC0D3", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/LOURC0D3\/CVE-2024-39700-PoC", - "description": "CVE-2024-39700 Proof of Concept", - "fork": false, - "created_at": "2024-07-29T08:33:12Z", - "updated_at": "2024-08-01T06:52:18Z", - "pushed_at": "2024-07-31T04:13:53Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-39844.json b/2024/CVE-2024-39844.json deleted file mode 100644 index 3a244b2a6b..0000000000 --- a/2024/CVE-2024-39844.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 823880170, - "name": "CVE-2024-39844", - "full_name": "ph1ns\/CVE-2024-39844", - "owner": { - "login": "ph1ns", - "id": 165745967, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165745967?v=4", - "html_url": "https:\/\/github.com\/ph1ns", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ph1ns\/CVE-2024-39844", - "description": "CVE-2024-39844 (ZNC < 1.9.1 modtcl RCE)", - "fork": false, - "created_at": "2024-07-03T23:27:25Z", - "updated_at": "2024-11-20T16:30:53Z", - "pushed_at": "2024-07-03T23:30:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-39908.json b/2024/CVE-2024-39908.json deleted file mode 100644 index 8654e5517b..0000000000 --- a/2024/CVE-2024-39908.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 905905924, - "name": "CVE-2024-39908", - "full_name": "SpiralBL0CK\/CVE-2024-39908", - "owner": { - "login": "SpiralBL0CK", - "id": 25670930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25670930?v=4", - "html_url": "https:\/\/github.com\/SpiralBL0CK", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/SpiralBL0CK\/CVE-2024-39908", - "description": "CVE-2024-39908 full poc", - "fork": false, - "created_at": "2024-12-19T18:59:52Z", - "updated_at": "2024-12-19T19:00:06Z", - "pushed_at": "2024-12-19T19:00:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-39914.json b/2024/CVE-2024-39914.json deleted file mode 100644 index 100229481a..0000000000 --- a/2024/CVE-2024-39914.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 906558100, - "name": "FOG-Project", - "full_name": "9874621368\/FOG-Project", - "owner": { - "login": "9874621368", - "id": 154233216, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154233216?v=4", - "html_url": "https:\/\/github.com\/9874621368", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/9874621368\/FOG-Project", - "description": "FOG Project CVE-2024-39914 命令执行漏洞", - "fork": false, - "created_at": "2024-12-21T08:30:00Z", - "updated_at": "2024-12-21T08:33:57Z", - "pushed_at": "2024-12-21T08:33:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-39929.json b/2024/CVE-2024-39929.json index 09b8870383..6fe78a42ee 100644 --- a/2024/CVE-2024-39929.json +++ b/2024/CVE-2024-39929.json @@ -29,36 +29,5 @@ "watchers": 3, "score": 0, "subscribers_count": 1 - }, - { - "id": 835307900, - "name": "CVE-2024-39929", - "full_name": "michael-david-fry\/CVE-2024-39929", - "owner": { - "login": "michael-david-fry", - "id": 4213469, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4213469?v=4", - "html_url": "https:\/\/github.com\/michael-david-fry", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/michael-david-fry\/CVE-2024-39929", - "description": "POC to test CVE-2024-39929 against EXIM mail servers", - "fork": false, - "created_at": "2024-07-29T15:09:53Z", - "updated_at": "2024-11-20T16:30:59Z", - "pushed_at": "2024-08-01T16:41:43Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-39943.json b/2024/CVE-2024-39943.json deleted file mode 100644 index f3d7933cdf..0000000000 --- a/2024/CVE-2024-39943.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 824447243, - "name": "CVE-2024-39943-Poc", - "full_name": "truonghuuphuc\/CVE-2024-39943-Poc", - "owner": { - "login": "truonghuuphuc", - "id": 20487674, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20487674?v=4", - "html_url": "https:\/\/github.com\/truonghuuphuc", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/truonghuuphuc\/CVE-2024-39943-Poc", - "description": "CVE-2024-39943 rejetto HFS (aka HTTP File Server) 3 before 0.52.10 on Linux, UNIX, and macOS allows OS command execution by remote authenticated users (if they have Upload permissions). This occurs because a shell is used to execute df (i.e., with execSync instead of spawnSync in child_process in Node.js).", - "fork": false, - "created_at": "2024-07-05T06:46:34Z", - "updated_at": "2025-01-03T01:39:39Z", - "pushed_at": "2024-07-07T03:41:03Z", - "stargazers_count": 19, - "watchers_count": 19, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 6, - "watchers": 19, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40080.json b/2024/CVE-2024-40080.json deleted file mode 100644 index 9834679b45..0000000000 --- a/2024/CVE-2024-40080.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 838855658, - "name": "CVE-2024-40080", - "full_name": "perras\/CVE-2024-40080", - "owner": { - "login": "perras", - "id": 7707264, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7707264?v=4", - "html_url": "https:\/\/github.com\/perras", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/perras\/CVE-2024-40080", - "description": "cve discovery proof-of-concept", - "fork": false, - "created_at": "2024-08-06T13:28:53Z", - "updated_at": "2024-08-06T13:32:51Z", - "pushed_at": "2024-08-06T13:32:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40110.json b/2024/CVE-2024-40110.json deleted file mode 100644 index 7fae6087ff..0000000000 --- a/2024/CVE-2024-40110.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 837372055, - "name": "CVE-2024-40110", - "full_name": "Abdurahmon3236\/CVE-2024-40110", - "owner": { - "login": "Abdurahmon3236", - "id": 76862934, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76862934?v=4", - "html_url": "https:\/\/github.com\/Abdurahmon3236", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Abdurahmon3236\/CVE-2024-40110", - "description": null, - "fork": false, - "created_at": "2024-08-02T20:17:25Z", - "updated_at": "2024-08-02T20:20:27Z", - "pushed_at": "2024-08-02T20:20:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40111.json b/2024/CVE-2024-40111.json deleted file mode 100644 index d60cc641e4..0000000000 --- a/2024/CVE-2024-40111.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 915029581, - "name": "CVE-2024-40111-Exploit", - "full_name": "theexploiters\/CVE-2024-40111-Exploit", - "owner": { - "login": "theexploiters", - "id": 185040501, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/185040501?v=4", - "html_url": "https:\/\/github.com\/theexploiters", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/theexploiters\/CVE-2024-40111-Exploit", - "description": "Exploit For: CVE-2024-40111: Stored Cross-Site Scripting (XSS) in Automad 2.0.0-alpha.4", - "fork": false, - "created_at": "2025-01-10T20:14:07Z", - "updated_at": "2025-01-12T21:19:16Z", - "pushed_at": "2025-01-10T20:14:28Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40119.json b/2024/CVE-2024-40119.json deleted file mode 100644 index 5d072ad9cd..0000000000 --- a/2024/CVE-2024-40119.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 829794758, - "name": "nepstech-xpon-router-CVE-2024-40119", - "full_name": "sudo-subho\/nepstech-xpon-router-CVE-2024-40119", - "owner": { - "login": "sudo-subho", - "id": 77957540, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77957540?v=4", - "html_url": "https:\/\/github.com\/sudo-subho", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/sudo-subho\/nepstech-xpon-router-CVE-2024-40119", - "description": "Cross-Site Request Forgery (CSRF) vulnerability in the password change function, which allows remote attackers to change the admin password without the user's consent, leading to a potential account takeover.", - "fork": false, - "created_at": "2024-07-17T03:03:42Z", - "updated_at": "2024-07-17T03:10:19Z", - "pushed_at": "2024-07-17T03:10:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40324.json b/2024/CVE-2024-40324.json deleted file mode 100644 index 5b271e500a..0000000000 --- a/2024/CVE-2024-40324.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 833662029, - "name": "CVE-2024-40324", - "full_name": "aleksey-vi\/CVE-2024-40324", - "owner": { - "login": "aleksey-vi", - "id": 65017000, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65017000?v=4", - "html_url": "https:\/\/github.com\/aleksey-vi", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/aleksey-vi\/CVE-2024-40324", - "description": null, - "fork": false, - "created_at": "2024-07-25T13:48:22Z", - "updated_at": "2024-07-25T13:57:54Z", - "pushed_at": "2024-07-25T13:57:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40348.json b/2024/CVE-2024-40348.json deleted file mode 100644 index c1be220650..0000000000 --- a/2024/CVE-2024-40348.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 831572355, - "name": "CVE-2024-40348", - "full_name": "bigb0x\/CVE-2024-40348", - "owner": { - "login": "bigb0x", - "id": 13532434, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4", - "html_url": "https:\/\/github.com\/bigb0x", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-40348", - "description": "POC for CVE-2024-40348. Will attempt to read \/etc\/passwd from target", - "fork": false, - "created_at": "2024-07-21T00:54:55Z", - "updated_at": "2025-01-02T17:56:45Z", - "pushed_at": "2024-07-21T09:54:02Z", - "stargazers_count": 28, - "watchers_count": 28, - "has_discussions": false, - "forks_count": 8, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 8, - "watchers": 28, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 906162913, - "name": "Bazaar_poc", - "full_name": "NingXin2002\/Bazaar_poc", - "owner": { - "login": "NingXin2002", - "id": 138864342, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138864342?v=4", - "html_url": "https:\/\/github.com\/NingXin2002", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/NingXin2002\/Bazaar_poc", - "description": "Bazaar v1.4.3 任意文件读取漏洞(CVE-2024-40348)", - "fork": false, - "created_at": "2024-12-20T09:47:12Z", - "updated_at": "2024-12-20T09:49:43Z", - "pushed_at": "2024-12-20T09:49:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-4040.json b/2024/CVE-2024-4040.json index 224bc45159..396b9281a8 100644 --- a/2024/CVE-2024-4040.json +++ b/2024/CVE-2024-4040.json @@ -386,41 +386,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 824427234, - "name": "CVE-2024-4040", - "full_name": "entroychang\/CVE-2024-4040", - "owner": { - "login": "entroychang", - "id": 56551382, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56551382?v=4", - "html_url": "https:\/\/github.com\/entroychang", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/entroychang\/CVE-2024-4040", - "description": "CVE-2024-4040 PoC", - "fork": false, - "created_at": "2024-07-05T05:46:56Z", - "updated_at": "2024-12-06T09:40:42Z", - "pushed_at": "2024-07-09T09:48:17Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2024-4040", - "exploit" - ], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, { "id": 859098985, "name": "CrushFTP-cve-2024-4040-poc", @@ -498,36 +463,5 @@ "watchers": 7, "score": 0, "subscribers_count": 1 - }, - { - "id": 877132815, - "name": "CVE-2024-4040", - "full_name": "rahisec\/CVE-2024-4040", - "owner": { - "login": "rahisec", - "id": 35906436, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35906436?v=4", - "html_url": "https:\/\/github.com\/rahisec", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/rahisec\/CVE-2024-4040", - "description": null, - "fork": false, - "created_at": "2024-10-23T06:29:19Z", - "updated_at": "2024-10-23T06:31:12Z", - "pushed_at": "2024-10-23T06:31:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-40422.json b/2024/CVE-2024-40422.json deleted file mode 100644 index 787e4aeb6c..0000000000 --- a/2024/CVE-2024-40422.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 823856753, - "name": "CVE-2024-40422", - "full_name": "alpernae\/CVE-2024-40422", - "owner": { - "login": "alpernae", - "id": 39368379, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39368379?v=4", - "html_url": "https:\/\/github.com\/alpernae", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/alpernae\/CVE-2024-40422", - "description": null, - "fork": false, - "created_at": "2024-07-03T21:43:15Z", - "updated_at": "2024-11-20T16:30:53Z", - "pushed_at": "2024-07-30T10:40:32Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 838700943, - "name": "CVE-2024-40422", - "full_name": "j3r1ch0123\/CVE-2024-40422", - "owner": { - "login": "j3r1ch0123", - "id": 110147529, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110147529?v=4", - "html_url": "https:\/\/github.com\/j3r1ch0123", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/j3r1ch0123\/CVE-2024-40422", - "description": "Found this on exploit-db, decided to make my own for practice. This exploit will search out the passwd file and print the contents on a vulnerable system.", - "fork": false, - "created_at": "2024-08-06T07:09:47Z", - "updated_at": "2024-11-20T16:30:59Z", - "pushed_at": "2024-08-06T20:19:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40443.json b/2024/CVE-2024-40443.json deleted file mode 100644 index b302bae0a7..0000000000 --- a/2024/CVE-2024-40443.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 886294827, - "name": "CVE-2024-40443", - "full_name": "Yuma-Tsushima07\/CVE-2024-40443", - "owner": { - "login": "Yuma-Tsushima07", - "id": 63207324, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63207324?v=4", - "html_url": "https:\/\/github.com\/Yuma-Tsushima07", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Yuma-Tsushima07\/CVE-2024-40443", - "description": "CVE-2024-40443 - A SQL Injection vulnerability in Computer Laboratory Management System v1.0 allows attackers to execute arbitrary SQL commands ", - "fork": false, - "created_at": "2024-11-10T17:35:14Z", - "updated_at": "2024-11-10T17:41:02Z", - "pushed_at": "2024-11-10T17:40:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40457.json b/2024/CVE-2024-40457.json deleted file mode 100644 index 328d4ce1eb..0000000000 --- a/2024/CVE-2024-40457.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 880953987, - "name": "CVE-2024-40457-PoC", - "full_name": "jeppojeps\/CVE-2024-40457-PoC", - "owner": { - "login": "jeppojeps", - "id": 7843530, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7843530?v=4", - "html_url": "https:\/\/github.com\/jeppojeps", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/jeppojeps\/CVE-2024-40457-PoC", - "description": "CVE PoC 2024-40457", - "fork": false, - "created_at": "2024-10-30T16:51:31Z", - "updated_at": "2024-10-31T15:14:04Z", - "pushed_at": "2024-10-30T16:52:51Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40492.json b/2024/CVE-2024-40492.json deleted file mode 100644 index 30ca94ceb4..0000000000 --- a/2024/CVE-2024-40492.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 828086923, - "name": "POC_CVE-2024-40492", - "full_name": "minendie\/POC_CVE-2024-40492", - "owner": { - "login": "minendie", - "id": 92912837, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92912837?v=4", - "html_url": "https:\/\/github.com\/minendie", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/minendie\/POC_CVE-2024-40492", - "description": null, - "fork": false, - "created_at": "2024-07-13T04:57:48Z", - "updated_at": "2024-07-13T04:59:09Z", - "pushed_at": "2024-07-13T04:59:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40498.json b/2024/CVE-2024-40498.json deleted file mode 100644 index e1dae0a101..0000000000 --- a/2024/CVE-2024-40498.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 835178303, - "name": "CVE-2024-40498", - "full_name": "Dirac231\/CVE-2024-40498", - "owner": { - "login": "Dirac231", - "id": 74907503, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74907503?v=4", - "html_url": "https:\/\/github.com\/Dirac231", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Dirac231\/CVE-2024-40498", - "description": null, - "fork": false, - "created_at": "2024-07-29T10:13:15Z", - "updated_at": "2024-07-29T10:18:44Z", - "pushed_at": "2024-07-29T10:18:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40500.json b/2024/CVE-2024-40500.json deleted file mode 100644 index 5d2e36ceec..0000000000 --- a/2024/CVE-2024-40500.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 839960824, - "name": "CVE-2024-40500", - "full_name": "nitipoom-jar\/CVE-2024-40500", - "owner": { - "login": "nitipoom-jar", - "id": 149907798, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149907798?v=4", - "html_url": "https:\/\/github.com\/nitipoom-jar", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/nitipoom-jar\/CVE-2024-40500", - "description": null, - "fork": false, - "created_at": "2024-08-08T17:12:58Z", - "updated_at": "2024-08-08T17:45:53Z", - "pushed_at": "2024-08-08T17:45:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40506.json b/2024/CVE-2024-40506.json deleted file mode 100644 index cce4b063cf..0000000000 --- a/2024/CVE-2024-40506.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 828350259, - "name": "CVE-2024-40506", - "full_name": "Jansen-C-Moreira\/CVE-2024-40506", - "owner": { - "login": "Jansen-C-Moreira", - "id": 66726884, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66726884?v=4", - "html_url": "https:\/\/github.com\/Jansen-C-Moreira", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Jansen-C-Moreira\/CVE-2024-40506", - "description": "OpenPetra v.2023.02 CVE-2024-40506", - "fork": false, - "created_at": "2024-07-13T21:42:23Z", - "updated_at": "2024-07-13T22:08:39Z", - "pushed_at": "2024-07-13T22:08:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40507.json b/2024/CVE-2024-40507.json deleted file mode 100644 index 7b22b69655..0000000000 --- a/2024/CVE-2024-40507.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 828351831, - "name": "CVE-2024-40507", - "full_name": "Jansen-C-Moreira\/CVE-2024-40507", - "owner": { - "login": "Jansen-C-Moreira", - "id": 66726884, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66726884?v=4", - "html_url": "https:\/\/github.com\/Jansen-C-Moreira", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Jansen-C-Moreira\/CVE-2024-40507", - "description": "OpenPetra v.2023.02 Use CVE-2024-40507", - "fork": false, - "created_at": "2024-07-13T21:50:57Z", - "updated_at": "2024-07-13T22:09:08Z", - "pushed_at": "2024-07-13T22:09:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40508.json b/2024/CVE-2024-40508.json deleted file mode 100644 index f9812e171b..0000000000 --- a/2024/CVE-2024-40508.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 828352382, - "name": "CVE-2024-40508", - "full_name": "Jansen-C-Moreira\/CVE-2024-40508", - "owner": { - "login": "Jansen-C-Moreira", - "id": 66726884, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66726884?v=4", - "html_url": "https:\/\/github.com\/Jansen-C-Moreira", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Jansen-C-Moreira\/CVE-2024-40508", - "description": "OpenPetra v.2023.02 CVE-2024-40508", - "fork": false, - "created_at": "2024-07-13T21:54:07Z", - "updated_at": "2024-07-13T21:58:51Z", - "pushed_at": "2024-07-13T21:58:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40509.json b/2024/CVE-2024-40509.json deleted file mode 100644 index 2313fd6da1..0000000000 --- a/2024/CVE-2024-40509.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 828353646, - "name": "CVE-2024-40509", - "full_name": "Jansen-C-Moreira\/CVE-2024-40509", - "owner": { - "login": "Jansen-C-Moreira", - "id": 66726884, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66726884?v=4", - "html_url": "https:\/\/github.com\/Jansen-C-Moreira", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Jansen-C-Moreira\/CVE-2024-40509", - "description": "OpenPetra v.2023.02 CVE-2024-40509", - "fork": false, - "created_at": "2024-07-13T22:01:39Z", - "updated_at": "2024-07-13T22:02:57Z", - "pushed_at": "2024-07-13T22:02:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40510.json b/2024/CVE-2024-40510.json deleted file mode 100644 index e4117e94c2..0000000000 --- a/2024/CVE-2024-40510.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 828353896, - "name": "CVE-2024-40510", - "full_name": "Jansen-C-Moreira\/CVE-2024-40510", - "owner": { - "login": "Jansen-C-Moreira", - "id": 66726884, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66726884?v=4", - "html_url": "https:\/\/github.com\/Jansen-C-Moreira", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Jansen-C-Moreira\/CVE-2024-40510", - "description": "OpenPetra v.2023.02 CVE-2024-40510", - "fork": false, - "created_at": "2024-07-13T22:03:17Z", - "updated_at": "2024-07-13T22:04:37Z", - "pushed_at": "2024-07-13T22:04:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40511.json b/2024/CVE-2024-40511.json deleted file mode 100644 index b54092ec86..0000000000 --- a/2024/CVE-2024-40511.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 828354193, - "name": "CVE-2024-40511", - "full_name": "Jansen-C-Moreira\/CVE-2024-40511", - "owner": { - "login": "Jansen-C-Moreira", - "id": 66726884, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66726884?v=4", - "html_url": "https:\/\/github.com\/Jansen-C-Moreira", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Jansen-C-Moreira\/CVE-2024-40511", - "description": "OpenPetra v.2023.02 CVE-2024-40511", - "fork": false, - "created_at": "2024-07-13T22:04:53Z", - "updated_at": "2024-07-13T22:05:49Z", - "pushed_at": "2024-07-13T22:05:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40512.json b/2024/CVE-2024-40512.json deleted file mode 100644 index 786cffacce..0000000000 --- a/2024/CVE-2024-40512.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 828354452, - "name": "CVE-2024-40512", - "full_name": "Jansen-C-Moreira\/CVE-2024-40512", - "owner": { - "login": "Jansen-C-Moreira", - "id": 66726884, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66726884?v=4", - "html_url": "https:\/\/github.com\/Jansen-C-Moreira", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Jansen-C-Moreira\/CVE-2024-40512", - "description": "OpenPetra v.2023.02 CVE-2024-40512", - "fork": false, - "created_at": "2024-07-13T22:06:16Z", - "updated_at": "2024-07-13T22:07:10Z", - "pushed_at": "2024-07-13T22:07:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40617.json b/2024/CVE-2024-40617.json deleted file mode 100644 index 43845367dc..0000000000 --- a/2024/CVE-2024-40617.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 835716921, - "name": "CVE-2024-40617", - "full_name": "KyssK00L\/CVE-2024-40617", - "owner": { - "login": "KyssK00L", - "id": 6824863, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6824863?v=4", - "html_url": "https:\/\/github.com\/KyssK00L", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/KyssK00L\/CVE-2024-40617", - "description": "CVE-2024-40617 Exploit PoC", - "fork": false, - "created_at": "2024-07-30T11:50:45Z", - "updated_at": "2024-08-04T11:23:43Z", - "pushed_at": "2024-07-30T14:43:14Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 6, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40662.json b/2024/CVE-2024-40662.json deleted file mode 100644 index 278e59c527..0000000000 --- a/2024/CVE-2024-40662.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 874208395, - "name": "net_G2.5_CVE-2024-40662", - "full_name": "Aakashmom\/net_G2.5_CVE-2024-40662", - "owner": { - "login": "Aakashmom", - "id": 76400693, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76400693?v=4", - "html_url": "https:\/\/github.com\/Aakashmom", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Aakashmom\/net_G2.5_CVE-2024-40662", - "description": null, - "fork": false, - "created_at": "2024-10-17T12:39:21Z", - "updated_at": "2025-01-11T22:27:04Z", - "pushed_at": "2024-10-17T12:40:42Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 1, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40673.json b/2024/CVE-2024-40673.json deleted file mode 100644 index dac3c0165f..0000000000 --- a/2024/CVE-2024-40673.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 874201744, - "name": "G3_libcore_native_CVE-2024-40673", - "full_name": "Aakashmom\/G3_libcore_native_CVE-2024-40673", - "owner": { - "login": "Aakashmom", - "id": 76400693, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76400693?v=4", - "html_url": "https:\/\/github.com\/Aakashmom", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Aakashmom\/G3_libcore_native_CVE-2024-40673", - "description": null, - "fork": false, - "created_at": "2024-10-17T12:26:24Z", - "updated_at": "2024-10-17T12:28:06Z", - "pushed_at": "2024-10-17T12:28:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40675.json b/2024/CVE-2024-40675.json deleted file mode 100644 index 73aeeea7f0..0000000000 --- a/2024/CVE-2024-40675.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 874181651, - "name": "intent_CVE-2024-40675", - "full_name": "Aakashmom\/intent_CVE-2024-40675", - "owner": { - "login": "Aakashmom", - "id": 76400693, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76400693?v=4", - "html_url": "https:\/\/github.com\/Aakashmom", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Aakashmom\/intent_CVE-2024-40675", - "description": null, - "fork": false, - "created_at": "2024-10-17T11:46:29Z", - "updated_at": "2024-10-17T11:47:50Z", - "pushed_at": "2024-10-17T11:47:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40676.json b/2024/CVE-2024-40676.json deleted file mode 100644 index bebf83fbd5..0000000000 --- a/2024/CVE-2024-40676.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 874173855, - "name": "frameworks_base_accounts_CVE-2024-40676", - "full_name": "Aakashmom\/frameworks_base_accounts_CVE-2024-40676", - "owner": { - "login": "Aakashmom", - "id": 76400693, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76400693?v=4", - "html_url": "https:\/\/github.com\/Aakashmom", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Aakashmom\/frameworks_base_accounts_CVE-2024-40676", - "description": null, - "fork": false, - "created_at": "2024-10-17T11:29:33Z", - "updated_at": "2024-10-17T11:33:08Z", - "pushed_at": "2024-10-17T11:33:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 874178814, - "name": "accounts_CVE-2024-40676-", - "full_name": "Aakashmom\/accounts_CVE-2024-40676-", - "owner": { - "login": "Aakashmom", - "id": 76400693, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76400693?v=4", - "html_url": "https:\/\/github.com\/Aakashmom", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Aakashmom\/accounts_CVE-2024-40676-", - "description": null, - "fork": false, - "created_at": "2024-10-17T11:40:21Z", - "updated_at": "2024-10-28T05:12:15Z", - "pushed_at": "2024-10-17T11:42:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-40711.json b/2024/CVE-2024-40711.json index 466f2401eb..1287ed1cd8 100644 --- a/2024/CVE-2024-40711.json +++ b/2024/CVE-2024-40711.json @@ -29,67 +29,5 @@ "watchers": 38, "score": 0, "subscribers_count": 0 - }, - { - "id": 873392498, - "name": "CVE-2024-40711-Exp", - "full_name": "realstatus\/CVE-2024-40711-Exp", - "owner": { - "login": "realstatus", - "id": 41789399, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41789399?v=4", - "html_url": "https:\/\/github.com\/realstatus", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/realstatus\/CVE-2024-40711-Exp", - "description": "CVE-2024-40711-exp", - "fork": false, - "created_at": "2024-10-16T05:02:27Z", - "updated_at": "2025-01-13T13:24:01Z", - "pushed_at": "2024-10-17T01:06:42Z", - "stargazers_count": 38, - "watchers_count": 38, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 6, - "watchers": 38, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 892922773, - "name": "cve-2024-40711-poc", - "full_name": "XiaomingX\/cve-2024-40711-poc", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-40711-poc", - "description": "CVE-2024-40711 是 Veeam Backup & Replication 软件中的一个严重漏洞,允许未经身份验证的攻击者远程执行代码。 ", - "fork": false, - "created_at": "2024-11-23T04:02:34Z", - "updated_at": "2025-01-13T18:17:28Z", - "pushed_at": "2024-11-23T04:02:59Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-40725.json b/2024/CVE-2024-40725.json deleted file mode 100644 index a70719f3dd..0000000000 --- a/2024/CVE-2024-40725.json +++ /dev/null @@ -1,95 +0,0 @@ -[ - { - "id": 830811519, - "name": "CVE-2024-40725-CVE-2024-40898", - "full_name": "TAM-K592\/CVE-2024-40725-CVE-2024-40898", - "owner": { - "login": "TAM-K592", - "id": 8276702, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8276702?v=4", - "html_url": "https:\/\/github.com\/TAM-K592", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/TAM-K592\/CVE-2024-40725-CVE-2024-40898", - "description": "CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web servers worldwide, potentially leading to source code disclosure and server-side request forgery (SSRF) attacks.", - "fork": false, - "created_at": "2024-07-19T03:51:54Z", - "updated_at": "2025-01-02T11:16:44Z", - "pushed_at": "2024-07-19T04:01:13Z", - "stargazers_count": 69, - "watchers_count": 69, - "has_discussions": false, - "forks_count": 14, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 14, - "watchers": 69, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 886594059, - "name": "CVE-2024-40725-CVE-2024-40898", - "full_name": "whiterose7777\/CVE-2024-40725-CVE-2024-40898", - "owner": { - "login": "whiterose7777", - "id": 174041119, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174041119?v=4", - "html_url": "https:\/\/github.com\/whiterose7777", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/whiterose7777\/CVE-2024-40725-CVE-2024-40898", - "description": null, - "fork": false, - "created_at": "2024-11-11T09:00:22Z", - "updated_at": "2024-11-12T08:52:37Z", - "pushed_at": "2024-11-11T09:01:01Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 905309278, - "name": "CVE-2024-40725", - "full_name": "soltanali0\/CVE-2024-40725", - "owner": { - "login": "soltanali0", - "id": 87374678, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87374678?v=4", - "html_url": "https:\/\/github.com\/soltanali0", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/soltanali0\/CVE-2024-40725", - "description": "exploit CVE-2024-40725 (Apache httpd) with ", - "fork": false, - "created_at": "2024-12-18T15:09:38Z", - "updated_at": "2024-12-22T22:56:07Z", - "pushed_at": "2024-12-18T15:12:31Z", - "stargazers_count": 9, - "watchers_count": 9, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 9, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-41107.json b/2024/CVE-2024-41107.json deleted file mode 100644 index 5696a35c76..0000000000 --- a/2024/CVE-2024-41107.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 832571304, - "name": "CVE-2024-41107", - "full_name": "d0rb\/CVE-2024-41107", - "owner": { - "login": "d0rb", - "id": 10403781, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4", - "html_url": "https:\/\/github.com\/d0rb", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/d0rb\/CVE-2024-41107", - "description": "This repository contains an PoC for the critical vulnerability identified as CVE-2024-41107 in Apache CloudStack", - "fork": false, - "created_at": "2024-07-23T09:39:42Z", - "updated_at": "2024-11-20T16:30:58Z", - "pushed_at": "2024-07-25T13:06:33Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 5, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 5, - "watchers": 7, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-41110.json b/2024/CVE-2024-41110.json deleted file mode 100644 index 25f1ad995a..0000000000 --- a/2024/CVE-2024-41110.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 833515840, - "name": "cve-2024-41110-checker", - "full_name": "vvpoglazov\/cve-2024-41110-checker", - "owner": { - "login": "vvpoglazov", - "id": 123960062, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123960062?v=4", - "html_url": "https:\/\/github.com\/vvpoglazov", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/vvpoglazov\/cve-2024-41110-checker", - "description": null, - "fork": false, - "created_at": "2024-07-25T08:03:15Z", - "updated_at": "2024-10-03T12:52:43Z", - "pushed_at": "2024-07-25T09:34:33Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 5, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 834245223, - "name": "CVE-2024-41110-SCAN", - "full_name": "PauloParoPP\/CVE-2024-41110-SCAN", - "owner": { - "login": "PauloParoPP", - "id": 51863323, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51863323?v=4", - "html_url": "https:\/\/github.com\/PauloParoPP", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/PauloParoPP\/CVE-2024-41110-SCAN", - "description": null, - "fork": false, - "created_at": "2024-07-26T18:41:42Z", - "updated_at": "2024-07-26T19:21:26Z", - "pushed_at": "2024-07-26T19:21:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-41276.json b/2024/CVE-2024-41276.json deleted file mode 100644 index 7f762bf720..0000000000 --- a/2024/CVE-2024-41276.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 825691437, - "name": "CVE-2024-41276", - "full_name": "artemy-ccrsky\/CVE-2024-41276", - "owner": { - "login": "artemy-ccrsky", - "id": 33719402, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33719402?v=4", - "html_url": "https:\/\/github.com\/artemy-ccrsky", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/artemy-ccrsky\/CVE-2024-41276", - "description": null, - "fork": false, - "created_at": "2024-07-08T10:21:34Z", - "updated_at": "2024-12-05T10:52:07Z", - "pushed_at": "2024-07-31T19:24:38Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-41290.json b/2024/CVE-2024-41290.json deleted file mode 100644 index 5df5428d48..0000000000 --- a/2024/CVE-2024-41290.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 866035036, - "name": "CVE-2024-41290", - "full_name": "paragbagul111\/CVE-2024-41290", - "owner": { - "login": "paragbagul111", - "id": 68190427, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68190427?v=4", - "html_url": "https:\/\/github.com\/paragbagul111", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/paragbagul111\/CVE-2024-41290", - "description": "FlatPress CMS v1.3.1 1.3 was discovered to use insecure methods to > store authentication data", - "fork": false, - "created_at": "2024-10-01T14:35:39Z", - "updated_at": "2024-10-01T14:40:00Z", - "pushed_at": "2024-10-01T14:39:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-41301.json b/2024/CVE-2024-41301.json deleted file mode 100644 index 4fb66e1996..0000000000 --- a/2024/CVE-2024-41301.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 828534593, - "name": "CVE-2024-41301-Bookea-tu-Mesa-is-vulnerable-to-Stored-Cross-Site-Scripting", - "full_name": "patrickdeanramos\/CVE-2024-41301-Bookea-tu-Mesa-is-vulnerable-to-Stored-Cross-Site-Scripting", - "owner": { - "login": "patrickdeanramos", - "id": 17971824, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17971824?v=4", - "html_url": "https:\/\/github.com\/patrickdeanramos", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/patrickdeanramos\/CVE-2024-41301-Bookea-tu-Mesa-is-vulnerable-to-Stored-Cross-Site-Scripting", - "description": null, - "fork": false, - "created_at": "2024-07-14T12:51:17Z", - "updated_at": "2024-07-30T22:51:54Z", - "pushed_at": "2024-07-30T22:51:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-41302.json b/2024/CVE-2024-41302.json deleted file mode 100644 index 2956912c18..0000000000 --- a/2024/CVE-2024-41302.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 828537636, - "name": "CVE-2024-41302-Bookea-tu-Mesa-is-vulnerable-to-SQL-Injection", - "full_name": "patrickdeanramos\/CVE-2024-41302-Bookea-tu-Mesa-is-vulnerable-to-SQL-Injection", - "owner": { - "login": "patrickdeanramos", - "id": 17971824, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17971824?v=4", - "html_url": "https:\/\/github.com\/patrickdeanramos", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/patrickdeanramos\/CVE-2024-41302-Bookea-tu-Mesa-is-vulnerable-to-SQL-Injection", - "description": "Bookea-tu-Mesa is vulnerable to SQL Injection", - "fork": false, - "created_at": "2024-07-14T13:01:36Z", - "updated_at": "2024-07-30T22:53:28Z", - "pushed_at": "2024-07-30T22:53:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-41319.json b/2024/CVE-2024-41319.json deleted file mode 100644 index a5a5943707..0000000000 --- a/2024/CVE-2024-41319.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 906156712, - "name": "TOTOLINK_poc", - "full_name": "NingXin2002\/TOTOLINK_poc", - "owner": { - "login": "NingXin2002", - "id": 138864342, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138864342?v=4", - "html_url": "https:\/\/github.com\/NingXin2002", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/NingXin2002\/TOTOLINK_poc", - "description": "TOTOLINK A6000R 命令执行漏洞(CVE-2024-41319)", - "fork": false, - "created_at": "2024-12-20T09:31:58Z", - "updated_at": "2024-12-26T16:20:35Z", - "pushed_at": "2024-12-20T09:35:47Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-41628.json b/2024/CVE-2024-41628.json deleted file mode 100644 index ba2d4fecd8..0000000000 --- a/2024/CVE-2024-41628.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 835107342, - "name": "CVE-2024-41628", - "full_name": "Redshift-CyberSecurity\/CVE-2024-41628", - "owner": { - "login": "Redshift-CyberSecurity", - "id": 64486752, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64486752?v=4", - "html_url": "https:\/\/github.com\/Redshift-CyberSecurity", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Redshift-CyberSecurity\/CVE-2024-41628", - "description": null, - "fork": false, - "created_at": "2024-07-29T07:12:14Z", - "updated_at": "2024-11-20T16:30:59Z", - "pushed_at": "2024-07-29T13:04:42Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-41640.json b/2024/CVE-2024-41640.json deleted file mode 100644 index c158568e89..0000000000 --- a/2024/CVE-2024-41640.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 829873539, - "name": "CVE-2024-41640", - "full_name": "alemusix\/CVE-2024-41640", - "owner": { - "login": "alemusix", - "id": 15678800, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15678800?v=4", - "html_url": "https:\/\/github.com\/alemusix", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/alemusix\/CVE-2024-41640", - "description": null, - "fork": false, - "created_at": "2024-07-17T07:00:31Z", - "updated_at": "2024-07-27T09:41:00Z", - "pushed_at": "2024-07-17T07:57:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-41651.json b/2024/CVE-2024-41651.json deleted file mode 100644 index 826d8ced2b..0000000000 --- a/2024/CVE-2024-41651.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 839965855, - "name": "CVE-2024-41651", - "full_name": "Fckroun\/CVE-2024-41651", - "owner": { - "login": "Fckroun", - "id": 69816382, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69816382?v=4", - "html_url": "https:\/\/github.com\/Fckroun", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Fckroun\/CVE-2024-41651", - "description": "CVE-2024-41651", - "fork": false, - "created_at": "2024-08-08T17:25:30Z", - "updated_at": "2024-08-08T17:26:30Z", - "pushed_at": "2024-08-08T17:26:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-41662.json b/2024/CVE-2024-41662.json deleted file mode 100644 index df0710d487..0000000000 --- a/2024/CVE-2024-41662.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 832765785, - "name": "CVE-2024-41662", - "full_name": "sh3bu\/CVE-2024-41662", - "owner": { - "login": "sh3bu", - "id": 67383098, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67383098?v=4", - "html_url": "https:\/\/github.com\/sh3bu", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/sh3bu\/CVE-2024-41662", - "description": "Markdown XSS leads to RCE in VNote version <=3.18.1", - "fork": false, - "created_at": "2024-07-23T17:21:12Z", - "updated_at": "2024-12-29T16:45:04Z", - "pushed_at": "2024-07-24T18:39:22Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-41713.json b/2024/CVE-2024-41713.json deleted file mode 100644 index 5c5d606796..0000000000 --- a/2024/CVE-2024-41713.json +++ /dev/null @@ -1,126 +0,0 @@ -[ - { - "id": 898839903, - "name": "Mitel-MiCollab-Auth-Bypass_CVE-2024-41713", - "full_name": "watchtowrlabs\/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713", - "owner": { - "login": "watchtowrlabs", - "id": 99977116, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99977116?v=4", - "html_url": "https:\/\/github.com\/watchtowrlabs", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/watchtowrlabs\/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713", - "description": null, - "fork": false, - "created_at": "2024-12-05T06:13:57Z", - "updated_at": "2025-01-13T07:40:10Z", - "pushed_at": "2024-12-05T07:55:04Z", - "stargazers_count": 15, - "watchers_count": 15, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 6, - "watchers": 15, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 906475087, - "name": "CVE-2024-41713POC", - "full_name": "zxj-hub\/CVE-2024-41713POC", - "owner": { - "login": "zxj-hub", - "id": 192207002, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192207002?v=4", - "html_url": "https:\/\/github.com\/zxj-hub", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/zxj-hub\/CVE-2024-41713POC", - "description": "Mitel MiCollab 企业协作平台 任意文件读取漏洞(CVE-2024-41713)由于Mitel MiCollab软件的 NuPoint 统一消息 (NPM) 组件中存在身份验证绕过漏洞,并且输入验证不足,未经身份验证的远程攻击者可利用该漏洞执行路径遍历攻击,成功利用可能导致未授权访问、破坏或删除用户的数据和系统配置。影响范围:version < MiCollab 9.8 SP2 (9.8.2.12)", - "fork": false, - "created_at": "2024-12-21T02:26:26Z", - "updated_at": "2024-12-21T02:28:26Z", - "pushed_at": "2024-12-21T02:28:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 906575821, - "name": "cve-2024-CVE-2024-41713", - "full_name": "Sanandd\/cve-2024-CVE-2024-41713", - "owner": { - "login": "Sanandd", - "id": 192220387, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192220387?v=4", - "html_url": "https:\/\/github.com\/Sanandd", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Sanandd\/cve-2024-CVE-2024-41713", - "description": "cve-2024-CVE-2024-41713", - "fork": false, - "created_at": "2024-12-21T09:35:12Z", - "updated_at": "2024-12-21T09:36:20Z", - "pushed_at": "2024-12-21T09:36:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 915117254, - "name": "CVE-2024-41713-Scan", - "full_name": "amanverma-wsu\/CVE-2024-41713-Scan", - "owner": { - "login": "amanverma-wsu", - "id": 146479253, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146479253?v=4", - "html_url": "https:\/\/github.com\/amanverma-wsu", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/amanverma-wsu\/CVE-2024-41713-Scan", - "description": "A Python script to detect CVE-2024-41713, a directory traversal vulnerability in Apache HTTP Server, enabling unauthorized access to restricted resources. This tool is for educational purposes and authorized testing only. Unauthorized usage is unethical and illegal.", - "fork": false, - "created_at": "2025-01-11T02:39:36Z", - "updated_at": "2025-01-11T02:46:25Z", - "pushed_at": "2025-01-11T02:46:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-41958.json b/2024/CVE-2024-41958.json deleted file mode 100644 index c0b5863e4a..0000000000 --- a/2024/CVE-2024-41958.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 838500653, - "name": "CVE-2024-41958-PoC", - "full_name": "OrangeJuiceHU\/CVE-2024-41958-PoC", - "owner": { - "login": "OrangeJuiceHU", - "id": 30298257, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30298257?v=4", - "html_url": "https:\/\/github.com\/OrangeJuiceHU", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/OrangeJuiceHU\/CVE-2024-41958-PoC", - "description": "This is a small proof of concept for CVE-2024-41958", - "fork": false, - "created_at": "2024-08-05T19:10:08Z", - "updated_at": "2024-08-29T13:31:15Z", - "pushed_at": "2024-08-05T20:22:52Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-4232.json b/2024/CVE-2024-4232.json index 60fba1863f..105130708d 100644 --- a/2024/CVE-2024-4232.json +++ b/2024/CVE-2024-4232.json @@ -29,36 +29,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 823986903, - "name": "Digisol-DG--GR1321-s-Password-Storage-in-Plaintext--CVE-2024-4232", - "full_name": "Redfox-Secuirty\/Digisol-DG--GR1321-s-Password-Storage-in-Plaintext--CVE-2024-4232", - "owner": { - "login": "Redfox-Secuirty", - "id": 173128884, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173128884?v=4", - "html_url": "https:\/\/github.com\/Redfox-Secuirty", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Redfox-Secuirty\/Digisol-DG--GR1321-s-Password-Storage-in-Plaintext--CVE-2024-4232", - "description": null, - "fork": false, - "created_at": "2024-07-04T06:30:19Z", - "updated_at": "2024-07-04T06:30:22Z", - "pushed_at": "2024-07-04T06:30:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-42327.json b/2024/CVE-2024-42327.json deleted file mode 100644 index bda4bf6c11..0000000000 --- a/2024/CVE-2024-42327.json +++ /dev/null @@ -1,219 +0,0 @@ -[ - { - "id": 896657083, - "name": "cve-2024-42327", - "full_name": "aramosf\/cve-2024-42327", - "owner": { - "login": "aramosf", - "id": 3511842, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3511842?v=4", - "html_url": "https:\/\/github.com\/aramosf", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/aramosf\/cve-2024-42327", - "description": "cve-2024-42327 ZBX-25623", - "fork": false, - "created_at": "2024-12-01T00:15:27Z", - "updated_at": "2025-01-06T08:25:25Z", - "pushed_at": "2024-12-01T01:18:36Z", - "stargazers_count": 29, - "watchers_count": 29, - "has_discussions": false, - "forks_count": 14, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 14, - "watchers": 29, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 897899835, - "name": "CVE-2024-42327", - "full_name": "compr00t\/CVE-2024-42327", - "owner": { - "login": "compr00t", - "id": 11025516, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11025516?v=4", - "html_url": "https:\/\/github.com\/compr00t", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/compr00t\/CVE-2024-42327", - "description": "PoC for CVE-2024-42327 \/ ZBX-25623", - "fork": false, - "created_at": "2024-12-03T12:44:07Z", - "updated_at": "2024-12-26T01:27:56Z", - "pushed_at": "2024-12-03T12:56:52Z", - "stargazers_count": 17, - "watchers_count": 17, - "has_discussions": false, - "forks_count": 7, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 7, - "watchers": 17, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 899606694, - "name": "CVE-2024-42327", - "full_name": "depers-rus\/CVE-2024-42327", - "owner": { - "login": "depers-rus", - "id": 173357545, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173357545?v=4", - "html_url": "https:\/\/github.com\/depers-rus", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/depers-rus\/CVE-2024-42327", - "description": null, - "fork": false, - "created_at": "2024-12-06T16:06:00Z", - "updated_at": "2024-12-11T02:16:10Z", - "pushed_at": "2024-12-06T18:56:49Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 900099379, - "name": "CVE-2024-42327_Zabbix_SQLI", - "full_name": "watchdog1337\/CVE-2024-42327_Zabbix_SQLI", - "owner": { - "login": "watchdog1337", - "id": 63520692, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63520692?v=4", - "html_url": "https:\/\/github.com\/watchdog1337", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/watchdog1337\/CVE-2024-42327_Zabbix_SQLI", - "description": "POC for CVE-2024-42327, an authenticated SQL Injection in Zabbix through the user.get API Method", - "fork": false, - "created_at": "2024-12-07T21:25:40Z", - "updated_at": "2024-12-12T22:27:55Z", - "pushed_at": "2024-12-08T12:27:53Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 901596404, - "name": "Zabbix---CVE-2024-42327", - "full_name": "itform-fr\/Zabbix---CVE-2024-42327", - "owner": { - "login": "itform-fr", - "id": 131718750, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131718750?v=4", - "html_url": "https:\/\/github.com\/itform-fr", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/itform-fr\/Zabbix---CVE-2024-42327", - "description": null, - "fork": false, - "created_at": "2024-12-11T00:39:26Z", - "updated_at": "2024-12-12T16:27:33Z", - "pushed_at": "2024-12-11T00:46:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 902138431, - "name": "CVE-2024-42327", - "full_name": "igorbf495\/CVE-2024-42327", - "owner": { - "login": "igorbf495", - "id": 113364443, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113364443?v=4", - "html_url": "https:\/\/github.com\/igorbf495", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/igorbf495\/CVE-2024-42327", - "description": "writeup cve-2024-42327", - "fork": false, - "created_at": "2024-12-12T01:32:26Z", - "updated_at": "2024-12-12T19:21:47Z", - "pushed_at": "2024-12-12T19:21:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 910901711, - "name": "Zabbix-CVE-2024-42327-SQL-Injection-RCE", - "full_name": "BridgerAlderson\/Zabbix-CVE-2024-42327-SQL-Injection-RCE", - "owner": { - "login": "BridgerAlderson", - "id": 139403792, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139403792?v=4", - "html_url": "https:\/\/github.com\/BridgerAlderson", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/BridgerAlderson\/Zabbix-CVE-2024-42327-SQL-Injection-RCE", - "description": "Zabbix CVE-2024-42327 PoC", - "fork": false, - "created_at": "2025-01-01T18:25:44Z", - "updated_at": "2025-01-10T14:41:19Z", - "pushed_at": "2025-01-03T13:49:03Z", - "stargazers_count": 35, - "watchers_count": 35, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 35, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-42346.json b/2024/CVE-2024-42346.json deleted file mode 100644 index 221f9307fd..0000000000 --- a/2024/CVE-2024-42346.json +++ /dev/null @@ -1,36 +0,0 @@ -[ - { - "id": 890535432, - "name": "CVE-2024-42346", - "full_name": "partywavesec\/CVE-2024-42346", - "owner": { - "login": "partywavesec", - "id": 98420665, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98420665?v=4", - "html_url": "https:\/\/github.com\/partywavesec", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/partywavesec\/CVE-2024-42346", - "description": "CVE-2024-42346 POC", - "fork": false, - "created_at": "2024-11-18T18:31:03Z", - "updated_at": "2024-12-30T23:20:30Z", - "pushed_at": "2024-11-18T18:32:12Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-42346", - "security" - ], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-42448.json b/2024/CVE-2024-42448.json deleted file mode 100644 index 9555ae1dc5..0000000000 --- a/2024/CVE-2024-42448.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 899013762, - "name": "CVE-2024-42448-RCE", - "full_name": "h3lye\/CVE-2024-42448-RCE", - "owner": { - "login": "h3lye", - "id": 190727577, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/190727577?v=4", - "html_url": "https:\/\/github.com\/h3lye", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/h3lye\/CVE-2024-42448-RCE", - "description": "Veeam Service Provider Console (VSPC) remote code execution.", - "fork": false, - "created_at": "2024-12-05T13:12:44Z", - "updated_at": "2025-01-11T08:18:06Z", - "pushed_at": "2024-12-05T13:24:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-42461.json b/2024/CVE-2024-42461.json deleted file mode 100644 index 6a5e10cab5..0000000000 --- a/2024/CVE-2024-42461.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 839055208, - "name": "CVE-2024-42461", - "full_name": "fevar54\/CVE-2024-42461", - "owner": { - "login": "fevar54", - "id": 80516843, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80516843?v=4", - "html_url": "https:\/\/github.com\/fevar54", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/fevar54\/CVE-2024-42461", - "description": "Se han identificado problemas en la verificación de firmas ECDSA y EDDSA en el proyecto Wycheproof. Las comprobaciones ausentes durante la etapa de decodificación de firmas permiten agregar o eliminar bytes cero, lo que afecta la capacidad de envío de correos. ", - "fork": false, - "created_at": "2024-08-06T21:56:15Z", - "updated_at": "2024-08-06T22:19:23Z", - "pushed_at": "2024-08-06T22:19:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-42640.json b/2024/CVE-2024-42640.json deleted file mode 100644 index fb3e1e1f31..0000000000 --- a/2024/CVE-2024-42640.json +++ /dev/null @@ -1,69 +0,0 @@ -[ - { - "id": 870154624, - "name": "CVE-2024-42640", - "full_name": "rvizx\/CVE-2024-42640", - "owner": { - "login": "rvizx", - "id": 84989569, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84989569?v=4", - "html_url": "https:\/\/github.com\/rvizx", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/rvizx\/CVE-2024-42640", - "description": "Unauthenticated Remote Code Execution via Angular-Base64-Upload Library ", - "fork": false, - "created_at": "2024-10-09T14:35:06Z", - "updated_at": "2024-12-11T06:12:17Z", - "pushed_at": "2024-10-18T15:10:13Z", - "stargazers_count": 26, - "watchers_count": 26, - "has_discussions": false, - "forks_count": 16, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "angular-base64-upload", - "cve-2024-42640", - "exploit", - "poc-exploit" - ], - "visibility": "public", - "forks": 16, - "watchers": 26, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 891216922, - "name": "CVE-2024-42640", - "full_name": "KTN1990\/CVE-2024-42640", - "owner": { - "login": "KTN1990", - "id": 33407405, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33407405?v=4", - "html_url": "https:\/\/github.com\/KTN1990", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/KTN1990\/CVE-2024-42640", - "description": "Unauthenticated Remote Code Execution via Angular-Base64-Upload Library (npm:bower)", - "fork": false, - "created_at": "2024-11-19T23:54:30Z", - "updated_at": "2024-11-21T03:18:25Z", - "pushed_at": "2024-11-20T22:15:11Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-42845.json b/2024/CVE-2024-42845.json index d5de52f2b5..9fa4ef98f3 100644 --- a/2024/CVE-2024-42845.json +++ b/2024/CVE-2024-42845.json @@ -33,36 +33,5 @@ "watchers": 2, "score": 0, "subscribers_count": 1 - }, - { - "id": 915025370, - "name": "CVE-2024-42845-Exploit", - "full_name": "theexploiters\/CVE-2024-42845-Exploit", - "owner": { - "login": "theexploiters", - "id": 185040501, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/185040501?v=4", - "html_url": "https:\/\/github.com\/theexploiters", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/theexploiters\/CVE-2024-42845-Exploit", - "description": "Exploit For: CVE-2024-42845: Remote Code Execution (RCE) in Invesalius 3.1", - "fork": false, - "created_at": "2025-01-10T20:00:26Z", - "updated_at": "2025-01-12T21:19:18Z", - "pushed_at": "2025-01-10T20:01:54Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-43044.json b/2024/CVE-2024-43044.json index 69fd558a43..aff0fa0d94 100644 --- a/2024/CVE-2024-43044.json +++ b/2024/CVE-2024-43044.json @@ -1,101 +1,4 @@ [ - { - "id": 839739992, - "name": "CVE-2024-43044", - "full_name": "HwMex0\/CVE-2024-43044", - "owner": { - "login": "HwMex0", - "id": 102358575, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102358575?v=4", - "html_url": "https:\/\/github.com\/HwMex0", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/HwMex0\/CVE-2024-43044", - "description": "The script checks Jenkins endpoints for CVE-2024-43044 by retrieving the Jenkins version from the innstance and comparing it against known vulnerable version ranges.", - "fork": false, - "created_at": "2024-08-08T08:28:26Z", - "updated_at": "2025-01-10T03:42:32Z", - "pushed_at": "2024-08-08T09:32:00Z", - "stargazers_count": 15, - "watchers_count": 15, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-43044", - "detection", - "jenkins" - ], - "visibility": "public", - "forks": 6, - "watchers": 15, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 839823974, - "name": "SECURITY-3430", - "full_name": "jenkinsci-cert\/SECURITY-3430", - "owner": { - "login": "jenkinsci-cert", - "id": 9285726, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9285726?v=4", - "html_url": "https:\/\/github.com\/jenkinsci-cert", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/jenkinsci-cert\/SECURITY-3430", - "description": "This repository provides a workaround preventing exploitation of SECURITY-3430 \/ CVE-2024-43044", - "fork": false, - "created_at": "2024-08-08T11:55:32Z", - "updated_at": "2024-09-23T00:29:13Z", - "pushed_at": "2024-08-12T17:19:25Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 3 - }, - { - "id": 841861299, - "name": "CVE-2024-43044-POC", - "full_name": "v9d0g\/CVE-2024-43044-POC", - "owner": { - "login": "v9d0g", - "id": 139420834, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139420834?v=4", - "html_url": "https:\/\/github.com\/v9d0g", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/v9d0g\/CVE-2024-43044-POC", - "description": "CVE-2024-43044的利用方式", - "fork": false, - "created_at": "2024-08-13T07:32:35Z", - "updated_at": "2024-12-29T18:49:35Z", - "pushed_at": "2024-08-13T07:43:22Z", - "stargazers_count": 17, - "watchers_count": 17, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 17, - "score": 0, - "subscribers_count": 1 - }, { "id": 846725221, "name": "CVE-2024-43044-jenkins", @@ -126,36 +29,5 @@ "watchers": 167, "score": 0, "subscribers_count": 3 - }, - { - "id": 915777608, - "name": "CVE-2024-43044-jenkins-creds", - "full_name": "DACC4\/CVE-2024-43044-jenkins-creds", - "owner": { - "login": "DACC4", - "id": 46499354, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46499354?v=4", - "html_url": "https:\/\/github.com\/DACC4", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/DACC4\/CVE-2024-43044-jenkins-creds", - "description": null, - "fork": false, - "created_at": "2025-01-12T19:16:31Z", - "updated_at": "2025-01-12T19:17:01Z", - "pushed_at": "2025-01-12T19:16:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-43363.json b/2024/CVE-2024-43363.json deleted file mode 100644 index 8861affbf8..0000000000 --- a/2024/CVE-2024-43363.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 869211393, - "name": "CVE-2024-43363", - "full_name": "p33d\/CVE-2024-43363", - "owner": { - "login": "p33d", - "id": 123099747, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123099747?v=4", - "html_url": "https:\/\/github.com\/p33d", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/p33d\/CVE-2024-43363", - "description": null, - "fork": false, - "created_at": "2024-10-07T22:59:09Z", - "updated_at": "2025-01-07T12:51:28Z", - "pushed_at": "2024-10-07T22:59:53Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-43416.json b/2024/CVE-2024-43416.json deleted file mode 100644 index dc85e7557d..0000000000 --- a/2024/CVE-2024-43416.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 890570505, - "name": "CVE-2024-43416-PoC", - "full_name": "0xmupa\/CVE-2024-43416-PoC", - "owner": { - "login": "0xmupa", - "id": 61334200, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61334200?v=4", - "html_url": "https:\/\/github.com\/0xmupa", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/0xmupa\/CVE-2024-43416-PoC", - "description": null, - "fork": false, - "created_at": "2024-11-18T19:58:42Z", - "updated_at": "2024-11-18T19:59:37Z", - "pushed_at": "2024-11-18T19:59:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-4351.json b/2024/CVE-2024-4351.json deleted file mode 100644 index a8e5c07ed6..0000000000 --- a/2024/CVE-2024-4351.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 890044743, - "name": "CVE-2024-4351", - "full_name": "ZSECURE\/CVE-2024-4351", - "owner": { - "login": "ZSECURE", - "id": 46941177, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46941177?v=4", - "html_url": "https:\/\/github.com\/ZSECURE", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ZSECURE\/CVE-2024-4351", - "description": null, - "fork": false, - "created_at": "2024-11-17T21:37:55Z", - "updated_at": "2024-11-17T21:39:06Z", - "pushed_at": "2024-11-17T21:39:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-43532.json b/2024/CVE-2024-43532.json deleted file mode 100644 index 20f97091e3..0000000000 --- a/2024/CVE-2024-43532.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 889024932, - "name": "CVE-2024-43532", - "full_name": "expl0itsecurity\/CVE-2024-43532", - "owner": { - "login": "expl0itsecurity", - "id": 185355311, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/185355311?v=4", - "html_url": "https:\/\/github.com\/expl0itsecurity", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/expl0itsecurity\/CVE-2024-43532", - "description": null, - "fork": false, - "created_at": "2024-11-15T13:15:39Z", - "updated_at": "2024-12-14T20:30:28Z", - "pushed_at": "2024-11-15T13:19:13Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-436.json b/2024/CVE-2024-436.json deleted file mode 100644 index f662265072..0000000000 --- a/2024/CVE-2024-436.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 913326482, - "name": "CVE-2024-436_Exploit", - "full_name": "Julian-gmz\/CVE-2024-436_Exploit", - "owner": { - "login": "Julian-gmz", - "id": 77108278, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77108278?v=4", - "html_url": "https:\/\/github.com\/Julian-gmz", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Julian-gmz\/CVE-2024-436_Exploit", - "description": null, - "fork": false, - "created_at": "2025-01-07T13:21:50Z", - "updated_at": "2025-01-07T13:21:50Z", - "pushed_at": "2025-01-07T13:21:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-4367.json b/2024/CVE-2024-4367.json index 152b640e4e..a780128745 100644 --- a/2024/CVE-2024-4367.json +++ b/2024/CVE-2024-4367.json @@ -293,71 +293,5 @@ "watchers": 2, "score": 0, "subscribers_count": 1 - }, - { - "id": 884449297, - "name": "CVE-2024-4367-pdf-sample", - "full_name": "pedrochalegre7\/CVE-2024-4367-pdf-sample", - "owner": { - "login": "pedrochalegre7", - "id": 101287325, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101287325?v=4", - "html_url": "https:\/\/github.com\/pedrochalegre7", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/pedrochalegre7\/CVE-2024-4367-pdf-sample", - "description": null, - "fork": false, - "created_at": "2024-11-06T19:15:38Z", - "updated_at": "2024-11-07T14:29:14Z", - "pushed_at": "2024-11-07T14:28:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 912425407, - "name": "WEAPONIZING-CVE-2024-4367", - "full_name": "exfil0\/WEAPONIZING-CVE-2024-4367", - "owner": { - "login": "exfil0", - "id": 84948741, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84948741?v=4", - "html_url": "https:\/\/github.com\/exfil0", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/exfil0\/WEAPONIZING-CVE-2024-4367", - "description": "CVE-2024-4367 is a critical vulnerability (CVSS 9.8) in PDF.js, allowing arbitrary JavaScript code execution due to insufficient type checks on the FontMatrix object within PDF files.", - "fork": false, - "created_at": "2025-01-05T14:44:01Z", - "updated_at": "2025-01-05T19:21:53Z", - "pushed_at": "2025-01-05T19:21:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-4367", - "spyware", - "weaponized" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-43919.json b/2024/CVE-2024-43919.json deleted file mode 100644 index 604a3c44df..0000000000 --- a/2024/CVE-2024-43919.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 892694266, - "name": "CVE-2024-43919", - "full_name": "RandomRobbieBF\/CVE-2024-43919", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-43919", - "description": "YARPP <= 5.30.10 - Missing Authorization", - "fork": false, - "created_at": "2024-11-22T15:42:39Z", - "updated_at": "2024-11-22T15:44:26Z", - "pushed_at": "2024-11-22T15:44:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-43965.json b/2024/CVE-2024-43965.json deleted file mode 100644 index 8c9097663b..0000000000 --- a/2024/CVE-2024-43965.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 872256938, - "name": "CVE-2024-43965", - "full_name": "RandomRobbieBF\/CVE-2024-43965", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-43965", - "description": "SendGrid for WordPress <= 1.4 - Unauthenticated SQL Injection", - "fork": false, - "created_at": "2024-10-14T05:58:17Z", - "updated_at": "2024-10-18T17:57:10Z", - "pushed_at": "2024-10-14T05:59:29Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-44000.json b/2024/CVE-2024-44000.json index 05bb7c536e..d1174e9778 100644 --- a/2024/CVE-2024-44000.json +++ b/2024/CVE-2024-44000.json @@ -91,36 +91,5 @@ "watchers": 2, "score": 0, "subscribers_count": 2 - }, - { - "id": 870756822, - "name": "CVE-2024-44000", - "full_name": "geniuszly\/CVE-2024-44000", - "owner": { - "login": "geniuszly", - "id": 137893386, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4", - "html_url": "https:\/\/github.com\/geniuszly", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-44000", - "description": "is a PoC tool designed to exploit insecurely exposed debug logs from WordPress sites and extract session cookies", - "fork": false, - "created_at": "2024-10-10T15:58:10Z", - "updated_at": "2024-10-21T08:14:54Z", - "pushed_at": "2024-10-10T15:59:51Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 2 } ] \ No newline at end of file diff --git a/2024/CVE-2024-4406.json b/2024/CVE-2024-4406.json deleted file mode 100644 index 93c124eba9..0000000000 --- a/2024/CVE-2024-4406.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 872352341, - "name": "cve-2024-4406-xiaomi13pro-exploit-files", - "full_name": "Yogehi\/cve-2024-4406-xiaomi13pro-exploit-files", - "owner": { - "login": "Yogehi", - "id": 10925671, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10925671?v=4", - "html_url": "https:\/\/github.com\/Yogehi", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Yogehi\/cve-2024-4406-xiaomi13pro-exploit-files", - "description": "Files related to the Pwn2Own Toronto 2023 exploit against the Xiaomi 13 Pro.", - "fork": false, - "created_at": "2024-10-14T09:38:04Z", - "updated_at": "2024-11-25T06:46:01Z", - "pushed_at": "2024-10-14T09:43:53Z", - "stargazers_count": 18, - "watchers_count": 18, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 18, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-44193.json b/2024/CVE-2024-44193.json deleted file mode 100644 index 12e1cddd39..0000000000 --- a/2024/CVE-2024-44193.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 867684338, - "name": "CVE-2024-44193", - "full_name": "mbog14\/CVE-2024-44193", - "owner": { - "login": "mbog14", - "id": 74453009, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74453009?v=4", - "html_url": "https:\/\/github.com\/mbog14", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/mbog14\/CVE-2024-44193", - "description": "Hacking Windows through iTunes  - Local Privilege Escalation 0-day", - "fork": false, - "created_at": "2024-10-04T14:20:15Z", - "updated_at": "2024-12-28T12:40:31Z", - "pushed_at": "2024-10-04T14:59:50Z", - "stargazers_count": 93, - "watchers_count": 93, - "has_discussions": false, - "forks_count": 13, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 13, - "watchers": 93, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-44258.json b/2024/CVE-2024-44258.json deleted file mode 100644 index 82c5246b33..0000000000 --- a/2024/CVE-2024-44258.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 880195363, - "name": "CVE-2024-44258", - "full_name": "ifpdz\/CVE-2024-44258", - "owner": { - "login": "ifpdz", - "id": 105882406, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105882406?v=4", - "html_url": "https:\/\/github.com\/ifpdz", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ifpdz\/CVE-2024-44258", - "description": "CVE-2024-44258", - "fork": false, - "created_at": "2024-10-29T09:45:03Z", - "updated_at": "2024-12-23T03:15:29Z", - "pushed_at": "2024-11-02T19:20:44Z", - "stargazers_count": 61, - "watchers_count": 61, - "has_discussions": false, - "forks_count": 8, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 8, - "watchers": 61, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-44285.json b/2024/CVE-2024-44285.json deleted file mode 100644 index e83f652b0a..0000000000 --- a/2024/CVE-2024-44285.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 896477779, - "name": "explt", - "full_name": "slds1\/explt", - "owner": { - "login": "slds1", - "id": 147923950, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/147923950?v=4", - "html_url": "https:\/\/github.com\/slds1", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/slds1\/explt", - "description": "App for CVE-2024-44285", - "fork": false, - "created_at": "2024-11-30T13:22:05Z", - "updated_at": "2024-11-30T13:23:04Z", - "pushed_at": "2024-11-30T13:23:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-44337.json b/2024/CVE-2024-44337.json deleted file mode 100644 index c2bf247f0d..0000000000 --- a/2024/CVE-2024-44337.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 873032825, - "name": "CVE-2024-44337", - "full_name": "Brinmon\/CVE-2024-44337", - "owner": { - "login": "Brinmon", - "id": 135578945, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135578945?v=4", - "html_url": "https:\/\/github.com\/Brinmon", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Brinmon\/CVE-2024-44337", - "description": "CVE-2024-44337 POC The package `github.com\/gomarkdown\/markdown` is a Go library for parsing Markdown text and rendering as HTML. which allowed a remote attacker to cause a denial of service (DoS) condition by providing a tailor-made input that caused an infinite loop, causing the program to hang and consume resources indefinitely.", - "fork": false, - "created_at": "2024-10-15T13:44:20Z", - "updated_at": "2024-11-20T16:31:07Z", - "pushed_at": "2024-10-15T13:56:40Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-4439.json b/2024/CVE-2024-4439.json index 2a3c4d30fe..f5190fa7c8 100644 --- a/2024/CVE-2024-4439.json +++ b/2024/CVE-2024-4439.json @@ -91,67 +91,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 870571270, - "name": "CVE-2024-4439", - "full_name": "soltanali0\/CVE-2024-4439", - "owner": { - "login": "soltanali0", - "id": 87374678, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87374678?v=4", - "html_url": "https:\/\/github.com\/soltanali0", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/soltanali0\/CVE-2024-4439", - "description": "aa", - "fork": false, - "created_at": "2024-10-10T09:30:11Z", - "updated_at": "2024-10-10T09:43:46Z", - "pushed_at": "2024-10-10T09:43:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 892084521, - "name": "CVE-2024-4439", - "full_name": "w0r1i0g1ht\/CVE-2024-4439", - "owner": { - "login": "w0r1i0g1ht", - "id": 78846391, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78846391?v=4", - "html_url": "https:\/\/github.com\/w0r1i0g1ht", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/w0r1i0g1ht\/CVE-2024-4439", - "description": "CVE-2024-4439 docker and poc", - "fork": false, - "created_at": "2024-11-21T13:36:25Z", - "updated_at": "2024-11-21T13:42:38Z", - "pushed_at": "2024-11-21T13:42:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-44625.json b/2024/CVE-2024-44625.json deleted file mode 100644 index c4acad5fd8..0000000000 --- a/2024/CVE-2024-44625.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 887990161, - "name": "CVE-2024-44625", - "full_name": "Fysac\/CVE-2024-44625", - "owner": { - "login": "Fysac", - "id": 6894940, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6894940?v=4", - "html_url": "https:\/\/github.com\/Fysac", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Fysac\/CVE-2024-44625", - "description": "Symbolic link path traversal vulnerability in Gogs", - "fork": false, - "created_at": "2024-11-13T16:16:31Z", - "updated_at": "2025-01-12T18:31:10Z", - "pushed_at": "2024-11-14T02:54:13Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-44765.json b/2024/CVE-2024-44765.json deleted file mode 100644 index 3926fa12ee..0000000000 --- a/2024/CVE-2024-44765.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 904747075, - "name": "cloudpanel-2.4.2-CVE-2024-44765-recovery", - "full_name": "josephgodwinkimani\/cloudpanel-2.4.2-CVE-2024-44765-recovery", - "owner": { - "login": "josephgodwinkimani", - "id": 13916761, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13916761?v=4", - "html_url": "https:\/\/github.com\/josephgodwinkimani", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/josephgodwinkimani\/cloudpanel-2.4.2-CVE-2024-44765-recovery", - "description": "How to \"recover\" a CloudPanel server affected by the CVE-2024-44765 vulnerability", - "fork": false, - "created_at": "2024-12-17T13:29:38Z", - "updated_at": "2024-12-30T11:49:18Z", - "pushed_at": "2024-12-19T06:50:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-45216.json b/2024/CVE-2024-45216.json deleted file mode 100644 index 6a8ec3b558..0000000000 --- a/2024/CVE-2024-45216.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 897120495, - "name": "CVE-2024-45216-Poc", - "full_name": "congdong007\/CVE-2024-45216-Poc", - "owner": { - "login": "congdong007", - "id": 104914028, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104914028?v=4", - "html_url": "https:\/\/github.com\/congdong007", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/congdong007\/CVE-2024-45216-Poc", - "description": null, - "fork": false, - "created_at": "2024-12-02T04:09:04Z", - "updated_at": "2024-12-05T00:10:27Z", - "pushed_at": "2024-12-02T04:16:09Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 914698897, - "name": "CVE-2024-45216", - "full_name": "qhoko\/CVE-2024-45216", - "owner": { - "login": "qhoko", - "id": 106409402, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106409402?v=4", - "html_url": "https:\/\/github.com\/qhoko", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/qhoko\/CVE-2024-45216", - "description": null, - "fork": false, - "created_at": "2025-01-10T05:59:08Z", - "updated_at": "2025-01-10T06:09:56Z", - "pushed_at": "2025-01-10T06:09:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-45337.json b/2024/CVE-2024-45337.json deleted file mode 100644 index 362fc3373d..0000000000 --- a/2024/CVE-2024-45337.json +++ /dev/null @@ -1,74 +0,0 @@ -[ - { - "id": 904960744, - "name": "CVE-2024-45337-POC", - "full_name": "NHAS\/CVE-2024-45337-POC", - "owner": { - "login": "NHAS", - "id": 6820641, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6820641?v=4", - "html_url": "https:\/\/github.com\/NHAS", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/NHAS\/CVE-2024-45337-POC", - "description": "Proof of concept (POC) for CVE-2024-45337 ", - "fork": false, - "created_at": "2024-12-17T22:07:53Z", - "updated_at": "2025-01-12T18:35:20Z", - "pushed_at": "2024-12-17T22:27:03Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2024-45337", - "exploit", - "golang", - "hack", - "pentesting", - "poc", - "proof-of-concept", - "ssh" - ], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 904964693, - "name": "VULNERABLE-CVE-2024-45337", - "full_name": "NHAS\/VULNERABLE-CVE-2024-45337", - "owner": { - "login": "NHAS", - "id": 6820641, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6820641?v=4", - "html_url": "https:\/\/github.com\/NHAS", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/NHAS\/VULNERABLE-CVE-2024-45337", - "description": "An example project that showcases golang code vulnerable to CVE-2024-45337", - "fork": false, - "created_at": "2024-12-17T22:22:03Z", - "updated_at": "2024-12-17T22:25:52Z", - "pushed_at": "2024-12-17T22:25:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-45409.json b/2024/CVE-2024-45409.json deleted file mode 100644 index 4b88da223b..0000000000 --- a/2024/CVE-2024-45409.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 868840911, - "name": "CVE-2024-45409", - "full_name": "synacktiv\/CVE-2024-45409", - "owner": { - "login": "synacktiv", - "id": 50145679, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50145679?v=4", - "html_url": "https:\/\/github.com\/synacktiv", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/synacktiv\/CVE-2024-45409", - "description": "Ruby-SAML \/ GitLab Authentication Bypass (CVE-2024-45409) exploit", - "fork": false, - "created_at": "2024-10-07T09:24:46Z", - "updated_at": "2025-01-11T09:38:35Z", - "pushed_at": "2024-10-07T11:50:17Z", - "stargazers_count": 75, - "watchers_count": 75, - "has_discussions": false, - "forks_count": 14, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 14, - "watchers": 75, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-45436.json b/2024/CVE-2024-45436.json deleted file mode 100644 index 855adeeaed..0000000000 --- a/2024/CVE-2024-45436.json +++ /dev/null @@ -1,69 +0,0 @@ -[ - { - "id": 875929293, - "name": "CVE-2024-45436", - "full_name": "pankass\/CVE-2024-45436", - "owner": { - "login": "pankass", - "id": 87853664, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87853664?v=4", - "html_url": "https:\/\/github.com\/pankass", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/pankass\/CVE-2024-45436", - "description": "CVE-2024-45436", - "fork": false, - "created_at": "2024-10-21T05:44:49Z", - "updated_at": "2024-10-23T02:33:48Z", - "pushed_at": "2024-10-21T05:47:54Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 891956571, - "name": "cve-2024-45436-exp", - "full_name": "XiaomingX\/cve-2024-45436-exp", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-45436-exp", - "description": "This repository contains an exploit demonstration for CVE-2024-45436, a critical vulnerability affecting specific software versions. It highlights the exploitation mechanism and provides insights for security researchers to understand and mitigate the risk. ", - "fork": false, - "created_at": "2024-11-21T09:03:21Z", - "updated_at": "2025-01-13T18:17:53Z", - "pushed_at": "2024-11-21T09:08:28Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "exp", - "ollama", - "poc" - ], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-45440.json b/2024/CVE-2024-45440.json deleted file mode 100644 index 18948c6a34..0000000000 --- a/2024/CVE-2024-45440.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 908604410, - "name": "CVE-2024-45440", - "full_name": "w0r1i0g1ht\/CVE-2024-45440", - "owner": { - "login": "w0r1i0g1ht", - "id": 78846391, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78846391?v=4", - "html_url": "https:\/\/github.com\/w0r1i0g1ht", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/w0r1i0g1ht\/CVE-2024-45440", - "description": "Drupal CVE-2024-45440", - "fork": false, - "created_at": "2024-12-26T13:35:42Z", - "updated_at": "2024-12-30T06:27:01Z", - "pushed_at": "2024-12-29T13:56:23Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-45492.json b/2024/CVE-2024-45492.json deleted file mode 100644 index 1b8715a4f8..0000000000 --- a/2024/CVE-2024-45492.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 881829960, - "name": "external_expat_2.6.2_CVE-2024-45492", - "full_name": "nidhihcl75\/external_expat_2.6.2_CVE-2024-45492", - "owner": { - "login": "nidhihcl75", - "id": 176363052, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176363052?v=4", - "html_url": "https:\/\/github.com\/nidhihcl75", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/nidhihcl75\/external_expat_2.6.2_CVE-2024-45492", - "description": null, - "fork": false, - "created_at": "2024-11-01T10:27:39Z", - "updated_at": "2024-11-01T13:59:38Z", - "pushed_at": "2024-11-01T11:23:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-45519.json b/2024/CVE-2024-45519.json index d26d77c760..7dbaae57ca 100644 --- a/2024/CVE-2024-45519.json +++ b/2024/CVE-2024-45519.json @@ -29,103 +29,5 @@ "watchers": 42, "score": 0, "subscribers_count": 2 - }, - { - "id": 867894040, - "name": "CVE-2024-45519", - "full_name": "Chocapikk\/CVE-2024-45519", - "owner": { - "login": "Chocapikk", - "id": 88535377, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", - "html_url": "https:\/\/github.com\/Chocapikk", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-45519", - "description": "Zimbra - Remote Command Execution (CVE-2024-45519)", - "fork": false, - "created_at": "2024-10-05T00:15:18Z", - "updated_at": "2025-01-13T13:28:50Z", - "pushed_at": "2024-11-05T10:10:40Z", - "stargazers_count": 120, - "watchers_count": 120, - "has_discussions": false, - "forks_count": 20, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 20, - "watchers": 120, - "score": 0, - "subscribers_count": 3 - }, - { - "id": 886592882, - "name": "CVE-2024-45519", - "full_name": "whiterose7777\/CVE-2024-45519", - "owner": { - "login": "whiterose7777", - "id": 174041119, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174041119?v=4", - "html_url": "https:\/\/github.com\/whiterose7777", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/whiterose7777\/CVE-2024-45519", - "description": null, - "fork": false, - "created_at": "2024-11-11T08:57:44Z", - "updated_at": "2024-11-12T08:52:37Z", - "pushed_at": "2024-11-11T08:58:18Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 892376259, - "name": "cve-2024-45519-poc", - "full_name": "XiaomingX\/cve-2024-45519-poc", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-45519-poc", - "description": "CVE-2024-45519是Zimbra Collaboration(ZCS)中的一个高危漏洞,存在于其postjournal服务中。当该服务被启用时,未经身份验证的攻击者可以通过构造特定的SMTP请求,远程执行任意命令,从而完全控制受影响的服务器。", - "fork": false, - "created_at": "2024-11-22T01:56:21Z", - "updated_at": "2025-01-13T18:17:51Z", - "pushed_at": "2024-11-22T02:00:35Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "exp", - "poc", - "rce" - ], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-4573.json b/2024/CVE-2024-4573.json deleted file mode 100644 index a405c06717..0000000000 --- a/2024/CVE-2024-4573.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 910236713, - "name": "CVE-2024-4573-Mitigation-Script", - "full_name": "Castro-Ian\/CVE-2024-4573-Mitigation-Script", - "owner": { - "login": "Castro-Ian", - "id": 75397829, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75397829?v=4", - "html_url": "https:\/\/github.com\/Castro-Ian", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Castro-Ian\/CVE-2024-4573-Mitigation-Script", - "description": null, - "fork": false, - "created_at": "2024-12-30T18:54:07Z", - "updated_at": "2024-12-30T18:58:24Z", - "pushed_at": "2024-12-30T18:58:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json index 256bb43773..89e5a86c4f 100644 --- a/2024/CVE-2024-4577.json +++ b/2024/CVE-2024-4577.json @@ -1167,99 +1167,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 823727293, - "name": "CVE-2024-4577", - "full_name": "charis3306\/CVE-2024-4577", - "owner": { - "login": "charis3306", - "id": 84823804, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84823804?v=4", - "html_url": "https:\/\/github.com\/charis3306", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/charis3306\/CVE-2024-4577", - "description": "CVE-2024-4577 EXP", - "fork": false, - "created_at": "2024-07-03T15:30:52Z", - "updated_at": "2024-07-03T15:41:46Z", - "pushed_at": "2024-07-03T15:41:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 825104886, - "name": "CVE-2024-4577-RCE", - "full_name": "l0n3m4n\/CVE-2024-4577-RCE", - "owner": { - "login": "l0n3m4n", - "id": 143868630, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143868630?v=4", - "html_url": "https:\/\/github.com\/l0n3m4n", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/l0n3m4n\/CVE-2024-4577-RCE", - "description": "PoC - PHP CGI Argument Injection CVE-2024-4577 (Scanner and Exploit)", - "fork": false, - "created_at": "2024-07-06T19:37:14Z", - "updated_at": "2024-12-27T08:50:35Z", - "pushed_at": "2024-07-07T15:32:58Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 5, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 827089430, - "name": "CVE-2024-4577-RCE-ATTACK", - "full_name": "bibo318\/CVE-2024-4577-RCE-ATTACK", - "owner": { - "login": "bibo318", - "id": 56821442, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56821442?v=4", - "html_url": "https:\/\/github.com\/bibo318", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/bibo318\/CVE-2024-4577-RCE-ATTACK", - "description": "ATTACK PoC - PHP CVE-2024-4577 ", - "fork": false, - "created_at": "2024-07-11T02:22:32Z", - "updated_at": "2024-09-30T17:27:58Z", - "pushed_at": "2024-07-11T08:37:00Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - }, { "id": 829150278, "name": "CVE-2024-4577-PHP-RCE", @@ -1298,99 +1205,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 833329743, - "name": "CVE-2024-4577", - "full_name": "a-roshbaik\/CVE-2024-4577", - "owner": { - "login": "a-roshbaik", - "id": 149660312, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149660312?v=4", - "html_url": "https:\/\/github.com\/a-roshbaik", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/a-roshbaik\/CVE-2024-4577", - "description": null, - "fork": false, - "created_at": "2024-07-24T20:23:03Z", - "updated_at": "2024-07-24T20:23:03Z", - "pushed_at": "2024-07-24T20:23:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 833330595, - "name": "CVE-2024-4577-PHP-RCE", - "full_name": "a-roshbaik\/CVE-2024-4577-PHP-RCE", - "owner": { - "login": "a-roshbaik", - "id": 149660312, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149660312?v=4", - "html_url": "https:\/\/github.com\/a-roshbaik", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/a-roshbaik\/CVE-2024-4577-PHP-RCE", - "description": null, - "fork": false, - "created_at": "2024-07-24T20:25:46Z", - "updated_at": "2024-07-24T20:29:28Z", - "pushed_at": "2024-07-24T20:29:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 836182474, - "name": "CVE-2024-4577", - "full_name": "Jcccccx\/CVE-2024-4577", - "owner": { - "login": "Jcccccx", - "id": 167961583, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167961583?v=4", - "html_url": "https:\/\/github.com\/Jcccccx", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Jcccccx\/CVE-2024-4577", - "description": "批量验证POC和EXP", - "fork": false, - "created_at": "2024-07-31T10:14:14Z", - "updated_at": "2024-07-31T10:37:59Z", - "pushed_at": "2024-07-31T10:37:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 843644753, "name": "CVE-2024-4577", @@ -1547,167 +1361,5 @@ "watchers": 2, "score": 0, "subscribers_count": 1 - }, - { - "id": 867649513, - "name": "CVE-2024-4577-checker", - "full_name": "JeninSutradhar\/CVE-2024-4577-checker", - "owner": { - "login": "JeninSutradhar", - "id": 111521642, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/111521642?v=4", - "html_url": "https:\/\/github.com\/JeninSutradhar", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/JeninSutradhar\/CVE-2024-4577-checker", - "description": "A Bash script designed to scan multiple domains for the CVE-2024-4577 vulnerability in PHP-CGI.", - "fork": false, - "created_at": "2024-10-04T13:10:19Z", - "updated_at": "2024-12-29T13:06:17Z", - "pushed_at": "2024-11-13T14:37:33Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "apache", - "cve", - "cve-scanning", - "php8", - "security-scanner", - "vulnerability" - ], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 872339376, - "name": "CVE-2024-4577", - "full_name": "longhoangth18\/CVE-2024-4577", - "owner": { - "login": "longhoangth18", - "id": 152260528, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152260528?v=4", - "html_url": "https:\/\/github.com\/longhoangth18", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/longhoangth18\/CVE-2024-4577", - "description": null, - "fork": false, - "created_at": "2024-10-14T09:11:06Z", - "updated_at": "2024-11-04T07:44:41Z", - "pushed_at": "2024-10-14T09:36:45Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 882724102, - "name": "CVE-2024-4577", - "full_name": "ahmetramazank\/CVE-2024-4577", - "owner": { - "login": "ahmetramazank", - "id": 109250080, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109250080?v=4", - "html_url": "https:\/\/github.com\/ahmetramazank", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ahmetramazank\/CVE-2024-4577", - "description": null, - "fork": false, - "created_at": "2024-11-03T15:42:04Z", - "updated_at": "2024-11-03T16:17:52Z", - "pushed_at": "2024-11-03T16:17:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 884083771, - "name": "CVE-2024-4577-RCE-PoC", - "full_name": "BTtea\/CVE-2024-4577-RCE-PoC", - "owner": { - "login": "BTtea", - "id": 32271123, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32271123?v=4", - "html_url": "https:\/\/github.com\/BTtea", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/BTtea\/CVE-2024-4577-RCE-PoC", - "description": "CVE-2024-4577 RCE PoC", - "fork": false, - "created_at": "2024-11-06T05:30:33Z", - "updated_at": "2024-12-24T16:47:23Z", - "pushed_at": "2024-11-20T06:24:59Z", - "stargazers_count": 17, - "watchers_count": 17, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 17, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 913704447, - "name": "CVE-2024-4577", - "full_name": "Dejavu666\/CVE-2024-4577", - "owner": { - "login": "Dejavu666", - "id": 14794918, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14794918?v=4", - "html_url": "https:\/\/github.com\/Dejavu666", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Dejavu666\/CVE-2024-4577", - "description": "CVE-2024-4577 POC", - "fork": false, - "created_at": "2025-01-08T07:41:29Z", - "updated_at": "2025-01-08T11:17:26Z", - "pushed_at": "2025-01-08T11:17:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-46483.json b/2024/CVE-2024-46483.json deleted file mode 100644 index 448173df85..0000000000 --- a/2024/CVE-2024-46483.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 874747179, - "name": "cve-2024-46483", - "full_name": "kn32\/cve-2024-46483", - "owner": { - "login": "kn32", - "id": 105210950, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105210950?v=4", - "html_url": "https:\/\/github.com\/kn32", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/kn32\/cve-2024-46483", - "description": "Pre-Authentication Heap Overflow in Xlight SFTP server <= 3.9.4.2", - "fork": false, - "created_at": "2024-10-18T11:46:14Z", - "updated_at": "2024-12-04T22:39:12Z", - "pushed_at": "2024-10-18T12:29:36Z", - "stargazers_count": 12, - "watchers_count": 12, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 12, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-46538.json b/2024/CVE-2024-46538.json deleted file mode 100644 index 29fab4a8b5..0000000000 --- a/2024/CVE-2024-46538.json +++ /dev/null @@ -1,74 +0,0 @@ -[ - { - "id": 877250777, - "name": "CVE-2024-46538", - "full_name": "EQSTLab\/CVE-2024-46538", - "owner": { - "login": "EQSTLab", - "id": 148991397, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148991397?v=4", - "html_url": "https:\/\/github.com\/EQSTLab", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/EQSTLab\/CVE-2024-46538", - "description": "Proof-of-Concept for CVE-2024-46538", - "fork": false, - "created_at": "2024-10-23T10:50:01Z", - "updated_at": "2025-01-12T18:28:32Z", - "pushed_at": "2025-01-12T11:25:15Z", - "stargazers_count": 47, - "watchers_count": 47, - "has_discussions": false, - "forks_count": 9, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2024-46538", - "exploit", - "pfsense", - "php", - "poc", - "proof-of-concept", - "security", - "vulnerability" - ], - "visibility": "public", - "forks": 9, - "watchers": 47, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 898555204, - "name": "CVE-2024-46538", - "full_name": "LauLeysen\/CVE-2024-46538", - "owner": { - "login": "LauLeysen", - "id": 54813361, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54813361?v=4", - "html_url": "https:\/\/github.com\/LauLeysen", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/LauLeysen\/CVE-2024-46538", - "description": "based on [EQSTLab](https:\/\/github.com\/EQSTLab)", - "fork": false, - "created_at": "2024-12-04T15:51:40Z", - "updated_at": "2024-12-16T14:03:29Z", - "pushed_at": "2024-12-04T16:00:45Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-46542.json b/2024/CVE-2024-46542.json deleted file mode 100644 index e2104db43c..0000000000 --- a/2024/CVE-2024-46542.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 910002853, - "name": "CVE-2024-46542", - "full_name": "MarioTesoro\/CVE-2024-46542", - "owner": { - "login": "MarioTesoro", - "id": 62204045, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62204045?v=4", - "html_url": "https:\/\/github.com\/MarioTesoro", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/MarioTesoro\/CVE-2024-46542", - "description": null, - "fork": false, - "created_at": "2024-12-30T08:58:05Z", - "updated_at": "2024-12-31T12:17:30Z", - "pushed_at": "2024-12-31T12:17:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-46635.json b/2024/CVE-2024-46635.json deleted file mode 100644 index d0bfafa52e..0000000000 --- a/2024/CVE-2024-46635.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 865729500, - "name": "CVE-2024-46635", - "full_name": "h1thub\/CVE-2024-46635", - "owner": { - "login": "h1thub", - "id": 167607208, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167607208?v=4", - "html_url": "https:\/\/github.com\/h1thub", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/h1thub\/CVE-2024-46635", - "description": null, - "fork": false, - "created_at": "2024-10-01T03:07:04Z", - "updated_at": "2024-11-11T08:25:02Z", - "pushed_at": "2024-10-01T17:59:04Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-46658.json b/2024/CVE-2024-46658.json deleted file mode 100644 index 1752e0bce5..0000000000 --- a/2024/CVE-2024-46658.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 867076537, - "name": "CVE-2024-46658", - "full_name": "jackalkarlos\/CVE-2024-46658", - "owner": { - "login": "jackalkarlos", - "id": 88983987, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88983987?v=4", - "html_url": "https:\/\/github.com\/jackalkarlos", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/jackalkarlos\/CVE-2024-46658", - "description": "Syrotech SY-GOPON-8OLT-L3 v1.6.0_240629", - "fork": false, - "created_at": "2024-10-03T12:12:23Z", - "updated_at": "2024-10-03T23:30:13Z", - "pushed_at": "2024-10-03T14:19:05Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-46901.json b/2024/CVE-2024-46901.json deleted file mode 100644 index aefab5f1be..0000000000 --- a/2024/CVE-2024-46901.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 871204333, - "name": "CVE-2024-46901", - "full_name": "devhaozi\/CVE-2024-46901", - "owner": { - "login": "devhaozi", - "id": 115467771, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115467771?v=4", - "html_url": "https:\/\/github.com\/devhaozi", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/devhaozi\/CVE-2024-46901", - "description": "Subversion CVE-2024-46901 PoC", - "fork": false, - "created_at": "2024-10-11T13:28:55Z", - "updated_at": "2024-10-11T13:31:52Z", - "pushed_at": "2024-10-11T13:31:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-46982.json b/2024/CVE-2024-46982.json deleted file mode 100644 index 58219734e6..0000000000 --- a/2024/CVE-2024-46982.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 903309507, - "name": "next_js_poisoning", - "full_name": "CodePontiff\/next_js_poisoning", - "owner": { - "login": "CodePontiff", - "id": 45843121, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45843121?v=4", - "html_url": "https:\/\/github.com\/CodePontiff", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/CodePontiff\/next_js_poisoning", - "description": " The CVE-2024-46982 is cache poisoning of next_js some site have API to load their image", - "fork": false, - "created_at": "2024-12-14T09:14:01Z", - "updated_at": "2024-12-14T09:43:01Z", - "pushed_at": "2024-12-14T09:42:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-47062.json b/2024/CVE-2024-47062.json deleted file mode 100644 index 5bdff83b49..0000000000 --- a/2024/CVE-2024-47062.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 886019978, - "name": "CVE-2024-47062", - "full_name": "saisathvik1\/CVE-2024-47062", - "owner": { - "login": "saisathvik1", - "id": 51957422, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51957422?v=4", - "html_url": "https:\/\/github.com\/saisathvik1", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/saisathvik1\/CVE-2024-47062", - "description": "CVE-2024-47062 PoC", - "fork": false, - "created_at": "2024-11-10T01:10:06Z", - "updated_at": "2024-12-06T03:49:02Z", - "pushed_at": "2024-12-06T03:48:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-47176.json b/2024/CVE-2024-47176.json index 709b02d4e2..f8ccf1bf87 100644 --- a/2024/CVE-2024-47176.json +++ b/2024/CVE-2024-47176.json @@ -221,199 +221,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 867190495, - "name": "CVE-2024-47176", - "full_name": "l0n3m4n\/CVE-2024-47176", - "owner": { - "login": "l0n3m4n", - "id": 143868630, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143868630?v=4", - "html_url": "https:\/\/github.com\/l0n3m4n", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/l0n3m4n\/CVE-2024-47176", - "description": "Unauthenticated RCE on cups-browsed (exploit and nuclei template)", - "fork": false, - "created_at": "2024-10-03T15:53:04Z", - "updated_at": "2024-12-30T08:42:46Z", - "pushed_at": "2024-10-03T17:11:17Z", - "stargazers_count": 12, - "watchers_count": 12, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "ctf", - "cups", - "cve", - "exploit", - "pentesting", - "rce", - "redteaming" - ], - "visibility": "public", - "forks": 1, - "watchers": 12, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 868024917, - "name": "CVE-2024-47176", - "full_name": "gumerzzzindo\/CVE-2024-47176", - "owner": { - "login": "gumerzzzindo", - "id": 114024126, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114024126?v=4", - "html_url": "https:\/\/github.com\/gumerzzzindo", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/gumerzzzindo\/CVE-2024-47176", - "description": null, - "fork": false, - "created_at": "2024-10-05T09:22:36Z", - "updated_at": "2024-10-05T10:05:20Z", - "pushed_at": "2024-10-05T10:05:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 868786835, - "name": "CVE-2024-47176-Scanner", - "full_name": "MalwareTech\/CVE-2024-47176-Scanner", - "owner": { - "login": "MalwareTech", - "id": 7256561, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7256561?v=4", - "html_url": "https:\/\/github.com\/MalwareTech", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/MalwareTech\/CVE-2024-47176-Scanner", - "description": "A simple scanner for identifying vulnerable cups-browsed instances on your network", - "fork": false, - "created_at": "2024-10-07T07:25:18Z", - "updated_at": "2025-01-06T15:46:35Z", - "pushed_at": "2024-10-07T16:59:47Z", - "stargazers_count": 59, - "watchers_count": 59, - "has_discussions": false, - "forks_count": 10, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 10, - "watchers": 59, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 869045054, - "name": "CVE-2024-47176", - "full_name": "AxthonyV\/CVE-2024-47176", - "owner": { - "login": "AxthonyV", - "id": 141282212, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141282212?v=4", - "html_url": "https:\/\/github.com\/AxthonyV", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/AxthonyV\/CVE-2024-47176", - "description": "This repository contains a scanner for detecting vulnerabilities in the cups-browsed service of CUPS (Common Unix Printing System). The vulnerability CVE-2024-47176 allows a remote attacker to exploit an insecure configuration of the daemon, potentially leading to arbitrary code execution.", - "fork": false, - "created_at": "2024-10-07T16:14:37Z", - "updated_at": "2024-10-07T16:14:50Z", - "pushed_at": "2024-10-07T16:14:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 874384484, - "name": "CUPS-CVE-2024-47176", - "full_name": "gianlu111\/CUPS-CVE-2024-47176", - "owner": { - "login": "gianlu111", - "id": 43763664, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43763664?v=4", - "html_url": "https:\/\/github.com\/gianlu111", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/gianlu111\/CUPS-CVE-2024-47176", - "description": "A Mass Scanner designed to detect the CVE-2024-47176 vulnerability across systems running the Common Unix Printing System (CUPS). ", - "fork": false, - "created_at": "2024-10-17T18:21:10Z", - "updated_at": "2024-10-17T18:49:53Z", - "pushed_at": "2024-10-17T18:32:38Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 875147460, - "name": "CVE-2024-47176", - "full_name": "0x7556\/CVE-2024-47176", - "owner": { - "login": "0x7556", - "id": 50582207, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50582207?v=4", - "html_url": "https:\/\/github.com\/0x7556", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/0x7556\/CVE-2024-47176", - "description": "Unix CUPS打印系统 远程代码执行漏洞", - "fork": false, - "created_at": "2024-10-19T08:08:02Z", - "updated_at": "2024-10-19T08:20:57Z", - "pushed_at": "2024-10-19T08:23:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-47575.json b/2024/CVE-2024-47575.json deleted file mode 100644 index 84f479c501..0000000000 --- a/2024/CVE-2024-47575.json +++ /dev/null @@ -1,157 +0,0 @@ -[ - { - "id": 885039863, - "name": "Fortijump-Exploit-CVE-2024-47575", - "full_name": "watchtowrlabs\/Fortijump-Exploit-CVE-2024-47575", - "owner": { - "login": "watchtowrlabs", - "id": 99977116, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99977116?v=4", - "html_url": "https:\/\/github.com\/watchtowrlabs", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/watchtowrlabs\/Fortijump-Exploit-CVE-2024-47575", - "description": "Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575", - "fork": false, - "created_at": "2024-11-07T21:03:30Z", - "updated_at": "2025-01-13T12:27:15Z", - "pushed_at": "2024-11-14T16:25:52Z", - "stargazers_count": 81, - "watchers_count": 81, - "has_discussions": false, - "forks_count": 23, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 23, - "watchers": 81, - "score": 0, - "subscribers_count": 0 - }, - { - "id": 888812186, - "name": "exploit-cve-2024-47575", - "full_name": "skyalliance\/exploit-cve-2024-47575", - "owner": { - "login": "skyalliance", - "id": 127739423, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127739423?v=4", - "html_url": "https:\/\/github.com\/skyalliance", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/skyalliance\/exploit-cve-2024-47575", - "description": "FortiManager Unauthenticated Remote Code Execution (CVE-2024-47575)", - "fork": false, - "created_at": "2024-11-15T03:43:51Z", - "updated_at": "2025-01-09T10:20:42Z", - "pushed_at": "2024-11-15T03:43:54Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 889026655, - "name": "CVE-2024-47575", - "full_name": "expl0itsecurity\/CVE-2024-47575", - "owner": { - "login": "expl0itsecurity", - "id": 185355311, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/185355311?v=4", - "html_url": "https:\/\/github.com\/expl0itsecurity", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/expl0itsecurity\/CVE-2024-47575", - "description": null, - "fork": false, - "created_at": "2024-11-15T13:19:33Z", - "updated_at": "2024-12-14T20:30:28Z", - "pushed_at": "2024-11-15T18:56:01Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 892397687, - "name": "cve-2024-47575-exp", - "full_name": "XiaomingX\/cve-2024-47575-exp", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-47575-exp", - "description": "CVE-2024-47575是Fortinet的FortiManager和FortiManager Cloud产品中的一个严重漏洞,源于fgfmsd守护进程缺乏对关键功能的身份验证。", - "fork": false, - "created_at": "2024-11-22T03:13:03Z", - "updated_at": "2025-01-13T18:17:50Z", - "pushed_at": "2024-11-22T03:17:57Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 8, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 912248045, - "name": "CVE-2024-47575-POC", - "full_name": "Laonhearts\/CVE-2024-47575-POC", - "owner": { - "login": "Laonhearts", - "id": 170967564, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170967564?v=4", - "html_url": "https:\/\/github.com\/Laonhearts", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Laonhearts\/CVE-2024-47575-POC", - "description": "CVE POC Exploit", - "fork": false, - "created_at": "2025-01-05T02:54:01Z", - "updated_at": "2025-01-05T23:19:02Z", - "pushed_at": "2025-01-05T03:06:01Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-47854.json b/2024/CVE-2024-47854.json deleted file mode 100644 index 94d34f9107..0000000000 --- a/2024/CVE-2024-47854.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 875249581, - "name": "CVE-2024-47854", - "full_name": "MarioTesoro\/CVE-2024-47854", - "owner": { - "login": "MarioTesoro", - "id": 62204045, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62204045?v=4", - "html_url": "https:\/\/github.com\/MarioTesoro", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/MarioTesoro\/CVE-2024-47854", - "description": "Proof of concept of multiple Reflected Cross-Site Scripting (XSS) vulnerabilities discovered in Veritas Data Insight before 7.1.", - "fork": false, - "created_at": "2024-10-19T13:38:23Z", - "updated_at": "2024-10-20T18:11:25Z", - "pushed_at": "2024-10-20T18:11:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-48197.json b/2024/CVE-2024-48197.json deleted file mode 100644 index f9987cdd45..0000000000 --- a/2024/CVE-2024-48197.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 906634120, - "name": "CVE-2024-48197", - "full_name": "GCatt-AS\/CVE-2024-48197", - "owner": { - "login": "GCatt-AS", - "id": 192431806, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192431806?v=4", - "html_url": "https:\/\/github.com\/GCatt-AS", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/GCatt-AS\/CVE-2024-48197", - "description": "Reflected XSS in AudioCodes MP-202b", - "fork": false, - "created_at": "2024-12-21T13:07:51Z", - "updated_at": "2024-12-21T13:12:32Z", - "pushed_at": "2024-12-21T13:12:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-48208.json b/2024/CVE-2024-48208.json deleted file mode 100644 index 05e809225b..0000000000 --- a/2024/CVE-2024-48208.json +++ /dev/null @@ -1,41 +0,0 @@ -[ - { - "id": 880590271, - "name": "CVE-2024-48208", - "full_name": "rohilchaudhry\/CVE-2024-48208", - "owner": { - "login": "rohilchaudhry", - "id": 146772664, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146772664?v=4", - "html_url": "https:\/\/github.com\/rohilchaudhry", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/rohilchaudhry\/CVE-2024-48208", - "description": "This repo contains all the work surrounding the development of the PoC for CVE-2024-48208, and how a simple OOB(Out-of-bound) read can result in jail escapes as well as broken access control.", - "fork": false, - "created_at": "2024-10-30T01:44:32Z", - "updated_at": "2024-11-11T17:49:43Z", - "pushed_at": "2024-11-05T15:09:29Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "buffer-overflow", - "cve", - "cve-2024-48208", - "exploit", - "heap", - "overflow", - "poc" - ], - "visibility": "public", - "forks": 0, - "watchers": 5, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-48217.json b/2024/CVE-2024-48217.json deleted file mode 100644 index 64eba4bfbe..0000000000 --- a/2024/CVE-2024-48217.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 881716535, - "name": "CVE-2024-48217", - "full_name": "ajrielrm\/CVE-2024-48217", - "owner": { - "login": "ajrielrm", - "id": 45825467, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45825467?v=4", - "html_url": "https:\/\/github.com\/ajrielrm", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ajrielrm\/CVE-2024-48217", - "description": "CVE-2024-48217 Sismart Vulnerability", - "fork": false, - "created_at": "2024-11-01T04:44:17Z", - "updated_at": "2024-11-02T05:24:19Z", - "pushed_at": "2024-11-02T05:24:15Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-48245.json b/2024/CVE-2024-48245.json deleted file mode 100644 index 47ba63e0d7..0000000000 --- a/2024/CVE-2024-48245.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 907297715, - "name": "CVE-2024-48245", - "full_name": "ShadowByte1\/CVE-2024-48245", - "owner": { - "login": "ShadowByte1", - "id": 155693555, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155693555?v=4", - "html_url": "https:\/\/github.com\/ShadowByte1", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ShadowByte1\/CVE-2024-48245", - "description": "SQL Injection Vulnerability in Vehicle Management System 1.0 - 1.3", - "fork": false, - "created_at": "2024-12-23T09:16:09Z", - "updated_at": "2024-12-23T09:18:38Z", - "pushed_at": "2024-12-23T09:18:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-48246.json b/2024/CVE-2024-48246.json deleted file mode 100644 index 2e6fc1d6a3..0000000000 --- a/2024/CVE-2024-48246.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 907300438, - "name": "CVE-2024-48246", - "full_name": "ShadowByte1\/CVE-2024-48246", - "owner": { - "login": "ShadowByte1", - "id": 155693555, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155693555?v=4", - "html_url": "https:\/\/github.com\/ShadowByte1", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ShadowByte1\/CVE-2024-48246", - "description": "Vehicle Management System 1.0 - Stored Cross-Site Scripting (XSS)", - "fork": false, - "created_at": "2024-12-23T09:23:15Z", - "updated_at": "2024-12-23T09:25:42Z", - "pushed_at": "2024-12-23T09:25:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-48322.json b/2024/CVE-2024-48322.json deleted file mode 100644 index 8af24ec0c0..0000000000 --- a/2024/CVE-2024-48322.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 885825604, - "name": "CVE-2024-48322", - "full_name": "trqt\/CVE-2024-48322", - "owner": { - "login": "trqt", - "id": 30443527, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30443527?v=4", - "html_url": "https:\/\/github.com\/trqt", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/trqt\/CVE-2024-48322", - "description": null, - "fork": false, - "created_at": "2024-11-09T13:52:50Z", - "updated_at": "2024-11-15T13:24:49Z", - "pushed_at": "2024-11-09T14:03:28Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-48325.json b/2024/CVE-2024-48325.json deleted file mode 100644 index e7fbf93cf8..0000000000 --- a/2024/CVE-2024-48325.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 882387857, - "name": "cve-2024-48325", - "full_name": "osvaldotenorio\/cve-2024-48325", - "owner": { - "login": "osvaldotenorio", - "id": 45275816, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45275816?v=4", - "html_url": "https:\/\/github.com\/osvaldotenorio", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/osvaldotenorio\/cve-2024-48325", - "description": null, - "fork": false, - "created_at": "2024-11-02T17:43:12Z", - "updated_at": "2024-11-07T00:50:54Z", - "pushed_at": "2024-11-07T00:50:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-48326.json b/2024/CVE-2024-48326.json deleted file mode 100644 index 64d70fe830..0000000000 --- a/2024/CVE-2024-48326.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 882443639, - "name": "CVE-2024-48326", - "full_name": "fabiobsj\/CVE-2024-48326", - "owner": { - "login": "fabiobsj", - "id": 11925049, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11925049?v=4", - "html_url": "https:\/\/github.com\/fabiobsj", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/fabiobsj\/CVE-2024-48326", - "description": null, - "fork": false, - "created_at": "2024-11-02T19:41:19Z", - "updated_at": "2024-11-02T19:57:14Z", - "pushed_at": "2024-11-02T19:57:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-48359.json b/2024/CVE-2024-48359.json deleted file mode 100644 index e038d54145..0000000000 --- a/2024/CVE-2024-48359.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 880891866, - "name": "CVE-2024-48359", - "full_name": "OpenXP-Research\/CVE-2024-48359", - "owner": { - "login": "OpenXP-Research", - "id": 124332420, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124332420?v=4", - "html_url": "https:\/\/github.com\/OpenXP-Research", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/OpenXP-Research\/CVE-2024-48359", - "description": "CVE-2024-48359 PoC", - "fork": false, - "created_at": "2024-10-30T14:52:04Z", - "updated_at": "2024-12-01T16:09:54Z", - "pushed_at": "2024-10-30T15:02:47Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-48360.json b/2024/CVE-2024-48360.json deleted file mode 100644 index 7f9d89f5ee..0000000000 --- a/2024/CVE-2024-48360.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 880893405, - "name": "CVE-2024-48360", - "full_name": "OpenXP-Research\/CVE-2024-48360", - "owner": { - "login": "OpenXP-Research", - "id": 124332420, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124332420?v=4", - "html_url": "https:\/\/github.com\/OpenXP-Research", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/OpenXP-Research\/CVE-2024-48360", - "description": "CVE-2024-48360 Poc", - "fork": false, - "created_at": "2024-10-30T14:55:07Z", - "updated_at": "2024-11-05T19:37:17Z", - "pushed_at": "2024-10-30T15:02:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-48392.json b/2024/CVE-2024-48392.json deleted file mode 100644 index 6d071124ca..0000000000 --- a/2024/CVE-2024-48392.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 878366260, - "name": "CVE-2024-48392-PoC", - "full_name": "Renzusclarke\/CVE-2024-48392-PoC", - "owner": { - "login": "Renzusclarke", - "id": 77496879, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77496879?v=4", - "html_url": "https:\/\/github.com\/Renzusclarke", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Renzusclarke\/CVE-2024-48392-PoC", - "description": null, - "fork": false, - "created_at": "2024-10-25T09:00:11Z", - "updated_at": "2024-10-25T09:23:52Z", - "pushed_at": "2024-10-25T09:23:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-48415.json b/2024/CVE-2024-48415.json deleted file mode 100644 index bac68c66c8..0000000000 --- a/2024/CVE-2024-48415.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 875127580, - "name": "CVE-2024-48415", - "full_name": "khaliquesX\/CVE-2024-48415", - "owner": { - "login": "khaliquesX", - "id": 185584210, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/185584210?v=4", - "html_url": "https:\/\/github.com\/khaliquesX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/khaliquesX\/CVE-2024-48415", - "description": null, - "fork": false, - "created_at": "2024-10-19T06:58:56Z", - "updated_at": "2024-10-19T07:08:10Z", - "pushed_at": "2024-10-19T07:08:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-48427.json b/2024/CVE-2024-48427.json deleted file mode 100644 index 5042924f39..0000000000 --- a/2024/CVE-2024-48427.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 877820324, - "name": "CVE-2024-48427", - "full_name": "vighneshnair7\/CVE-2024-48427", - "owner": { - "login": "vighneshnair7", - "id": 186159201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186159201?v=4", - "html_url": "https:\/\/github.com\/vighneshnair7", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/vighneshnair7\/CVE-2024-48427", - "description": null, - "fork": false, - "created_at": "2024-10-24T09:50:31Z", - "updated_at": "2024-10-29T12:51:15Z", - "pushed_at": "2024-10-24T10:02:13Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-48569.json b/2024/CVE-2024-48569.json deleted file mode 100644 index 9b55676092..0000000000 --- a/2024/CVE-2024-48569.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 879186454, - "name": "CVE-2024-48569", - "full_name": "MarioTesoro\/CVE-2024-48569", - "owner": { - "login": "MarioTesoro", - "id": 62204045, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62204045?v=4", - "html_url": "https:\/\/github.com\/MarioTesoro", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/MarioTesoro\/CVE-2024-48569", - "description": "Proof of concept of multiple Stored Cross-Site Scripting (XSS) vulnerabilities discovered in ACI Worldwide Proactive Risk Manager v 9.1.1.0", - "fork": false, - "created_at": "2024-10-27T08:29:59Z", - "updated_at": "2024-11-03T09:33:37Z", - "pushed_at": "2024-11-03T09:33:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-48644.json b/2024/CVE-2024-48644.json deleted file mode 100644 index 626bd16bdc..0000000000 --- a/2024/CVE-2024-48644.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 874489228, - "name": "CVE-2024-48644", - "full_name": "rosembergpro\/CVE-2024-48644", - "owner": { - "login": "rosembergpro", - "id": 7573860, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7573860?v=4", - "html_url": "https:\/\/github.com\/rosembergpro", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/rosembergpro\/CVE-2024-48644", - "description": "Reolink Duo 2 WiFi v1.0.280 - Account Enumeration Vulnerability", - "fork": false, - "created_at": "2024-10-17T23:27:04Z", - "updated_at": "2024-10-18T02:21:47Z", - "pushed_at": "2024-10-18T02:21:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-48652.json b/2024/CVE-2024-48652.json deleted file mode 100644 index d90aa6c327..0000000000 --- a/2024/CVE-2024-48652.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 875183000, - "name": "CVE-2024-48652", - "full_name": "paragbagul111\/CVE-2024-48652", - "owner": { - "login": "paragbagul111", - "id": 68190427, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68190427?v=4", - "html_url": "https:\/\/github.com\/paragbagul111", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/paragbagul111\/CVE-2024-48652", - "description": "Cross Site Scripting vulnerability in camaleon-cms v.2.7.5 allows remote attacker to execute arbitrary code via the content group name field", - "fork": false, - "created_at": "2024-10-19T10:06:58Z", - "updated_at": "2024-10-19T10:21:13Z", - "pushed_at": "2024-10-19T10:21:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-48705.json b/2024/CVE-2024-48705.json deleted file mode 100644 index c0a029f62b..0000000000 --- a/2024/CVE-2024-48705.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 899256024, - "name": "CVE-2024-48705", - "full_name": "L41KAA\/CVE-2024-48705", - "owner": { - "login": "L41KAA", - "id": 54420351, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54420351?v=4", - "html_url": "https:\/\/github.com\/L41KAA", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/L41KAA\/CVE-2024-48705", - "description": "Wavlink AC1200 with firmware versions M32A3_V1410_230602 and M32A3_V1410_240222 are vulnerable to a post-authentication command injection while resetting the password. This vulnerability is specifically found within the \"set_sys_adm\" function of the \"adm.cgi\" binary, and is due to improper santization of the user provided \"newpass\" field.", - "fork": false, - "created_at": "2024-12-05T22:45:58Z", - "updated_at": "2024-12-05T23:01:09Z", - "pushed_at": "2024-12-05T23:01:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-48762.json b/2024/CVE-2024-48762.json deleted file mode 100644 index 9840af04d6..0000000000 --- a/2024/CVE-2024-48762.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 866653207, - "name": "CVE-2024-48762", - "full_name": "YZS17\/CVE-2024-48762", - "owner": { - "login": "YZS17", - "id": 153406185, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153406185?v=4", - "html_url": "https:\/\/github.com\/YZS17", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/YZS17\/CVE-2024-48762", - "description": "Command injection vulnerability in FLIR AX8 up to 1.46.16", - "fork": false, - "created_at": "2024-10-02T16:32:08Z", - "updated_at": "2024-12-18T13:37:21Z", - "pushed_at": "2024-12-18T13:37:17Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-4879.json b/2024/CVE-2024-4879.json index f6cc1eb655..6036bd9aea 100644 --- a/2024/CVE-2024-4879.json +++ b/2024/CVE-2024-4879.json @@ -1,221 +1,4 @@ [ - { - "id": 827768710, - "name": "CVE-2024-4879", - "full_name": "Brut-Security\/CVE-2024-4879", - "owner": { - "login": "Brut-Security", - "id": 172168319, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168319?v=4", - "html_url": "https:\/\/github.com\/Brut-Security", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Brut-Security\/CVE-2024-4879", - "description": "CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow", - "fork": false, - "created_at": "2024-07-12T10:32:37Z", - "updated_at": "2024-10-28T17:52:37Z", - "pushed_at": "2024-07-13T10:46:32Z", - "stargazers_count": 22, - "watchers_count": 22, - "has_discussions": false, - "forks_count": 7, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 7, - "watchers": 22, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 827823810, - "name": "CVE-2024-4879", - "full_name": "bigb0x\/CVE-2024-4879", - "owner": { - "login": "bigb0x", - "id": 13532434, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4", - "html_url": "https:\/\/github.com\/bigb0x", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-4879", - "description": "Bulk scanning tool for ServiceNow CVE-2024-4879 vulnerability", - "fork": false, - "created_at": "2024-07-12T13:02:47Z", - "updated_at": "2024-08-25T03:37:27Z", - "pushed_at": "2024-07-12T20:48:26Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 8, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 828006472, - "name": "CVE-2024-4879", - "full_name": "Mr-r00t11\/CVE-2024-4879", - "owner": { - "login": "Mr-r00t11", - "id": 68824333, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68824333?v=4", - "html_url": "https:\/\/github.com\/Mr-r00t11", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Mr-r00t11\/CVE-2024-4879", - "description": null, - "fork": false, - "created_at": "2024-07-12T21:43:48Z", - "updated_at": "2024-08-29T13:31:14Z", - "pushed_at": "2024-07-12T21:46:19Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 828935876, - "name": "CVE-2024-4879", - "full_name": "ShadowByte1\/CVE-2024-4879", - "owner": { - "login": "ShadowByte1", - "id": 155693555, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155693555?v=4", - "html_url": "https:\/\/github.com\/ShadowByte1", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ShadowByte1\/CVE-2024-4879", - "description": null, - "fork": false, - "created_at": "2024-07-15T12:27:33Z", - "updated_at": "2024-07-15T13:22:33Z", - "pushed_at": "2024-07-15T13:22:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 829246851, - "name": "CVE-2024-4879-ServiceNow", - "full_name": "Praison001\/CVE-2024-4879-ServiceNow", - "owner": { - "login": "Praison001", - "id": 60835238, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4", - "html_url": "https:\/\/github.com\/Praison001", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Praison001\/CVE-2024-4879-ServiceNow", - "description": "Exploit for CVE-2024-4879 affecting Vancouver, Washington DC Now and Utah Platform releases", - "fork": false, - "created_at": "2024-07-16T04:03:28Z", - "updated_at": "2024-07-16T04:27:47Z", - "pushed_at": "2024-07-16T04:26:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 834723031, - "name": "CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning", - "full_name": "NoTsPepino\/CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning", - "owner": { - "login": "NoTsPepino", - "id": 107086092, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107086092?v=4", - "html_url": "https:\/\/github.com\/NoTsPepino", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/NoTsPepino\/CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning", - "description": "CVE-2024-4879 & CVE-2024-5217 ServiceNow RCE Scanning Using Nuclei & Shodan Dork to find it.", - "fork": false, - "created_at": "2024-07-28T06:51:33Z", - "updated_at": "2024-08-07T14:31:30Z", - "pushed_at": "2024-08-03T03:09:56Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 842345831, - "name": "CVE-2024-4879", - "full_name": "jdusane\/CVE-2024-4879", - "owner": { - "login": "jdusane", - "id": 16679951, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16679951?v=4", - "html_url": "https:\/\/github.com\/jdusane", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/jdusane\/CVE-2024-4879", - "description": "Python script designed to detect specific vulnerabilities in ServiceNow instances and dump database connection details if the vulnerability is found. This tool is particularly useful for security researchers and penetration testers.", - "fork": false, - "created_at": "2024-08-14T06:55:41Z", - "updated_at": "2024-08-14T07:00:05Z", - "pushed_at": "2024-08-14T07:00:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 848057101, "name": "CVE-2024-4879", diff --git a/2024/CVE-2024-4883.json b/2024/CVE-2024-4883.json deleted file mode 100644 index e8d86a72bc..0000000000 --- a/2024/CVE-2024-4883.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 825745361, - "name": "CVE-2024-4883", - "full_name": "sinsinology\/CVE-2024-4883", - "owner": { - "login": "sinsinology", - "id": 77316200, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77316200?v=4", - "html_url": "https:\/\/github.com\/sinsinology", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/sinsinology\/CVE-2024-4883", - "description": "Exploit for CVE-2024-4883", - "fork": false, - "created_at": "2024-07-08T12:14:01Z", - "updated_at": "2024-12-28T12:42:55Z", - "pushed_at": "2024-07-08T12:14:18Z", - "stargazers_count": 9, - "watchers_count": 9, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 9, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-4885.json b/2024/CVE-2024-4885.json deleted file mode 100644 index ac3f0fed0e..0000000000 --- a/2024/CVE-2024-4885.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 825745644, - "name": "CVE-2024-4885", - "full_name": "sinsinology\/CVE-2024-4885", - "owner": { - "login": "sinsinology", - "id": 77316200, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77316200?v=4", - "html_url": "https:\/\/github.com\/sinsinology", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/sinsinology\/CVE-2024-4885", - "description": "Exploit for CVE-2024-4885", - "fork": false, - "created_at": "2024-07-08T12:14:42Z", - "updated_at": "2024-12-28T12:42:54Z", - "pushed_at": "2024-07-08T12:15:00Z", - "stargazers_count": 15, - "watchers_count": 15, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 6, - "watchers": 15, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-48914.json b/2024/CVE-2024-48914.json deleted file mode 100644 index f05a37340e..0000000000 --- a/2024/CVE-2024-48914.json +++ /dev/null @@ -1,41 +0,0 @@ -[ - { - "id": 876045350, - "name": "CVE-2024-48914", - "full_name": "EQSTLab\/CVE-2024-48914", - "owner": { - "login": "EQSTLab", - "id": 148991397, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148991397?v=4", - "html_url": "https:\/\/github.com\/EQSTLab", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/EQSTLab\/CVE-2024-48914", - "description": "PoC for CVE-2024-48914", - "fork": false, - "created_at": "2024-10-21T10:02:05Z", - "updated_at": "2024-11-20T16:31:08Z", - "pushed_at": "2024-10-21T10:50:16Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "exploit", - "poc", - "proof-of-concept", - "security", - "typescript", - "vulnerability" - ], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-48955.json b/2024/CVE-2024-48955.json deleted file mode 100644 index 1bba542e48..0000000000 --- a/2024/CVE-2024-48955.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 880290163, - "name": "CVE-2024-48955_Overview", - "full_name": "BrotherOfJhonny\/CVE-2024-48955_Overview", - "owner": { - "login": "BrotherOfJhonny", - "id": 28454566, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28454566?v=4", - "html_url": "https:\/\/github.com\/BrotherOfJhonny", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/BrotherOfJhonny\/CVE-2024-48955_Overview", - "description": "CVE-2024-48955_Overview", - "fork": false, - "created_at": "2024-10-29T13:14:19Z", - "updated_at": "2024-10-29T13:32:43Z", - "pushed_at": "2024-10-29T13:32:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-48990.json b/2024/CVE-2024-48990.json deleted file mode 100644 index 34c01449e8..0000000000 --- a/2024/CVE-2024-48990.json +++ /dev/null @@ -1,281 +0,0 @@ -[ - { - "id": 891671184, - "name": "CVE-2024-48990-PoC", - "full_name": "makuga01\/CVE-2024-48990-PoC", - "owner": { - "login": "makuga01", - "id": 20490978, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20490978?v=4", - "html_url": "https:\/\/github.com\/makuga01", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/makuga01\/CVE-2024-48990-PoC", - "description": "PoC for CVE-2024-48990", - "fork": false, - "created_at": "2024-11-20T18:41:25Z", - "updated_at": "2025-01-14T05:01:22Z", - "pushed_at": "2024-11-20T18:49:33Z", - "stargazers_count": 95, - "watchers_count": 95, - "has_discussions": false, - "forks_count": 18, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 18, - "watchers": 95, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 892345016, - "name": "CVE-2024-48990", - "full_name": "ns989\/CVE-2024-48990", - "owner": { - "login": "ns989", - "id": 75913553, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75913553?v=4", - "html_url": "https:\/\/github.com\/ns989", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ns989\/CVE-2024-48990", - "description": "Exploit for CVE-2024-48990 (Local Privilege Escalation in needrestart < 3.8)", - "fork": false, - "created_at": "2024-11-21T23:59:49Z", - "updated_at": "2024-12-11T19:06:31Z", - "pushed_at": "2024-11-22T01:17:00Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 892744239, - "name": "CVE-2024-48990", - "full_name": "felmoltor\/CVE-2024-48990", - "owner": { - "login": "felmoltor", - "id": 846513, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/846513?v=4", - "html_url": "https:\/\/github.com\/felmoltor", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/felmoltor\/CVE-2024-48990", - "description": "Qualys needsrestart vulnerability CVE-2024-48990", - "fork": false, - "created_at": "2024-11-22T17:35:58Z", - "updated_at": "2024-11-22T18:32:05Z", - "pushed_at": "2024-11-22T17:41:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 893279532, - "name": "CVE-2024-48990-PoC", - "full_name": "Cyb3rFr0g\/CVE-2024-48990-PoC", - "owner": { - "login": "Cyb3rFr0g", - "id": 65209938, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65209938?v=4", - "html_url": "https:\/\/github.com\/Cyb3rFr0g", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Cyb3rFr0g\/CVE-2024-48990-PoC", - "description": "My take on the needrestart Python CVE-2024-48990", - "fork": false, - "created_at": "2024-11-24T02:12:36Z", - "updated_at": "2024-11-25T09:01:21Z", - "pushed_at": "2024-11-24T02:32:54Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 893347321, - "name": "CVE-2024-48990-PoC-Testing", - "full_name": "pentestfunctions\/CVE-2024-48990-PoC-Testing", - "owner": { - "login": "pentestfunctions", - "id": 144001335, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144001335?v=4", - "html_url": "https:\/\/github.com\/pentestfunctions", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/pentestfunctions\/CVE-2024-48990-PoC-Testing", - "description": "Testing POC for use cases", - "fork": false, - "created_at": "2024-11-24T07:33:06Z", - "updated_at": "2024-12-25T00:47:09Z", - "pushed_at": "2024-11-24T07:56:49Z", - "stargazers_count": 11, - "watchers_count": 11, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 11, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 893730273, - "name": "CVE-2024-48990-Exploit", - "full_name": "ally-petitt\/CVE-2024-48990-Exploit", - "owner": { - "login": "ally-petitt", - "id": 76501220, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76501220?v=4", - "html_url": "https:\/\/github.com\/ally-petitt", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ally-petitt\/CVE-2024-48990-Exploit", - "description": "My exploit for CVE-2024-48990. Full details of how I made this are on my blog.", - "fork": false, - "created_at": "2024-11-25T05:28:20Z", - "updated_at": "2025-01-03T08:30:08Z", - "pushed_at": "2024-11-25T05:29:10Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 896921908, - "name": "CVE-2024-48990", - "full_name": "r0xdeadbeef\/CVE-2024-48990", - "owner": { - "login": "r0xdeadbeef", - "id": 65211256, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65211256?v=4", - "html_url": "https:\/\/github.com\/r0xdeadbeef", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/r0xdeadbeef\/CVE-2024-48990", - "description": "Needrestart, prior to version 3.8, contains a vulnerability that allows local attackers to execute arbitrary code with root privileges. This is achieved by manipulating the PYTHONPATH environment variable to trick needrestart into running the Python interpreter in an unsafe context.", - "fork": false, - "created_at": "2024-12-01T16:26:44Z", - "updated_at": "2024-12-02T17:27:46Z", - "pushed_at": "2024-12-01T16:27:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 900576461, - "name": "CVE-2024-48990", - "full_name": "CyberCrowCC\/CVE-2024-48990", - "owner": { - "login": "CyberCrowCC", - "id": 191075374, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/191075374?v=4", - "html_url": "https:\/\/github.com\/CyberCrowCC", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/CyberCrowCC\/CVE-2024-48990", - "description": null, - "fork": false, - "created_at": "2024-12-09T04:28:40Z", - "updated_at": "2024-12-09T04:29:22Z", - "pushed_at": "2024-12-09T04:29:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 905043391, - "name": "CVE-2024-48990", - "full_name": "NullByte-7w7\/CVE-2024-48990", - "owner": { - "login": "NullByte-7w7", - "id": 121623691, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121623691?v=4", - "html_url": "https:\/\/github.com\/NullByte-7w7", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/NullByte-7w7\/CVE-2024-48990", - "description": null, - "fork": false, - "created_at": "2024-12-18T03:39:57Z", - "updated_at": "2024-12-19T18:16:50Z", - "pushed_at": "2024-12-19T18:16:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-49039.json b/2024/CVE-2024-49039.json deleted file mode 100644 index 684c3316c3..0000000000 --- a/2024/CVE-2024-49039.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 890829788, - "name": "WPTaskScheduler_CVE-2024-49039", - "full_name": "je5442804\/WPTaskScheduler_CVE-2024-49039", - "owner": { - "login": "je5442804", - "id": 41533878, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41533878?v=4", - "html_url": "https:\/\/github.com\/je5442804", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/je5442804\/WPTaskScheduler_CVE-2024-49039", - "description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler", - "fork": false, - "created_at": "2024-11-19T08:57:18Z", - "updated_at": "2025-01-14T08:09:16Z", - "pushed_at": "2024-11-19T09:15:26Z", - "stargazers_count": 119, - "watchers_count": 119, - "has_discussions": false, - "forks_count": 23, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 23, - "watchers": 119, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 904220023, - "name": "CVE-2024-49039", - "full_name": "Alexandr-bit253\/CVE-2024-49039", - "owner": { - "login": "Alexandr-bit253", - "id": 102812557, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102812557?v=4", - "html_url": "https:\/\/github.com\/Alexandr-bit253", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Alexandr-bit253\/CVE-2024-49039", - "description": null, - "fork": false, - "created_at": "2024-12-16T13:25:56Z", - "updated_at": "2024-12-17T03:30:47Z", - "pushed_at": "2024-12-16T13:28:19Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-49112.json b/2024/CVE-2024-49112.json deleted file mode 100644 index 644b3eddc9..0000000000 --- a/2024/CVE-2024-49112.json +++ /dev/null @@ -1,95 +0,0 @@ -[ - { - "id": 904227549, - "name": "poc_monitor", - "full_name": "tnkr\/poc_monitor", - "owner": { - "login": "tnkr", - "id": 24298003, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24298003?v=4", - "html_url": "https:\/\/github.com\/tnkr", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/tnkr\/poc_monitor", - "description": "A short scraper looking for a POC of CVE-2024-49112", - "fork": false, - "created_at": "2024-12-16T13:41:40Z", - "updated_at": "2025-01-03T19:33:51Z", - "pushed_at": "2024-12-16T19:35:02Z", - "stargazers_count": 13, - "watchers_count": 13, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 13, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 911216391, - "name": "CVE-2024-49112", - "full_name": "CCIEVoice2009\/CVE-2024-49112", - "owner": { - "login": "CCIEVoice2009", - "id": 71173516, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71173516?v=4", - "html_url": "https:\/\/github.com\/CCIEVoice2009", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/CCIEVoice2009\/CVE-2024-49112", - "description": null, - "fork": false, - "created_at": "2025-01-02T14:02:33Z", - "updated_at": "2025-01-09T15:13:50Z", - "pushed_at": "2025-01-02T14:04:01Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 913597480, - "name": "CVE-2024-49112-PoC", - "full_name": "bo0l3an\/CVE-2024-49112-PoC", - "owner": { - "login": "bo0l3an", - "id": 194175693, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/194175693?v=4", - "html_url": "https:\/\/github.com\/bo0l3an", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/bo0l3an\/CVE-2024-49112-PoC", - "description": "CVE-2024-49112 LDAP RCE PoC and Metasploit Module", - "fork": false, - "created_at": "2025-01-08T01:56:41Z", - "updated_at": "2025-01-14T15:20:53Z", - "pushed_at": "2025-01-11T05:59:00Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-49113.json b/2024/CVE-2024-49113.json deleted file mode 100644 index 1a0a0edae1..0000000000 --- a/2024/CVE-2024-49113.json +++ /dev/null @@ -1,95 +0,0 @@ -[ - { - "id": 910842302, - "name": "CVE-2024-49113", - "full_name": "SafeBreach-Labs\/CVE-2024-49113", - "owner": { - "login": "SafeBreach-Labs", - "id": 19378730, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19378730?v=4", - "html_url": "https:\/\/github.com\/SafeBreach-Labs", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/SafeBreach-Labs\/CVE-2024-49113", - "description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113", - "fork": false, - "created_at": "2025-01-01T15:48:38Z", - "updated_at": "2025-01-14T06:46:21Z", - "pushed_at": "2025-01-02T16:07:23Z", - "stargazers_count": 442, - "watchers_count": 442, - "has_discussions": false, - "forks_count": 104, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 104, - "watchers": 442, - "score": 0, - "subscribers_count": 3 - }, - { - "id": 911503737, - "name": "CVE-2024-49113-Checker", - "full_name": "barcrange\/CVE-2024-49113-Checker", - "owner": { - "login": "barcrange", - "id": 83610130, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83610130?v=4", - "html_url": "https:\/\/github.com\/barcrange", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/barcrange\/CVE-2024-49113-Checker", - "description": null, - "fork": false, - "created_at": "2025-01-03T07:05:33Z", - "updated_at": "2025-01-14T18:05:52Z", - "pushed_at": "2025-01-03T08:20:03Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 8, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 912790659, - "name": "CVE-2024-49113-Checker", - "full_name": "Sachinart\/CVE-2024-49113-Checker", - "owner": { - "login": "Sachinart", - "id": 18497191, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18497191?v=4", - "html_url": "https:\/\/github.com\/Sachinart", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Sachinart\/CVE-2024-49113-Checker", - "description": "Hi, This is to check targets vulnerable for CVE-2024-49113 in bulk, faster.", - "fork": false, - "created_at": "2025-01-06T11:59:02Z", - "updated_at": "2025-01-13T09:53:19Z", - "pushed_at": "2025-01-06T12:04:02Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-49117.json b/2024/CVE-2024-49117.json deleted file mode 100644 index 1a11ee8cc8..0000000000 --- a/2024/CVE-2024-49117.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 904940803, - "name": "Microsoft-2024-December-Update-Control", - "full_name": "mutkus\/Microsoft-2024-December-Update-Control", - "owner": { - "login": "mutkus", - "id": 4324026, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4324026?v=4", - "html_url": "https:\/\/github.com\/mutkus", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/mutkus\/Microsoft-2024-December-Update-Control", - "description": "Microsoft Windows işletim sistemlerinde ki CVE-2024-49117, CVE-2024-49118, CVE-2024-49122 ve CVE-2024-49124 açıkları için KB kontrolü", - "fork": false, - "created_at": "2024-12-17T21:03:12Z", - "updated_at": "2024-12-17T21:21:36Z", - "pushed_at": "2024-12-17T21:21:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-49203.json b/2024/CVE-2024-49203.json deleted file mode 100644 index e7b0e32af4..0000000000 --- a/2024/CVE-2024-49203.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 869521489, - "name": "CVE-2024-49203", - "full_name": "CSIRTTrizna\/CVE-2024-49203", - "owner": { - "login": "CSIRTTrizna", - "id": 170928596, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170928596?v=4", - "html_url": "https:\/\/github.com\/CSIRTTrizna", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/CSIRTTrizna\/CVE-2024-49203", - "description": null, - "fork": false, - "created_at": "2024-10-08T12:42:59Z", - "updated_at": "2024-11-21T12:13:41Z", - "pushed_at": "2024-11-21T12:13:37Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-49328.json b/2024/CVE-2024-49328.json deleted file mode 100644 index 22fccb6755..0000000000 --- a/2024/CVE-2024-49328.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 884373508, - "name": "CVE-2024-49328", - "full_name": "RandomRobbieBF\/CVE-2024-49328", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-49328", - "description": "WP REST API FNS <= 1.0.0 - Privilege Escalation", - "fork": false, - "created_at": "2024-11-06T16:25:59Z", - "updated_at": "2024-12-03T07:30:32Z", - "pushed_at": "2024-11-06T16:28:46Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 5, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 915393828, - "name": "CVE-2024-49328-exploit", - "full_name": "Nxploited\/CVE-2024-49328-exploit", - "owner": { - "login": "Nxploited", - "id": 188819918, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4", - "html_url": "https:\/\/github.com\/Nxploited", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-49328-exploit", - "description": null, - "fork": false, - "created_at": "2025-01-11T18:22:25Z", - "updated_at": "2025-01-11T20:36:44Z", - "pushed_at": "2025-01-11T20:36:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-49368.json b/2024/CVE-2024-49368.json deleted file mode 100644 index 4c6f4cf1d2..0000000000 --- a/2024/CVE-2024-49368.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 887035757, - "name": "CVE-2024-49368", - "full_name": "Aashay221999\/CVE-2024-49368", - "owner": { - "login": "Aashay221999", - "id": 43607208, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43607208?v=4", - "html_url": "https:\/\/github.com\/Aashay221999", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Aashay221999\/CVE-2024-49368", - "description": "Explorations of CVE-2024-49368 + Exploit Development", - "fork": false, - "created_at": "2024-11-12T03:50:46Z", - "updated_at": "2024-11-12T03:56:07Z", - "pushed_at": "2024-11-12T03:56:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-49369.json b/2024/CVE-2024-49369.json deleted file mode 100644 index 00ffc72b9c..0000000000 --- a/2024/CVE-2024-49369.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 895937915, - "name": "CVE-2024-49369", - "full_name": "Quantum-Sicarius\/CVE-2024-49369", - "owner": { - "login": "Quantum-Sicarius", - "id": 1269538, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1269538?v=4", - "html_url": "https:\/\/github.com\/Quantum-Sicarius", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Quantum-Sicarius\/CVE-2024-49369", - "description": null, - "fork": false, - "created_at": "2024-11-29T08:14:03Z", - "updated_at": "2024-12-11T14:18:34Z", - "pushed_at": "2024-12-11T14:18:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-49379.json b/2024/CVE-2024-49379.json deleted file mode 100644 index 2fa0edc9cc..0000000000 --- a/2024/CVE-2024-49379.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 889610570, - "name": "CVE-2024-49379", - "full_name": "OHDUDEOKNICE\/CVE-2024-49379", - "owner": { - "login": "OHDUDEOKNICE", - "id": 38146523, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38146523?v=4", - "html_url": "https:\/\/github.com\/OHDUDEOKNICE", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/OHDUDEOKNICE\/CVE-2024-49379", - "description": "CVE-2024-49379 PoC", - "fork": false, - "created_at": "2024-11-16T19:05:28Z", - "updated_at": "2024-11-20T16:31:11Z", - "pushed_at": "2024-11-16T19:31:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-4956.json b/2024/CVE-2024-4956.json index 22993706a0..97ddd416ed 100644 --- a/2024/CVE-2024-4956.json +++ b/2024/CVE-2024-4956.json @@ -491,67 +491,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 867826963, - "name": "shirocrack", - "full_name": "An00bRektn\/shirocrack", - "owner": { - "login": "An00bRektn", - "id": 58986498, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58986498?v=4", - "html_url": "https:\/\/github.com\/An00bRektn", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/An00bRektn\/shirocrack", - "description": "Simple hash cracker for Apache Shiro hashes written in Golang. Useful for exploiting CVE-2024-4956.", - "fork": false, - "created_at": "2024-10-04T19:54:05Z", - "updated_at": "2024-12-06T13:38:19Z", - "pushed_at": "2024-10-04T20:38:27Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 902177937, - "name": "cve-2024-4956", - "full_name": "XiaomingX\/cve-2024-4956", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-4956", - "description": "CVE-2024-4956 Python exploitation utility", - "fork": false, - "created_at": "2024-12-12T04:05:10Z", - "updated_at": "2025-01-13T18:15:54Z", - "pushed_at": "2024-12-12T04:07:35Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 4, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-49607.json b/2024/CVE-2024-49607.json deleted file mode 100644 index 112f407e24..0000000000 --- a/2024/CVE-2024-49607.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 885865765, - "name": "CVE-2024-49607", - "full_name": "RandomRobbieBF\/CVE-2024-49607", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-49607", - "description": "WP Dropbox Dropins <= 1.0 - Unauthenticated Arbitrary File Upload", - "fork": false, - "created_at": "2024-11-09T15:46:58Z", - "updated_at": "2025-01-06T13:37:21Z", - "pushed_at": "2024-11-09T15:48:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-49681.json b/2024/CVE-2024-49681.json deleted file mode 100644 index 1ef90c9de3..0000000000 --- a/2024/CVE-2024-49681.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 885857761, - "name": "CVE-2024-49681", - "full_name": "RandomRobbieBF\/CVE-2024-49681", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-49681", - "description": "WP Sessions Time Monitoring Full Automatic <= 1.0.9 - Unauthenticated SQL Injection", - "fork": false, - "created_at": "2024-11-09T15:24:16Z", - "updated_at": "2024-11-14T10:40:35Z", - "pushed_at": "2024-11-09T15:25:29Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 3, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-49699.json b/2024/CVE-2024-49699.json deleted file mode 100644 index e7bc388fb9..0000000000 --- a/2024/CVE-2024-49699.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 914941212, - "name": "CVE-2024-49699", - "full_name": "RandomRobbieBF\/CVE-2024-49699", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-49699", - "description": "ARPrice <= 4.0.3 - Authenticated (Subscriber+) PHP Object Injection", - "fork": false, - "created_at": "2025-01-10T16:15:07Z", - "updated_at": "2025-01-14T12:40:49Z", - "pushed_at": "2025-01-10T16:18:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-5009.json b/2024/CVE-2024-5009.json deleted file mode 100644 index cfdca7b749..0000000000 --- a/2024/CVE-2024-5009.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 825745964, - "name": "CVE-2024-5009", - "full_name": "sinsinology\/CVE-2024-5009", - "owner": { - "login": "sinsinology", - "id": 77316200, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77316200?v=4", - "html_url": "https:\/\/github.com\/sinsinology", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/sinsinology\/CVE-2024-5009", - "description": "Exploit for CVE-2024-5009", - "fork": false, - "created_at": "2024-07-08T12:15:29Z", - "updated_at": "2024-12-28T12:42:58Z", - "pushed_at": "2024-07-08T12:15:41Z", - "stargazers_count": 12, - "watchers_count": 12, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 12, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 826412875, - "name": "CVE-2024-5009", - "full_name": "th3gokul\/CVE-2024-5009", - "owner": { - "login": "th3gokul", - "id": 89386101, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89386101?v=4", - "html_url": "https:\/\/github.com\/th3gokul", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/th3gokul\/CVE-2024-5009", - "description": "CVE-2024-5009 : WhatsUp Gold SetAdminPassword Privilege Escalation", - "fork": false, - "created_at": "2024-07-09T16:56:49Z", - "updated_at": "2024-08-07T04:26:04Z", - "pushed_at": "2024-07-09T17:14:52Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 6, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50251.json b/2024/CVE-2024-50251.json deleted file mode 100644 index 241b5c63c9..0000000000 --- a/2024/CVE-2024-50251.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 887128999, - "name": "CVE-2024-50251-PoC", - "full_name": "slavin-ayu\/CVE-2024-50251-PoC", - "owner": { - "login": "slavin-ayu", - "id": 88360575, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88360575?v=4", - "html_url": "https:\/\/github.com\/slavin-ayu", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/slavin-ayu\/CVE-2024-50251-PoC", - "description": "Just a local Dos bug in Linux kernel", - "fork": false, - "created_at": "2024-11-12T08:08:55Z", - "updated_at": "2024-11-15T07:06:25Z", - "pushed_at": "2024-11-12T08:14:29Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50335.json b/2024/CVE-2024-50335.json deleted file mode 100644 index 72c30a7f1d..0000000000 --- a/2024/CVE-2024-50335.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 884650375, - "name": "CVE-2024-50335", - "full_name": "shellkraft\/CVE-2024-50335", - "owner": { - "login": "shellkraft", - "id": 89618500, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89618500?v=4", - "html_url": "https:\/\/github.com\/shellkraft", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/shellkraft\/CVE-2024-50335", - "description": null, - "fork": false, - "created_at": "2024-11-07T06:19:49Z", - "updated_at": "2024-11-10T11:15:21Z", - "pushed_at": "2024-11-07T06:51:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50340.json b/2024/CVE-2024-50340.json deleted file mode 100644 index 865b2eae13..0000000000 --- a/2024/CVE-2024-50340.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 884497011, - "name": "CVE-2024-50340", - "full_name": "Nyamort\/CVE-2024-50340", - "owner": { - "login": "Nyamort", - "id": 67233336, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67233336?v=4", - "html_url": "https:\/\/github.com\/Nyamort", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Nyamort\/CVE-2024-50340", - "description": null, - "fork": false, - "created_at": "2024-11-06T21:24:43Z", - "updated_at": "2024-11-29T07:45:25Z", - "pushed_at": "2024-11-08T16:39:57Z", - "stargazers_count": 12, - "watchers_count": 12, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 12, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50379.json b/2024/CVE-2024-50379.json deleted file mode 100644 index 8eb4b78211..0000000000 --- a/2024/CVE-2024-50379.json +++ /dev/null @@ -1,343 +0,0 @@ -[ - { - "id": 905424548, - "name": "CVE-2024-50379-POC", - "full_name": "v3153\/CVE-2024-50379-POC", - "owner": { - "login": "v3153", - "id": 93032617, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93032617?v=4", - "html_url": "https:\/\/github.com\/v3153", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/v3153\/CVE-2024-50379-POC", - "description": null, - "fork": false, - "created_at": "2024-12-18T19:53:46Z", - "updated_at": "2024-12-26T18:33:32Z", - "pushed_at": "2024-12-26T15:22:46Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 905529726, - "name": "CVE-2024-50379-POC", - "full_name": "yiliufeng168\/CVE-2024-50379-POC", - "owner": { - "login": "yiliufeng168", - "id": 61577401, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61577401?v=4", - "html_url": "https:\/\/github.com\/yiliufeng168", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/yiliufeng168\/CVE-2024-50379-POC", - "description": null, - "fork": false, - "created_at": "2024-12-19T02:43:18Z", - "updated_at": "2024-12-20T06:58:16Z", - "pushed_at": "2024-12-18T20:18:39Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 1, - "score": 0, - "subscribers_count": 0 - }, - { - "id": 906045424, - "name": "Nuclei-Template-CVE-2024-50379", - "full_name": "JFOZ1010\/Nuclei-Template-CVE-2024-50379", - "owner": { - "login": "JFOZ1010", - "id": 82562585, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82562585?v=4", - "html_url": "https:\/\/github.com\/JFOZ1010", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/JFOZ1010\/Nuclei-Template-CVE-2024-50379", - "description": "Repositorio para alojar un template de Nuclei para probar el CVE-2024-50379 (en fase de prueba)", - "fork": false, - "created_at": "2024-12-20T03:43:47Z", - "updated_at": "2024-12-24T05:07:37Z", - "pushed_at": "2024-12-20T03:54:28Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 906070879, - "name": "CVE-2024-50379-PoC", - "full_name": "iSee857\/CVE-2024-50379-PoC", - "owner": { - "login": "iSee857", - "id": 73977770, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73977770?v=4", - "html_url": "https:\/\/github.com\/iSee857", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/iSee857\/CVE-2024-50379-PoC", - "description": "Apache Tomcat(CVE-2024-50379)条件竞争致远程代码执行漏洞批量检测脚本", - "fork": false, - "created_at": "2024-12-20T05:24:10Z", - "updated_at": "2025-01-13T14:22:11Z", - "pushed_at": "2024-12-20T05:41:23Z", - "stargazers_count": 9, - "watchers_count": 9, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 9, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 906416890, - "name": "CVE-2024-50379", - "full_name": "Alchemist3dot14\/CVE-2024-50379", - "owner": { - "login": "Alchemist3dot14", - "id": 63059909, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63059909?v=4", - "html_url": "https:\/\/github.com\/Alchemist3dot14", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Alchemist3dot14\/CVE-2024-50379", - "description": "CVE-2024-50379 is a critical vulnerability affecting multiple versions of Apache Tomcat, an open source web server and servlet container widely used for deploying Java-based web applications. The vulnerability arises from a Time-of-Use (TOCTOU) race condition that occurs when compiling JavaServer Pages (JSPs).", - "fork": false, - "created_at": "2024-12-20T21:30:49Z", - "updated_at": "2024-12-23T12:04:31Z", - "pushed_at": "2024-12-20T21:55:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 906517672, - "name": "Tomcat-CVE-2024-50379-Poc", - "full_name": "ph0ebus\/Tomcat-CVE-2024-50379-Poc", - "owner": { - "login": "ph0ebus", - "id": 108201283, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108201283?v=4", - "html_url": "https:\/\/github.com\/ph0ebus", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ph0ebus\/Tomcat-CVE-2024-50379-Poc", - "description": "RCE through a race condition in Apache Tomcat", - "fork": false, - "created_at": "2024-12-21T05:54:29Z", - "updated_at": "2025-01-06T16:53:23Z", - "pushed_at": "2024-12-21T08:56:44Z", - "stargazers_count": 47, - "watchers_count": 47, - "has_discussions": false, - "forks_count": 5, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 5, - "watchers": 47, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 907257023, - "name": "CVE-2024-50379", - "full_name": "SleepingBag945\/CVE-2024-50379", - "owner": { - "login": "SleepingBag945", - "id": 100852628, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100852628?v=4", - "html_url": "https:\/\/github.com\/SleepingBag945", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/SleepingBag945\/CVE-2024-50379", - "description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp", - "fork": false, - "created_at": "2024-12-23T07:20:47Z", - "updated_at": "2025-01-14T09:52:58Z", - "pushed_at": "2024-12-23T07:30:27Z", - "stargazers_count": 68, - "watchers_count": 68, - "has_discussions": false, - "forks_count": 16, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 16, - "watchers": 68, - "score": 0, - "subscribers_count": 3 - }, - { - "id": 907408912, - "name": "CVE-2024-50379", - "full_name": "dear-cell\/CVE-2024-50379", - "owner": { - "login": "dear-cell", - "id": 72452338, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72452338?v=4", - "html_url": "https:\/\/github.com\/dear-cell", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/dear-cell\/CVE-2024-50379", - "description": "CVE-2024-50379利用", - "fork": false, - "created_at": "2024-12-23T14:11:46Z", - "updated_at": "2025-01-14T09:50:55Z", - "pushed_at": "2024-12-23T14:13:11Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 908059795, - "name": "CVE-2024-50379-exp", - "full_name": "lizhianyuguangming\/CVE-2024-50379-exp", - "owner": { - "login": "lizhianyuguangming", - "id": 81677104, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81677104?v=4", - "html_url": "https:\/\/github.com\/lizhianyuguangming", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/lizhianyuguangming\/CVE-2024-50379-exp", - "description": "CVE-2024-50379-exp", - "fork": false, - "created_at": "2024-12-25T02:41:31Z", - "updated_at": "2025-01-14T18:05:32Z", - "pushed_at": "2024-12-31T07:11:13Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 7, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 908327097, - "name": "CVE-2024-50379-POC", - "full_name": "dragonked2\/CVE-2024-50379-POC", - "owner": { - "login": "dragonked2", - "id": 66541902, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66541902?v=4", - "html_url": "https:\/\/github.com\/dragonked2", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/dragonked2\/CVE-2024-50379-POC", - "description": "This repository contains a Python script designed to exploit CVE-2024-50379, a vulnerability that allows attackers to upload a JSP shell to a vulnerable server and execute arbitrary commands remotely. This exploit is particularly useful when the \/uploads directory is either unprotected or not present on the target server.", - "fork": false, - "created_at": "2024-12-25T18:42:29Z", - "updated_at": "2025-01-02T13:30:06Z", - "pushed_at": "2024-12-25T19:01:10Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 908364457, - "name": "CVE-2024-50379", - "full_name": "bigb0x\/CVE-2024-50379", - "owner": { - "login": "bigb0x", - "id": 13532434, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4", - "html_url": "https:\/\/github.com\/bigb0x", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-50379", - "description": "Testing the latset Apache Tomcat CVE-2024-50379 Vuln", - "fork": false, - "created_at": "2024-12-25T21:50:16Z", - "updated_at": "2024-12-26T10:31:55Z", - "pushed_at": "2024-12-26T10:31:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50395.json b/2024/CVE-2024-50395.json deleted file mode 100644 index ddf66493c2..0000000000 --- a/2024/CVE-2024-50395.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 893743289, - "name": "CVE-2024-50395", - "full_name": "neko-hat\/CVE-2024-50395", - "owner": { - "login": "neko-hat", - "id": 29542700, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29542700?v=4", - "html_url": "https:\/\/github.com\/neko-hat", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/neko-hat\/CVE-2024-50395", - "description": null, - "fork": false, - "created_at": "2024-11-25T06:06:25Z", - "updated_at": "2024-11-25T22:48:49Z", - "pushed_at": "2024-11-25T06:11:47Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50404.json b/2024/CVE-2024-50404.json deleted file mode 100644 index b1b9798f06..0000000000 --- a/2024/CVE-2024-50404.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 916015819, - "name": "CVE-2024-50404", - "full_name": "C411e\/CVE-2024-50404", - "owner": { - "login": "C411e", - "id": 35147719, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35147719?v=4", - "html_url": "https:\/\/github.com\/C411e", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/C411e\/CVE-2024-50404", - "description": "CVE-2024-50404", - "fork": false, - "created_at": "2025-01-13T09:47:03Z", - "updated_at": "2025-01-13T13:51:03Z", - "pushed_at": "2025-01-13T10:15:12Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50427.json b/2024/CVE-2024-50427.json deleted file mode 100644 index 3532f8b177..0000000000 --- a/2024/CVE-2024-50427.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 885351535, - "name": "CVE-2024-50427", - "full_name": "RandomRobbieBF\/CVE-2024-50427", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50427", - "description": "SurveyJS: Drag & Drop WordPress Form Builder <= 1.9.136 - Authenticated (Subscriber+) Arbitrary File Upload", - "fork": false, - "created_at": "2024-11-08T12:24:06Z", - "updated_at": "2024-11-08T12:26:15Z", - "pushed_at": "2024-11-08T12:26:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50450.json b/2024/CVE-2024-50450.json deleted file mode 100644 index 4dce11c89f..0000000000 --- a/2024/CVE-2024-50450.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 885327071, - "name": "CVE-2024-50450", - "full_name": "RandomRobbieBF\/CVE-2024-50450", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50450", - "description": "WordPress Meta Data and Taxonomies Filter (MDTF) <= 1.3.3.4 - Unauthenticated Arbitrary Shortcode Execution", - "fork": false, - "created_at": "2024-11-08T11:24:16Z", - "updated_at": "2024-11-15T13:26:04Z", - "pushed_at": "2024-11-08T11:25:54Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50473.json b/2024/CVE-2024-50473.json deleted file mode 100644 index 7635dd5611..0000000000 --- a/2024/CVE-2024-50473.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 885717449, - "name": "CVE-2024-50473", - "full_name": "RandomRobbieBF\/CVE-2024-50473", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50473", - "description": "Ajar in5 Embed <= 3.1.3 - Unauthenticated Arbitrary File Upload", - "fork": false, - "created_at": "2024-11-09T07:46:54Z", - "updated_at": "2024-11-09T07:49:13Z", - "pushed_at": "2024-11-09T07:49:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50475.json b/2024/CVE-2024-50475.json deleted file mode 100644 index 2e087bc9ef..0000000000 --- a/2024/CVE-2024-50475.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 883081341, - "name": "CVE-2024-50475", - "full_name": "RandomRobbieBF\/CVE-2024-50475", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50475", - "description": "Signup Page <= 1.0 - Unauthenticated Arbitrary Options Update", - "fork": false, - "created_at": "2024-11-04T10:46:46Z", - "updated_at": "2024-11-04T10:51:54Z", - "pushed_at": "2024-11-04T10:51:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50476.json b/2024/CVE-2024-50476.json deleted file mode 100644 index 54dbf744d6..0000000000 --- a/2024/CVE-2024-50476.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 883044063, - "name": "CVE-2024-50476", - "full_name": "RandomRobbieBF\/CVE-2024-50476", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50476", - "description": "GRÜN spendino Spendenformular <= 1.0.1 - Unauthenticated Arbitrary Options Update", - "fork": false, - "created_at": "2024-11-04T09:30:36Z", - "updated_at": "2024-11-04T09:32:19Z", - "pushed_at": "2024-11-04T09:32:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50477.json b/2024/CVE-2024-50477.json deleted file mode 100644 index a2916dd72d..0000000000 --- a/2024/CVE-2024-50477.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 885488327, - "name": "CVE-2024-50477", - "full_name": "RandomRobbieBF\/CVE-2024-50477", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50477", - "description": "Stacks Mobile App Builder <= 5.2.3 - Authentication Bypass via Account Takeover", - "fork": false, - "created_at": "2024-11-08T17:22:29Z", - "updated_at": "2024-11-08T17:24:37Z", - "pushed_at": "2024-11-08T17:24:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50478.json b/2024/CVE-2024-50478.json deleted file mode 100644 index f064a62441..0000000000 --- a/2024/CVE-2024-50478.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 883959177, - "name": "CVE-2024-50478", - "full_name": "RandomRobbieBF\/CVE-2024-50478", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50478", - "description": "1-Click Login: Passwordless Authentication 1.4.5 - Authentication Bypass via Account Takeover", - "fork": false, - "created_at": "2024-11-05T22:04:55Z", - "updated_at": "2024-11-05T22:06:29Z", - "pushed_at": "2024-11-05T22:06:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50482.json b/2024/CVE-2024-50482.json deleted file mode 100644 index 414cffdb0e..0000000000 --- a/2024/CVE-2024-50482.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 883725552, - "name": "CVE-2024-50482", - "full_name": "RandomRobbieBF\/CVE-2024-50482", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50482", - "description": "Woocommerce Product Design <= 1.0.0 - Unauthenticated Arbitrary File Upload", - "fork": false, - "created_at": "2024-11-05T13:19:05Z", - "updated_at": "2024-11-05T13:21:18Z", - "pushed_at": "2024-11-05T13:21:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50483.json b/2024/CVE-2024-50483.json deleted file mode 100644 index 4330bb40e1..0000000000 --- a/2024/CVE-2024-50483.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 883950955, - "name": "CVE-2024-50483", - "full_name": "RandomRobbieBF\/CVE-2024-50483", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50483", - "description": "Meetup <= 0.1 - Authentication Bypass via Account Takeover", - "fork": false, - "created_at": "2024-11-05T21:38:44Z", - "updated_at": "2024-11-14T10:41:37Z", - "pushed_at": "2024-11-05T21:40:58Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50485.json b/2024/CVE-2024-50485.json deleted file mode 100644 index 7dac23dd75..0000000000 --- a/2024/CVE-2024-50485.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 883716846, - "name": "CVE-2024-50485", - "full_name": "RandomRobbieBF\/CVE-2024-50485", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50485", - "description": "Exam Matrix <= 1.5 - Unauthenticated Privilege Escalation", - "fork": false, - "created_at": "2024-11-05T13:02:28Z", - "updated_at": "2024-11-05T13:03:53Z", - "pushed_at": "2024-11-05T13:03:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50488.json b/2024/CVE-2024-50488.json deleted file mode 100644 index 1ca20ef666..0000000000 --- a/2024/CVE-2024-50488.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 885769222, - "name": "CVE-2024-50488", - "full_name": "RandomRobbieBF\/CVE-2024-50488", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50488", - "description": "Token Login <= 1.0.3 - Authenticated (Subscriber+) Privilege Escalation", - "fork": false, - "created_at": "2024-11-09T10:54:06Z", - "updated_at": "2024-11-09T10:58:33Z", - "pushed_at": "2024-11-09T10:56:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50490.json b/2024/CVE-2024-50490.json deleted file mode 100644 index f74719f557..0000000000 --- a/2024/CVE-2024-50490.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 883699871, - "name": "CVE-2024-50490", - "full_name": "RandomRobbieBF\/CVE-2024-50490", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50490", - "description": "PegaPoll <= 1.0.2 - Unauthenticated Arbitrary Options Update", - "fork": false, - "created_at": "2024-11-05T12:27:41Z", - "updated_at": "2024-11-05T12:29:25Z", - "pushed_at": "2024-11-05T12:29:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50491.json b/2024/CVE-2024-50491.json deleted file mode 100644 index bf70b6c134..0000000000 --- a/2024/CVE-2024-50491.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 915564003, - "name": "CVE-2024-50491", - "full_name": "RandomRobbieBF\/CVE-2024-50491", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50491", - "description": "RSVP ME <= 1.9.9 - Unauthenticated SQL Injection", - "fork": false, - "created_at": "2025-01-12T07:26:48Z", - "updated_at": "2025-01-14T12:40:35Z", - "pushed_at": "2025-01-12T07:27:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50493.json b/2024/CVE-2024-50493.json deleted file mode 100644 index 8777841d4f..0000000000 --- a/2024/CVE-2024-50493.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 886111060, - "name": "CVE-2024-50493", - "full_name": "RandomRobbieBF\/CVE-2024-50493", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50493", - "description": "Automatic Translation <= 1.0.4 - Unauthenticated Arbitrary File Upload", - "fork": false, - "created_at": "2024-11-10T08:17:41Z", - "updated_at": "2024-11-10T08:18:31Z", - "pushed_at": "2024-11-10T08:18:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50498.json b/2024/CVE-2024-50498.json deleted file mode 100644 index 7354dc24ea..0000000000 --- a/2024/CVE-2024-50498.json +++ /dev/null @@ -1,95 +0,0 @@ -[ - { - "id": 883392821, - "name": "CVE-2024-50498", - "full_name": "RandomRobbieBF\/CVE-2024-50498", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50498", - "description": "WP Query Console <= 1.0 - Unauthenticated Remote Code Execution", - "fork": false, - "created_at": "2024-11-04T22:13:45Z", - "updated_at": "2024-11-18T22:09:19Z", - "pushed_at": "2024-11-04T22:15:03Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 898207911, - "name": "CVE-2024-50498", - "full_name": "p0et08\/CVE-2024-50498", - "owner": { - "login": "p0et08", - "id": 173439951, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173439951?v=4", - "html_url": "https:\/\/github.com\/p0et08", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/p0et08\/CVE-2024-50498", - "description": "This is a exploit for CVE-2024-50498", - "fork": false, - "created_at": "2024-12-04T01:30:19Z", - "updated_at": "2024-12-05T04:31:51Z", - "pushed_at": "2024-12-04T02:12:41Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 911806172, - "name": "CVE-2024-50498", - "full_name": "Nxploited\/CVE-2024-50498", - "owner": { - "login": "Nxploited", - "id": 188819918, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4", - "html_url": "https:\/\/github.com\/Nxploited", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-50498", - "description": null, - "fork": false, - "created_at": "2025-01-03T22:36:43Z", - "updated_at": "2025-01-03T22:53:12Z", - "pushed_at": "2025-01-03T22:53:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50507.json b/2024/CVE-2024-50507.json deleted file mode 100644 index e4c407a032..0000000000 --- a/2024/CVE-2024-50507.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 904385732, - "name": "CVE-2024-50507", - "full_name": "RandomRobbieBF\/CVE-2024-50507", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50507", - "description": "DS.DownloadList <= 1.3 - Unauthenticated PHP Object Injection", - "fork": false, - "created_at": "2024-12-16T19:36:26Z", - "updated_at": "2025-01-06T13:39:56Z", - "pushed_at": "2024-12-16T19:36:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50508.json b/2024/CVE-2024-50508.json deleted file mode 100644 index 8d3ac85846..0000000000 --- a/2024/CVE-2024-50508.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 904394229, - "name": "CVE-2024-50508", - "full_name": "RandomRobbieBF\/CVE-2024-50508", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50508", - "description": "Woocommerce Product Design <= 1.0.0 - Unauthenticated Arbitrary File Download", - "fork": false, - "created_at": "2024-12-16T20:00:24Z", - "updated_at": "2025-01-06T13:20:46Z", - "pushed_at": "2024-12-16T20:00:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50509.json b/2024/CVE-2024-50509.json deleted file mode 100644 index c71aff26a2..0000000000 --- a/2024/CVE-2024-50509.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 904378470, - "name": "CVE-2024-50509", - "full_name": "RandomRobbieBF\/CVE-2024-50509", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50509", - "description": "Woocommerce Product Design <= 1.0.0 - Unauthenticated Arbitrary File Deletion", - "fork": false, - "created_at": "2024-12-16T19:17:07Z", - "updated_at": "2024-12-17T11:02:40Z", - "pushed_at": "2024-12-16T19:53:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50510.json b/2024/CVE-2024-50510.json deleted file mode 100644 index a3b07d1d10..0000000000 --- a/2024/CVE-2024-50510.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 904399683, - "name": "CVE-2024-50510", - "full_name": "RandomRobbieBF\/CVE-2024-50510", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50510", - "description": "AR For Woocommerce <= 6.2 - Unauthenticated Arbitrary File Upload", - "fork": false, - "created_at": "2024-12-16T20:15:56Z", - "updated_at": "2025-01-06T13:19:35Z", - "pushed_at": "2024-12-16T21:28:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-5057.json b/2024/CVE-2024-5057.json deleted file mode 100644 index cfaa0592b3..0000000000 --- a/2024/CVE-2024-5057.json +++ /dev/null @@ -1,40 +0,0 @@ -[ - { - "id": 914571680, - "name": "poc-cve", - "full_name": "bash3rt3am\/poc-cve", - "owner": { - "login": "bash3rt3am", - "id": 194431326, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/194431326?v=4", - "html_url": "https:\/\/github.com\/bash3rt3am", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/bash3rt3am\/poc-cve", - "description": "cve-2019-11248 cve-2020-1938 cve-2001-1473 cve-2021-31755 cve-2023-21716 cve-2024-5057", - "fork": false, - "created_at": "2025-01-09T21:26:22Z", - "updated_at": "2025-01-10T11:26:32Z", - "pushed_at": "2025-01-10T11:25:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2001-1473", - "cve-2019-11248", - "cve-2020-1938", - "cve-2021-31755", - "cve-2023-21716", - "cve-2024-5057" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50603.json b/2024/CVE-2024-50603.json deleted file mode 100644 index 8b0035cb0e..0000000000 --- a/2024/CVE-2024-50603.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 913813364, - "name": "CVE-2024-50603", - "full_name": "newlinesec\/CVE-2024-50603", - "owner": { - "login": "newlinesec", - "id": 194232279, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/194232279?v=4", - "html_url": "https:\/\/github.com\/newlinesec", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/newlinesec\/CVE-2024-50603", - "description": "CVE-2024-50603-nuclei-poc", - "fork": false, - "created_at": "2025-01-08T12:00:38Z", - "updated_at": "2025-01-10T20:45:22Z", - "pushed_at": "2025-01-08T12:08:46Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 915623176, - "name": "CVE-2024-50603", - "full_name": "th3gokul\/CVE-2024-50603", - "owner": { - "login": "th3gokul", - "id": 89386101, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89386101?v=4", - "html_url": "https:\/\/github.com\/th3gokul", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/th3gokul\/CVE-2024-50603", - "description": "CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injection", - "fork": false, - "created_at": "2025-01-12T11:20:21Z", - "updated_at": "2025-01-13T16:47:29Z", - "pushed_at": "2025-01-12T16:35:36Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 7, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50623.json b/2024/CVE-2024-50623.json deleted file mode 100644 index 3d36852943..0000000000 --- a/2024/CVE-2024-50623.json +++ /dev/null @@ -1,101 +0,0 @@ -[ - { - "id": 901898206, - "name": "CVE-2024-50623", - "full_name": "watchtowrlabs\/CVE-2024-50623", - "owner": { - "login": "watchtowrlabs", - "id": 99977116, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99977116?v=4", - "html_url": "https:\/\/github.com\/watchtowrlabs", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/watchtowrlabs\/CVE-2024-50623", - "description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)", - "fork": false, - "created_at": "2024-12-11T14:19:55Z", - "updated_at": "2025-01-08T08:14:00Z", - "pushed_at": "2024-12-11T14:23:19Z", - "stargazers_count": 20, - "watchers_count": 20, - "has_discussions": false, - "forks_count": 7, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 7, - "watchers": 20, - "score": 0, - "subscribers_count": 0 - }, - { - "id": 907288727, - "name": "CVE-2024-50623", - "full_name": "verylazytech\/CVE-2024-50623", - "owner": { - "login": "verylazytech", - "id": 172168670, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4", - "html_url": "https:\/\/github.com\/verylazytech", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/verylazytech\/CVE-2024-50623", - "description": "CVE-2024-50623 POC - Cleo Unrestricted file upload and download", - "fork": false, - "created_at": "2024-12-23T08:52:23Z", - "updated_at": "2025-01-10T11:12:43Z", - "pushed_at": "2024-12-23T09:16:15Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cleo", - "cve-2024-50623", - "file-upload", - "lfi-exploitation", - "rce-exploit" - ], - "visibility": "public", - "forks": 4, - "watchers": 5, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 910411215, - "name": "Cleo-CVE-2024-50623-PoC", - "full_name": "iSee857\/Cleo-CVE-2024-50623-PoC", - "owner": { - "login": "iSee857", - "id": 73977770, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73977770?v=4", - "html_url": "https:\/\/github.com\/iSee857", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/iSee857\/Cleo-CVE-2024-50623-PoC", - "description": "Cleo 远程代码执行漏洞批量检测脚本(CVE-2024-50623)", - "fork": false, - "created_at": "2024-12-31T07:43:48Z", - "updated_at": "2025-01-09T16:33:37Z", - "pushed_at": "2024-12-31T07:46:50Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50633.json b/2024/CVE-2024-50633.json deleted file mode 100644 index 369382b3e5..0000000000 --- a/2024/CVE-2024-50633.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 914780140, - "name": "CVE-2024-50633", - "full_name": "cetinbaldwin\/CVE-2024-50633", - "owner": { - "login": "cetinbaldwin", - "id": 194469932, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/194469932?v=4", - "html_url": "https:\/\/github.com\/cetinbaldwin", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/cetinbaldwin\/CVE-2024-50633", - "description": null, - "fork": false, - "created_at": "2025-01-10T09:40:53Z", - "updated_at": "2025-01-10T11:08:27Z", - "pushed_at": "2025-01-10T11:08:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50657.json b/2024/CVE-2024-50657.json deleted file mode 100644 index 9d9b2c850e..0000000000 --- a/2024/CVE-2024-50657.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 888839263, - "name": "CVE-2024-50657", - "full_name": "SAHALLL\/CVE-2024-50657", - "owner": { - "login": "SAHALLL", - "id": 90813381, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90813381?v=4", - "html_url": "https:\/\/github.com\/SAHALLL", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/SAHALLL\/CVE-2024-50657", - "description": null, - "fork": false, - "created_at": "2024-11-15T05:22:27Z", - "updated_at": "2024-11-16T04:12:32Z", - "pushed_at": "2024-11-16T04:12:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50677.json b/2024/CVE-2024-50677.json deleted file mode 100644 index 2d86e42f0f..0000000000 --- a/2024/CVE-2024-50677.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 899289654, - "name": "CVE-2024-50677", - "full_name": "ZumiYumi\/CVE-2024-50677", - "owner": { - "login": "ZumiYumi", - "id": 150757931, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150757931?v=4", - "html_url": "https:\/\/github.com\/ZumiYumi", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ZumiYumi\/CVE-2024-50677", - "description": "This repository presents a proof-of-concept of CVE-2024-50677", - "fork": false, - "created_at": "2024-12-06T01:04:44Z", - "updated_at": "2024-12-07T22:39:19Z", - "pushed_at": "2024-12-07T22:39:16Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50803.json b/2024/CVE-2024-50803.json deleted file mode 100644 index 4d2bf4f414..0000000000 --- a/2024/CVE-2024-50803.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 889129803, - "name": "CVE-2024-50803-Redaxo", - "full_name": "Praison001\/CVE-2024-50803-Redaxo", - "owner": { - "login": "Praison001", - "id": 60835238, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4", - "html_url": "https:\/\/github.com\/Praison001", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Praison001\/CVE-2024-50803-Redaxo", - "description": "Stored XSS in mediapool feature of Redaxo", - "fork": false, - "created_at": "2024-11-15T17:05:04Z", - "updated_at": "2024-11-19T17:56:09Z", - "pushed_at": "2024-11-19T17:56:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50804.json b/2024/CVE-2024-50804.json deleted file mode 100644 index e512e77779..0000000000 --- a/2024/CVE-2024-50804.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 883225767, - "name": "CVE-2024-50804", - "full_name": "g3tsyst3m\/CVE-2024-50804", - "owner": { - "login": "g3tsyst3m", - "id": 19558280, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19558280?v=4", - "html_url": "https:\/\/github.com\/g3tsyst3m", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/g3tsyst3m\/CVE-2024-50804", - "description": "MSI Center Pro 2.1.37.0 - CVE-2024-50804", - "fork": false, - "created_at": "2024-11-04T15:38:19Z", - "updated_at": "2024-11-19T01:50:51Z", - "pushed_at": "2024-11-16T18:17:13Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-5084.json b/2024/CVE-2024-5084.json index 70a0792fbf..3257c68f0b 100644 --- a/2024/CVE-2024-5084.json +++ b/2024/CVE-2024-5084.json @@ -100,98 +100,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 823453279, - "name": "CVE-2024-5084", - "full_name": "WOOOOONG\/CVE-2024-5084", - "owner": { - "login": "WOOOOONG", - "id": 40143329, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40143329?v=4", - "html_url": "https:\/\/github.com\/WOOOOONG", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/WOOOOONG\/CVE-2024-5084", - "description": "PoC Exploit for CVE-2024-5084", - "fork": false, - "created_at": "2024-07-03T04:24:43Z", - "updated_at": "2024-07-03T04:25:23Z", - "pushed_at": "2024-07-03T04:24:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 891893726, - "name": "CVE-2024-5084", - "full_name": "z1gazaga\/CVE-2024-5084", - "owner": { - "login": "z1gazaga", - "id": 121556738, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121556738?v=4", - "html_url": "https:\/\/github.com\/z1gazaga", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/z1gazaga\/CVE-2024-5084", - "description": "Материалы для научной работы", - "fork": false, - "created_at": "2024-11-21T06:26:21Z", - "updated_at": "2024-11-21T07:11:38Z", - "pushed_at": "2024-11-21T07:11:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 896403799, - "name": "CVE-2024-5084", - "full_name": "Raeezrbr\/CVE-2024-5084", - "owner": { - "login": "Raeezrbr", - "id": 135034223, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135034223?v=4", - "html_url": "https:\/\/github.com\/Raeezrbr", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Raeezrbr\/CVE-2024-5084", - "description": null, - "fork": false, - "created_at": "2024-11-30T09:15:34Z", - "updated_at": "2024-11-30T10:56:01Z", - "pushed_at": "2024-11-30T10:55:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-50848.json b/2024/CVE-2024-50848.json deleted file mode 100644 index f2a77d7274..0000000000 --- a/2024/CVE-2024-50848.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 889175343, - "name": "CVE-2024-50848", - "full_name": "Wh1teSnak3\/CVE-2024-50848", - "owner": { - "login": "Wh1teSnak3", - "id": 188617964, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188617964?v=4", - "html_url": "https:\/\/github.com\/Wh1teSnak3", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Wh1teSnak3\/CVE-2024-50848", - "description": null, - "fork": false, - "created_at": "2024-11-15T18:57:25Z", - "updated_at": "2024-11-15T19:29:50Z", - "pushed_at": "2024-11-15T19:29:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50849.json b/2024/CVE-2024-50849.json deleted file mode 100644 index 795dda75d2..0000000000 --- a/2024/CVE-2024-50849.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 889195386, - "name": "CVE-2024-50849", - "full_name": "Wh1teSnak3\/CVE-2024-50849", - "owner": { - "login": "Wh1teSnak3", - "id": 188617964, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188617964?v=4", - "html_url": "https:\/\/github.com\/Wh1teSnak3", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Wh1teSnak3\/CVE-2024-50849", - "description": null, - "fork": false, - "created_at": "2024-11-15T19:51:18Z", - "updated_at": "2024-11-18T22:52:00Z", - "pushed_at": "2024-11-18T22:51:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50944.json b/2024/CVE-2024-50944.json deleted file mode 100644 index ac915627ff..0000000000 --- a/2024/CVE-2024-50944.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 905989849, - "name": "CVE-2024-50944", - "full_name": "AbdullahAlmutawa\/CVE-2024-50944", - "owner": { - "login": "AbdullahAlmutawa", - "id": 53648024, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53648024?v=4", - "html_url": "https:\/\/github.com\/AbdullahAlmutawa", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/AbdullahAlmutawa\/CVE-2024-50944", - "description": "Integer Overflow in Cart Logic in SimplCommerce allows remote attackers to manipulate product quantities and total prices via crafted inputs that exploit insufficient validation of the quantity parameter.", - "fork": false, - "created_at": "2024-12-19T23:33:21Z", - "updated_at": "2025-01-02T20:58:37Z", - "pushed_at": "2025-01-02T20:58:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50945.json b/2024/CVE-2024-50945.json deleted file mode 100644 index b0430fb91d..0000000000 --- a/2024/CVE-2024-50945.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 906003968, - "name": "CVE-2024-50945", - "full_name": "AbdullahAlmutawa\/CVE-2024-50945", - "owner": { - "login": "AbdullahAlmutawa", - "id": 53648024, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53648024?v=4", - "html_url": "https:\/\/github.com\/AbdullahAlmutawa", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/AbdullahAlmutawa\/CVE-2024-50945", - "description": "SimplCommerce is affected by a Broken Access Control vulnerability in the review system, allowing unauthorized users to post reviews for products they have not purchased.", - "fork": false, - "created_at": "2024-12-20T00:43:18Z", - "updated_at": "2025-01-02T20:59:58Z", - "pushed_at": "2025-01-02T20:59:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50961.json b/2024/CVE-2024-50961.json deleted file mode 100644 index ec23a70f41..0000000000 --- a/2024/CVE-2024-50961.json +++ /dev/null @@ -1,37 +0,0 @@ -[ - { - "id": 887738523, - "name": "CVE-2024-50961", - "full_name": "fdzdev\/CVE-2024-50961", - "owner": { - "login": "fdzdev", - "id": 17630462, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17630462?v=4", - "html_url": "https:\/\/github.com\/fdzdev", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/fdzdev\/CVE-2024-50961", - "description": "Remote attacker can access sensitive data exposed on the URL", - "fork": false, - "created_at": "2024-11-13T07:43:06Z", - "updated_at": "2024-11-13T07:53:44Z", - "pushed_at": "2024-11-13T07:47:02Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2024-50961", - "cves" - ], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50962.json b/2024/CVE-2024-50962.json deleted file mode 100644 index f1c7ab6cd0..0000000000 --- a/2024/CVE-2024-50962.json +++ /dev/null @@ -1,37 +0,0 @@ -[ - { - "id": 887740422, - "name": "CVE-2024-50962", - "full_name": "fdzdev\/CVE-2024-50962", - "owner": { - "login": "fdzdev", - "id": 17630462, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17630462?v=4", - "html_url": "https:\/\/github.com\/fdzdev", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/fdzdev\/CVE-2024-50962", - "description": "A Cross-Site Scripting (XSS) vulnerability", - "fork": false, - "created_at": "2024-11-13T07:47:38Z", - "updated_at": "2024-11-13T08:28:29Z", - "pushed_at": "2024-11-13T07:48:30Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2024-50962", - "cves" - ], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50964.json b/2024/CVE-2024-50964.json deleted file mode 100644 index bfd850d53f..0000000000 --- a/2024/CVE-2024-50964.json +++ /dev/null @@ -1,37 +0,0 @@ -[ - { - "id": 887741002, - "name": "CVE-2024-50964", - "full_name": "fdzdev\/CVE-2024-50964", - "owner": { - "login": "fdzdev", - "id": 17630462, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17630462?v=4", - "html_url": "https:\/\/github.com\/fdzdev", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/fdzdev\/CVE-2024-50964", - "description": "MX Server misconfiguration", - "fork": false, - "created_at": "2024-11-13T07:49:09Z", - "updated_at": "2024-11-13T08:28:26Z", - "pushed_at": "2024-11-13T07:51:37Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2024-50964", - "cves" - ], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50968.json b/2024/CVE-2024-50968.json deleted file mode 100644 index c6e129426f..0000000000 --- a/2024/CVE-2024-50968.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 887259811, - "name": "CVE-2024-50968", - "full_name": "Akhlak2511\/CVE-2024-50968", - "owner": { - "login": "Akhlak2511", - "id": 74315191, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74315191?v=4", - "html_url": "https:\/\/github.com\/Akhlak2511", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Akhlak2511\/CVE-2024-50968", - "description": null, - "fork": false, - "created_at": "2024-11-12T12:48:17Z", - "updated_at": "2024-11-12T13:02:03Z", - "pushed_at": "2024-11-12T13:01:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50969.json b/2024/CVE-2024-50969.json deleted file mode 100644 index 23f84d1717..0000000000 --- a/2024/CVE-2024-50969.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 887401537, - "name": "CVE-2024-50969", - "full_name": "Akhlak2511\/CVE-2024-50969", - "owner": { - "login": "Akhlak2511", - "id": 74315191, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74315191?v=4", - "html_url": "https:\/\/github.com\/Akhlak2511", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Akhlak2511\/CVE-2024-50969", - "description": null, - "fork": false, - "created_at": "2024-11-12T17:20:07Z", - "updated_at": "2024-11-12T17:28:23Z", - "pushed_at": "2024-11-12T17:28:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50970.json b/2024/CVE-2024-50970.json deleted file mode 100644 index a2285a69db..0000000000 --- a/2024/CVE-2024-50970.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 887406221, - "name": "CVE-2024-50970", - "full_name": "Akhlak2511\/CVE-2024-50970", - "owner": { - "login": "Akhlak2511", - "id": 74315191, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74315191?v=4", - "html_url": "https:\/\/github.com\/Akhlak2511", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Akhlak2511\/CVE-2024-50970", - "description": null, - "fork": false, - "created_at": "2024-11-12T17:30:00Z", - "updated_at": "2024-11-12T17:34:01Z", - "pushed_at": "2024-11-12T17:33:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50971.json b/2024/CVE-2024-50971.json deleted file mode 100644 index f883ca637a..0000000000 --- a/2024/CVE-2024-50971.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 887409068, - "name": "CVE-2024-50971", - "full_name": "Akhlak2511\/CVE-2024-50971", - "owner": { - "login": "Akhlak2511", - "id": 74315191, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74315191?v=4", - "html_url": "https:\/\/github.com\/Akhlak2511", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Akhlak2511\/CVE-2024-50971", - "description": null, - "fork": false, - "created_at": "2024-11-12T17:36:02Z", - "updated_at": "2024-11-12T17:39:26Z", - "pushed_at": "2024-11-12T17:39:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50972.json b/2024/CVE-2024-50972.json deleted file mode 100644 index 3ff74b2863..0000000000 --- a/2024/CVE-2024-50972.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 887411310, - "name": "CVE-2024-50972", - "full_name": "Akhlak2511\/CVE-2024-50972", - "owner": { - "login": "Akhlak2511", - "id": 74315191, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74315191?v=4", - "html_url": "https:\/\/github.com\/Akhlak2511", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Akhlak2511\/CVE-2024-50972", - "description": null, - "fork": false, - "created_at": "2024-11-12T17:40:54Z", - "updated_at": "2024-11-12T17:43:51Z", - "pushed_at": "2024-11-12T17:43:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-50986.json b/2024/CVE-2024-50986.json deleted file mode 100644 index 7a06d8b66c..0000000000 --- a/2024/CVE-2024-50986.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 887656070, - "name": "CVE-2024-50986", - "full_name": "riftsandroses\/CVE-2024-50986", - "owner": { - "login": "riftsandroses", - "id": 63180210, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63180210?v=4", - "html_url": "https:\/\/github.com\/riftsandroses", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/riftsandroses\/CVE-2024-50986", - "description": "An issue in Clementine v.1.3.1 allows a local attacker to execute arbitrary code via a crafted DLL file (DLL Hijacking)", - "fork": false, - "created_at": "2024-11-13T03:49:07Z", - "updated_at": "2024-12-29T20:00:31Z", - "pushed_at": "2024-12-29T20:00:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-51026.json b/2024/CVE-2024-51026.json deleted file mode 100644 index 641a48d004..0000000000 --- a/2024/CVE-2024-51026.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 886757040, - "name": "CVE-2024-51026_Overview", - "full_name": "BrotherOfJhonny\/CVE-2024-51026_Overview", - "owner": { - "login": "BrotherOfJhonny", - "id": 28454566, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28454566?v=4", - "html_url": "https:\/\/github.com\/BrotherOfJhonny", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/BrotherOfJhonny\/CVE-2024-51026_Overview", - "description": "Sistema NetAdmin IAM 4 é vulnerável a Cross Site Scripting (XSS), no endpoint \/BalloonSave.ashx", - "fork": false, - "created_at": "2024-11-11T14:49:47Z", - "updated_at": "2024-11-11T14:58:58Z", - "pushed_at": "2024-11-11T14:58:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-51030.json b/2024/CVE-2024-51030.json deleted file mode 100644 index d265066d98..0000000000 --- a/2024/CVE-2024-51030.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 883929203, - "name": "CVE-2024-51030", - "full_name": "vighneshnair7\/CVE-2024-51030", - "owner": { - "login": "vighneshnair7", - "id": 186159201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186159201?v=4", - "html_url": "https:\/\/github.com\/vighneshnair7", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/vighneshnair7\/CVE-2024-51030", - "description": null, - "fork": false, - "created_at": "2024-11-05T20:33:56Z", - "updated_at": "2024-11-05T20:45:23Z", - "pushed_at": "2024-11-05T20:45:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-51031.json b/2024/CVE-2024-51031.json deleted file mode 100644 index 950a07cbae..0000000000 --- a/2024/CVE-2024-51031.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 883938105, - "name": "CVE-2024-51031", - "full_name": "vighneshnair7\/CVE-2024-51031", - "owner": { - "login": "vighneshnair7", - "id": 186159201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186159201?v=4", - "html_url": "https:\/\/github.com\/vighneshnair7", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/vighneshnair7\/CVE-2024-51031", - "description": null, - "fork": false, - "created_at": "2024-11-05T20:59:14Z", - "updated_at": "2024-11-05T21:04:48Z", - "pushed_at": "2024-11-05T21:04:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-51032.json b/2024/CVE-2024-51032.json deleted file mode 100644 index b48e614525..0000000000 --- a/2024/CVE-2024-51032.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 883932000, - "name": "CVE-2024-51032", - "full_name": "Shree-Chandragiri\/CVE-2024-51032", - "owner": { - "login": "Shree-Chandragiri", - "id": 187441471, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/187441471?v=4", - "html_url": "https:\/\/github.com\/Shree-Chandragiri", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Shree-Chandragiri\/CVE-2024-51032", - "description": "A Cross-site Scripting (XSS) vulnerability in manage_recipient.php of Sourcecodester Toll Tax Management System 1.0 allows remote authenticated users to inject arbitrary web scripts via the \"owner\" input field.", - "fork": false, - "created_at": "2024-11-05T20:41:15Z", - "updated_at": "2024-11-05T21:04:24Z", - "pushed_at": "2024-11-05T21:04:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-51132.json b/2024/CVE-2024-51132.json deleted file mode 100644 index ff8ca690ed..0000000000 --- a/2024/CVE-2024-51132.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 882327865, - "name": "CVE-2024-51132-POC", - "full_name": "JAckLosingHeart\/CVE-2024-51132-POC", - "owner": { - "login": "JAckLosingHeart", - "id": 57932150, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57932150?v=4", - "html_url": "https:\/\/github.com\/JAckLosingHeart", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/JAckLosingHeart\/CVE-2024-51132-POC", - "description": null, - "fork": false, - "created_at": "2024-11-02T14:30:29Z", - "updated_at": "2024-11-21T07:42:10Z", - "pushed_at": "2024-11-09T07:58:09Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-51179.json b/2024/CVE-2024-51179.json deleted file mode 100644 index a44c0ca66d..0000000000 --- a/2024/CVE-2024-51179.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 885336150, - "name": "CVE-2024-51179", - "full_name": "Lakshmirnr\/CVE-2024-51179", - "owner": { - "login": "Lakshmirnr", - "id": 172017730, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172017730?v=4", - "html_url": "https:\/\/github.com\/Lakshmirnr", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Lakshmirnr\/CVE-2024-51179", - "description": null, - "fork": false, - "created_at": "2024-11-08T11:47:07Z", - "updated_at": "2024-12-13T20:55:01Z", - "pushed_at": "2024-11-08T18:42:51Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-5124.json b/2024/CVE-2024-5124.json deleted file mode 100644 index dd0a0210a4..0000000000 --- a/2024/CVE-2024-5124.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 880757168, - "name": "CVE-2024-5124", - "full_name": "gogo2464\/CVE-2024-5124", - "owner": { - "login": "gogo2464", - "id": 57051187, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57051187?v=4", - "html_url": "https:\/\/github.com\/gogo2464", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/gogo2464\/CVE-2024-5124", - "description": null, - "fork": false, - "created_at": "2024-10-30T09:53:42Z", - "updated_at": "2024-12-03T13:29:27Z", - "pushed_at": "2024-11-03T11:49:36Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 897673934, - "name": "cve-2024-5124-poc", - "full_name": "XiaomingX\/cve-2024-5124-poc", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-5124-poc", - "description": "CVE-2024-5124 poc", - "fork": false, - "created_at": "2024-12-03T03:18:48Z", - "updated_at": "2025-01-14T18:04:03Z", - "pushed_at": "2024-12-03T04:01:32Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 7, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-51358.json b/2024/CVE-2024-51358.json deleted file mode 100644 index 34cd969ea3..0000000000 --- a/2024/CVE-2024-51358.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 882335500, - "name": "CVE-2024-51358", - "full_name": "Kov404\/CVE-2024-51358", - "owner": { - "login": "Kov404", - "id": 177751667, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/177751667?v=4", - "html_url": "https:\/\/github.com\/Kov404", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Kov404\/CVE-2024-51358", - "description": null, - "fork": false, - "created_at": "2024-11-02T14:55:00Z", - "updated_at": "2024-11-02T14:56:08Z", - "pushed_at": "2024-11-02T14:56:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-51378.json b/2024/CVE-2024-51378.json deleted file mode 100644 index e0bf14da38..0000000000 --- a/2024/CVE-2024-51378.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 880552224, - "name": "CVE-2024-51378", - "full_name": "refr4g\/CVE-2024-51378", - "owner": { - "login": "refr4g", - "id": 63981656, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63981656?v=4", - "html_url": "https:\/\/github.com\/refr4g", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/refr4g\/CVE-2024-51378", - "description": "Exploit for CyberPanel Pre-Auth RCE via Command Injection", - "fork": false, - "created_at": "2024-10-29T23:34:27Z", - "updated_at": "2025-01-09T08:12:29Z", - "pushed_at": "2024-11-01T10:12:49Z", - "stargazers_count": 20, - "watchers_count": 20, - "has_discussions": false, - "forks_count": 7, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 7, - "watchers": 20, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 911522017, - "name": "CVE-2024-51378", - "full_name": "i0x29A\/CVE-2024-51378", - "owner": { - "login": "i0x29A", - "id": 155425848, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155425848?v=4", - "html_url": "https:\/\/github.com\/i0x29A", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/i0x29A\/CVE-2024-51378", - "description": "A Python script to scan websites for the CVE-2024-51378 vulnerability.", - "fork": false, - "created_at": "2025-01-03T08:05:07Z", - "updated_at": "2025-01-03T08:13:38Z", - "pushed_at": "2025-01-03T08:13:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-51430.json b/2024/CVE-2024-51430.json deleted file mode 100644 index 0809ffea41..0000000000 --- a/2024/CVE-2024-51430.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 880470583, - "name": "CVE-2024-51430", - "full_name": "BLACK-SCORP10\/CVE-2024-51430", - "owner": { - "login": "BLACK-SCORP10", - "id": 102329978, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102329978?v=4", - "html_url": "https:\/\/github.com\/BLACK-SCORP10", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/BLACK-SCORP10\/CVE-2024-51430", - "description": "The Online Diagnostic Lab Management System has a security problem called Cross-Site Scripting (XSS) in the Borrower section.", - "fork": false, - "created_at": "2024-10-29T19:32:05Z", - "updated_at": "2024-11-21T09:14:45Z", - "pushed_at": "2024-10-29T19:40:06Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-51435.json b/2024/CVE-2024-51435.json deleted file mode 100644 index 584d208924..0000000000 --- a/2024/CVE-2024-51435.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 878714460, - "name": "CVE-2024-51435", - "full_name": "bevennyamande\/CVE-2024-51435", - "owner": { - "login": "bevennyamande", - "id": 10162710, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10162710?v=4", - "html_url": "https:\/\/github.com\/bevennyamande", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/bevennyamande\/CVE-2024-51435", - "description": "bloodbank POCs", - "fork": false, - "created_at": "2024-10-25T23:28:09Z", - "updated_at": "2024-10-28T18:47:29Z", - "pushed_at": "2024-10-25T23:50:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-51442.json b/2024/CVE-2024-51442.json deleted file mode 100644 index b54249a61d..0000000000 --- a/2024/CVE-2024-51442.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 910603659, - "name": "CVE-2024-51442", - "full_name": "mselbrede\/CVE-2024-51442", - "owner": { - "login": "mselbrede", - "id": 43323139, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43323139?v=4", - "html_url": "https:\/\/github.com\/mselbrede", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/mselbrede\/CVE-2024-51442", - "description": "CVE-2024-51442 write up and example config file", - "fork": false, - "created_at": "2024-12-31T19:27:36Z", - "updated_at": "2024-12-31T19:33:28Z", - "pushed_at": "2024-12-31T19:33:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-51567.json b/2024/CVE-2024-51567.json deleted file mode 100644 index 823f8eae1f..0000000000 --- a/2024/CVE-2024-51567.json +++ /dev/null @@ -1,98 +0,0 @@ -[ - { - "id": 881591080, - "name": "CVE-2024-51567", - "full_name": "ajayalf\/CVE-2024-51567", - "owner": { - "login": "ajayalf", - "id": 49350537, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49350537?v=4", - "html_url": "https:\/\/github.com\/ajayalf", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ajayalf\/CVE-2024-51567", - "description": "CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s upgrademysqlstatus endpoint, bypassing CSRF protections.", - "fork": false, - "created_at": "2024-10-31T21:55:57Z", - "updated_at": "2025-01-12T18:29:33Z", - "pushed_at": "2024-11-01T10:48:42Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-51567", - "cyberpanel" - ], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 884847468, - "name": "CVE-2024-51567-RCE-EXPLOIT", - "full_name": "thehash007\/CVE-2024-51567-RCE-EXPLOIT", - "owner": { - "login": "thehash007", - "id": 108442682, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108442682?v=4", - "html_url": "https:\/\/github.com\/thehash007", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/thehash007\/CVE-2024-51567-RCE-EXPLOIT", - "description": "cbyerpanel rce exploit", - "fork": false, - "created_at": "2024-11-07T13:52:37Z", - "updated_at": "2024-12-28T21:06:32Z", - "pushed_at": "2024-11-07T13:57:25Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 894240840, - "name": "cve-2024-51567-poc", - "full_name": "XiaomingX\/cve-2024-51567-poc", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-51567-poc", - "description": "CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s upgrademysqlstatus endpoint, bypassing CSRF protections.", - "fork": false, - "created_at": "2024-11-26T02:18:24Z", - "updated_at": "2025-01-13T18:16:45Z", - "pushed_at": "2024-11-26T02:21:21Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 7, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-51665.json b/2024/CVE-2024-51665.json deleted file mode 100644 index 7b37f57011..0000000000 --- a/2024/CVE-2024-51665.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 886174697, - "name": "CVE-2024-51665", - "full_name": "RandomRobbieBF\/CVE-2024-51665", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-51665", - "description": "Magical Addons For Elementor <= 1.2.1 - Authenticated (Subscriber+) Server-Side Request Forgery", - "fork": false, - "created_at": "2024-11-10T12:01:52Z", - "updated_at": "2024-11-15T13:23:56Z", - "pushed_at": "2024-11-10T12:02:45Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-51747.json b/2024/CVE-2024-51747.json deleted file mode 100644 index c62dad4c9e..0000000000 --- a/2024/CVE-2024-51747.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 888811330, - "name": "CVE-2024-51747", - "full_name": "l20170217b\/CVE-2024-51747", - "owner": { - "login": "l20170217b", - "id": 153576205, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153576205?v=4", - "html_url": "https:\/\/github.com\/l20170217b", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/l20170217b\/CVE-2024-51747", - "description": null, - "fork": false, - "created_at": "2024-11-15T03:40:49Z", - "updated_at": "2024-11-18T12:40:30Z", - "pushed_at": "2024-11-15T04:00:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-51818.json b/2024/CVE-2024-51818.json deleted file mode 100644 index 134c1413d6..0000000000 --- a/2024/CVE-2024-51818.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 914288330, - "name": "CVE-2024-51818", - "full_name": "RandomRobbieBF\/CVE-2024-51818", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-51818", - "description": "Fancy Product Designer <= 6.4.3 - Unauthenticated SQL Injection", - "fork": false, - "created_at": "2025-01-09T10:00:30Z", - "updated_at": "2025-01-14T12:41:40Z", - "pushed_at": "2025-01-09T10:01:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-52002.json b/2024/CVE-2024-52002.json deleted file mode 100644 index d9e22c7de0..0000000000 --- a/2024/CVE-2024-52002.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 907531691, - "name": "iTop-CVEs-exploit", - "full_name": "Harshit-Mashru\/iTop-CVEs-exploit", - "owner": { - "login": "Harshit-Mashru", - "id": 31271975, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31271975?v=4", - "html_url": "https:\/\/github.com\/Harshit-Mashru", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Harshit-Mashru\/iTop-CVEs-exploit", - "description": "This repository contains exploits for iTOP CVE-2024-52002, 52000, 31998, 31448 that involve CSRF+XSS chaining to get RCE", - "fork": false, - "created_at": "2024-12-23T19:56:56Z", - "updated_at": "2024-12-30T00:27:36Z", - "pushed_at": "2024-12-30T00:27:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-52301.json b/2024/CVE-2024-52301.json deleted file mode 100644 index 2adc5700ca..0000000000 --- a/2024/CVE-2024-52301.json +++ /dev/null @@ -1,95 +0,0 @@ -[ - { - "id": 888639868, - "name": "CVE-2024-52301", - "full_name": "Nyamort\/CVE-2024-52301", - "owner": { - "login": "Nyamort", - "id": 67233336, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67233336?v=4", - "html_url": "https:\/\/github.com\/Nyamort", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Nyamort\/CVE-2024-52301", - "description": null, - "fork": false, - "created_at": "2024-11-14T18:41:31Z", - "updated_at": "2024-11-18T10:25:29Z", - "pushed_at": "2024-11-14T19:27:31Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 889180658, - "name": "CVE-2024-52301-Research", - "full_name": "martinhaunschmid\/CVE-2024-52301-Research", - "owner": { - "login": "martinhaunschmid", - "id": 35374703, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35374703?v=4", - "html_url": "https:\/\/github.com\/martinhaunschmid", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/martinhaunschmid\/CVE-2024-52301-Research", - "description": "A bit of research around CVE-2024-52301", - "fork": false, - "created_at": "2024-11-15T19:11:35Z", - "updated_at": "2024-11-15T19:42:15Z", - "pushed_at": "2024-11-15T19:42:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 896329974, - "name": "CVE-2024-52301", - "full_name": "nanwinata\/CVE-2024-52301", - "owner": { - "login": "nanwinata", - "id": 50732289, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50732289?v=4", - "html_url": "https:\/\/github.com\/nanwinata", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/nanwinata\/CVE-2024-52301", - "description": "Arbitrary Argument Injection Scanner CVE-2024-52301", - "fork": false, - "created_at": "2024-11-30T04:25:06Z", - "updated_at": "2024-11-30T04:38:03Z", - "pushed_at": "2024-11-30T04:38:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-52302.json b/2024/CVE-2024-52302.json deleted file mode 100644 index 7e694f320e..0000000000 --- a/2024/CVE-2024-52302.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 888564124, - "name": "CVE-2024-52302", - "full_name": "d3sca\/CVE-2024-52302", - "owner": { - "login": "d3sca", - "id": 86044770, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86044770?v=4", - "html_url": "https:\/\/github.com\/d3sca", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/d3sca\/CVE-2024-52302", - "description": "common-user-management is a robust Spring Boot application featuring user management services designed to control user access dynamically. There is a critical security vulnerability in the application endpoint \/api\/v1\/customer\/profile-picture. This endpoint allows file uploads without proper validation or restrictions leads to (RCE)", - "fork": false, - "created_at": "2024-11-14T16:04:00Z", - "updated_at": "2024-11-19T06:02:59Z", - "pushed_at": "2024-11-19T06:02:56Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-52316.json b/2024/CVE-2024-52316.json deleted file mode 100644 index 598be2931f..0000000000 --- a/2024/CVE-2024-52316.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 891432537, - "name": "CVE-2024-52316", - "full_name": "TAM-K592\/CVE-2024-52316", - "owner": { - "login": "TAM-K592", - "id": 8276702, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8276702?v=4", - "html_url": "https:\/\/github.com\/TAM-K592", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/TAM-K592\/CVE-2024-52316", - "description": "CVE-2024-52316 - Apache Tomcat Authentication Bypass Vulnerability", - "fork": false, - "created_at": "2024-11-20T10:22:50Z", - "updated_at": "2024-12-28T05:47:37Z", - "pushed_at": "2024-11-20T10:40:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-52317.json b/2024/CVE-2024-52317.json deleted file mode 100644 index dbcf8bb40d..0000000000 --- a/2024/CVE-2024-52317.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 891891768, - "name": "CVE-2024-52317", - "full_name": "TAM-K592\/CVE-2024-52317", - "owner": { - "login": "TAM-K592", - "id": 8276702, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8276702?v=4", - "html_url": "https:\/\/github.com\/TAM-K592", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/TAM-K592\/CVE-2024-52317", - "description": "CVE-2024-52317 - Apache Tomcat HTTP\/2 Data Leakage Vulnerability", - "fork": false, - "created_at": "2024-11-21T06:20:42Z", - "updated_at": "2024-12-28T05:47:34Z", - "pushed_at": "2024-11-21T06:33:37Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-52318.json b/2024/CVE-2024-52318.json deleted file mode 100644 index 01f4efe599..0000000000 --- a/2024/CVE-2024-52318.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 891898238, - "name": "CVE-2024-52318", - "full_name": "TAM-K592\/CVE-2024-52318", - "owner": { - "login": "TAM-K592", - "id": 8276702, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8276702?v=4", - "html_url": "https:\/\/github.com\/TAM-K592", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/TAM-K592\/CVE-2024-52318", - "description": "CVE-2024-52318 - Apache Tomcat XSS Vulnerability in Generated JSPs", - "fork": false, - "created_at": "2024-11-21T06:38:48Z", - "updated_at": "2024-12-28T05:47:34Z", - "pushed_at": "2024-11-21T06:44:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-52380.json b/2024/CVE-2024-52380.json deleted file mode 100644 index a8e1376d1a..0000000000 --- a/2024/CVE-2024-52380.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 893988150, - "name": "CVE-2024-52380", - "full_name": "RandomRobbieBF\/CVE-2024-52380", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-52380", - "description": "Picsmize <= 1.0.0 - Unauthenticated Arbitrary File Upload", - "fork": false, - "created_at": "2024-11-25T14:56:38Z", - "updated_at": "2024-11-25T14:57:59Z", - "pushed_at": "2024-11-25T14:57:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 896307615, - "name": "CVE-2024-52380", - "full_name": "0xshoriful\/CVE-2024-52380", - "owner": { - "login": "0xshoriful", - "id": 167082207, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167082207?v=4", - "html_url": "https:\/\/github.com\/0xshoriful", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/0xshoriful\/CVE-2024-52380", - "description": null, - "fork": false, - "created_at": "2024-11-30T02:43:11Z", - "updated_at": "2024-11-30T02:43:33Z", - "pushed_at": "2024-11-30T02:43:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-52382.json b/2024/CVE-2024-52382.json deleted file mode 100644 index 6934fbd626..0000000000 --- a/2024/CVE-2024-52382.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 892169698, - "name": "CVE-2024-52382", - "full_name": "RandomRobbieBF\/CVE-2024-52382", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-52382", - "description": "Matix Popup Builder <= 1.0.0 - Unauthenticated Arbitrary Options Update", - "fork": false, - "created_at": "2024-11-21T16:19:12Z", - "updated_at": "2024-11-21T16:20:27Z", - "pushed_at": "2024-11-21T16:20:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-52429.json b/2024/CVE-2024-52429.json deleted file mode 100644 index 7d79dc6bd6..0000000000 --- a/2024/CVE-2024-52429.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 892550666, - "name": "CVE-2024-52429", - "full_name": "RandomRobbieBF\/CVE-2024-52429", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-52429", - "description": "WP Quick Setup <= 2.0 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin\/Theme Installation", - "fork": false, - "created_at": "2024-11-22T10:26:55Z", - "updated_at": "2024-11-27T09:45:27Z", - "pushed_at": "2024-11-22T10:28:33Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-52430.json b/2024/CVE-2024-52430.json deleted file mode 100644 index 1505567a41..0000000000 --- a/2024/CVE-2024-52430.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 893955029, - "name": "CVE-2024-52430", - "full_name": "RandomRobbieBF\/CVE-2024-52430", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-52430", - "description": "Lis Video Gallery <= 0.2.1 - Unauthenticated PHP Object Injection", - "fork": false, - "created_at": "2024-11-25T13:55:39Z", - "updated_at": "2024-11-25T13:56:56Z", - "pushed_at": "2024-11-25T13:56:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-52433.json b/2024/CVE-2024-52433.json deleted file mode 100644 index f250d44cd4..0000000000 --- a/2024/CVE-2024-52433.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 892512845, - "name": "CVE-2024-52433", - "full_name": "RandomRobbieBF\/CVE-2024-52433", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-52433", - "description": "My Geo Posts Free <= 1.2 - Unauthenticated PHP Object Injection", - "fork": false, - "created_at": "2024-11-22T08:56:58Z", - "updated_at": "2024-11-22T08:58:31Z", - "pushed_at": "2024-11-22T08:58:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-5246.json b/2024/CVE-2024-5246.json deleted file mode 100644 index b2cef62c5b..0000000000 --- a/2024/CVE-2024-5246.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 837382117, - "name": "CVE-2024-5246", - "full_name": "Abdurahmon3236\/CVE-2024-5246", - "owner": { - "login": "Abdurahmon3236", - "id": 76862934, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76862934?v=4", - "html_url": "https:\/\/github.com\/Abdurahmon3236", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Abdurahmon3236\/CVE-2024-5246", - "description": null, - "fork": false, - "created_at": "2024-08-02T20:56:39Z", - "updated_at": "2024-08-02T20:57:05Z", - "pushed_at": "2024-08-02T20:57:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-52475.json b/2024/CVE-2024-52475.json deleted file mode 100644 index 2b1f93bd29..0000000000 --- a/2024/CVE-2024-52475.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 892766339, - "name": "CVE-2024-52475", - "full_name": "ubaii\/CVE-2024-52475", - "owner": { - "login": "ubaii", - "id": 31325580, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31325580?v=4", - "html_url": "https:\/\/github.com\/ubaii", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ubaii\/CVE-2024-52475", - "description": "Broken Authentication in Wordpress plugin (Wawp Plugin < 3.0.18)", - "fork": false, - "created_at": "2024-11-22T18:29:54Z", - "updated_at": "2024-11-22T18:30:35Z", - "pushed_at": "2024-11-22T18:30:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-52711.json b/2024/CVE-2024-52711.json deleted file mode 100644 index 0833137e2e..0000000000 --- a/2024/CVE-2024-52711.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 891000517, - "name": "cyberspace-CVE-2024-52711", - "full_name": "14mb1v45h\/cyberspace-CVE-2024-52711", - "owner": { - "login": "14mb1v45h", - "id": 166547152, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166547152?v=4", - "html_url": "https:\/\/github.com\/14mb1v45h", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/14mb1v45h\/cyberspace-CVE-2024-52711", - "description": "POC-Proof-of-exploit CVE-2024-52711", - "fork": false, - "created_at": "2024-11-19T14:55:16Z", - "updated_at": "2024-11-19T15:00:18Z", - "pushed_at": "2024-11-19T14:59:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-5274.json b/2024/CVE-2024-5274.json index d9f71ed094..edaedc94e6 100644 --- a/2024/CVE-2024-5274.json +++ b/2024/CVE-2024-5274.json @@ -1,35 +1,4 @@ [ - { - "id": 826587360, - "name": "CVE-2024-5274-Detection", - "full_name": "Alchemist3dot14\/CVE-2024-5274-Detection", - "owner": { - "login": "Alchemist3dot14", - "id": 63059909, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63059909?v=4", - "html_url": "https:\/\/github.com\/Alchemist3dot14", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Alchemist3dot14\/CVE-2024-5274-Detection", - "description": "Guardian Code: A Script to Uncover CVE-2024-5274 Vulnerabilities", - "fork": false, - "created_at": "2024-07-10T02:15:56Z", - "updated_at": "2024-11-20T16:30:56Z", - "pushed_at": "2024-07-10T08:56:42Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, { "id": 849326818, "name": "CVE-2024-5274", diff --git a/2024/CVE-2024-52800.json b/2024/CVE-2024-52800.json deleted file mode 100644 index c5dca1df66..0000000000 --- a/2024/CVE-2024-52800.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 896365830, - "name": "GHSA-4cx5-89vm-833x-POC", - "full_name": "JAckLosingHeart\/GHSA-4cx5-89vm-833x-POC", - "owner": { - "login": "JAckLosingHeart", - "id": 57932150, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57932150?v=4", - "html_url": "https:\/\/github.com\/JAckLosingHeart", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/JAckLosingHeart\/GHSA-4cx5-89vm-833x-POC", - "description": "GHSA-4cx5-89vm-833x\/CVE-2024-52800", - "fork": false, - "created_at": "2024-11-30T06:55:07Z", - "updated_at": "2024-11-30T06:56:08Z", - "pushed_at": "2024-11-30T06:56:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-52940.json b/2024/CVE-2024-52940.json deleted file mode 100644 index 29513c6e0d..0000000000 --- a/2024/CVE-2024-52940.json +++ /dev/null @@ -1,76 +0,0 @@ -[ - { - "id": 879314420, - "name": "abdal-anydesk-remote-ip-detector", - "full_name": "ebrasha\/abdal-anydesk-remote-ip-detector", - "owner": { - "login": "ebrasha", - "id": 9009001, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9009001?v=4", - "html_url": "https:\/\/github.com\/ebrasha", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ebrasha\/abdal-anydesk-remote-ip-detector", - "description": "CVE-2024-52940 - A zero-day vulnerability in AnyDesk's \"Allow Direct Connections\" feature, discovered and registered by Ebrahim Shafiei (EbraSha), exposing public and private IP addresses. For details, visit the NVD, Tenable, or MITRE pages.", - "fork": false, - "created_at": "2024-10-27T15:29:56Z", - "updated_at": "2025-01-06T15:22:09Z", - "pushed_at": "2024-11-18T15:09:32Z", - "stargazers_count": 31, - "watchers_count": 31, - "has_discussions": true, - "forks_count": 9, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "abdal", - "abdal-security-group", - "anydesk", - "anydesk-ip-leak-vulnerability", - "cve-2024-52940", - "ebrahim-shafiei", - "ebrasha", - "ip-leak", - "vulnerability", - "zero-day", - "zero-day-vulnerability" - ], - "visibility": "public", - "forks": 9, - "watchers": 31, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 897139433, - "name": "AnySniff", - "full_name": "MKultra6969\/AnySniff", - "owner": { - "login": "MKultra6969", - "id": 40924797, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40924797?v=4", - "html_url": "https:\/\/github.com\/MKultra6969", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/MKultra6969\/AnySniff", - "description": "AnySniff is a tool for monitoring TCP connections of processes like AnyDesk on Windows. It uses the CVE-2024-52940 vulnerability to track open connections and log IPs, ports, and other details.", - "fork": false, - "created_at": "2024-12-02T05:15:11Z", - "updated_at": "2024-12-03T13:34:47Z", - "pushed_at": "2024-12-03T13:31:34Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-53255.json b/2024/CVE-2024-53255.json deleted file mode 100644 index 2a10256dbf..0000000000 --- a/2024/CVE-2024-53255.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 894399924, - "name": "CVE-2024-53255", - "full_name": "0x4M3R\/CVE-2024-53255", - "owner": { - "login": "0x4M3R", - "id": 163415000, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/163415000?v=4", - "html_url": "https:\/\/github.com\/0x4M3R", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/0x4M3R\/CVE-2024-53255", - "description": "boid CMS 2.1.1 - reflected Cross-Site Scripting (XSS)", - "fork": false, - "created_at": "2024-11-26T09:41:54Z", - "updated_at": "2024-11-26T09:45:42Z", - "pushed_at": "2024-11-26T09:45:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-53259.json b/2024/CVE-2024-53259.json deleted file mode 100644 index 5590e1da57..0000000000 --- a/2024/CVE-2024-53259.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 898373341, - "name": "cve-2024-53259", - "full_name": "kota-yata\/cve-2024-53259", - "owner": { - "login": "kota-yata", - "id": 51294895, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51294895?v=4", - "html_url": "https:\/\/github.com\/kota-yata", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/kota-yata\/cve-2024-53259", - "description": null, - "fork": false, - "created_at": "2024-12-04T09:27:22Z", - "updated_at": "2024-12-04T09:27:53Z", - "pushed_at": "2024-12-04T09:28:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-53345.json b/2024/CVE-2024-53345.json deleted file mode 100644 index 564b4eec28..0000000000 --- a/2024/CVE-2024-53345.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 907287454, - "name": "CVE-2024-53345", - "full_name": "ShadowByte1\/CVE-2024-53345", - "owner": { - "login": "ShadowByte1", - "id": 155693555, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155693555?v=4", - "html_url": "https:\/\/github.com\/ShadowByte1", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ShadowByte1\/CVE-2024-53345", - "description": "Critical 0 Day in Car Rental Management System Versions 1.0 - 1.3", - "fork": false, - "created_at": "2024-12-23T08:48:51Z", - "updated_at": "2024-12-23T09:10:54Z", - "pushed_at": "2024-12-23T09:10:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-53375.json b/2024/CVE-2024-53375.json deleted file mode 100644 index 7d515738ae..0000000000 --- a/2024/CVE-2024-53375.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 867639922, - "name": "CVE-2024-53375", - "full_name": "ThottySploity\/CVE-2024-53375", - "owner": { - "login": "ThottySploity", - "id": 119318084, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119318084?v=4", - "html_url": "https:\/\/github.com\/ThottySploity", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ThottySploity\/CVE-2024-53375", - "description": "TP-Link Archer AXE75 Authenticated Command Injection", - "fork": false, - "created_at": "2024-10-04T12:49:19Z", - "updated_at": "2025-01-09T02:21:55Z", - "pushed_at": "2024-12-19T09:34:33Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 8, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-53376.json b/2024/CVE-2024-53376.json deleted file mode 100644 index c487e1c440..0000000000 --- a/2024/CVE-2024-53376.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 903925414, - "name": "CVE-2024-53376", - "full_name": "ThottySploity\/CVE-2024-53376", - "owner": { - "login": "ThottySploity", - "id": 119318084, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119318084?v=4", - "html_url": "https:\/\/github.com\/ThottySploity", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ThottySploity\/CVE-2024-53376", - "description": "CyberPanel authenticated RCE < 2.3.8", - "fork": false, - "created_at": "2024-12-15T22:40:52Z", - "updated_at": "2025-01-14T18:05:01Z", - "pushed_at": "2024-12-19T09:36:58Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 6, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-53476.json b/2024/CVE-2024-53476.json deleted file mode 100644 index 200c3f5c9b..0000000000 --- a/2024/CVE-2024-53476.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 906000848, - "name": "CVE-2024-53476", - "full_name": "AbdullahAlmutawa\/CVE-2024-53476", - "owner": { - "login": "AbdullahAlmutawa", - "id": 53648024, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53648024?v=4", - "html_url": "https:\/\/github.com\/AbdullahAlmutawa", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/AbdullahAlmutawa\/CVE-2024-53476", - "description": "SimplCommerce is affected by a race condition vulnerability in the checkout logic, allowing multiple users to purchase more products than are in stock via simultaneous checkout requests.", - "fork": false, - "created_at": "2024-12-20T00:27:22Z", - "updated_at": "2025-01-02T20:59:27Z", - "pushed_at": "2025-01-02T20:59:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-53522.json b/2024/CVE-2024-53522.json deleted file mode 100644 index 91ca8bb3b6..0000000000 --- a/2024/CVE-2024-53522.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 911020987, - "name": "CVE-2024-53522", - "full_name": "Safecloudth\/CVE-2024-53522", - "owner": { - "login": "Safecloudth", - "id": 192949182, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192949182?v=4", - "html_url": "https:\/\/github.com\/Safecloudth", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Safecloudth\/CVE-2024-53522", - "description": "PoC for CVE-2024-53522 affecting HOSxP XE 4", - "fork": false, - "created_at": "2025-01-02T04:13:37Z", - "updated_at": "2025-01-09T10:14:59Z", - "pushed_at": "2025-01-02T04:16:41Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-53617.json b/2024/CVE-2024-53617.json deleted file mode 100644 index feb02e3f36..0000000000 --- a/2024/CVE-2024-53617.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 896176114, - "name": "CVE-2024-53617", - "full_name": "ii5mai1\/CVE-2024-53617", - "owner": { - "login": "ii5mai1", - "id": 129608769, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129608769?v=4", - "html_url": "https:\/\/github.com\/ii5mai1", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ii5mai1\/CVE-2024-53617", - "description": null, - "fork": false, - "created_at": "2024-11-29T17:50:07Z", - "updated_at": "2024-11-29T17:56:56Z", - "pushed_at": "2024-11-29T17:56:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json deleted file mode 100644 index e33094fad5..0000000000 --- a/2024/CVE-2024-53677.json +++ /dev/null @@ -1,382 +0,0 @@ -[ - { - "id": 902266041, - "name": "s2-067-CVE-2024-53677", - "full_name": "cloudwafs\/s2-067-CVE-2024-53677", - "owner": { - "login": "cloudwafs", - "id": 27655248, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27655248?v=4", - "html_url": "https:\/\/github.com\/cloudwafs", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/cloudwafs\/s2-067-CVE-2024-53677", - "description": "s2-067(CVE-2024-53677)", - "fork": false, - "created_at": "2024-12-12T08:30:14Z", - "updated_at": "2024-12-31T02:36:33Z", - "pushed_at": "2024-12-17T10:37:17Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 8, - "score": 0, - "subscribers_count": 4 - }, - { - "id": 902994077, - "name": "CVE-2024-53677-S2-067", - "full_name": "TAM-K592\/CVE-2024-53677-S2-067", - "owner": { - "login": "TAM-K592", - "id": 8276702, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8276702?v=4", - "html_url": "https:\/\/github.com\/TAM-K592", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/TAM-K592\/CVE-2024-53677-S2-067", - "description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.", - "fork": false, - "created_at": "2024-12-13T17:42:55Z", - "updated_at": "2025-01-08T02:10:58Z", - "pushed_at": "2024-12-20T10:05:15Z", - "stargazers_count": 83, - "watchers_count": 83, - "has_discussions": false, - "forks_count": 30, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 30, - "watchers": 83, - "score": 0, - "subscribers_count": 3 - }, - { - "id": 904496445, - "name": "CVE-2024-53677", - "full_name": "yangyanglo\/CVE-2024-53677", - "owner": { - "login": "yangyanglo", - "id": 65865031, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65865031?v=4", - "html_url": "https:\/\/github.com\/yangyanglo", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/yangyanglo\/CVE-2024-53677", - "description": null, - "fork": false, - "created_at": "2024-12-17T02:22:38Z", - "updated_at": "2024-12-27T06:12:11Z", - "pushed_at": "2024-12-17T08:52:36Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 904573736, - "name": "CVE-2024-53677-Docker", - "full_name": "c4oocO\/CVE-2024-53677-Docker", - "owner": { - "login": "c4oocO", - "id": 124355329, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124355329?v=4", - "html_url": "https:\/\/github.com\/c4oocO", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/c4oocO\/CVE-2024-53677-Docker", - "description": "A Docker-based environment to reproduce the CVE-2024-53677 vulnerability in Apache Struts 2. ", - "fork": false, - "created_at": "2024-12-17T06:42:16Z", - "updated_at": "2024-12-20T15:57:49Z", - "pushed_at": "2024-12-17T07:01:11Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 905018620, - "name": "CVE-2024-53677-S2-067", - "full_name": "XiaomingX\/CVE-2024-53677-S2-067", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/CVE-2024-53677-S2-067", - "description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.", - "fork": false, - "created_at": "2024-12-18T02:03:56Z", - "updated_at": "2025-01-13T18:15:05Z", - "pushed_at": "2024-12-18T02:08:09Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 6, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 905399741, - "name": "CVE-2024-53677-S2-067-thread", - "full_name": "dustblessnotdust\/CVE-2024-53677-S2-067-thread", - "owner": { - "login": "dustblessnotdust", - "id": 185211671, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/185211671?v=4", - "html_url": "https:\/\/github.com\/dustblessnotdust", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/dustblessnotdust\/CVE-2024-53677-S2-067-thread", - "description": null, - "fork": false, - "created_at": "2024-12-18T18:42:34Z", - "updated_at": "2024-12-21T17:37:04Z", - "pushed_at": "2024-12-18T19:10:48Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 907413237, - "name": "CVE-2024-53677", - "full_name": "0xdeviner\/CVE-2024-53677", - "owner": { - "login": "0xdeviner", - "id": 61959752, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61959752?v=4", - "html_url": "https:\/\/github.com\/0xdeviner", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/0xdeviner\/CVE-2024-53677", - "description": null, - "fork": false, - "created_at": "2024-12-23T14:22:44Z", - "updated_at": "2024-12-23T14:27:54Z", - "pushed_at": "2024-12-23T14:27:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 907464165, - "name": "VM-CVE-2024-53677", - "full_name": "Q0LT\/VM-CVE-2024-53677", - "owner": { - "login": "Q0LT", - "id": 155090912, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155090912?v=4", - "html_url": "https:\/\/github.com\/Q0LT", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Q0LT\/VM-CVE-2024-53677", - "description": "Struts Vulnerability - CVE-2024-53677", - "fork": false, - "created_at": "2024-12-23T16:32:59Z", - "updated_at": "2024-12-23T17:31:35Z", - "pushed_at": "2024-12-23T17:31:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 911433822, - "name": "CVE-2024-53677", - "full_name": "EQSTLab\/CVE-2024-53677", - "owner": { - "login": "EQSTLab", - "id": 148991397, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148991397?v=4", - "html_url": "https:\/\/github.com\/EQSTLab", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/EQSTLab\/CVE-2024-53677", - "description": "Proof-of-Concept for CVE-2024-46538", - "fork": false, - "created_at": "2025-01-03T02:30:53Z", - "updated_at": "2025-01-12T07:56:06Z", - "pushed_at": "2025-01-03T18:51:20Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-53677", - "java", - "jsp", - "proof-of-concept", - "security", - "struts2", - "vulnerability" - ], - "visibility": "public", - "forks": 0, - "watchers": 5, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 913279213, - "name": "struts_cve-2024-53677", - "full_name": "0xPThree\/struts_cve-2024-53677", - "owner": { - "login": "0xPThree", - "id": 108757172, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108757172?v=4", - "html_url": "https:\/\/github.com\/0xPThree", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/0xPThree\/struts_cve-2024-53677", - "description": null, - "fork": false, - "created_at": "2025-01-07T11:27:09Z", - "updated_at": "2025-01-07T11:39:37Z", - "pushed_at": "2025-01-07T11:39:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 914016617, - "name": "Apache-struts-cve-2024-53677", - "full_name": "punitdarji\/Apache-struts-cve-2024-53677", - "owner": { - "login": "punitdarji", - "id": 38101321, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38101321?v=4", - "html_url": "https:\/\/github.com\/punitdarji", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/punitdarji\/Apache-struts-cve-2024-53677", - "description": null, - "fork": false, - "created_at": "2025-01-08T19:36:09Z", - "updated_at": "2025-01-11T11:11:09Z", - "pushed_at": "2025-01-11T11:11:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 914978081, - "name": "CVE-2024-53677", - "full_name": "SeanRickerd\/CVE-2024-53677", - "owner": { - "login": "SeanRickerd", - "id": 5073531, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5073531?v=4", - "html_url": "https:\/\/github.com\/SeanRickerd", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/SeanRickerd\/CVE-2024-53677", - "description": "Vulnerable Environment and Exploit for CVE-2024-53677", - "fork": false, - "created_at": "2025-01-10T17:47:24Z", - "updated_at": "2025-01-10T18:09:53Z", - "pushed_at": "2025-01-10T18:05:20Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-53691.json b/2024/CVE-2024-53691.json deleted file mode 100644 index 420899d3f2..0000000000 --- a/2024/CVE-2024-53691.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 916024485, - "name": "CVE-2024-53691", - "full_name": "C411e\/CVE-2024-53691", - "owner": { - "login": "C411e", - "id": 35147719, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35147719?v=4", - "html_url": "https:\/\/github.com\/C411e", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/C411e\/CVE-2024-53691", - "description": "CVE-2024-53691", - "fork": false, - "created_at": "2025-01-13T10:07:25Z", - "updated_at": "2025-01-13T13:49:31Z", - "pushed_at": "2025-01-13T10:16:58Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-54152.json b/2024/CVE-2024-54152.json deleted file mode 100644 index 25ff2ff733..0000000000 --- a/2024/CVE-2024-54152.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 909882750, - "name": "CVE-2024-54152-poc", - "full_name": "math-x-io\/CVE-2024-54152-poc", - "owner": { - "login": "math-x-io", - "id": 97481289, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97481289?v=4", - "html_url": "https:\/\/github.com\/math-x-io", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/math-x-io\/CVE-2024-54152-poc", - "description": null, - "fork": false, - "created_at": "2024-12-30T01:07:48Z", - "updated_at": "2025-01-07T07:57:18Z", - "pushed_at": "2024-12-30T01:08:00Z", - "stargazers_count": 12, - "watchers_count": 12, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 12, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-54262.json b/2024/CVE-2024-54262.json deleted file mode 100644 index ba28f4ba51..0000000000 --- a/2024/CVE-2024-54262.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 905797737, - "name": "CVE-2024-54262", - "full_name": "RandomRobbieBF\/CVE-2024-54262", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-54262", - "description": "Import Export For WooCommerce <= 1.5 - Authenticated (Subscriber+) Arbitrary File Upload", - "fork": false, - "created_at": "2024-12-19T14:42:06Z", - "updated_at": "2024-12-19T16:52:15Z", - "pushed_at": "2024-12-19T14:43:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-54292.json b/2024/CVE-2024-54292.json deleted file mode 100644 index 5854f98d27..0000000000 --- a/2024/CVE-2024-54292.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 913434304, - "name": "CVE-2024-54292", - "full_name": "RandomRobbieBF\/CVE-2024-54292", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-54292", - "description": "Appsplate <= 2.1.3 - Unauthenticated SQL Injection", - "fork": false, - "created_at": "2025-01-07T17:14:57Z", - "updated_at": "2025-01-14T12:41:56Z", - "pushed_at": "2025-01-07T17:15:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-54330.json b/2024/CVE-2024-54330.json deleted file mode 100644 index 07a41b33ff..0000000000 --- a/2024/CVE-2024-54330.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 911139468, - "name": "CVE-2024-54330", - "full_name": "RandomRobbieBF\/CVE-2024-54330", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-54330", - "description": "Hurrakify <= 2.4 - Unauthenticated Server-Side Request Forgery", - "fork": false, - "created_at": "2025-01-02T10:31:51Z", - "updated_at": "2025-01-03T15:42:04Z", - "pushed_at": "2025-01-02T10:32:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-54363.json b/2024/CVE-2024-54363.json deleted file mode 100644 index 6141c5a013..0000000000 --- a/2024/CVE-2024-54363.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 911232019, - "name": "CVE-2024-54363", - "full_name": "RandomRobbieBF\/CVE-2024-54363", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-54363", - "description": "Wp NssUser Register <= 1.0.0 - Unauthenticated Privilege Escalation", - "fork": false, - "created_at": "2025-01-02T14:41:52Z", - "updated_at": "2025-01-06T13:24:39Z", - "pushed_at": "2025-01-02T14:42:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-54369.json b/2024/CVE-2024-54369.json deleted file mode 100644 index 492736e16a..0000000000 --- a/2024/CVE-2024-54369.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 905823638, - "name": "CVE-2024-54369", - "full_name": "RandomRobbieBF\/CVE-2024-54369", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-54369", - "description": "Zita Site Builder <= 1.0.2 - Missing Authorization to Arbitrary Plugin Installation", - "fork": false, - "created_at": "2024-12-19T15:38:41Z", - "updated_at": "2025-01-06T09:23:39Z", - "pushed_at": "2024-12-19T15:39:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-54374.json b/2024/CVE-2024-54374.json deleted file mode 100644 index e3527e4941..0000000000 --- a/2024/CVE-2024-54374.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 911563924, - "name": "CVE-2024-54374", - "full_name": "RandomRobbieBF\/CVE-2024-54374", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-54374", - "description": "Sogrid <= 1.5.6 - Unauthenticated Local File Inclusion", - "fork": false, - "created_at": "2025-01-03T10:08:54Z", - "updated_at": "2025-01-06T13:24:00Z", - "pushed_at": "2025-01-03T10:09:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-54378.json b/2024/CVE-2024-54378.json deleted file mode 100644 index f952d47798..0000000000 --- a/2024/CVE-2024-54378.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 905865153, - "name": "CVE-2024-54378", - "full_name": "RandomRobbieBF\/CVE-2024-54378", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-54378", - "description": "Quietly Insights <= 1.2.2 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Options Update", - "fork": false, - "created_at": "2024-12-19T17:15:17Z", - "updated_at": "2025-01-06T13:17:55Z", - "pushed_at": "2024-12-19T17:16:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-54379.json b/2024/CVE-2024-54379.json deleted file mode 100644 index cb8d0ab269..0000000000 --- a/2024/CVE-2024-54379.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 905860280, - "name": "CVE-2024-54379", - "full_name": "RandomRobbieBF\/CVE-2024-54379", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-54379", - "description": "Minterpress <= 1.0.5 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Options Update", - "fork": false, - "created_at": "2024-12-19T17:04:01Z", - "updated_at": "2025-01-10T13:57:11Z", - "pushed_at": "2024-12-19T17:04:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-54385.json b/2024/CVE-2024-54385.json deleted file mode 100644 index 659ffb9258..0000000000 --- a/2024/CVE-2024-54385.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 911208038, - "name": "CVE-2024-54385", - "full_name": "RandomRobbieBF\/CVE-2024-54385", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-54385", - "description": "Radio Player <= 2.0.82 - Blind Unauthenticated Server-Side Request Forgery", - "fork": false, - "created_at": "2025-01-02T13:40:14Z", - "updated_at": "2025-01-06T13:25:23Z", - "pushed_at": "2025-01-02T13:40:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-54498.json b/2024/CVE-2024-54498.json deleted file mode 100644 index e8a632020d..0000000000 --- a/2024/CVE-2024-54498.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 913761355, - "name": "CVE-2024-54498-PoC", - "full_name": "wh1te4ever\/CVE-2024-54498-PoC", - "owner": { - "login": "wh1te4ever", - "id": 88495487, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88495487?v=4", - "html_url": "https:\/\/github.com\/wh1te4ever", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/wh1te4ever\/CVE-2024-54498-PoC", - "description": "Escape macOS Sandbox using sharedfilelistd exploit", - "fork": false, - "created_at": "2025-01-08T09:55:44Z", - "updated_at": "2025-01-14T18:13:40Z", - "pushed_at": "2025-01-09T06:34:50Z", - "stargazers_count": 45, - "watchers_count": 45, - "has_discussions": false, - "forks_count": 7, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 7, - "watchers": 45, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-5452.json b/2024/CVE-2024-5452.json deleted file mode 100644 index 024183bbec..0000000000 --- a/2024/CVE-2024-5452.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 892465914, - "name": "cve-2024-5452-poc", - "full_name": "XiaomingX\/cve-2024-5452-poc", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-5452-poc", - "description": "此漏洞的根本原因是**深度差异库(deepdiff)**在反序列化用户输入时,未正确处理双下划线(dunder)属性。 PyTorch Lightning 使用 deepdiff.Delta 对象根据前端操作修改应用状态,设计目标是仅允许特定状态变量的修改。", - "fork": false, - "created_at": "2024-11-22T06:56:12Z", - "updated_at": "2025-01-13T18:17:48Z", - "pushed_at": "2024-11-22T06:56:32Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-54679.json b/2024/CVE-2024-54679.json deleted file mode 100644 index e1636e8d84..0000000000 --- a/2024/CVE-2024-54679.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 899369634, - "name": "CVE-2024-54679", - "full_name": "hotplugin0x01\/CVE-2024-54679", - "owner": { - "login": "hotplugin0x01", - "id": 57496383, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57496383?v=4", - "html_url": "https:\/\/github.com\/hotplugin0x01", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/hotplugin0x01\/CVE-2024-54679", - "description": "CVE-2024-54679 - CyberPanel (aka Cyber Panel) Denial of Service (https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-54679)", - "fork": false, - "created_at": "2024-12-06T06:02:34Z", - "updated_at": "2024-12-19T20:35:12Z", - "pushed_at": "2024-12-06T06:19:42Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-54761.json b/2024/CVE-2024-54761.json deleted file mode 100644 index cd6cb49c7e..0000000000 --- a/2024/CVE-2024-54761.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 888849471, - "name": "CVE-2024-54761-BigAnt-Office-Messenger-5.6.06-RCE-via-SQL-Injection", - "full_name": "nscan9\/CVE-2024-54761-BigAnt-Office-Messenger-5.6.06-RCE-via-SQL-Injection", - "owner": { - "login": "nscan9", - "id": 142240382, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142240382?v=4", - "html_url": "https:\/\/github.com\/nscan9", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/nscan9\/CVE-2024-54761-BigAnt-Office-Messenger-5.6.06-RCE-via-SQL-Injection", - "description": "CVE-2024-54761 PoC", - "fork": false, - "created_at": "2024-11-15T05:55:29Z", - "updated_at": "2025-01-11T15:06:28Z", - "pushed_at": "2025-01-11T15:06:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-54819.json b/2024/CVE-2024-54819.json deleted file mode 100644 index 022d714f91..0000000000 --- a/2024/CVE-2024-54819.json +++ /dev/null @@ -1,36 +0,0 @@ -[ - { - "id": 910297086, - "name": "CVE-2024-54819", - "full_name": "partywavesec\/CVE-2024-54819", - "owner": { - "login": "partywavesec", - "id": 98420665, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98420665?v=4", - "html_url": "https:\/\/github.com\/partywavesec", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/partywavesec\/CVE-2024-54819", - "description": "CVE-2024-54819", - "fork": false, - "created_at": "2024-12-30T23:06:22Z", - "updated_at": "2025-01-02T12:55:32Z", - "pushed_at": "2024-12-30T23:18:52Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-54819", - "security" - ], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-54910.json b/2024/CVE-2024-54910.json deleted file mode 100644 index 8ae361b142..0000000000 --- a/2024/CVE-2024-54910.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 913463488, - "name": "CVE-2024-54910", - "full_name": "KrakenEU\/CVE-2024-54910", - "owner": { - "login": "KrakenEU", - "id": 80364768, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80364768?v=4", - "html_url": "https:\/\/github.com\/KrakenEU", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/KrakenEU\/CVE-2024-54910", - "description": null, - "fork": false, - "created_at": "2025-01-07T18:24:46Z", - "updated_at": "2025-01-10T23:07:09Z", - "pushed_at": "2025-01-10T23:07:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-55099.json b/2024/CVE-2024-55099.json deleted file mode 100644 index 6c2a2531ff..0000000000 --- a/2024/CVE-2024-55099.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 901509181, - "name": "CVE-2024-55099-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability-", - "full_name": "ugurkarakoc1\/CVE-2024-55099-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability-", - "owner": { - "login": "ugurkarakoc1", - "id": 171127980, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171127980?v=4", - "html_url": "https:\/\/github.com\/ugurkarakoc1", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ugurkarakoc1\/CVE-2024-55099-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability-", - "description": null, - "fork": false, - "created_at": "2024-12-10T19:40:26Z", - "updated_at": "2024-12-10T19:43:56Z", - "pushed_at": "2024-12-10T19:43:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-5522.json b/2024/CVE-2024-5522.json index e0a5d0cadb..b2a4d57255 100644 --- a/2024/CVE-2024-5522.json +++ b/2024/CVE-2024-5522.json @@ -60,51 +60,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 866079798, - "name": "CVE-2024-5522", - "full_name": "geniuszly\/CVE-2024-5522", - "owner": { - "login": "geniuszly", - "id": 137893386, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4", - "html_url": "https:\/\/github.com\/geniuszly", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-5522", - "description": "A PoC exploit scanner for CVE-2024-5522 vulnerability in WordPress websites", - "fork": false, - "created_at": "2024-10-01T16:02:12Z", - "updated_at": "2024-11-20T16:31:06Z", - "pushed_at": "2024-10-01T16:03:38Z", - "stargazers_count": 9, - "watchers_count": 9, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "buffer-overflow", - "cve", - "cve-2024-5522", - "cybersecurity", - "ethical-hacking", - "exploit", - "exploit-development", - "linux", - "poc", - "security", - "vulnerability", - "vulnerability-research", - "wordpress", - "wp" - ], - "visibility": "public", - "forks": 1, - "watchers": 9, - "score": 0, - "subscribers_count": 3 } ] \ No newline at end of file diff --git a/2024/CVE-2024-55457.json b/2024/CVE-2024-55457.json deleted file mode 100644 index 1245b5e959..0000000000 --- a/2024/CVE-2024-55457.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 912328942, - "name": "CVE-2024-55457-PoC", - "full_name": "h13nh04ng\/CVE-2024-55457-PoC", - "owner": { - "login": "h13nh04ng", - "id": 86940873, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86940873?v=4", - "html_url": "https:\/\/github.com\/h13nh04ng", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/h13nh04ng\/CVE-2024-55457-PoC", - "description": null, - "fork": false, - "created_at": "2025-01-05T09:07:46Z", - "updated_at": "2025-01-05T09:19:35Z", - "pushed_at": "2025-01-05T09:19:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-55503.json b/2024/CVE-2024-55503.json deleted file mode 100644 index e2e0cc75a9..0000000000 --- a/2024/CVE-2024-55503.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 899238471, - "name": "CVE-2024-55503", - "full_name": "SyFi\/CVE-2024-55503", - "owner": { - "login": "SyFi", - "id": 26314806, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26314806?v=4", - "html_url": "https:\/\/github.com\/SyFi", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/SyFi\/CVE-2024-55503", - "description": null, - "fork": false, - "created_at": "2024-12-05T21:48:21Z", - "updated_at": "2025-01-12T00:17:40Z", - "pushed_at": "2025-01-12T00:17:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-55557.json b/2024/CVE-2024-55557.json deleted file mode 100644 index cba92e2570..0000000000 --- a/2024/CVE-2024-55557.json +++ /dev/null @@ -1,36 +0,0 @@ -[ - { - "id": 901530255, - "name": "CVE-2024-55557", - "full_name": "partywavesec\/CVE-2024-55557", - "owner": { - "login": "partywavesec", - "id": 98420665, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98420665?v=4", - "html_url": "https:\/\/github.com\/partywavesec", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/partywavesec\/CVE-2024-55557", - "description": "CVE-2024-55557", - "fork": false, - "created_at": "2024-12-10T20:38:03Z", - "updated_at": "2024-12-30T23:20:49Z", - "pushed_at": "2024-12-30T23:10:41Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-55557", - "security" - ], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-55587.json b/2024/CVE-2024-55587.json deleted file mode 100644 index 467bb6f0d2..0000000000 --- a/2024/CVE-2024-55587.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 901168926, - "name": "CVE-2024-55587", - "full_name": "CSIRTTrizna\/CVE-2024-55587", - "owner": { - "login": "CSIRTTrizna", - "id": 170928596, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170928596?v=4", - "html_url": "https:\/\/github.com\/CSIRTTrizna", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/CSIRTTrizna\/CVE-2024-55587", - "description": null, - "fork": false, - "created_at": "2024-12-10T06:59:00Z", - "updated_at": "2024-12-15T16:54:02Z", - "pushed_at": "2024-12-10T07:05:27Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-55875.json b/2024/CVE-2024-55875.json deleted file mode 100644 index d1014a5d78..0000000000 --- a/2024/CVE-2024-55875.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 902723062, - "name": "CVE-2024-55875", - "full_name": "JAckLosingHeart\/CVE-2024-55875", - "owner": { - "login": "JAckLosingHeart", - "id": 57932150, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57932150?v=4", - "html_url": "https:\/\/github.com\/JAckLosingHeart", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/JAckLosingHeart\/CVE-2024-55875", - "description": "CVE-2024-55875 | GHSA-7mj5-hjjj-8rgw | http4k first CVE", - "fork": false, - "created_at": "2024-12-13T06:21:36Z", - "updated_at": "2025-01-13T01:24:28Z", - "pushed_at": "2024-12-13T07:28:34Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 6, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-55968.json b/2024/CVE-2024-55968.json deleted file mode 100644 index 1017f299b2..0000000000 --- a/2024/CVE-2024-55968.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 904942381, - "name": "CVE-2024-55968", - "full_name": "Wi1DN00B\/CVE-2024-55968", - "owner": { - "login": "Wi1DN00B", - "id": 103459492, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103459492?v=4", - "html_url": "https:\/\/github.com\/Wi1DN00B", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Wi1DN00B\/CVE-2024-55968", - "description": "Exploit POC Code for CVE-2024-55968", - "fork": false, - "created_at": "2024-12-17T21:07:59Z", - "updated_at": "2024-12-19T04:47:33Z", - "pushed_at": "2024-12-19T04:47:30Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 904942447, - "name": "CVE-2024-55968", - "full_name": "null-event\/CVE-2024-55968", - "owner": { - "login": "null-event", - "id": 47583736, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47583736?v=4", - "html_url": "https:\/\/github.com\/null-event", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/null-event\/CVE-2024-55968", - "description": "POC for DTEX LPE (CVE-2024-55968)", - "fork": false, - "created_at": "2024-12-17T21:08:11Z", - "updated_at": "2024-12-17T21:28:14Z", - "pushed_at": "2024-12-17T21:14:29Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-55972.json b/2024/CVE-2024-55972.json deleted file mode 100644 index bd6759cc77..0000000000 --- a/2024/CVE-2024-55972.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 911617043, - "name": "CVE-2024-55972", - "full_name": "RandomRobbieBF\/CVE-2024-55972", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-55972", - "description": "eTemplates <= 0.2.1 - Unauthenticated SQL Injection", - "fork": false, - "created_at": "2025-01-03T12:47:01Z", - "updated_at": "2025-01-06T09:25:28Z", - "pushed_at": "2025-01-03T12:48:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-55976.json b/2024/CVE-2024-55976.json deleted file mode 100644 index dd78693a9a..0000000000 --- a/2024/CVE-2024-55976.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 911633099, - "name": "CVE-2024-55976", - "full_name": "RandomRobbieBF\/CVE-2024-55976", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-55976", - "description": "Critical Site Intel <= 1.0 - Unauthenticated SQL Injection", - "fork": false, - "created_at": "2025-01-03T13:32:11Z", - "updated_at": "2025-01-06T09:26:23Z", - "pushed_at": "2025-01-03T13:33:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-55978.json b/2024/CVE-2024-55978.json deleted file mode 100644 index 512710946d..0000000000 --- a/2024/CVE-2024-55978.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 911200848, - "name": "CVE-2024-55978", - "full_name": "RandomRobbieBF\/CVE-2024-55978", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-55978", - "description": "Code Generator Pro <= 1.2 - Unauthenticated SQL Injection", - "fork": false, - "created_at": "2025-01-02T13:21:36Z", - "updated_at": "2025-01-06T13:26:00Z", - "pushed_at": "2025-01-02T13:25:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-55980.json b/2024/CVE-2024-55980.json deleted file mode 100644 index b31c5b5848..0000000000 --- a/2024/CVE-2024-55980.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 911153744, - "name": "CVE-2024-55980", - "full_name": "RandomRobbieBF\/CVE-2024-55980", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-55980", - "description": "Wr Age Verification <= 2.0.0 - Unauthenticated SQL Injection", - "fork": false, - "created_at": "2025-01-02T11:11:48Z", - "updated_at": "2025-01-06T13:26:50Z", - "pushed_at": "2025-01-02T11:15:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-55981.json b/2024/CVE-2024-55981.json deleted file mode 100644 index 8423ac43b6..0000000000 --- a/2024/CVE-2024-55981.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 911614124, - "name": "CVE-2024-55981", - "full_name": "RandomRobbieBF\/CVE-2024-55981", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-55981", - "description": "Nabz Image Gallery <= v1.00 - Unauthenticated SQL Injection", - "fork": false, - "created_at": "2025-01-03T12:38:29Z", - "updated_at": "2025-01-06T09:27:13Z", - "pushed_at": "2025-01-03T12:39:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-55982.json b/2024/CVE-2024-55982.json deleted file mode 100644 index f31f071c42..0000000000 --- a/2024/CVE-2024-55982.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 911609279, - "name": "CVE-2024-55982", - "full_name": "RandomRobbieBF\/CVE-2024-55982", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-55982", - "description": "Share Buttons – Social Media <= 1.0.2 - Unauthenticated SQL Injection", - "fork": false, - "created_at": "2025-01-03T12:23:50Z", - "updated_at": "2025-01-06T09:28:03Z", - "pushed_at": "2025-01-03T12:25:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-55988.json b/2024/CVE-2024-55988.json deleted file mode 100644 index 221704d866..0000000000 --- a/2024/CVE-2024-55988.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 911576506, - "name": "CVE-2024-55988", - "full_name": "RandomRobbieBF\/CVE-2024-55988", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-55988", - "description": "Navayan CSV Export <= 1.0.9 - Unauthenticated SQL Injection", - "fork": false, - "created_at": "2025-01-03T10:45:42Z", - "updated_at": "2025-01-03T18:41:23Z", - "pushed_at": "2025-01-03T11:02:23Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-56058.json b/2024/CVE-2024-56058.json deleted file mode 100644 index 7245edc196..0000000000 --- a/2024/CVE-2024-56058.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 916058182, - "name": "CVE-2024-56058", - "full_name": "RandomRobbieBF\/CVE-2024-56058", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-56058", - "description": "VRPConnector <= 2.0.1 - Unauthenticated PHP Object Injection", - "fork": false, - "created_at": "2025-01-13T11:27:53Z", - "updated_at": "2025-01-14T12:39:13Z", - "pushed_at": "2025-01-13T11:30:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-56059.json b/2024/CVE-2024-56059.json deleted file mode 100644 index 4994ebcb6e..0000000000 --- a/2024/CVE-2024-56059.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 916073116, - "name": "CVE-2024-56059", - "full_name": "RandomRobbieBF\/CVE-2024-56059", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-56059", - "description": "Partners <= 0.2.0 - Unauthenticated PHP Object Injection", - "fork": false, - "created_at": "2025-01-13T12:05:21Z", - "updated_at": "2025-01-14T12:38:58Z", - "pushed_at": "2025-01-13T12:05:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-56064.json b/2024/CVE-2024-56064.json deleted file mode 100644 index d4db5469cc..0000000000 --- a/2024/CVE-2024-56064.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 914434121, - "name": "CVE-2024-56064", - "full_name": "RandomRobbieBF\/CVE-2024-56064", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-56064", - "description": "WP SuperBackup <= 2.3.3 - Unauthenticated Arbitrary File Upload", - "fork": false, - "created_at": "2025-01-09T15:35:39Z", - "updated_at": "2025-01-14T12:41:11Z", - "pushed_at": "2025-01-09T15:36:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-56067.json b/2024/CVE-2024-56067.json deleted file mode 100644 index 68f909f3e5..0000000000 --- a/2024/CVE-2024-56067.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 914305639, - "name": "CVE-2024-56067", - "full_name": "RandomRobbieBF\/CVE-2024-56067", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-56067", - "description": "WP SuperBackup <= 2.3.3 - Missing Authorization to Unauthenticated Back-Up File Download", - "fork": false, - "created_at": "2025-01-09T10:40:33Z", - "updated_at": "2025-01-14T12:41:21Z", - "pushed_at": "2025-01-09T10:42:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-56115.json b/2024/CVE-2024-56115.json deleted file mode 100644 index e526d3a83a..0000000000 --- a/2024/CVE-2024-56115.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 904071998, - "name": "CVE-2024-56115", - "full_name": "ComplianceControl\/CVE-2024-56115", - "owner": { - "login": "ComplianceControl", - "id": 188841575, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188841575?v=4", - "html_url": "https:\/\/github.com\/ComplianceControl", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ComplianceControl\/CVE-2024-56115", - "description": null, - "fork": false, - "created_at": "2024-12-16T07:46:41Z", - "updated_at": "2024-12-16T07:47:09Z", - "pushed_at": "2024-12-16T07:47:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-56116.json b/2024/CVE-2024-56116.json deleted file mode 100644 index 0de27214d9..0000000000 --- a/2024/CVE-2024-56116.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 904070943, - "name": "CVE-2024-56116", - "full_name": "ComplianceControl\/CVE-2024-56116", - "owner": { - "login": "ComplianceControl", - "id": 188841575, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188841575?v=4", - "html_url": "https:\/\/github.com\/ComplianceControl", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ComplianceControl\/CVE-2024-56116", - "description": null, - "fork": false, - "created_at": "2024-12-16T07:44:07Z", - "updated_at": "2024-12-16T07:46:19Z", - "pushed_at": "2024-12-16T07:46:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-56145.json b/2024/CVE-2024-56145.json deleted file mode 100644 index 31ab07a5f3..0000000000 --- a/2024/CVE-2024-56145.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 906042974, - "name": "CVE-2024-56145", - "full_name": "Chocapikk\/CVE-2024-56145", - "owner": { - "login": "Chocapikk", - "id": 88535377, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", - "html_url": "https:\/\/github.com\/Chocapikk", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-56145", - "description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled", - "fork": false, - "created_at": "2024-12-20T03:34:01Z", - "updated_at": "2025-01-14T18:05:18Z", - "pushed_at": "2024-12-23T12:51:54Z", - "stargazers_count": 36, - "watchers_count": 36, - "has_discussions": false, - "forks_count": 11, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 11, - "watchers": 36, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 906949463, - "name": "CVE-2024-56145-craftcms-rce", - "full_name": "Sachinart\/CVE-2024-56145-craftcms-rce", - "owner": { - "login": "Sachinart", - "id": 18497191, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18497191?v=4", - "html_url": "https:\/\/github.com\/Sachinart", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Sachinart\/CVE-2024-56145-craftcms-rce", - "description": "CVE-2024-56145 SSTI to RCE - twig templates ", - "fork": false, - "created_at": "2024-12-22T11:53:04Z", - "updated_at": "2024-12-25T01:44:47Z", - "pushed_at": "2024-12-22T15:02:07Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-56278.json b/2024/CVE-2024-56278.json deleted file mode 100644 index 77e3bddb82..0000000000 --- a/2024/CVE-2024-56278.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 912594591, - "name": "CVE-2024-56278", - "full_name": "DoTTak\/CVE-2024-56278", - "owner": { - "login": "DoTTak", - "id": 57674710, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57674710?v=4", - "html_url": "https:\/\/github.com\/DoTTak", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/DoTTak\/CVE-2024-56278", - "description": "PoC of CVE-2024-56278", - "fork": false, - "created_at": "2025-01-06T01:51:46Z", - "updated_at": "2025-01-08T01:10:07Z", - "pushed_at": "2025-01-06T01:55:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-56289.json b/2024/CVE-2024-56289.json deleted file mode 100644 index 68e04f7f5e..0000000000 --- a/2024/CVE-2024-56289.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 912596084, - "name": "CVE-2024-56289", - "full_name": "DoTTak\/CVE-2024-56289", - "owner": { - "login": "DoTTak", - "id": 57674710, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57674710?v=4", - "html_url": "https:\/\/github.com\/DoTTak", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/DoTTak\/CVE-2024-56289", - "description": "PoC of CVE-2024-56289", - "fork": false, - "created_at": "2025-01-06T01:58:24Z", - "updated_at": "2025-01-08T01:11:03Z", - "pushed_at": "2025-01-06T01:58:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-5633.json b/2024/CVE-2024-5633.json deleted file mode 100644 index 7a58c5e48e..0000000000 --- a/2024/CVE-2024-5633.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 831860560, - "name": "CVE-2024-5633", - "full_name": "Adikso\/CVE-2024-5633", - "owner": { - "login": "Adikso", - "id": 1407751, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1407751?v=4", - "html_url": "https:\/\/github.com\/Adikso", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Adikso\/CVE-2024-5633", - "description": "PoC for CVE-2024-5633", - "fork": false, - "created_at": "2024-07-21T20:27:24Z", - "updated_at": "2024-08-13T18:11:16Z", - "pushed_at": "2024-07-21T20:30:23Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-56331.json b/2024/CVE-2024-56331.json deleted file mode 100644 index 35a5f95a75..0000000000 --- a/2024/CVE-2024-56331.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 893793933, - "name": "CVE-2024-56331", - "full_name": "griisemine\/CVE-2024-56331", - "owner": { - "login": "griisemine", - "id": 45427131, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45427131?v=4", - "html_url": "https:\/\/github.com\/griisemine", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/griisemine\/CVE-2024-56331", - "description": null, - "fork": false, - "created_at": "2024-11-25T08:16:38Z", - "updated_at": "2025-01-13T10:10:25Z", - "pushed_at": "2024-12-21T21:09:33Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-56431.json b/2024/CVE-2024-56431.json deleted file mode 100644 index d1d4b40c5d..0000000000 --- a/2024/CVE-2024-56431.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 908074157, - "name": "libtheora-CVE-2024-56431-PoC", - "full_name": "UnionTech-Software\/libtheora-CVE-2024-56431-PoC", - "owner": { - "login": "UnionTech-Software", - "id": 190581312, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/190581312?v=4", - "html_url": "https:\/\/github.com\/UnionTech-Software", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/UnionTech-Software\/libtheora-CVE-2024-56431-PoC", - "description": null, - "fork": false, - "created_at": "2024-12-25T03:58:50Z", - "updated_at": "2024-12-25T03:59:40Z", - "pushed_at": "2024-12-25T03:59:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-56433.json b/2024/CVE-2024-56433.json deleted file mode 100644 index 6c4f02f541..0000000000 --- a/2024/CVE-2024-56433.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 911625725, - "name": "CVE-2024-56433", - "full_name": "JonnyWhatshisface\/CVE-2024-56433", - "owner": { - "login": "JonnyWhatshisface", - "id": 6776518, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6776518?v=4", - "html_url": "https:\/\/github.com\/JonnyWhatshisface", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/JonnyWhatshisface\/CVE-2024-56433", - "description": "CVE-2024-56433 - shadow-utils Default subordinate ID for local users creates risk of collision", - "fork": false, - "created_at": "2025-01-03T13:11:25Z", - "updated_at": "2025-01-08T08:24:17Z", - "pushed_at": "2025-01-08T08:24:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-56512.json b/2024/CVE-2024-56512.json deleted file mode 100644 index 9c345a4a3a..0000000000 --- a/2024/CVE-2024-56512.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 912934520, - "name": "CVE-2024-56512-Apache-NiFi-Exploit", - "full_name": "absholi7ly\/CVE-2024-56512-Apache-NiFi-Exploit", - "owner": { - "login": "absholi7ly", - "id": 72062217, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72062217?v=4", - "html_url": "https:\/\/github.com\/absholi7ly", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/absholi7ly\/CVE-2024-56512-Apache-NiFi-Exploit", - "description": "A tool to exploit the CVE-2024-56512 vulnerability in Apache NiFi, which allows unauthorized access to sensitive data through improperly secured APIs.", - "fork": false, - "created_at": "2025-01-06T17:35:33Z", - "updated_at": "2025-01-06T23:11:22Z", - "pushed_at": "2025-01-06T17:51:38Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-57487.json b/2024/CVE-2024-57487.json deleted file mode 100644 index f48d6389f6..0000000000 --- a/2024/CVE-2024-57487.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 914937603, - "name": "CVE-2024-57487-and-CVE-2024-57488", - "full_name": "aaryan-11-x\/CVE-2024-57487-and-CVE-2024-57488", - "owner": { - "login": "aaryan-11-x", - "id": 102362952, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102362952?v=4", - "html_url": "https:\/\/github.com\/aaryan-11-x", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/aaryan-11-x\/CVE-2024-57487-and-CVE-2024-57488", - "description": "POC of CVE-2024-57487 & CVE-2024-57488", - "fork": false, - "created_at": "2025-01-10T16:06:23Z", - "updated_at": "2025-01-10T17:16:29Z", - "pushed_at": "2025-01-10T17:16:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-5764.json b/2024/CVE-2024-5764.json deleted file mode 100644 index 78e358676b..0000000000 --- a/2024/CVE-2024-5764.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 888675608, - "name": "CVE-2024-5764", - "full_name": "fin3ss3g0d\/CVE-2024-5764", - "owner": { - "login": "fin3ss3g0d", - "id": 62859381, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62859381?v=4", - "html_url": "https:\/\/github.com\/fin3ss3g0d", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/fin3ss3g0d\/CVE-2024-5764", - "description": "CVE-2024-5764 exploitation script", - "fork": false, - "created_at": "2024-11-14T20:08:45Z", - "updated_at": "2024-11-20T16:31:10Z", - "pushed_at": "2024-11-14T20:11:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-5910.json b/2024/CVE-2024-5910.json deleted file mode 100644 index 4986751bb4..0000000000 --- a/2024/CVE-2024-5910.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 889262902, - "name": "Palo-Alto-Expedition-Remote-Code-Execution-Exploit-CVE-2024-5910-CVE-2024-9464", - "full_name": "p33d\/Palo-Alto-Expedition-Remote-Code-Execution-Exploit-CVE-2024-5910-CVE-2024-9464", - "owner": { - "login": "p33d", - "id": 123099747, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123099747?v=4", - "html_url": "https:\/\/github.com\/p33d", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/p33d\/Palo-Alto-Expedition-Remote-Code-Execution-Exploit-CVE-2024-5910-CVE-2024-9464", - "description": null, - "fork": false, - "created_at": "2024-11-15T23:46:01Z", - "updated_at": "2024-11-15T23:46:01Z", - "pushed_at": "2024-11-15T23:46:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-5932.json b/2024/CVE-2024-5932.json index f1758e844f..55f6e1a08a 100644 --- a/2024/CVE-2024-5932.json +++ b/2024/CVE-2024-5932.json @@ -71,36 +71,5 @@ "watchers": 52, "score": 0, "subscribers_count": 1 - }, - { - "id": 871074593, - "name": "cve-2024-5932", - "full_name": "OxLmahdi\/cve-2024-5932", - "owner": { - "login": "OxLmahdi", - "id": 159675795, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/159675795?v=4", - "html_url": "https:\/\/github.com\/OxLmahdi", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/OxLmahdi\/cve-2024-5932", - "description": null, - "fork": false, - "created_at": "2024-10-11T08:12:38Z", - "updated_at": "2024-11-05T16:05:18Z", - "pushed_at": "2024-10-11T08:32:55Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-5947.json b/2024/CVE-2024-5947.json deleted file mode 100644 index e64e5c54ee..0000000000 --- a/2024/CVE-2024-5947.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 825338684, - "name": "CVE-2024-5947", - "full_name": "Cappricio-Securities\/CVE-2024-5947", - "owner": { - "login": "Cappricio-Securities", - "id": 102907425, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4", - "html_url": "https:\/\/github.com\/Cappricio-Securities", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2024-5947", - "description": "Deep Sea Electronics DSE855 - Authentication Bypass", - "fork": false, - "created_at": "2024-07-07T14:03:49Z", - "updated_at": "2024-07-07T14:10:53Z", - "pushed_at": "2024-07-07T14:10:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-5961.json b/2024/CVE-2024-5961.json deleted file mode 100644 index c4863b9610..0000000000 --- a/2024/CVE-2024-5961.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 822555530, - "name": "CVE-2024-5961", - "full_name": "kac89\/CVE-2024-5961", - "owner": { - "login": "kac89", - "id": 5662731, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5662731?v=4", - "html_url": "https:\/\/github.com\/kac89", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/kac89\/CVE-2024-5961", - "description": "Reflected XSS in 2ClickPortal", - "fork": false, - "created_at": "2024-07-01T11:17:48Z", - "updated_at": "2024-07-01T14:35:08Z", - "pushed_at": "2024-07-01T14:35:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-6050.json b/2024/CVE-2024-6050.json deleted file mode 100644 index 704c282663..0000000000 --- a/2024/CVE-2024-6050.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 822644855, - "name": "CVE-2024-6050", - "full_name": "kac89\/CVE-2024-6050", - "owner": { - "login": "kac89", - "id": 5662731, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5662731?v=4", - "html_url": "https:\/\/github.com\/kac89", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/kac89\/CVE-2024-6050", - "description": "Reflected XSS in SOWA OPAC", - "fork": false, - "created_at": "2024-07-01T14:31:37Z", - "updated_at": "2024-07-01T22:01:03Z", - "pushed_at": "2024-07-01T14:33:42Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-6222.json b/2024/CVE-2024-6222.json deleted file mode 100644 index baada9b454..0000000000 --- a/2024/CVE-2024-6222.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 838983610, - "name": "CVE-2024-6222", - "full_name": "Florian-Hoth\/CVE-2024-6222", - "owner": { - "login": "Florian-Hoth", - "id": 177672507, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/177672507?v=4", - "html_url": "https:\/\/github.com\/Florian-Hoth", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Florian-Hoth\/CVE-2024-6222", - "description": "Docker Extension\/Dashboard RCE Vulnerability", - "fork": false, - "created_at": "2024-08-06T18:20:46Z", - "updated_at": "2024-08-15T17:08:30Z", - "pushed_at": "2024-08-06T18:21:25Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-6330.json b/2024/CVE-2024-6330.json deleted file mode 100644 index 50d813a24b..0000000000 --- a/2024/CVE-2024-6330.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 891325737, - "name": "CVE-2024-6330", - "full_name": "RandomRobbieBF\/CVE-2024-6330", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-6330", - "description": "GEO my WordPress < 4.5.0.2 - Unauthenticated LFI to RCE\/PHAR Deserialization", - "fork": false, - "created_at": "2024-11-20T06:08:32Z", - "updated_at": "2025-01-06T13:22:43Z", - "pushed_at": "2024-12-13T14:00:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-6366.json b/2024/CVE-2024-6366.json deleted file mode 100644 index b454dbe150..0000000000 --- a/2024/CVE-2024-6366.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 837558368, - "name": "CVE-2024-6366", - "full_name": "Abdurahmon3236\/CVE-2024-6366", - "owner": { - "login": "Abdurahmon3236", - "id": 76862934, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76862934?v=4", - "html_url": "https:\/\/github.com\/Abdurahmon3236", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Abdurahmon3236\/CVE-2024-6366", - "description": null, - "fork": false, - "created_at": "2024-08-03T10:30:49Z", - "updated_at": "2024-08-03T19:35:41Z", - "pushed_at": "2024-08-03T19:35:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index c68601e862..2e3e68ac8e 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -1,259 +1,4 @@ [ - { - "id": 822546559, - "name": "cve-2024-6387-poc", - "full_name": "zgzhang\/cve-2024-6387-poc", - "owner": { - "login": "zgzhang", - "id": 11416832, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11416832?v=4", - "html_url": "https:\/\/github.com\/zgzhang", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/zgzhang\/cve-2024-6387-poc", - "description": "a signal handler race condition in OpenSSH's server (sshd)", - "fork": false, - "created_at": "2024-07-01T10:55:29Z", - "updated_at": "2025-01-07T04:25:05Z", - "pushed_at": "2024-07-01T10:54:02Z", - "stargazers_count": 473, - "watchers_count": 473, - "has_discussions": false, - "forks_count": 183, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 183, - "watchers": 473, - "score": 0, - "subscribers_count": 5 - }, - { - "id": 822579775, - "name": "cve-2024-6387-poc", - "full_name": "acrono\/cve-2024-6387-poc", - "owner": { - "login": "acrono", - "id": 51956758, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51956758?v=4", - "html_url": "https:\/\/github.com\/acrono", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/acrono\/cve-2024-6387-poc", - "description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc", - "fork": false, - "created_at": "2024-07-01T12:16:21Z", - "updated_at": "2025-01-09T19:13:36Z", - "pushed_at": "2024-07-01T12:25:01Z", - "stargazers_count": 378, - "watchers_count": 378, - "has_discussions": false, - "forks_count": 90, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 90, - "watchers": 378, - "score": 0, - "subscribers_count": 8 - }, - { - "id": 822584501, - "name": "cve-2024-6387-poc", - "full_name": "lflare\/cve-2024-6387-poc", - "owner": { - "login": "lflare", - "id": 22326991, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22326991?v=4", - "html_url": "https:\/\/github.com\/lflare", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/lflare\/cve-2024-6387-poc", - "description": "MIRROR of the original 32-bit PoC for CVE-2024-6387 \"regreSSHion\" by 7etsuo\/cve-2024-6387-poc", - "fork": false, - "created_at": "2024-07-01T12:26:40Z", - "updated_at": "2025-01-02T12:21:22Z", - "pushed_at": "2024-07-25T04:23:11Z", - "stargazers_count": 111, - "watchers_count": 111, - "has_discussions": false, - "forks_count": 40, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-6387", - "openssh", - "poc", - "rce", - "regresshion", - "ssh" - ], - "visibility": "public", - "forks": 40, - "watchers": 111, - "score": 0, - "subscribers_count": 4 - }, - { - "id": 822593995, - "name": "cve-2024-6387-poc", - "full_name": "shyrwall\/cve-2024-6387-poc", - "owner": { - "login": "shyrwall", - "id": 1523968, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1523968?v=4", - "html_url": "https:\/\/github.com\/shyrwall", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/shyrwall\/cve-2024-6387-poc", - "description": null, - "fork": false, - "created_at": "2024-07-01T12:48:36Z", - "updated_at": "2024-07-01T12:50:32Z", - "pushed_at": "2024-07-01T12:50:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 822595195, - "name": "CVE-2024-6387-PoC", - "full_name": "getdrive\/CVE-2024-6387-PoC", - "owner": { - "login": "getdrive", - "id": 20697688, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20697688?v=4", - "html_url": "https:\/\/github.com\/getdrive", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/getdrive\/CVE-2024-6387-PoC", - "description": "PoC RCE in OpenSSH", - "fork": false, - "created_at": "2024-07-01T12:51:18Z", - "updated_at": "2024-12-08T12:41:06Z", - "pushed_at": "2024-07-01T13:34:47Z", - "stargazers_count": 22, - "watchers_count": 22, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 22, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 822620870, - "name": "CVE-2024-6387-POC", - "full_name": "FerasAlrimali\/CVE-2024-6387-POC", - "owner": { - "login": "FerasAlrimali", - "id": 51955818, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51955818?v=4", - "html_url": "https:\/\/github.com\/FerasAlrimali", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/FerasAlrimali\/CVE-2024-6387-POC", - "description": "SSHd cve-2024-6387-poc", - "fork": false, - "created_at": "2024-07-01T13:38:47Z", - "updated_at": "2024-07-01T13:42:18Z", - "pushed_at": "2024-07-01T13:42:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 822634085, - "name": "cve-2024-6387-poc", - "full_name": "passwa11\/cve-2024-6387-poc", - "owner": { - "login": "passwa11", - "id": 112363374, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112363374?v=4", - "html_url": "https:\/\/github.com\/passwa11", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/passwa11\/cve-2024-6387-poc", - "description": null, - "fork": false, - "created_at": "2024-07-01T14:08:23Z", - "updated_at": "2024-07-27T19:01:18Z", - "pushed_at": "2024-07-01T14:10:08Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 822746375, - "name": "CVE-2024-6387", - "full_name": "jack0we\/CVE-2024-6387", - "owner": { - "login": "jack0we", - "id": 150005594, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150005594?v=4", - "html_url": "https:\/\/github.com\/jack0we", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/jack0we\/CVE-2024-6387", - "description": null, - "fork": false, - "created_at": "2024-07-01T18:28:25Z", - "updated_at": "2024-07-01T18:32:44Z", - "pushed_at": "2024-07-01T18:32:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 822788426, "name": "CVE-2024-6387_Check", @@ -291,1880 +36,6 @@ "score": 0, "subscribers_count": 7 }, - { - "id": 822792125, - "name": "CVE-2024-6387", - "full_name": "bigb0x\/CVE-2024-6387", - "owner": { - "login": "bigb0x", - "id": 13532434, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4", - "html_url": "https:\/\/github.com\/bigb0x", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-6387", - "description": "Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2006-5051 , CVE-2008-4109 and others.", - "fork": false, - "created_at": "2024-07-01T20:45:53Z", - "updated_at": "2025-01-03T10:25:53Z", - "pushed_at": "2024-07-06T10:47:30Z", - "stargazers_count": 27, - "watchers_count": 27, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "openssh", - "security-audit", - "security-tools", - "ssh", - "ssh-server" - ], - "visibility": "public", - "forks": 6, - "watchers": 27, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 822824673, - "name": "regresshion-check", - "full_name": "wiggels\/regresshion-check", - "owner": { - "login": "wiggels", - "id": 16748278, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16748278?v=4", - "html_url": "https:\/\/github.com\/wiggels", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/wiggels\/regresshion-check", - "description": "CLI Tool to Check SSH Servers for Vulnerability to CVE-2024-6387", - "fork": false, - "created_at": "2024-07-01T22:53:32Z", - "updated_at": "2024-08-01T17:34:14Z", - "pushed_at": "2024-07-16T20:25:52Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 6, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 822856797, - "name": "CVE-2024-6387", - "full_name": "3yujw7njai\/CVE-2024-6387", - "owner": { - "login": "3yujw7njai", - "id": 7390055, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7390055?v=4", - "html_url": "https:\/\/github.com\/3yujw7njai", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/3yujw7njai\/CVE-2024-6387", - "description": "SSH RCE PoC CVE-2024-6387", - "fork": false, - "created_at": "2024-07-02T01:08:05Z", - "updated_at": "2024-12-08T12:40:56Z", - "pushed_at": "2024-07-02T01:13:22Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 10, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 10, - "watchers": 4, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 822860717, - "name": "OpenSSH-Vulnerability-test", - "full_name": "betancour\/OpenSSH-Vulnerability-test", - "owner": { - "login": "betancour", - "id": 283403, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/283403?v=4", - "html_url": "https:\/\/github.com\/betancour", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/betancour\/OpenSSH-Vulnerability-test", - "description": "OpenSSH CVE-2024-6387 Vulnerability Checker", - "fork": false, - "created_at": "2024-07-02T01:24:04Z", - "updated_at": "2024-12-24T09:30:51Z", - "pushed_at": "2024-07-02T01:31:11Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 822879505, - "name": "CVE-2024-6387fixshell", - "full_name": "muyuanlove\/CVE-2024-6387fixshell", - "owner": { - "login": "muyuanlove", - "id": 41590587, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41590587?v=4", - "html_url": "https:\/\/github.com\/muyuanlove", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/muyuanlove\/CVE-2024-6387fixshell", - "description": null, - "fork": false, - "created_at": "2024-07-02T02:35:24Z", - "updated_at": "2024-07-02T06:18:19Z", - "pushed_at": "2024-07-02T02:39:40Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 822883843, - "name": "CVE-2024-6387", - "full_name": "TAM-K592\/CVE-2024-6387", - "owner": { - "login": "TAM-K592", - "id": 8276702, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8276702?v=4", - "html_url": "https:\/\/github.com\/TAM-K592", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/TAM-K592\/CVE-2024-6387", - "description": "Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote code execution (RCE) with root privileges. This vulnerability, identified as CVE-2024-6387, resides in the OpenSSH server component (sshd), which is designed to listen for connections from client applications.", - "fork": false, - "created_at": "2024-07-02T02:51:37Z", - "updated_at": "2024-12-28T05:47:38Z", - "pushed_at": "2024-07-02T03:23:00Z", - "stargazers_count": 10, - "watchers_count": 10, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 10, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 822884531, - "name": "regreSSHion", - "full_name": "teamos-hub\/regreSSHion", - "owner": { - "login": "teamos-hub", - "id": 172880130, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172880130?v=4", - "html_url": "https:\/\/github.com\/teamos-hub", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/teamos-hub\/regreSSHion", - "description": "This is a POC I wrote for CVE-2024-6387", - "fork": false, - "created_at": "2024-07-02T02:54:05Z", - "updated_at": "2024-07-02T13:12:58Z", - "pushed_at": "2024-07-02T02:48:35Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 0 - }, - { - "id": 822897220, - "name": "CVE-2024-6387", - "full_name": "ahlfors\/CVE-2024-6387", - "owner": { - "login": "ahlfors", - "id": 1074291, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1074291?v=4", - "html_url": "https:\/\/github.com\/ahlfors", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ahlfors\/CVE-2024-6387", - "description": null, - "fork": false, - "created_at": "2024-07-02T03:42:35Z", - "updated_at": "2024-07-10T08:04:08Z", - "pushed_at": "2024-07-02T09:57:35Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 822898666, - "name": "CVE-2024-6387-checkher", - "full_name": "Mufti22\/CVE-2024-6387-checkher", - "owner": { - "login": "Mufti22", - "id": 75854478, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75854478?v=4", - "html_url": "https:\/\/github.com\/Mufti22", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Mufti22\/CVE-2024-6387-checkher", - "description": null, - "fork": false, - "created_at": "2024-07-02T03:48:37Z", - "updated_at": "2024-07-02T03:49:10Z", - "pushed_at": "2024-07-02T03:49:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 822903933, - "name": "CVE-2024-6387-exploit", - "full_name": "thegenetic\/CVE-2024-6387-exploit", - "owner": { - "login": "thegenetic", - "id": 57350740, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57350740?v=4", - "html_url": "https:\/\/github.com\/thegenetic", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/thegenetic\/CVE-2024-6387-exploit", - "description": "CVE-2024-6387 exploit", - "fork": false, - "created_at": "2024-07-02T04:09:44Z", - "updated_at": "2024-09-24T00:12:11Z", - "pushed_at": "2024-07-02T04:45:15Z", - "stargazers_count": 13, - "watchers_count": 13, - "has_discussions": false, - "forks_count": 5, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 5, - "watchers": 13, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 822953002, - "name": "CVE-2024-6387", - "full_name": "R4Tw1z\/CVE-2024-6387", - "owner": { - "login": "R4Tw1z", - "id": 150011273, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150011273?v=4", - "html_url": "https:\/\/github.com\/R4Tw1z", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/R4Tw1z\/CVE-2024-6387", - "description": "This script, created by R4Tw1z, is designed to scan IP addresses to check if they are running a potentially vulnerable version of OpenSSH. The tool leverages multi-threading to optimize scanning performance and handle multiple IP addresses concurrently.", - "fork": false, - "created_at": "2024-07-02T06:40:09Z", - "updated_at": "2024-07-05T10:15:26Z", - "pushed_at": "2024-07-02T09:01:55Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 822958334, - "name": "CVE-2024-6387", - "full_name": "d0rb\/CVE-2024-6387", - "owner": { - "login": "d0rb", - "id": 10403781, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4", - "html_url": "https:\/\/github.com\/d0rb", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/d0rb\/CVE-2024-6387", - "description": "This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH.", - "fork": false, - "created_at": "2024-07-02T06:53:35Z", - "updated_at": "2025-01-05T15:46:06Z", - "pushed_at": "2024-07-04T20:04:30Z", - "stargazers_count": 35, - "watchers_count": 35, - "has_discussions": false, - "forks_count": 11, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 11, - "watchers": 35, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 822978721, - "name": "regression-scanner", - "full_name": "CiderAndWhisky\/regression-scanner", - "owner": { - "login": "CiderAndWhisky", - "id": 30117084, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30117084?v=4", - "html_url": "https:\/\/github.com\/CiderAndWhisky", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/CiderAndWhisky\/regression-scanner", - "description": "Used to detect ssh servers vulnerable to CVE-2024-6387. Shameless robbery from https:\/\/github.com\/bigb0x\/CVE-2024-6387 using ChatGPT to translate the code to PHP.", - "fork": false, - "created_at": "2024-07-02T07:42:46Z", - "updated_at": "2024-07-02T09:06:07Z", - "pushed_at": "2024-07-02T09:06:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 822991113, - "name": "CVE-2024-6387_PoC", - "full_name": "shamo0\/CVE-2024-6387_PoC", - "owner": { - "login": "shamo0", - "id": 48299520, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48299520?v=4", - "html_url": "https:\/\/github.com\/shamo0", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/shamo0\/CVE-2024-6387_PoC", - "description": "Script for checking CVE-2024-6387 (regreSSHion)", - "fork": false, - "created_at": "2024-07-02T08:13:23Z", - "updated_at": "2024-07-02T10:00:56Z", - "pushed_at": "2024-07-02T08:40:31Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "checker", - "cve-2024-6387", - "exploit", - "openssh", - "poc", - "rce", - "regresshion", - "ssh", - "vulnerability" - ], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 822993766, - "name": "CVE-2024-6387-nmap", - "full_name": "paradessia\/CVE-2024-6387-nmap", - "owner": { - "login": "paradessia", - "id": 38862216, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38862216?v=4", - "html_url": "https:\/\/github.com\/paradessia", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/paradessia\/CVE-2024-6387-nmap", - "description": "CVE-2024-6387-nmap", - "fork": false, - "created_at": "2024-07-02T08:19:55Z", - "updated_at": "2024-07-31T06:59:27Z", - "pushed_at": "2024-07-02T08:26:46Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823030467, - "name": "CVE-2024-6387", - "full_name": "SecWithMoh\/CVE-2024-6387", - "owner": { - "login": "SecWithMoh", - "id": 92855054, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92855054?v=4", - "html_url": "https:\/\/github.com\/SecWithMoh", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/SecWithMoh\/CVE-2024-6387", - "description": "This Go program scans targets for CVE-2024-6387 in OpenSSH, categorizing servers by vulnerability status and port availability.", - "fork": false, - "created_at": "2024-07-02T09:41:40Z", - "updated_at": "2024-07-16T07:51:21Z", - "pushed_at": "2024-07-02T10:05:02Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823031972, - "name": "CVE-2024-6387-Updated-x64bit", - "full_name": "PrincipalAnthony\/CVE-2024-6387-Updated-x64bit", - "owner": { - "login": "PrincipalAnthony", - "id": 174432334, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174432334?v=4", - "html_url": "https:\/\/github.com\/PrincipalAnthony", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/PrincipalAnthony\/CVE-2024-6387-Updated-x64bit", - "description": "Private x64 RCE exploit for CVE-2024-6387 [02.07.2024] from exploit.in", - "fork": false, - "created_at": "2024-07-02T09:45:04Z", - "updated_at": "2024-07-02T15:52:27Z", - "pushed_at": "2024-07-02T09:46:08Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823040737, - "name": "CVE-2024-6387-POC", - "full_name": "skyalliance\/CVE-2024-6387-POC", - "owner": { - "login": "skyalliance", - "id": 127739423, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127739423?v=4", - "html_url": "https:\/\/github.com\/skyalliance", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/skyalliance\/CVE-2024-6387-POC", - "description": null, - "fork": false, - "created_at": "2024-07-02T10:05:43Z", - "updated_at": "2024-07-02T13:24:40Z", - "pushed_at": "2024-07-02T13:24:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823053102, - "name": "CVE-2024-6387-Mitigation-Ansible-Playbook", - "full_name": "daniel-odrinski\/CVE-2024-6387-Mitigation-Ansible-Playbook", - "owner": { - "login": "daniel-odrinski", - "id": 22768251, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22768251?v=4", - "html_url": "https:\/\/github.com\/daniel-odrinski", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/daniel-odrinski\/CVE-2024-6387-Mitigation-Ansible-Playbook", - "description": "An Ansible Playbook to mitigate the risk of RCE (CVE-2024-6387) until platforms update OpenSSH to a non-vulnerable version.", - "fork": false, - "created_at": "2024-07-02T10:34:17Z", - "updated_at": "2024-07-02T11:05:58Z", - "pushed_at": "2024-07-02T11:05:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823065840, - "name": "openssh-cve-2024-6387.sh", - "full_name": "rumochnaya\/openssh-cve-2024-6387.sh", - "owner": { - "login": "rumochnaya", - "id": 8115717, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8115717?v=4", - "html_url": "https:\/\/github.com\/rumochnaya", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/rumochnaya\/openssh-cve-2024-6387.sh", - "description": "openssh-cve-2024-6387.sh", - "fork": false, - "created_at": "2024-07-02T11:05:07Z", - "updated_at": "2024-07-04T11:27:01Z", - "pushed_at": "2024-07-02T11:23:35Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823067387, - "name": "CVE-2024-6387-Mitigation", - "full_name": "zenzue\/CVE-2024-6387-Mitigation", - "owner": { - "login": "zenzue", - "id": 19271340, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19271340?v=4", - "html_url": "https:\/\/github.com\/zenzue", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/zenzue\/CVE-2024-6387-Mitigation", - "description": "Mitigation Guide for CVE-2024-6387 in OpenSSH", - "fork": false, - "created_at": "2024-07-02T11:08:40Z", - "updated_at": "2024-07-02T11:17:15Z", - "pushed_at": "2024-07-02T11:17:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823086763, - "name": "CVE-2024-6387-Check", - "full_name": "devarshishimpi\/CVE-2024-6387-Check", - "owner": { - "login": "devarshishimpi", - "id": 43378923, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43378923?v=4", - "html_url": "https:\/\/github.com\/devarshishimpi", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/devarshishimpi\/CVE-2024-6387-Check", - "description": "CVE-2024-6387 Checker is a fast, efficient tool for detecting OpenSSH servers vulnerable to the regreSSHion exploit. It quickly scans multiple IPs, domain names, and CIDR ranges to identify risks and help secure your infrastructure.", - "fork": false, - "created_at": "2024-07-02T11:55:39Z", - "updated_at": "2025-01-05T23:59:18Z", - "pushed_at": "2024-07-08T20:39:03Z", - "stargazers_count": 13, - "watchers_count": 13, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "bash", - "cve-2024-6387", - "cve-2024-6387-checker", - "devarshishimpi", - "openssh", - "openssh-client", - "openssh-server", - "openssh-sftp-server", - "regresshion", - "ssh", - "vulnerability-detection", - "vulnerability-scanners" - ], - "visibility": "public", - "forks": 3, - "watchers": 13, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 823099379, - "name": "cve-2024-6387_AImade", - "full_name": "hssmo\/cve-2024-6387_AImade", - "owner": { - "login": "hssmo", - "id": 99412060, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99412060?v=4", - "html_url": "https:\/\/github.com\/hssmo", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/hssmo\/cve-2024-6387_AImade", - "description": "cve-2024-6387_AImade", - "fork": false, - "created_at": "2024-07-02T12:24:25Z", - "updated_at": "2024-07-02T12:34:36Z", - "pushed_at": "2024-07-02T12:34:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823109994, - "name": "checker-CVE-2024-6387", - "full_name": "ACHUX21\/checker-CVE-2024-6387", - "owner": { - "login": "ACHUX21", - "id": 130113878, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130113878?v=4", - "html_url": "https:\/\/github.com\/ACHUX21", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ACHUX21\/checker-CVE-2024-6387", - "description": null, - "fork": false, - "created_at": "2024-07-02T12:48:27Z", - "updated_at": "2024-07-19T10:54:54Z", - "pushed_at": "2024-07-02T13:18:38Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823118069, - "name": "ssh_exploiter_CVE-2024-6387", - "full_name": "AiGptCode\/ssh_exploiter_CVE-2024-6387", - "owner": { - "login": "AiGptCode", - "id": 146197697, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146197697?v=4", - "html_url": "https:\/\/github.com\/AiGptCode", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/AiGptCode\/ssh_exploiter_CVE-2024-6387", - "description": "CVE-2024-6387 with auto ip scanner and auto expliot ", - "fork": false, - "created_at": "2024-07-02T12:57:35Z", - "updated_at": "2025-01-09T16:45:26Z", - "pushed_at": "2024-07-04T01:55:26Z", - "stargazers_count": 11, - "watchers_count": 11, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "android", - "cve", - "cve-2024-6387", - "exploit", - "ftp", - "hack", - "hacktoberfest", - "kali", - "kali-linux", - "linux", - "openssh", - "python", - "python3", - "root", - "shell", - "ssh", - "windows" - ], - "visibility": "public", - "forks": 3, - "watchers": 11, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823151186, - "name": "regreSSHion-nmap-scanner", - "full_name": "xristos8574\/regreSSHion-nmap-scanner", - "owner": { - "login": "xristos8574", - "id": 48923762, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48923762?v=4", - "html_url": "https:\/\/github.com\/xristos8574", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/xristos8574\/regreSSHion-nmap-scanner", - "description": "A bash script for nmap to scan for vulnerable machines in regards to the latest CVE-2024-6387", - "fork": false, - "created_at": "2024-07-02T13:50:47Z", - "updated_at": "2024-07-02T13:52:27Z", - "pushed_at": "2024-07-02T13:52:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823184811, - "name": "regreSSHion", - "full_name": "xonoxitron\/regreSSHion", - "owner": { - "login": "xonoxitron", - "id": 7057784, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7057784?v=4", - "html_url": "https:\/\/github.com\/xonoxitron", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/xonoxitron\/regreSSHion", - "description": "CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.", - "fork": false, - "created_at": "2024-07-02T14:41:43Z", - "updated_at": "2025-01-13T03:23:03Z", - "pushed_at": "2024-07-02T15:16:04Z", - "stargazers_count": 33, - "watchers_count": 33, - "has_discussions": false, - "forks_count": 8, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "c", - "cve-2024-6387", - "exploit", - "glibc", - "linux", - "openssh", - "poc", - "regresshion", - "sshd" - ], - "visibility": "public", - "forks": 8, - "watchers": 33, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 823199757, - "name": "CVE-2024-6387", - "full_name": "no-one-sec\/CVE-2024-6387", - "owner": { - "login": "no-one-sec", - "id": 118190089, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118190089?v=4", - "html_url": "https:\/\/github.com\/no-one-sec", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/no-one-sec\/CVE-2024-6387", - "description": "开箱即用的AK47", - "fork": false, - "created_at": "2024-07-02T15:13:09Z", - "updated_at": "2024-07-02T15:14:52Z", - "pushed_at": "2024-07-02T15:13:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823199952, - "name": "CVE-2024-6387", - "full_name": "dawnl3ss\/CVE-2024-6387", - "owner": { - "login": "dawnl3ss", - "id": 52249849, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52249849?v=4", - "html_url": "https:\/\/github.com\/dawnl3ss", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/dawnl3ss\/CVE-2024-6387", - "description": null, - "fork": false, - "created_at": "2024-07-02T15:13:33Z", - "updated_at": "2024-07-02T15:14:40Z", - "pushed_at": "2024-07-02T15:14:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823236084, - "name": "CVE-2024-6387-Exploit-POC", - "full_name": "MrR0b0t19\/CVE-2024-6387-Exploit-POC", - "owner": { - "login": "MrR0b0t19", - "id": 63489501, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63489501?v=4", - "html_url": "https:\/\/github.com\/MrR0b0t19", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/MrR0b0t19\/CVE-2024-6387-Exploit-POC", - "description": null, - "fork": false, - "created_at": "2024-07-02T16:34:12Z", - "updated_at": "2024-07-14T06:25:24Z", - "pushed_at": "2024-07-02T16:38:33Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823250035, - "name": "CVE-2024-6387", - "full_name": "th3gokul\/CVE-2024-6387", - "owner": { - "login": "th3gokul", - "id": 89386101, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89386101?v=4", - "html_url": "https:\/\/github.com\/th3gokul", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/th3gokul\/CVE-2024-6387", - "description": "CVE-2024-6387 : Vulnerability Detection tool for regreSSHion Remote Unauthenticated Code Execution in OpenSSH Server", - "fork": false, - "created_at": "2024-07-02T17:04:52Z", - "updated_at": "2024-10-20T09:56:28Z", - "pushed_at": "2024-07-02T17:47:29Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 5, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823284825, - "name": "Test_CVE-2024-6387", - "full_name": "n1cks0n\/Test_CVE-2024-6387", - "owner": { - "login": "n1cks0n", - "id": 100887222, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100887222?v=4", - "html_url": "https:\/\/github.com\/n1cks0n", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/n1cks0n\/Test_CVE-2024-6387", - "description": "Test_CVE-2024-6387 is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH", - "fork": false, - "created_at": "2024-07-02T18:30:28Z", - "updated_at": "2024-07-02T18:31:58Z", - "pushed_at": "2024-07-02T18:31:41Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823285710, - "name": "CVE-2024-6387", - "full_name": "l0n3m4n\/CVE-2024-6387", - "owner": { - "login": "l0n3m4n", - "id": 143868630, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143868630?v=4", - "html_url": "https:\/\/github.com\/l0n3m4n", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/l0n3m4n\/CVE-2024-6387", - "description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit) ", - "fork": false, - "created_at": "2024-07-02T18:32:46Z", - "updated_at": "2025-01-08T11:36:17Z", - "pushed_at": "2024-07-05T15:19:28Z", - "stargazers_count": 75, - "watchers_count": 75, - "has_discussions": false, - "forks_count": 30, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2024-6387", - "exploit", - "openssh-server", - "payload", - "poc", - "python3", - "rce" - ], - "visibility": "public", - "forks": 30, - "watchers": 75, - "score": 0, - "subscribers_count": 3 - }, - { - "id": 823291064, - "name": "CVE-2024-6387-Checker", - "full_name": "RickGeex\/CVE-2024-6387-Checker", - "owner": { - "login": "RickGeex", - "id": 7975904, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7975904?v=4", - "html_url": "https:\/\/github.com\/RickGeex", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RickGeex\/CVE-2024-6387-Checker", - "description": "CVE-2024-6387-Check is a streamlined and efficient tool created to detect servers operating on vulnerable versions of OpenSSH.", - "fork": false, - "created_at": "2024-07-02T18:46:24Z", - "updated_at": "2024-07-02T20:32:50Z", - "pushed_at": "2024-07-02T20:32:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823296113, - "name": "regreSSHion-checker", - "full_name": "xonoxitron\/regreSSHion-checker", - "owner": { - "login": "xonoxitron", - "id": 7057784, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7057784?v=4", - "html_url": "https:\/\/github.com\/xonoxitron", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/xonoxitron\/regreSSHion-checker", - "description": "Quickly identifies servers vulnerable to OpenSSH 'regreSSHion' (CVE-2024-6387).", - "fork": false, - "created_at": "2024-07-02T18:59:54Z", - "updated_at": "2024-11-20T01:42:09Z", - "pushed_at": "2024-07-02T19:06:01Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-6387", - "glibc", - "golang", - "linux", - "openssh", - "regresshion", - "sshd" - ], - "visibility": "public", - "forks": 3, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823323116, - "name": "cve-2024-6387-nuclei-template", - "full_name": "BrandonLynch2402\/cve-2024-6387-nuclei-template", - "owner": { - "login": "BrandonLynch2402", - "id": 19439875, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19439875?v=4", - "html_url": "https:\/\/github.com\/BrandonLynch2402", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/BrandonLynch2402\/cve-2024-6387-nuclei-template", - "description": null, - "fork": false, - "created_at": "2024-07-02T20:19:12Z", - "updated_at": "2024-07-31T06:59:36Z", - "pushed_at": "2024-07-02T20:28:35Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823328220, - "name": "CVE-2024-6387_Check", - "full_name": "edsonjt81\/CVE-2024-6387_Check", - "owner": { - "login": "edsonjt81", - "id": 27496739, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27496739?v=4", - "html_url": "https:\/\/github.com\/edsonjt81", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/edsonjt81\/CVE-2024-6387_Check", - "description": null, - "fork": false, - "created_at": "2024-07-02T20:35:53Z", - "updated_at": "2024-07-02T20:38:08Z", - "pushed_at": "2024-07-02T20:38:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823340268, - "name": "CVE-2024-6387", - "full_name": "grupooruss\/CVE-2024-6387", - "owner": { - "login": "grupooruss", - "id": 43943489, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43943489?v=4", - "html_url": "https:\/\/github.com\/grupooruss", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/grupooruss\/CVE-2024-6387", - "description": "regreSSHion vulnerability in OpenSSH CVE-2024-6387 Testing Script", - "fork": false, - "created_at": "2024-07-02T21:16:45Z", - "updated_at": "2024-07-08T23:58:50Z", - "pushed_at": "2024-07-02T21:30:12Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 0 - }, - { - "id": 823349523, - "name": "CVE-2024-6387-Checker", - "full_name": "CognisysGroup\/CVE-2024-6387-Checker", - "owner": { - "login": "CognisysGroup", - "id": 101755095, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101755095?v=4", - "html_url": "https:\/\/github.com\/CognisysGroup", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/CognisysGroup\/CVE-2024-6387-Checker", - "description": null, - "fork": false, - "created_at": "2024-07-02T21:47:02Z", - "updated_at": "2024-07-03T12:15:46Z", - "pushed_at": "2024-07-03T12:13:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823487291, - "name": "CVE-2024-6387", - "full_name": "sxlmnwb\/CVE-2024-6387", - "owner": { - "login": "sxlmnwb", - "id": 65052912, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65052912?v=4", - "html_url": "https:\/\/github.com\/sxlmnwb", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/sxlmnwb\/CVE-2024-6387", - "description": "Targeting a signal handler race condition in OpenSSH's server (sshd) on glibc-based Linux systems.", - "fork": false, - "created_at": "2024-07-03T06:08:32Z", - "updated_at": "2024-12-05T20:11:29Z", - "pushed_at": "2024-07-03T06:47:46Z", - "stargazers_count": 11, - "watchers_count": 11, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-6387" - ], - "visibility": "public", - "forks": 6, - "watchers": 11, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823542110, - "name": "CVE-2024-6387", - "full_name": "Symbolexe\/CVE-2024-6387", - "owner": { - "login": "Symbolexe", - "id": 140549630, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140549630?v=4", - "html_url": "https:\/\/github.com\/Symbolexe", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Symbolexe\/CVE-2024-6387", - "description": "SSH Exploit for CVE-2024-6387 : RCE in OpenSSH's server, on glibc-based Linux systems", - "fork": false, - "created_at": "2024-07-03T08:22:57Z", - "updated_at": "2024-08-20T21:05:45Z", - "pushed_at": "2024-07-04T15:07:21Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 5, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2024-6387", - "exploit", - "pentesting", - "python3", - "redteam" - ], - "visibility": "public", - "forks": 5, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823593765, - "name": "sentinelssh", - "full_name": "harshinsecurity\/sentinelssh", - "owner": { - "login": "harshinsecurity", - "id": 51978908, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51978908?v=4", - "html_url": "https:\/\/github.com\/harshinsecurity", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/harshinsecurity\/sentinelssh", - "description": "SentinelSSH is an advanced, high-performance SSH vulnerability scanner written in Go. It's specifically designed to detect the CVE-2024-6387 vulnerability in OpenSSH servers across various network environments.", - "fork": false, - "created_at": "2024-07-03T10:26:23Z", - "updated_at": "2024-09-07T05:01:32Z", - "pushed_at": "2024-07-08T07:32:32Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2024-6387", - "exploit", - "openssh", - "ssh" - ], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823665546, - "name": "cve-2024-6387-poc", - "full_name": "t3rry327\/cve-2024-6387-poc", - "owner": { - "login": "t3rry327", - "id": 65151897, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65151897?v=4", - "html_url": "https:\/\/github.com\/t3rry327", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/t3rry327\/cve-2024-6387-poc", - "description": null, - "fork": false, - "created_at": "2024-07-03T13:21:10Z", - "updated_at": "2024-07-03T13:25:02Z", - "pushed_at": "2024-07-03T13:24:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823735743, - "name": "CVE-2024-6387_poc", - "full_name": "jocker2410\/CVE-2024-6387_poc", - "owner": { - "login": "jocker2410", - "id": 22291909, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22291909?v=4", - "html_url": "https:\/\/github.com\/jocker2410", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/jocker2410\/CVE-2024-6387_poc", - "description": null, - "fork": false, - "created_at": "2024-07-03T15:51:16Z", - "updated_at": "2024-08-04T10:50:56Z", - "pushed_at": "2024-08-04T10:50:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823899223, - "name": "sshd-logingracetime0", - "full_name": "liqhtnd\/sshd-logingracetime0", - "owner": { - "login": "liqhtnd", - "id": 88907425, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88907425?v=4", - "html_url": "https:\/\/github.com\/liqhtnd", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/liqhtnd\/sshd-logingracetime0", - "description": "Script to address CVE-2024-6387 by changing the LoginGraceTime in sshd.", - "fork": false, - "created_at": "2024-07-04T01:02:34Z", - "updated_at": "2024-07-13T18:45:36Z", - "pushed_at": "2024-07-13T18:43:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823939765, - "name": "ssh-CVE-2024-6387-poc", - "full_name": "JackSparrowhk\/ssh-CVE-2024-6387-poc", - "owner": { - "login": "JackSparrowhk", - "id": 108756180, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108756180?v=4", - "html_url": "https:\/\/github.com\/JackSparrowhk", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/JackSparrowhk\/ssh-CVE-2024-6387-poc", - "description": "CVE-2024-6387_Check 是一款轻量级、高效的工具,旨在识别运行易受攻击的 OpenSSH 版本的服务器,专门针对最近发现的regreSSHion漏洞 (CVE-2024-6387)。此脚本有助于快速扫描多个 IP 地址、域名和 CIDR 网络范围,以检测潜在漏洞并确保您的基础设施安全。", - "fork": false, - "created_at": "2024-07-04T03:51:16Z", - "updated_at": "2024-07-04T03:51:16Z", - "pushed_at": "2024-07-04T03:51:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823940931, - "name": "CVE-2024-6387-OpenSSH-Vulnerability-Checker", - "full_name": "turbobit\/CVE-2024-6387-OpenSSH-Vulnerability-Checker", - "owner": { - "login": "turbobit", - "id": 11604783, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11604783?v=4", - "html_url": "https:\/\/github.com\/turbobit", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/turbobit\/CVE-2024-6387-OpenSSH-Vulnerability-Checker", - "description": "Welcome to the CVE-2024-6387 OpenSSH Vulnerability Checker repository! This project offers multiple scripts to check the installed version of OpenSSH on your system and determine if it is vulnerable to CVE-2024-6387. It supports various environments, including Ubuntu, Mac, and Windows.", - "fork": false, - "created_at": "2024-07-04T03:56:08Z", - "updated_at": "2024-07-07T21:11:55Z", - "pushed_at": "2024-07-04T05:13:49Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-6387-checker" - ], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 823979710, - "name": "CVE-2024-6387", - "full_name": "sms2056\/CVE-2024-6387", - "owner": { - "login": "sms2056", - "id": 15358350, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15358350?v=4", - "html_url": "https:\/\/github.com\/sms2056", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/sms2056\/CVE-2024-6387", - "description": null, - "fork": false, - "created_at": "2024-07-04T06:10:56Z", - "updated_at": "2024-07-04T06:16:22Z", - "pushed_at": "2024-07-04T06:16:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 824151224, - "name": "regreSSHion-CVE-2024-6387-", - "full_name": "invaderslabs\/regreSSHion-CVE-2024-6387-", - "owner": { - "login": "invaderslabs", - "id": 149894888, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149894888?v=4", - "html_url": "https:\/\/github.com\/invaderslabs", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/invaderslabs\/regreSSHion-CVE-2024-6387-", - "description": "Provides instructions for using the script to check if your OpenSSH installation is vulnerable to CVE-2024-6387", - "fork": false, - "created_at": "2024-07-04T13:15:54Z", - "updated_at": "2024-07-04T22:22:18Z", - "pushed_at": "2024-07-04T22:22:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 824156825, - "name": "CVE-2024-6387", - "full_name": "lala-amber\/CVE-2024-6387", - "owner": { - "login": "lala-amber", - "id": 72958716, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72958716?v=4", - "html_url": "https:\/\/github.com\/lala-amber", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/lala-amber\/CVE-2024-6387", - "description": null, - "fork": false, - "created_at": "2024-07-04T13:28:53Z", - "updated_at": "2024-10-07T12:21:51Z", - "pushed_at": "2024-07-04T13:35:57Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 824185491, - "name": "regreSSHive", - "full_name": "4lxprime\/regreSSHive", - "owner": { - "login": "4lxprime", - "id": 58915711, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58915711?v=4", - "html_url": "https:\/\/github.com\/4lxprime", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/4lxprime\/regreSSHive", - "description": "rewrited SSH Exploit for CVE-2024-6387 (regreSSHion)", - "fork": false, - "created_at": "2024-07-04T14:34:21Z", - "updated_at": "2024-07-04T15:27:03Z", - "pushed_at": "2024-07-04T14:34:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "6387", - "c", - "cve", - "cve-2024-6387", - "exploit", - "poc", - "regresshion", - "ssh", - "sshd" - ], - "visibility": "public", - "forks": 3, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 824318880, - "name": "CVE-2024-6387_Check", - "full_name": "sardine-web\/CVE-2024-6387_Check", - "owner": { - "login": "sardine-web", - "id": 80635620, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80635620?v=4", - "html_url": "https:\/\/github.com\/sardine-web", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/sardine-web\/CVE-2024-6387_Check", - "description": "A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.", - "fork": false, - "created_at": "2024-07-04T21:20:26Z", - "updated_at": "2024-07-05T10:10:03Z", - "pushed_at": "2024-07-04T21:31:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 824382817, - "name": "cve-2024-6387_hassh", - "full_name": "0x4D31\/cve-2024-6387_hassh", - "owner": { - "login": "0x4D31", - "id": 11577776, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11577776?v=4", - "html_url": "https:\/\/github.com\/0x4D31", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/0x4D31\/cve-2024-6387_hassh", - "description": "HASSH fingerprints for identifying OpenSSH servers potentially vulnerable to CVE-2024-6387 (regreSSHion).", - "fork": false, - "created_at": "2024-07-05T02:46:57Z", - "updated_at": "2024-09-27T09:29:35Z", - "pushed_at": "2024-07-05T03:40:53Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-6387", - "fingerprint", - "hassh", - "regresshion", - "ssh" - ], - "visibility": "public", - "forks": 1, - "watchers": 8, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 824544385, - "name": "CVE-2024-6387-template", - "full_name": "sardine-web\/CVE-2024-6387-template", - "owner": { - "login": "sardine-web", - "id": 80635620, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80635620?v=4", - "html_url": "https:\/\/github.com\/sardine-web", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/sardine-web\/CVE-2024-6387-template", - "description": "Quick regreSSHion checker (based on software version) for nuclei CVE-2024-6387", - "fork": false, - "created_at": "2024-07-05T11:05:26Z", - "updated_at": "2024-07-06T17:26:24Z", - "pushed_at": "2024-07-06T17:26:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 824549009, - "name": "CVE-2024-6387", - "full_name": "imv7\/CVE-2024-6387", - "owner": { - "login": "imv7", - "id": 13357603, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13357603?v=4", - "html_url": "https:\/\/github.com\/imv7", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/imv7\/CVE-2024-6387", - "description": null, - "fork": false, - "created_at": "2024-07-05T11:18:38Z", - "updated_at": "2024-07-05T11:19:24Z", - "pushed_at": "2024-07-05T11:19:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 824639761, - "name": "CVE-2024-6387-Finder", - "full_name": "SiberianHacker\/CVE-2024-6387-Finder", - "owner": { - "login": "SiberianHacker", - "id": 115571334, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115571334?v=4", - "html_url": "https:\/\/github.com\/SiberianHacker", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/SiberianHacker\/CVE-2024-6387-Finder", - "description": "CVE-2024-6387 SSH finder", - "fork": false, - "created_at": "2024-07-05T15:15:41Z", - "updated_at": "2024-07-05T15:22:29Z", - "pushed_at": "2024-07-05T15:22:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 824752906, - "name": "CVE-2024-6387-how-to-fix", - "full_name": "azurejoga\/CVE-2024-6387-how-to-fix", - "owner": { - "login": "azurejoga", - "id": 91762249, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91762249?v=4", - "html_url": "https:\/\/github.com\/azurejoga", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/azurejoga\/CVE-2024-6387-how-to-fix", - "description": "Vulnerability remediation and mitigationCVE-2024-6387", - "fork": false, - "created_at": "2024-07-05T21:29:11Z", - "updated_at": "2024-08-12T14:40:39Z", - "pushed_at": "2024-07-05T21:47:44Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 5, - "score": 0, - "subscribers_count": 1 - }, { "id": 825724862, "name": "CVE-2024-6387", @@ -2196,354 +67,6 @@ "score": 0, "subscribers_count": 3 }, - { - "id": 825734560, - "name": "regreSSHion", - "full_name": "vkaushik-chef\/regreSSHion", - "owner": { - "login": "vkaushik-chef", - "id": 91254377, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91254377?v=4", - "html_url": "https:\/\/github.com\/vkaushik-chef", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/vkaushik-chef\/regreSSHion", - "description": "Chef Inspec profile for checking regreSSHion vulnerability CVE-2024-6387", - "fork": false, - "created_at": "2024-07-08T11:48:15Z", - "updated_at": "2024-07-08T12:04:36Z", - "pushed_at": "2024-07-08T12:04:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 826287983, - "name": "mitigate-CVE-2024-6387", - "full_name": "dgourillon\/mitigate-CVE-2024-6387", - "owner": { - "login": "dgourillon", - "id": 50948886, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50948886?v=4", - "html_url": "https:\/\/github.com\/dgourillon", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/dgourillon\/mitigate-CVE-2024-6387", - "description": null, - "fork": false, - "created_at": "2024-07-09T12:16:44Z", - "updated_at": "2024-07-09T16:03:07Z", - "pushed_at": "2024-07-09T16:03:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 826336009, - "name": "CVE-2024-6387", - "full_name": "mrmtwoj\/CVE-2024-6387", - "owner": { - "login": "mrmtwoj", - "id": 22832463, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22832463?v=4", - "html_url": "https:\/\/github.com\/mrmtwoj", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/mrmtwoj\/CVE-2024-6387", - "description": "regreSSHion is a security tool designed to test for vulnerabilities related to CVE-2024-6387, specifically focusing on SSH and remote access exploitation. ", - "fork": false, - "created_at": "2024-07-09T14:06:02Z", - "updated_at": "2024-10-07T04:02:49Z", - "pushed_at": "2024-07-09T14:29:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-6387", - "cve-2024-6387-checker", - "openssh", - "openssh-key", - "poc", - "regresshion-cve-2024-6387-ssh-security" - ], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 826432240, - "name": "CVE-2024-6387-Vulnerability-Checker", - "full_name": "filipi86\/CVE-2024-6387-Vulnerability-Checker", - "owner": { - "login": "filipi86", - "id": 31785433, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31785433?v=4", - "html_url": "https:\/\/github.com\/filipi86", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/filipi86\/CVE-2024-6387-Vulnerability-Checker", - "description": "This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, and ports. The script can also read addresses from a file.", - "fork": false, - "created_at": "2024-07-09T17:40:19Z", - "updated_at": "2024-10-23T02:21:38Z", - "pushed_at": "2024-07-10T15:24:08Z", - "stargazers_count": 92, - "watchers_count": 92, - "has_discussions": false, - "forks_count": 17, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 17, - "watchers": 92, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 826508816, - "name": "CVE-2024-6387-Vulnerability-Checker", - "full_name": "kubota\/CVE-2024-6387-Vulnerability-Checker", - "owner": { - "login": "kubota", - "id": 119277, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119277?v=4", - "html_url": "https:\/\/github.com\/kubota", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/kubota\/CVE-2024-6387-Vulnerability-Checker", - "description": "This Rust Code is designed to check SSH servers for the CVE-2024-6387 vulnerability", - "fork": false, - "created_at": "2024-07-09T21:01:15Z", - "updated_at": "2024-07-11T05:46:45Z", - "pushed_at": "2024-07-09T21:08:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 826836993, - "name": "cve-2024-6387-poc", - "full_name": "DimaMend\/cve-2024-6387-poc", - "owner": { - "login": "DimaMend", - "id": 145161091, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145161091?v=4", - "html_url": "https:\/\/github.com\/DimaMend", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/DimaMend\/cve-2024-6387-poc", - "description": null, - "fork": false, - "created_at": "2024-07-10T13:27:23Z", - "updated_at": "2024-07-10T13:33:54Z", - "pushed_at": "2024-07-10T13:33:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 827444140, - "name": "mitigate_ssh", - "full_name": "Sibijo\/mitigate_ssh", - "owner": { - "login": "Sibijo", - "id": 148327357, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148327357?v=4", - "html_url": "https:\/\/github.com\/Sibijo", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Sibijo\/mitigate_ssh", - "description": " OpenSSH vulnerability CVE-2024-6387", - "fork": false, - "created_at": "2024-07-11T16:54:41Z", - "updated_at": "2024-07-29T17:48:05Z", - "pushed_at": "2024-07-11T16:55:52Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 827570389, - "name": "regreSSHion-Fix", - "full_name": "Passyed\/regreSSHion-Fix", - "owner": { - "login": "Passyed", - "id": 102136066, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102136066?v=4", - "html_url": "https:\/\/github.com\/Passyed", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Passyed\/regreSSHion-Fix", - "description": "Fix for regreSSHion CVE-2024-6387 for Ubuntu and Debian", - "fork": false, - "created_at": "2024-07-11T23:22:14Z", - "updated_at": "2024-07-12T00:07:02Z", - "pushed_at": "2024-07-12T00:06:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 828627988, - "name": "CVE-2024-6387", - "full_name": "dream434\/CVE-2024-6387", - "owner": { - "login": "dream434", - "id": 114837630, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114837630?v=4", - "html_url": "https:\/\/github.com\/dream434", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/dream434\/CVE-2024-6387", - "description": " OpenSSH a publié un avis de sécurité concernant la vulnérabilité critique CVE-2024-6387. Cette vulnérabilité permet à un attaquant non authentifié d'exécuter du code arbitraire", - "fork": false, - "created_at": "2024-07-14T18:00:49Z", - "updated_at": "2024-07-14T18:05:22Z", - "pushed_at": "2024-07-14T18:02:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 829031934, - "name": "CVE-2024-6387", - "full_name": "ThatNotEasy\/CVE-2024-6387", - "owner": { - "login": "ThatNotEasy", - "id": 25004320, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4", - "html_url": "https:\/\/github.com\/ThatNotEasy", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2024-6387", - "description": "OpenSSH RCE Massive Vulnerable Scanner", - "fork": false, - "created_at": "2024-07-15T16:04:57Z", - "updated_at": "2024-10-30T04:42:06Z", - "pushed_at": "2024-07-15T16:06:41Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 833415966, - "name": "CVE-2024-6387", - "full_name": "prelearn-code\/CVE-2024-6387", - "owner": { - "login": "prelearn-code", - "id": 175189722, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/175189722?v=4", - "html_url": "https:\/\/github.com\/prelearn-code", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/prelearn-code\/CVE-2024-6387", - "description": null, - "fork": false, - "created_at": "2024-07-25T02:32:19Z", - "updated_at": "2024-08-06T14:08:36Z", - "pushed_at": "2024-07-25T02:37:55Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, { "id": 835582804, "name": "CVE-2024-6387", @@ -2575,68 +98,6 @@ "score": 0, "subscribers_count": 2 }, - { - "id": 836283983, - "name": "ssh_poc2024", - "full_name": "alex14324\/ssh_poc2024", - "owner": { - "login": "alex14324", - "id": 36421715, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36421715?v=4", - "html_url": "https:\/\/github.com\/alex14324", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/alex14324\/ssh_poc2024", - "description": "An exploit for CVE-2024-6387, targeting a signal handler race condition in OpenSSH's server ", - "fork": false, - "created_at": "2024-07-31T14:19:19Z", - "updated_at": "2024-07-31T14:20:46Z", - "pushed_at": "2024-07-31T14:19:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 838725789, - "name": "CVE-2023-4596-OpenSSH-Multi-Checker", - "full_name": "X-Projetion\/CVE-2023-4596-OpenSSH-Multi-Checker", - "owner": { - "login": "X-Projetion", - "id": 161194427, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161194427?v=4", - "html_url": "https:\/\/github.com\/X-Projetion", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/X-Projetion\/CVE-2023-4596-OpenSSH-Multi-Checker", - "description": "CVE-2024-6387-checker is a tool or script designed to detect the security vulnerability known as CVE-2024-6387 OpenSSH. CVE-2024-6387 OpenSSH is an entry in the Common Vulnerabilities and Exposures (CVE) that documents security weaknesses discovered in certain software or systems.", - "fork": false, - "created_at": "2024-08-06T08:12:48Z", - "updated_at": "2024-08-10T11:17:27Z", - "pushed_at": "2024-08-06T08:27:32Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, { "id": 844630300, "name": "CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH", @@ -2791,160 +252,5 @@ "watchers": 1, "score": 0, "subscribers_count": 0 - }, - { - "id": 876504709, - "name": "CVE-2024-6387-poc-1", - "full_name": "anhvutuan\/CVE-2024-6387-poc-1", - "owner": { - "login": "anhvutuan", - "id": 74167929, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74167929?v=4", - "html_url": "https:\/\/github.com\/anhvutuan", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/anhvutuan\/CVE-2024-6387-poc-1", - "description": "CVE-2024-6387, also known as RegreSSHion, is a high-severity vulnerability found in OpenSSH servers (sshd) running on glibc-based Linux systems. It is a regression of a previously fixed vulnerability (CVE-2006-5051), which means the issue was reintroduced in newer versions of OpenSSH.", - "fork": false, - "created_at": "2024-10-22T04:50:10Z", - "updated_at": "2024-10-22T04:50:10Z", - "pushed_at": "2024-07-11T14:59:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - }, - { - "id": 893527608, - "name": "CVE-2024-6387", - "full_name": "YassDEV221608\/CVE-2024-6387", - "owner": { - "login": "YassDEV221608", - "id": 145906163, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145906163?v=4", - "html_url": "https:\/\/github.com\/YassDEV221608", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/YassDEV221608\/CVE-2024-6387", - "description": null, - "fork": false, - "created_at": "2024-11-24T17:12:26Z", - "updated_at": "2024-11-24T17:14:33Z", - "pushed_at": "2024-11-24T17:14:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 905536150, - "name": "CVE-2024-6387", - "full_name": "zql-gif\/CVE-2024-6387", - "owner": { - "login": "zql-gif", - "id": 84617316, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84617316?v=4", - "html_url": "https:\/\/github.com\/zql-gif", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/zql-gif\/CVE-2024-6387", - "description": null, - "fork": false, - "created_at": "2024-12-19T03:08:19Z", - "updated_at": "2024-12-19T06:49:55Z", - "pushed_at": "2024-12-19T06:49:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 905684125, - "name": "test_for6387", - "full_name": "awusan125\/test_for6387", - "owner": { - "login": "awusan125", - "id": 74240688, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74240688?v=4", - "html_url": "https:\/\/github.com\/awusan125", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/awusan125\/test_for6387", - "description": "test code for cve-2024-6387", - "fork": false, - "created_at": "2024-12-19T10:16:45Z", - "updated_at": "2024-12-22T08:24:49Z", - "pushed_at": "2024-12-22T08:24:46Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 911826074, - "name": "CVE-2024-6387_PoC", - "full_name": "YassDEV221608\/CVE-2024-6387_PoC", - "owner": { - "login": "YassDEV221608", - "id": 145906163, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145906163?v=4", - "html_url": "https:\/\/github.com\/YassDEV221608", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/YassDEV221608\/CVE-2024-6387_PoC", - "description": null, - "fork": false, - "created_at": "2025-01-04T00:25:33Z", - "updated_at": "2025-01-12T03:13:35Z", - "pushed_at": "2025-01-04T00:37:14Z", - "stargazers_count": 10, - "watchers_count": 10, - "has_discussions": false, - "forks_count": 8, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 8, - "watchers": 10, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-6473.json b/2024/CVE-2024-6473.json deleted file mode 100644 index c8708f0e72..0000000000 --- a/2024/CVE-2024-6473.json +++ /dev/null @@ -1,40 +0,0 @@ -[ - { - "id": 882188373, - "name": "CVE-2024-6473-PoC", - "full_name": "12345qwert123456\/CVE-2024-6473-PoC", - "owner": { - "login": "12345qwert123456", - "id": 63474188, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63474188?v=4", - "html_url": "https:\/\/github.com\/12345qwert123456", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/12345qwert123456\/CVE-2024-6473-PoC", - "description": "Proof of concept (exploit) for CVE-2024-6473", - "fork": false, - "created_at": "2024-11-02T05:37:30Z", - "updated_at": "2024-11-20T16:31:09Z", - "pushed_at": "2024-11-02T05:55:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "browser", - "cve", - "dll-hijacking", - "exploit", - "poc", - "yandex" - ], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-6529.json b/2024/CVE-2024-6529.json deleted file mode 100644 index 6b8d407751..0000000000 --- a/2024/CVE-2024-6529.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 837367811, - "name": "CVE-2024-6529", - "full_name": "Abdurahmon3236\/CVE-2024-6529", - "owner": { - "login": "Abdurahmon3236", - "id": 76862934, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76862934?v=4", - "html_url": "https:\/\/github.com\/Abdurahmon3236", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Abdurahmon3236\/CVE-2024-6529", - "description": null, - "fork": false, - "created_at": "2024-08-02T20:02:39Z", - "updated_at": "2024-08-02T20:03:11Z", - "pushed_at": "2024-08-02T20:03:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-6536.json b/2024/CVE-2024-6536.json deleted file mode 100644 index e3d6157d3e..0000000000 --- a/2024/CVE-2024-6536.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 836289886, - "name": "CVE-2024-6536", - "full_name": "apena-ba\/CVE-2024-6536", - "owner": { - "login": "apena-ba", - "id": 113431512, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113431512?v=4", - "html_url": "https:\/\/github.com\/apena-ba", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/apena-ba\/CVE-2024-6536", - "description": null, - "fork": false, - "created_at": "2024-07-31T14:31:56Z", - "updated_at": "2024-08-28T06:24:13Z", - "pushed_at": "2024-07-31T15:11:03Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-6768.json b/2024/CVE-2024-6768.json deleted file mode 100644 index 6b8094e59c..0000000000 --- a/2024/CVE-2024-6768.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 830402554, - "name": "CVE-2024-6768", - "full_name": "fortra\/CVE-2024-6768", - "owner": { - "login": "fortra", - "id": 117669217, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117669217?v=4", - "html_url": "https:\/\/github.com\/fortra", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/fortra\/CVE-2024-6768", - "description": null, - "fork": false, - "created_at": "2024-07-18T07:52:46Z", - "updated_at": "2024-12-26T12:51:10Z", - "pushed_at": "2024-08-12T20:48:52Z", - "stargazers_count": 14, - "watchers_count": 14, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 14, - "score": 0, - "subscribers_count": 4 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-6778.json b/2024/CVE-2024-6778.json index a7ce893dc3..b787c4decd 100644 --- a/2024/CVE-2024-6778.json +++ b/2024/CVE-2024-6778.json @@ -29,36 +29,5 @@ "watchers": 84, "score": 0, "subscribers_count": 2 - }, - { - "id": 875609314, - "name": "POC-CVE-2024-6778", - "full_name": "r00tjunip3r1\/POC-CVE-2024-6778", - "owner": { - "login": "r00tjunip3r1", - "id": 185687343, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/185687343?v=4", - "html_url": "https:\/\/github.com\/r00tjunip3r1", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/r00tjunip3r1\/POC-CVE-2024-6778", - "description": null, - "fork": false, - "created_at": "2024-10-20T12:47:53Z", - "updated_at": "2025-01-13T01:22:30Z", - "pushed_at": "2024-10-20T12:50:33Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 6, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-6782.json b/2024/CVE-2024-6782.json index d6bdcc6c2e..bdc545e59d 100644 --- a/2024/CVE-2024-6782.json +++ b/2024/CVE-2024-6782.json @@ -1,66 +1,4 @@ [ - { - "id": 838914336, - "name": "CVE-2024-6782", - "full_name": "zangjiahe\/CVE-2024-6782", - "owner": { - "login": "zangjiahe", - "id": 49680446, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49680446?v=4", - "html_url": "https:\/\/github.com\/zangjiahe", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/zangjiahe\/CVE-2024-6782", - "description": "Calibre 远程代码执行(CVE-2024-6782)Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution.", - "fork": false, - "created_at": "2024-08-06T15:31:48Z", - "updated_at": "2024-11-20T16:30:59Z", - "pushed_at": "2024-08-06T15:35:37Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 840181130, - "name": "CVE-2024-6782", - "full_name": "jdpsl\/CVE-2024-6782", - "owner": { - "login": "jdpsl", - "id": 8251941, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8251941?v=4", - "html_url": "https:\/\/github.com\/jdpsl", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/jdpsl\/CVE-2024-6782", - "description": "Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution.", - "fork": false, - "created_at": "2024-08-09T06:25:03Z", - "updated_at": "2024-10-21T13:18:00Z", - "pushed_at": "2024-08-09T06:26:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 857843697, "name": "CVE-2024-6782-PoC", @@ -91,36 +29,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 899960330, - "name": "CVE-2024-6782", - "full_name": "NketiahGodfred\/CVE-2024-6782", - "owner": { - "login": "NketiahGodfred", - "id": 78810041, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78810041?v=4", - "html_url": "https:\/\/github.com\/NketiahGodfred", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/NketiahGodfred\/CVE-2024-6782", - "description": "Calibre Remote Code Execution", - "fork": false, - "created_at": "2024-12-07T13:42:45Z", - "updated_at": "2024-12-07T13:43:33Z", - "pushed_at": "2024-12-07T13:43:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-7029.json b/2024/CVE-2024-7029.json index 9937978cc7..3003bb5367 100644 --- a/2024/CVE-2024-7029.json +++ b/2024/CVE-2024-7029.json @@ -69,36 +69,5 @@ "watchers": 5, "score": 0, "subscribers_count": 1 - }, - { - "id": 869446465, - "name": "CVE-2024-7029", - "full_name": "geniuszly\/CVE-2024-7029", - "owner": { - "login": "geniuszly", - "id": 137893386, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4", - "html_url": "https:\/\/github.com\/geniuszly", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-7029", - "description": " A PoC exploit for the CVE-2024-7029 vulnerability found in AvTech devices, allowing Remote Code Execution (RCE)", - "fork": false, - "created_at": "2024-10-08T10:04:08Z", - "updated_at": "2024-11-04T03:04:59Z", - "pushed_at": "2024-10-08T10:08:07Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 8, - "score": 0, - "subscribers_count": 2 } ] \ No newline at end of file diff --git a/2024/CVE-2024-7124.json b/2024/CVE-2024-7124.json deleted file mode 100644 index a8ad6360f4..0000000000 --- a/2024/CVE-2024-7124.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 888565008, - "name": "CVE-2024-7124", - "full_name": "kac89\/CVE-2024-7124", - "owner": { - "login": "kac89", - "id": 5662731, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5662731?v=4", - "html_url": "https:\/\/github.com\/kac89", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/kac89\/CVE-2024-7124", - "description": "Improper Neutralization of Input During Web Page Generation vulnerability in DInGO dLibra software in the parameter 'filter' in the endpoint 'indexsearch' allows a Reflected Cross-Site Scripting (XSS). ", - "fork": false, - "created_at": "2024-11-14T16:05:44Z", - "updated_at": "2024-11-14T16:09:22Z", - "pushed_at": "2024-11-14T16:09:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-7135.json b/2024/CVE-2024-7135.json deleted file mode 100644 index 7f80a6a96a..0000000000 --- a/2024/CVE-2024-7135.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 871140348, - "name": "CVE-2024-7135", - "full_name": "RandomRobbieBF\/CVE-2024-7135", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-7135", - "description": "Tainacan <= 0.21.7 - Missing Authorization to Authenticated (Subscriber+) Arbitrary File Read", - "fork": false, - "created_at": "2024-10-11T10:56:59Z", - "updated_at": "2024-10-18T17:57:19Z", - "pushed_at": "2024-10-11T11:18:26Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 910661052, - "name": "CVE-2024-7135", - "full_name": "Nxploited\/CVE-2024-7135", - "owner": { - "login": "Nxploited", - "id": 188819918, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4", - "html_url": "https:\/\/github.com\/Nxploited", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-7135", - "description": null, - "fork": false, - "created_at": "2025-01-01T01:07:29Z", - "updated_at": "2025-01-01T02:29:27Z", - "pushed_at": "2025-01-01T02:29:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-7339.json b/2024/CVE-2024-7339.json deleted file mode 100644 index da5664516e..0000000000 --- a/2024/CVE-2024-7339.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 838435771, - "name": "CVE-2024-7339", - "full_name": "RevoltSecurities\/CVE-2024-7339", - "owner": { - "login": "RevoltSecurities", - "id": 119435129, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119435129?v=4", - "html_url": "https:\/\/github.com\/RevoltSecurities", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RevoltSecurities\/CVE-2024-7339", - "description": "An Vulnerability detection and Exploitation tool for CVE-2024-7339", - "fork": false, - "created_at": "2024-08-05T16:26:18Z", - "updated_at": "2024-11-19T03:01:34Z", - "pushed_at": "2024-08-10T17:38:53Z", - "stargazers_count": 16, - "watchers_count": 16, - "has_discussions": false, - "forks_count": 5, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 5, - "watchers": 16, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-7456.json b/2024/CVE-2024-7456.json deleted file mode 100644 index ace706e343..0000000000 --- a/2024/CVE-2024-7456.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 882153324, - "name": "CVE-2024-7456scripts", - "full_name": "77Philly\/CVE-2024-7456scripts", - "owner": { - "login": "77Philly", - "id": 184293581, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/184293581?v=4", - "html_url": "https:\/\/github.com\/77Philly", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/77Philly\/CVE-2024-7456scripts", - "description": null, - "fork": false, - "created_at": "2024-11-02T02:42:27Z", - "updated_at": "2024-11-02T02:58:40Z", - "pushed_at": "2024-11-02T02:58:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-7514.json b/2024/CVE-2024-7514.json deleted file mode 100644 index 3ab95566b8..0000000000 --- a/2024/CVE-2024-7514.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 871135091, - "name": "CVE-2024-7514", - "full_name": "RandomRobbieBF\/CVE-2024-7514", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-7514", - "description": "WordPress Comments Import & Export <= 2.3.7 - Authenticated (Author+) Arbitrary File Read via Directory Traversal", - "fork": false, - "created_at": "2024-10-11T10:43:22Z", - "updated_at": "2024-10-18T17:57:22Z", - "pushed_at": "2024-10-11T10:45:10Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-7593.json b/2024/CVE-2024-7593.json index caaf832321..7293fa5b90 100644 --- a/2024/CVE-2024-7593.json +++ b/2024/CVE-2024-7593.json @@ -65,36 +65,5 @@ "watchers": 6, "score": 0, "subscribers_count": 1 - }, - { - "id": 871449363, - "name": "CVE-2024-7593", - "full_name": "skyrowalker\/CVE-2024-7593", - "owner": { - "login": "skyrowalker", - "id": 156471538, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156471538?v=4", - "html_url": "https:\/\/github.com\/skyrowalker", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/skyrowalker\/CVE-2024-7593", - "description": null, - "fork": false, - "created_at": "2024-10-12T02:17:14Z", - "updated_at": "2024-10-12T02:17:42Z", - "pushed_at": "2024-10-12T02:17:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-7627.json b/2024/CVE-2024-7627.json deleted file mode 100644 index 5d9b6935ad..0000000000 --- a/2024/CVE-2024-7627.json +++ /dev/null @@ -1,36 +0,0 @@ -[ - { - "id": 913607383, - "name": "CVE-2024-7627-PoC", - "full_name": "siunam321\/CVE-2024-7627-PoC", - "owner": { - "login": "siunam321", - "id": 104430134, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104430134?v=4", - "html_url": "https:\/\/github.com\/siunam321", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/siunam321\/CVE-2024-7627-PoC", - "description": "Proof-of-Concept script for WordPress plugin Bit File Manager version 6.0 - 6.5.5 Unauthenticated Remote Code Execution via Race Condition (CVE-2024-7627) vulnerability", - "fork": false, - "created_at": "2025-01-08T02:32:41Z", - "updated_at": "2025-01-08T03:34:13Z", - "pushed_at": "2025-01-08T02:40:09Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "proof-of-concept", - "wordpress-plugin" - ], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-7808.json b/2024/CVE-2024-7808.json deleted file mode 100644 index c1ef9537f8..0000000000 --- a/2024/CVE-2024-7808.json +++ /dev/null @@ -1,38 +0,0 @@ -[ - { - "id": 884904353, - "name": "CVE-2024-7808", - "full_name": "TheUnknownSoul\/CVE-2024-7808", - "owner": { - "login": "TheUnknownSoul", - "id": 58050201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58050201?v=4", - "html_url": "https:\/\/github.com\/TheUnknownSoul", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/TheUnknownSoul\/CVE-2024-7808", - "description": "RCE exploit for low privileged user via CSRF in open-webui ", - "fork": false, - "created_at": "2024-11-07T15:42:53Z", - "updated_at": "2024-11-20T16:31:09Z", - "pushed_at": "2024-11-08T10:08:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "csrf", - "hack-tool", - "open-webui", - "rce-exploit" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-7854.json b/2024/CVE-2024-7854.json deleted file mode 100644 index 77b420df5c..0000000000 --- a/2024/CVE-2024-7854.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 867703844, - "name": "CVE-2024-7854", - "full_name": "RandomRobbieBF\/CVE-2024-7854", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-7854", - "description": "Woo Inquiry <= 0.1 - Unauthenticated SQL Injection", - "fork": false, - "created_at": "2024-10-04T14:59:36Z", - "updated_at": "2024-10-18T17:57:30Z", - "pushed_at": "2024-10-04T15:03:18Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-7954.json b/2024/CVE-2024-7954.json index 42e4a8de59..6a9223b6f4 100644 --- a/2024/CVE-2024-7954.json +++ b/2024/CVE-2024-7954.json @@ -1,35 +1,4 @@ [ - { - "id": 840829976, - "name": "CVE-2024-7954", - "full_name": "Chocapikk\/CVE-2024-7954", - "owner": { - "login": "Chocapikk", - "id": 88535377, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", - "html_url": "https:\/\/github.com\/Chocapikk", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-7954", - "description": "Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12", - "fork": false, - "created_at": "2024-08-10T20:15:41Z", - "updated_at": "2024-12-25T19:00:23Z", - "pushed_at": "2024-08-12T13:46:06Z", - "stargazers_count": 10, - "watchers_count": 10, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 10, - "score": 0, - "subscribers_count": 2 - }, { "id": 848869603, "name": "CVE-2024-7954", @@ -122,129 +91,5 @@ "watchers": 2, "score": 0, "subscribers_count": 1 - }, - { - "id": 867991834, - "name": "RCE-CVE-2024-7954", - "full_name": "MuhammadWaseem29\/RCE-CVE-2024-7954", - "owner": { - "login": "MuhammadWaseem29", - "id": 161931698, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161931698?v=4", - "html_url": "https:\/\/github.com\/MuhammadWaseem29", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/MuhammadWaseem29\/RCE-CVE-2024-7954", - "description": null, - "fork": false, - "created_at": "2024-10-05T07:24:57Z", - "updated_at": "2024-10-16T17:20:37Z", - "pushed_at": "2024-10-05T07:55:00Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 889221961, - "name": "CVE-2024-7954", - "full_name": "issamjr\/CVE-2024-7954", - "owner": { - "login": "issamjr", - "id": 101994309, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101994309?v=4", - "html_url": "https:\/\/github.com\/issamjr", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/issamjr\/CVE-2024-7954", - "description": "The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.", - "fork": false, - "created_at": "2024-11-15T21:08:47Z", - "updated_at": "2024-11-15T22:51:47Z", - "pushed_at": "2024-11-15T21:10:55Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 906301837, - "name": "CVE-2024-7954POC", - "full_name": "zxj-hub\/CVE-2024-7954POC", - "owner": { - "login": "zxj-hub", - "id": 192207002, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192207002?v=4", - "html_url": "https:\/\/github.com\/zxj-hub", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/zxj-hub\/CVE-2024-7954POC", - "description": "SPIP 4.30-alpha2、4.2.13、4.1.16之前的版本使用的porte_plume插件存在任意代码执行漏洞,远程未经身份验证的攻击者可以通过发送精心设计的HTTP 请求以SPIP用户身份执行任意PHP代码。", - "fork": false, - "created_at": "2024-12-20T15:40:35Z", - "updated_at": "2024-12-20T15:40:39Z", - "pushed_at": "2024-12-20T15:40:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 909188493, - "name": "RCE_CVE-2024-7954-", - "full_name": "0dayan0n\/RCE_CVE-2024-7954-", - "owner": { - "login": "0dayan0n", - "id": 170557167, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170557167?v=4", - "html_url": "https:\/\/github.com\/0dayan0n", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/0dayan0n\/RCE_CVE-2024-7954-", - "description": "The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request. (CRITICAL)", - "fork": false, - "created_at": "2024-12-28T01:05:05Z", - "updated_at": "2024-12-28T01:20:15Z", - "pushed_at": "2024-12-28T01:20:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-7965.json b/2024/CVE-2024-7965.json index 2e48d0aa8f..9b5301a966 100644 --- a/2024/CVE-2024-7965.json +++ b/2024/CVE-2024-7965.json @@ -29,41 +29,5 @@ "watchers": 44, "score": 0, "subscribers_count": 5 - }, - { - "id": 892392509, - "name": "cve-2024-7965-poc", - "full_name": "XiaomingX\/cve-2024-7965-poc", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-7965-poc", - "description": "CVE-2024-7965是Google Chrome浏览器中V8 JavaScript引擎的一个高危漏洞。该漏洞源于V8引擎在处理特定JavaScript代码时实现不当,导致堆内存损坏。攻击者可通过诱导用户访问包含特制JavaScript的恶意网页,利用此漏洞在Chrome渲染器中执行任意代码。", - "fork": false, - "created_at": "2024-11-22T02:55:33Z", - "updated_at": "2025-01-13T18:17:50Z", - "pushed_at": "2024-11-22T02:58:00Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2024-7965", - "exp", - "poc" - ], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-8069.json b/2024/CVE-2024-8069.json deleted file mode 100644 index 1c7eb8c357..0000000000 --- a/2024/CVE-2024-8069.json +++ /dev/null @@ -1,39 +0,0 @@ -[ - { - "id": 887638974, - "name": "cve-2024-8069-exp-Citrix-Virtual-Apps-XEN", - "full_name": "XiaomingX\/cve-2024-8069-exp-Citrix-Virtual-Apps-XEN", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-8069-exp-Citrix-Virtual-Apps-XEN", - "description": "Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE", - "fork": false, - "created_at": "2024-11-13T02:50:56Z", - "updated_at": "2025-01-13T18:16:27Z", - "pushed_at": "2024-11-29T03:02:09Z", - "stargazers_count": 15, - "watchers_count": 15, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "exploit", - "poc", - "rce", - "vulnerability" - ], - "visibility": "public", - "forks": 3, - "watchers": 15, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-8275.json b/2024/CVE-2024-8275.json index 213a628cfe..427ee6bbd4 100644 --- a/2024/CVE-2024-8275.json +++ b/2024/CVE-2024-8275.json @@ -29,36 +29,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 886590910, - "name": "CVE-2024-8275", - "full_name": "whiterose7777\/CVE-2024-8275", - "owner": { - "login": "whiterose7777", - "id": 174041119, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174041119?v=4", - "html_url": "https:\/\/github.com\/whiterose7777", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/whiterose7777\/CVE-2024-8275", - "description": null, - "fork": false, - "created_at": "2024-11-11T08:53:27Z", - "updated_at": "2024-11-12T08:52:35Z", - "pushed_at": "2024-11-11T08:56:09Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-8529.json b/2024/CVE-2024-8529.json deleted file mode 100644 index 33a05f47b6..0000000000 --- a/2024/CVE-2024-8529.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 871753655, - "name": "CVE-2024-8529", - "full_name": "RandomRobbieBF\/CVE-2024-8529", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-8529", - "description": "LearnPress – WordPress LMS Plugin <= 4.2.7 - Unauthenticated SQL Injection via 'c_fields'", - "fork": false, - "created_at": "2024-10-12T20:52:32Z", - "updated_at": "2024-10-20T20:02:46Z", - "pushed_at": "2024-10-12T20:55:55Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-8672.json b/2024/CVE-2024-8672.json deleted file mode 100644 index 2acd7c7b7c..0000000000 --- a/2024/CVE-2024-8672.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 897538365, - "name": "CVE-2024-8672", - "full_name": "Chocapikk\/CVE-2024-8672", - "owner": { - "login": "Chocapikk", - "id": 88535377, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", - "html_url": "https:\/\/github.com\/Chocapikk", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-8672", - "description": "Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution", - "fork": false, - "created_at": "2024-12-02T19:59:31Z", - "updated_at": "2024-12-20T20:39:53Z", - "pushed_at": "2024-12-02T20:00:09Z", - "stargazers_count": 11, - "watchers_count": 11, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 11, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-8698.json b/2024/CVE-2024-8698.json deleted file mode 100644 index 36658f1ac1..0000000000 --- a/2024/CVE-2024-8698.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 870632664, - "name": "CVE-2024-8698-POC", - "full_name": "huydoppaz\/CVE-2024-8698-POC", - "owner": { - "login": "huydoppaz", - "id": 180631518, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/180631518?v=4", - "html_url": "https:\/\/github.com\/huydoppaz", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/huydoppaz\/CVE-2024-8698-POC", - "description": "i'm noob with saml and keycloak . J4f", - "fork": false, - "created_at": "2024-10-10T11:50:07Z", - "updated_at": "2024-10-13T15:06:35Z", - "pushed_at": "2024-10-10T12:09:42Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-8743.json b/2024/CVE-2024-8743.json deleted file mode 100644 index 5503698e68..0000000000 --- a/2024/CVE-2024-8743.json +++ /dev/null @@ -1,36 +0,0 @@ -[ - { - "id": 914259917, - "name": "CVE-2024-8743-PoC", - "full_name": "siunam321\/CVE-2024-8743-PoC", - "owner": { - "login": "siunam321", - "id": 104430134, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104430134?v=4", - "html_url": "https:\/\/github.com\/siunam321", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/siunam321\/CVE-2024-8743-PoC", - "description": "Proof-of-Concept script for WordPress plugin Bit File Manager version <= 6.5.7 Authenticated (Subscriber+) Limited JavaScript File Upload (CVE-2024-8743) vulnerability", - "fork": false, - "created_at": "2025-01-09T08:54:56Z", - "updated_at": "2025-01-09T12:38:47Z", - "pushed_at": "2025-01-09T09:21:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "proof-of-concept", - "wordpress-plugin" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-8856.json b/2024/CVE-2024-8856.json deleted file mode 100644 index faa12a2eac..0000000000 --- a/2024/CVE-2024-8856.json +++ /dev/null @@ -1,74 +0,0 @@ -[ - { - "id": 889626915, - "name": "CVE-2024-8856", - "full_name": "ubaii\/CVE-2024-8856", - "owner": { - "login": "ubaii", - "id": 31325580, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31325580?v=4", - "html_url": "https:\/\/github.com\/ubaii", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ubaii\/CVE-2024-8856", - "description": "WordPress WP Time Capsule Plugin Arbitrary File Upload Vulnerability", - "fork": false, - "created_at": "2024-11-16T20:04:11Z", - "updated_at": "2024-12-17T04:33:41Z", - "pushed_at": "2024-11-16T20:04:45Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 891847903, - "name": "CVE-2024-8856", - "full_name": "Jenderal92\/CVE-2024-8856", - "owner": { - "login": "Jenderal92", - "id": 59664965, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59664965?v=4", - "html_url": "https:\/\/github.com\/Jenderal92", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Jenderal92\/CVE-2024-8856", - "description": "This tool scans WordPress websites for vulnerabilities in the WP Time Capsule plugin related to CVE-2024-8856. It identifies plugin versions below 1.22.22 as vulnerable and logs results to vuln.txt. Simple and efficient, it helps security researchers and admins detect and address risks quickly.", - "fork": false, - "created_at": "2024-11-21T04:01:27Z", - "updated_at": "2024-12-14T00:19:07Z", - "pushed_at": "2024-11-21T04:41:25Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-8856", - "cve-scanner", - "plugin-vulnerability", - "security-tools", - "vulnerability", - "wordpress", - "wordpress-plugin-scanner", - "wordpress-security", - "wp-time-capsule" - ], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-8963.json b/2024/CVE-2024-8963.json deleted file mode 100644 index d49f833256..0000000000 --- a/2024/CVE-2024-8963.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 887922973, - "name": "CVE-2024-8963", - "full_name": "patfire94\/CVE-2024-8963", - "owner": { - "login": "patfire94", - "id": 167763968, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167763968?v=4", - "html_url": "https:\/\/github.com\/patfire94", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/patfire94\/CVE-2024-8963", - "description": "Ivanti Cloud Services Appliance - Path Traversal", - "fork": false, - "created_at": "2024-11-13T14:12:57Z", - "updated_at": "2024-11-13T20:10:06Z", - "pushed_at": "2024-11-13T20:10:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9047.json b/2024/CVE-2024-9047.json deleted file mode 100644 index 90ec3b5420..0000000000 --- a/2024/CVE-2024-9047.json +++ /dev/null @@ -1,68 +0,0 @@ -[ - { - "id": 908089020, - "name": "CVE-2024-9047-PoC", - "full_name": "iSee857\/CVE-2024-9047-PoC", - "owner": { - "login": "iSee857", - "id": 73977770, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73977770?v=4", - "html_url": "https:\/\/github.com\/iSee857", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/iSee857\/CVE-2024-9047-PoC", - "description": "WordPress File Upload插件任意文件读取漏洞(CVE-2024-9047)批量检测脚本", - "fork": false, - "created_at": "2024-12-25T05:19:17Z", - "updated_at": "2025-01-12T18:36:04Z", - "pushed_at": "2024-12-25T05:28:55Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 913699164, - "name": "CVE-2024-9047", - "full_name": "verylazytech\/CVE-2024-9047", - "owner": { - "login": "verylazytech", - "id": 172168670, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4", - "html_url": "https:\/\/github.com\/verylazytech", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/verylazytech\/CVE-2024-9047", - "description": "POC - WordPress File Upload plugin, in the wfu_file_downloader.php file before version <= 4.24.11", - "fork": false, - "created_at": "2025-01-08T07:27:16Z", - "updated_at": "2025-01-10T11:12:41Z", - "pushed_at": "2025-01-08T07:36:19Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-9047", - "lfi", - "wordpress-plugin" - ], - "visibility": "public", - "forks": 1, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9061.json b/2024/CVE-2024-9061.json deleted file mode 100644 index d54d37a3d5..0000000000 --- a/2024/CVE-2024-9061.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 873461230, - "name": "CVE-2024-9061", - "full_name": "RandomRobbieBF\/CVE-2024-9061", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-9061", - "description": "WP Popup Builder – Popup Forms and Marketing Lead Generation <= 1.3.5 - Unauthenticated Arbitrary Shortcode Execution via wp_ajax_nopriv_shortcode_Api_Add", - "fork": false, - "created_at": "2024-10-16T07:57:48Z", - "updated_at": "2024-12-12T19:21:27Z", - "pushed_at": "2024-10-16T07:59:43Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9106.json b/2024/CVE-2024-9106.json deleted file mode 100644 index f49addf783..0000000000 --- a/2024/CVE-2024-9106.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 865906316, - "name": "CVE-2024-9106", - "full_name": "RandomRobbieBF\/CVE-2024-9106", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-9106", - "description": "Wechat Social login <= 1.3.0 - Authentication Bypass", - "fork": false, - "created_at": "2024-10-01T10:28:08Z", - "updated_at": "2024-10-18T17:57:33Z", - "pushed_at": "2024-10-01T10:31:05Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9224.json b/2024/CVE-2024-9224.json deleted file mode 100644 index 4a697efbf2..0000000000 --- a/2024/CVE-2024-9224.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 871101035, - "name": "CVE-2024-9224", - "full_name": "RandomRobbieBF\/CVE-2024-9224", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-9224", - "description": "Hello World <= 2.1.1 - Authenticated (Subscriber+) Arbitrary File Read", - "fork": false, - "created_at": "2024-10-11T09:17:20Z", - "updated_at": "2024-10-18T17:57:23Z", - "pushed_at": "2024-10-11T09:21:20Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9234.json b/2024/CVE-2024-9234.json deleted file mode 100644 index a6ffe41870..0000000000 --- a/2024/CVE-2024-9234.json +++ /dev/null @@ -1,95 +0,0 @@ -[ - { - "id": 874396366, - "name": "CVE-2024-9234", - "full_name": "RandomRobbieBF\/CVE-2024-9234", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-9234", - "description": "GutenKit <= 2.1.0 - Unauthenticated Arbitrary File Upload", - "fork": false, - "created_at": "2024-10-17T18:48:12Z", - "updated_at": "2024-10-18T17:57:06Z", - "pushed_at": "2024-10-17T18:49:22Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 884623982, - "name": "CVE-2024-9234", - "full_name": "CallMeBatosay\/CVE-2024-9234", - "owner": { - "login": "CallMeBatosay", - "id": 130114991, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130114991?v=4", - "html_url": "https:\/\/github.com\/CallMeBatosay", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/CallMeBatosay\/CVE-2024-9234", - "description": null, - "fork": false, - "created_at": "2024-11-07T04:56:44Z", - "updated_at": "2024-11-07T05:04:21Z", - "pushed_at": "2024-11-07T05:04:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 909321616, - "name": "CVE-2024-9234", - "full_name": "Nxploited\/CVE-2024-9234", - "owner": { - "login": "Nxploited", - "id": 188819918, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4", - "html_url": "https:\/\/github.com\/Nxploited", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-9234", - "description": null, - "fork": false, - "created_at": "2024-12-28T11:00:02Z", - "updated_at": "2024-12-28T11:11:34Z", - "pushed_at": "2024-12-28T11:11:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9264.json b/2024/CVE-2024-9264.json deleted file mode 100644 index 8ebad10d35..0000000000 --- a/2024/CVE-2024-9264.json +++ /dev/null @@ -1,150 +0,0 @@ -[ - { - "id": 875253753, - "name": "CVE-2024-9264", - "full_name": "nollium\/CVE-2024-9264", - "owner": { - "login": "nollium", - "id": 54525684, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54525684?v=4", - "html_url": "https:\/\/github.com\/nollium", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/nollium\/CVE-2024-9264", - "description": "Exploit for Grafana arbitrary file-read and RCE (CVE-2024-9264)", - "fork": false, - "created_at": "2024-10-19T13:50:52Z", - "updated_at": "2024-12-16T20:15:32Z", - "pushed_at": "2024-12-16T20:15:28Z", - "stargazers_count": 88, - "watchers_count": 88, - "has_discussions": false, - "forks_count": 17, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "authenticated", - "cve", - "cve-2024-9264", - "exploit", - "file-read-vulnerability", - "grafana", - "poc", - "rce", - "rce-exploit", - "security", - "vulnerability" - ], - "visibility": "public", - "forks": 17, - "watchers": 88, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 875437112, - "name": "File-Read-CVE-2024-9264", - "full_name": "z3k0sec\/File-Read-CVE-2024-9264", - "owner": { - "login": "z3k0sec", - "id": 135271952, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135271952?v=4", - "html_url": "https:\/\/github.com\/z3k0sec", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/z3k0sec\/File-Read-CVE-2024-9264", - "description": "File Read Proof of Concept for CVE-2024-9264", - "fork": false, - "created_at": "2024-10-20T01:13:37Z", - "updated_at": "2024-11-20T16:31:08Z", - "pushed_at": "2024-10-20T11:46:34Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-9264", - "exploit", - "grafana", - "poc" - ], - "visibility": "public", - "forks": 2, - "watchers": 5, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 875890256, - "name": "CVE-2024-9264-RCE-Exploit", - "full_name": "z3k0sec\/CVE-2024-9264-RCE-Exploit", - "owner": { - "login": "z3k0sec", - "id": 135271952, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135271952?v=4", - "html_url": "https:\/\/github.com\/z3k0sec", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/z3k0sec\/CVE-2024-9264-RCE-Exploit", - "description": "Grafana RCE exploit (CVE-2024-9264)", - "fork": false, - "created_at": "2024-10-21T03:36:05Z", - "updated_at": "2024-12-24T10:06:07Z", - "pushed_at": "2024-10-21T22:31:47Z", - "stargazers_count": 15, - "watchers_count": 15, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-9264", - "duckdb", - "exploit", - "grafana", - "rce", - "shellfs" - ], - "visibility": "public", - "forks": 3, - "watchers": 15, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 876056610, - "name": "Grafana-CVE-2024-9264", - "full_name": "punitdarji\/Grafana-CVE-2024-9264", - "owner": { - "login": "punitdarji", - "id": 38101321, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38101321?v=4", - "html_url": "https:\/\/github.com\/punitdarji", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/punitdarji\/Grafana-CVE-2024-9264", - "description": null, - "fork": false, - "created_at": "2024-10-21T10:25:27Z", - "updated_at": "2024-10-21T10:26:17Z", - "pushed_at": "2024-10-21T10:26:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9290.json b/2024/CVE-2024-9290.json deleted file mode 100644 index 518564bada..0000000000 --- a/2024/CVE-2024-9290.json +++ /dev/null @@ -1,76 +0,0 @@ -[ - { - "id": 902825495, - "name": "CVE-2024-9290", - "full_name": "RandomRobbieBF\/CVE-2024-9290", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-9290", - "description": "Super Backup & Clone - Migrate for WordPress <= 2.3.3 - Unauthenticated Arbitrary File Upload", - "fork": false, - "created_at": "2024-12-13T10:49:12Z", - "updated_at": "2024-12-17T11:04:43Z", - "pushed_at": "2024-12-13T10:52:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-9290", - "indeed-wp-superbackup" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 907588481, - "name": "CVE-2024-9290", - "full_name": "Jenderal92\/CVE-2024-9290", - "owner": { - "login": "Jenderal92", - "id": 59664965, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59664965?v=4", - "html_url": "https:\/\/github.com\/Jenderal92", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Jenderal92\/CVE-2024-9290", - "description": "The tool targets WordPress websites that use the Super Backup & Clone plugin and are vulnerable to arbitrary file upload.", - "fork": false, - "created_at": "2024-12-24T00:04:17Z", - "updated_at": "2024-12-24T15:47:06Z", - "pushed_at": "2024-12-24T00:05:56Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-9290", - "ethical-hacking", - "exploit-script", - "penetration-testing", - "vulnerability", - "vulnerability-detection", - "wordpress-exploit", - "wordpress-vulnerability" - ], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9326.json b/2024/CVE-2024-9326.json deleted file mode 100644 index 640d256a0c..0000000000 --- a/2024/CVE-2024-9326.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 895094470, - "name": "CVE-2024-9326-PoC", - "full_name": "ghostwirez\/CVE-2024-9326-PoC", - "owner": { - "login": "ghostwirez", - "id": 64195231, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64195231?v=4", - "html_url": "https:\/\/github.com\/ghostwirez", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ghostwirez\/CVE-2024-9326-PoC", - "description": "This PoC script is designed to verify the presence of CVE-2024-9326, a high SQL Injection vulnerability in PHPGurukul Online Shopping Portal v2.0. It automates the exploitation process to determine if the target web application is vulnerable, allowing security professionals to assess and confirm the flaw's existence.", - "fork": false, - "created_at": "2024-11-27T14:49:54Z", - "updated_at": "2024-11-27T14:52:57Z", - "pushed_at": "2024-11-27T14:52:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9441.json b/2024/CVE-2024-9441.json deleted file mode 100644 index be16f68ec0..0000000000 --- a/2024/CVE-2024-9441.json +++ /dev/null @@ -1,131 +0,0 @@ -[ - { - "id": 867057499, - "name": "CVE-2024-9441", - "full_name": "adhikara13\/CVE-2024-9441", - "owner": { - "login": "adhikara13", - "id": 44716348, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44716348?v=4", - "html_url": "https:\/\/github.com\/adhikara13", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/adhikara13\/CVE-2024-9441", - "description": "Nortek Linear eMerge E3 Pre-Auth RCE PoC (CVE-2024-9441)", - "fork": false, - "created_at": "2024-10-03T11:28:46Z", - "updated_at": "2024-12-28T06:13:35Z", - "pushed_at": "2024-10-03T11:32:27Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 870893978, - "name": "CVE-2024-9441", - "full_name": "p33d\/CVE-2024-9441", - "owner": { - "login": "p33d", - "id": 123099747, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123099747?v=4", - "html_url": "https:\/\/github.com\/p33d", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/p33d\/CVE-2024-9441", - "description": null, - "fork": false, - "created_at": "2024-10-10T21:29:08Z", - "updated_at": "2024-10-21T13:17:46Z", - "pushed_at": "2024-10-10T21:33:29Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 7, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 892378403, - "name": "cve-2024-9441-poc", - "full_name": "XiaomingX\/cve-2024-9441-poc", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-9441-poc", - "description": "CVE-2024-9441是影响Linear eMerge e3系列(版本1.00-07及之前)的操作系统命令注入漏洞。未经身份验证的远程攻击者可通过HTTP请求中“forgot_password”功能的“login_id”参数,执行任意操作系统命令。", - "fork": false, - "created_at": "2024-11-22T02:04:21Z", - "updated_at": "2025-01-13T18:17:50Z", - "pushed_at": "2024-11-22T02:07:52Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2024-9441", - "exp", - "poc" - ], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 900915677, - "name": "CVE-2024-9441-Checker", - "full_name": "jk-mayne\/CVE-2024-9441-Checker", - "owner": { - "login": "jk-mayne", - "id": 18690206, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18690206?v=4", - "html_url": "https:\/\/github.com\/jk-mayne", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/jk-mayne\/CVE-2024-9441-Checker", - "description": "A simple python script to test for CVE-2024-9441. ", - "fork": false, - "created_at": "2024-12-09T17:49:37Z", - "updated_at": "2024-12-09T17:50:01Z", - "pushed_at": "2024-12-09T17:49:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9464.json b/2024/CVE-2024-9464.json deleted file mode 100644 index 6a88684efb..0000000000 --- a/2024/CVE-2024-9464.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 870215749, - "name": "CVE-2024-9464", - "full_name": "horizon3ai\/CVE-2024-9464", - "owner": { - "login": "horizon3ai", - "id": 79593994, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4", - "html_url": "https:\/\/github.com\/horizon3ai", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/horizon3ai\/CVE-2024-9464", - "description": "Proof of Concept Exploit for CVE-2024-9464", - "fork": false, - "created_at": "2024-10-09T16:36:25Z", - "updated_at": "2024-12-16T15:16:53Z", - "pushed_at": "2024-10-09T16:41:41Z", - "stargazers_count": 44, - "watchers_count": 44, - "has_discussions": false, - "forks_count": 12, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 12, - "watchers": 44, - "score": 0, - "subscribers_count": 4 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9465.json b/2024/CVE-2024-9465.json deleted file mode 100644 index 9398713241..0000000000 --- a/2024/CVE-2024-9465.json +++ /dev/null @@ -1,95 +0,0 @@ -[ - { - "id": 870208687, - "name": "CVE-2024-9465", - "full_name": "horizon3ai\/CVE-2024-9465", - "owner": { - "login": "horizon3ai", - "id": 79593994, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4", - "html_url": "https:\/\/github.com\/horizon3ai", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/horizon3ai\/CVE-2024-9465", - "description": "Proof of Concept Exploit for CVE-2024-9465", - "fork": false, - "created_at": "2024-10-09T16:22:05Z", - "updated_at": "2024-11-26T23:20:04Z", - "pushed_at": "2024-10-09T16:34:42Z", - "stargazers_count": 27, - "watchers_count": 27, - "has_discussions": false, - "forks_count": 5, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 5, - "watchers": 27, - "score": 0, - "subscribers_count": 4 - }, - { - "id": 870541259, - "name": "CVE-2024-9465", - "full_name": "mustafaakalin\/CVE-2024-9465", - "owner": { - "login": "mustafaakalin", - "id": 121257754, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121257754?v=4", - "html_url": "https:\/\/github.com\/mustafaakalin", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/mustafaakalin\/CVE-2024-9465", - "description": "Checkpoint SQL Injection via Time-Based Attack (CVE-2024-9465)", - "fork": false, - "created_at": "2024-10-10T08:23:31Z", - "updated_at": "2024-10-10T08:39:26Z", - "pushed_at": "2024-10-10T08:39:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 897887165, - "name": "cve-2024-9465-poc", - "full_name": "XiaomingX\/cve-2024-9465-poc", - "owner": { - "login": "XiaomingX", - "id": 5387930, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", - "html_url": "https:\/\/github.com\/XiaomingX", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-9465-poc", - "description": "Proof of Concept Exploit for CVE-2024-9465", - "fork": false, - "created_at": "2024-12-03T12:16:44Z", - "updated_at": "2025-01-14T18:04:05Z", - "pushed_at": "2024-12-03T12:21:35Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 6, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9466.json b/2024/CVE-2024-9466.json deleted file mode 100644 index 005a4ef29e..0000000000 --- a/2024/CVE-2024-9466.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 875151386, - "name": "CVE-2024-9466", - "full_name": "holypryx\/CVE-2024-9466", - "owner": { - "login": "holypryx", - "id": 182792867, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/182792867?v=4", - "html_url": "https:\/\/github.com\/holypryx", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/holypryx\/CVE-2024-9466", - "description": "CVE-2024-9466 poc", - "fork": false, - "created_at": "2024-10-19T08:22:13Z", - "updated_at": "2024-10-22T02:01:29Z", - "pushed_at": "2024-10-19T08:25:45Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9474.json b/2024/CVE-2024-9474.json deleted file mode 100644 index 8d192c4bbf..0000000000 --- a/2024/CVE-2024-9474.json +++ /dev/null @@ -1,126 +0,0 @@ -[ - { - "id": 891077206, - "name": "CVE-2024-9474", - "full_name": "Chocapikk\/CVE-2024-9474", - "owner": { - "login": "Chocapikk", - "id": 88535377, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", - "html_url": "https:\/\/github.com\/Chocapikk", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-9474", - "description": "PAN-OS auth bypass + RCE", - "fork": false, - "created_at": "2024-11-19T17:26:27Z", - "updated_at": "2025-01-02T13:12:29Z", - "pushed_at": "2024-11-19T17:38:29Z", - "stargazers_count": 43, - "watchers_count": 43, - "has_discussions": false, - "forks_count": 19, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 19, - "watchers": 43, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 891185979, - "name": "CVE-2024-9474", - "full_name": "k4nfr3\/CVE-2024-9474", - "owner": { - "login": "k4nfr3", - "id": 45294916, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45294916?v=4", - "html_url": "https:\/\/github.com\/k4nfr3", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/k4nfr3\/CVE-2024-9474", - "description": null, - "fork": false, - "created_at": "2024-11-19T22:03:13Z", - "updated_at": "2025-01-12T18:31:54Z", - "pushed_at": "2024-11-22T16:39:20Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 891754275, - "name": "CVE-2024-9474", - "full_name": "deathvu\/CVE-2024-9474", - "owner": { - "login": "deathvu", - "id": 47398055, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47398055?v=4", - "html_url": "https:\/\/github.com\/deathvu", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/deathvu\/CVE-2024-9474", - "description": "PoC for PAN-OS Exploit", - "fork": false, - "created_at": "2024-11-20T22:31:50Z", - "updated_at": "2024-11-20T22:35:13Z", - "pushed_at": "2024-11-20T22:35:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 901635740, - "name": "PAN-OS_CVE-2024-9474", - "full_name": "coskper-papa\/PAN-OS_CVE-2024-9474", - "owner": { - "login": "coskper-papa", - "id": 90187053, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90187053?v=4", - "html_url": "https:\/\/github.com\/coskper-papa", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/coskper-papa\/PAN-OS_CVE-2024-9474", - "description": "Palo Alto Networks PAN-OS(CVE-2024-9474) POC", - "fork": false, - "created_at": "2024-12-11T03:10:41Z", - "updated_at": "2024-12-14T17:39:14Z", - "pushed_at": "2024-12-11T03:36:19Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9570.json b/2024/CVE-2024-9570.json deleted file mode 100644 index 68d62aa315..0000000000 --- a/2024/CVE-2024-9570.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 871275663, - "name": "CVE-2024-9570_D-Link-DIR-619L-bof", - "full_name": "dylvie\/CVE-2024-9570_D-Link-DIR-619L-bof", - "owner": { - "login": "dylvie", - "id": 78607002, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78607002?v=4", - "html_url": "https:\/\/github.com\/dylvie", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/dylvie\/CVE-2024-9570_D-Link-DIR-619L-bof", - "description": "Exploit for CVE-2024-9570", - "fork": false, - "created_at": "2024-10-11T16:05:06Z", - "updated_at": "2024-10-14T02:39:01Z", - "pushed_at": "2024-10-11T16:08:06Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 6, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9593.json b/2024/CVE-2024-9593.json deleted file mode 100644 index cd4b64ed00..0000000000 --- a/2024/CVE-2024-9593.json +++ /dev/null @@ -1,95 +0,0 @@ -[ - { - "id": 874679920, - "name": "CVE-2024-9593", - "full_name": "RandomRobbieBF\/CVE-2024-9593", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-9593", - "description": "Time Clock <= 1.2.2 & Time Clock Pro <= 1.1.4 - Unauthenticated (Limited) Remote Code Execution", - "fork": false, - "created_at": "2024-10-18T09:11:03Z", - "updated_at": "2024-10-18T17:57:05Z", - "pushed_at": "2024-10-18T09:14:40Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 890236164, - "name": "CVE-2024-9593-EXP", - "full_name": "0x4f5da2-venom\/CVE-2024-9593-EXP", - "owner": { - "login": "0x4f5da2-venom", - "id": 130073287, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130073287?v=4", - "html_url": "https:\/\/github.com\/0x4f5da2-venom", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/0x4f5da2-venom\/CVE-2024-9593-EXP", - "description": "CVE-2024-9593 WordPress插件的远程代码执行", - "fork": false, - "created_at": "2024-11-18T08:22:44Z", - "updated_at": "2024-11-18T08:46:15Z", - "pushed_at": "2024-11-18T08:46:05Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 910842598, - "name": "CVE-2024-9593-Exploit", - "full_name": "Nxploited\/CVE-2024-9593-Exploit", - "owner": { - "login": "Nxploited", - "id": 188819918, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4", - "html_url": "https:\/\/github.com\/Nxploited", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-9593-Exploit", - "description": null, - "fork": false, - "created_at": "2025-01-01T15:49:36Z", - "updated_at": "2025-01-01T16:01:25Z", - "pushed_at": "2025-01-01T16:01:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9680.json b/2024/CVE-2024-9680.json deleted file mode 100644 index db3fabd75d..0000000000 --- a/2024/CVE-2024-9680.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 874322010, - "name": "Firefox-CVE-2024-9680", - "full_name": "tdonaworth\/Firefox-CVE-2024-9680", - "owner": { - "login": "tdonaworth", - "id": 56687505, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56687505?v=4", - "html_url": "https:\/\/github.com\/tdonaworth", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/tdonaworth\/Firefox-CVE-2024-9680", - "description": null, - "fork": false, - "created_at": "2024-10-17T16:10:38Z", - "updated_at": "2024-11-29T08:39:46Z", - "pushed_at": "2024-10-17T16:28:17Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 5, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 911178997, - "name": "Version_Vulnerability_Scanner", - "full_name": "PraiseImafidon\/Version_Vulnerability_Scanner", - "owner": { - "login": "PraiseImafidon", - "id": 108192872, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108192872?v=4", - "html_url": "https:\/\/github.com\/PraiseImafidon", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/PraiseImafidon\/Version_Vulnerability_Scanner", - "description": "A vulnerability scanner for Firefox and Thunderbird that checks if your versions are out of date and susceptible to CVE-2024-9680.", - "fork": false, - "created_at": "2025-01-02T12:21:19Z", - "updated_at": "2025-01-02T13:16:42Z", - "pushed_at": "2025-01-02T13:16:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9707.json b/2024/CVE-2024-9707.json deleted file mode 100644 index 61dedd0274..0000000000 --- a/2024/CVE-2024-9707.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 871033172, - "name": "CVE-2024-9707", - "full_name": "RandomRobbieBF\/CVE-2024-9707", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-9707", - "description": "Hunk Companion <= 1.8.4 - Missing Authorization to Unauthenticated Arbitrary Plugin Installation\/Activation", - "fork": false, - "created_at": "2024-10-11T06:21:38Z", - "updated_at": "2024-10-18T17:57:25Z", - "pushed_at": "2024-10-11T06:25:01Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 915839096, - "name": "CVE-2024-9707-Poc", - "full_name": "Nxploited\/CVE-2024-9707-Poc", - "owner": { - "login": "Nxploited", - "id": 188819918, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4", - "html_url": "https:\/\/github.com\/Nxploited", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-9707-Poc", - "description": "he Hunk Companion Plugin for WordPress: Vulnerable to Unauthorized Plugin Installation\/Activation (Versions Up to and Including 1.8.4)", - "fork": false, - "created_at": "2025-01-12T23:35:02Z", - "updated_at": "2025-01-13T02:15:00Z", - "pushed_at": "2025-01-13T02:14:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9796.json b/2024/CVE-2024-9796.json deleted file mode 100644 index bbf205093d..0000000000 --- a/2024/CVE-2024-9796.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 874826793, - "name": "CVE-2024-9796", - "full_name": "RandomRobbieBF\/CVE-2024-9796", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-9796", - "description": "WordPress WP-Advanced-Search <= 3.3.9 - Unauthenticated SQL Injection", - "fork": false, - "created_at": "2024-10-18T14:30:42Z", - "updated_at": "2024-10-19T01:05:17Z", - "pushed_at": "2024-10-18T14:39:55Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 889251660, - "name": "CVE-2024-9796", - "full_name": "issamjr\/CVE-2024-9796", - "owner": { - "login": "issamjr", - "id": 101994309, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101994309?v=4", - "html_url": "https:\/\/github.com\/issamjr", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/issamjr\/CVE-2024-9796", - "description": "WordPress WP-Advanced-Search <= 3.3.9 - Unauthenticated SQL Injection", - "fork": false, - "created_at": "2024-11-15T22:55:18Z", - "updated_at": "2024-12-16T14:47:33Z", - "pushed_at": "2024-11-15T23:04:07Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9821.json b/2024/CVE-2024-9821.json deleted file mode 100644 index 6f058f6f77..0000000000 --- a/2024/CVE-2024-9821.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 871263157, - "name": "CVE-2024-9821", - "full_name": "RandomRobbieBF\/CVE-2024-9821", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-9821", - "description": "Bot for Telegram on WooCommerce <= 1.2.4 - Authenticated (Subscriber+) Telegram Bot Token Disclosure to Authentication Bypass", - "fork": false, - "created_at": "2024-10-11T15:35:39Z", - "updated_at": "2024-10-18T17:57:16Z", - "pushed_at": "2024-10-11T15:47:18Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9822.json b/2024/CVE-2024-9822.json deleted file mode 100644 index 801ae2a761..0000000000 --- a/2024/CVE-2024-9822.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 871710418, - "name": "CVE-2024-9822", - "full_name": "RandomRobbieBF\/CVE-2024-9822", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-9822", - "description": "Pedalo Connector <= 2.0.5 - Authentication Bypass to Administrator", - "fork": false, - "created_at": "2024-10-12T18:11:16Z", - "updated_at": "2025-01-06T13:36:12Z", - "pushed_at": "2024-10-12T18:13:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9890.json b/2024/CVE-2024-9890.json deleted file mode 100644 index a14be5647d..0000000000 --- a/2024/CVE-2024-9890.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 885365895, - "name": "CVE-2024-9890", - "full_name": "RandomRobbieBF\/CVE-2024-9890", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-9890", - "description": "User Toolkit <= 1.2.3 - Authenticated (Subscriber+) Authentication Bypass", - "fork": false, - "created_at": "2024-11-08T12:56:55Z", - "updated_at": "2024-11-08T12:59:44Z", - "pushed_at": "2024-11-08T12:59:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9926.json b/2024/CVE-2024-9926.json deleted file mode 100644 index d1c219ba38..0000000000 --- a/2024/CVE-2024-9926.json +++ /dev/null @@ -1,79 +0,0 @@ -[ - { - "id": 877508313, - "name": "wordpress-jetpack-broken-access-control-vulnerable-application", - "full_name": "m3ssap0\/wordpress-jetpack-broken-access-control-vulnerable-application", - "owner": { - "login": "m3ssap0", - "id": 705120, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4", - "html_url": "https:\/\/github.com\/m3ssap0", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/m3ssap0\/wordpress-jetpack-broken-access-control-vulnerable-application", - "description": "WARNING: This is a vulnerable application to test the exploit for the Jetpack < 13.9.1 broken access control (CVE-2024-9926). Run it at your own risk!", - "fork": false, - "created_at": "2024-10-23T19:12:55Z", - "updated_at": "2024-11-25T03:27:38Z", - "pushed_at": "2024-11-09T11:13:38Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "broken-access-control", - "cve-2024-9926", - "jetpack", - "vulnerable-application", - "wordpress" - ], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 881924384, - "name": "wordpress-jetpack-broken-access-control-exploit", - "full_name": "m3ssap0\/wordpress-jetpack-broken-access-control-exploit", - "owner": { - "login": "m3ssap0", - "id": 705120, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4", - "html_url": "https:\/\/github.com\/m3ssap0", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/m3ssap0\/wordpress-jetpack-broken-access-control-exploit", - "description": "Exploits Jetpack < 13.9.1 broken access control (CVE-2024-9926).", - "fork": false, - "created_at": "2024-11-01T14:03:55Z", - "updated_at": "2024-11-27T13:31:35Z", - "pushed_at": "2024-11-09T11:19:38Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-9926", - "exploit", - "jetpack", - "security", - "security-tools", - "vulnerability", - "vulnerability-scan", - "wordpress" - ], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9932.json b/2024/CVE-2024-9932.json deleted file mode 100644 index 050211bb58..0000000000 --- a/2024/CVE-2024-9932.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 883779888, - "name": "CVE-2024-9932", - "full_name": "RandomRobbieBF\/CVE-2024-9932", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-9932", - "description": "Wux Blog Editor <= 3.0.0 - Unauthenticated Arbitrary File Upload", - "fork": false, - "created_at": "2024-11-05T15:00:39Z", - "updated_at": "2024-12-31T05:05:46Z", - "pushed_at": "2024-11-05T15:02:04Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 915454852, - "name": "CVE-2024-9932-POC", - "full_name": "Nxploited\/CVE-2024-9932-POC", - "owner": { - "login": "Nxploited", - "id": 188819918, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4", - "html_url": "https:\/\/github.com\/Nxploited", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-9932-POC", - "description": null, - "fork": false, - "created_at": "2025-01-11T22:09:55Z", - "updated_at": "2025-01-11T22:56:25Z", - "pushed_at": "2025-01-11T22:56:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9933.json b/2024/CVE-2024-9933.json deleted file mode 100644 index 4436730fc1..0000000000 --- a/2024/CVE-2024-9933.json +++ /dev/null @@ -1,64 +0,0 @@ -[ - { - "id": 883936829, - "name": "CVE-2024-9933", - "full_name": "RandomRobbieBF\/CVE-2024-9933", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-9933", - "description": "WatchTowerHQ <= 3.10.1 - Authentication Bypass to Administrator due to Missing Empty Value Check", - "fork": false, - "created_at": "2024-11-05T20:55:09Z", - "updated_at": "2024-11-05T20:58:15Z", - "pushed_at": "2024-11-05T20:58:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 908944974, - "name": "CVE-2024-9933", - "full_name": "Nxploited\/CVE-2024-9933", - "owner": { - "login": "Nxploited", - "id": 188819918, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4", - "html_url": "https:\/\/github.com\/Nxploited", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-9933", - "description": null, - "fork": false, - "created_at": "2024-12-27T11:03:42Z", - "updated_at": "2024-12-27T11:12:57Z", - "pushed_at": "2024-12-27T11:12:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9935.json b/2024/CVE-2024-9935.json deleted file mode 100644 index b39847728a..0000000000 --- a/2024/CVE-2024-9935.json +++ /dev/null @@ -1,102 +0,0 @@ -[ - { - "id": 890288552, - "name": "CVE-2024-9935", - "full_name": "RandomRobbieBF\/CVE-2024-9935", - "owner": { - "login": "RandomRobbieBF", - "id": 51722811, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", - "html_url": "https:\/\/github.com\/RandomRobbieBF", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-9935", - "description": "PDF Generator Addon for Elementor Page Builder <= 1.7.5 - Unauthenticated Arbitrary File Download", - "fork": false, - "created_at": "2024-11-18T10:14:45Z", - "updated_at": "2024-12-17T20:19:31Z", - "pushed_at": "2024-11-18T10:15:49Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 905650504, - "name": "CVE-2024-9935", - "full_name": "verylazytech\/CVE-2024-9935", - "owner": { - "login": "verylazytech", - "id": 172168670, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4", - "html_url": "https:\/\/github.com\/verylazytech", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/verylazytech\/CVE-2024-9935", - "description": "PDF Generator Addon for Elementor Page Builder <= 1.7.5 - Unauthenticated Arbitrary File Download", - "fork": false, - "created_at": "2024-12-19T08:57:30Z", - "updated_at": "2025-01-10T11:12:48Z", - "pushed_at": "2024-12-19T09:43:37Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2024-9935", - "elementor-page-builder", - "lfi", - "lfi-exploitation", - "unauthenticated-arbitrary-file-download", - "wordpress-plugin" - ], - "visibility": "public", - "forks": 0, - "watchers": 5, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 908375813, - "name": "CVE-2024-9935", - "full_name": "Nxploited\/CVE-2024-9935", - "owner": { - "login": "Nxploited", - "id": 188819918, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4", - "html_url": "https:\/\/github.com\/Nxploited", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-9935", - "description": null, - "fork": false, - "created_at": "2024-12-25T22:59:07Z", - "updated_at": "2024-12-25T23:04:49Z", - "pushed_at": "2024-12-25T23:04:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-9955.json b/2024/CVE-2024-9955.json deleted file mode 100644 index 77742d1517..0000000000 --- a/2024/CVE-2024-9955.json +++ /dev/null @@ -1,33 +0,0 @@ -[ - { - "id": 881563522, - "name": "CVE-2024-9955-POC", - "full_name": "amfg145\/CVE-2024-9955-POC", - "owner": { - "login": "amfg145", - "id": 16266637, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16266637?v=4", - "html_url": "https:\/\/github.com\/amfg145", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/amfg145\/CVE-2024-9955-POC", - "description": "Fortinet Privilege Escalation Advisory CVE-2024-9955-POC: Elevation to Domain Admin on FortiOS and FortiProxy", - "fork": false, - "created_at": "2024-10-31T20:23:15Z", - "updated_at": "2024-11-06T15:37:39Z", - "pushed_at": "2024-10-31T20:35:29Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2025/CVE-2025-0282.json b/2025/CVE-2025-0282.json index 433258d4a8..f2dd8b03c7 100644 --- a/2025/CVE-2025-0282.json +++ b/2025/CVE-2025-0282.json @@ -1,35 +1,4 @@ [ - { - "id": 914487777, - "name": "CVE-2025-0282", - "full_name": "securexploit1\/CVE-2025-0282", - "owner": { - "login": "securexploit1", - "id": 194412933, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/194412933?v=4", - "html_url": "https:\/\/github.com\/securexploit1", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/securexploit1\/CVE-2025-0282", - "description": null, - "fork": false, - "created_at": "2025-01-09T17:36:00Z", - "updated_at": "2025-01-09T17:43:40Z", - "pushed_at": "2025-01-09T17:36:14Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 0 - }, { "id": 914515018, "name": "CVE-2025-0282-check", @@ -61,37 +30,6 @@ "score": 0, "subscribers_count": 0 }, - { - "id": 914659896, - "name": "CVE-2025-0282-PoC", - "full_name": "NyxanGoat\/CVE-2025-0282-PoC", - "owner": { - "login": "NyxanGoat", - "id": 194452207, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/194452207?v=4", - "html_url": "https:\/\/github.com\/NyxanGoat", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/NyxanGoat\/CVE-2025-0282-PoC", - "description": "Ivanti (unsecure connect) zero click unauthenticated code execution", - "fork": false, - "created_at": "2025-01-10T03:32:20Z", - "updated_at": "2025-01-10T03:41:59Z", - "pushed_at": "2025-01-10T03:34:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - }, { "id": 915111069, "name": "CVE-2025-0282-Ivanti-exploit", @@ -169,8 +107,8 @@ "description": "Parses the System Snapshot from an Ivanti Connect Secure applicance to identify possible IOCs related to CVE-2023-46805, CVE-2024-21887 and CVE-2025-0282.", "fork": false, "created_at": "2025-01-14T12:54:19Z", - "updated_at": "2025-01-14T13:36:46Z", - "pushed_at": "2025-01-14T13:36:43Z", + "updated_at": "2025-01-14T22:44:39Z", + "pushed_at": "2025-01-14T22:44:35Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-0683.json b/2025/CVE-2025-22964.json similarity index 52% rename from 2024/CVE-2024-0683.json rename to 2025/CVE-2025-22964.json index 6714fff78f..bc3c4cef33 100644 --- a/2024/CVE-2024-0683.json +++ b/2025/CVE-2025-22964.json @@ -1,21 +1,21 @@ [ { - "id": 908042260, - "name": "CVE-2024-0683", - "full_name": "3474458191\/CVE-2024-0683", + "id": 916784700, + "name": "CVE-2025-22964", + "full_name": "padayali-JD\/CVE-2025-22964", "owner": { - "login": "3474458191", - "id": 187000025, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/187000025?v=4", - "html_url": "https:\/\/github.com\/3474458191", + "login": "padayali-JD", + "id": 182597025, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/182597025?v=4", + "html_url": "https:\/\/github.com\/padayali-JD", "user_view_type": "public" }, - "html_url": "https:\/\/github.com\/3474458191\/CVE-2024-0683", - "description": "测试", + "html_url": "https:\/\/github.com\/padayali-JD\/CVE-2025-22964", + "description": null, "fork": false, - "created_at": "2024-12-25T00:48:18Z", - "updated_at": "2024-12-25T00:48:41Z", - "pushed_at": "2024-12-25T00:48:37Z", + "created_at": "2025-01-14T18:52:01Z", + "updated_at": "2025-01-14T19:01:00Z", + "pushed_at": "2025-01-14T19:00:57Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-4320.json b/2025/CVE-2025-22968.json similarity index 52% rename from 2024/CVE-2024-4320.json rename to 2025/CVE-2025-22968.json index 0f720913ff..b64e49beb5 100644 --- a/2024/CVE-2024-4320.json +++ b/2025/CVE-2025-22968.json @@ -1,21 +1,21 @@ [ { - "id": 839650605, - "name": "CVE-2024-4320", - "full_name": "bolkv\/CVE-2024-4320", + "id": 912297238, + "name": "CVE-2025-22968", + "full_name": "CRUNZEX\/CVE-2025-22968", "owner": { - "login": "bolkv", - "id": 145219983, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145219983?v=4", - "html_url": "https:\/\/github.com\/bolkv", + "login": "CRUNZEX", + "id": 69286857, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69286857?v=4", + "html_url": "https:\/\/github.com\/CRUNZEX", "user_view_type": "public" }, - "html_url": "https:\/\/github.com\/bolkv\/CVE-2024-4320", + "html_url": "https:\/\/github.com\/CRUNZEX\/CVE-2025-22968", "description": null, "fork": false, - "created_at": "2024-08-08T03:54:38Z", - "updated_at": "2024-08-08T03:54:46Z", - "pushed_at": "2024-08-08T03:54:43Z", + "created_at": "2025-01-05T06:51:58Z", + "updated_at": "2025-01-14T19:43:32Z", + "pushed_at": "2025-01-14T19:43:29Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 9b59fced2b..7477a8fa91 100644 --- a/README.md +++ b/README.md @@ -6,9 +6,7 @@ A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution. -- [securexploit1/CVE-2025-0282](https://github.com/securexploit1/CVE-2025-0282) - [BishopFox/CVE-2025-0282-check](https://github.com/BishopFox/CVE-2025-0282-check) -- [NyxanGoat/CVE-2025-0282-PoC](https://github.com/NyxanGoat/CVE-2025-0282-PoC) - [absholi7ly/CVE-2025-0282-Ivanti-exploit](https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit) - [AnonStorks/CVE-2025-0282-Full-version](https://github.com/AnonStorks/CVE-2025-0282-Full-version) - [rxwx/pulse-meter](https://github.com/rxwx/pulse-meter) @@ -27,23 +25,14 @@ - [DoTTak/CVE-2025-22510](https://github.com/DoTTak/CVE-2025-22510) +### CVE-2025-22964 +- [padayali-JD/CVE-2025-22964](https://github.com/padayali-JD/CVE-2025-22964) + +### CVE-2025-22968 +- [CRUNZEX/CVE-2025-22968](https://github.com/CRUNZEX/CVE-2025-22968) + ## 2024 -### CVE-2024-0012 (2024-11-18) - -An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474 https://security.paloaltonetworks.com/CVE-2024-9474 .\n\nThe risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended  best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .\n\nThis issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software.\n\nCloud NGFW and Prisma Access are not impacted by this vulnerability. - - -- [watchtowrlabs/palo-alto-panos-cve-2024-0012](https://github.com/watchtowrlabs/palo-alto-panos-cve-2024-0012) -- [Sachinart/CVE-2024-0012-POC](https://github.com/Sachinart/CVE-2024-0012-POC) -- [greaselovely/CVE-2024-0012](https://github.com/greaselovely/CVE-2024-0012) -- [VegetableLasagne/CVE-2024-0012](https://github.com/VegetableLasagne/CVE-2024-0012) -- [iSee857/CVE-2024-0012-poc](https://github.com/iSee857/CVE-2024-0012-poc) -- [XiaomingX/cve-2024-0012-poc](https://github.com/XiaomingX/cve-2024-0012-poc) -- [punitdarji/Paloalto-CVE-2024-0012](https://github.com/punitdarji/Paloalto-CVE-2024-0012) -- [0xjessie21/CVE-2024-0012](https://github.com/0xjessie21/CVE-2024-0012) -- [TalatumLabs/CVE-2024-0012_CVE-2024-9474_PoC](https://github.com/TalatumLabs/CVE-2024-0012_CVE-2024-9474_PoC) - ### CVE-2024-0015 (2024-02-16) In convertToComponentName of DreamService.java, there is a possible way to launch arbitrary protected activities due to intent redirection. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. @@ -56,16 +45,8 @@ In ConvertRGBToPlanarYUV of Codec2BufferUtils.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. -- [AbrarKhan/G3_Frameworks_av_CVE-2024-0023](https://github.com/AbrarKhan/G3_Frameworks_av_CVE-2024-0023) - [Aakashmom/frameworks_av_android10_r33_CVE-2024-0023](https://github.com/Aakashmom/frameworks_av_android10_r33_CVE-2024-0023) -### CVE-2024-0030 (2024-02-16) - -In btif_to_bta_response of btif_gatt_util.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. - - -- [uthrasri/system_bt_CVE-2024-0030](https://github.com/uthrasri/system_bt_CVE-2024-0030) - ### CVE-2024-0039 (2024-03-11) In attp_build_value_cmd of att_protocol.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. @@ -73,14 +54,6 @@ - [41yn14/CVE-2024-0039-Exploit](https://github.com/41yn14/CVE-2024-0039-Exploit) -### CVE-2024-0040 (2024-02-16) - -In setParameter of MtpPacket.cpp, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. - - -- [nidhihcl75/frameworks_av_AOSP10_r33_CVE-2024-0040](https://github.com/nidhihcl75/frameworks_av_AOSP10_r33_CVE-2024-0040) -- [uthrasri/frameworks_av_CVE-2024-0040](https://github.com/uthrasri/frameworks_av_CVE-2024-0040) - ### CVE-2024-0044 (2024-03-11) In createSessionInternal of PackageInstallerService.java, there is a possible run-as any app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n @@ -89,21 +62,14 @@ - [scs-labrat/android_autorooter](https://github.com/scs-labrat/android_autorooter) - [0xbinder/CVE-2024-0044](https://github.com/0xbinder/CVE-2024-0044) - [Re13orn/CVE-2024-0044-EXP](https://github.com/Re13orn/CVE-2024-0044-EXP) -- [007CRIPTOGRAFIA/c-CVE-2024-0044](https://github.com/007CRIPTOGRAFIA/c-CVE-2024-0044) -- [Kai2er/CVE-2024-0044-EXP](https://github.com/Kai2er/CVE-2024-0044-EXP) -- [hunter24x24/cve_2024_0044](https://github.com/hunter24x24/cve_2024_0044) -- [nexussecelite/EvilDroid](https://github.com/nexussecelite/EvilDroid) -- [nahid0x1/CVE-2024-0044](https://github.com/nahid0x1/CVE-2024-0044) - [MrW0l05zyn/cve-2024-0044](https://github.com/MrW0l05zyn/cve-2024-0044) - [canyie/CVE-2024-0044](https://github.com/canyie/CVE-2024-0044) -- [Dit-Developers/CVE-2024-0044-](https://github.com/Dit-Developers/CVE-2024-0044-) ### CVE-2024-0049 (2024-03-11) In multiple locations, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. -- [nidhihcl75/frameworks_av_AOSP10_r33_CVE-2024-0049](https://github.com/nidhihcl75/frameworks_av_AOSP10_r33_CVE-2024-0049) - [Aakashmom/frameworks_av_android10_r33_CVE-2024-0049](https://github.com/Aakashmom/frameworks_av_android10_r33_CVE-2024-0049) ### CVE-2024-0195 (2024-01-02) @@ -154,13 +120,6 @@ - [jidle123/cve-2024-0305exp](https://github.com/jidle123/cve-2024-0305exp) -### CVE-2024-0311 (2024-03-14) - -A malicious insider can bypass the existing policy of Skyhigh Client Proxy without a valid release code. - - -- [calligraf0/CVE-2024-0311](https://github.com/calligraf0/CVE-2024-0311) - ### CVE-2024-0324 (2024-02-05) The User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wppb_two_factor_authentication_settings_update' function in all versions up to, and including, 3.10.8. This makes it possible for unauthenticated attackers to enable or disable the 2FA functionality present in the Premium version of the plugin for arbitrary user roles. @@ -218,8 +177,6 @@ - [ysanatomic/io_uring_LPE-CVE-2024-0582](https://github.com/ysanatomic/io_uring_LPE-CVE-2024-0582) - [Forsaken0129/CVE-2024-0582](https://github.com/Forsaken0129/CVE-2024-0582) - [0ptyx/cve-2024-0582](https://github.com/0ptyx/cve-2024-0582) -- [geniuszly/CVE-2024-0582](https://github.com/geniuszly/CVE-2024-0582) -- [101010zyl/CVE-2024-0582](https://github.com/101010zyl/CVE-2024-0582) ### CVE-2024-0588 (2024-04-09) @@ -256,13 +213,6 @@ - [RandomRobbieBF/CVE-2024-0679](https://github.com/RandomRobbieBF/CVE-2024-0679) -### CVE-2024-0683 (2024-03-13) - -The Bulgarisation for WooCommerce plugin for WordPress is vulnerable to unauthorized access due to missing capability checks on several functions in all versions up to, and including, 3.0.14. This makes it possible for unauthenticated and authenticated attackers, with subscriber-level access and above, to generate and delete labels. - - -- [3474458191/CVE-2024-0683](https://github.com/3474458191/CVE-2024-0683) - ### CVE-2024-0684 (2024-02-06) A flaw was found in the GNU coreutils "split" program. A heap overflow with user-controlled data of multiple hundred bytes in length could occur in the line_bytes_split() function, potentially leading to an application crash and denial of service. @@ -280,13 +230,6 @@ ### CVE-2024-0713 - [kitodd/CVE-2024-0713](https://github.com/kitodd/CVE-2024-0713) -### CVE-2024-0741 (2024-01-23) - -An out of bounds write in ANGLE could have allowed an attacker to corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7. - - -- [HyHy100/Firefox-ANGLE-CVE-2024-0741](https://github.com/HyHy100/Firefox-ANGLE-CVE-2024-0741) - ### CVE-2024-0757 (2024-06-04) The Insert or Embed Articulate Content into WordPress plugin through 4.3000000023 is not properly filtering which file extensions are allowed to be imported on the server, allowing the uploading of malicious code within zip files @@ -322,9 +265,6 @@ - [gunzf0x/Issabel-PBX-4.0.0-RCE-Authenticated](https://github.com/gunzf0x/Issabel-PBX-4.0.0-RCE-Authenticated) -### CVE-2024-436 -- [Julian-gmz/CVE-2024-436_Exploit](https://github.com/Julian-gmz/CVE-2024-436_Exploit) - ### CVE-2024-1071 (2024-03-13) The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to SQL Injection via the 'sorting' parameter in versions 2.1.3 to 2.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. @@ -336,7 +276,6 @@ - [Matrexdz/CVE-2024-1071-Docker](https://github.com/Matrexdz/CVE-2024-1071-Docker) - [gh-ost00/CVE-2024-1071-SQL-Injection](https://github.com/gh-ost00/CVE-2024-1071-SQL-Injection) - [Dogu589/WordPress-Exploit-CVE-2024-1071](https://github.com/Dogu589/WordPress-Exploit-CVE-2024-1071) -- [Spid3heX/CVE-2024-1071-PoC-Script](https://github.com/Spid3heX/CVE-2024-1071-PoC-Script) ### CVE-2024-1086 (2024-01-31) @@ -348,22 +287,6 @@ - [CCIEVoice2009/CVE-2024-1086](https://github.com/CCIEVoice2009/CVE-2024-1086) - [kevcooper/CVE-2024-1086-checker](https://github.com/kevcooper/CVE-2024-1086-checker) - [feely666/CVE-2024-1086](https://github.com/feely666/CVE-2024-1086) -- [xzx482/CVE-2024-1086](https://github.com/xzx482/CVE-2024-1086) -- [LLfam/CVE-2024-1086](https://github.com/LLfam/CVE-2024-1086) - -### CVE-2024-1112 (2024-01-31) - -Heap-based buffer overflow vulnerability in Resource Hacker, developed by Angus Johnson, affecting version 3.6.0.92. This vulnerability could allow an attacker to execute arbitrary code via a long filename argument. - - -- [enessakircolak/CVE-2024-1112](https://github.com/enessakircolak/CVE-2024-1112) - -### CVE-2024-1207 (2024-02-08) - -The WP Booking Calendar plugin for WordPress is vulnerable to SQL Injection via the 'calendar_request_params[dates_ddmmyy_csv]' parameter in all versions up to, and including, 9.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. - - -- [sahar042/CVE-2024-1207](https://github.com/sahar042/CVE-2024-1207) ### CVE-2024-1208 (2024-02-05) @@ -387,7 +310,6 @@ - [Chocapikk/CVE-2024-1212](https://github.com/Chocapikk/CVE-2024-1212) - [nak000/CVE-2024-1212](https://github.com/nak000/CVE-2024-1212) -- [Rehan07-Human/Exploiting-RCE-Cyber_Project_CVE-2024-1212](https://github.com/Rehan07-Human/Exploiting-RCE-Cyber_Project_CVE-2024-1212) ### CVE-2024-1269 (2024-02-07) @@ -489,8 +411,6 @@ - [kamranhasan/CVE-2024-1698-Exploit](https://github.com/kamranhasan/CVE-2024-1698-Exploit) -- [shanglyu/CVE-2024-1698](https://github.com/shanglyu/CVE-2024-1698) -- [jesicatjan/WordPress-NotificationX-CVE-2024-1698](https://github.com/jesicatjan/WordPress-NotificationX-CVE-2024-1698) ### CVE-2024-1709 (2024-02-21) @@ -502,7 +422,6 @@ - [sxyrxyy/CVE-2024-1709-ConnectWise-ScreenConnect-Authentication-Bypass](https://github.com/sxyrxyy/CVE-2024-1709-ConnectWise-ScreenConnect-Authentication-Bypass) - [cjybao/CVE-2024-1709-and-CVE-2024-1708](https://github.com/cjybao/CVE-2024-1709-and-CVE-2024-1708) - [AhmedMansour93/Event-ID-229-Rule-Name-SOC262-CVE-2024-1709-](https://github.com/AhmedMansour93/Event-ID-229-Rule-Name-SOC262-CVE-2024-1709-) -- [AMRICHASFUCK/Mass-CVE-2024-1709](https://github.com/AMRICHASFUCK/Mass-CVE-2024-1709) ### CVE-2024-1781 (2024-02-23) @@ -519,13 +438,6 @@ - [ox1111/-CVE-2024-1874-](https://github.com/ox1111/-CVE-2024-1874-) - [Tgcohce/CVE-2024-1874](https://github.com/Tgcohce/CVE-2024-1874) -### CVE-2024-1931 (2024-03-07) - -NLnet Labs Unbound version 1.18.0 up to and including version 1.19.1 contain a vulnerability that can cause denial of service by a certain code path that can lead to an infinite loop. Unbound 1.18.0 introduced a feature that removes EDE records from responses with size higher than the client's advertised buffer size. Before removing all the EDE records however, it would try to see if trimming the extra text fields on those records would result in an acceptable size while still retaining the EDE codes. Due to an unchecked condition, the code that trims the text of the EDE records could loop indefinitely. This happens when Unbound would reply with attached EDE information on a positive reply and the client's buffer size is smaller than the needed space to include EDE records. The vulnerability can only be triggered when the 'ede: yes' option is used; non default configuration. From version 1.19.2 on, the code is fixed to avoid looping indefinitely. - - -- [passer12/CVE-2024-1931-reproduction](https://github.com/passer12/CVE-2024-1931-reproduction) - ### CVE-2024-1939 (2024-02-29) Type Confusion in V8 in Google Chrome prior to 122.0.6261.94 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) @@ -568,13 +480,6 @@ - [uthrasri/CVE-2024-2193](https://github.com/uthrasri/CVE-2024-2193) -### CVE-2024-2242 (2024-03-13) - -The Contact Form 7 plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘active-tab’ parameter in all versions up to, and including, 5.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. - - -- [RandomRobbieBF/CVE-2024-2242](https://github.com/RandomRobbieBF/CVE-2024-2242) - ### CVE-2024-2257 (2024-05-10) This vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version : v3.2.02) due to improper implementation of password policies. An attacker with physical access could exploit this by creating password that do not adhere to the defined security standards/policy on the vulnerable system.\n\nSuccessful exploitation of this vulnerability could allow the attacker to expose the router to potential security threats. @@ -602,7 +507,6 @@ - [Puvipavan/CVE-2024-2667](https://github.com/Puvipavan/CVE-2024-2667) -- [Nxploited/CVE-2024-2667-Poc](https://github.com/Nxploited/CVE-2024-2667-Poc) ### CVE-2024-2876 (2024-05-02) @@ -612,8 +516,6 @@ - [c0d3zilla/CVE-2024-2876](https://github.com/c0d3zilla/CVE-2024-2876) - [Quantum-Hacker/CVE-2024-2876](https://github.com/Quantum-Hacker/CVE-2024-2876) - [0xAgun/CVE-2024-2876](https://github.com/0xAgun/CVE-2024-2876) -- [skyrowalker/CVE-2024-2876](https://github.com/skyrowalker/CVE-2024-2876) -- [issamjr/CVE-2024-2876](https://github.com/issamjr/CVE-2024-2876) ### CVE-2024-2879 (2024-04-03) @@ -630,13 +532,6 @@ - [PumpkinBridge/Chrome-CVE-2024-2887-RCE-POC](https://github.com/PumpkinBridge/Chrome-CVE-2024-2887-RCE-POC) - [rycbar77/CVE-2024-2887](https://github.com/rycbar77/CVE-2024-2887) -### CVE-2024-2928 (2024-06-06) - -A Local File Inclusion (LFI) vulnerability was identified in mlflow/mlflow, specifically in version 2.9.2, which was fixed in version 2.11.3. This vulnerability arises from the application's failure to properly validate URI fragments for directory traversal sequences such as '../'. An attacker can exploit this flaw by manipulating the fragment part of the URI to read arbitrary files on the local file system, including sensitive files like '/etc/passwd'. The vulnerability is a bypass to a previous patch that only addressed similar manipulation within the URI's query string, highlighting the need for comprehensive validation of all parts of a URI to prevent LFI attacks. - - -- [nuridincersaygili/CVE-2024-2928](https://github.com/nuridincersaygili/CVE-2024-2928) - ### CVE-2024-2961 (2024-04-17) The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.\n @@ -717,16 +612,7 @@ - [neuralinhibitor/xzwhy](https://github.com/neuralinhibitor/xzwhy) - [AndreaCicca/Sicurezza-Informatica-Presentazione](https://github.com/AndreaCicca/Sicurezza-Informatica-Presentazione) - [shefirot/CVE-2024-3094](https://github.com/shefirot/CVE-2024-3094) -- [DANO-AMP/CVE-2024-3094](https://github.com/DANO-AMP/CVE-2024-3094) - [robertdfrench/ifuncd-up](https://github.com/robertdfrench/ifuncd-up) -- [XiaomingX/cve-2024-3094-xz-backdoor-exploit](https://github.com/XiaomingX/cve-2024-3094-xz-backdoor-exploit) - -### CVE-2024-3105 (2024-06-15) - -The Woody code snippets – Insert Header Footer Code, AdSense Ads plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.5.0 via the 'insert_php' shortcode. This is due to the plugin not restricting the usage of the functionality to high level authorized users. This makes it possible for authenticated attackers, with contributor-level access and above, to execute code on the server. - - -- [hunThubSpace/CVE-2024-3105-PoC](https://github.com/hunThubSpace/CVE-2024-3105-PoC) ### CVE-2024-3116 (2024-04-04) @@ -786,14 +672,6 @@ - [truonghuuphuc/CVE-2024-3293-Poc](https://github.com/truonghuuphuc/CVE-2024-3293-Poc) -### CVE-2024-3393 (2024-12-27) - -A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode. - - -- [FelixFoxf/-CVE-2024-3393](https://github.com/FelixFoxf/-CVE-2024-3393) -- [waived/CVE-2024-3393](https://github.com/waived/CVE-2024-3393) - ### CVE-2024-3400 (2024-04-12) A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.\n\nCloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability. @@ -834,9 +712,6 @@ - [andrelia-hacks/CVE-2024-3400](https://github.com/andrelia-hacks/CVE-2024-3400) - [tk-sawada/IPLineFinder](https://github.com/tk-sawada/IPLineFinder) - [iwallarm/cve-2024-3400](https://github.com/iwallarm/cve-2024-3400) -- [workshop748/CVE-2024-3400](https://github.com/workshop748/CVE-2024-3400) -- [nanwinata/CVE-2024-3400](https://github.com/nanwinata/CVE-2024-3400) -- [XiaomingX/CVE-2024-3400-poc](https://github.com/XiaomingX/CVE-2024-3400-poc) ### CVE-2024-3435 (2024-05-16) @@ -860,41 +735,12 @@ - [truonghuuphuc/CVE-2024-3552-Poc](https://github.com/truonghuuphuc/CVE-2024-3552-Poc) -### CVE-2024-3596 (2024-07-09) - -RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature. - - -- [alperenugurlu/CVE-2024-3596-Detector](https://github.com/alperenugurlu/CVE-2024-3596-Detector) - -### CVE-2024-3605 (2024-06-20) - -The WP Hotel Booking plugin for WordPress is vulnerable to SQL Injection via the 'room_type' parameter of the /wphb/v1/rooms/search-rooms REST API endpoint in all versions up to, and including, 2.1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. - - -- [RandomRobbieBF/CVE-2024-3605](https://github.com/RandomRobbieBF/CVE-2024-3605) - -### CVE-2024-3656 (2024-10-09) - -A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breaches or system compromise. - - -- [h4x0r-dz/CVE-2024-3656](https://github.com/h4x0r-dz/CVE-2024-3656) - -### CVE-2024-3690 (2024-04-12) - -In PHPGurukul Small CRM 3.0 wurde eine kritische Schwachstelle entdeckt. Hierbei betrifft es unbekannten Programmcode der Komponente Change Password Handler. Durch Beeinflussen mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung. - - -- [taeseongk/CVE-2024-3690](https://github.com/taeseongk/CVE-2024-3690) - ### CVE-2024-3806 (2024-05-09) The Porto theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 7.1.0 via the 'porto_ajax_posts' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included. - [truonghuuphuc/CVE-2024-3806-AND-CVE-2024-3807-Poc](https://github.com/truonghuuphuc/CVE-2024-3806-AND-CVE-2024-3807-Poc) -- [RandomRobbieBF/CVE-2024-3806](https://github.com/RandomRobbieBF/CVE-2024-3806) ### CVE-2024-3867 (2024-04-16) @@ -927,10 +773,8 @@ - [gotr00t0day/CVE-2024-4040](https://github.com/gotr00t0day/CVE-2024-4040) - [1ncendium/CVE-2024-4040](https://github.com/1ncendium/CVE-2024-4040) - [olebris/CVE-2024-4040](https://github.com/olebris/CVE-2024-4040) -- [entroychang/CVE-2024-4040](https://github.com/entroychang/CVE-2024-4040) - [safeer-accuknox/CrushFTP-cve-2024-4040-poc](https://github.com/safeer-accuknox/CrushFTP-cve-2024-4040-poc) - [geniuszly/GenCrushSSTIExploit](https://github.com/geniuszly/GenCrushSSTIExploit) -- [rahisec/CVE-2024-4040](https://github.com/rahisec/CVE-2024-4040) ### CVE-2024-4231 (2024-05-10) @@ -945,7 +789,6 @@ - [Redfox-Secuirty/Digisol-DG-GR1321-s-Password-Storage-in-Plaintext-CVE-2024-4232](https://github.com/Redfox-Secuirty/Digisol-DG-GR1321-s-Password-Storage-in-Plaintext-CVE-2024-4232) -- [Redfox-Secuirty/Digisol-DG--GR1321-s-Password-Storage-in-Plaintext--CVE-2024-4232](https://github.com/Redfox-Secuirty/Digisol-DG--GR1321-s-Password-Storage-in-Plaintext--CVE-2024-4232) ### CVE-2024-4295 (2024-06-05) @@ -955,13 +798,6 @@ - [truonghuuphuc/CVE-2024-4295-Poc](https://github.com/truonghuuphuc/CVE-2024-4295-Poc) - [cve-2024/CVE-2024-4295-Poc](https://github.com/cve-2024/CVE-2024-4295-Poc) -### CVE-2024-4320 (2024-06-06) - -A remote code execution (RCE) vulnerability exists in the '/install_extension' endpoint of the parisneo/lollms-webui application, specifically within the `@router.post("/install_extension")` route handler. The vulnerability arises due to improper handling of the `name` parameter in the `ExtensionBuilder().build_extension()` method, which allows for local file inclusion (LFI) leading to arbitrary code execution. An attacker can exploit this vulnerability by crafting a malicious `name` parameter that causes the server to load and execute a `__init__.py` file from an arbitrary location, such as the upload directory for discussions. This vulnerability affects the latest version of parisneo/lollms-webui and can lead to remote code execution without requiring user interaction, especially when the application is exposed to an external endpoint or operated in headless mode. - - -- [bolkv/CVE-2024-4320](https://github.com/bolkv/CVE-2024-4320) - ### CVE-2024-4323 (2024-05-20) A memory corruption vulnerability in Fluent Bit versions 2.0.7 thru 3.0.3. This issue lies in the embedded http server’s parsing of trace requests and may result in denial of service conditions, information disclosure, or remote code execution. @@ -971,13 +807,6 @@ - [d0rb/CVE-2024-4323](https://github.com/d0rb/CVE-2024-4323) - [yuansec/CVE-2024-4323-dos_poc](https://github.com/yuansec/CVE-2024-4323-dos_poc) -### CVE-2024-4351 (2024-05-16) - -The Tutor LMS Pro plugin for WordPress is vulnerable to unauthorized access of data, modification of data, loss of data due to a missing capability check on the 'authenticate' function in all versions up to, and including, 2.7.0. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to gain control of an existing administrator account. - - -- [ZSECURE/CVE-2024-4351](https://github.com/ZSECURE/CVE-2024-4351) - ### CVE-2024-4352 (2024-05-16) The Tutor LMS Pro plugin for WordPress is vulnerable to unauthorized access of data, modification of data, loss of data due to a missing capability check on the 'get_calendar_materials' function. The plugin is also vulnerable to SQL Injection via the ‘year’ parameter of that function due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. @@ -1011,15 +840,6 @@ - [snyk-labs/pdfjs-vuln-demo](https://github.com/snyk-labs/pdfjs-vuln-demo) - [UnHackerEnCapital/PDFernetRemotelo](https://github.com/UnHackerEnCapital/PDFernetRemotelo) - [Masamuneee/CVE-2024-4367-Analysis](https://github.com/Masamuneee/CVE-2024-4367-Analysis) -- [pedrochalegre7/CVE-2024-4367-pdf-sample](https://github.com/pedrochalegre7/CVE-2024-4367-pdf-sample) -- [exfil0/WEAPONIZING-CVE-2024-4367](https://github.com/exfil0/WEAPONIZING-CVE-2024-4367) - -### CVE-2024-4406 (2024-05-02) - -Xiaomi Pro 13 GetApps integral-dialog-page Cross-Site Scripting Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Xiaomi Pro 13 smartphones. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the integral-dialog-page.html file. When parsing the integralInfo parameter, the process does not properly sanitize user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-22332. - - -- [Yogehi/cve-2024-4406-xiaomi13pro-exploit-files](https://github.com/Yogehi/cve-2024-4406-xiaomi13pro-exploit-files) ### CVE-2024-4439 (2024-05-03) @@ -1029,8 +849,6 @@ - [MielPopsssssss/CVE-2024-4439](https://github.com/MielPopsssssss/CVE-2024-4439) - [d0rb/CVE-2024-4439](https://github.com/d0rb/CVE-2024-4439) - [xssor-dz/-CVE-2024-4439](https://github.com/xssor-dz/-CVE-2024-4439) -- [soltanali0/CVE-2024-4439](https://github.com/soltanali0/CVE-2024-4439) -- [w0r1i0g1ht/CVE-2024-4439](https://github.com/w0r1i0g1ht/CVE-2024-4439) ### CVE-2024-4443 (2024-05-22) @@ -1039,9 +857,6 @@ - [truonghuuphuc/CVE-2024-4443-Poc](https://github.com/truonghuuphuc/CVE-2024-4443-Poc) -### CVE-2024-4573 -- [Castro-Ian/CVE-2024-4573-Mitigation-Script](https://github.com/Castro-Ian/CVE-2024-4573-Mitigation-Script) - ### CVE-2024-4577 (2024-06-09) In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. @@ -1084,23 +899,12 @@ - [ggfzx/CVE-2024-4577](https://github.com/ggfzx/CVE-2024-4577) - [olebris/CVE-2024-4577](https://github.com/olebris/CVE-2024-4577) - [AlperenY-cs/CVE-2024-4577](https://github.com/AlperenY-cs/CVE-2024-4577) -- [charis3306/CVE-2024-4577](https://github.com/charis3306/CVE-2024-4577) -- [l0n3m4n/CVE-2024-4577-RCE](https://github.com/l0n3m4n/CVE-2024-4577-RCE) -- [bibo318/CVE-2024-4577-RCE-ATTACK](https://github.com/bibo318/CVE-2024-4577-RCE-ATTACK) - [waived/CVE-2024-4577-PHP-RCE](https://github.com/waived/CVE-2024-4577-PHP-RCE) -- [a-roshbaik/CVE-2024-4577](https://github.com/a-roshbaik/CVE-2024-4577) -- [a-roshbaik/CVE-2024-4577-PHP-RCE](https://github.com/a-roshbaik/CVE-2024-4577-PHP-RCE) -- [Jcccccx/CVE-2024-4577](https://github.com/Jcccccx/CVE-2024-4577) - [bughuntar/CVE-2024-4577](https://github.com/bughuntar/CVE-2024-4577) - [gh-ost00/CVE-2024-4577-RCE](https://github.com/gh-ost00/CVE-2024-4577-RCE) - [ywChen-NTUST/PHP-CGI-RCE-Scanner](https://github.com/ywChen-NTUST/PHP-CGI-RCE-Scanner) - [AhmedMansour93/Event-ID-268-Rule-Name-SOC292-Possible-PHP-Injection-Detected-CVE-2024-4577-](https://github.com/AhmedMansour93/Event-ID-268-Rule-Name-SOC292-Possible-PHP-Injection-Detected-CVE-2024-4577-) - [phirojshah/CVE-2024-4577](https://github.com/phirojshah/CVE-2024-4577) -- [JeninSutradhar/CVE-2024-4577-checker](https://github.com/JeninSutradhar/CVE-2024-4577-checker) -- [longhoangth18/CVE-2024-4577](https://github.com/longhoangth18/CVE-2024-4577) -- [ahmetramazank/CVE-2024-4577](https://github.com/ahmetramazank/CVE-2024-4577) -- [BTtea/CVE-2024-4577-RCE-PoC](https://github.com/BTtea/CVE-2024-4577-RCE-PoC) -- [Dejavu666/CVE-2024-4577](https://github.com/Dejavu666/CVE-2024-4577) ### CVE-2024-4701 (2024-05-10) @@ -1128,30 +932,9 @@ ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. ServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible. -- [Brut-Security/CVE-2024-4879](https://github.com/Brut-Security/CVE-2024-4879) -- [bigb0x/CVE-2024-4879](https://github.com/bigb0x/CVE-2024-4879) -- [Mr-r00t11/CVE-2024-4879](https://github.com/Mr-r00t11/CVE-2024-4879) -- [ShadowByte1/CVE-2024-4879](https://github.com/ShadowByte1/CVE-2024-4879) -- [Praison001/CVE-2024-4879-ServiceNow](https://github.com/Praison001/CVE-2024-4879-ServiceNow) -- [NoTsPepino/CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning](https://github.com/NoTsPepino/CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning) -- [jdusane/CVE-2024-4879](https://github.com/jdusane/CVE-2024-4879) - [gh-ost00/CVE-2024-4879](https://github.com/gh-ost00/CVE-2024-4879) - [0xWhoami35/CVE-2024-4879](https://github.com/0xWhoami35/CVE-2024-4879) -### CVE-2024-4883 (2024-06-25) - -In WhatsUp Gold versions released before 2023.1.3, a Remote Code Execution issue exists in Progress WhatsUp Gold. This vulnerability allows an unauthenticated attacker to achieve the RCE as a service account through NmApi.exe. - - -- [sinsinology/CVE-2024-4883](https://github.com/sinsinology/CVE-2024-4883) - -### CVE-2024-4885 (2024-06-25) - -In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold.  The \n\nWhatsUp.ExportUtilities.Export.GetFileWithoutZip\n\n\n\n allows execution of commands with iisapppool\nmconsole privileges. - - -- [sinsinology/CVE-2024-4885](https://github.com/sinsinology/CVE-2024-4885) - ### CVE-2024-4898 (2024-06-12) The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary option updates due to a missing authorization checks on the REST API calls in all versions up to, and including, 0.1.0.38. This makes it possible for unauthenticated attackers to connect the site to InstaWP API, edit arbitrary site options and create administrator accounts. @@ -1180,23 +963,6 @@ - [verylazytech/CVE-2024-4956](https://github.com/verylazytech/CVE-2024-4956) - [JolyIrsb/CVE-2024-4956](https://github.com/JolyIrsb/CVE-2024-4956) - [UMASANKAR-MG/Path-Traversal-CVE-2024-4956](https://github.com/UMASANKAR-MG/Path-Traversal-CVE-2024-4956) -- [An00bRektn/shirocrack](https://github.com/An00bRektn/shirocrack) -- [XiaomingX/cve-2024-4956](https://github.com/XiaomingX/cve-2024-4956) - -### CVE-2024-5009 (2024-06-25) - -In WhatsUp Gold versions released before 2023.1.3, an Improper Access Control vulnerability in Wug.UI.Controllers.InstallController.SetAdminPassword allows local attackers to modify admin's password. - - -- [sinsinology/CVE-2024-5009](https://github.com/sinsinology/CVE-2024-5009) -- [th3gokul/CVE-2024-5009](https://github.com/th3gokul/CVE-2024-5009) - -### CVE-2024-5057 (2024-08-29) - -Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Easy Digital Downloads allows SQL Injection.This issue affects Easy Digital Downloads: from n/a through 3.2.12. - - -- [bash3rt3am/poc-cve](https://github.com/bash3rt3am/poc-cve) ### CVE-2024-5084 (2024-05-23) @@ -1206,31 +972,12 @@ - [KTN1990/CVE-2024-5084](https://github.com/KTN1990/CVE-2024-5084) - [Chocapikk/CVE-2024-5084](https://github.com/Chocapikk/CVE-2024-5084) - [k3lpi3b4nsh33/CVE-2024-5084](https://github.com/k3lpi3b4nsh33/CVE-2024-5084) -- [WOOOOONG/CVE-2024-5084](https://github.com/WOOOOONG/CVE-2024-5084) -- [z1gazaga/CVE-2024-5084](https://github.com/z1gazaga/CVE-2024-5084) -- [Raeezrbr/CVE-2024-5084](https://github.com/Raeezrbr/CVE-2024-5084) - -### CVE-2024-5124 (2024-06-06) - -A timing attack vulnerability exists in the gaizhenbiao/chuanhuchatgpt repository, specifically within the password comparison logic. The vulnerability is present in version 20240310 of the software, where passwords are compared using the '=' operator in Python. This method of comparison allows an attacker to guess passwords based on the timing of each character's comparison. The issue arises from the code segment that checks a password for a particular username, which can lead to the exposure of sensitive information to an unauthorized actor. An attacker exploiting this vulnerability could potentially guess user passwords, compromising the security of the system. - - -- [gogo2464/CVE-2024-5124](https://github.com/gogo2464/CVE-2024-5124) -- [XiaomingX/cve-2024-5124-poc](https://github.com/XiaomingX/cve-2024-5124-poc) - -### CVE-2024-5246 (2024-05-23) - -NETGEAR ProSAFE Network Management System Tomcat Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the product installer. The issue results from the use of a vulnerable version of Apache Tomcat. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-22868. - - -- [Abdurahmon3236/CVE-2024-5246](https://github.com/Abdurahmon3236/CVE-2024-5246) ### CVE-2024-5274 (2024-05-28) Type Confusion in V8 in Google Chrome prior to 125.0.6422.112 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) -- [Alchemist3dot14/CVE-2024-5274-Detection](https://github.com/Alchemist3dot14/CVE-2024-5274-Detection) - [mistymntncop/CVE-2024-5274](https://github.com/mistymntncop/CVE-2024-5274) ### CVE-2024-5324 (2024-06-06) @@ -1263,13 +1010,6 @@ - [gh-ost00/CVE-2024-5420-XSS](https://github.com/gh-ost00/CVE-2024-5420-XSS) - [K4yd0/CVE-2024-5420_XSS](https://github.com/K4yd0/CVE-2024-5420_XSS) -### CVE-2024-5452 (2024-06-06) - -A remote code execution (RCE) vulnerability exists in the lightning-ai/pytorch-lightning library version 2.2.1 due to improper handling of deserialized user input and mismanagement of dunder attributes by the `deepdiff` library. The library uses `deepdiff.Delta` objects to modify application state based on frontend actions. However, it is possible to bypass the intended restrictions on modifying dunder attributes, allowing an attacker to construct a serialized delta that passes the deserializer whitelist and contains dunder attributes. When processed, this can be exploited to access other modules, classes, and instances, leading to arbitrary attribute write and total RCE on any self-hosted pytorch-lightning application in its default configuration, as the delta endpoint is enabled by default. - - -- [XiaomingX/cve-2024-5452-poc](https://github.com/XiaomingX/cve-2024-5452-poc) - ### CVE-2024-5522 (2024-06-20) The HTML5 Video Player WordPress plugin before 2.5.27 does not sanitize and escape a parameter from a REST route before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks @@ -1277,14 +1017,6 @@ - [truonghuuphuc/CVE-2024-5522-Poc](https://github.com/truonghuuphuc/CVE-2024-5522-Poc) - [kryptonproject/CVE-2024-5522-PoC](https://github.com/kryptonproject/CVE-2024-5522-PoC) -- [geniuszly/CVE-2024-5522](https://github.com/geniuszly/CVE-2024-5522) - -### CVE-2024-5633 (2024-07-09) - -Longse model LBH30FE200W cameras, as well as products based on this device, provide an unrestricted access for an attacker located in the same local network to an undocumented binary service CoolView on one of the ports. \nAn attacker with a knowledge of the available commands is able to perform read/write operations on the device's memory, which might result in e.g. bypassing telnet login and obtaining full access to the device. - - -- [Adikso/CVE-2024-5633](https://github.com/Adikso/CVE-2024-5633) ### CVE-2024-5735 (2024-06-28) @@ -1307,13 +1039,6 @@ - [afine-com/CVE-2024-5737](https://github.com/afine-com/CVE-2024-5737) -### CVE-2024-5764 (2024-10-23) - -Use of Hard-coded Credentials vulnerability in Sonatype Nexus Repository has been discovered in the code responsible for encrypting any secrets stored in the Nexus Repository configuration database (SMTP or HTTP proxy credentials, user tokens, tokens, among others). The affected versions relied on a static hard-coded encryption passphrase. While it was possible for an administrator to define an alternate encryption passphrase, it could only be done at first boot and not updated.\n\nThis issue affects Nexus Repository: from 3.0.0 through 3.72.0. - - -- [fin3ss3g0d/CVE-2024-5764](https://github.com/fin3ss3g0d/CVE-2024-5764) - ### CVE-2024-5806 (2024-06-25) Improper Authentication vulnerability in Progress MOVEit Transfer (SFTP module) can lead to Authentication Bypass.This issue affects MOVEit Transfer: from 2023.0.0 before 2023.0.11, from 2023.1.0 before 2023.1.6, from 2024.0.0 before 2024.0.2. @@ -1321,13 +1046,6 @@ - [watchtowrlabs/watchTowr-vs-progress-moveit_CVE-2024-5806](https://github.com/watchtowrlabs/watchTowr-vs-progress-moveit_CVE-2024-5806) -### CVE-2024-5910 (2024-07-10) - -Missing authentication for a critical function in Palo Alto Networks Expedition can lead to an Expedition admin account takeover for attackers with network access to Expedition.\n\nNote: Expedition is a tool aiding in configuration migration, tuning, and enrichment. Configuration secrets, credentials, and other data imported into Expedition is at risk due to this issue. - - -- [p33d/Palo-Alto-Expedition-Remote-Code-Execution-Exploit-CVE-2024-5910-CVE-2024-9464](https://github.com/p33d/Palo-Alto-Expedition-Remote-Code-Execution-Exploit-CVE-2024-5910-CVE-2024-9464) - ### CVE-2024-5932 (2024-08-20) The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.14.1 via deserialization of untrusted input from the 'give_title' parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute code remotely, and to delete arbitrary files. @@ -1335,21 +1053,6 @@ - [0xb0mb3r/CVE-2024-5932-PoC](https://github.com/0xb0mb3r/CVE-2024-5932-PoC) - [EQSTLab/CVE-2024-5932](https://github.com/EQSTLab/CVE-2024-5932) -- [OxLmahdi/cve-2024-5932](https://github.com/OxLmahdi/cve-2024-5932) - -### CVE-2024-5947 (2024-06-13) - -Deep Sea Electronics DSE855 Configuration Backup Missing Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Deep Sea Electronics DSE855 devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the web-based UI. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-22679. - - -- [Cappricio-Securities/CVE-2024-5947](https://github.com/Cappricio-Securities/CVE-2024-5947) - -### CVE-2024-5961 (2024-06-14) - -Improper neutralization of input during web page generation vulnerability in 2ClickPortal software allows reflected cross-site scripting (XSS). An attacker might trick somebody into using a crafted URL, which will cause a script to be run in user's browser. This issue affects 2ClickPortal software versions from 7.2.31 through 7.6.4. - - -- [kac89/CVE-2024-5961](https://github.com/kac89/CVE-2024-5961) ### CVE-2024-6028 (2024-06-25) @@ -1365,13 +1068,6 @@ - [lfillaz/CVE-2024-6043](https://github.com/lfillaz/CVE-2024-6043) -### CVE-2024-6050 (2024-07-01) - -Improper Neutralization of Input During Web Page Generation vulnerability in SOKRATES-software SOWA OPAC allows a Reflected Cross-Site Scripting (XSS). An attacker might trick somebody into using a crafted URL, which will cause a script to be run in user's browser. This issue affects SOWA OPAC software in versions from 4.0 before 4.9.10, from 5.0 before 6.2.12. - - -- [kac89/CVE-2024-6050](https://github.com/kac89/CVE-2024-6050) - ### CVE-2024-6095 (2024-07-06) A vulnerability in the /models/apply endpoint of mudler/localai versions 2.15.0 allows for Server-Side Request Forgery (SSRF) and partial Local File Inclusion (LFI). The endpoint supports both http(s):// and file:// schemes, where the latter can lead to LFI. However, the output is limited due to the length of the error message. This vulnerability can be exploited by an attacker with network access to the LocalAI instance, potentially allowing unauthorized access to internal HTTP(s) servers and partial reading of local files. The issue is fixed in version 2.17. @@ -1386,27 +1082,6 @@ - [j3r1ch0123/CVE-2024-6205](https://github.com/j3r1ch0123/CVE-2024-6205) -### CVE-2024-6222 (2024-07-09) - -In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages.\n\nDocker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the issue on MacOS, Linux and Windows with Hyper-V backend.\n\nAs exploitation requires "Allow only extensions distributed through the Docker Marketplace" to be disabled, Docker Desktop  v4.31.0 https://docs.docker.com/desktop/release-notes/#4310  additionally changes the default configuration to enable this setting by default. - - -- [Florian-Hoth/CVE-2024-6222](https://github.com/Florian-Hoth/CVE-2024-6222) - -### CVE-2024-6330 (2024-08-19) - -The GEO my WP WordPress plugin before 4.5.0.2 does not prevent unauthenticated attackers from including arbitrary files in PHP's execution context, which leads to Remote Code Execution. - - -- [RandomRobbieBF/CVE-2024-6330](https://github.com/RandomRobbieBF/CVE-2024-6330) - -### CVE-2024-6366 (2024-07-29) - -The User Profile Builder WordPress plugin before 3.11.8 does not have proper authorisation, allowing unauthenticated users to upload media files via the async upload functionality of WP. - - -- [Abdurahmon3236/CVE-2024-6366](https://github.com/Abdurahmon3236/CVE-2024-6366) - ### CVE-2024-6386 (2024-08-21) The WPML plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.6.12 via the Twig Server-Side Template Injection. This is due to missing input validation and sanitization on the render function. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server. @@ -1419,118 +1094,14 @@ A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. -- [zgzhang/cve-2024-6387-poc](https://github.com/zgzhang/cve-2024-6387-poc) -- [acrono/cve-2024-6387-poc](https://github.com/acrono/cve-2024-6387-poc) -- [lflare/cve-2024-6387-poc](https://github.com/lflare/cve-2024-6387-poc) -- [shyrwall/cve-2024-6387-poc](https://github.com/shyrwall/cve-2024-6387-poc) -- [getdrive/CVE-2024-6387-PoC](https://github.com/getdrive/CVE-2024-6387-PoC) -- [FerasAlrimali/CVE-2024-6387-POC](https://github.com/FerasAlrimali/CVE-2024-6387-POC) -- [passwa11/cve-2024-6387-poc](https://github.com/passwa11/cve-2024-6387-poc) -- [jack0we/CVE-2024-6387](https://github.com/jack0we/CVE-2024-6387) - [xaitax/CVE-2024-6387_Check](https://github.com/xaitax/CVE-2024-6387_Check) -- [bigb0x/CVE-2024-6387](https://github.com/bigb0x/CVE-2024-6387) -- [wiggels/regresshion-check](https://github.com/wiggels/regresshion-check) -- [3yujw7njai/CVE-2024-6387](https://github.com/3yujw7njai/CVE-2024-6387) -- [betancour/OpenSSH-Vulnerability-test](https://github.com/betancour/OpenSSH-Vulnerability-test) -- [muyuanlove/CVE-2024-6387fixshell](https://github.com/muyuanlove/CVE-2024-6387fixshell) -- [TAM-K592/CVE-2024-6387](https://github.com/TAM-K592/CVE-2024-6387) -- [teamos-hub/regreSSHion](https://github.com/teamos-hub/regreSSHion) -- [ahlfors/CVE-2024-6387](https://github.com/ahlfors/CVE-2024-6387) -- [Mufti22/CVE-2024-6387-checkher](https://github.com/Mufti22/CVE-2024-6387-checkher) -- [thegenetic/CVE-2024-6387-exploit](https://github.com/thegenetic/CVE-2024-6387-exploit) -- [R4Tw1z/CVE-2024-6387](https://github.com/R4Tw1z/CVE-2024-6387) -- [d0rb/CVE-2024-6387](https://github.com/d0rb/CVE-2024-6387) -- [CiderAndWhisky/regression-scanner](https://github.com/CiderAndWhisky/regression-scanner) -- [shamo0/CVE-2024-6387_PoC](https://github.com/shamo0/CVE-2024-6387_PoC) -- [paradessia/CVE-2024-6387-nmap](https://github.com/paradessia/CVE-2024-6387-nmap) -- [SecWithMoh/CVE-2024-6387](https://github.com/SecWithMoh/CVE-2024-6387) -- [PrincipalAnthony/CVE-2024-6387-Updated-x64bit](https://github.com/PrincipalAnthony/CVE-2024-6387-Updated-x64bit) -- [skyalliance/CVE-2024-6387-POC](https://github.com/skyalliance/CVE-2024-6387-POC) -- [daniel-odrinski/CVE-2024-6387-Mitigation-Ansible-Playbook](https://github.com/daniel-odrinski/CVE-2024-6387-Mitigation-Ansible-Playbook) -- [rumochnaya/openssh-cve-2024-6387.sh](https://github.com/rumochnaya/openssh-cve-2024-6387.sh) -- [zenzue/CVE-2024-6387-Mitigation](https://github.com/zenzue/CVE-2024-6387-Mitigation) -- [devarshishimpi/CVE-2024-6387-Check](https://github.com/devarshishimpi/CVE-2024-6387-Check) -- [hssmo/cve-2024-6387_AImade](https://github.com/hssmo/cve-2024-6387_AImade) -- [ACHUX21/checker-CVE-2024-6387](https://github.com/ACHUX21/checker-CVE-2024-6387) -- [AiGptCode/ssh_exploiter_CVE-2024-6387](https://github.com/AiGptCode/ssh_exploiter_CVE-2024-6387) -- [xristos8574/regreSSHion-nmap-scanner](https://github.com/xristos8574/regreSSHion-nmap-scanner) -- [xonoxitron/regreSSHion](https://github.com/xonoxitron/regreSSHion) -- [no-one-sec/CVE-2024-6387](https://github.com/no-one-sec/CVE-2024-6387) -- [dawnl3ss/CVE-2024-6387](https://github.com/dawnl3ss/CVE-2024-6387) -- [MrR0b0t19/CVE-2024-6387-Exploit-POC](https://github.com/MrR0b0t19/CVE-2024-6387-Exploit-POC) -- [th3gokul/CVE-2024-6387](https://github.com/th3gokul/CVE-2024-6387) -- [n1cks0n/Test_CVE-2024-6387](https://github.com/n1cks0n/Test_CVE-2024-6387) -- [l0n3m4n/CVE-2024-6387](https://github.com/l0n3m4n/CVE-2024-6387) -- [RickGeex/CVE-2024-6387-Checker](https://github.com/RickGeex/CVE-2024-6387-Checker) -- [xonoxitron/regreSSHion-checker](https://github.com/xonoxitron/regreSSHion-checker) -- [BrandonLynch2402/cve-2024-6387-nuclei-template](https://github.com/BrandonLynch2402/cve-2024-6387-nuclei-template) -- [edsonjt81/CVE-2024-6387_Check](https://github.com/edsonjt81/CVE-2024-6387_Check) -- [grupooruss/CVE-2024-6387](https://github.com/grupooruss/CVE-2024-6387) -- [CognisysGroup/CVE-2024-6387-Checker](https://github.com/CognisysGroup/CVE-2024-6387-Checker) -- [sxlmnwb/CVE-2024-6387](https://github.com/sxlmnwb/CVE-2024-6387) -- [Symbolexe/CVE-2024-6387](https://github.com/Symbolexe/CVE-2024-6387) -- [harshinsecurity/sentinelssh](https://github.com/harshinsecurity/sentinelssh) -- [t3rry327/cve-2024-6387-poc](https://github.com/t3rry327/cve-2024-6387-poc) -- [jocker2410/CVE-2024-6387_poc](https://github.com/jocker2410/CVE-2024-6387_poc) -- [liqhtnd/sshd-logingracetime0](https://github.com/liqhtnd/sshd-logingracetime0) -- [JackSparrowhk/ssh-CVE-2024-6387-poc](https://github.com/JackSparrowhk/ssh-CVE-2024-6387-poc) -- [turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker](https://github.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker) -- [sms2056/CVE-2024-6387](https://github.com/sms2056/CVE-2024-6387) -- [invaderslabs/regreSSHion-CVE-2024-6387-](https://github.com/invaderslabs/regreSSHion-CVE-2024-6387-) -- [lala-amber/CVE-2024-6387](https://github.com/lala-amber/CVE-2024-6387) -- [4lxprime/regreSSHive](https://github.com/4lxprime/regreSSHive) -- [sardine-web/CVE-2024-6387_Check](https://github.com/sardine-web/CVE-2024-6387_Check) -- [0x4D31/cve-2024-6387_hassh](https://github.com/0x4D31/cve-2024-6387_hassh) -- [sardine-web/CVE-2024-6387-template](https://github.com/sardine-web/CVE-2024-6387-template) -- [imv7/CVE-2024-6387](https://github.com/imv7/CVE-2024-6387) -- [SiberianHacker/CVE-2024-6387-Finder](https://github.com/SiberianHacker/CVE-2024-6387-Finder) -- [azurejoga/CVE-2024-6387-how-to-fix](https://github.com/azurejoga/CVE-2024-6387-how-to-fix) - [asterictnl-lvdw/CVE-2024-6387](https://github.com/asterictnl-lvdw/CVE-2024-6387) -- [vkaushik-chef/regreSSHion](https://github.com/vkaushik-chef/regreSSHion) -- [dgourillon/mitigate-CVE-2024-6387](https://github.com/dgourillon/mitigate-CVE-2024-6387) -- [mrmtwoj/CVE-2024-6387](https://github.com/mrmtwoj/CVE-2024-6387) -- [filipi86/CVE-2024-6387-Vulnerability-Checker](https://github.com/filipi86/CVE-2024-6387-Vulnerability-Checker) -- [kubota/CVE-2024-6387-Vulnerability-Checker](https://github.com/kubota/CVE-2024-6387-Vulnerability-Checker) -- [DimaMend/cve-2024-6387-poc](https://github.com/DimaMend/cve-2024-6387-poc) -- [Sibijo/mitigate_ssh](https://github.com/Sibijo/mitigate_ssh) -- [Passyed/regreSSHion-Fix](https://github.com/Passyed/regreSSHion-Fix) -- [dream434/CVE-2024-6387](https://github.com/dream434/CVE-2024-6387) -- [ThatNotEasy/CVE-2024-6387](https://github.com/ThatNotEasy/CVE-2024-6387) -- [prelearn-code/CVE-2024-6387](https://github.com/prelearn-code/CVE-2024-6387) - [l-urk/CVE-2024-6387](https://github.com/l-urk/CVE-2024-6387) -- [alex14324/ssh_poc2024](https://github.com/alex14324/ssh_poc2024) -- [X-Projetion/CVE-2023-4596-OpenSSH-Multi-Checker](https://github.com/X-Projetion/CVE-2023-4596-OpenSSH-Multi-Checker) - [s1d6point7bugcrowd/CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH](https://github.com/s1d6point7bugcrowd/CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH) - [almogopp/OpenSSH-CVE-2024-6387-Fix](https://github.com/almogopp/OpenSSH-CVE-2024-6387-Fix) - [HadesNull123/CVE-2024-6387_Check](https://github.com/HadesNull123/CVE-2024-6387_Check) - [identity-threat-labs/CVE-2024-6387-Vulnerability-Checker](https://github.com/identity-threat-labs/CVE-2024-6387-Vulnerability-Checker) - [identity-threat-labs/Article-RegreSSHion-CVE-2024-6387](https://github.com/identity-threat-labs/Article-RegreSSHion-CVE-2024-6387) -- [anhvutuan/CVE-2024-6387-poc-1](https://github.com/anhvutuan/CVE-2024-6387-poc-1) -- [YassDEV221608/CVE-2024-6387](https://github.com/YassDEV221608/CVE-2024-6387) -- [zql-gif/CVE-2024-6387](https://github.com/zql-gif/CVE-2024-6387) -- [awusan125/test_for6387](https://github.com/awusan125/test_for6387) -- [YassDEV221608/CVE-2024-6387_PoC](https://github.com/YassDEV221608/CVE-2024-6387_PoC) - -### CVE-2024-6473 (2024-09-03) - -Yandex Browser for Desktop before 24.7.1.380 has a DLL Hijacking Vulnerability because an untrusted search path is used. - - -- [12345qwert123456/CVE-2024-6473-PoC](https://github.com/12345qwert123456/CVE-2024-6473-PoC) - -### CVE-2024-6529 (2024-08-01) - -The Ultimate Classified Listings WordPress plugin before 1.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin - - -- [Abdurahmon3236/CVE-2024-6529](https://github.com/Abdurahmon3236/CVE-2024-6529) - -### CVE-2024-6536 (2024-07-30) - -The Zephyr Project Manager WordPress plugin before 3.3.99 does not sanitise and escape some of its settings, which could allow high privilege users such as editors and admins to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) - - -- [apena-ba/CVE-2024-6536](https://github.com/apena-ba/CVE-2024-6536) ### CVE-2024-6592 (2024-09-25) @@ -1553,13 +1124,6 @@ - [sinsinology/CVE-2024-6670](https://github.com/sinsinology/CVE-2024-6670) -### CVE-2024-6768 (2024-08-12) - -A Denial of Service in CLFS.sys in Microsoft Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, and Windows Server 2022 allows a malicious authenticated low-privilege user to cause a Blue Screen of Death via a forced call to the KeBugCheckEx function. - - -- [fortra/CVE-2024-6768](https://github.com/fortra/CVE-2024-6768) - ### CVE-2024-6769 (2024-09-26) A DLL Hijacking caused by drive remapping combined with a poisoning of the activation cache in Microsoft Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, and Windows Server 2022 allows a malicious authenticated attacker to elevate from a medium integrity process to a high integrity process without the intervention of a UAC prompt. @@ -1573,17 +1137,13 @@ - [ading2210/CVE-2024-6778-POC](https://github.com/ading2210/CVE-2024-6778-POC) -- [r00tjunip3r1/POC-CVE-2024-6778](https://github.com/r00tjunip3r1/POC-CVE-2024-6778) ### CVE-2024-6782 (2024-08-06) Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution. -- [zangjiahe/CVE-2024-6782](https://github.com/zangjiahe/CVE-2024-6782) -- [jdpsl/CVE-2024-6782](https://github.com/jdpsl/CVE-2024-6782) - [0xB0y426/CVE-2024-6782-PoC](https://github.com/0xB0y426/CVE-2024-6782-PoC) -- [NketiahGodfred/CVE-2024-6782](https://github.com/NketiahGodfred/CVE-2024-6782) ### CVE-2024-7029 (2024-08-02) @@ -1592,7 +1152,6 @@ - [bigherocenter/CVE-2024-7029-EXPLOIT](https://github.com/bigherocenter/CVE-2024-7029-EXPLOIT) - [ebrasha/CVE-2024-7029](https://github.com/ebrasha/CVE-2024-7029) -- [geniuszly/CVE-2024-7029](https://github.com/geniuszly/CVE-2024-7029) ### CVE-2024-7094 (2024-08-13) @@ -1608,21 +1167,6 @@ - [gh-ost00/CVE-2024-7120](https://github.com/gh-ost00/CVE-2024-7120) -### CVE-2024-7124 (2024-11-14) - -Improper Neutralization of Input During Web Page Generation vulnerability in DInGO dLibra software in the parameter 'filter' in the endpoint 'indexsearch' allows a Reflected Cross-Site Scripting (XSS). An attacker might trick somebody into using a crafted URL, which will cause a script to be run in user's browser. This issue affects DInGO dLibra software in versions from 6.0 before 6.3.20. - - -- [kac89/CVE-2024-7124](https://github.com/kac89/CVE-2024-7124) - -### CVE-2024-7135 (2024-07-31) - -The Tainacan plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_file' function in all versions up to, and including, 0.21.7. The function is also vulnerable to directory traversal. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. - - -- [RandomRobbieBF/CVE-2024-7135](https://github.com/RandomRobbieBF/CVE-2024-7135) -- [Nxploited/CVE-2024-7135](https://github.com/Nxploited/CVE-2024-7135) - ### CVE-2024-7313 (2024-08-26) The Shield Security WordPress plugin before 20.0.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. @@ -1630,20 +1174,6 @@ - [Wayne-Ker/CVE-2024-7313](https://github.com/Wayne-Ker/CVE-2024-7313) -### CVE-2024-7339 (2024-08-01) - -In TVT DVR TD-2104TS-CL, DVR TD-2108TS-HP, Provision-ISR DVR SH-4050A5-5L(MM) and AVISION DVR AV108T wurde eine problematische Schwachstelle gefunden. Betroffen ist eine unbekannte Verarbeitung der Datei /queryDevInfo. Dank der Manipulation mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung. - - -- [RevoltSecurities/CVE-2024-7339](https://github.com/RevoltSecurities/CVE-2024-7339) - -### CVE-2024-7456 (2024-11-01) - -A SQL injection vulnerability exists in the `/api/v1/external-users` route of lunary-ai/lunary version v1.4.2. The `order by` clause of the SQL query uses `sql.unsafe` without prior sanitization, allowing for SQL injection. The `orderByClause` variable is constructed without server-side validation or sanitization, enabling an attacker to execute arbitrary SQL commands. Successful exploitation can lead to complete data loss, modification, or corruption. - - -- [77Philly/CVE-2024-7456scripts](https://github.com/77Philly/CVE-2024-7456scripts) - ### CVE-2024-7479 (2024-09-25) Improper verification of cryptographic signature during installation of a VPN driver via the TeamViewer_service.exe component of TeamViewer Remote Clients prior version 15.58.4 for Windows allows an attacker with local unprivileged access on a Windows system to elevate their privileges and install drivers. @@ -1651,13 +1181,6 @@ - [PeterGabaldon/CVE-2024-7479_CVE-2024-7481](https://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481) -### CVE-2024-7514 (2024-10-11) - -The WordPress Comments Import & Export plugin for WordPress is vulnerable to to arbitrary file read due to insufficient file path validation during the comments import process, in versions up to, and including, 2.3.7. This makes it possible for authenticated attackers, with Author-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.\r\nThe issue was partially fixed in version 2.3.8 and fully fixed in 2.3.9 - - -- [RandomRobbieBF/CVE-2024-7514](https://github.com/RandomRobbieBF/CVE-2024-7514) - ### CVE-2024-7593 (2024-08-13) Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel. @@ -1665,14 +1188,6 @@ - [rxerium/CVE-2024-7593](https://github.com/rxerium/CVE-2024-7593) - [D3N14LD15K/CVE-2024-7593_PoC_Exploit](https://github.com/D3N14LD15K/CVE-2024-7593_PoC_Exploit) -- [skyrowalker/CVE-2024-7593](https://github.com/skyrowalker/CVE-2024-7593) - -### CVE-2024-7627 (2024-09-05) - -The Bit File Manager plugin for WordPress is vulnerable to Remote Code Execution in versions 6.0 to 6.5.5 via the 'checkSyntax' function. This is due to writing a temporary file to a publicly accessible directory before performing file validation. This makes it possible for unauthenticated attackers to execute code on the server if an administrator has allowed Guest User read permissions. - - -- [siunam321/CVE-2024-7627-PoC](https://github.com/siunam321/CVE-2024-7627-PoC) ### CVE-2024-7646 (2024-08-16) @@ -1689,20 +1204,6 @@ - [lfillaz/CVE-2024-7703](https://github.com/lfillaz/CVE-2024-7703) -### CVE-2024-7808 (2024-08-15) - -Es wurde eine kritische Schwachstelle in code-projects Job Portal 1.0 ausgemacht. Betroffen hiervon ist ein unbekannter Ablauf der Datei logindbc.php. Dank Manipulation des Arguments email mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung. - - -- [TheUnknownSoul/CVE-2024-7808](https://github.com/TheUnknownSoul/CVE-2024-7808) - -### CVE-2024-7854 (2024-08-21) - -The Woo Inquiry plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 0.1 due to insufficient escaping on the user supplied parameter 'dbid' and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. - - -- [RandomRobbieBF/CVE-2024-7854](https://github.com/RandomRobbieBF/CVE-2024-7854) - ### CVE-2024-7856 (2024-08-29) The MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar plugin for WordPress is vulnerable to unauthorized arbitrary file deletion due to a missing capability check on the removeTempFiles() function and insufficient path validation on the 'file' parameter in all versions up to, and including, 5.7.0.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete arbitrary files which can make remote code execution possible when wp-config.php is deleted. @@ -1725,14 +1226,9 @@ The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request. -- [Chocapikk/CVE-2024-7954](https://github.com/Chocapikk/CVE-2024-7954) - [bigb0x/CVE-2024-7954](https://github.com/bigb0x/CVE-2024-7954) - [gh-ost00/CVE-2024-7954-RCE](https://github.com/gh-ost00/CVE-2024-7954-RCE) - [TheCyberguy-17/RCE_CVE-2024-7954](https://github.com/TheCyberguy-17/RCE_CVE-2024-7954) -- [MuhammadWaseem29/RCE-CVE-2024-7954](https://github.com/MuhammadWaseem29/RCE-CVE-2024-7954) -- [issamjr/CVE-2024-7954](https://github.com/issamjr/CVE-2024-7954) -- [zxj-hub/CVE-2024-7954POC](https://github.com/zxj-hub/CVE-2024-7954POC) -- [0dayan0n/RCE_CVE-2024-7954-](https://github.com/0dayan0n/RCE_CVE-2024-7954-) ### CVE-2024-7965 (2024-08-21) @@ -1740,14 +1236,6 @@ - [bi-zone/CVE-2024-7965](https://github.com/bi-zone/CVE-2024-7965) -- [XiaomingX/cve-2024-7965-poc](https://github.com/XiaomingX/cve-2024-7965-poc) - -### CVE-2024-8069 (2024-11-12) - -Limited remote code execution with privilege of a NetworkService Account access in Citrix Session Recording if the attacker is an authenticated user on the same intranet as the session recording server - - -- [XiaomingX/cve-2024-8069-exp-Citrix-Virtual-Apps-XEN](https://github.com/XiaomingX/cve-2024-8069-exp-Citrix-Virtual-Apps-XEN) ### CVE-2024-8190 (2024-09-10) @@ -1762,7 +1250,6 @@ - [p33d/CVE-2024-8275](https://github.com/p33d/CVE-2024-8275) -- [whiterose7777/CVE-2024-8275](https://github.com/whiterose7777/CVE-2024-8275) ### CVE-2024-8277 (2024-09-11) @@ -1821,34 +1308,6 @@ - [Avento/CVE-2024-8522](https://github.com/Avento/CVE-2024-8522) -### CVE-2024-8529 (2024-09-12) - -The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to SQL Injection via the 'c_fields' parameter of the /wp-json/lp/v1/courses/archive-course REST API endpoint in all versions up to, and including, 4.2.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. - - -- [RandomRobbieBF/CVE-2024-8529](https://github.com/RandomRobbieBF/CVE-2024-8529) - -### CVE-2024-8672 (2024-11-28) - -The Widget Options – The #1 WordPress Widget & Block Control Plugin plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.0.7 via the display logic functionality that extends several page builders. This is due to the plugin allowing users to supply input that will be passed through eval() without any filtering or capability checks. This makes it possible for authenticated attackers, with contributor-level access and above, to execute code on the server. Special note: We suggested the vendor implement an allowlist of functions and limit the ability to execute commands to just administrators, however, they did not take our advice. We are considering this patched, however, we believe it could still be further hardened and there may be residual risk with how the issue is currently patched. - - -- [Chocapikk/CVE-2024-8672](https://github.com/Chocapikk/CVE-2024-8672) - -### CVE-2024-8698 (2024-09-19) - -A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signature in the XML document, rather than the Reference element used to specify the signed element. This flaw allows attackers to create crafted responses that can bypass the validation, potentially leading to privilege escalation or impersonation attacks. - - -- [huydoppaz/CVE-2024-8698-POC](https://github.com/huydoppaz/CVE-2024-8698-POC) - -### CVE-2024-8743 (2024-10-05) - -The Bit File Manager – 100% Free & Open Source File Manager and Code Editor for WordPress plugin for WordPress is vulnerable to Limited JavaScript File Upload in all versions up to, and including, 6.5.7. This is due to a lack of proper checks on allowed file types. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted permissions by an administrator, to upload .css and .js files, which could lead to Stored Cross-Site Scripting. - - -- [siunam321/CVE-2024-8743-PoC](https://github.com/siunam321/CVE-2024-8743-PoC) - ### CVE-2024-8752 (2024-09-16) The Windows version of WebIQ 2.15.9 is affected by a directory traversal vulnerability that allows remote attackers to read any file on the system. @@ -1856,14 +1315,6 @@ - [D3anSPGDMS/CVE-2024-8752](https://github.com/D3anSPGDMS/CVE-2024-8752) -### CVE-2024-8856 (2024-11-16) - -The Backup and Staging by WP Time Capsule plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the the UploadHandler.php file and no direct file access prevention in all versions up to, and including, 1.22.21. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. - - -- [ubaii/CVE-2024-8856](https://github.com/ubaii/CVE-2024-8856) -- [Jenderal92/CVE-2024-8856](https://github.com/Jenderal92/CVE-2024-8856) - ### CVE-2024-8868 (2024-09-15) Eine Schwachstelle wurde in code-projects Crud Operation System 1.0 ausgemacht. Sie wurde als kritisch eingestuft. Davon betroffen ist unbekannter Code der Datei savedata.php. Durch Manipulieren des Arguments sname mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. @@ -1878,13 +1329,6 @@ - [gh-ost00/CVE-2024-8949-POC](https://github.com/gh-ost00/CVE-2024-8949-POC) -### CVE-2024-8963 (2024-09-19) - -Path Traversal in the Ivanti CSA before 4.6 Patch 519 allows a remote unauthenticated attacker to access restricted functionality. - - -- [patfire94/CVE-2024-8963](https://github.com/patfire94/CVE-2024-8963) - ### CVE-2024-9014 (2024-09-23) pgAdmin versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data. @@ -1892,28 +1336,6 @@ - [EQSTLab/CVE-2024-9014](https://github.com/EQSTLab/CVE-2024-9014) -### CVE-2024-9047 (2024-10-12) - -The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier. - - -- [iSee857/CVE-2024-9047-PoC](https://github.com/iSee857/CVE-2024-9047-PoC) -- [verylazytech/CVE-2024-9047](https://github.com/verylazytech/CVE-2024-9047) - -### CVE-2024-9061 (2024-10-16) - -The The WP Popup Builder – Popup Forms and Marketing Lead Generation plugin for WordPress is vulnerable to arbitrary shortcode execution via the wp_ajax_nopriv_shortcode_Api_Add AJAX action in all versions up to, and including, 1.3.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. NOTE: This vulnerability was partially fixed in version 1.3.5 with a nonce check, which effectively prevented access to the affected function. However, version 1.3.6 incorporates the correct authorization check to prevent unauthorized access. - - -- [RandomRobbieBF/CVE-2024-9061](https://github.com/RandomRobbieBF/CVE-2024-9061) - -### CVE-2024-9106 (2024-10-01) - -The Wechat Social login plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.3.0. This is due to insufficient verification on the user being supplied during the social login. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id. This is only exploitable if the app secret is not set, so it has a default empty value. - - -- [RandomRobbieBF/CVE-2024-9106](https://github.com/RandomRobbieBF/CVE-2024-9106) - ### CVE-2024-9162 (2024-10-28) The All-in-One WP Migration and Backup plugin for WordPress is vulnerable to arbitrary PHP Code Injection due to missing file type validation during the export in all versions up to, and including, 7.86. This makes it possible for authenticated attackers, with Administrator-level access and above, to create an export file with the .php extension on the affected site's server, adding an arbitrary PHP code to it, which may make remote code execution possible. @@ -1928,449 +1350,6 @@ - [Andrysqui/CVE-2024-9166](https://github.com/Andrysqui/CVE-2024-9166) -### CVE-2024-9224 (2024-10-01) - -The Hello World plugin for WordPress is vulnerable to Arbitrary File Reading in all versions up to, and including, 2.1.1 via the hello_world_lyric() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. - - -- [RandomRobbieBF/CVE-2024-9224](https://github.com/RandomRobbieBF/CVE-2024-9224) - -### CVE-2024-9234 (2024-10-11) - -The GutenKit – Page Builder Blocks, Patterns, and Templates for Gutenberg Block Editor plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the install_and_activate_plugin_from_external() function (install-active-plugin REST API endpoint) in all versions up to, and including, 2.1.0. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins, or utilize the functionality to upload arbitrary files spoofed like plugins. - - -- [RandomRobbieBF/CVE-2024-9234](https://github.com/RandomRobbieBF/CVE-2024-9234) -- [CallMeBatosay/CVE-2024-9234](https://github.com/CallMeBatosay/CVE-2024-9234) -- [Nxploited/CVE-2024-9234](https://github.com/Nxploited/CVE-2024-9234) - -### CVE-2024-9264 (2024-10-18) - -The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions. - - -- [nollium/CVE-2024-9264](https://github.com/nollium/CVE-2024-9264) -- [z3k0sec/File-Read-CVE-2024-9264](https://github.com/z3k0sec/File-Read-CVE-2024-9264) -- [z3k0sec/CVE-2024-9264-RCE-Exploit](https://github.com/z3k0sec/CVE-2024-9264-RCE-Exploit) -- [punitdarji/Grafana-CVE-2024-9264](https://github.com/punitdarji/Grafana-CVE-2024-9264) - -### CVE-2024-9290 (2024-12-13) - -The Super Backup & Clone - Migrate for WordPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation and a missing capability check on the ibk_restore_migrate_check() function in all versions up to, and including, 2.3.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. - - -- [RandomRobbieBF/CVE-2024-9290](https://github.com/RandomRobbieBF/CVE-2024-9290) -- [Jenderal92/CVE-2024-9290](https://github.com/Jenderal92/CVE-2024-9290) - -### CVE-2024-9326 (2024-09-29) - -In PHPGurukul Online Shopping Portal 2.0 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Es geht um eine nicht näher bekannte Funktion der Datei /shopping/admin/index.php der Komponente Admin Panel. Mit der Manipulation des Arguments username mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. - - -- [ghostwirez/CVE-2024-9326-PoC](https://github.com/ghostwirez/CVE-2024-9326-PoC) - -### CVE-2024-9441 (2024-10-02) - -The Linear eMerge e3-Series through version 1.00-07 is vulnerable to an OS command injection vulnerability. A remote and unauthenticated attacker can execute arbitrary OS commands via the login_id parameter when invoking the forgot_password functionality over HTTP. - - -- [adhikara13/CVE-2024-9441](https://github.com/adhikara13/CVE-2024-9441) -- [p33d/CVE-2024-9441](https://github.com/p33d/CVE-2024-9441) -- [XiaomingX/cve-2024-9441-poc](https://github.com/XiaomingX/cve-2024-9441-poc) -- [jk-mayne/CVE-2024-9441-Checker](https://github.com/jk-mayne/CVE-2024-9441-Checker) - -### CVE-2024-9464 (2024-10-09) - -An OS command injection vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls. - - -- [horizon3ai/CVE-2024-9464](https://github.com/horizon3ai/CVE-2024-9464) - -### CVE-2024-9465 (2024-10-09) - -An SQL injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system. - - -- [horizon3ai/CVE-2024-9465](https://github.com/horizon3ai/CVE-2024-9465) -- [mustafaakalin/CVE-2024-9465](https://github.com/mustafaakalin/CVE-2024-9465) -- [XiaomingX/cve-2024-9465-poc](https://github.com/XiaomingX/cve-2024-9465-poc) - -### CVE-2024-9466 (2024-10-09) - -A cleartext storage of sensitive information vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to reveal firewall usernames, passwords, and API keys generated using those credentials. - - -- [holypryx/CVE-2024-9466](https://github.com/holypryx/CVE-2024-9466) - -### CVE-2024-9474 (2024-11-18) - -A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges.\n\nCloud NGFW and Prisma Access are not impacted by this vulnerability. - - -- [Chocapikk/CVE-2024-9474](https://github.com/Chocapikk/CVE-2024-9474) -- [k4nfr3/CVE-2024-9474](https://github.com/k4nfr3/CVE-2024-9474) -- [deathvu/CVE-2024-9474](https://github.com/deathvu/CVE-2024-9474) -- [coskper-papa/PAN-OS_CVE-2024-9474](https://github.com/coskper-papa/PAN-OS_CVE-2024-9474) - -### CVE-2024-9570 (2024-10-07) - -Eine Schwachstelle wurde in D-Link DIR-619L B1 2.06 gefunden. Sie wurde als kritisch eingestuft. Hierbei geht es um die Funktion formEasySetTimezone der Datei /goform/formEasySetTimezone. Durch das Beeinflussen des Arguments curTime mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung. - - -- [dylvie/CVE-2024-9570_D-Link-DIR-619L-bof](https://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof) - -### CVE-2024-9593 (2024-10-18) - -The Time Clock plugin and Time Clock Pro plugin for WordPress are vulnerable to Remote Code Execution in versions up to, and including, 1.2.2 (for Time Clock) and 1.1.4 (for Time Clock Pro) via the 'etimeclockwp_load_function_callback' function. This allows unauthenticated attackers to execute code on the server. The invoked function's parameters cannot be specified. - - -- [RandomRobbieBF/CVE-2024-9593](https://github.com/RandomRobbieBF/CVE-2024-9593) -- [0x4f5da2-venom/CVE-2024-9593-EXP](https://github.com/0x4f5da2-venom/CVE-2024-9593-EXP) -- [Nxploited/CVE-2024-9593-Exploit](https://github.com/Nxploited/CVE-2024-9593-Exploit) - -### CVE-2024-9680 (2024-10-09) - -An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, Firefox ESR < 115.16.1, Thunderbird < 131.0.1, Thunderbird < 128.3.1, and Thunderbird < 115.16.0. - - -- [tdonaworth/Firefox-CVE-2024-9680](https://github.com/tdonaworth/Firefox-CVE-2024-9680) -- [PraiseImafidon/Version_Vulnerability_Scanner](https://github.com/PraiseImafidon/Version_Vulnerability_Scanner) - -### CVE-2024-9707 (2024-10-11) - -The Hunk Companion plugin for WordPress is vulnerable to unauthorized plugin installation/activation due to a missing capability check on the /wp-json/hc/v1/themehunk-import REST API endpoint in all versions up to, and including, 1.8.4. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated. - - -- [RandomRobbieBF/CVE-2024-9707](https://github.com/RandomRobbieBF/CVE-2024-9707) -- [Nxploited/CVE-2024-9707-Poc](https://github.com/Nxploited/CVE-2024-9707-Poc) - -### CVE-2024-9796 (2024-10-10) - -The WP-Advanced-Search WordPress plugin before 3.3.9.2 does not sanitize and escape the t parameter before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks - - -- [RandomRobbieBF/CVE-2024-9796](https://github.com/RandomRobbieBF/CVE-2024-9796) -- [issamjr/CVE-2024-9796](https://github.com/issamjr/CVE-2024-9796) - -### CVE-2024-9821 (2024-10-12) - -The Bot for Telegram on WooCommerce plugin for WordPress is vulnerable to sensitive information disclosure due to missing authorization checks on the 'stm_wpcfto_get_settings' AJAX action in all versions up to, and including, 1.2.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to view the Telegram Bot Token, a secret token used to control the bot, which can then be used to log in as any existing user on the site, such as an administrator, if they know the username, due to the Login with Telegram feature. - - -- [RandomRobbieBF/CVE-2024-9821](https://github.com/RandomRobbieBF/CVE-2024-9821) - -### CVE-2024-9822 (2024-10-11) - -The Pedalo Connector plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.0.5. This is due to insufficient restriction on the 'login_admin_user' function. This makes it possible for unauthenticated attackers to log to the first user, who is usually the administrator, or if it does not exist, then to the first administrator. - - -- [RandomRobbieBF/CVE-2024-9822](https://github.com/RandomRobbieBF/CVE-2024-9822) - -### CVE-2024-9890 (2024-10-26) - -The User Toolkit plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.2.3. This is due to an improper capability check in the 'switchUser' function. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator. - - -- [RandomRobbieBF/CVE-2024-9890](https://github.com/RandomRobbieBF/CVE-2024-9890) - -### CVE-2024-9926 (2024-11-07) - -The Jetpack WordPress plugin does not have proper authorisation in one of its REST endpoint, allowing any authenticated users, such as subscriber to read arbitrary feedbacks data sent via the Jetpack Contact Form - - -- [m3ssap0/wordpress-jetpack-broken-access-control-vulnerable-application](https://github.com/m3ssap0/wordpress-jetpack-broken-access-control-vulnerable-application) -- [m3ssap0/wordpress-jetpack-broken-access-control-exploit](https://github.com/m3ssap0/wordpress-jetpack-broken-access-control-exploit) - -### CVE-2024-9932 (2024-10-26) - -The Wux Blog Editor plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'wuxbt_insertImageNew' function in versions up to, and including, 3.0.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. - - -- [RandomRobbieBF/CVE-2024-9932](https://github.com/RandomRobbieBF/CVE-2024-9932) -- [Nxploited/CVE-2024-9932-POC](https://github.com/Nxploited/CVE-2024-9932-POC) - -### CVE-2024-9933 (2024-10-26) - -The WatchTowerHQ plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.6. This is due to the 'watchtower_ota_token' default value is empty, and the not empty check is missing in the 'Password_Less_Access::login' function. This makes it possible for unauthenticated attackers to log in to the WatchTowerHQ client administrator user. - - -- [RandomRobbieBF/CVE-2024-9933](https://github.com/RandomRobbieBF/CVE-2024-9933) -- [Nxploited/CVE-2024-9933](https://github.com/Nxploited/CVE-2024-9933) - -### CVE-2024-9935 (2024-11-16) - -The PDF Generator Addon for Elementor Page Builder plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.7.5 via the rtw_pgaepb_dwnld_pdf() function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. - - -- [RandomRobbieBF/CVE-2024-9935](https://github.com/RandomRobbieBF/CVE-2024-9935) -- [verylazytech/CVE-2024-9935](https://github.com/verylazytech/CVE-2024-9935) -- [Nxploited/CVE-2024-9935](https://github.com/Nxploited/CVE-2024-9935) - -### CVE-2024-9955 (2024-10-15) - -Use after free in WebAuthentication in Google Chrome prior to 130.0.6723.58 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) - - -- [amfg145/CVE-2024-9955-POC](https://github.com/amfg145/CVE-2024-9955-POC) - -### CVE-2024-10015 (2024-11-16) - -The ConvertCalculator for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' and 'type' parameters in all versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - - -- [windz3r0day/CVE-2024-10015](https://github.com/windz3r0day/CVE-2024-10015) - -### CVE-2024-10124 (2024-12-12) - -The Vayu Blocks – Gutenberg Blocks for WordPress & WooCommerce plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation and activation due to a missing capability check on the tp_install() function in all versions up to, and including, 1.1.1. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated. This vulnerability was partially patched in version 1.1.1. - - -- [RandomRobbieBF/CVE-2024-10124](https://github.com/RandomRobbieBF/CVE-2024-10124) -- [Nxploited/CVE-2024-10124-Poc](https://github.com/Nxploited/CVE-2024-10124-Poc) - -### CVE-2024-10140 (2024-10-19) - -Eine kritische Schwachstelle wurde in code-projects Pharmacy Management System 1.0 entdeckt. Betroffen davon ist ein unbekannter Prozess der Datei /manage_supplier.php. Durch Beeinflussen des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. - - -- [holypryx/CVE-2024-10140](https://github.com/holypryx/CVE-2024-10140) - -### CVE-2024-10220 (2024-11-22) - -The Kubernetes kubelet component allows arbitrary command execution via specially crafted gitRepo volumes.This issue affects kubelet: through 1.28.11, from 1.29.0 through 1.29.6, from 1.30.0 through 1.30.2. - - -- [mochizuki875/CVE-2024-10220-githooks](https://github.com/mochizuki875/CVE-2024-10220-githooks) -- [any2sec/cve-2024-10220](https://github.com/any2sec/cve-2024-10220) -- [XiaomingX/cve-2024-10220-githooks](https://github.com/XiaomingX/cve-2024-10220-githooks) -- [filipzag/CVE-2024-10220](https://github.com/filipzag/CVE-2024-10220) -- [candranapits/poc-CVE-2024-10220](https://github.com/candranapits/poc-CVE-2024-10220) - -### CVE-2024-10245 (2024-11-12) - -The Relais 2FA plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.0. This is due to incorrect authentication and capability checking in the 'rl_do_ajax' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email. - - -- [RandomRobbieBF/CVE-2024-10245](https://github.com/RandomRobbieBF/CVE-2024-10245) - -### CVE-2024-10354 (2024-10-25) - -In SourceCodester Petrol Pump Management Software 1.0 wurde eine kritische Schwachstelle entdeckt. Das betrifft eine unbekannte Funktionalität der Datei /admin/print.php. Mit der Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung. - - -- [K1nakoo/CVE-2024-10354](https://github.com/K1nakoo/CVE-2024-10354) - -### CVE-2024-10355 (2024-10-25) - -Eine kritische Schwachstelle wurde in SourceCodester Petrol Pump Management Software 1.0 entdeckt. Dies betrifft einen unbekannten Teil der Datei /admin/invoice.php. Durch die Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung. - - -- [K1nakoo/CVE-2024-10355](https://github.com/K1nakoo/CVE-2024-10355) - -### CVE-2024-10400 (2024-11-21) - -The Tutor LMS plugin for WordPress is vulnerable to SQL Injection via the ‘rating_filter’ parameter in all versions up to, and including, 2.7.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. - - -- [k0ns0l/CVE-2024-10400](https://github.com/k0ns0l/CVE-2024-10400) - -### CVE-2024-10410 (2024-10-27) - -In SourceCodester Online Hotel Reservation System 1.0 wurde eine kritische Schwachstelle entdeckt. Dabei geht es um die Funktion upload der Datei /admin/mod_room/controller.php?action=add. Dank Manipulation des Arguments image mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. - - -- [K1nakoo/CVE-2024-10410](https://github.com/K1nakoo/CVE-2024-10410) - -### CVE-2024-10448 (2024-10-28) - -Eine problematische Schwachstelle wurde in code-projects Blood Bank Management System 1.0 entdeckt. Betroffen davon ist ein unbekannter Prozess der Datei /file/delete.php. Dank Manipulation des Arguments bid mit unbekannten Daten kann eine cross-site request forgery-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. - - -- [bevennyamande/CVE-2024-10448](https://github.com/bevennyamande/CVE-2024-10448) - -### CVE-2024-10449 (2024-10-28) - -Es wurde eine kritische Schwachstelle in Codezips Hospital Appointment System 1.0 gefunden. Betroffen hiervon ist ein unbekannter Ablauf der Datei /loginAction.php. Mit der Manipulation des Arguments Username mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung. - - -- [g-u-i-d/CVE-2024-10449-patch](https://github.com/g-u-i-d/CVE-2024-10449-patch) - -### CVE-2024-10470 (2024-11-09) - -The WPLMS Learning Management System for WordPress, WordPress LMS theme for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation and permissions checks in the readfile and unlink functions in all versions up to, and including, 4.962. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). The theme is vulnerable even when it is not activated. - - -- [RandomRobbieBF/CVE-2024-10470](https://github.com/RandomRobbieBF/CVE-2024-10470) -- [0xshoriful/CVE-2024-10470](https://github.com/0xshoriful/CVE-2024-10470) - -### CVE-2024-10508 (2024-11-09) - -The RegistrationMagic – User Registration Plugin with Custom Registration Forms plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 6.0.2.6. This is due to the plugin not properly validating the password reset token prior to updating a user's password. This makes it possible for unauthenticated attackers to reset the password of arbitrary users, including administrators, and gain access to these accounts. - - -- [ubaii/CVE-2024-10508](https://github.com/ubaii/CVE-2024-10508) -- [Jenderal92/CVE-2024-10508](https://github.com/Jenderal92/CVE-2024-10508) - -### CVE-2024-10511 (2024-12-11) - -CWE-287: Improper Authentication vulnerability exists that could cause Denial of access to the web interface\nwhen someone on the local network repeatedly requests the /accessdenied URL. - - -- [revengsmK/CVE-2024-10511](https://github.com/revengsmK/CVE-2024-10511) - -### CVE-2024-10516 (2024-12-06) - -The Swift Performance Lite plugin for WordPress is vulnerable to Local PHP File Inclusion in all versions up to, and including, 2.3.7.1 via the 'ajaxify' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. - - -- [RandomRobbieBF/CVE-2024-10516](https://github.com/RandomRobbieBF/CVE-2024-10516) - -### CVE-2024-10542 (2024-11-26) - -The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS spoofing on the checkWithoutToken function in all versions up to, and including, 6.43.2. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated. - - -- [ubaii/CVE-2024-10542](https://github.com/ubaii/CVE-2024-10542) - -### CVE-2024-10557 (2024-10-31) - -In code-projects Blood Bank Management System 1.0 wurde eine Schwachstelle gefunden. Sie wurde als problematisch eingestuft. Hierbei betrifft es unbekannten Programmcode der Datei /file/updateprofile.php. Mit der Manipulation mit unbekannten Daten kann eine cross-site request forgery-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung. - - -- [bevennyamande/CVE-2024-10557](https://github.com/bevennyamande/CVE-2024-10557) - -### CVE-2024-10571 (2024-11-14) - -The Chartify – WordPress Chart Plugin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.9.5 via the 'source' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. - - -- [RandomRobbieBF/CVE-2024-10571](https://github.com/RandomRobbieBF/CVE-2024-10571) - -### CVE-2024-10586 (2024-11-09) - -The Debug Tool plugin for WordPress is vulnerable to arbitrary file creation due to a missing capability check on the dbt_pull_image() function and missing file type validation in all versions up to, and including, 2.2. This makes it possible for unauthenticated attackers to to create arbitrary files such as .php files that can be leveraged for remote code execution. - - -- [RandomRobbieBF/CVE-2024-10586](https://github.com/RandomRobbieBF/CVE-2024-10586) -- [Nxploited/CVE-2024-10586-Poc](https://github.com/Nxploited/CVE-2024-10586-Poc) - -### CVE-2024-10592 (2024-11-16) - -The Mapster WP Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the popup class parameter in all versions up to, and including, 1.6.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - - -- [windz3r0day/CVE-2024-10592](https://github.com/windz3r0day/CVE-2024-10592) - -### CVE-2024-10605 (2024-10-31) - -Es wurde eine Schwachstelle in code-projects Blood Bank Management System 1.0 ausgemacht. Sie wurde als problematisch eingestuft. Es betrifft eine unbekannte Funktion der Datei /file/request.php. Durch die Manipulation mit unbekannten Daten kann eine cross-site request forgery-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. - - -- [bevennyamande/CVE-2024-10605](https://github.com/bevennyamande/CVE-2024-10605) - -### CVE-2024-10629 (2024-11-13) - -The GPX Viewer plugin for WordPress is vulnerable to arbitrary file creation due to a missing capability check and file type validation in the gpxv_file_upload() function in all versions up to, and including, 2.2.8. This makes it possible for authenticated attackers, with subscriber-level access and above, to create arbitrary files on the affected site's server which may make remote code execution possible. - - -- [RandomRobbieBF/CVE-2024-10629](https://github.com/RandomRobbieBF/CVE-2024-10629) - -### CVE-2024-10654 (2024-11-01) - -In TOTOLINK LR350 bis 9.3.5u.6369 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Betroffen ist eine unbekannte Verarbeitung der Datei /formLoginAuth.htm. Dank der Manipulation des Arguments authCode mit der Eingabe 1 mit unbekannten Daten kann eine authorization bypass-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung. Ein Aktualisieren auf die Version 9.3.5u.6698_B20230810 vermag dieses Problem zu lösen. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen. - - -- [c0nyy/IoT_vuln](https://github.com/c0nyy/IoT_vuln) - -### CVE-2024-10728 (2024-11-16) - -The Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX plugin for WordPress is vulnerable to unauthorized plugin installation/activation due to a missing capability check on the 'install_required_plugin_callback' function in all versions up to, and including, 4.1.16. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated. - - -- [RandomRobbieBF/CVE-2024-10728](https://github.com/RandomRobbieBF/CVE-2024-10728) - -### CVE-2024-10793 (2024-11-15) - -The WP Activity Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the user_id parameter in all versions up to, and including, 5.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrative user accesses an injected page. - - -- [windz3r0day/CVE-2024-10793](https://github.com/windz3r0day/CVE-2024-10793) -- [MAHajian/CVE-2024-10793](https://github.com/MAHajian/CVE-2024-10793) - -### CVE-2024-10914 (2024-11-06) - -In D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L bis 20241028 wurde eine kritische Schwachstelle ausgemacht. Hierbei betrifft es die Funktion cgi_user_add der Datei /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. Durch Manipulation des Arguments name mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Die Komplexität eines Angriffs ist eher hoch. Sie gilt als schwierig ausnutzbar. Der Exploit steht zur öffentlichen Verfügung. - - -- [imnotcha0s/CVE-2024-10914](https://github.com/imnotcha0s/CVE-2024-10914) -- [verylazytech/CVE-2024-10914](https://github.com/verylazytech/CVE-2024-10914) -- [Egi08/CVE-2024-10914](https://github.com/Egi08/CVE-2024-10914) -- [Bu0uCat/D-Link-NAS-CVE-2024-10914-](https://github.com/Bu0uCat/D-Link-NAS-CVE-2024-10914-) -- [ThemeHackers/CVE-2024-10914](https://github.com/ThemeHackers/CVE-2024-10914) -- [retuci0/cve-2024-10914-port](https://github.com/retuci0/cve-2024-10914-port) -- [K3ysTr0K3R/CVE-2024-10914-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2024-10914-EXPLOIT) -- [jahithoque/CVE-2024-10914-Exploit](https://github.com/jahithoque/CVE-2024-10914-Exploit) -- [redspy-sec/D-Link](https://github.com/redspy-sec/D-Link) -- [dragonXZH/CVE-2024-10914](https://github.com/dragonXZH/CVE-2024-10914) - -### CVE-2024-10924 (2024-11-15) - -The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the "Two-Factor Authentication" setting is enabled (disabled by default). - - -- [RandomRobbieBF/CVE-2024-10924](https://github.com/RandomRobbieBF/CVE-2024-10924) -- [m3ssap0/wordpress-really-simple-security-authn-bypass-vulnerable-application](https://github.com/m3ssap0/wordpress-really-simple-security-authn-bypass-vulnerable-application) -- [MattJButler/CVE-2024-10924](https://github.com/MattJButler/CVE-2024-10924) -- [m3ssap0/wordpress-really-simple-security-authn-bypass-exploit](https://github.com/m3ssap0/wordpress-really-simple-security-authn-bypass-exploit) -- [julesbsz/CVE-2024-10924](https://github.com/julesbsz/CVE-2024-10924) -- [Trackflaw/CVE-2024-10924-Wordpress-Docker](https://github.com/Trackflaw/CVE-2024-10924-Wordpress-Docker) -- [Maalfer/CVE-2024-10924-PoC](https://github.com/Maalfer/CVE-2024-10924-PoC) -- [D1se0/CVE-2024-10924-Bypass-MFA-Wordpress-LAB](https://github.com/D1se0/CVE-2024-10924-Bypass-MFA-Wordpress-LAB) -- [Hunt3r850/CVE-2024-10924-PoC](https://github.com/Hunt3r850/CVE-2024-10924-PoC) -- [Hunt3r850/CVE-2024-10924-Wordpress-Docker](https://github.com/Hunt3r850/CVE-2024-10924-Wordpress-Docker) - -### CVE-2024-10958 (2024-11-10) - -The The WP Photo Album Plus plugin for WordPress is vulnerable to arbitrary shortcode execution via getshortcodedrenderedfenodelay AJAX action in all versions up to, and including, 8.8.08.007 . This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. - - -- [reinh3rz/CVE-2024-10958-WPPA-Exploit](https://github.com/reinh3rz/CVE-2024-10958-WPPA-Exploit) - -### CVE-2024-11003 (2024-11-19) - -Qualys discovered that needrestart, before version 3.8, passes unsanitized data to a library (Modules::ScanDeps) which expects safe input. This could allow a local attacker to execute arbitrary shell commands. Please see the related CVE-2024-10224 in Modules::ScanDeps. - - -- [unknown-user-from/CVE-2024-11003-PoC](https://github.com/unknown-user-from/CVE-2024-11003-PoC) - -### CVE-2024-11199 (2024-11-23) - -The Rescue Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's rescue_progressbar shortcode in all versions up to, and including, 2.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - - -- [windz3r0day/CVE-2024-11199](https://github.com/windz3r0day/CVE-2024-11199) - -### CVE-2024-11201 (2024-12-06) - -The myCred – Loyalty Points and Rewards plugin for WordPress and WooCommerce – Give Points, Ranks, Badges, Cashback, WooCommerce rewards, and WooCommerce credits for Gamification plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's mycred_send shortcode in all versions up to, and including, 2.7.5.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - - -- [NSQAQ/CVE-2024-11201](https://github.com/NSQAQ/CVE-2024-11201) - -### CVE-2024-11252 (2024-11-30) - -The Social Sharing Plugin – Sassy Social Share plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the heateor_mastodon_share parameter in all versions up to, and including, 3.3.69 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. - - -- [reinh3rz/CVE-2024-11252-Sassy-Social-Share-XSS](https://github.com/reinh3rz/CVE-2024-11252-Sassy-Social-Share-XSS) - -### CVE-2024-11281 (2024-12-25) - -The WooCommerce Point of Sale plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 6.1.0. This is due to insufficient validation on the 'logged_in_user_id' value when option values are empty and the ability for attackers to change the email of arbitrary user accounts. This makes it possible for unauthenticated attackers to change the email of arbitrary user accounts, including administrators, and reset their password to gain access to the account. - - -- [McTavishSue/CVE-2024-11281](https://github.com/McTavishSue/CVE-2024-11281) - ### CVE-2024-11318 (2024-11-18) An IDOR (Insecure Direct Object Reference) vulnerability has been discovered in AbsysNet, affecting version 2.3.1. This vulnerability could allow a remote attacker to obtain the session of an unauthenticated user by brute-force attacking the session identifier on the "/cgi-bin/ocap/" endpoint. @@ -2378,257 +1357,6 @@ - [xthalach/CVE-2024-11318](https://github.com/xthalach/CVE-2024-11318) -### CVE-2024-11320 (2024-11-21) - -Arbitrary commands execution on the server by exploiting a command injection vulnerability in the LDAP authentication mechanism. This issue affects Pandora FMS: from 700 through <=777.4 - - -- [mhaskar/CVE-2024-11320](https://github.com/mhaskar/CVE-2024-11320) - -### CVE-2024-11381 (2024-11-22) - -The Control horas plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ch_registro' shortcode in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - - -- [windz3r0day/CVE-2024-11381](https://github.com/windz3r0day/CVE-2024-11381) - -### CVE-2024-11387 (2024-11-23) - -The Easy Liveblogs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'elb_liveblog' shortcode in all versions up to, and including, 2.3.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - - -- [windz3r0day/CVE-2024-11387](https://github.com/windz3r0day/CVE-2024-11387) - -### CVE-2024-11388 (2024-11-21) - -The Dino Game – Embed Google Chrome Dinosaur Game in WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'dino-game' shortcode in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - - -- [windz3r0day/CVE-2024-11388](https://github.com/windz3r0day/CVE-2024-11388) - -### CVE-2024-11392 (2024-11-22) - -Hugging Face Transformers MobileViTV2 Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of configuration files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-24322. - - -- [Piyush-Bhor/CVE-2024-11392](https://github.com/Piyush-Bhor/CVE-2024-11392) - -### CVE-2024-11393 (2024-11-22) - -Hugging Face Transformers MaskFormer Model Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of model files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25191. - - -- [Piyush-Bhor/CVE-2024-11393](https://github.com/Piyush-Bhor/CVE-2024-11393) - -### CVE-2024-11394 (2024-11-22) - -Hugging Face Transformers Trax Model Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of model files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25012. - - -- [Piyush-Bhor/CVE-2024-11394](https://github.com/Piyush-Bhor/CVE-2024-11394) - -### CVE-2024-11396 (2025-01-13) - -The Event Monster – Event Management, Tickets Booking, Upcoming Event plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.4.3 via the Visitors List Export file. During the export, a CSV file is created in the wp-content folder with a hardcoded filename that is publicly accessible. This makes it possible for unauthenticated attackers to extract data about event visitors, that includes first and last names, email, and phone number. - - -- [RandomRobbieBF/CVE-2024-11396](https://github.com/RandomRobbieBF/CVE-2024-11396) - -### CVE-2024-11412 (2024-11-21) - -The Shine PDF Embeder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'shinepdf' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - - -- [windz3r0day/CVE-2024-11412](https://github.com/windz3r0day/CVE-2024-11412) - -### CVE-2024-11423 (2025-01-08) - -The Ultimate Gift Cards for WooCommerce – Create WooCommerce Gift Cards, Gift Vouchers, Redeem & Manage Digital Gift Coupons. Offer Gift Certificates, Schedule Gift Cards, and Use Advance Coupons With Personalized Templates plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several REST API endpoints such as /wp-json/gifting/recharge-giftcard in all versions up to, and including, 3.0.6. This makes it possible for unauthenticated attackers to recharge a gift card balance, without making a payment along with reducing gift card balances without purchasing anything. - - -- [RandomRobbieBF/CVE-2024-11423](https://github.com/RandomRobbieBF/CVE-2024-11423) - -### CVE-2024-11428 (2024-11-21) - -The Lazy load videos and sticky control plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'lazy-load-videos-and-sticky-control' shortcode in all versions up to, and including, 3.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - - -- [windz3r0day/CVE-2024-11428](https://github.com/windz3r0day/CVE-2024-11428) - -### CVE-2024-11432 (2024-11-21) - -The SuevaFree Essential Kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'counter' shortcode in all versions up to, and including, 1.1.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - - -- [windz3r0day/CVE-2024-11432](https://github.com/windz3r0day/CVE-2024-11432) - -### CVE-2024-11477 (2024-11-22) - -7-Zip Zstandard Decompression Integer Underflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.\n\nThe specific flaw exists within the implementation of Zstandard decompression. The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24346. - - -- [TheN00bBuilder/cve-2024-11477-writeup](https://github.com/TheN00bBuilder/cve-2024-11477-writeup) - -### CVE-2024-11613 (2025-01-08) - -The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion in all versions up to, and including, 4.24.15 via the 'wfu_file_downloader.php' file. This is due to lack of proper sanitization of the 'source' parameter and allowing a user-defined directory path. This makes it possible for unauthenticated attackers to execute code on the server. - - -- [Sachinart/CVE-2024-11613-wp-file-upload](https://github.com/Sachinart/CVE-2024-11613-wp-file-upload) - -### CVE-2024-11616 (2024-12-19) - -Netskope was made aware of a security vulnerability in Netskope Endpoint DLP’s Content Control Driver where a double-fetch issue leads to heap overflow. The vulnerability arises from the fact that the NumberOfBytes argument to ExAllocatePoolWithTag, and the Length argument for RtlCopyMemory, both independently dereference their value from the user supplied input buffer inside the EpdlpSetUsbAction function, known as a double-fetch. If this length value grows to a higher value in between these two calls, it will result in the RtlCopyMemory call copying user-supplied memory contents outside the range of the allocated buffer, resulting in a heap overflow. A malicious attacker will need admin privileges to exploit the issue.\nThis issue affects Endpoint DLP version below R119. - - -- [inb1ts/CVE-2024-11616](https://github.com/inb1ts/CVE-2024-11616) - -### CVE-2024-11643 (2024-12-04) - -The Accessibility by AllAccessible plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'AllAccessible_save_settings' function in all versions up to, and including, 1.3.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. - - -- [RandomRobbieBF/CVE-2024-11643](https://github.com/RandomRobbieBF/CVE-2024-11643) - -### CVE-2024-11680 (2024-11-26) - -ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript. - - -- [D3N14LD15K/CVE-2024-11680_PoC_Exploit](https://github.com/D3N14LD15K/CVE-2024-11680_PoC_Exploit) - -### CVE-2024-11728 (2024-12-06) - -The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to SQL Injection via the 'visit_type[service_id]' parameter of the tax_calculated_data AJAX action in all versions up to, and including, 3.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. - - -- [samogod/CVE-2024-11728](https://github.com/samogod/CVE-2024-11728) - -### CVE-2024-11972 (2024-12-31) - -The Hunk Companion WordPress plugin before 1.9.0 does not correctly authorize some REST API endpoints, allowing unauthenticated requests to install and activate arbitrary Hunk Companion WordPress plugin before 1.9.0 from the WordPress.org repo, including vulnerable Hunk Companion WordPress plugin before 1.9.0 that have been closed. - - -- [JunTakemura/exploit-CVE-2024-11972](https://github.com/JunTakemura/exploit-CVE-2024-11972) - -### CVE-2024-12025 (2024-12-18) - -The Collapsing Categories plugin for WordPress is vulnerable to SQL Injection via the 'taxonomy' parameter of the /wp-json/collapsing-categories/v1/get REST API in all versions up to, and including, 3.0.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. - - -- [RandomRobbieBF/CVE-2024-12025](https://github.com/RandomRobbieBF/CVE-2024-12025) - -### CVE-2024-12155 (2024-12-06) - -The SV100 Companion plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the settings_import() function in all versions up to, and including, 2.0.02. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. - - -- [McTavishSue/CVE-2024-12155](https://github.com/McTavishSue/CVE-2024-12155) - -### CVE-2024-12157 (2025-01-07) - -The Popup – MailChimp, GetResponse and ActiveCampaign Intergrations plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter of the 'upc_delete_db_record' AJAX action in all versions up to, and including, 3.2.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. - - -- [RandomRobbieBF/CVE-2024-12157](https://github.com/RandomRobbieBF/CVE-2024-12157) - -### CVE-2024-12172 (2024-12-12) - -The WP Courses LMS – Online Courses Builder, eLearning Courses, Courses Solution, Education Courses plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wpc_update_user_meta_option() function in all versions up to, and including, 3.2.21. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary user's metadata which can be levereged to block an administrator from accessing their site when wp_capabilities is set to 0. - - -- [RandomRobbieBF/CVE-2024-12172](https://github.com/RandomRobbieBF/CVE-2024-12172) - -### CVE-2024-12209 (2024-12-08) - -The WP Umbrella: Update Backup Restore & Monitoring plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.17.0 via the 'filename' parameter of the 'umbrella-restore' action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. - - -- [RandomRobbieBF/CVE-2024-12209](https://github.com/RandomRobbieBF/CVE-2024-12209) -- [Nxploited/CVE-2024-12209](https://github.com/Nxploited/CVE-2024-12209) - -### CVE-2024-12252 (2025-01-07) - -The SEO LAT Auto Post plugin for WordPress is vulnerable to file overwrite due to a missing capability check on the remote_update AJAX action in all versions up to, and including, 2.2.1. This makes it possible for unauthenticated attackers to overwrite the seo-beginner-auto-post.php file which can be leveraged to achieve remote code execution. - - -- [RandomRobbieBF/CVE-2024-12252](https://github.com/RandomRobbieBF/CVE-2024-12252) - -### CVE-2024-12270 (2024-12-07) - -The Beautiful taxonomy filters plugin for WordPress is vulnerable to SQL Injection via the 'selects[0][term]' parameter in all versions up to, and including, 2.4.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. - - -- [RandomRobbieBF/CVE-2024-12270](https://github.com/RandomRobbieBF/CVE-2024-12270) - -### CVE-2024-12345 -- [RoyaRadin/CVE-2024-12345-POC](https://github.com/RoyaRadin/CVE-2024-12345-POC) - -### CVE-2024-12404 (2025-01-11) - -The CF Internal Link Shortcode plugin for WordPress is vulnerable to SQL Injection via the 'post_title' parameter in all versions up to, and including, 1.1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. - - -- [RandomRobbieBF/CVE-2024-12404](https://github.com/RandomRobbieBF/CVE-2024-12404) - -### CVE-2024-12471 (2025-01-07) - -The Post Saint: ChatGPT, GPT4, DALL-E, Stable Diffusion, Pexels, Dezgo AI Text & Image Generator plugin for WordPress is vulnerable to arbitrary files uploads due to a missing capability check and file type validation on the add_image_to_library AJAX action function in all versions up to, and including, 1.3.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files that make remote code execution possible. - - -- [RandomRobbieBF/CVE-2024-12471](https://github.com/RandomRobbieBF/CVE-2024-12471) - -### CVE-2024-12484 (2024-12-11) - -In Codezips Technical Discussion Forum 1.0 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Das betrifft eine unbekannte Funktionalität der Datei /signuppost.php. Durch das Manipulieren des Arguments Username mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung. - - -- [LiChaser/CVE-2024-12484](https://github.com/LiChaser/CVE-2024-12484) - -### CVE-2024-12535 (2025-01-07) - -The Host PHP Info plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check when including the 'phpinfo' function in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to read configuration settings and predefined variables on the site's server. The plugin does not need to be activated for the vulnerability to be exploited. - - -- [RandomRobbieBF/CVE-2024-12535](https://github.com/RandomRobbieBF/CVE-2024-12535) - -### CVE-2024-12542 (2025-01-09) - -The linkID plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check when including the 'phpinfo' function in all versions up to, and including, 0.1.2. This makes it possible for unauthenticated attackers to read configuration settings and predefined variables on the site's server. The plugin does not need to be activated for the vulnerability to be exploited. - - -- [RandomRobbieBF/CVE-2024-12542](https://github.com/RandomRobbieBF/CVE-2024-12542) - -### CVE-2024-12558 (2024-12-21) - -The WP BASE Booking of Appointments, Services and Events plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the export_db function in all versions up to, and including, 4.9.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to expose sensitive information from the database, such as the hashed administrator password. - - -- [RandomRobbieBF/CVE-2024-12558](https://github.com/RandomRobbieBF/CVE-2024-12558) -- [Nxploited/CVE-2024-12558-exploit](https://github.com/Nxploited/CVE-2024-12558-exploit) - -### CVE-2024-12594 (2024-12-24) - -The Custom Login Page Styler – Login Protected Private Site , Change wp-admin login url , WordPress login logo , Temporary admin login access , Rename login , Login customizer, Hide wp-login – Limit Login Attempts – Locked Site plugin for WordPress is vulnerable to privilege escalation due to a missing capability check on the 'lps_generate_temp_access_url' AJAX action in all versions up to, and including, 7.1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to login as other users such as subscribers. - - -- [RandomRobbieBF/CVE-2024-12594](https://github.com/RandomRobbieBF/CVE-2024-12594) - -### CVE-2024-12849 (2025-01-07) - -The Error Log Viewer By WP Guru plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 1.0.1.3 via the wp_ajax_nopriv_elvwp_log_download AJAX action. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. - - -- [RandomRobbieBF/CVE-2024-12849](https://github.com/RandomRobbieBF/CVE-2024-12849) -- [Nxploited/CVE-2024-12849-Poc](https://github.com/Nxploited/CVE-2024-12849-Poc) - -### CVE-2024-12856 (2024-12-27) - -The Four-Faith router models F3x24 and F3x36 are affected by an operating system (OS) command injection vulnerability. At least firmware version 2.0 allows authenticated and remote attackers to execute arbitrary OS commands over HTTP when modifying the system time via apply.cgi. Additionally, this firmware version has default credentials which, if not changed, would effectively change this vulnerability into an unauthenticated and remote OS command execution issue. - - -- [nu113d/CVE-2024-12856](https://github.com/nu113d/CVE-2024-12856) - ### CVE-2024-12883 (2024-12-21) In code-projects Job Recruitment 1.0 wurde eine problematische Schwachstelle ausgemacht. Das betrifft eine unbekannte Funktionalität der Datei /_email.php. Mittels Manipulieren des Arguments email mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung. @@ -2636,20 +1364,6 @@ - [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883) -### CVE-2024-12970 (2025-01-06) - -Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in TUBITAK BILGEM Pardus OS My Computer allows OS Command Injection.This issue affects Pardus OS My Computer: before 0.7.2. - - -- [osmancanvural/CVE-2024-12970](https://github.com/osmancanvural/CVE-2024-12970) - -### CVE-2024-12986 (2024-12-27) - -Eine Schwachstelle wurde in DrayTek Vigor2960 and Vigor300B 1.5.1.3/1.5.1.4 entdeckt. Sie wurde als kritisch eingestuft. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei /cgi-bin/mainfunction.cgi/apmcfgupptim der Komponente Web Management Interface. Mit der Manipulation des Arguments session mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung. Ein Aktualisieren auf die Version 1.5.1.5 vermag dieses Problem zu lösen. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen. - - -- [Aether-0/CVE-2024-12986](https://github.com/Aether-0/CVE-2024-12986) - ### CVE-2024-20017 (2024-03-04) In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation Patch ID: WCNCR00350938; Issue ID: MSV-1132. @@ -2657,13 +1371,6 @@ - [mellow-hype/cve-2024-20017](https://github.com/mellow-hype/cve-2024-20017) -### CVE-2024-20137 (2024-12-02) - -In wlan driver, there is a possible client disconnection due to improper handling of exceptional conditions. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00384543; Issue ID: MSV-1727. - - -- [takistmr/CVE-2024-20137](https://github.com/takistmr/CVE-2024-20137) - ### CVE-2024-20291 (2024-02-28) A vulnerability in the access control list (ACL) programming for port channel subinterfaces of Cisco Nexus 3000 and 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, remote attacker to send traffic that should be blocked through an affected device.\r\n\r This vulnerability is due to incorrect hardware programming that occurs when configuration changes are made to port channel member ports. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access network resources that should be protected by an ACL that was applied on port channel subinterfaces. @@ -2720,7 +1427,6 @@ - [nnotwen/Script-For-CVE-2024-20666](https://github.com/nnotwen/Script-For-CVE-2024-20666) -- [invaderslabs/CVE-2024-20666](https://github.com/invaderslabs/CVE-2024-20666) ### CVE-2024-20696 (2024-01-09) @@ -2769,8 +1475,6 @@ - [momika233/CVE-2024-21006](https://github.com/momika233/CVE-2024-21006) -- [lightr3d/CVE-2024-21006_jar](https://github.com/lightr3d/CVE-2024-21006_jar) -- [dadvlingd/CVE-2024-21006](https://github.com/dadvlingd/CVE-2024-21006) ### CVE-2024-21107 (2024-04-16) @@ -2788,13 +1492,6 @@ - [10cks/CVE-2024-21111-del](https://github.com/10cks/CVE-2024-21111-del) - [x0rsys/CVE-2024-21111](https://github.com/x0rsys/CVE-2024-21111) -### CVE-2024-21182 (2024-07-16) - -Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). - - -- [kursadalsan/CVE-2024-21182](https://github.com/kursadalsan/CVE-2024-21182) - ### CVE-2024-21305 (2024-01-09) Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability @@ -2809,14 +1506,6 @@ - [d4rks1d33/C-PoC-for-CVE-2024-21306](https://github.com/d4rks1d33/C-PoC-for-CVE-2024-21306) - [PhucHauDeveloper/BadBlue](https://github.com/PhucHauDeveloper/BadBlue) -- [Danyw24/blueXploit](https://github.com/Danyw24/blueXploit) - -### CVE-2024-21320 (2024-01-09) - -Windows Themes Spoofing Vulnerability - - -- [sxyrxyy/CVE-2024-21320-POC](https://github.com/sxyrxyy/CVE-2024-21320-POC) ### CVE-2024-21338 (2024-02-13) @@ -2828,8 +1517,6 @@ - [varwara/CVE-2024-21338](https://github.com/varwara/CVE-2024-21338) - [Zombie-Kaiser/CVE-2024-21338-x64-build-](https://github.com/Zombie-Kaiser/CVE-2024-21338-x64-build-) - [tykawaii98/CVE-2024-21338_PoC](https://github.com/tykawaii98/CVE-2024-21338_PoC) -- [Crowdfense/CVE-2024-21338](https://github.com/Crowdfense/CVE-2024-21338) -- [hackyboiz/kcfg-bypass](https://github.com/hackyboiz/kcfg-bypass) ### CVE-2024-21345 (2024-02-13) @@ -2878,9 +1565,7 @@ - [ShubhamKanhere307/CVE-2024-21413](https://github.com/ShubhamKanhere307/CVE-2024-21413) - [olebris/CVE-2024-21413](https://github.com/olebris/CVE-2024-21413) - [DerZiad/CVE-2024-21413](https://github.com/DerZiad/CVE-2024-21413) -- [Redfox-Secuirty/Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-Landscape](https://github.com/Redfox-Secuirty/Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-Landscape) - [ThemeHackers/CVE-2024-21413](https://github.com/ThemeHackers/CVE-2024-21413) -- [D1se0/CVE-2024-21413-Vulnerabilidad-Outlook-LAB](https://github.com/D1se0/CVE-2024-21413-Vulnerabilidad-Outlook-LAB) ### CVE-2024-21514 (2024-06-22) @@ -2896,22 +1581,6 @@ - [ch4n3-yoon/CVE-2024-21520-Demo](https://github.com/ch4n3-yoon/CVE-2024-21520-Demo) -### CVE-2024-21534 (2024-10-11) - -All versions of the package jsonpath-plus are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node.\r\r**Note:**\r\rThere were several attempts to fix it in versions [10.0.0-10.1.0](https://github.com/JSONPath-Plus/JSONPath/compare/v9.0.0...v10.1.0) but it could still be exploited using [different payloads](https://github.com/JSONPath-Plus/JSONPath/issues/226). - - -- [pabloopez/CVE-2024-21534](https://github.com/pabloopez/CVE-2024-21534) -- [XiaomingX/cve-2024-21534-poc](https://github.com/XiaomingX/cve-2024-21534-poc) -- [verylazytech/cve-2024-21534](https://github.com/verylazytech/cve-2024-21534) - -### CVE-2024-21542 (2024-12-10) - -Versions of the package luigi before 3.6.0 are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) due to improper destination file path validation in the _extract_packages_archive function. - - -- [L3ster1337/Poc-CVE-2024-21542](https://github.com/L3ster1337/Poc-CVE-2024-21542) - ### CVE-2024-21626 (2024-01-31) runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue. @@ -2929,8 +1598,6 @@ - [KubernetesBachelor/CVE-2024-21626](https://github.com/KubernetesBachelor/CVE-2024-21626) - [dorser/cve-2024-21626](https://github.com/dorser/cve-2024-21626) - [FlojBoj/CVE-2024-21626](https://github.com/FlojBoj/CVE-2024-21626) -- [Sk3pper/CVE-2024-21626-old-docker-versions](https://github.com/Sk3pper/CVE-2024-21626-old-docker-versions) -- [adaammmeeee/little-joke](https://github.com/adaammmeeee/little-joke) ### CVE-2024-21633 (2024-01-03) @@ -2952,7 +1619,6 @@ - [absholi7ly/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server](https://github.com/absholi7ly/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server) - [phucrio/CVE-2024-21683-RCE](https://github.com/phucrio/CVE-2024-21683-RCE) - [xh4vm/CVE-2024-21683](https://github.com/xh4vm/CVE-2024-21683) -- [XiaomingX/cve-2024-21683-rce](https://github.com/XiaomingX/cve-2024-21683-rce) ### CVE-2024-21689 (2024-08-20) @@ -2986,7 +1652,6 @@ - [r4p3c4/CVE-2024-21762-Exploit-PoC-Fortinet-SSL-VPN-Check](https://github.com/r4p3c4/CVE-2024-21762-Exploit-PoC-Fortinet-SSL-VPN-Check) - [d0rb/CVE-2024-21762](https://github.com/d0rb/CVE-2024-21762) - [rdoix/cve-2024-21762-checker](https://github.com/rdoix/cve-2024-21762-checker) -- [XiaomingX/cve-2024-21762-poc](https://github.com/XiaomingX/cve-2024-21762-poc) ### CVE-2024-21793 (2024-05-08) @@ -3007,7 +1672,6 @@ - [seajaysec/Ivanti-Connect-Around-Scan](https://github.com/seajaysec/Ivanti-Connect-Around-Scan) - [mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped](https://github.com/mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped) - [tucommenceapousser/CVE-2024-21887](https://github.com/tucommenceapousser/CVE-2024-21887) -- [rxwx/pulse-meter](https://github.com/rxwx/pulse-meter) ### CVE-2024-21893 (2024-01-31) @@ -3038,13 +1702,6 @@ - [0xkickit/iCUE_DllHijack_LPE-CVE-2024-22002](https://github.com/0xkickit/iCUE_DllHijack_LPE-CVE-2024-22002) -### CVE-2024-22017 (2024-03-19) - -setuid() does not affect libuv's internal io_uring operations if initialized before the call to setuid().\nThis allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid().\nThis vulnerability affects all users using version greater or equal than Node.js 18.18.0, Node.js 20.4.0 and Node.js 21. - - -- [SpiralBL0CK/cve-2024-22017_to_test](https://github.com/SpiralBL0CK/cve-2024-22017_to_test) - ### CVE-2024-22024 (2024-02-13) An XML external entity or XXE vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x), Ivanti Policy Secure (9.x, 22.x) and ZTA gateways which allows an attacker to access certain restricted resources without authentication. @@ -3065,7 +1722,6 @@ - [W01fh4cker/CVE-2024-22120-RCE](https://github.com/W01fh4cker/CVE-2024-22120-RCE) -- [isPique/CVE-2024-22120-RCE-with-gopher](https://github.com/isPique/CVE-2024-22120-RCE-with-gopher) - [g4nkd/CVE-2024-22120-RCE-with-gopher](https://github.com/g4nkd/CVE-2024-22120-RCE-with-gopher) ### CVE-2024-22145 (2024-05-17) @@ -3075,13 +1731,6 @@ - [RandomRobbieBF/CVE-2024-22145](https://github.com/RandomRobbieBF/CVE-2024-22145) -### CVE-2024-22198 (2024-01-11) - -Nginx-UI is a web interface to manage Nginx configurations. It is vulnerable to arbitrary command execution by abusing the configuration settings. The `Home > Preference` page exposes a list of system settings such as `Run Mode`, `Jwt Secret`, `Node Secret` and `Terminal Start Command`. While the UI doesn't allow users to modify the `Terminal Start Command` setting, it is possible to do so by sending a request to the API. This issue may lead to authenticated remote code execution, privilege escalation, and information disclosure. This vulnerability has been patched in version 2.0.0.beta.9. - - -- [xiw1ll/CVE-2024-22198_Checker](https://github.com/xiw1ll/CVE-2024-22198_Checker) - ### CVE-2024-22243 (2024-02-23) Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html  attack or to a SSRF attack if the URL is used after passing validation checks.\n @@ -3090,13 +1739,6 @@ - [SeanPesce/CVE-2024-22243](https://github.com/SeanPesce/CVE-2024-22243) - [shellfeel/CVE-2024-22243-CVE-2024-22234](https://github.com/shellfeel/CVE-2024-22243-CVE-2024-22234) -### CVE-2024-22262 (2024-04-16) - -Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html  attack or to a SSRF attack if the URL is used after passing validation checks.\n\nThis is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259  and CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.\n\n - - -- [Performant-Labs/CVE-2024-22262](https://github.com/Performant-Labs/CVE-2024-22262) - ### CVE-2024-22263 (2024-06-19) Spring Cloud Data Flow is a microservices-based Streaming and Batch data processing in Cloud Foundry and Kubernetes. The Skipper server has the ability to receive upload package requests. However, due to improper sanitization for upload path, a malicious user who has access to skipper server api can use a crafted upload request to write arbitrary file to any location on file system, may even compromises the server. @@ -3104,23 +1746,6 @@ - [securelayer7/CVE-2024-22263_Scanner](https://github.com/securelayer7/CVE-2024-22263_Scanner) -### CVE-2024-22274 (2024-05-21) - -The vCenter Server contains an authenticated remote code execution vulnerability. A malicious actor with administrative privileges on the vCenter appliance shell may exploit this issue to run arbitrary commands on the underlying operating system. - - -- [mbadanoiu/CVE-2024-22274](https://github.com/mbadanoiu/CVE-2024-22274) -- [ninhpn1337/CVE-2024-22274](https://github.com/ninhpn1337/CVE-2024-22274) -- [l0n3m4n/CVE-2024-22274-RCE](https://github.com/l0n3m4n/CVE-2024-22274-RCE) -- [Mustafa1986/CVE-2024-22274-RCE](https://github.com/Mustafa1986/CVE-2024-22274-RCE) - -### CVE-2024-22275 (2024-05-21) - -The vCenter Server contains a partial file read vulnerability. A malicious actor with administrative privileges on the vCenter appliance shell may exploit this issue to partially read arbitrary files containing sensitive data. - - -- [mbadanoiu/CVE-2024-22275](https://github.com/mbadanoiu/CVE-2024-22275) - ### CVE-2024-22369 (2024-02-20) Deserialization of Untrusted Data vulnerability in Apache Camel SQL ComponentThis issue affects Apache Camel: from 3.0.0 before 3.21.4, from 3.22.0 before 3.22.1, from 4.0.0 before 4.0.4, from 4.1.0 before 4.4.0.\n\nUsers are recommended to upgrade to version 4.4.0, which fixes the issue. If users are on the 4.0.x LTS releases stream, then they are suggested to upgrade to 4.0.4. If users are on 3.x, they are suggested to move to 3.21.4 or 3.22.1\n\n @@ -3195,13 +1820,6 @@ - [zunak/CVE-2024-22641](https://github.com/zunak/CVE-2024-22641) -### CVE-2024-22734 (2024-04-12) - -An issue was discovered in AMCS Group Trux Waste Management Software before version 7.19.0018.26912, allows local attackers to obtain sensitive information via a static, hard-coded AES Key-IV pair in the TxUtilities.dll and TruxUser.cfg components. - - -- [securekomodo/CVE-2024-22734](https://github.com/securekomodo/CVE-2024-22734) - ### CVE-2024-22752 (2024-03-07) Insecure permissions issue in EaseUS MobiMover 6.0.5 Build 21620 allows attackers to gain escalated privileges via use of crafted executable launched from the application installation directory. @@ -3281,9 +1899,6 @@ - [keru6k/CVE-2024-22983](https://github.com/keru6k/CVE-2024-22983) -### CVE-2024-23002 -- [xiaomaoxxx/CVE-2024-23002](https://github.com/xiaomaoxxx/CVE-2024-23002) - ### CVE-2024-23108 (2024-02-05) An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via crafted API requests. @@ -3292,19 +1907,6 @@ - [horizon3ai/CVE-2024-23108](https://github.com/horizon3ai/CVE-2024-23108) - [hitem/CVE-2024-23108](https://github.com/hitem/CVE-2024-23108) -### CVE-2024-23113 (2024-02-15) - -A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets. - - -- [OxLmahdi/cve-2024-23113](https://github.com/OxLmahdi/cve-2024-23113) -- [CheckCve2/CVE-2024-23113](https://github.com/CheckCve2/CVE-2024-23113) -- [p33d/CVE-2024-23113](https://github.com/p33d/CVE-2024-23113) -- [puckiestyle/CVE-2024-23113](https://github.com/puckiestyle/CVE-2024-23113) -- [expl0itsecurity/CVE-2024-23113](https://github.com/expl0itsecurity/CVE-2024-23113) -- [XiaomingX/cve-2024-23113-exp](https://github.com/XiaomingX/cve-2024-23113-exp) -- [XiaomingX/cve-2024-23113-poc](https://github.com/XiaomingX/cve-2024-23113-poc) - ### CVE-2024-23208 (2024-01-23) The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.3, watchOS 10.3, tvOS 17.3, iOS 17.3 and iPadOS 17.3. An app may be able to execute arbitrary code with kernel privileges. @@ -3312,13 +1914,6 @@ - [hrtowii/CVE-2024-23208-test](https://github.com/hrtowii/CVE-2024-23208-test) -### CVE-2024-23298 (2024-03-15) - -A logic issue was addressed with improved state management. - - -- [p1tsi/CVE-2024-23298.app](https://github.com/p1tsi/CVE-2024-23298.app) - ### CVE-2024-23334 (2024-01-29) aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option 'follow_symlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present. Disabling follow_symlinks and using a reverse proxy are encouraged mitigations. Version 3.9.2 fixes this issue. @@ -3331,12 +1926,6 @@ - [brian-edgar-re/poc-cve-2024-23334](https://github.com/brian-edgar-re/poc-cve-2024-23334) - [binaryninja/CVE-2024-23334](https://github.com/binaryninja/CVE-2024-23334) - [s4botai/CVE-2024-23334-PoC](https://github.com/s4botai/CVE-2024-23334-PoC) -- [wizarddos/CVE-2024-23334](https://github.com/wizarddos/CVE-2024-23334) -- [Pylonet/CVE-2024-23334](https://github.com/Pylonet/CVE-2024-23334) -- [Arc4he/CVE-2024-23334-PoC](https://github.com/Arc4he/CVE-2024-23334-PoC) -- [TheRedP4nther/LFI-aiohttp-CVE-2024-23334-PoC](https://github.com/TheRedP4nther/LFI-aiohttp-CVE-2024-23334-PoC) -- [Betan423/CVE-2024-23334-PoC](https://github.com/Betan423/CVE-2024-23334-PoC) -- [BestDevOfc/CVE-2024-23334-PoC](https://github.com/BestDevOfc/CVE-2024-23334-PoC) ### CVE-2024-23339 (2024-01-22) @@ -3345,14 +1934,6 @@ - [200101WhoAmI/CVE-2024-23339](https://github.com/200101WhoAmI/CVE-2024-23339) -### CVE-2024-23346 (2024-02-21) - -Pymatgen (Python Materials Genomics) is an open-source Python library for materials analysis. A critical security vulnerability exists in the `JonesFaithfulTransformation.from_transformation_str()` method within the `pymatgen` library prior to version 2024.2.20. This method insecurely utilizes `eval()` for processing input, enabling execution of arbitrary code when parsing untrusted input. Version 2024.2.20 fixes this issue. - - -- [9carlo6/CVE-2024-23346](https://github.com/9carlo6/CVE-2024-23346) -- [MAWK0235/CVE-2024-23346](https://github.com/MAWK0235/CVE-2024-23346) - ### CVE-2024-23443 (2024-06-19) A high-privileged user, allowed to create custom osquery packs 17 could affect the availability of Kibana by uploading a maliciously crafted osquery pack. @@ -3367,13 +1948,6 @@ - [abian2/CVE-2024-23652](https://github.com/abian2/CVE-2024-23652) -### CVE-2024-23653 (2024-01-31) - -BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special `security.insecure` entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request. The issue has been fixed in v0.12.5 . Avoid using BuildKit frontends from untrusted sources. \n - - -- [666asd/CVE-2024-23653](https://github.com/666asd/CVE-2024-23653) - ### CVE-2024-23692 (2024-05-31) Rejetto HTTP File Server, up to and including version 2.3m, is vulnerable to a template injection vulnerability. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary commands on the affected system by sending a specially crafted HTTP request. As of the CVE assignment date, Rejetto HFS 2.3m is no longer supported. @@ -3387,24 +1961,7 @@ - [Tupler/CVE-2024-23692-exp](https://github.com/Tupler/CVE-2024-23692-exp) - [BBD-YZZ/CVE-2024-23692](https://github.com/BBD-YZZ/CVE-2024-23692) - [0x20c/CVE-2024-23692-EXP](https://github.com/0x20c/CVE-2024-23692-EXP) -- [pradeepboo/Rejetto-HFS-2.x-RCE-CVE-2024-23692](https://github.com/pradeepboo/Rejetto-HFS-2.x-RCE-CVE-2024-23692) - [verylazytech/CVE-2024-23692](https://github.com/verylazytech/CVE-2024-23692) -- [XiaomingX/cve-2024-23692-poc](https://github.com/XiaomingX/cve-2024-23692-poc) -- [NingXin2002/HFS2.3_poc](https://github.com/NingXin2002/HFS2.3_poc) - -### CVE-2024-23708 (2024-05-07) - -In multiple functions of NotificationManagerService.java, there is a possible way to not show a toast message when a clipboard message has been accessed. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. - - -- [uthrasri/CVE-2024-23708](https://github.com/uthrasri/CVE-2024-23708) - -### CVE-2024-23709 (2024-05-07) - -In multiple locations, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. - - -- [AbrarKhan/external_sonivox_CVE-2024-23709](https://github.com/AbrarKhan/external_sonivox_CVE-2024-23709) ### CVE-2024-23722 (2024-03-26) @@ -3545,8 +2102,6 @@ - [BinaryGoodBoy0101/Jenkins-Exploit-CVE-2024-23897-Fsociety](https://github.com/BinaryGoodBoy0101/Jenkins-Exploit-CVE-2024-23897-Fsociety) - [ShieldAuth-PHP/PBL05-CVE-Analsys](https://github.com/ShieldAuth-PHP/PBL05-CVE-Analsys) - [verylazytech/CVE-2024-23897](https://github.com/verylazytech/CVE-2024-23897) -- [D1se0/CVE-2024-23897-Vulnerabilidad-Jenkins](https://github.com/D1se0/CVE-2024-23897-Vulnerabilidad-Jenkins) -- [Marouane133/jenkins-lfi](https://github.com/Marouane133/jenkins-lfi) ### CVE-2024-23995 (2024-04-29) @@ -3714,7 +2269,6 @@ - [Abdurahmon3236/CVE-2024-24549](https://github.com/Abdurahmon3236/CVE-2024-24549) -- [JFOZ1010/CVE-2024-24549](https://github.com/JFOZ1010/CVE-2024-24549) ### CVE-2024-24576 (2024-04-09) @@ -3740,37 +2294,6 @@ - [xffsec/CVE-2024-24590-ClearML-RCE-Exploit](https://github.com/xffsec/CVE-2024-24590-ClearML-RCE-Exploit) - [diegogarciayala/CVE-2024-24590-ClearML-RCE-CMD-POC](https://github.com/diegogarciayala/CVE-2024-24590-ClearML-RCE-CMD-POC) - [junnythemarksman/CVE-2024-24590](https://github.com/junnythemarksman/CVE-2024-24590) -- [sviim/ClearML-CVE-2024-24590-RCE](https://github.com/sviim/ClearML-CVE-2024-24590-RCE) -- [Bigb972003/cve-2024-24590](https://github.com/Bigb972003/cve-2024-24590) -- [j3r1ch0123/CVE-2024-24590](https://github.com/j3r1ch0123/CVE-2024-24590) - -### CVE-2024-24684 (2024-05-28) - -Multiple stack-based buffer overflow vulnerabilities exist in the readOFF functionality of libigl v2.5.0. A specially crafted .off file can lead to stack-based buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the header parsing occuring while processing an `.off` file via the `readOFF` function. \r\n\r\n\r\nWe can see above that at [0] a stack-based buffer called `comment` is defined with an hardcoded size of `1000 bytes`. The call to `fscanf` at [1] is unsafe and if the first line of the header of the `.off` files is longer than 1000 bytes it will overflow the `header` buffer. - - -- [SpiralBL0CK/CVE-2024-24684](https://github.com/SpiralBL0CK/CVE-2024-24684) - -### CVE-2024-24685 (2024-05-28) - -Multiple stack-based buffer overflow vulnerabilities exist in the readOFF functionality of libigl v2.5.0. A specially crafted .off file can lead to stack-based buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the parsing of comments within the vertex section of an `.off` file processed via the `readOFF` function. - - -- [SpiralBL0CK/CVE-2024-24685](https://github.com/SpiralBL0CK/CVE-2024-24685) - -### CVE-2024-24686 (2024-05-28) - -Multiple stack-based buffer overflow vulnerabilities exist in the readOFF functionality of libigl v2.5.0. A specially crafted .off file can lead to stack-based buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the parsing of comments within the faces section of an `.off` file processed via the `readOFF` function. - - -- [SpiralBL0CK/CVE-2024-24686](https://github.com/SpiralBL0CK/CVE-2024-24686) - -### CVE-2024-24725 (2024-03-23) - -Gibbon through 26.0.00 allows remote authenticated users to conduct PHP deserialization attacks via columnOrder in a POST request to the modules/System%20Admin/import_run.php&type=externalAssessment&step=4 URI. - - -- [MelkorW/CVE-2024-24725-PoC](https://github.com/MelkorW/CVE-2024-24725-PoC) ### CVE-2024-24760 (2024-02-02) @@ -3851,22 +2374,9 @@ - [verylazytech/CVE-2024-24919](https://github.com/verylazytech/CVE-2024-24919) - [protonnegativo/CVE-2024-24919](https://github.com/protonnegativo/CVE-2024-24919) - [SalehLardhi/CVE-2024-24919](https://github.com/SalehLardhi/CVE-2024-24919) -- [ShadowByte1/CVE-2024-24919](https://github.com/ShadowByte1/CVE-2024-24919) -- [H3KEY/CVE-2024-24919](https://github.com/H3KEY/CVE-2024-24919) -- [Jutrm/cve-2024-24919](https://github.com/Jutrm/cve-2024-24919) - [LuisMateo1/Arbitrary-File-Read-CVE-2024-24919](https://github.com/LuisMateo1/Arbitrary-File-Read-CVE-2024-24919) - [AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-](https://github.com/AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-) - [geniuszly/CVE-2024-24919](https://github.com/geniuszly/CVE-2024-24919) -- [skyrowalker/CVE-2024-24919](https://github.com/skyrowalker/CVE-2024-24919) -- [sar-3mar/CVE-2024-24919_POC](https://github.com/sar-3mar/CVE-2024-24919_POC) -- [NingXin2002/Check-Point_poc](https://github.com/NingXin2002/Check-Point_poc) - -### CVE-2024-24926 (2024-02-12) - -Deserialization of Untrusted Data vulnerability in UnitedThemes Brooklyn | Creative Multi-Purpose Responsive WordPress Theme.This issue affects Brooklyn | Creative Multi-Purpose Responsive WordPress Theme: from n/a through 4.9.7.6.\n\n - - -- [moften/CVE-2024-24926](https://github.com/moften/CVE-2024-24926) ### CVE-2024-25092 (2024-06-09) @@ -4019,7 +2529,6 @@ - [ivanbg2004/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress](https://github.com/ivanbg2004/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress) - [k3lpi3b4nsh33/CVE-2024-25600](https://github.com/k3lpi3b4nsh33/CVE-2024-25600) - [WanLiChangChengWanLiChang/CVE-2024-25600](https://github.com/WanLiChangChengWanLiChang/CVE-2024-25600) -- [KaSooMi0228/CVE-2024-25600-Bricks-Builder-WordPress](https://github.com/KaSooMi0228/CVE-2024-25600-Bricks-Builder-WordPress) - [wh6amiGit/CVE-2024-25600](https://github.com/wh6amiGit/CVE-2024-25600) ### CVE-2024-25641 (2024-05-13) @@ -4031,8 +2540,6 @@ - [thisisveryfunny/CVE-2024-25641-RCE-Automated-Exploit-Cacti-1.2.26](https://github.com/thisisveryfunny/CVE-2024-25641-RCE-Automated-Exploit-Cacti-1.2.26) - [Safarchand/CVE-2024-25641](https://github.com/Safarchand/CVE-2024-25641) - [StopThatTalace/CVE-2024-25641-CACTI-RCE-1.2.26](https://github.com/StopThatTalace/CVE-2024-25641-CACTI-RCE-1.2.26) -- [XiaomingX/cve-2024-25641-poc](https://github.com/XiaomingX/cve-2024-25641-poc) -- [D3Ext/CVE-2024-25641](https://github.com/D3Ext/CVE-2024-25641) ### CVE-2024-25723 (2024-02-27) @@ -4061,13 +2568,6 @@ - [0xNslabs/CVE-2024-25832-PoC](https://github.com/0xNslabs/CVE-2024-25832-PoC) -### CVE-2024-25897 (2024-02-21) - -ChurchCRM 5.5.0 FRCatalog.php is vulnerable to Blind SQL Injection (Time-based) via the CurrentFundraiser GET parameter. - - -- [i-100-user/CVE-2024-25897](https://github.com/i-100-user/CVE-2024-25897) - ### CVE-2024-26026 (2024-05-08) \n\n\nAn SQL injection vulnerability exists in the BIG-IP Next Central Manager API (URI).  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated\n\n @@ -4083,13 +2583,6 @@ - [gmo-ierae/CVE-2024-26144-test](https://github.com/gmo-ierae/CVE-2024-26144-test) -### CVE-2024-26160 (2024-03-12) - -Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability - - -- [CrackerCat/CVE-2024-26160](https://github.com/CrackerCat/CVE-2024-26160) - ### CVE-2024-26218 (2024-04-09) Windows Kernel Elevation of Privilege Vulnerability @@ -4107,7 +2600,6 @@ - [apkc/CVE-2024-26229-BOF](https://github.com/apkc/CVE-2024-26229-BOF) - [team-MineDEV/CVE-2024-26229](https://github.com/team-MineDEV/CVE-2024-26229) - [Cracked5pider/eop24-26229](https://github.com/Cracked5pider/eop24-26229) -- [mqxmm/CVE-2024-26229](https://github.com/mqxmm/CVE-2024-26229) ### CVE-2024-26230 (2024-04-09) @@ -4117,20 +2609,6 @@ - [kiwids0220/CVE-2024-26230](https://github.com/kiwids0220/CVE-2024-26230) - [Wa1nut4/CVE-2024-26230](https://github.com/Wa1nut4/CVE-2024-26230) -### CVE-2024-26304 (2024-05-01) - -There is a buffer overflow vulnerability in the underlying L2/L3 Management service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system. \n\n - - -- [X-Projetion/CVE-2024-26304-RCE-exploit](https://github.com/X-Projetion/CVE-2024-26304-RCE-exploit) - -### CVE-2024-26308 (2024-02-19) - -Allocation of Resources Without Limits or Throttling vulnerability in Apache Commons Compress.This issue affects Apache Commons Compress: from 1.21 before 1.26.\n\nUsers are recommended to upgrade to version 1.26, which fixes the issue.\n\n - - -- [crazycatMyopic/cve](https://github.com/crazycatMyopic/cve) - ### CVE-2024-26475 (2024-03-14) An issue in radareorg radare2 v.0.9.7 through v.5.8.6 and fixed in v.5.8.8 allows a local attacker to cause a denial of service via the grub_sfs_read_extent function. @@ -4190,13 +2668,6 @@ - [200101WhoAmI/CVE-2024-27088](https://github.com/200101WhoAmI/CVE-2024-27088) -### CVE-2024-27115 (2024-09-11) - -A unauthenticated Remote Code Execution (RCE) vulnerability is found in the SO Planning online planning tool. With this vulnerability, an attacker can upload executable files that are moved to a publicly accessible folder before verifying any requirements. This leads to the possibility of execution of code on the underlying system when the file is triggered. The vulnerability has been remediated in version 1.52.02. - - -- [theexploiters/CVE-2024-27115-Exploit](https://github.com/theexploiters/CVE-2024-27115-Exploit) - ### CVE-2024-27130 (2024-05-21) A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute code via a network.\n\nWe have already fixed the vulnerability in the following version:\nQTS 5.1.7.2770 build 20240520 and later\nQuTS hero h5.1.7.2770 build 20240520 and later @@ -4204,7 +2675,6 @@ - [watchtowrlabs/CVE-2024-27130](https://github.com/watchtowrlabs/CVE-2024-27130) - [d0rb/CVE-2024-27130](https://github.com/d0rb/CVE-2024-27130) -- [XiaomingX/cve-2024-27130-poc](https://github.com/XiaomingX/cve-2024-27130-poc) ### CVE-2024-27173 (2024-06-14) @@ -4227,18 +2697,7 @@ - [K3ysTr0K3R/CVE-2024-27198-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2024-27198-EXPLOIT) - [Shimon03/Explora-o-RCE-n-o-autenticado-JetBrains-TeamCity-CVE-2024-27198-](https://github.com/Shimon03/Explora-o-RCE-n-o-autenticado-JetBrains-TeamCity-CVE-2024-27198-) - [Stuub/RCity-CVE-2024-27198](https://github.com/Stuub/RCity-CVE-2024-27198) -- [HPT-Intern-Task-Submission/CVE-2024-27198](https://github.com/HPT-Intern-Task-Submission/CVE-2024-27198) - [jrbH4CK/CVE-2024-27198](https://github.com/jrbH4CK/CVE-2024-27198) -- [geniuszly/CVE-2024-27198](https://github.com/geniuszly/CVE-2024-27198) -- [Cythonic1/CVE-2024-27198_POC](https://github.com/Cythonic1/CVE-2024-27198_POC) - -### CVE-2024-27292 (2024-02-29) - -Docassemble is an expert system for guided interviews and document assembly. The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation. It affects versions 1.4.53 to 1.4.96. The vulnerability has been patched in version 1.4.97 of the master branch. - - -- [th3gokul/CVE-2024-27292](https://github.com/th3gokul/CVE-2024-27292) -- [NingXin2002/Docassemble_poc](https://github.com/NingXin2002/Docassemble_poc) ### CVE-2024-27316 (2024-04-04) @@ -4360,13 +2819,6 @@ - [jprx/CVE-2024-27815](https://github.com/jprx/CVE-2024-27815) -### CVE-2024-27821 (2024-05-13) - -A path handling issue was addressed with improved validation. This issue is fixed in iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. A shortcut may output sensitive user data without consent. - - -- [0xilis/CVE-2024-27821](https://github.com/0xilis/CVE-2024-27821) - ### CVE-2024-27914 (2024-03-18) GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An unauthenticated user can provide a malicious link to a GLPI administrator in order to exploit a reflected XSS vulnerability. The XSS will only trigger if the administrator navigates through the debug bar. This issue has been patched in version 10.0.13.\n @@ -4374,14 +2826,6 @@ - [shellkraft/CVE-2024-27914](https://github.com/shellkraft/CVE-2024-27914) -### CVE-2024-27954 (2024-05-17) - -Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WP Automatic Automatic allows Path Traversal, Server Side Request Forgery.This issue affects Automatic: from n/a through 3.92.0. - - -- [gh-ost00/CVE-2024-27954](https://github.com/gh-ost00/CVE-2024-27954) -- [Quantum-Hacker/CVE-2024-27954](https://github.com/Quantum-Hacker/CVE-2024-27954) - ### CVE-2024-27956 (2024-03-21) Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.\n\n @@ -4398,9 +2842,6 @@ - [itzheartzz/MASS-CVE-2024-27956](https://github.com/itzheartzz/MASS-CVE-2024-27956) - [TadashiJei/Valve-Press-CVE-2024-27956-RCE](https://github.com/TadashiJei/Valve-Press-CVE-2024-27956-RCE) - [cve-2024/CVE-2024-27956-RCE](https://github.com/cve-2024/CVE-2024-27956-RCE) -- [ThatNotEasy/CVE-2024-27956](https://github.com/ThatNotEasy/CVE-2024-27956) -- [CERTologists/EXPLOITING-CVE-2024-27956](https://github.com/CERTologists/EXPLOITING-CVE-2024-27956) -- [7aRanchi/CVE-2024-27956-for-fscan](https://github.com/7aRanchi/CVE-2024-27956-for-fscan) ### CVE-2024-27971 (2024-05-17) @@ -4456,7 +2897,6 @@ - [akabe1/Graver](https://github.com/akabe1/Graver) - [gunzf0x/Grav-CMS-RCE-Authenticated](https://github.com/gunzf0x/Grav-CMS-RCE-Authenticated) -- [geniuszly/GenGravSSTIExploit](https://github.com/geniuszly/GenGravSSTIExploit) ### CVE-2024-28247 (2024-03-27) @@ -4525,7 +2965,6 @@ - [gh-ost00/CVE-2024-28987-POC](https://github.com/gh-ost00/CVE-2024-28987-POC) - [horizon3ai/CVE-2024-28987](https://github.com/horizon3ai/CVE-2024-28987) - [PlayerFridei/CVE-2024-28987](https://github.com/PlayerFridei/CVE-2024-28987) -- [expl0itsecurity/CVE-2024-28987](https://github.com/expl0itsecurity/CVE-2024-28987) ### CVE-2024-28995 (2024-06-06) @@ -4539,7 +2978,6 @@ - [bigb0x/CVE-2024-28995](https://github.com/bigb0x/CVE-2024-28995) - [muhammetali20/CVE-2024-28995](https://github.com/muhammetali20/CVE-2024-28995) - [Praison001/CVE-2024-28995-SolarWinds-Serv-U](https://github.com/Praison001/CVE-2024-28995-SolarWinds-Serv-U) -- [Stuub/CVE-2024-28995](https://github.com/Stuub/CVE-2024-28995) - [gotr00t0day/CVE-2024-28995](https://github.com/gotr00t0day/CVE-2024-28995) ### CVE-2024-28999 (2024-06-04) @@ -4549,13 +2987,6 @@ - [HussainFathy/CVE-2024-28999](https://github.com/HussainFathy/CVE-2024-28999) -### CVE-2024-29050 (2024-04-09) - -Windows Cryptographic Services Remote Code Execution Vulnerability - - -- [Akrachli/CVE-2024-29050](https://github.com/Akrachli/CVE-2024-29050) - ### CVE-2024-29059 (2024-03-22) .NET Framework Information Disclosure Vulnerability @@ -4572,7 +3003,6 @@ - [YongYe-Security/CVE-2024-29269](https://github.com/YongYe-Security/CVE-2024-29269) - [Chocapikk/CVE-2024-29269](https://github.com/Chocapikk/CVE-2024-29269) - [dream434/CVE-2024-29269](https://github.com/dream434/CVE-2024-29269) -- [K3ysTr0K3R/CVE-2024-29269-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2024-29269-EXPLOIT) - [hack-with-rohit/CVE-2024-29269-RCE](https://github.com/hack-with-rohit/CVE-2024-29269-RCE) - [Quantum-Hacker/CVE-2024-29269](https://github.com/Quantum-Hacker/CVE-2024-29269) @@ -4619,34 +3049,6 @@ - [ally-petitt/CVE-2024-29399](https://github.com/ally-petitt/CVE-2024-29399) -### CVE-2024-29404 (2024-12-03) - -An issue in Razer Synapse 3 v.3.9.131.20813 and Synapse 3 App v.20240213 allows a local attacker to execute arbitrary code via the export parameter of the Chroma Effects function in the Profiles component. - - -- [mansk1es/CVE-2024-29404_Razer](https://github.com/mansk1es/CVE-2024-29404_Razer) - -### CVE-2024-29415 (-) - -The ip package through 2.0.1 for Node.js might allow SSRF because some IP addresses (such as 127.1, 01200034567, 012.1.2.3, 000:0:0000::01, and ::fFFf:127.0.0.1) are improperly categorized as globally routable via isPublic. NOTE: this issue exists because of an incomplete fix for CVE-2023-42282. - - -- [felipecruz91/node-ip-vex](https://github.com/felipecruz91/node-ip-vex) - -### CVE-2024-29510 (2024-07-03) - -Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device. - - -- [swsmith2391/CVE-2024-29510](https://github.com/swsmith2391/CVE-2024-29510) - -### CVE-2024-29671 (2024-12-16) - -Buffer Overflow vulnerability in NEXTU FLATA AX1500 Router v.1.0.2 allows a remote attacker to execute arbitrary code via the POST request handler component. - - -- [laskdjlaskdj12/CVE-2024-29671-POC](https://github.com/laskdjlaskdj12/CVE-2024-29671-POC) - ### CVE-2024-29824 (2024-05-31) An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code. @@ -4676,13 +3078,6 @@ - [sinsinology/CVE-2024-29855](https://github.com/sinsinology/CVE-2024-29855) -### CVE-2024-29863 (2024-04-05) - -A race condition in the installer executable in Qlik Qlikview before versions May 2022 SR3 (12.70.20300) and May 2023 SR2 (12,80.20200) may allow an existing lower privileged user to cause code to be executed in the context of a Windows Administrator. - - -- [pawlokk/qlikview-poc-CVE-2024-29863](https://github.com/pawlokk/qlikview-poc-CVE-2024-29863) - ### CVE-2024-29868 (2024-06-24) Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Apache StreamPipes user self-registration and password recovery mechanism.\nThis allows an attacker to guess the recovery token in a reasonable time and thereby to take over the attacked user's account.\nThis issue affects Apache StreamPipes: from 0.69.0 through 0.93.0.\n\nUsers are recommended to upgrade to version 0.95.0, which fixes the issue.\n\n @@ -4725,7 +3120,6 @@ - [k3lpi3b4nsh33/CVE-2024-29973](https://github.com/k3lpi3b4nsh33/CVE-2024-29973) - [p0et08/CVE-2024-29973](https://github.com/p0et08/CVE-2024-29973) - [RevoltSecurities/CVE-2024-29973](https://github.com/RevoltSecurities/CVE-2024-29973) -- [skyrowalker/CVE-2024-29973](https://github.com/skyrowalker/CVE-2024-29973) ### CVE-2024-29988 (2024-04-09) @@ -4748,13 +3142,6 @@ - [fortra/CVE-2024-30051](https://github.com/fortra/CVE-2024-30051) -### CVE-2024-30052 (2024-06-11) - -Visual Studio Remote Code Execution Vulnerability - - -- [ynwarcs/CVE-2024-30052](https://github.com/ynwarcs/CVE-2024-30052) - ### CVE-2024-30056 (2024-05-25) Microsoft Edge (Chromium-based) Information Disclosure Vulnerability @@ -4762,14 +3149,6 @@ - [absholi7ly/Microsoft-Edge-Information-Disclosure](https://github.com/absholi7ly/Microsoft-Edge-Information-Disclosure) -### CVE-2024-30085 (2024-06-11) - -Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability - - -- [Adamkadaban/CVE-2024-30085](https://github.com/Adamkadaban/CVE-2024-30085) -- [murdok1982/Exploit-PoC-para-CVE-2024-30085](https://github.com/murdok1982/Exploit-PoC-para-CVE-2024-30085) - ### CVE-2024-30088 (2024-06-11) Windows Kernel Elevation of Privilege Vulnerability @@ -4777,18 +3156,9 @@ - [tykawaii98/CVE-2024-30088](https://github.com/tykawaii98/CVE-2024-30088) - [NextGenPentesters/CVE-2024-30088-](https://github.com/NextGenPentesters/CVE-2024-30088-) -- [Zombie-Kaiser/CVE-2024-30088-Windows-poc](https://github.com/Zombie-Kaiser/CVE-2024-30088-Windows-poc) - [exploits-forsale/collateral-damage](https://github.com/exploits-forsale/collateral-damage) -- [Admin9961/CVE-2024-30088](https://github.com/Admin9961/CVE-2024-30088) - [Justintroup85/exploits-forsale-collateral-damage](https://github.com/Justintroup85/exploits-forsale-collateral-damage) -### CVE-2024-30090 (2024-06-11) - -Microsoft Streaming Service Elevation of Privilege Vulnerability - - -- [Dor00tkit/CVE-2024-30090](https://github.com/Dor00tkit/CVE-2024-30090) - ### CVE-2024-30212 (2024-05-28) If a SCSI READ(10) command is initiated via USB using the largest LBA \n(0xFFFFFFFF) with it's default block size of 512 and a count of 1,\n\nthe first 512 byte of the 0x80000000 memory area is returned to the \nuser. If the block count is increased, the full RAM can be exposed.\n\nThe same method works to write to this memory area. If RAM contains \npointers, those can be - depending on the application - overwritten to\n\nreturn data from any other offset including Progam and Boot Flash. @@ -4876,27 +3246,6 @@ - [efekaanakkar/CVE-2024-30998](https://github.com/efekaanakkar/CVE-2024-30998) -### CVE-2024-31211 (2024-04-04) - -WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected. - - -- [Abdurahmon3236/-CVE-2024-31211](https://github.com/Abdurahmon3236/-CVE-2024-31211) - -### CVE-2024-31317 (2024-07-09) - -In multiple functions of ZygoteProcess.java, there is a possible way to achieve code execution as any app via WRITE_SECURE_SETTINGS due to unsafe deserialization. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. - - -- [fuhei/CVE-2024-31317](https://github.com/fuhei/CVE-2024-31317) - -### CVE-2024-31319 (2024-07-09) - -In updateNotificationChannelFromPrivilegedListener of NotificationManagerService.java, there is a possible cross-user data leak due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. - - -- [MssGmz99/fix-02-failure-CVE-2024-31319-CVE-2024-0039](https://github.com/MssGmz99/fix-02-failure-CVE-2024-31319-CVE-2024-0039) - ### CVE-2024-31351 (2024-05-17) Unrestricted Upload of File with Dangerous Type vulnerability in Copymatic Copymatic – AI Content Writer & Generator.This issue affects Copymatic – AI Content Writer & Generator: from n/a through 1.6. @@ -4975,13 +3324,6 @@ - [th3gokul/CVE-2024-31982](https://github.com/th3gokul/CVE-2024-31982) - [bigb0x/CVE-2024-31982](https://github.com/bigb0x/CVE-2024-31982) -### CVE-2024-31989 (2024-05-21) - -Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. It has been discovered that an unprivileged pod in a different namespace on the same cluster could connect to the Redis server on port 6379. Despite having installed the latest version of the VPC CNI plugin on the EKS cluster, it requires manual enablement through configuration to enforce network policies. This raises concerns that many clients might unknowingly have open access to their Redis servers. This vulnerability could lead to Privilege Escalation to the level of cluster controller, or to information leakage, affecting anyone who does not have strict access controls on their Redis instance. This issue has been patched in version(s) 2.8.19, 2.9.15 and 2.10.10. - - -- [vt0x78/CVE-2024-31989](https://github.com/vt0x78/CVE-2024-31989) - ### CVE-2024-32002 (2024-05-14) Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, repositories with submodules can be crafted in a way that exploits a bug in Git whereby it can be fooled into writing files not into the submodule's worktree but into a `.git/` directory. This allows writing a hook that will be executed while the clone operation is still running, giving the user no opportunity to inspect the code that is being executed. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. If symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. As always, it is best to avoid cloning repositories from untrusted sources. @@ -5033,24 +3375,11 @@ - [tobelight/cve_2024_32002](https://github.com/tobelight/cve_2024_32002) - [Basyaact/CVE-2024-32002-PoC_Chinese](https://github.com/Basyaact/CVE-2024-32002-PoC_Chinese) - [EQSTLab/git_rce](https://github.com/EQSTLab/git_rce) -- [sysonlai/CVE-2024-32002-hook](https://github.com/sysonlai/CVE-2024-32002-hook) -- [TSY244/CVE-2024-32002-git-rce-father-poc](https://github.com/TSY244/CVE-2024-32002-git-rce-father-poc) -- [TSY244/CVE-2024-32002-git-rce](https://github.com/TSY244/CVE-2024-32002-git-rce) -- [blackninja23/CVE-2024-32002](https://github.com/blackninja23/CVE-2024-32002) -- [daemon-reconfig/CVE-2024-32002](https://github.com/daemon-reconfig/CVE-2024-32002) -- [charlesgargasson/CVE-2024-32002](https://github.com/charlesgargasson/CVE-2024-32002) -- [NishanthAnand21/CVE-2024-32002-PoC](https://github.com/NishanthAnand21/CVE-2024-32002-PoC) - [FlojBoj/CVE-2024-32002](https://github.com/FlojBoj/CVE-2024-32002) -- [SpycioKon/CVE-2024-32002](https://github.com/SpycioKon/CVE-2024-32002) -- [chrisWalker11/running-CVE-2024-32002-locally-for-tesing](https://github.com/chrisWalker11/running-CVE-2024-32002-locally-for-tesing) - [sanan2004/CVE-2024-32002](https://github.com/sanan2004/CVE-2024-32002) - [Masamuneee/hook](https://github.com/Masamuneee/hook) - [Masamuneee/CVE-2024-32002-POC](https://github.com/Masamuneee/CVE-2024-32002-POC) - [th4s1s/CVE-2024-32002-PoC](https://github.com/th4s1s/CVE-2024-32002-PoC) -- [Julian-gmz/hook_CVE-2024-32002](https://github.com/Julian-gmz/hook_CVE-2024-32002) -- [grecosamuel/CVE-2024-32002](https://github.com/grecosamuel/CVE-2024-32002) -- [XiaomingX/cve-2024-32002-poc](https://github.com/XiaomingX/cve-2024-32002-poc) -- [jolibb55/donald](https://github.com/jolibb55/donald) ### CVE-2024-32004 (2024-05-14) @@ -5067,13 +3396,6 @@ - [huseyinstif/CVE-2024-32030-Nuclei-Template](https://github.com/huseyinstif/CVE-2024-32030-Nuclei-Template) -### CVE-2024-32104 (2024-04-15) - -Cross-Site Request Forgery (CSRF) vulnerability in XLPlugins NextMove Lite.This issue affects NextMove Lite: from n/a through 2.18.1.\n\n - - -- [Cerberus-HiproPlus/CVE-2024-32104](https://github.com/Cerberus-HiproPlus/CVE-2024-32104) - ### CVE-2024-32113 (2024-05-08) Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz.This issue affects Apache OFBiz: before 18.12.13.\n\nUsers are recommended to upgrade to version 18.12.13, which fixes the issue.\n\n @@ -5081,8 +3403,6 @@ - [RacerZ-fighting/CVE-2024-32113-POC](https://github.com/RacerZ-fighting/CVE-2024-32113-POC) - [Mr-xn/CVE-2024-32113](https://github.com/Mr-xn/CVE-2024-32113) -- [YongYe-Security/CVE-2024-32113](https://github.com/YongYe-Security/CVE-2024-32113) -- [MikeyPPPPPPPP/CVE-2024-32113](https://github.com/MikeyPPPPPPPP/CVE-2024-32113) ### CVE-2024-32136 (2024-04-15) @@ -5155,7 +3475,6 @@ - [Stuub/CVE-2024-32640-SQLI-MuraCMS](https://github.com/Stuub/CVE-2024-32640-SQLI-MuraCMS) - [0xYumeko/CVE-2024-32640-SQLI-MuraCMS](https://github.com/0xYumeko/CVE-2024-32640-SQLI-MuraCMS) - [sammings/CVE-2024-32640](https://github.com/sammings/CVE-2024-32640) -- [pizza-power/CVE-2024-32640](https://github.com/pizza-power/CVE-2024-32640) ### CVE-2024-32651 (2024-04-25) @@ -5165,13 +3484,6 @@ - [zcrosman/cve-2024-32651](https://github.com/zcrosman/cve-2024-32651) - [s0ck3t-s3c/CVE-2024-32651-changedetection-RCE](https://github.com/s0ck3t-s3c/CVE-2024-32651-changedetection-RCE) -### CVE-2024-32700 (2024-05-13) - -Unrestricted Upload of File with Dangerous Type vulnerability in Kognetiks Kognetiks Chatbot for WordPress.This issue affects Kognetiks Chatbot for WordPress: from n/a through 2.0.0. - - -- [nastar-id/CVE-2024-32700](https://github.com/nastar-id/CVE-2024-32700) - ### CVE-2024-32709 (2024-04-24) Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Plechev Andrey WP-Recall.This issue affects WP-Recall: from n/a through 16.26.5.\n\n @@ -5208,37 +3520,6 @@ - [paragbagul111/CVE-2024-33210](https://github.com/paragbagul111/CVE-2024-33210) -### CVE-2024-33231 (2024-11-18) - -Cross Site Scripting vulnerability in Ferozo Email version 1.1 allows a local attacker to execute arbitrary code via a crafted payload to the PDF preview component. - - -- [fdzdev/CVE-2024-33231](https://github.com/fdzdev/CVE-2024-33231) - -### CVE-2024-33297 (2025-01-10) - -Cross Site Scripting vulnerability in Microweber v.2.0.9 allows a remote attacker to execute arbitrary code via the campaign Name (Internal Name) field in the Add new campaign function - - -- [MathSabo/CVE-2024-33297](https://github.com/MathSabo/CVE-2024-33297) - -### CVE-2024-33298 (2025-01-10) - -Microweber Cross Site Scripting vulnerability in Microweber v.2.0.9 allows a remote attacker to execute arbitrary code via the create new backup function in the endpoint /admin/module/view?type=admin__backup - - -- [MathSabo/CVE-2024-33298](https://github.com/MathSabo/CVE-2024-33298) - -### CVE-2024-33299 (2025-01-10) - -Cross Site Scripting vulnerability in Microweber v.2.0.9 allows a remote attacker to execute arbitrary code via the First Name and Last Name parameters in the endpoint /admin/module/view?type=users - - -- [MathSabo/CVE-2024-33299](https://github.com/MathSabo/CVE-2024-33299) - -### CVE-2024-33352 -- [mmiszczyk/CVE-2024-33352](https://github.com/mmiszczyk/CVE-2024-33352) - ### CVE-2024-33453 (2024-10-17) Buffer Overflow vulnerability in esp-idf v.5.1 allows a remote attacker to obtain sensitive information via the externalId component. @@ -5277,13 +3558,6 @@ - [Grantzile/PoC-CVE-2024-33883](https://github.com/Grantzile/PoC-CVE-2024-33883) -### CVE-2024-33901 (-) - -Issue in KeePassXC 2.7.7 allows an attacker (who has the privileges of the victim) to recover some passwords stored in the .kdbx database via a memory dump. NOTE: the vendor disputes this because memory-management constraints make this unavoidable in the current design and other realistic designs. - - -- [gmikisilva/CVE-2024-33901-ProofOfConcept](https://github.com/gmikisilva/CVE-2024-33901-ProofOfConcept) - ### CVE-2024-33911 (2024-05-02) Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Weblizar School Management Pro.This issue affects School Management Pro: from n/a through 10.3.4.\n\n @@ -5303,28 +3577,8 @@ - [d0rb/CVE-2024-34102](https://github.com/d0rb/CVE-2024-34102) - [Chocapikk/CVE-2024-34102](https://github.com/Chocapikk/CVE-2024-34102) - [0x0d3ad/CVE-2024-34102](https://github.com/0x0d3ad/CVE-2024-34102) -- [cmsec423/CVE-2024-34102](https://github.com/cmsec423/CVE-2024-34102) -- [cmsec423/Magento-XXE-CVE-2024-34102](https://github.com/cmsec423/Magento-XXE-CVE-2024-34102) -- [jakabakos/CVE-2024-34102-CosmicSting-XXE-in-Adobe-Commerce-and-Magento](https://github.com/jakabakos/CVE-2024-34102-CosmicSting-XXE-in-Adobe-Commerce-and-Magento) -- [SamJUK/cosmicsting-validator](https://github.com/SamJUK/cosmicsting-validator) -- [unknownzerobit/poc](https://github.com/unknownzerobit/poc) -- [crynomore/CVE-2024-34102](https://github.com/crynomore/CVE-2024-34102) -- [bughuntar/CVE-2024-34102](https://github.com/bughuntar/CVE-2024-34102) -- [bughuntar/CVE-2024-34102-Python](https://github.com/bughuntar/CVE-2024-34102-Python) -- [Phantom-IN/CVE-2024-34102](https://github.com/Phantom-IN/CVE-2024-34102) -- [wubinworks/magento2-cosmic-sting-patch](https://github.com/wubinworks/magento2-cosmic-sting-patch) - [EQSTLab/CVE-2024-34102](https://github.com/EQSTLab/CVE-2024-34102) - [dream434/CVE-2024-34102](https://github.com/dream434/CVE-2024-34102) -- [bka/magento-cve-2024-34102-exploit-cosmicstring](https://github.com/bka/magento-cve-2024-34102-exploit-cosmicstring) -- [wubinworks/magento2-encryption-key-manager-cli](https://github.com/wubinworks/magento2-encryption-key-manager-cli) -- [mksundaram69/CVE-2024-34102](https://github.com/mksundaram69/CVE-2024-34102) - -### CVE-2024-34144 (2024-05-02) - -A sandbox bypass vulnerability involving crafted constructor bodies in Jenkins Script Security Plugin 1335.vf07d9ce377a_e and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM. - - -- [MXWXZ/CVE-2024-34144](https://github.com/MXWXZ/CVE-2024-34144) ### CVE-2024-34220 (-) @@ -5396,13 +3650,6 @@ - [vincentscode/CVE-2024-34313](https://github.com/vincentscode/CVE-2024-34313) -### CVE-2024-34329 (2024-07-22) - -Insecure permissions in Entrust Datacard XPS Card Printer Driver 8.4 and earlier allows unauthenticated attackers to execute arbitrary code as SYSTEM via a crafted DLL payload. - - -- [pamoutaf/CVE-2024-34329](https://github.com/pamoutaf/CVE-2024-34329) - ### CVE-2024-34350 (2024-05-09) Next.js is a React framework that can provide building blocks to create web applications. Prior to 13.5.1, an inconsistent interpretation of a crafted HTTP request meant that requests are treated as both a single request, and two separate requests by Next.js, leading to desynchronized responses. This led to a response queue poisoning vulnerability in the affected Next.js versions. For a request to be exploitable, the affected route also had to be making use of the [rewrites](https://nextjs.org/docs/app/api-reference/next-config-js/rewrites) feature in Next.js. The vulnerability is resolved in Next.js `13.5.1` and newer. @@ -5419,13 +3666,6 @@ - [avergnaud/Next.js_exploit_CVE-2024-34351](https://github.com/avergnaud/Next.js_exploit_CVE-2024-34351) - [God4n/nextjs-CVE-2024-34351-_exploit](https://github.com/God4n/nextjs-CVE-2024-34351-_exploit) -### CVE-2024-34361 (2024-07-05) - -Pi-hole is a DNS sinkhole that protects devices from unwanted content without installing any client-side software. A vulnerability in versions prior to 5.18.3 allows an authenticated user to make internal requests to the server via the `gravity_DownloadBlocklistFromUrl()` function. Depending on some circumstances, the vulnerability could lead to remote command execution. Version 5.18.3 contains a patch for this issue. - - -- [T0X1Cx/CVE-2024-34361-PiHole-SSRF-to-RCE](https://github.com/T0X1Cx/CVE-2024-34361-PiHole-SSRF-to-RCE) - ### CVE-2024-34452 (2024-06-21) CMSimple_XH 1.7.6 allows XSS by uploading a crafted SVG document. @@ -5486,35 +3726,12 @@ - [silent6trinity/CVE-2024-34582](https://github.com/silent6trinity/CVE-2024-34582) -### CVE-2024-34693 (2024-06-20) - -Improper Input Validation vulnerability in Apache Superset, allows for an authenticated attacker to create a MariaDB connection with local_infile enabled. If both the MariaDB server (off by default) and the local mysql client on the web server are set to allow for local infile, it's possible for the attacker to execute a specific MySQL/MariaDB SQL command that is able to read files from the server and insert their content on a MariaDB database table.This issue affects Apache Superset: before 3.1.3 and version 4.0.0\n\nUsers are recommended to upgrade to version 4.0.1 or 3.1.3, which fixes the issue.\n\n - - -- [mbadanoiu/CVE-2024-34693](https://github.com/mbadanoiu/CVE-2024-34693) -- [Mr-r00t11/CVE-2024-34693](https://github.com/Mr-r00t11/CVE-2024-34693) - ### CVE-2024-34716 (2024-05-14) PrestaShop is an open source e-commerce web application. A cross-site scripting (XSS) vulnerability that only affects PrestaShops with customer-thread feature flag enabled is present starting from PrestaShop 8.1.0 and prior to PrestaShop 8.1.6. When the customer thread feature flag is enabled through the front-office contact form, a hacker can upload a malicious file containing an XSS that will be executed when an admin opens the attached file in back office. The script injected can access the session and the security token, which allows it to perform any authenticated action in the scope of the administrator's right. This vulnerability is patched in 8.1.6. A workaround is to disable the customer-thread feature-flag. - [aelmokhtar/CVE-2024-34716](https://github.com/aelmokhtar/CVE-2024-34716) -- [0xDTC/Prestashop-CVE-2024-34716](https://github.com/0xDTC/Prestashop-CVE-2024-34716) - -### CVE-2024-34739 (2024-08-15) - -In shouldRestrictOverlayActivities of UsbProfileGroupSettingsManager.java, there is a possible escape from SUW due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. - - -- [uthrasri/CVE-2024-34739](https://github.com/uthrasri/CVE-2024-34739) - -### CVE-2024-34741 (2024-08-15) - -In setForceHideNonSystemOverlayWindowIfNeeded of WindowState.java, there is a possible way for message content to be visible on the screensaver while lock screen visibility settings are restricted by the user due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. - - -- [uthrasri/CVE-2024-34741](https://github.com/uthrasri/CVE-2024-34741) ### CVE-2024-34831 (2024-09-10) @@ -5537,20 +3754,6 @@ - [Gr-1m/CVE-2024-34958](https://github.com/Gr-1m/CVE-2024-34958) -### CVE-2024-35133 (2024-08-29) - -IBM Security Verify Access 10.0.0 through 10.0.8 OIDC Provider could allow a remote authenticated attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. - - -- [Ozozuz/Ozozuz-IBM-Security-Verify-CVE-2024-35133](https://github.com/Ozozuz/Ozozuz-IBM-Security-Verify-CVE-2024-35133) - -### CVE-2024-35176 (2024-05-16) - - REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `<`s in an attribute value. Those who need to parse untrusted XMLs may be impacted to this vulnerability. The REXML gem 3.2.7 or later include the patch to fix this vulnerability. As a workaround, don't parse untrusted XMLs. - - -- [SpiralBL0CK/CVE-2024-35176](https://github.com/SpiralBL0CK/CVE-2024-35176) - ### CVE-2024-35205 (-) The WPS Office (aka cn.wps.moffice_eng) application before 17.0.0 for Android fails to properly sanitize file names before processing them through external application interactions, leading to a form of path traversal. This potentially enables any application to dispatch a crafted library file, aiming to overwrite an existing native library utilized by WPS Office. Successful exploitation could result in the execution of arbitrary commands under the guise of WPS Office's application ID. @@ -5558,30 +3761,6 @@ - [cyb3r-w0lf/Dirty_Stream-Android-POC](https://github.com/cyb3r-w0lf/Dirty_Stream-Android-POC) -### CVE-2024-35242 (2024-06-10) - -Composer is a dependency manager for PHP. On the 2.x branch prior to versions 2.2.24 and 2.7.7, the `composer install` command running inside a git/hg repository which has specially crafted branch names can lead to command injection. This requires cloning untrusted repositories. Patches are available in version 2.2.24 for 2.2 LTS or 2.7.7 for mainline. As a workaround, avoid cloning potentially compromised repositories.\n - - -- [KKkai0315/CVE-2024-35242](https://github.com/KKkai0315/CVE-2024-35242) - -### CVE-2024-35250 (2024-06-11) - -Windows Kernel-Mode Driver Elevation of Privilege Vulnerability - - -- [varwara/CVE-2024-35250](https://github.com/varwara/CVE-2024-35250) -- [ro0tmylove/CVE-2024-35250-BOF](https://github.com/ro0tmylove/CVE-2024-35250-BOF) -- [yinsel/CVE-2024-35250-BOF](https://github.com/yinsel/CVE-2024-35250-BOF) -- [Brentlyw/GiveMeKernel](https://github.com/Brentlyw/GiveMeKernel) - -### CVE-2024-35286 (2024-10-21) - -A vulnerability in NuPoint Messenger (NPM) of Mitel MiCollab through 9.8.0.33 allows an unauthenticated attacker to conduct a SQL injection attack due to insufficient sanitization of user input. A successful exploit could allow an attacker to access sensitive information and execute arbitrary database and management operations. - - -- [lu4m575/CVE-2024-35286_scan.nse](https://github.com/lu4m575/CVE-2024-35286_scan.nse) - ### CVE-2024-35315 (2024-10-21) A vulnerability in the Desktop Client of Mitel MiCollab through 9.7.1.110, and MiVoice Business Solution Virtual Instance (MiVB SVI) 1.0.0.25, could allow an authenticated attacker to conduct a privilege escalation attack due to improper file validation. A successful exploit could allow an attacker to run arbitrary code with elevated privileges. @@ -5631,13 +3810,6 @@ - [cyberaz0r/Typecho-Multiple-Vulnerabilities](https://github.com/cyberaz0r/Typecho-Multiple-Vulnerabilities) -### CVE-2024-35584 (2024-10-15) - -SQL injection vulnerabilities were discovered in Ajax.php, ForWindow.php, ForExport.php, Modules.php, functions/HackingLogFnc.php in OpenSis Community Edition 9.1 to 8.0, and possibly earlier versions. It is possible for an authenticated user to perform SQL Injection due to the lack to sanitisation. The application takes arbitrary value from "X-Forwarded-For" header and appends it to a SQL INSERT statement directly, leading to SQL Injection. - - -- [whwhwh96/CVE-2024-35584](https://github.com/whwhwh96/CVE-2024-35584) - ### CVE-2024-36079 (-) An issue was discovered in Vaultize 21.07.27. When uploading files, there is no check that the filename parameter is correct. As a result, a temporary file will be created outside the specified directory when the file is downloaded. To exploit this, an authenticated user would upload a file with an incorrect file name, and then download it. @@ -5657,22 +3829,9 @@ GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions.\n\nThe GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code.\n\nVersions 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed. -- [bigb0x/CVE-2024-36401](https://github.com/bigb0x/CVE-2024-36401) -- [Niuwoo/CVE-2024-36401](https://github.com/Niuwoo/CVE-2024-36401) -- [RevoltSecurities/CVE-2024-36401](https://github.com/RevoltSecurities/CVE-2024-36401) -- [Mr-xn/CVE-2024-36401](https://github.com/Mr-xn/CVE-2024-36401) -- [jakabakos/CVE-2024-36401-GeoServer-RCE](https://github.com/jakabakos/CVE-2024-36401-GeoServer-RCE) -- [ahisec/geoserver-](https://github.com/ahisec/geoserver-) -- [Chocapikk/CVE-2024-36401](https://github.com/Chocapikk/CVE-2024-36401) -- [yisas93/CVE-2024-36401-PoC](https://github.com/yisas93/CVE-2024-36401-PoC) - [justin-p/geoexplorer](https://github.com/justin-p/geoexplorer) - [daniellowrie/CVE-2024-36401-PoC](https://github.com/daniellowrie/CVE-2024-36401-PoC) - [punitdarji/GeoServer-CVE-2024-36401](https://github.com/punitdarji/GeoServer-CVE-2024-36401) -- [netuseradministrator/CVE-2024-36401](https://github.com/netuseradministrator/CVE-2024-36401) -- [kkhackz0013/CVE-2024-36401](https://github.com/kkhackz0013/CVE-2024-36401) -- [thestar0/CVE-2024-36401-WoodpeckerPlugin](https://github.com/thestar0/CVE-2024-36401-WoodpeckerPlugin) -- [XiaomingX/cve-2024-36401-poc](https://github.com/XiaomingX/cve-2024-36401-poc) -- [0x0d3ad/CVE-2024-36401](https://github.com/0x0d3ad/CVE-2024-36401) ### CVE-2024-36416 (2024-06-10) @@ -5681,13 +3840,6 @@ - [kva55/CVE-2024-36416](https://github.com/kva55/CVE-2024-36416) -### CVE-2024-36424 (2024-08-06) - -K7RKScan.sys in K7 Ultimate Security before 17.0.2019 allows local users to cause a denial of service (BSOD) because of a NULL pointer dereference. - - -- [secunnix/CVE-2024-36424](https://github.com/secunnix/CVE-2024-36424) - ### CVE-2024-36527 (2024-06-17) puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal. Attackers can exploit the URL parameter using the file protocol to read sensitive information from the server. @@ -5695,13 +3847,6 @@ - [bigb0x/CVE-2024-36527](https://github.com/bigb0x/CVE-2024-36527) -### CVE-2024-36539 (2024-07-24) - -Insecure permissions in contour v1.28.3 allows attackers to access sensitive data and escalate privileges by obtaining the service account's token. - - -- [Abdurahmon3236/CVE-2024-36539](https://github.com/Abdurahmon3236/CVE-2024-36539) - ### CVE-2024-36821 (2024-06-11) Insecure permissions in Linksys Velop WiFi 5 (WHW01v1) 1.1.13.202617 allows attackers to escalate privileges from Guest to root. @@ -5709,13 +3854,6 @@ - [IvanGlinkin/CVE-2024-36821](https://github.com/IvanGlinkin/CVE-2024-36821) -### CVE-2024-36823 (-) - -The encrypt() function of Ninja Core v7.0.0 was discovered to use a weak cryptographic algorithm, leading to a possible leakage of sensitive information. - - -- [JAckLosingHeart/CVE-2024-36823-POC](https://github.com/JAckLosingHeart/CVE-2024-36823-POC) - ### CVE-2024-36837 (2024-06-05) SQL Injection vulnerability in CRMEB v.5.2.2 allows a remote attacker to obtain sensitive information via the getProductList function in the ProductController.php file. @@ -5724,13 +3862,6 @@ - [phtcloud-dev/CVE-2024-36837](https://github.com/phtcloud-dev/CVE-2024-36837) - [lhc321-source/CVE-2024-36837](https://github.com/lhc321-source/CVE-2024-36837) -### CVE-2024-36840 (2024-06-12) - -SQL Injection vulnerability in Boelter Blue System Management v.1.3 allows a remote attacker to execute arbitrary code and obtain sensitive information via the id parameter to news_details.php and location_details.php; and the section parameter to services.php. - - -- [theexploiters/CVE-2024-36840-Exploit](https://github.com/theexploiters/CVE-2024-36840-Exploit) - ### CVE-2024-36842 - [abbiy/CVE-2024-36842-Backdooring-Oncord-Android-Sterio-](https://github.com/abbiy/CVE-2024-36842-Backdooring-Oncord-Android-Sterio-) @@ -5739,27 +3870,14 @@ Micro-Star International Z-series motherboards (Z590, Z490, and Z790) and B-series motherboards (B760, B560, B660, and B460) with firmware 7D25v14, 7D25v17 to 7D25v19, and 7D25v1A to 7D25v1H was discovered to contain a write-what-where condition in the in the SW handler for SMI 0xE3. Motherboard's with the following chipsets are affected: Intel 300, Intel 400, Intel 500, Intel 600, Intel 700, AMD 300, AMD 400, AMD 500, AMD 600 and AMD 700. -- [jjensn/CVE-2024-36877](https://github.com/jjensn/CVE-2024-36877) - [CERTologists/POC-CVE-2024-36877](https://github.com/CERTologists/POC-CVE-2024-36877) -### CVE-2024-36991 (2024-07-01) - -In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows. - - -- [bigb0x/CVE-2024-36991](https://github.com/bigb0x/CVE-2024-36991) -- [Mr-xn/CVE-2024-36991](https://github.com/Mr-xn/CVE-2024-36991) -- [th3gokul/CVE-2024-36991](https://github.com/th3gokul/CVE-2024-36991) -- [sardine-web/CVE-2024-36991](https://github.com/sardine-web/CVE-2024-36991) -- [Cappricio-Securities/CVE-2024-36991](https://github.com/Cappricio-Securities/CVE-2024-36991) - ### CVE-2024-37032 (2024-05-31) Ollama before 0.1.34 does not validate the format of the digest (sha256 with 64 hex digits) when getting the model path, and thus mishandles the TestGetBlobsPath test cases such as fewer than 64 hex digits, more than 64 hex digits, or an initial ../ substring. - [Bi0x/CVE-2024-37032](https://github.com/Bi0x/CVE-2024-37032) -- [ahboon/CVE-2024-37032-scanner](https://github.com/ahboon/CVE-2024-37032-scanner) ### CVE-2024-37051 (2024-06-10) @@ -5769,16 +3887,6 @@ - [LeadroyaL/CVE-2024-37051-EXP](https://github.com/LeadroyaL/CVE-2024-37051-EXP) - [mrblackstar26/CVE-2024-37051](https://github.com/mrblackstar26/CVE-2024-37051) -### CVE-2024-37081 (2024-06-18) - -The vCenter Server contains multiple local privilege escalation vulnerabilities due to misconfiguration of sudo. An authenticated local user with non-administrative privileges may exploit these issues to elevate privileges to root on vCenter Server Appliance. - - -- [mbadanoiu/CVE-2024-37081](https://github.com/mbadanoiu/CVE-2024-37081) -- [Mr-r00t11/CVE-2024-37081](https://github.com/Mr-r00t11/CVE-2024-37081) -- [CERTologists/-CVE-2024-37081-POC](https://github.com/CERTologists/-CVE-2024-37081-POC) -- [CERTologists/Modified-CVE-2024-37081-POC](https://github.com/CERTologists/Modified-CVE-2024-37081-POC) - ### CVE-2024-37084 (2024-07-25) In Spring Cloud Data Flow versions prior to 2.11.4,  a malicious user who has access to the Skipper server api can use a crafted upload request to write an arbitrary file to any location on the file system which could lead to compromising the server @@ -5786,35 +3894,14 @@ - [Kayiyan/CVE-2024-37084-Poc](https://github.com/Kayiyan/CVE-2024-37084-Poc) - [vuhz/CVE-2024-37084](https://github.com/vuhz/CVE-2024-37084) -- [Ly4j/CVE-2024-37084-Exp](https://github.com/Ly4j/CVE-2024-37084-Exp) -- [A0be/CVE-2024-37084-Exp](https://github.com/A0be/CVE-2024-37084-Exp) -- [XiaomingX/cve-2024-37084-Poc](https://github.com/XiaomingX/cve-2024-37084-Poc) ### CVE-2024-37085 (2024-06-25) VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD. -- [mahmutaymahmutay/CVE-2024-37085](https://github.com/mahmutaymahmutay/CVE-2024-37085) -- [Florian-Hoth/CVE-2024-37085-RCE-POC](https://github.com/Florian-Hoth/CVE-2024-37085-RCE-POC) -- [WTN-arny/Vmware-ESXI](https://github.com/WTN-arny/Vmware-ESXI) - [WTN-arny/CVE-2024-37085](https://github.com/WTN-arny/CVE-2024-37085) -### CVE-2024-37147 (2024-07-10) - -GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An authenticated user can attach a document to any item, even if the user has no write access on it. Upgrade to 10.0.16. - - -- [0xmupa/CVE-2024-37147-PoC](https://github.com/0xmupa/CVE-2024-37147-PoC) - -### CVE-2024-37383 (2024-06-07) - -Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via SVG animate attributes. - - -- [bartfroklage/CVE-2024-37383-POC](https://github.com/bartfroklage/CVE-2024-37383-POC) -- [amirzargham/CVE-2024-37383-exploit](https://github.com/amirzargham/CVE-2024-37383-exploit) - ### CVE-2024-37393 (2024-06-10) Multiple LDAP injections vulnerabilities exist in SecurEnvoy MFA before 9.4.514 due to improper validation of user-supplied input. An unauthenticated remote attacker could exfiltrate data from Active Directory through blind LDAP injection attacks against the DESKTOP service exposed on the /secserver HTTP endpoint. This may include ms-Mcs-AdmPwd, which has a cleartext password for the Local Administrator Password Solution (LAPS) feature. @@ -5828,7 +3915,6 @@ - [carsonchan12345/CVE-2024-37726-MSI-Center-Local-Privilege-Escalation](https://github.com/carsonchan12345/CVE-2024-37726-MSI-Center-Local-Privilege-Escalation) -- [NextGenPentesters/CVE-2024-37726-MSI-Center-Local-Privilege-Escalation](https://github.com/NextGenPentesters/CVE-2024-37726-MSI-Center-Local-Privilege-Escalation) ### CVE-2024-37742 (2024-06-25) @@ -5844,41 +3930,6 @@ - [crumbledwall/CVE-2024-37759_PoC](https://github.com/crumbledwall/CVE-2024-37759_PoC) -### CVE-2024-37762 (2024-07-01) - -MachForm up to version 21 is affected by an authenticated unrestricted file upload which leads to a remote code execution. - - -- [Atreb92/cve-2024-37762](https://github.com/Atreb92/cve-2024-37762) - -### CVE-2024-37763 (2024-07-01) - -MachForm up to version 19 is affected by an unauthenticated stored cross-site scripting which affects users with valid sessions whom can view compiled forms results. - - -- [Atreb92/cve-2024-37763](https://github.com/Atreb92/cve-2024-37763) - -### CVE-2024-37764 (2024-07-01) - -MachForm up to version 19 is affected by an authenticated stored cross-site scripting. - - -- [Atreb92/cve-2024-37764](https://github.com/Atreb92/cve-2024-37764) - -### CVE-2024-37765 (2024-07-01) - -Machform up to version 19 is affected by an authenticated Blind SQL injection in the user account settings page. - - -- [Atreb92/cve-2024-37765](https://github.com/Atreb92/cve-2024-37765) - -### CVE-2024-37770 (2024-07-10) - -14Finger v1.1 was discovered to contain a remote command execution (RCE) vulnerability in the fingerprint function. This vulnerability allows attackers to execute arbitrary commands via a crafted payload. - - -- [k3ppf0r/CVE-2024-37770](https://github.com/k3ppf0r/CVE-2024-37770) - ### CVE-2024-37791 (2024-06-18) DuxCMS3 v3.1.3 was discovered to contain a SQL injection vulnerability via the keyword parameter at /article/Content/index?class_id. @@ -5914,13 +3965,6 @@ - [hnytgl/CVE-2024-38036](https://github.com/hnytgl/CVE-2024-38036) -### CVE-2024-38041 (2024-07-09) - -Windows Kernel Information Disclosure Vulnerability - - -- [varwara/CVE-2024-38041](https://github.com/varwara/CVE-2024-38041) - ### CVE-2024-38063 (2024-08-13) Windows TCP/IP Remote Code Execution Vulnerability @@ -5947,33 +3991,14 @@ - [Faizan-Khanx/CVE-2024-38063](https://github.com/Faizan-Khanx/CVE-2024-38063) - [ArenaldyP/CVE-2024-38063-Medium](https://github.com/ArenaldyP/CVE-2024-38063-Medium) - [lnx-dvlpr/cve-2024-38063](https://github.com/lnx-dvlpr/cve-2024-38063) -- [becrevex/CVE-2024-38063](https://github.com/becrevex/CVE-2024-38063) -- [idkwastaken/CVE-2024-38063](https://github.com/idkwastaken/CVE-2024-38063) -- [thanawee321/CVE-2024-38063](https://github.com/thanawee321/CVE-2024-38063) -- [AliHj98/cve-2024-38063-Anonyvader](https://github.com/AliHj98/cve-2024-38063-Anonyvader) -- [Dragkob/CVE-2024-38063](https://github.com/Dragkob/CVE-2024-38063) -- [selenagomez25/CVE-2024-38063](https://github.com/selenagomez25/CVE-2024-38063) -- [Laukage/Windows-CVE-2024-38063](https://github.com/Laukage/Windows-CVE-2024-38063) -- [jamesbishop785/CVE-2024-38063](https://github.com/jamesbishop785/CVE-2024-38063) ### CVE-2024-38077 (2024-07-09) Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability -- [SecStarBot/CVE-2024-38077-POC](https://github.com/SecStarBot/CVE-2024-38077-POC) -- [qi4L/CVE-2024-38077](https://github.com/qi4L/CVE-2024-38077) -- [Sec-Link/CVE-2024-38077](https://github.com/Sec-Link/CVE-2024-38077) -- [murphysecurity/RDL-detect](https://github.com/murphysecurity/RDL-detect) -- [Wlibang/CVE-2024-38077](https://github.com/Wlibang/CVE-2024-38077) -- [psl-b/CVE-2024-38077-check](https://github.com/psl-b/CVE-2024-38077-check) -- [zhuxi1965/CVE-2024-38077-RDLCheck](https://github.com/zhuxi1965/CVE-2024-38077-RDLCheck) -- [lworld0x00/CVE-2024-38077-notes](https://github.com/lworld0x00/CVE-2024-38077-notes) -- [atlassion/CVE-2024-38077-check](https://github.com/atlassion/CVE-2024-38077-check) - [BBD-YZZ/fyne-gui](https://github.com/BBD-YZZ/fyne-gui) - [Destiny0991/check_38077](https://github.com/Destiny0991/check_38077) -- [mrmtwoj/CVE-2024-38077](https://github.com/mrmtwoj/CVE-2024-38077) -- [amfg145/CVE-2024-38077](https://github.com/amfg145/CVE-2024-38077) ### CVE-2024-38080 (2024-07-09) @@ -5982,20 +4007,6 @@ - [pwndorei/CVE-2024-38080](https://github.com/pwndorei/CVE-2024-38080) -### CVE-2024-38100 (2024-07-09) - -Windows File Explorer Elevation of Privilege Vulnerability - - -- [Florian-Hoth/CVE-2024-38100-RCE-POC](https://github.com/Florian-Hoth/CVE-2024-38100-RCE-POC) - -### CVE-2024-38124 (2024-10-08) - -Windows Netlogon Elevation of Privilege Vulnerability - - -- [tadash10/Detailed-Analysis-and-Mitigation-Strategies-for-CVE-2024-38124-and-CVE-2024-43468](https://github.com/tadash10/Detailed-Analysis-and-Mitigation-Strategies-for-CVE-2024-38124-and-CVE-2024-43468) - ### CVE-2024-38127 (2024-08-13) Windows Hyper-V Elevation of Privilege Vulnerability @@ -6017,13 +4028,6 @@ - [vx7z/CVE-2024-38189](https://github.com/vx7z/CVE-2024-38189) -### CVE-2024-38193 (2024-08-13) - -Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability - - -- [killvxk/CVE-2024-38193-Nephster](https://github.com/killvxk/CVE-2024-38193-Nephster) - ### CVE-2024-38200 (2024-08-08) Microsoft Office Spoofing Vulnerability @@ -6045,20 +4049,11 @@ - [vin01/poc-cve-2024-38396](https://github.com/vin01/poc-cve-2024-38396) -### CVE-2024-38472 (2024-07-01) - -SSRF in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content \nUsers are recommended to upgrade to version 2.4.60 which fixes this issue.  Note: Existing configurations that access UNC paths will have to configure new directive "UNCList" to allow access during request processing. - - -- [Abdurahmon3236/CVE-2024-38472](https://github.com/Abdurahmon3236/CVE-2024-38472) -- [mrmtwoj/apache-vulnerability-testing](https://github.com/mrmtwoj/apache-vulnerability-testing) - ### CVE-2024-38473 (2024-07-01) Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests.\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue. -- [Abdurahmon3236/CVE-2024-38473](https://github.com/Abdurahmon3236/CVE-2024-38473) - [juanschallibaum/CVE-2024-38473-Nuclei-Template](https://github.com/juanschallibaum/CVE-2024-38473-Nuclei-Template) ### CVE-2024-38475 (2024-07-01) @@ -6067,7 +4062,6 @@ - [p0in7s/CVE-2024-38475](https://github.com/p0in7s/CVE-2024-38475) -- [soltanali0/CVE-2024-38475](https://github.com/soltanali0/CVE-2024-38475) ### CVE-2024-38526 (2024-06-25) @@ -6076,13 +4070,6 @@ - [putget/pollypull](https://github.com/putget/pollypull) -### CVE-2024-38537 (2024-07-02) - -Fides is an open-source privacy engineering platform. `fides.js`, a client-side script used to interact with the consent management features of Fides, used the `polyfill.io` domain in a very limited edge case, when it detected a legacy browser such as IE11 that did not support the fetch standard. Therefore it was possible for users of legacy, pre-2017 browsers who navigate to a page serving `fides.js` to download and execute malicious scripts from the `polyfill.io` domain when the domain was compromised and serving malware. No exploitation of `fides.js` via `polyfill.io` has been identified as of time of publication.\n\nThe vulnerability has been patched in Fides version `2.39.1`. Users are advised to upgrade to this version or later to secure their systems against this threat. On Thursday, June 27, 2024, Cloudflare and Namecheap intervened at a domain level to ensure `polyfill.io` and its subdomains could not resolve to the compromised service, rendering this vulnerability unexploitable. Prior to the domain level intervention, there were no server-side workarounds and the confidentiality, integrity, and availability impacts of this vulnerability were high. Clients could ensure they were not affected by using a modern browser that supported the fetch standard. - - -- [Havoc10-sw/Detect_polyfill_CVE-2024-38537-](https://github.com/Havoc10-sw/Detect_polyfill_CVE-2024-38537-) - ### CVE-2024-38793 (2024-08-29) Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PriceListo Best Restaurant Menu by PriceListo allows SQL Injection.This issue affects Best Restaurant Menu by PriceListo: from n/a through 1.4.1. @@ -6097,24 +4084,6 @@ - [startsw1th/cve-2024-38816-demo](https://github.com/startsw1th/cve-2024-38816-demo) - [WULINPIN/CVE-2024-38816-PoC](https://github.com/WULINPIN/CVE-2024-38816-PoC) -- [Galaxy-system/cve-2024-38816](https://github.com/Galaxy-system/cve-2024-38816) -- [Anthony1078/App-vulnerable](https://github.com/Anthony1078/App-vulnerable) -- [wdragondragon/spring-framework](https://github.com/wdragondragon/spring-framework) - -### CVE-2024-38819 (2024-12-19) - -Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running. - - -- [masa42/CVE-2024-38819-POC](https://github.com/masa42/CVE-2024-38819-POC) -- [GhostS3c/CVE-2024-38819](https://github.com/GhostS3c/CVE-2024-38819) - -### CVE-2024-38821 (2024-10-28) - -Spring WebFlux applications that have Spring Security authorization rules on static resources can be bypassed under certain circumstances.\n\nFor this to impact an application, all of the following must be true:\n\n * It must be a WebFlux application\n * It must be using Spring's static resources support\n * It must have a non-permitAll authorization rule applied to the static resources support - - -- [mouadk/cve-2024-38821](https://github.com/mouadk/cve-2024-38821) ### CVE-2024-38856 (2024-08-05) @@ -6122,35 +4091,10 @@ - [securelayer7/CVE-2024-38856_Scanner](https://github.com/securelayer7/CVE-2024-38856_Scanner) -- [ThatNotEasy/CVE-2024-38856](https://github.com/ThatNotEasy/CVE-2024-38856) - [Praison001/CVE-2024-38856-ApacheOfBiz](https://github.com/Praison001/CVE-2024-38856-ApacheOfBiz) - [0x20c/CVE-2024-38856-EXP](https://github.com/0x20c/CVE-2024-38856-EXP) - [emanueldosreis/CVE-2024-38856](https://github.com/emanueldosreis/CVE-2024-38856) - [BBD-YZZ/CVE-2024-38856-RCE](https://github.com/BBD-YZZ/CVE-2024-38856-RCE) -- [XiaomingX/cve-2024-38856-poc](https://github.com/XiaomingX/cve-2024-38856-poc) -- [FakesiteSecurity/CVE-2024-38856_Scen](https://github.com/FakesiteSecurity/CVE-2024-38856_Scen) - -### CVE-2024-38998 (2024-07-01) - -jrburke requirejs v2.3.6 was discovered to contain a prototype pollution via the function config. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties. - - -- [z3ldr1/PP_CVE-2024-38998](https://github.com/z3ldr1/PP_CVE-2024-38998) -- [cesarbtakeda/PP_CVE-2024-38998](https://github.com/cesarbtakeda/PP_CVE-2024-38998) - -### CVE-2024-39031 (2024-07-09) - -In Silverpeas Core <= 6.3.5, in Mes Agendas, a user can create new events and add them to their calendar. Additionally, users can invite others from the same domain, including administrators, to these events. A standard user can inject an XSS payload into the "Titre" and "Description" fields when creating an event and then add the administrator or any user to the event. When the invited user (victim) views their own profile, the payload will be executed on their side, even if they do not click on the event. - - -- [toneemarqus/CVE-2024-39031](https://github.com/toneemarqus/CVE-2024-39031) - -### CVE-2024-39069 (2024-07-09) - -An issue in ifood Order Manager v3.35.5 'Gestor de Peddios.exe' allows attackers to execute arbitrary code via a DLL hijacking attack. - - -- [AungSoePaing/CVE-2024-39069](https://github.com/AungSoePaing/CVE-2024-39069) ### CVE-2024-39081 (2024-09-18) @@ -6159,48 +4103,6 @@ - [Amirasaiyad/BLE-TPMS](https://github.com/Amirasaiyad/BLE-TPMS) -### CVE-2024-39090 (2024-07-18) - -The PHPGurukul Online Shopping Portal Project version 2.0 contains a vulnerability that allows Cross-Site Request Forgery (CSRF) to lead to Stored Cross-Site Scripting (XSS). An attacker can exploit this vulnerability to execute arbitrary JavaScript code in the context of a user's session, potentially leading to account takeover. - - -- [ghostwirez/CVE-2024-39090-PoC](https://github.com/ghostwirez/CVE-2024-39090-PoC) - -### CVE-2024-39123 (2024-07-19) - -In janeczku Calibre-Web 0.6.0 to 0.6.21, the edit_book_comments function is vulnerable to Cross Site Scripting (XSS) due to improper sanitization performed by the clean_string function. The vulnerability arises from the way the clean_string function handles HTML sanitization. - - -- [theexploiters/CVE-2024-39123-Exploit](https://github.com/theexploiters/CVE-2024-39123-Exploit) - -### CVE-2024-39203 (2024-07-08) - -A cross-site scripting (XSS) vulnerability in the Backend Theme Management module of Z-BlogPHP v1.7.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. - - -- [5r1an/CVE-2024-39203](https://github.com/5r1an/CVE-2024-39203) - -### CVE-2024-39205 (2024-10-28) - -An issue in pyload-ng v0.5.0b3.dev85 running under python3.11 or below allows attackers to execute arbitrary code via a crafted HTTP request. - - -- [Marven11/CVE-2024-39205-Pyload-RCE](https://github.com/Marven11/CVE-2024-39205-Pyload-RCE) - -### CVE-2024-39210 (2024-07-05) - -Best House Rental Management System v1.0 was discovered to contain an arbitrary file read vulnerability via the Page parameter at index.php. This vulnerability allows attackers to read arbitrary PHP files and access other sensitive information within the application. - - -- [KRookieSec/CVE-2024-39210](https://github.com/KRookieSec/CVE-2024-39210) - -### CVE-2024-39211 (2024-07-04) - -Kaiten 57.128.8 allows remote attackers to enumerate user accounts via a crafted POST request, because a login response contains a user_email field only if the user account exists. - - -- [artemy-ccrsky/CVE-2024-39211](https://github.com/artemy-ccrsky/CVE-2024-39211) - ### CVE-2024-39248 (2024-07-03) A cross-site scripting (XSS) vulnerability in SimpCMS v0.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title field at /admin.php. @@ -6208,30 +4110,6 @@ - [jasonthename/CVE-2024-39248](https://github.com/jasonthename/CVE-2024-39248) -### CVE-2024-39250 (2024-07-22) - -EfroTech Timetrax v8.3 was discovered to contain an unauthenticated SQL injection vulnerability via the q parameter in the search web interface. - - -- [efrann/CVE-2024-39250](https://github.com/efrann/CVE-2024-39250) - -### CVE-2024-39304 (2024-07-26) - -ChurchCRM is an open-source church management system. Versions of the application prior to 5.9.2 are vulnerable to an authenticated SQL injection due to an improper sanitization of user input. Authentication is required, but no elevated privileges are necessary. This allows attackers to inject SQL statements directly into the database query due to inadequate sanitization of the EID parameter in in a GET request to `/GetText.php`. Version 5.9.2 patches the issue. - - -- [apena-ba/CVE-2024-39304](https://github.com/apena-ba/CVE-2024-39304) - -### CVE-2024-39306 -- [apena-ba/CVE-2024-39306](https://github.com/apena-ba/CVE-2024-39306) - -### CVE-2024-39614 (2024-07-10) - -An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. get_supported_language_variant() was subject to a potential denial-of-service attack when used with very long strings containing specific characters. - - -- [Abdurahmon3236/-CVE-2024-39614](https://github.com/Abdurahmon3236/-CVE-2024-39614) - ### CVE-2024-39689 (2024-07-05) Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi starting in 2021.05.30 and prior to 2024.07.4 recognized root certificates from `GLOBALTRUST`. Certifi 2024.07.04 removes root certificates from `GLOBALTRUST` from the root store. These are in the process of being removed from Mozilla's trust store. `GLOBALTRUST`'s root certificates are being removed pursuant to an investigation which identified "long-running and unresolved compliance issues." @@ -6239,72 +4117,12 @@ - [roy-aladin/InfraTest](https://github.com/roy-aladin/InfraTest) -### CVE-2024-39700 (2024-07-16) - -JupyterLab extension template is a `copier` template for JupyterLab extensions. Repositories created using this template with `test` option include `update-integration-tests.yml` workflow which has an RCE vulnerability. Extension authors hosting their code on GitHub are urged to upgrade the template to the latest version. Users who made changes to `update-integration-tests.yml`, accept overwriting of this file and re-apply your changes later. Users may wish to temporarily disable GitHub Actions while working on the upgrade. We recommend rebasing all open pull requests from untrusted users as actions may run using the version from the `main` branch at the time when the pull request was created. Users who are upgrading from template version prior to 4.3.0 may wish to leave out proposed changes to the release workflow for now as it requires additional configuration. - - -- [LOURC0D3/CVE-2024-39700-PoC](https://github.com/LOURC0D3/CVE-2024-39700-PoC) - -### CVE-2024-39844 (2024-07-03) - -In ZNC before 1.9.1, remote code execution can occur in modtcl via a KICK. - - -- [ph1ns/CVE-2024-39844](https://github.com/ph1ns/CVE-2024-39844) - -### CVE-2024-39908 (2024-07-16) - - REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `<`, `0` and `%>`. If you need to parse untrusted XMLs, you many be impacted to these vulnerabilities. The REXML gem 3.3.2 or later include the patches to fix these vulnerabilities. Users are advised to upgrade. Users unable to upgrade should avoid parsing untrusted XML strings. - - -- [SpiralBL0CK/CVE-2024-39908](https://github.com/SpiralBL0CK/CVE-2024-39908) - -### CVE-2024-39914 (2024-07-12) - -FOG is a cloning/imaging/rescue suite/inventory management system. Prior to 1.5.10.34, packages/web/lib/fog/reportmaker.class.php in FOG was affected by a command injection via the filename parameter to /fog/management/export.php. This vulnerability is fixed in 1.5.10.34. - - -- [9874621368/FOG-Project](https://github.com/9874621368/FOG-Project) - ### CVE-2024-39929 (2024-07-04) Exim through 4.97.1 misparses a multiline RFC 2231 header filename, and thus remote attackers can bypass a $mime_filename extension-blocking protection mechanism, and potentially deliver executable attachments to the mailboxes of end users. - [rxerium/CVE-2024-39929](https://github.com/rxerium/CVE-2024-39929) -- [michael-david-fry/CVE-2024-39929](https://github.com/michael-david-fry/CVE-2024-39929) - -### CVE-2024-39943 (2024-07-04) - -rejetto HFS (aka HTTP File Server) 3 before 0.52.10 on Linux, UNIX, and macOS allows OS command execution by remote authenticated users (if they have Upload permissions). This occurs because a shell is used to execute df (i.e., with execSync instead of spawnSync in child_process in Node.js). - - -- [truonghuuphuc/CVE-2024-39943-Poc](https://github.com/truonghuuphuc/CVE-2024-39943-Poc) - -### CVE-2024-40080 -- [perras/CVE-2024-40080](https://github.com/perras/CVE-2024-40080) - -### CVE-2024-40110 (2024-07-12) - -Sourcecodester Poultry Farm Management System v1.0 contains an Unauthenticated Remote Code Execution (RCE) vulnerability via the productimage parameter at /farm/product.php. - - -- [Abdurahmon3236/CVE-2024-40110](https://github.com/Abdurahmon3236/CVE-2024-40110) - -### CVE-2024-40111 (2024-08-23) - -A persistent (stored) cross-site scripting (XSS) vulnerability has been identified in Automad 2.0.0-alpha.4. This vulnerability enables an attacker to inject malicious JavaScript code into the template body. The injected code is stored within the flat file CMS and is executed in the browser of any user visiting the forum. - - -- [theexploiters/CVE-2024-40111-Exploit](https://github.com/theexploiters/CVE-2024-40111-Exploit) - -### CVE-2024-40119 (2024-07-17) - -Nepstech Wifi Router xpon (terminal) model NTPL-Xpon1GFEVN v.1.0 Firmware V2.0.1 contains a Cross-Site Request Forgery (CSRF) vulnerability in the password change function, which allows remote attackers to change the admin password without the user's consent, leading to a potential account takeover. - - -- [sudo-subho/nepstech-xpon-router-CVE-2024-40119](https://github.com/sudo-subho/nepstech-xpon-router-CVE-2024-40119) ### CVE-2024-40318 (2024-07-25) @@ -6313,29 +4131,6 @@ - [3v1lC0d3/RCE-QloApps-CVE-2024-40318](https://github.com/3v1lC0d3/RCE-QloApps-CVE-2024-40318) -### CVE-2024-40324 (2024-07-25) - -A CRLF injection vulnerability in E-Staff v5.1 allows attackers to insert Carriage Return (CR) and Line Feed (LF) characters into input fields, leading to HTTP response splitting and header manipulation. - - -- [aleksey-vi/CVE-2024-40324](https://github.com/aleksey-vi/CVE-2024-40324) - -### CVE-2024-40348 (2024-07-20) - -An issue in the component /api/swaggerui/static of Bazaar v1.4.3 allows unauthenticated attackers to execute a directory traversal. - - -- [bigb0x/CVE-2024-40348](https://github.com/bigb0x/CVE-2024-40348) -- [NingXin2002/Bazaar_poc](https://github.com/NingXin2002/Bazaar_poc) - -### CVE-2024-40422 (2024-07-24) - -The snapshot_path parameter in the /api/get-browser-snapshot endpoint in stitionai devika v1 is susceptible to a path traversal attack. An attacker can manipulate the snapshot_path parameter to traverse directories and access sensitive files on the server. This can potentially lead to unauthorized access to critical system files and compromise the confidentiality and integrity of the system. - - -- [alpernae/CVE-2024-40422](https://github.com/alpernae/CVE-2024-40422) -- [j3r1ch0123/CVE-2024-40422](https://github.com/j3r1ch0123/CVE-2024-40422) - ### CVE-2024-40431 (2024-10-23) A lack of input validation in Realtek SD card reader driver before 10.0.26100.21374 through the implementation of the IOCTL_SCSI_PASS_THROUGH control of the SD card reader driver allows an attacker to write to predictable kernel memory locations, even as a low-privileged user. @@ -6343,97 +4138,6 @@ - [SpiralBL0CK/CVE-2024-40431-CVE-2022-25479-EOP-CHAIN](https://github.com/SpiralBL0CK/CVE-2024-40431-CVE-2022-25479-EOP-CHAIN) -### CVE-2024-40443 (2024-11-13) - -SQL Injection vulnerability in Simple Laboratory Management System using PHP and MySQL v.1.0 allows a remote attacker to cause a denial of service via the delete_users function in the Useres.php - - -- [Yuma-Tsushima07/CVE-2024-40443](https://github.com/Yuma-Tsushima07/CVE-2024-40443) - -### CVE-2024-40457 (2024-09-12) - -No-IP Dynamic Update Client (DUC) v3.x uses cleartext credentials that may occur on a command line or in a file. NOTE: the vendor's position is that cleartext in /etc/default/noip-duc is recommended and is the intentional behavior. - - -- [jeppojeps/CVE-2024-40457-PoC](https://github.com/jeppojeps/CVE-2024-40457-PoC) - -### CVE-2024-40492 (2024-07-17) - -Cross Site Scripting vulnerability in Heartbeat Chat v.15.2.1 allows a remote attacker to execute arbitrary code via the setname function. - - -- [minendie/POC_CVE-2024-40492](https://github.com/minendie/POC_CVE-2024-40492) - -### CVE-2024-40498 (2024-08-05) - -SQL Injection vulnerability in PuneethReddyHC Online Shopping sysstem advanced v.1.0 allows an attacker to execute arbitrary code via the register.php - - -- [Dirac231/CVE-2024-40498](https://github.com/Dirac231/CVE-2024-40498) - -### CVE-2024-40500 (2024-08-12) - -Cross Site Scripting vulnerability in Martin Kucej i-librarian v.5.11.0 and before allows a local attacker to execute arbitrary code via the search function in the import component. - - -- [nitipoom-jar/CVE-2024-40500](https://github.com/nitipoom-jar/CVE-2024-40500) - -### CVE-2024-40506 (2024-09-26) - -Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMHospitality.asmx function. - - -- [Jansen-C-Moreira/CVE-2024-40506](https://github.com/Jansen-C-Moreira/CVE-2024-40506) - -### CVE-2024-40507 (2024-09-26) - -Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMPersonnel.asmx function. - - -- [Jansen-C-Moreira/CVE-2024-40507](https://github.com/Jansen-C-Moreira/CVE-2024-40507) - -### CVE-2024-40508 (2024-09-26) - -Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMConference.asmx function. - - -- [Jansen-C-Moreira/CVE-2024-40508](https://github.com/Jansen-C-Moreira/CVE-2024-40508) - -### CVE-2024-40509 (2024-09-27) - -Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMFinDev.asmx function. - - -- [Jansen-C-Moreira/CVE-2024-40509](https://github.com/Jansen-C-Moreira/CVE-2024-40509) - -### CVE-2024-40510 (2024-09-27) - -Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMCommon.asmx function. - - -- [Jansen-C-Moreira/CVE-2024-40510](https://github.com/Jansen-C-Moreira/CVE-2024-40510) - -### CVE-2024-40511 (2024-09-27) - -Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMServerAdmin.asmx function. - - -- [Jansen-C-Moreira/CVE-2024-40511](https://github.com/Jansen-C-Moreira/CVE-2024-40511) - -### CVE-2024-40512 (2024-09-27) - -Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMReporting.asmx function. - - -- [Jansen-C-Moreira/CVE-2024-40512](https://github.com/Jansen-C-Moreira/CVE-2024-40512) - -### CVE-2024-40617 (2024-07-17) - -Path traversal vulnerability exists in FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS). If a remote authenticated attacker with User Class privilege sends a specially crafted request to the affected product, access restricted files containing sensitive information may be accessed. As a result, Administrator Class privileges of the product may be hijacked. - - -- [KyssK00L/CVE-2024-40617](https://github.com/KyssK00L/CVE-2024-40617) - ### CVE-2024-40658 (2024-09-11) In getConfig of SoftVideoDecoderOMXComponent.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. @@ -6441,40 +4145,12 @@ - [nidhihcl75/frameworks_av_AOSP10_r33_CVE-2024-40658](https://github.com/nidhihcl75/frameworks_av_AOSP10_r33_CVE-2024-40658) -### CVE-2024-40662 (2024-09-11) - -In scheme of Uri.java, there is a possible way to craft a malformed Uri object due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. - - -- [Aakashmom/net_G2.5_CVE-2024-40662](https://github.com/Aakashmom/net_G2.5_CVE-2024-40662) - -### CVE-2024-40673 -- [Aakashmom/G3_libcore_native_CVE-2024-40673](https://github.com/Aakashmom/G3_libcore_native_CVE-2024-40673) - -### CVE-2024-40675 -- [Aakashmom/intent_CVE-2024-40675](https://github.com/Aakashmom/intent_CVE-2024-40675) - -### CVE-2024-40676 -- [Aakashmom/frameworks_base_accounts_CVE-2024-40676](https://github.com/Aakashmom/frameworks_base_accounts_CVE-2024-40676) -- [Aakashmom/accounts_CVE-2024-40676-](https://github.com/Aakashmom/accounts_CVE-2024-40676-) - ### CVE-2024-40711 (2024-09-07) A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE). - [watchtowrlabs/CVE-2024-40711](https://github.com/watchtowrlabs/CVE-2024-40711) -- [realstatus/CVE-2024-40711-Exp](https://github.com/realstatus/CVE-2024-40711-Exp) -- [XiaomingX/cve-2024-40711-poc](https://github.com/XiaomingX/cve-2024-40711-poc) - -### CVE-2024-40725 (2024-07-18) - -A partial fix for  CVE-2024-39884 in the core of Apache HTTP Server 2.4.61 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted.\n\nUsers are recommended to upgrade to version 2.4.62, which fixes this issue.\n\n - - -- [TAM-K592/CVE-2024-40725-CVE-2024-40898](https://github.com/TAM-K592/CVE-2024-40725-CVE-2024-40898) -- [whiterose7777/CVE-2024-40725-CVE-2024-40898](https://github.com/whiterose7777/CVE-2024-40725-CVE-2024-40898) -- [soltanali0/CVE-2024-40725](https://github.com/soltanali0/CVE-2024-40725) ### CVE-2024-40892 (2024-08-12) @@ -6483,51 +4159,9 @@ - [xen0bit/fwbt](https://github.com/xen0bit/fwbt) -### CVE-2024-41107 (2024-07-19) - -The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and known or guessed username and other user details of a SAML-enabled CloudStack user-account. In such environments, this can result in a complete compromise of the resources owned and/or accessible by a SAML enabled user-account.\n\nAffected users are recommended to disable the SAML authentication plugin by setting the "saml2.enabled" global setting to "false", or upgrade to version 4.18.2.2, 4.19.1.0 or later, which addresses this issue.\n\n - - -- [d0rb/CVE-2024-41107](https://github.com/d0rb/CVE-2024-41107) - -### CVE-2024-41110 (2024-07-24) - -Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low.\n\nUsing a specially-crafted API request, an Engine API client could make the daemon forward the request or response to an authorization plugin without the body. In certain circumstances, the authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it.\n\nA security issue was discovered In 2018, where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine v18.09.1 in January 2019, the fix was not carried forward to later major versions, resulting in a regression. Anyone who depends on authorization plugins that introspect the request and/or response body to make access control decisions is potentially impacted.\n\nDocker EE v19.03.x and all versions of Mirantis Container Runtime are not vulnerable.\n\ndocker-ce v27.1.1 containes patches to fix the vulnerability. Patches have also been merged into the master, 19.03, 20.0, 23.0, 24.0, 25.0, 26.0, and 26.1 release branches. If one is unable to upgrade immediately, avoid using AuthZ plugins and/or restrict access to the Docker API to trusted parties, following the principle of least privilege. - - -- [vvpoglazov/cve-2024-41110-checker](https://github.com/vvpoglazov/cve-2024-41110-checker) -- [PauloParoPP/CVE-2024-41110-SCAN](https://github.com/PauloParoPP/CVE-2024-41110-SCAN) - -### CVE-2024-41276 (2024-10-01) - -A vulnerability in Kaiten version 57.131.12 and earlier allows attackers to bypass the PIN code authentication mechanism. The application requires users to input a 6-digit PIN code sent to their email for authorization after entering their login credentials. However, the request limiting mechanism can be easily bypassed, enabling attackers to perform a brute force attack to guess the correct PIN and gain unauthorized access to the application. - - -- [artemy-ccrsky/CVE-2024-41276](https://github.com/artemy-ccrsky/CVE-2024-41276) - -### CVE-2024-41290 (2024-10-02) - -FlatPress CMS v1.3.1 1.3 was discovered to use insecure methods to store authentication data via the cookie's component. - - -- [paragbagul111/CVE-2024-41290](https://github.com/paragbagul111/CVE-2024-41290) - -### CVE-2024-41301 -- [patrickdeanramos/CVE-2024-41301-Bookea-tu-Mesa-is-vulnerable-to-Stored-Cross-Site-Scripting](https://github.com/patrickdeanramos/CVE-2024-41301-Bookea-tu-Mesa-is-vulnerable-to-Stored-Cross-Site-Scripting) - -### CVE-2024-41302 -- [patrickdeanramos/CVE-2024-41302-Bookea-tu-Mesa-is-vulnerable-to-SQL-Injection](https://github.com/patrickdeanramos/CVE-2024-41302-Bookea-tu-Mesa-is-vulnerable-to-SQL-Injection) - ### CVE-2024-41312 - [Amal264882/CVE-2024-41312.](https://github.com/Amal264882/CVE-2024-41312.) -### CVE-2024-41319 (2024-07-23) - -TOTOLINK A6000R V1.0.1-B20201211.2000 was discovered to contain a command injection vulnerability via the cmd parameter in the webcmd function. - - -- [NingXin2002/TOTOLINK_poc](https://github.com/NingXin2002/TOTOLINK_poc) - ### CVE-2024-41570 (2024-08-09) An Unauthenticated Server-Side Request Forgery (SSRF) in demon callback handling in Havoc 2 0.7 allows attackers to send arbitrary network traffic originating from the team server. @@ -6535,51 +4169,6 @@ - [chebuya/Havoc-C2-SSRF-poc](https://github.com/chebuya/Havoc-C2-SSRF-poc) -### CVE-2024-41628 (2024-07-26) - -Directory Traversal vulnerability in Severalnines Cluster Control 1.9.8 before 1.9.8-9778, 2.0.0 before 2.0.0-9779, and 2.1.0 before 2.1.0-9780 allows a remote attacker to include and display file content in an HTTP request via the CMON API. - - -- [Redshift-CyberSecurity/CVE-2024-41628](https://github.com/Redshift-CyberSecurity/CVE-2024-41628) - -### CVE-2024-41640 (2024-07-29) - -Cross Site Scripting (XSS) vulnerability in AML Surety Eco up to 3.5 allows an attacker to run arbitrary code via crafted GET request using the id parameter. - - -- [alemusix/CVE-2024-41640](https://github.com/alemusix/CVE-2024-41640) - -### CVE-2024-41651 (2024-08-12) - -An issue in Prestashop v.8.1.7 and before allows a remote attacker to execute arbitrary code via the module upgrade functionality. NOTE: this is disputed by multiple parties, who report that exploitation requires that an attacker be able to hijack network requests made by an admin user (who, by design, is allowed to change the code that is running on the server). - - -- [Fckroun/CVE-2024-41651](https://github.com/Fckroun/CVE-2024-41651) - -### CVE-2024-41662 (2024-07-24) - -VNote is a note-taking platform. A Cross-Site Scripting (XSS) vulnerability has been identified in the Markdown rendering functionality of versions 3.18.1 and prior of the VNote note-taking application. This vulnerability allows the injection and execution of arbitrary JavaScript code through which remote code execution can be achieved. A patch for this issue is available at commit f1af78573a0ef51d6ef6a0bc4080cddc8f30a545. Other mitigation strategies include implementing rigorous input sanitization for all Markdown content and utilizing a secure Markdown parser that appropriately escapes or strips potentially dangerous content. - - -- [sh3bu/CVE-2024-41662](https://github.com/sh3bu/CVE-2024-41662) - -### CVE-2024-41713 (2024-10-21) - -A vulnerability in the NuPoint Unified Messaging (NPM) component of Mitel MiCollab through 9.8 SP1 FP2 (9.8.1.201) could allow an unauthenticated attacker to conduct a path traversal attack, due to insufficient input validation. A successful exploit could allow unauthorized access, enabling the attacker to view, corrupt, or delete users' data and system configurations. - - -- [watchtowrlabs/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713](https://github.com/watchtowrlabs/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713) -- [zxj-hub/CVE-2024-41713POC](https://github.com/zxj-hub/CVE-2024-41713POC) -- [Sanandd/cve-2024-CVE-2024-41713](https://github.com/Sanandd/cve-2024-CVE-2024-41713) -- [amanverma-wsu/CVE-2024-41713-Scan](https://github.com/amanverma-wsu/CVE-2024-41713-Scan) - -### CVE-2024-41958 (2024-08-05) - -mailcow: dockerized is an open source groupware/email suite based on docker. A vulnerability has been discovered in the two-factor authentication (2FA) mechanism. This flaw allows an authenticated attacker to bypass the 2FA protection, enabling unauthorized access to other accounts that are otherwise secured with 2FA. To exploit this vulnerability, the attacker must first have access to an account within the system and possess the credentials of the target account that has 2FA enabled. By leveraging these credentials, the attacker can circumvent the 2FA process and gain access to the protected account. This issue has been addressed in the `2024-07` release. All users are advised to upgrade. There are no known workarounds for this vulnerability. - - -- [OrangeJuiceHU/CVE-2024-41958-PoC](https://github.com/OrangeJuiceHU/CVE-2024-41958-PoC) - ### CVE-2024-41992 (2024-11-11) Wi-Fi Alliance wfa_dut (in Wi-Fi Test Suite) through 9.0.0 allows OS command injection via 802.11x frames because the system() library function is used. For example, on Arcadyan FMIMG51AX000J devices, this leads to wfaTGSendPing remote code execution as root via traffic to TCP port 8000 or 8080 on a LAN interface. On other devices, this may be exploitable over a WAN interface. @@ -6587,48 +4176,6 @@ - [fj016/CVE-2024-41992-PoC](https://github.com/fj016/CVE-2024-41992-PoC) -### CVE-2024-42327 (2024-11-27) - -A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access. - - -- [aramosf/cve-2024-42327](https://github.com/aramosf/cve-2024-42327) -- [compr00t/CVE-2024-42327](https://github.com/compr00t/CVE-2024-42327) -- [depers-rus/CVE-2024-42327](https://github.com/depers-rus/CVE-2024-42327) -- [watchdog1337/CVE-2024-42327_Zabbix_SQLI](https://github.com/watchdog1337/CVE-2024-42327_Zabbix_SQLI) -- [itform-fr/Zabbix---CVE-2024-42327](https://github.com/itform-fr/Zabbix---CVE-2024-42327) -- [igorbf495/CVE-2024-42327](https://github.com/igorbf495/CVE-2024-42327) -- [BridgerAlderson/Zabbix-CVE-2024-42327-SQL-Injection-RCE](https://github.com/BridgerAlderson/Zabbix-CVE-2024-42327-SQL-Injection-RCE) - -### CVE-2024-42346 (2024-09-20) - -Galaxy is a free, open-source system for analyzing data, authoring workflows, training and education, publishing tools, managing infrastructure, and more. The editor visualization, /visualizations endpoint, can be used to store HTML tags and trigger javascript execution upon edit operation. All supported branches of Galaxy (and more back to release_20.05) were amended with the supplied patches. Users are advised to upgrade. There are no known workarounds for this vulnerability. - - -- [partywavesec/CVE-2024-42346](https://github.com/partywavesec/CVE-2024-42346) - -### CVE-2024-42448 (2024-12-11) - -From the VSPC management agent machine, under condition that the management agent is authorized on the server, it is possible to perform Remote Code Execution (RCE) on the VSPC server machine. - - -- [h3lye/CVE-2024-42448-RCE](https://github.com/h3lye/CVE-2024-42448-RCE) - -### CVE-2024-42461 (2024-08-02) - -In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because BER-encoded signatures are allowed. - - -- [fevar54/CVE-2024-42461](https://github.com/fevar54/CVE-2024-42461) - -### CVE-2024-42640 (2024-10-11) - -angular-base64-upload prior to v0.1.21 is vulnerable to unauthenticated remote code execution via demo/server.php. Exploiting this vulnerability allows an attacker to upload arbitrary content to the server, which can subsequently be accessed through demo/uploads. This leads to the execution of previously uploaded content and enables the attacker to achieve code execution on the server. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. - - -- [rvizx/CVE-2024-42640](https://github.com/rvizx/CVE-2024-42640) -- [KTN1990/CVE-2024-42640](https://github.com/KTN1990/CVE-2024-42640) - ### CVE-2024-42642 (2024-09-04) Micron Crucial MX500 Series Solid State Drives M3CR046 is vulnerable to Buffer Overflow, which can be triggered by sending specially crafted ATA packets from the host to the drive controller. @@ -6670,7 +4217,6 @@ - [partywavesec/invesalius3_vulnerabilities](https://github.com/partywavesec/invesalius3_vulnerabilities) -- [theexploiters/CVE-2024-42845-Exploit](https://github.com/theexploiters/CVE-2024-42845-Exploit) ### CVE-2024-42849 (2024-08-16) @@ -6711,11 +4257,7 @@ Jenkins 2.470 and earlier, LTS 2.452.3 and earlier allows agent processes to read arbitrary files from the Jenkins controller file system by using the `ClassLoaderProxy#fetchJar` method in the Remoting library. -- [HwMex0/CVE-2024-43044](https://github.com/HwMex0/CVE-2024-43044) -- [jenkinsci-cert/SECURITY-3430](https://github.com/jenkinsci-cert/SECURITY-3430) -- [v9d0g/CVE-2024-43044-POC](https://github.com/v9d0g/CVE-2024-43044-POC) - [convisolabs/CVE-2024-43044-jenkins](https://github.com/convisolabs/CVE-2024-43044-jenkins) -- [DACC4/CVE-2024-43044-jenkins-creds](https://github.com/DACC4/CVE-2024-43044-jenkins-creds) ### CVE-2024-43160 (2024-08-13) @@ -6724,20 +4266,6 @@ - [KTN1990/CVE-2024-43160](https://github.com/KTN1990/CVE-2024-43160) -### CVE-2024-43363 (2024-10-07) - -Cacti is an open source performance and fault management framework. An admin user can create a device with a malicious hostname containing php code and repeat the installation process (completing only step 5 of the installation process is enough, no need to complete the steps before or after it) to use a php file as the cacti log file. After having the malicious hostname end up in the logs (log poisoning), one can simply go to the log file url to execute commands to achieve RCE. This issue has been addressed in version 1.2.28 and all users are advised to upgrade. There are no known workarounds for this vulnerability. - - -- [p33d/CVE-2024-43363](https://github.com/p33d/CVE-2024-43363) - -### CVE-2024-43416 (2024-11-18) - -GLPI is a free asset and IT management software package. Starting in version 0.80 and prior to version 10.0.17, an unauthenticated user can use an application endpoint to check if an email address corresponds to a valid GLPI user. Version 10.0.17 fixes the issue. - - -- [0xmupa/CVE-2024-43416-PoC](https://github.com/0xmupa/CVE-2024-43416-PoC) - ### CVE-2024-43425 (2024-11-07) A flaw was found in Moodle. Additional restrictions are required to avoid a remote code execution risk in calculated question types. Note: This requires the capability to add/update questions. @@ -6745,13 +4273,6 @@ - [RedTeamPentesting/moodle-rce-calculatedquestions](https://github.com/RedTeamPentesting/moodle-rce-calculatedquestions) -### CVE-2024-43532 (2024-10-08) - -Remote Registry Service Elevation of Privilege Vulnerability - - -- [expl0itsecurity/CVE-2024-43532](https://github.com/expl0itsecurity/CVE-2024-43532) - ### CVE-2024-43917 (2024-08-29) Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TemplateInvaders TI WooCommerce Wishlist allows SQL Injection.This issue affects TI WooCommerce Wishlist: from n/a through 2.8.2. @@ -6766,20 +4287,6 @@ - [KTN1990/CVE-2024-43918](https://github.com/KTN1990/CVE-2024-43918) -### CVE-2024-43919 (2024-11-01) - -Access Control vulnerability in YARPP YARPP allows .\n\nThis issue affects YARPP: from n/a through 5.30.10. - - -- [RandomRobbieBF/CVE-2024-43919](https://github.com/RandomRobbieBF/CVE-2024-43919) - -### CVE-2024-43965 (2024-08-29) - -Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Smackcoders SendGrid for WordPress allows SQL Injection.This issue affects SendGrid for WordPress: from n/a through 1.4. - - -- [RandomRobbieBF/CVE-2024-43965](https://github.com/RandomRobbieBF/CVE-2024-43965) - ### CVE-2024-43998 (2024-11-01) Missing Authorization vulnerability in WebsiteinWP Blogpoet allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Blogpoet: from n/a through 1.0.3. @@ -6795,7 +4302,6 @@ - [absholi7ly/CVE-2024-44000-LiteSpeed-Cache](https://github.com/absholi7ly/CVE-2024-44000-LiteSpeed-Cache) - [gbrsh/CVE-2024-44000](https://github.com/gbrsh/CVE-2024-44000) - [ifqygazhar/CVE-2024-44000-LiteSpeed-Cache](https://github.com/ifqygazhar/CVE-2024-44000-LiteSpeed-Cache) -- [geniuszly/CVE-2024-44000](https://github.com/geniuszly/CVE-2024-44000) ### CVE-2024-44083 (2024-08-19) @@ -6804,34 +4310,6 @@ - [Azvanzed/CVE-2024-44083](https://github.com/Azvanzed/CVE-2024-44083) -### CVE-2024-44193 (2024-10-02) - -A logic issue was addressed with improved restrictions. This issue is fixed in iTunes 12.13.3 for Windows. A local attacker may be able to elevate their privileges. - - -- [mbog14/CVE-2024-44193](https://github.com/mbog14/CVE-2024-44193) - -### CVE-2024-44258 (2024-10-28) - -This issue was addressed with improved handling of symlinks. This issue is fixed in iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, visionOS 2.1, tvOS 18.1. Restoring a maliciously crafted backup file may lead to modification of protected system files. - - -- [ifpdz/CVE-2024-44258](https://github.com/ifpdz/CVE-2024-44258) - -### CVE-2024-44285 (2024-10-28) - -A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 18.1 and iPadOS 18.1, watchOS 11.1, visionOS 2.1, tvOS 18.1. An app may be able to cause unexpected system termination or corrupt kernel memory. - - -- [slds1/explt](https://github.com/slds1/explt) - -### CVE-2024-44337 (2024-10-15) - -The package `github.com/gomarkdown/markdown` is a Go library for parsing Markdown text and rendering as HTML. Prior to pseudoversion `v0.0.0-20240729232818-a2a9c4f`, which corresponds with commit `a2a9c4f76ef5a5c32108e36f7c47f8d310322252`, there was a logical problem in the paragraph function of the parser/block.go file, which allowed a remote attacker to cause a denial of service (DoS) condition by providing a tailor-made input that caused an infinite loop, causing the program to hang and consume resources indefinitely. Submit `a2a9c4f76ef5a5c32108e36f7c47f8d310322252` contains fixes to this problem. - - -- [Brinmon/CVE-2024-44337](https://github.com/Brinmon/CVE-2024-44337) - ### CVE-2024-44346 - [Shauryae1337/CVE-2024-44346](https://github.com/Shauryae1337/CVE-2024-44346) - [sahil3276/CVE-2024-44346](https://github.com/sahil3276/CVE-2024-44346) @@ -6878,20 +4356,6 @@ - [merbinr/CVE-2024-44623](https://github.com/merbinr/CVE-2024-44623) -### CVE-2024-44625 (2024-11-15) - -Gogs <=0.13.0 is vulnerable to Directory Traversal via the editFilePost function of internal/route/repo/editor.go. - - -- [Fysac/CVE-2024-44625](https://github.com/Fysac/CVE-2024-44625) - -### CVE-2024-44765 (2024-11-08) - -An Improper Authorization (Access Control Misconfiguration) vulnerability in MGT-COMMERCE GmbH CloudPanel v2.0.0 to v2.4.2 allows low-privilege users to bypass access controls and gain unauthorized access to sensitive configuration files and administrative functionality. - - -- [josephgodwinkimani/cloudpanel-2.4.2-CVE-2024-44765-recovery](https://github.com/josephgodwinkimani/cloudpanel-2.4.2-CVE-2024-44765-recovery) - ### CVE-2024-44812 (2024-10-22) SQL Injection vulnerability in Online Complaint Site v.1.0 allows a remote attacker to escalate privileges via the username and password parameters in the /admin.index.php component. @@ -6955,14 +4419,6 @@ - [latte-soft/kartlanpwn](https://github.com/latte-soft/kartlanpwn) -### CVE-2024-45216 (2024-10-16) - -Improper Authentication vulnerability in Apache Solr.\n\nSolr instances using the PKIAuthenticationPlugin, which is enabled by default when Solr Authentication is used, are vulnerable to Authentication bypass.\nA fake ending at the end of any Solr API URL path, will allow requests to skip Authentication while maintaining the API contract with the original URL Path.\nThis fake ending looks like an unprotected API path, however it is stripped off internally after authentication but before API routing.\n\n\nThis issue affects Apache Solr: from 5.3.0 before 8.11.4, from 9.0.0 before 9.7.0.\n\nUsers are recommended to upgrade to version 9.7.0, or 8.11.4, which fix the issue. - - -- [congdong007/CVE-2024-45216-Poc](https://github.com/congdong007/CVE-2024-45216-Poc) -- [qhoko/CVE-2024-45216](https://github.com/qhoko/CVE-2024-45216) - ### CVE-2024-45241 (2024-08-26) A traversal vulnerability in GeneralDocs.aspx in CentralSquare CryWolf (False Alarm Management) through 2024-08-09 allows unauthenticated attackers to read files outside of the working web directory via the rpt parameter, leading to the disclosure of sensitive information. @@ -6993,14 +4449,6 @@ - [TheHermione/CVE-2024-45265](https://github.com/TheHermione/CVE-2024-45265) -### CVE-2024-45337 (2024-12-11) - -Applications and libraries which misuse the ServerConfig.PublicKeyCallback callback may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that "A call to this function does not guarantee that the key offered is in fact used to authenticate." Specifically, the SSH protocol allows clients to inquire about whether a public key is acceptable before proving control of the corresponding private key. PublicKeyCallback may be called with multiple keys, and the order in which the keys were provided cannot be used to infer which key the client successfully authenticated with, if any. Some applications, which store the key(s) passed to PublicKeyCallback (or derived information) and make security relevant determinations based on it once the connection is established, may make incorrect assumptions. For example, an attacker may send public keys A and B, and then authenticate with A. PublicKeyCallback would be called only twice, first with A and then with B. A vulnerable application may then make authorization decisions based on key B for which the attacker does not actually control the private key. Since this API is widely misused, as a partial mitigation golang.org/x/cry...@v0.31.0 enforces the property that, when successfully authenticating via public key, the last key passed to ServerConfig.PublicKeyCallback will be the key used to authenticate the connection. PublicKeyCallback will now be called multiple times with the same key, if necessary. Note that the client may still not control the last key passed to PublicKeyCallback if the connection is then authenticated with a different method, such as PasswordCallback, KeyboardInteractiveCallback, or NoClientAuth. Users should be using the Extensions field of the Permissions return value from the various authentication callbacks to record data associated with the authentication attempt instead of referencing external state. Once the connection is established the state corresponding to the successful authentication attempt can be retrieved via the ServerConn.Permissions field. Note that some third-party libraries misuse the Permissions type by sharing it across authentication attempts; users of third-party libraries should refer to the relevant projects for guidance. - - -- [NHAS/CVE-2024-45337-POC](https://github.com/NHAS/CVE-2024-45337-POC) -- [NHAS/VULNERABLE-CVE-2024-45337](https://github.com/NHAS/VULNERABLE-CVE-2024-45337) - ### CVE-2024-45383 (2024-09-12) A mishandling of IRP requests vulnerability exists in the HDAudBus_DMA interface of Microsoft High Definition Audio Bus Driver 10.0.19041.3636 (WinBuild.160101.0800). A specially crafted application can issue multiple IRP Complete requests which leads to a local denial-of-service. An attacker can execute malicious script/application to trigger this vulnerability. @@ -7008,13 +4456,6 @@ - [SpiralBL0CK/CVE-2024-45383](https://github.com/SpiralBL0CK/CVE-2024-45383) -### CVE-2024-45409 (2024-09-10) - -The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3. - - -- [synacktiv/CVE-2024-45409](https://github.com/synacktiv/CVE-2024-45409) - ### CVE-2024-45410 (2024-09-19) Traefik is a golang, Cloud Native Application Proxy. When a HTTP request is processed by Traefik, certain HTTP headers such as X-Forwarded-Host or X-Forwarded-Port are added by Traefik before the request is routed to the application. For a HTTP client, it should not be possible to remove or modify these headers. Since the application trusts the value of these headers, security implications might arise, if they can be modified. For HTTP/1.1, however, it was found that some of theses custom headers can indeed be removed and in certain cases manipulated. The attack relies on the HTTP/1.1 behavior, that headers can be defined as hop-by-hop via the HTTP Connection header. This issue has been addressed in release versions 2.11.9 and 3.1.3. Users are advised to upgrade. There are no known workarounds for this vulnerability. @@ -7022,28 +4463,6 @@ - [jphetphoumy/traefik-CVE-2024-45410-poc](https://github.com/jphetphoumy/traefik-CVE-2024-45410-poc) -### CVE-2024-45436 (2024-08-29) - -extractFromZipFile in model.go in Ollama before 0.1.47 can extract members of a ZIP archive outside of the parent directory. - - -- [pankass/CVE-2024-45436](https://github.com/pankass/CVE-2024-45436) -- [XiaomingX/cve-2024-45436-exp](https://github.com/XiaomingX/cve-2024-45436-exp) - -### CVE-2024-45440 (2024-08-29) - -core/authorize.php in Drupal 11.x-dev allows Full Path Disclosure (even when error logging is None) if the value of hash_salt is file_get_contents of a file that does not exist. - - -- [w0r1i0g1ht/CVE-2024-45440](https://github.com/w0r1i0g1ht/CVE-2024-45440) - -### CVE-2024-45492 (2024-08-30) - -An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX). - - -- [nidhihcl75/external_expat_2.6.2_CVE-2024-45492](https://github.com/nidhihcl75/external_expat_2.6.2_CVE-2024-45492) - ### CVE-2024-45507 (2024-09-04) Server-Side Request Forgery (SSRF), Improper Control of Generation of Code ('Code Injection') vulnerability in Apache OFBiz.\n\nThis issue affects Apache OFBiz: before 18.12.16.\n\nUsers are recommended to upgrade to version 18.12.16, which fixes the issue. @@ -7057,9 +4476,6 @@ - [p33d/CVE-2024-45519](https://github.com/p33d/CVE-2024-45519) -- [Chocapikk/CVE-2024-45519](https://github.com/Chocapikk/CVE-2024-45519) -- [whiterose7777/CVE-2024-45519](https://github.com/whiterose7777/CVE-2024-45519) -- [XiaomingX/cve-2024-45519-poc](https://github.com/XiaomingX/cve-2024-45519-poc) ### CVE-2024-45589 (2024-09-05) @@ -7124,13 +4540,6 @@ - [vidura2/CVE-2024-46451](https://github.com/vidura2/CVE-2024-46451) -### CVE-2024-46483 (2024-10-22) - -Xlight FTP Server <3.9.4.3 has an integer overflow vulnerability in the packet parsing logic of the SFTP server, which can lead to a heap overflow with attacker-controlled content. - - -- [kn32/cve-2024-46483](https://github.com/kn32/cve-2024-46483) - ### CVE-2024-46532 (2024-10-11) SQL Injection vulnerability in OpenHIS v.1.0 allows an attacker to execute arbitrary code via the refund function in the PayController.class.php component. @@ -7138,21 +4547,6 @@ - [KamenRiderDarker/CVE-2024-46532](https://github.com/KamenRiderDarker/CVE-2024-46532) -### CVE-2024-46538 (2024-10-22) - -A cross-site scripting (XSS) vulnerability in pfsense v2.5.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the $pconfig variable at interfaces_groups_edit.php. - - -- [EQSTLab/CVE-2024-46538](https://github.com/EQSTLab/CVE-2024-46538) -- [LauLeysen/CVE-2024-46538](https://github.com/LauLeysen/CVE-2024-46538) - -### CVE-2024-46542 (2024-12-30) - -Veritas / Arctera Data Insight before 7.1.1 allows Application Administrators to conduct SQL injection attacks. - - -- [MarioTesoro/CVE-2024-46542](https://github.com/MarioTesoro/CVE-2024-46542) - ### CVE-2024-46627 (2024-09-26) Incorrect access control in BECN DATAGERRY v2.2 allows attackers to execute arbitrary commands via crafted web requests. @@ -7160,34 +4554,6 @@ - [d4lyw/CVE-2024-46627](https://github.com/d4lyw/CVE-2024-46627) -### CVE-2024-46635 (2024-09-30) - -An issue in the API endpoint /AccountMaster/GetCurrentUserInfo of INROAD before v202402060 allows attackers to access sensitive information via a crafted payload to the UserNameOrPhoneNumber parameter. - - -- [h1thub/CVE-2024-46635](https://github.com/h1thub/CVE-2024-46635) - -### CVE-2024-46658 (2024-10-03) - -Syrotech SY-GOPON-8OLT-L3 v1.6.0_240629 was discovered to contain an authenticated command injection vulnerability. - - -- [jackalkarlos/CVE-2024-46658](https://github.com/jackalkarlos/CVE-2024-46658) - -### CVE-2024-46901 (2024-12-09) - -Insufficient validation of filenames against control characters in Apache Subversion repositories served via mod_dav_svn allows authenticated users with commit access to commit a corrupted revision, leading to disruption for users of the repository.\n\nAll versions of Subversion up to and including Subversion 1.14.4 are affected if serving repositories via mod_dav_svn. Users are recommended to upgrade to version 1.14.5, which fixes this issue.\n\nRepositories served via other access methods are not affected. - - -- [devhaozi/CVE-2024-46901](https://github.com/devhaozi/CVE-2024-46901) - -### CVE-2024-46982 (2024-09-17) - -Next.js is a React framework for building full-stack web applications. By sending a crafted HTTP request, it is possible to poison the cache of a non-dynamic server-side rendered route in the pages router (this does not affect the app router). When this crafted request is sent it could coerce Next.js to cache a route that is meant to not be cached and send a `Cache-Control: s-maxage=1, stale-while-revalidate` header which some upstream CDNs may cache as well. To be potentially affected all of the following must apply: 1. Next.js between 13.5.1 and 14.2.9, 2. Using pages router, & 3. Using non-dynamic server-side rendered routes e.g. `pages/dashboard.tsx` not `pages/blog/[slug].tsx`. This vulnerability was resolved in Next.js v13.5.7, v14.2.10, and later. We recommend upgrading regardless of whether you can reproduce the issue or not. There are no official or recommended workarounds for this issue, we recommend that users patch to a safe version. - - -- [CodePontiff/next_js_poisoning](https://github.com/CodePontiff/next_js_poisoning) - ### CVE-2024-46986 (2024-09-18) Camaleon CMS is a dynamic and advanced content management system based on Ruby on Rails. An arbitrary file write vulnerability accessible via the upload method of the MediaController allows authenticated users to write arbitrary files to any location on the web server Camaleon CMS is running on (depending on the permissions of the underlying filesystem). E.g. This can lead to a delayed remote code execution in case an attacker is able to write a Ruby file into the config/initializers/ subfolder of the Ruby on Rails application. This issue has been addressed in release version 2.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability. @@ -7195,13 +4561,6 @@ - [vidura2/CVE-2024-46986](https://github.com/vidura2/CVE-2024-46986) -### CVE-2024-47062 (2024-09-20) - -Navidrome is an open source web-based music collection server and streamer. Navidrome automatically adds parameters in the URL to SQL queries. This can be exploited to access information by adding parameters like `password=...` in the URL (ORM Leak). Furthermore, the names of the parameters are not properly escaped, leading to SQL Injections. Finally, the username is used in a `LIKE` statement, allowing people to log in with `%` instead of their username. When adding parameters to the URL, they are automatically included in an SQL `LIKE` statement (depending on the parameter's name). This allows attackers to potentially retrieve arbitrary information. For example, attackers can use the following request to test whether some encrypted passwords start with `AAA`. This results in an SQL query like `password LIKE 'AAA%'`, allowing attackers to slowly brute-force passwords. When adding parameters to the URL, they are automatically added to an SQL query. The names of the parameters are not properly escaped. This behavior can be used to inject arbitrary SQL code (SQL Injection). These vulnerabilities can be used to leak information and dump the contents of the database and have been addressed in release version 0.53.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. - - -- [saisathvik1/CVE-2024-47062](https://github.com/saisathvik1/CVE-2024-47062) - ### CVE-2024-47066 (2024-09-23) Lobe Chat is an open-source artificial intelligence chat framework. Prior to version 1.19.13, server-side request forgery protection implemented in `src/app/api/proxy/route.ts` does not consider redirect and could be bypassed when attacker provides an external malicious URL which redirects to internal resources like a private network or loopback address. Version 1.19.13 contains an improved fix for the issue. @@ -7228,12 +4587,6 @@ - [aytackalinci/CVE-2024-47176](https://github.com/aytackalinci/CVE-2024-47176) - [lkarlslund/jugular](https://github.com/lkarlslund/jugular) - [nma-io/CVE-2024-47176](https://github.com/nma-io/CVE-2024-47176) -- [l0n3m4n/CVE-2024-47176](https://github.com/l0n3m4n/CVE-2024-47176) -- [gumerzzzindo/CVE-2024-47176](https://github.com/gumerzzzindo/CVE-2024-47176) -- [MalwareTech/CVE-2024-47176-Scanner](https://github.com/MalwareTech/CVE-2024-47176-Scanner) -- [AxthonyV/CVE-2024-47176](https://github.com/AxthonyV/CVE-2024-47176) -- [gianlu111/CUPS-CVE-2024-47176](https://github.com/gianlu111/CUPS-CVE-2024-47176) -- [0x7556/CVE-2024-47176](https://github.com/0x7556/CVE-2024-47176) ### CVE-2024-47177 (2024-09-26) @@ -7242,72 +4595,6 @@ - [referefref/cupspot-2024-47177](https://github.com/referefref/cupspot-2024-47177) -### CVE-2024-47575 (2024-10-23) - -A missing authentication for critical function in FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.12, FortiManager Cloud 6.4.1 through 6.4.7 allows attacker to execute arbitrary code or commands via specially crafted requests. - - -- [watchtowrlabs/Fortijump-Exploit-CVE-2024-47575](https://github.com/watchtowrlabs/Fortijump-Exploit-CVE-2024-47575) -- [skyalliance/exploit-cve-2024-47575](https://github.com/skyalliance/exploit-cve-2024-47575) -- [expl0itsecurity/CVE-2024-47575](https://github.com/expl0itsecurity/CVE-2024-47575) -- [XiaomingX/cve-2024-47575-exp](https://github.com/XiaomingX/cve-2024-47575-exp) -- [Laonhearts/CVE-2024-47575-POC](https://github.com/Laonhearts/CVE-2024-47575-POC) - -### CVE-2024-47854 (2024-10-04) - -An XSS vulnerability was discovered in Veritas Data Insight before 7.1. It allows a remote attacker to inject an arbitrary web script into an HTTP request that could reflect back to an authenticated user without sanitization if executed by that user. - - -- [MarioTesoro/CVE-2024-47854](https://github.com/MarioTesoro/CVE-2024-47854) - -### CVE-2024-48197 (2025-01-02) - -Cross Site Scripting vulnerability in Audiocodes MP-202b v.4.4.3 allows a remote attacker to escalate privileges via the login page of the web interface. - - -- [GCatt-AS/CVE-2024-48197](https://github.com/GCatt-AS/CVE-2024-48197) - -### CVE-2024-48208 (2024-10-24) - -pure-ftpd before 1.0.52 is vulnerable to Buffer Overflow. There is an out of bounds read in the domlsd() function of the ls.c file. - - -- [rohilchaudhry/CVE-2024-48208](https://github.com/rohilchaudhry/CVE-2024-48208) - -### CVE-2024-48217 (2024-11-01) - -An Insecure Direct Object Reference (IDOR) in the dashboard of SiSMART v7.4.0 allows attackers to execute a horizontal-privilege escalation. - - -- [ajrielrm/CVE-2024-48217](https://github.com/ajrielrm/CVE-2024-48217) - -### CVE-2024-48245 (2025-01-07) - -Vehicle Management System 1.0 is vulnerable to SQL Injection. A guest user can exploit vulnerable POST parameters in various administrative actions, such as booking a vehicle or confirming a booking. The affected parameters include "Booking ID", "Action Name", and "Payment Confirmation ID", which are present in /newvehicle.php and /newdriver.php. - - -- [ShadowByte1/CVE-2024-48245](https://github.com/ShadowByte1/CVE-2024-48245) - -### CVE-2024-48246 -- [ShadowByte1/CVE-2024-48246](https://github.com/ShadowByte1/CVE-2024-48246) - -### CVE-2024-48322 (2024-11-11) - -UsersController.php in Run.codes 1.5.2 and older has a reset password race condition vulnerability. - - -- [trqt/CVE-2024-48322](https://github.com/trqt/CVE-2024-48322) - -### CVE-2024-48325 (2024-11-06) - -Portabilis i-Educar 2.8.0 is vulnerable to SQL Injection in the "getDocuments" function of the "InstituicaoDocumentacaoController" class. The "instituicao_id" parameter in "/module/Api/InstituicaoDocumentacao?oper=get&resource=getDocuments&instituicao_id" is not properly sanitized, allowing an unauthenticated remote attacker to inject malicious SQL commands. - - -- [osvaldotenorio/cve-2024-48325](https://github.com/osvaldotenorio/cve-2024-48325) - -### CVE-2024-48326 -- [fabiobsj/CVE-2024-48326](https://github.com/fabiobsj/CVE-2024-48326) - ### CVE-2024-48336 (2024-11-04) The install() function of ProviderInstaller.java in Magisk App before canary version 27007 does not verify the GMS app before loading it, which allows a local untrusted app with no additional privileges to silently execute arbitrary code in the Magisk app and escalate privileges to root via a crafted package, aka Bug #8279. User interaction is not needed for exploitation. @@ -7315,44 +4602,6 @@ - [canyie/MagiskEoP](https://github.com/canyie/MagiskEoP) -### CVE-2024-48359 (2024-10-31) - -Qualitor v8.24 was discovered to contain a remote code execution (RCE) vulnerability via the gridValoresPopHidden parameter. - - -- [OpenXP-Research/CVE-2024-48359](https://github.com/OpenXP-Research/CVE-2024-48359) - -### CVE-2024-48360 (2024-10-31) - -Qualitor v8.24 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /request/viewValidacao.php. - - -- [OpenXP-Research/CVE-2024-48360](https://github.com/OpenXP-Research/CVE-2024-48360) - -### CVE-2024-48392 -- [Renzusclarke/CVE-2024-48392-PoC](https://github.com/Renzusclarke/CVE-2024-48392-PoC) - -### CVE-2024-48415 (2024-10-22) - -itsourcecode Loan Management System v1.0 is vulnerable to Cross Site Scripting (XSS) via a crafted payload to the lastname, firstname, middlename, address, contact_no, email and tax_id parameters in new borrowers functionality on the Borrowers page. - - -- [khaliquesX/CVE-2024-48415](https://github.com/khaliquesX/CVE-2024-48415) - -### CVE-2024-48427 (2024-10-24) - -A SQL injection vulnerability in Sourcecodester Packers and Movers Management System v1.0 allows remote authenticated users to execute arbitrary SQL commands via the id parameter in /mpms/admin/?page=services/manage_service&id - - -- [vighneshnair7/CVE-2024-48427](https://github.com/vighneshnair7/CVE-2024-48427) - -### CVE-2024-48569 (2024-10-30) - -Proactive Risk Manager version 9.1.1.0 is affected by multiple Cross-Site Scripting (XSS) vulnerabilities in the add/edit form fields, at the urls starting with the subpaths: /ar/config/configuation/ and /ar/config/risk-strategy-control/ - - -- [MarioTesoro/CVE-2024-48569](https://github.com/MarioTesoro/CVE-2024-48569) - ### CVE-2024-48605 (2024-10-22) An issue in Helakuru Desktop Application v1.1 allows a local attacker to execute arbitrary code via the lack of proper validation of the wow64log.dll file. @@ -7360,1036 +4609,6 @@ - [surajhacx/HelakuruV.1.1-DLLHijack](https://github.com/surajhacx/HelakuruV.1.1-DLLHijack) -### CVE-2024-48644 (2024-10-22) - -Accounts enumeration vulnerability in the Login Component of Reolink Duo 2 WiFi Camera (Firmware Version v3.0.0.1889_23031701) allows remote attackers to determine valid user accounts via login attempts. This can lead to the enumeration of user accounts and potentially facilitate other attacks, such as brute-forcing of passwords. The vulnerability arises from the application responding differently to login attempts with valid and invalid usernames. - - -- [rosembergpro/CVE-2024-48644](https://github.com/rosembergpro/CVE-2024-48644) - -### CVE-2024-48652 (2024-10-22) - -Cross Site Scripting vulnerability in camaleon-cms v.2.7.5 allows remote attacker to execute arbitrary code via the content group name field. - - -- [paragbagul111/CVE-2024-48652](https://github.com/paragbagul111/CVE-2024-48652) - -### CVE-2024-48705 -- [L41KAA/CVE-2024-48705](https://github.com/L41KAA/CVE-2024-48705) - -### CVE-2024-48762 -- [YZS17/CVE-2024-48762](https://github.com/YZS17/CVE-2024-48762) - -### CVE-2024-48914 (2024-10-15) - -Vendure is an open-source headless commerce platform. Prior to versions 3.0.5 and 2.3.3, a vulnerability in Vendure's asset server plugin allows an attacker to craft a request which is able to traverse the server file system and retrieve the contents of arbitrary files, including sensitive data such as configuration files, environment variables, and other critical data stored on the server. In the same code path is an additional vector for crashing the server via a malformed URI. Patches are available in versions 3.0.5 and 2.3.3. Some workarounds are also available. One may use object storage rather than the local file system, e.g. MinIO or S3, or define middleware which detects and blocks requests with urls containing `/../`. - - -- [EQSTLab/CVE-2024-48914](https://github.com/EQSTLab/CVE-2024-48914) - -### CVE-2024-48955 (2024-10-29) - -Broken access control in NetAdmin 4.030319 returns data with functionalities on the endpoint that "assembles" the functionalities menus, the return of this call is not encrypted and as the system does not validate the session authorization, an attacker can copy the content of the browser of a user with greater privileges having access to the functionalities of the user that the code was copied. - - -- [BrotherOfJhonny/CVE-2024-48955_Overview](https://github.com/BrotherOfJhonny/CVE-2024-48955_Overview) - -### CVE-2024-48990 (2024-11-19) - -Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable. - - -- [makuga01/CVE-2024-48990-PoC](https://github.com/makuga01/CVE-2024-48990-PoC) -- [ns989/CVE-2024-48990](https://github.com/ns989/CVE-2024-48990) -- [felmoltor/CVE-2024-48990](https://github.com/felmoltor/CVE-2024-48990) -- [Cyb3rFr0g/CVE-2024-48990-PoC](https://github.com/Cyb3rFr0g/CVE-2024-48990-PoC) -- [pentestfunctions/CVE-2024-48990-PoC-Testing](https://github.com/pentestfunctions/CVE-2024-48990-PoC-Testing) -- [ally-petitt/CVE-2024-48990-Exploit](https://github.com/ally-petitt/CVE-2024-48990-Exploit) -- [r0xdeadbeef/CVE-2024-48990](https://github.com/r0xdeadbeef/CVE-2024-48990) -- [CyberCrowCC/CVE-2024-48990](https://github.com/CyberCrowCC/CVE-2024-48990) -- [NullByte-7w7/CVE-2024-48990](https://github.com/NullByte-7w7/CVE-2024-48990) - -### CVE-2024-49039 (2024-11-12) - -Windows Task Scheduler Elevation of Privilege Vulnerability - - -- [je5442804/WPTaskScheduler_CVE-2024-49039](https://github.com/je5442804/WPTaskScheduler_CVE-2024-49039) -- [Alexandr-bit253/CVE-2024-49039](https://github.com/Alexandr-bit253/CVE-2024-49039) - -### CVE-2024-49112 (2024-12-10) - -Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability - - -- [tnkr/poc_monitor](https://github.com/tnkr/poc_monitor) -- [CCIEVoice2009/CVE-2024-49112](https://github.com/CCIEVoice2009/CVE-2024-49112) -- [bo0l3an/CVE-2024-49112-PoC](https://github.com/bo0l3an/CVE-2024-49112-PoC) - -### CVE-2024-49113 (2024-12-10) - -Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability - - -- [SafeBreach-Labs/CVE-2024-49113](https://github.com/SafeBreach-Labs/CVE-2024-49113) -- [barcrange/CVE-2024-49113-Checker](https://github.com/barcrange/CVE-2024-49113-Checker) -- [Sachinart/CVE-2024-49113-Checker](https://github.com/Sachinart/CVE-2024-49113-Checker) - -### CVE-2024-49117 (2024-12-10) - -Windows Hyper-V Remote Code Execution Vulnerability - - -- [mutkus/Microsoft-2024-December-Update-Control](https://github.com/mutkus/Microsoft-2024-December-Update-Control) - -### CVE-2024-49203 (2024-11-20) - -Querydsl 5.1.0 and OpenFeign Querydsl 6.8 allows SQL/HQL injection in orderBy in JPAQuery. - - -- [CSIRTTrizna/CVE-2024-49203](https://github.com/CSIRTTrizna/CVE-2024-49203) - -### CVE-2024-49328 (2024-10-20) - -Authentication Bypass Using an Alternate Path or Channel vulnerability in Vivek Tamrakar WP REST API FNS allows Authentication Bypass.This issue affects WP REST API FNS: from n/a through 1.0.0. - - -- [RandomRobbieBF/CVE-2024-49328](https://github.com/RandomRobbieBF/CVE-2024-49328) -- [Nxploited/CVE-2024-49328-exploit](https://github.com/Nxploited/CVE-2024-49328-exploit) - -### CVE-2024-49368 (2024-10-21) - -Nginx UI is a web user interface for the Nginx web server. Prior to version 2.0.0-beta.36, when Nginx UI configures logrotate, it does not verify the input and directly passes it to exec.Command, causing arbitrary command execution. Version 2.0.0-beta.36 fixes this issue. - - -- [Aashay221999/CVE-2024-49368](https://github.com/Aashay221999/CVE-2024-49368) - -### CVE-2024-49369 (2024-11-12) - -Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. The TLS certificate validation in all Icinga 2 versions starting from 2.4.0 was flawed, allowing an attacker to impersonate both trusted cluster nodes as well as any API users that use TLS client certificates for authentication (ApiUser objects with the client_cn attribute set). This vulnerability has been fixed in v2.14.3, v2.13.10, v2.12.11, and v2.11.12. - - -- [Quantum-Sicarius/CVE-2024-49369](https://github.com/Quantum-Sicarius/CVE-2024-49369) - -### CVE-2024-49379 (2024-11-13) - -Umbrel is a home server OS for self-hosting. The login functionality of Umbrel before version 1.2.2 contains a reflected cross-site scripting (XSS) vulnerability in use-auth.tsx. An attacker can specify a malicious redirect query parameter to trigger the vulnerability. If a JavaScript URL is passed to the redirect parameter the attacker provided JavaScript will be executed after the user entered their password and clicked on login. This vulnerability is fixed in 1.2.2. - - -- [OHDUDEOKNICE/CVE-2024-49379](https://github.com/OHDUDEOKNICE/CVE-2024-49379) - -### CVE-2024-49607 (2024-10-20) - -Unrestricted Upload of File with Dangerous Type vulnerability in Redwan Hilali WP Dropbox Dropins allows Upload a Web Shell to a Web Server.This issue affects WP Dropbox Dropins: from n/a through 1.0. - - -- [RandomRobbieBF/CVE-2024-49607](https://github.com/RandomRobbieBF/CVE-2024-49607) - -### CVE-2024-49681 (2024-10-24) - -Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SWIT WP Sessions Time Monitoring Full Automatic allows SQL Injection.This issue affects WP Sessions Time Monitoring Full Automatic: from n/a through 1.0.9. - - -- [RandomRobbieBF/CVE-2024-49681](https://github.com/RandomRobbieBF/CVE-2024-49681) - -### CVE-2024-49699 -- [RandomRobbieBF/CVE-2024-49699](https://github.com/RandomRobbieBF/CVE-2024-49699) - -### CVE-2024-50251 (2024-11-09) - -In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_payload: sanitize offset and length before calling skb_checksum()\n\nIf access to offset + length is larger than the skbuff length, then\nskb_checksum() triggers BUG_ON().\n\nskb_checksum() internally subtracts the length parameter while iterating\nover skbuff, BUG_ON(len) at the end of it checks that the expected\nlength to be included in the checksum calculation is fully consumed. - - -- [slavin-ayu/CVE-2024-50251-PoC](https://github.com/slavin-ayu/CVE-2024-50251-PoC) - -### CVE-2024-50335 (2024-11-05) - -SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. The "Publish Key" field in SuiteCRM's Edit Profile page is vulnerable to Reflected Cross-Site Scripting (XSS), allowing an attacker to inject malicious JavaScript code. This can be exploited to steal CSRF tokens and perform unauthorized actions, such as creating new administrative users without proper authentication. The vulnerability arises due to insufficient input validation and sanitization of the Publish Key field within the SuiteCRM application. When an attacker injects a malicious script, it gets executed within the context of an authenticated user's session. The injected script (o.js) then leverages the captured CSRF token to forge requests that create new administrative users, effectively compromising the integrity and security of the CRM instance. This issue has been addressed in versions 7.14.6 and 8.7.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. - - -- [shellkraft/CVE-2024-50335](https://github.com/shellkraft/CVE-2024-50335) - -### CVE-2024-50340 (2024-11-06) - -symfony/runtime is a module for the Symphony PHP framework which enables decoupling PHP applications from global state. When the `register_argv_argc` php directive is set to `on` , and users call any URL with a special crafted query string, they are able to change the environment or debug mode used by the kernel when handling the request. As of versions 5.4.46, 6.4.14, and 7.1.7 the `SymfonyRuntime` now ignores the `argv` values for non-SAPI PHP runtimes. All users are advised to upgrade. There are no known workarounds for this vulnerability. - - -- [Nyamort/CVE-2024-50340](https://github.com/Nyamort/CVE-2024-50340) - -### CVE-2024-50379 (2024-12-17) - -Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration).\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nUsers are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue. - - -- [v3153/CVE-2024-50379-POC](https://github.com/v3153/CVE-2024-50379-POC) -- [yiliufeng168/CVE-2024-50379-POC](https://github.com/yiliufeng168/CVE-2024-50379-POC) -- [JFOZ1010/Nuclei-Template-CVE-2024-50379](https://github.com/JFOZ1010/Nuclei-Template-CVE-2024-50379) -- [iSee857/CVE-2024-50379-PoC](https://github.com/iSee857/CVE-2024-50379-PoC) -- [Alchemist3dot14/CVE-2024-50379](https://github.com/Alchemist3dot14/CVE-2024-50379) -- [ph0ebus/Tomcat-CVE-2024-50379-Poc](https://github.com/ph0ebus/Tomcat-CVE-2024-50379-Poc) -- [SleepingBag945/CVE-2024-50379](https://github.com/SleepingBag945/CVE-2024-50379) -- [dear-cell/CVE-2024-50379](https://github.com/dear-cell/CVE-2024-50379) -- [lizhianyuguangming/CVE-2024-50379-exp](https://github.com/lizhianyuguangming/CVE-2024-50379-exp) -- [dragonked2/CVE-2024-50379-POC](https://github.com/dragonked2/CVE-2024-50379-POC) -- [bigb0x/CVE-2024-50379](https://github.com/bigb0x/CVE-2024-50379) - -### CVE-2024-50395 (2024-11-22) - -An authorization bypass through user-controlled key vulnerability has been reported to affect Media Streaming add-on. If exploited, the vulnerability could allow local network attackers to gain privilege.\n\nWe have already fixed the vulnerability in the following version:\nMedia Streaming add-on 500.1.1.6 ( 2024/08/02 ) and later - - -- [neko-hat/CVE-2024-50395](https://github.com/neko-hat/CVE-2024-50395) - -### CVE-2024-50404 (2024-12-06) - -A link following vulnerability has been reported to affect Qsync Central. If exploited, the vulnerability could allow remote attackers who have gained user access to traverse the file system to unintended locations.\n\nWe have already fixed the vulnerability in the following versions:\nQsync Central 4.4.0.16_20240819 ( 2024/08/19 ) and later - - -- [C411e/CVE-2024-50404](https://github.com/C411e/CVE-2024-50404) - -### CVE-2024-50427 (2024-10-29) - -Unrestricted Upload of File with Dangerous Type vulnerability in Devsoft Baltic OÜ SurveyJS: Drag & Drop WordPress Form Builder.This issue affects SurveyJS: Drag & Drop WordPress Form Builder: from n/a through 1.9.136. - - -- [RandomRobbieBF/CVE-2024-50427](https://github.com/RandomRobbieBF/CVE-2024-50427) - -### CVE-2024-50450 (2024-10-28) - -Improper Control of Generation of Code ('Code Injection') vulnerability in realmag777 WordPress Meta Data and Taxonomies Filter (MDTF) allows Code Injection.This issue affects WordPress Meta Data and Taxonomies Filter (MDTF): from n/a through 1.3.3.4. - - -- [RandomRobbieBF/CVE-2024-50450](https://github.com/RandomRobbieBF/CVE-2024-50450) - -### CVE-2024-50473 (2024-10-29) - -Unrestricted Upload of File with Dangerous Type vulnerability in Ajar Productions Ajar in5 Embed allows Upload a Web Shell to a Web Server.This issue affects Ajar in5 Embed: from n/a through 3.1.3. - - -- [RandomRobbieBF/CVE-2024-50473](https://github.com/RandomRobbieBF/CVE-2024-50473) - -### CVE-2024-50475 (2024-10-29) - -Missing Authorization vulnerability in Scott Gamon Signup Page allows Privilege Escalation.This issue affects Signup Page: from n/a through 1.0. - - -- [RandomRobbieBF/CVE-2024-50475](https://github.com/RandomRobbieBF/CVE-2024-50475) - -### CVE-2024-50476 (2024-10-29) - -Missing Authorization vulnerability in GRÜN Software Group GmbH GRÜN spendino Spendenformular allows Privilege Escalation.This issue affects GRÜN spendino Spendenformular: from n/a through 1.0.1. - - -- [RandomRobbieBF/CVE-2024-50476](https://github.com/RandomRobbieBF/CVE-2024-50476) - -### CVE-2024-50477 (2024-10-28) - -Authentication Bypass Using an Alternate Path or Channel vulnerability in Stacks Stacks Mobile App Builder stacks-mobile-app-builder allows Authentication Bypass.This issue affects Stacks Mobile App Builder: from n/a through 5.2.3. - - -- [RandomRobbieBF/CVE-2024-50477](https://github.com/RandomRobbieBF/CVE-2024-50477) - -### CVE-2024-50478 (2024-10-28) - -Authentication Bypass by Primary Weakness vulnerability in Swoop 1-Click Login: Passwordless Authentication allows Authentication Bypass.This issue affects 1-Click Login: Passwordless Authentication: 1.4.5. - - -- [RandomRobbieBF/CVE-2024-50478](https://github.com/RandomRobbieBF/CVE-2024-50478) - -### CVE-2024-50482 (2024-10-29) - -Unrestricted Upload of File with Dangerous Type vulnerability in Chetan Khandla Woocommerce Product Design allows Upload a Web Shell to a Web Server.This issue affects Woocommerce Product Design: from n/a through 1.0.0. - - -- [RandomRobbieBF/CVE-2024-50482](https://github.com/RandomRobbieBF/CVE-2024-50482) - -### CVE-2024-50483 (2024-10-28) - -Authorization Bypass Through User-Controlled Key vulnerability in Meetup allows Privilege Escalation.This issue affects Meetup: from n/a through 0.1. - - -- [RandomRobbieBF/CVE-2024-50483](https://github.com/RandomRobbieBF/CVE-2024-50483) - -### CVE-2024-50485 (2024-10-29) - -: Incorrect Privilege Assignment vulnerability in Udit Rawat Exam Matrix allows Privilege Escalation.This issue affects Exam Matrix: from n/a through 1.5. - - -- [RandomRobbieBF/CVE-2024-50485](https://github.com/RandomRobbieBF/CVE-2024-50485) - -### CVE-2024-50488 (2024-10-28) - -Authentication Bypass Using an Alternate Path or Channel vulnerability in Priyabrata Sarkar Token Login allows Authentication Bypass.This issue affects Token Login: from n/a through 1.0.3. - - -- [RandomRobbieBF/CVE-2024-50488](https://github.com/RandomRobbieBF/CVE-2024-50488) - -### CVE-2024-50490 (2024-10-29) - -Missing Authorization vulnerability in Szabolcs Szecsenyi PegaPoll allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects PegaPoll: from n/a through 1.0.2. - - -- [RandomRobbieBF/CVE-2024-50490](https://github.com/RandomRobbieBF/CVE-2024-50490) - -### CVE-2024-50491 (2024-10-28) - -Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Micah Blu RSVP ME allows SQL Injection.This issue affects RSVP ME: from n/a through 1.9.9. - - -- [RandomRobbieBF/CVE-2024-50491](https://github.com/RandomRobbieBF/CVE-2024-50491) - -### CVE-2024-50493 (2024-10-29) - -Unrestricted Upload of File with Dangerous Type vulnerability in masterhomepage Automatic Translation allows Upload a Web Shell to a Web Server.This issue affects Automatic Translation: from n/a through 1.0.4. - - -- [RandomRobbieBF/CVE-2024-50493](https://github.com/RandomRobbieBF/CVE-2024-50493) - -### CVE-2024-50498 (2024-10-28) - -Improper Control of Generation of Code ('Code Injection') vulnerability in LUBUS WP Query Console allows Code Injection.This issue affects WP Query Console: from n/a through 1.0. - - -- [RandomRobbieBF/CVE-2024-50498](https://github.com/RandomRobbieBF/CVE-2024-50498) -- [p0et08/CVE-2024-50498](https://github.com/p0et08/CVE-2024-50498) -- [Nxploited/CVE-2024-50498](https://github.com/Nxploited/CVE-2024-50498) - -### CVE-2024-50507 (2024-10-30) - -Deserialization of Untrusted Data vulnerability in Daniel Schmitzer DS.DownloadList allows Object Injection.This issue affects DS.DownloadList: from n/a through 1.3. - - -- [RandomRobbieBF/CVE-2024-50507](https://github.com/RandomRobbieBF/CVE-2024-50507) - -### CVE-2024-50508 (2024-10-30) - -Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Chetan Khandla Woocommerce Product Design allows Path Traversal.This issue affects Woocommerce Product Design: from n/a through 1.0.0. - - -- [RandomRobbieBF/CVE-2024-50508](https://github.com/RandomRobbieBF/CVE-2024-50508) - -### CVE-2024-50509 (2024-10-30) - -Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Chetan Khandla Woocommerce Product Design allows Path Traversal.This issue affects Woocommerce Product Design: from n/a through 1.0.0. - - -- [RandomRobbieBF/CVE-2024-50509](https://github.com/RandomRobbieBF/CVE-2024-50509) - -### CVE-2024-50510 (2024-10-30) - -Unrestricted Upload of File with Dangerous Type vulnerability in Web and Print Design AR For Woocommerce allows Upload a Web Shell to a Web Server.This issue affects AR For Woocommerce: from n/a through 6.2. - - -- [RandomRobbieBF/CVE-2024-50510](https://github.com/RandomRobbieBF/CVE-2024-50510) - -### CVE-2024-50603 (2025-01-08) - -An issue was discovered in Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996. Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test. - - -- [newlinesec/CVE-2024-50603](https://github.com/newlinesec/CVE-2024-50603) -- [th3gokul/CVE-2024-50603](https://github.com/th3gokul/CVE-2024-50603) - -### CVE-2024-50623 (2024-10-27) - -In Cleo Harmony before 5.8.0.21, VLTrader before 5.8.0.21, and LexiCom before 5.8.0.21, there is an unrestricted file upload and download that could lead to remote code execution. - - -- [watchtowrlabs/CVE-2024-50623](https://github.com/watchtowrlabs/CVE-2024-50623) -- [verylazytech/CVE-2024-50623](https://github.com/verylazytech/CVE-2024-50623) -- [iSee857/Cleo-CVE-2024-50623-PoC](https://github.com/iSee857/Cleo-CVE-2024-50623-PoC) - -### CVE-2024-50633 -- [cetinbaldwin/CVE-2024-50633](https://github.com/cetinbaldwin/CVE-2024-50633) - -### CVE-2024-50657 (2024-11-22) - -An issue in Owncloud android apk v.4.3.1 allows a physically proximate attacker to escalate privileges via the PassCodeViewModel class, specifically in the checkPassCodeIsValid method - - -- [SAHALLL/CVE-2024-50657](https://github.com/SAHALLL/CVE-2024-50657) - -### CVE-2024-50677 (2024-12-06) - -A cross-site scripting (XSS) vulnerability in OroPlatform CMS v5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Search parameter. - - -- [ZumiYumi/CVE-2024-50677](https://github.com/ZumiYumi/CVE-2024-50677) - -### CVE-2024-50803 (2024-11-19) - -The mediapool feature of the Redaxo Core CMS application v 5.17.1 is vulnerable to Cross Site Scripting(XSS) which allows a remote attacker to escalate privileges - - -- [Praison001/CVE-2024-50803-Redaxo](https://github.com/Praison001/CVE-2024-50803-Redaxo) - -### CVE-2024-50804 (2024-11-18) - -Insecure Permissions vulnerability in Micro-star International MSI Center Pro 2.1.37.0 allows a local attacker to execute arbitrary code via the Device_DeviceID.dat.bak file within the C:\ProgramData\MSI\One Dragon Center\Data folder - - -- [g3tsyst3m/CVE-2024-50804](https://github.com/g3tsyst3m/CVE-2024-50804) - -### CVE-2024-50848 (2024-11-18) - -An XML External Entity (XXE) vulnerability in the Import object and Translation Memory import functionalities of WorldServer v11.8.2 to access sensitive information and execute arbitrary commands via supplying a crafted .tmx file. - - -- [Wh1teSnak3/CVE-2024-50848](https://github.com/Wh1teSnak3/CVE-2024-50848) - -### CVE-2024-50849 (2024-11-18) - -A Stored Cross-Site Scripting (XSS) vulnerability in the "Rules" functionality of WorldServer v11.8.2 allows a remote authenticated attacker to execute arbitrary JavaScript code. - - -- [Wh1teSnak3/CVE-2024-50849](https://github.com/Wh1teSnak3/CVE-2024-50849) - -### CVE-2024-50944 (2024-12-27) - -Integer overflow vulnerability exists in SimplCommerce at commit 230310c8d7a0408569b292c5a805c459d47a1d8f in the shopping cart functionality. The issue lies in the quantity parameter in the CartController's AddToCart method. - - -- [AbdullahAlmutawa/CVE-2024-50944](https://github.com/AbdullahAlmutawa/CVE-2024-50944) - -### CVE-2024-50945 (2024-12-27) - -An improper access control vulnerability exists in SimplCommerce at commit 230310c8d7a0408569b292c5a805c459d47a1d8f, allowing users to submit reviews without verifying if they have purchased the product. - - -- [AbdullahAlmutawa/CVE-2024-50945](https://github.com/AbdullahAlmutawa/CVE-2024-50945) - -### CVE-2024-50961 -- [fdzdev/CVE-2024-50961](https://github.com/fdzdev/CVE-2024-50961) - -### CVE-2024-50962 -- [fdzdev/CVE-2024-50962](https://github.com/fdzdev/CVE-2024-50962) - -### CVE-2024-50964 -- [fdzdev/CVE-2024-50964](https://github.com/fdzdev/CVE-2024-50964) - -### CVE-2024-50968 (2024-11-14) - -A business logic vulnerability exists in the Add to Cart function of itsourcecode Agri-Trading Online Shopping System 1.0, which allows remote attackers to manipulate the quant parameter when adding a product to the cart. By setting the quantity value to -0, an attacker can exploit a flaw in the application's total price calculation logic. This vulnerability causes the total price to be reduced to zero, allowing the attacker to add items to the cart and proceed to checkout. - - -- [Akhlak2511/CVE-2024-50968](https://github.com/Akhlak2511/CVE-2024-50968) - -### CVE-2024-50969 (2024-11-13) - -A Reflected cross-site scripting (XSS) vulnerability in browse.php of Code-projects Jonnys Liquor 1.0 allows remote attackers to inject arbitrary web scripts or HTML via the search parameter. - - -- [Akhlak2511/CVE-2024-50969](https://github.com/Akhlak2511/CVE-2024-50969) - -### CVE-2024-50970 (2024-11-13) - -A SQL injection vulnerability in orderview1.php of Itsourcecode Online Furniture Shopping Project 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter. - - -- [Akhlak2511/CVE-2024-50970](https://github.com/Akhlak2511/CVE-2024-50970) - -### CVE-2024-50971 (2024-11-13) - -A SQL injection vulnerability in print.php of Itsourcecode Construction Management System 1.0 allows remote attackers to execute arbitrary SQL commands via the map_id parameter. - - -- [Akhlak2511/CVE-2024-50971](https://github.com/Akhlak2511/CVE-2024-50971) - -### CVE-2024-50972 (2024-11-13) - -A SQL injection vulnerability in printtool.php of Itsourcecode Construction Management System 1.0 allows remote attackers to execute arbitrary SQL commands via the borrow_id parameter. - - -- [Akhlak2511/CVE-2024-50972](https://github.com/Akhlak2511/CVE-2024-50972) - -### CVE-2024-50986 (2024-11-15) - -An issue in Clementine v.1.3.1 allows a local attacker to execute arbitrary code via a crafted DLL file. - - -- [riftsandroses/CVE-2024-50986](https://github.com/riftsandroses/CVE-2024-50986) - -### CVE-2024-51026 (2024-11-11) - -The NetAdmin IAM system (version 4.0.30319) has a Cross Site Scripting (XSS) vulnerability in the /BalloonSave.ashx endpoint, where it is possible to inject a malicious payload into the Content= field. - - -- [BrotherOfJhonny/CVE-2024-51026_Overview](https://github.com/BrotherOfJhonny/CVE-2024-51026_Overview) - -### CVE-2024-51030 (2024-11-08) - -A SQL injection vulnerability in manage_client.php and view_cab.php of Sourcecodester Cab Management System 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter, leading to unauthorized access and potential compromise of sensitive data within the database. - - -- [vighneshnair7/CVE-2024-51030](https://github.com/vighneshnair7/CVE-2024-51030) - -### CVE-2024-51031 (2024-11-08) - -A Cross-site Scripting (XSS) vulnerability in manage_account.php in Sourcecodester Cab Management System 1.0 allows remote authenticated users to inject arbitrary web scripts via the "First Name," "Middle Name," and "Last Name" fields. - - -- [vighneshnair7/CVE-2024-51031](https://github.com/vighneshnair7/CVE-2024-51031) - -### CVE-2024-51032 (2024-11-08) - -A Cross-site Scripting (XSS) vulnerability in manage_recipient.php of Sourcecodester Toll Tax Management System 1.0 allows remote authenticated users to inject arbitrary web scripts via the "owner" input field. - - -- [Shree-Chandragiri/CVE-2024-51032](https://github.com/Shree-Chandragiri/CVE-2024-51032) - -### CVE-2024-51132 (2024-11-05) - -An XML External Entity (XXE) vulnerability in HAPI FHIR before v6.4.0 allows attackers to access sensitive information or execute arbitrary code via supplying a crafted request containing malicious XML entities. - - -- [JAckLosingHeart/CVE-2024-51132-POC](https://github.com/JAckLosingHeart/CVE-2024-51132-POC) - -### CVE-2024-51179 (2024-11-12) - -An issue in Open 5GS v.2.7.1 allows a remote attacker to cause a denial of service via the Network Function Virtualizations (NFVs) such as the User Plane Function (UPF) and the Session Management Function (SMF), The Packet Data Unit (PDU) session establishment process. - - -- [Lakshmirnr/CVE-2024-51179](https://github.com/Lakshmirnr/CVE-2024-51179) - -### CVE-2024-51358 (2024-11-05) - -An issue in Linux Server Heimdall v.2.6.1 allows a remote attacker to execute arbitrary code via a crafted script to the Add new application. - - -- [Kov404/CVE-2024-51358](https://github.com/Kov404/CVE-2024-51358) - -### CVE-2024-51378 (2024-10-29) - -getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected. - - -- [refr4g/CVE-2024-51378](https://github.com/refr4g/CVE-2024-51378) -- [i0x29A/CVE-2024-51378](https://github.com/i0x29A/CVE-2024-51378) - -### CVE-2024-51430 (2024-10-31) - -Cross Site Scripting vulnerability in online diagnostic lab management system using php v.1.0 allows a remote attacker to execute arbitrary code via the Test Name parameter on the diagnostic/add-test.php component. - - -- [BLACK-SCORP10/CVE-2024-51430](https://github.com/BLACK-SCORP10/CVE-2024-51430) - -### CVE-2024-51435 -- [bevennyamande/CVE-2024-51435](https://github.com/bevennyamande/CVE-2024-51435) - -### CVE-2024-51442 (2025-01-08) - -Command Injection in Minidlna version v1.3.3 and before allows an attacker to execute arbitrary OS commands via a specially crafted minidlna.conf configuration file. - - -- [mselbrede/CVE-2024-51442](https://github.com/mselbrede/CVE-2024-51442) - -### CVE-2024-51567 (2024-10-29) - -upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected. - - -- [ajayalf/CVE-2024-51567](https://github.com/ajayalf/CVE-2024-51567) -- [thehash007/CVE-2024-51567-RCE-EXPLOIT](https://github.com/thehash007/CVE-2024-51567-RCE-EXPLOIT) -- [XiaomingX/cve-2024-51567-poc](https://github.com/XiaomingX/cve-2024-51567-poc) - -### CVE-2024-51665 (2024-11-04) - -Server-Side Request Forgery (SSRF) vulnerability in Noor alam Magical Addons For Elementor allows Server Side Request Forgery.This issue affects Magical Addons For Elementor: from n/a through 1.2.1. - - -- [RandomRobbieBF/CVE-2024-51665](https://github.com/RandomRobbieBF/CVE-2024-51665) - -### CVE-2024-51747 (2024-11-11) - -Kanboard is project management software that focuses on the Kanban methodology. An authenticated Kanboard admin can read and delete arbitrary files from the server. File attachments, that are viewable or downloadable in Kanboard are resolved through its `path` entry in the `project_has_files` SQLite db. Thus, an attacker who can upload a modified sqlite.db through the dedicated feature, can set arbitrary file links, by abusing path traversals. Once the modified db is uploaded and the project page is accessed, a file download can be triggered and all files, readable in the context of the Kanboard application permissions, can be downloaded. This issue has been addressed in version 1.2.42 and all users are advised to upgrade. There are no known workarounds for this vulnerability. - - -- [l20170217b/CVE-2024-51747](https://github.com/l20170217b/CVE-2024-51747) - -### CVE-2024-51818 -- [RandomRobbieBF/CVE-2024-51818](https://github.com/RandomRobbieBF/CVE-2024-51818) - -### CVE-2024-52002 (2024-11-08) - -Combodo iTop is a simple, web based IT Service Management tool. Several url endpoints are subject to a Cross-Site Request Forgery (CSRF) vulnerability. Please refer to the linked GHSA for the complete list. This issue has been addressed in version 3.2.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability. - - -- [Harshit-Mashru/iTop-CVEs-exploit](https://github.com/Harshit-Mashru/iTop-CVEs-exploit) - -### CVE-2024-52301 (2024-11-12) - -Laravel is a web application framework. When the register_argc_argv php directive is set to on , and users call any URL with a special crafted query string, they are able to change the environment used by the framework when handling the request. The vulnerability fixed in 6.20.45, 7.30.7, 8.83.28, 9.52.17, 10.48.23, and 11.31.0. The framework now ignores argv values for environment detection on non-cli SAPIs. - - -- [Nyamort/CVE-2024-52301](https://github.com/Nyamort/CVE-2024-52301) -- [martinhaunschmid/CVE-2024-52301-Research](https://github.com/martinhaunschmid/CVE-2024-52301-Research) -- [nanwinata/CVE-2024-52301](https://github.com/nanwinata/CVE-2024-52301) - -### CVE-2024-52302 (2024-11-14) - -common-user-management is a robust Spring Boot application featuring user management services designed to control user access dynamically. There is a critical security vulnerability in the application endpoint /api/v1/customer/profile-picture. This endpoint allows file uploads without proper validation or restrictions, enabling attackers to upload malicious files that can lead to Remote Code Execution (RCE). - - -- [d3sca/CVE-2024-52302](https://github.com/d3sca/CVE-2024-52302) - -### CVE-2024-52316 (2024-11-18) - -Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta Authentication components that behave in this way.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95.\n\nUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue. - - -- [TAM-K592/CVE-2024-52316](https://github.com/TAM-K592/CVE-2024-52316) - -### CVE-2024-52317 (2024-11-18) - -Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests \ncould lead to request and/or response mix-up between users.\n\nThis issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95.\n\nUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue. - - -- [TAM-K592/CVE-2024-52317](https://github.com/TAM-K592/CVE-2024-52317) - -### CVE-2024-52318 (2024-11-18) - -Incorrect object recycling and reuse vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: 11.0.0, 10.1.31, 9.0.96.\n\nUsers are recommended to upgrade to version 11.0.1, 10.1.32 or 9.0.97, which fixes the issue. - - -- [TAM-K592/CVE-2024-52318](https://github.com/TAM-K592/CVE-2024-52318) - -### CVE-2024-52380 (2024-11-14) - -Unrestricted Upload of File with Dangerous Type vulnerability in Softpulse Infotech Picsmize allows Upload a Web Shell to a Web Server.This issue affects Picsmize: from n/a through 1.0.0. - - -- [RandomRobbieBF/CVE-2024-52380](https://github.com/RandomRobbieBF/CVE-2024-52380) -- [0xshoriful/CVE-2024-52380](https://github.com/0xshoriful/CVE-2024-52380) - -### CVE-2024-52382 (2024-11-14) - -Missing Authorization vulnerability in Medma Technologies Matix Popup Builder allows Privilege Escalation.This issue affects Matix Popup Builder: from n/a through 1.0.0. - - -- [RandomRobbieBF/CVE-2024-52382](https://github.com/RandomRobbieBF/CVE-2024-52382) - -### CVE-2024-52429 (2024-11-18) - -Unrestricted Upload of File with Dangerous Type vulnerability in Anton Hoelstad WP Quick Setup allows Upload a Web Shell to a Web Server.This issue affects WP Quick Setup: from n/a through 2.0. - - -- [RandomRobbieBF/CVE-2024-52429](https://github.com/RandomRobbieBF/CVE-2024-52429) - -### CVE-2024-52430 (2024-11-18) - -Deserialization of Untrusted Data vulnerability in Lis Lis Video Gallery allows Object Injection.This issue affects Lis Video Gallery: from n/a through 0.2.1. - - -- [RandomRobbieBF/CVE-2024-52430](https://github.com/RandomRobbieBF/CVE-2024-52430) - -### CVE-2024-52433 (2024-11-18) - -Deserialization of Untrusted Data vulnerability in Mindstien Technologies My Geo Posts Free allows Object Injection.This issue affects My Geo Posts Free: from n/a through 1.2. - - -- [RandomRobbieBF/CVE-2024-52433](https://github.com/RandomRobbieBF/CVE-2024-52433) - -### CVE-2024-52475 (2024-11-28) - -Authentication Bypass Using an Alternate Path or Channel vulnerability in Automation Web Platform Wawp allows Authentication Bypass.This issue affects Wawp: from n/a before 3.0.18. - - -- [ubaii/CVE-2024-52475](https://github.com/ubaii/CVE-2024-52475) - -### CVE-2024-52711 (2024-11-19) - -DI-8100 v16.07.26A1 is vulnerable to Buffer Overflow In the ip_position_asp function via the ip parameter. - - -- [14mb1v45h/cyberspace-CVE-2024-52711](https://github.com/14mb1v45h/cyberspace-CVE-2024-52711) - -### CVE-2024-52800 (2024-11-29) - -veraPDF is an open source PDF/A validation library. Executing policy checks using custom schematron files via the CLI invokes an XSL transformation that may theoretically lead to a remote code execution (RCE) vulnerability. This doesn't affect the standard validation and policy checks functionality, veraPDF's common use cases. Most veraPDF users don't insert any custom XSLT code into policy profiles, which are based on Schematron syntax rather than direct XSL transforms. For users who do, only load custom policy files from sources you trust. This issue has not yet been patched. Users are advised to be cautious of XSLT code until a patch is available. - - -- [JAckLosingHeart/GHSA-4cx5-89vm-833x-POC](https://github.com/JAckLosingHeart/GHSA-4cx5-89vm-833x-POC) - -### CVE-2024-52940 (2024-11-18) - -AnyDesk through 8.1.0 on Windows, when Allow Direct Connections is enabled, inadvertently exposes a public IP address within network traffic. The attacker must know the victim's AnyDesk ID. - - -- [ebrasha/abdal-anydesk-remote-ip-detector](https://github.com/ebrasha/abdal-anydesk-remote-ip-detector) -- [MKultra6969/AnySniff](https://github.com/MKultra6969/AnySniff) - -### CVE-2024-53255 (2024-11-25) - -BoidCMS is a free and open-source flat file CMS for building simple websites and blogs, developed using PHP and uses JSON as a database. In affected versions a reflected Cross-site Scripting (XSS) vulnerability exists in the /admin?page=media endpoint in the file parameter, allowing an attacker to inject arbitrary JavaScript code. This code could be used to steal the user's session cookie, perform phishing attacks, or deface the website. This issue has been addressed in version 2.1.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability. - - -- [0x4M3R/CVE-2024-53255](https://github.com/0x4M3R/CVE-2024-53255) - -### CVE-2024-53259 (2024-12-02) - -quic-go is an implementation of the QUIC protocol in Go. An off-path attacker can inject an ICMP Packet Too Large packet. Since affected quic-go versions used IP_PMTUDISC_DO, the kernel would then return a "message too large" error on sendmsg, i.e. when quic-go attempts to send a packet that exceeds the MTU claimed in that ICMP packet. By setting this value to smaller than 1200 bytes (the minimum MTU for QUIC), the attacker can disrupt a QUIC connection. Crucially, this can be done after completion of the handshake, thereby circumventing any TCP fallback that might be implemented on the application layer (for example, many browsers fall back to HTTP over TCP if they're unable to establish a QUIC connection). The attacker needs to at least know the client's IP and port tuple to mount an attack. This vulnerability is fixed in 0.48.2. - - -- [kota-yata/cve-2024-53259](https://github.com/kota-yata/cve-2024-53259) - -### CVE-2024-53345 (2025-01-07) - -An authenticated arbitrary file upload vulnerability in Car Rental Management System v1.0 to v1.3 allows attackers to execute arbitrary code via uploading a crafted file. - - -- [ShadowByte1/CVE-2024-53345](https://github.com/ShadowByte1/CVE-2024-53345) - -### CVE-2024-53375 (2024-12-02) - -An Authenticated Remote Code Execution (RCE) vulnerability affects the TP-Link Archer router series. A vulnerability exists in the "tmp_get_sites" function of the HomeShield functionality provided by TP-Link. This vulnerability is still exploitable without the activation of the HomeShield functionality. - - -- [ThottySploity/CVE-2024-53375](https://github.com/ThottySploity/CVE-2024-53375) - -### CVE-2024-53376 (2024-12-16) - -CyberPanel before 2.3.8 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the phpSelection field to the websites/submitWebsiteCreation URI. - - -- [ThottySploity/CVE-2024-53376](https://github.com/ThottySploity/CVE-2024-53376) - -### CVE-2024-53476 (2024-12-27) - -A race condition vulnerability in SimplCommerce at commit 230310c8d7a0408569b292c5a805c459d47a1d8f allows attackers to bypass inventory restrictions by simultaneously submitting purchase requests from multiple accounts for the same product. This can lead to overselling when stock is limited, as the system fails to accurately track inventory under high concurrency, resulting in potential loss and unfulfilled orders. - - -- [AbdullahAlmutawa/CVE-2024-53476](https://github.com/AbdullahAlmutawa/CVE-2024-53476) - -### CVE-2024-53522 (2025-01-07) - -Bangkok Medical Software HOSxP XE v4.64.11.3 was discovered to contain a hardcoded IDEA Key-IV pair in the HOSxPXE4.exe and HOS-WIN32.INI components. This allows attackers to access sensitive information. - - -- [Safecloudth/CVE-2024-53522](https://github.com/Safecloudth/CVE-2024-53522) - -### CVE-2024-53617 (2024-12-02) - -A Cross Site Scripting vulnerability in LibrePhotos before commit 32237 allows attackers to takeover any account via uploading an HTML file on behalf of the admin user using IDOR in file upload. - - -- [ii5mai1/CVE-2024-53617](https://github.com/ii5mai1/CVE-2024-53617) - -### CVE-2024-53677 (2024-12-11) - -File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe.\n\nYou can find more details in  https://cwiki.apache.org/confluence/display/WW/S2-067 - - -- [cloudwafs/s2-067-CVE-2024-53677](https://github.com/cloudwafs/s2-067-CVE-2024-53677) -- [TAM-K592/CVE-2024-53677-S2-067](https://github.com/TAM-K592/CVE-2024-53677-S2-067) -- [yangyanglo/CVE-2024-53677](https://github.com/yangyanglo/CVE-2024-53677) -- [c4oocO/CVE-2024-53677-Docker](https://github.com/c4oocO/CVE-2024-53677-Docker) -- [XiaomingX/CVE-2024-53677-S2-067](https://github.com/XiaomingX/CVE-2024-53677-S2-067) -- [dustblessnotdust/CVE-2024-53677-S2-067-thread](https://github.com/dustblessnotdust/CVE-2024-53677-S2-067-thread) -- [0xdeviner/CVE-2024-53677](https://github.com/0xdeviner/CVE-2024-53677) -- [Q0LT/VM-CVE-2024-53677](https://github.com/Q0LT/VM-CVE-2024-53677) -- [EQSTLab/CVE-2024-53677](https://github.com/EQSTLab/CVE-2024-53677) -- [0xPThree/struts_cve-2024-53677](https://github.com/0xPThree/struts_cve-2024-53677) -- [punitdarji/Apache-struts-cve-2024-53677](https://github.com/punitdarji/Apache-struts-cve-2024-53677) -- [SeanRickerd/CVE-2024-53677](https://github.com/SeanRickerd/CVE-2024-53677) - -### CVE-2024-53691 (2024-12-06) - -A link following vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to traverse the file system to unintended locations.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.8.2823 build 20240712 and later\nQTS 5.2.0.2802 build 20240620 and later\nQuTS hero h5.1.8.2823 build 20240712 and later\nQuTS hero h5.2.0.2802 build 20240620 and later - - -- [C411e/CVE-2024-53691](https://github.com/C411e/CVE-2024-53691) - -### CVE-2024-54152 (2024-12-10) - -Angular Expressions provides expressions for the Angular.JS web framework as a standalone module. Prior to version 1.4.3, an attacker can write a malicious expression that escapes the sandbox to execute arbitrary code on the system. With a more complex (undisclosed) payload, one can get full access to Arbitrary code execution on the system. The problem has been patched in version 1.4.3 of Angular Expressions. Two possible workarounds are available. One may either disable access to `__proto__` globally or make sure that one uses the function with just one argument. - - -- [math-x-io/CVE-2024-54152-poc](https://github.com/math-x-io/CVE-2024-54152-poc) - -### CVE-2024-54262 (2024-12-13) - -Unrestricted Upload of File with Dangerous Type vulnerability in Siddharth Nagar Import Export For WooCommerce allows Upload a Web Shell to a Web Server.This issue affects Import Export For WooCommerce: from n/a through 1.5. - - -- [RandomRobbieBF/CVE-2024-54262](https://github.com/RandomRobbieBF/CVE-2024-54262) - -### CVE-2024-54292 (2024-12-13) - -Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Appsplate Appsplate allows SQL Injection.This issue affects Appsplate: from n/a through 2.1.3. - - -- [RandomRobbieBF/CVE-2024-54292](https://github.com/RandomRobbieBF/CVE-2024-54292) - -### CVE-2024-54330 (2024-12-13) - -Server-Side Request Forgery (SSRF) vulnerability in Hep Hep Hurra (HHH) Hurrakify allows Server Side Request Forgery.This issue affects Hurrakify: from n/a through 2.4. - - -- [RandomRobbieBF/CVE-2024-54330](https://github.com/RandomRobbieBF/CVE-2024-54330) - -### CVE-2024-54363 (2024-12-16) - -Incorrect Privilege Assignment vulnerability in nssTheme Wp NssUser Register allows Privilege Escalation.This issue affects Wp NssUser Register: from n/a through 1.0.0. - - -- [RandomRobbieBF/CVE-2024-54363](https://github.com/RandomRobbieBF/CVE-2024-54363) - -### CVE-2024-54369 (2024-12-16) - -Missing Authorization vulnerability in ThemeHunk Zita Site Builder allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Zita Site Builder: from n/a through 1.0.2. - - -- [RandomRobbieBF/CVE-2024-54369](https://github.com/RandomRobbieBF/CVE-2024-54369) - -### CVE-2024-54374 (2024-12-16) - -Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Sabri Taieb Sogrid allows PHP Local File Inclusion.This issue affects Sogrid: from n/a through 1.5.6. - - -- [RandomRobbieBF/CVE-2024-54374](https://github.com/RandomRobbieBF/CVE-2024-54374) - -### CVE-2024-54378 (2024-12-16) - -Missing Authorization vulnerability in Quietly Quietly Insights allows Privilege Escalation.This issue affects Quietly Insights: from n/a through 1.2.2. - - -- [RandomRobbieBF/CVE-2024-54378](https://github.com/RandomRobbieBF/CVE-2024-54378) - -### CVE-2024-54379 (2024-12-16) - -Missing Authorization vulnerability in Blokhaus Minterpress allows Privilege Escalation.This issue affects Minterpress: from n/a through 1.0.5. - - -- [RandomRobbieBF/CVE-2024-54379](https://github.com/RandomRobbieBF/CVE-2024-54379) - -### CVE-2024-54385 (2024-12-16) - -Server-Side Request Forgery (SSRF) vulnerability in SoftLab Radio Player allows Server Side Request Forgery.This issue affects Radio Player: from n/a through 2.0.82. - - -- [RandomRobbieBF/CVE-2024-54385](https://github.com/RandomRobbieBF/CVE-2024-54385) - -### CVE-2024-54498 (2024-12-11) - -A path handling issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An app may be able to break out of its sandbox. - - -- [wh1te4ever/CVE-2024-54498-PoC](https://github.com/wh1te4ever/CVE-2024-54498-PoC) - -### CVE-2024-54679 (2024-12-05) - -CyberPanel (aka Cyber Panel) before 6778ad1 does not require the FilemanagerAdmin capability for restartMySQL actions. - - -- [hotplugin0x01/CVE-2024-54679](https://github.com/hotplugin0x01/CVE-2024-54679) - -### CVE-2024-54761 (2025-01-09) - -BigAnt Office Messenger 5.6.06 is vulnerable to SQL Injection via the 'dev_code' parameter. - - -- [nscan9/CVE-2024-54761-BigAnt-Office-Messenger-5.6.06-RCE-via-SQL-Injection](https://github.com/nscan9/CVE-2024-54761-BigAnt-Office-Messenger-5.6.06-RCE-via-SQL-Injection) - -### CVE-2024-54819 (2025-01-07) - -I, Librarian before and including 5.11.1 is vulnerable to Server-Side Request Forgery (SSRF) due to improper input validation in classes/security/validation.php - - -- [partywavesec/CVE-2024-54819](https://github.com/partywavesec/CVE-2024-54819) - -### CVE-2024-54910 (2025-01-10) - -Hasleo Backup Suite Free v4.9.4 and before is vulnerable to Insecure Permissions via the File recovery function. - - -- [KrakenEU/CVE-2024-54910](https://github.com/KrakenEU/CVE-2024-54910) - -### CVE-2024-55099 (2024-12-12) - -A SQL Injection vulnerability was found in /admin/index.php in phpgurukul Online Nurse Hiring System v1.0, which allows remote attackers to execute arbitrary SQL commands to get unauthorized database access via the username parameter. - - -- [ugurkarakoc1/CVE-2024-55099-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability-](https://github.com/ugurkarakoc1/CVE-2024-55099-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability-) - -### CVE-2024-55457 -- [h13nh04ng/CVE-2024-55457-PoC](https://github.com/h13nh04ng/CVE-2024-55457-PoC) - -### CVE-2024-55503 -- [SyFi/CVE-2024-55503](https://github.com/SyFi/CVE-2024-55503) - -### CVE-2024-55557 (2024-12-16) - -ui/pref/ProxyPrefView.java in weasis-core in Weasis 4.5.1 has a hardcoded key for symmetric encryption of proxy credentials. - - -- [partywavesec/CVE-2024-55557](https://github.com/partywavesec/CVE-2024-55557) - -### CVE-2024-55587 (2024-12-11) - -python-libarchive through 4.2.1 allows directory traversal (to create files) in extract in zip.py for ZipFile.extractall and ZipFile.extract. - - -- [CSIRTTrizna/CVE-2024-55587](https://github.com/CSIRTTrizna/CVE-2024-55587) - -### CVE-2024-55875 (2024-12-12) - -http4k is a functional toolkit for Kotlin HTTP applications. Prior to version 5.41.0.0, there is a potential XXE (XML External Entity Injection) vulnerability when http4k handling malicious XML contents within requests, which might allow attackers to read local sensitive information on server, trigger Server-side Request Forgery and even execute code under some circumstances. Version 5.41.0.0 contains a patch for the issue. - - -- [JAckLosingHeart/CVE-2024-55875](https://github.com/JAckLosingHeart/CVE-2024-55875) - -### CVE-2024-55968 -- [Wi1DN00B/CVE-2024-55968](https://github.com/Wi1DN00B/CVE-2024-55968) -- [null-event/CVE-2024-55968](https://github.com/null-event/CVE-2024-55968) - -### CVE-2024-55972 (2024-12-16) - -Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Chris Carvache eTemplates allows SQL Injection.This issue affects eTemplates: from n/a through 0.2.1. - - -- [RandomRobbieBF/CVE-2024-55972](https://github.com/RandomRobbieBF/CVE-2024-55972) - -### CVE-2024-55976 (2024-12-16) - -Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mike Leembruggen Critical Site Intel allows SQL Injection.This issue affects Critical Site Intel: from n/a through 1.0. - - -- [RandomRobbieBF/CVE-2024-55976](https://github.com/RandomRobbieBF/CVE-2024-55976) - -### CVE-2024-55978 (2024-12-16) - -Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WalletStation.com Code Generator Pro allows SQL Injection.This issue affects Code Generator Pro: from n/a through 1.2. - - -- [RandomRobbieBF/CVE-2024-55978](https://github.com/RandomRobbieBF/CVE-2024-55978) - -### CVE-2024-55980 (2024-12-16) - -Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Webriderz Wr Age Verification allows SQL Injection.This issue affects Wr Age Verification: from n/a through 2.0.0. - - -- [RandomRobbieBF/CVE-2024-55980](https://github.com/RandomRobbieBF/CVE-2024-55980) - -### CVE-2024-55981 (2024-12-16) - -Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nabajit Roy Nabz Image Gallery allows SQL Injection.This issue affects Nabz Image Gallery: from n/a through v1.00. - - -- [RandomRobbieBF/CVE-2024-55981](https://github.com/RandomRobbieBF/CVE-2024-55981) - -### CVE-2024-55982 (2024-12-16) - -Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in richteam Share Buttons – Social Media allows Blind SQL Injection.This issue affects Share Buttons – Social Media: from n/a through 1.0.2. - - -- [RandomRobbieBF/CVE-2024-55982](https://github.com/RandomRobbieBF/CVE-2024-55982) - -### CVE-2024-55988 (2024-12-16) - -Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Amol Nirmala Waman Navayan CSV Export allows Blind SQL Injection.This issue affects Navayan CSV Export: from n/a through 1.0.9. - - -- [RandomRobbieBF/CVE-2024-55988](https://github.com/RandomRobbieBF/CVE-2024-55988) - -### CVE-2024-56058 (2024-12-18) - -Deserialization of Untrusted Data vulnerability in Gueststream VRPConnector allows Object Injection.This issue affects VRPConnector: from n/a through 2.0.1. - - -- [RandomRobbieBF/CVE-2024-56058](https://github.com/RandomRobbieBF/CVE-2024-56058) - -### CVE-2024-56059 (2024-12-18) - -Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability in Mighty Digital Partners allows Object Injection.This issue affects Partners: from n/a through 0.2.0. - - -- [RandomRobbieBF/CVE-2024-56059](https://github.com/RandomRobbieBF/CVE-2024-56059) - -### CVE-2024-56064 (2024-12-31) - -Unrestricted Upload of File with Dangerous Type vulnerability in Azzaroco WP SuperBackup allows Upload a Web Shell to a Web Server.This issue affects WP SuperBackup: from n/a through 2.3.3. - - -- [RandomRobbieBF/CVE-2024-56064](https://github.com/RandomRobbieBF/CVE-2024-56064) - -### CVE-2024-56067 (2024-12-31) - -Missing Authorization vulnerability in Azzaroco WP SuperBackup allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP SuperBackup: from n/a through 2.3.3. - - -- [RandomRobbieBF/CVE-2024-56067](https://github.com/RandomRobbieBF/CVE-2024-56067) - -### CVE-2024-56115 (2024-12-18) - -A vulnerability in Amiro.CMS before 7.8.4 exists due to the failure to take measures to neutralize special elements. It allows remote attackers to conduct a Cross-Site Scripting (XSS) attack. - - -- [ComplianceControl/CVE-2024-56115](https://github.com/ComplianceControl/CVE-2024-56115) - -### CVE-2024-56116 (2024-12-18) - -A Cross-Site Request Forgery vulnerability in Amiro.CMS before 7.8.4 allows remote attackers to create an administrator account. - - -- [ComplianceControl/CVE-2024-56116](https://github.com/ComplianceControl/CVE-2024-56116) - -### CVE-2024-56145 (2024-12-18) - -Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Users of affected versions are affected by this vulnerability if their php.ini configuration has `register_argc_argv` enabled. For these users an unspecified remote code execution vector is present. Users are advised to update to version 3.9.14, 4.13.2, or 5.5.2. Users unable to upgrade should disable `register_argc_argv` to mitigate the issue. - - -- [Chocapikk/CVE-2024-56145](https://github.com/Chocapikk/CVE-2024-56145) -- [Sachinart/CVE-2024-56145-craftcms-rce](https://github.com/Sachinart/CVE-2024-56145-craftcms-rce) - -### CVE-2024-56278 (2025-01-07) - -Improper Control of Generation of Code ('Code Injection') vulnerability in Smackcoders WP Ultimate Exporter allows PHP Remote File Inclusion.This issue affects WP Ultimate Exporter: from n/a through 2.9.1. - - -- [DoTTak/CVE-2024-56278](https://github.com/DoTTak/CVE-2024-56278) - -### CVE-2024-56289 (2025-01-07) - -Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Groundhogg Inc. Groundhogg allows Reflected XSS.This issue affects Groundhogg: from n/a through 3.7.3.3. - - -- [DoTTak/CVE-2024-56289](https://github.com/DoTTak/CVE-2024-56289) - -### CVE-2024-56331 (2024-12-20) - -Uptime Kuma is an open source, self-hosted monitoring tool. An **Improper URL Handling Vulnerability** allows an attacker to access sensitive local files on the server by exploiting the `file:///` protocol. This vulnerability is triggered via the **"real-browser"** request type, which takes a screenshot of the URL provided by the attacker. By supplying local file paths, such as `file:///etc/passwd`, an attacker can read sensitive data from the server. This vulnerability arises because the system does not properly validate or sanitize the user input for the URL field. Specifically: 1. The URL input (`<input data-v-5f5c86d7="" id="url" type="url" class="form-control" pattern="https?://.+" required="">`) allows users to input arbitrary file paths, including those using the `file:///` protocol, without server-side validation. 2. The server then uses the user-provided URL to make a request, passing it to a browser instance that performs the "real-browser" request, which takes a screenshot of the content at the given URL. If a local file path is entered (e.g., `file:///etc/passwd`), the browser fetches and captures the file’s content. Since the user input is not validated, an attacker can manipulate the URL to request local files (e.g., `file:///etc/passwd`), and the system will capture a screenshot of the file's content, potentially exposing sensitive data. Any **authenticated user** who can submit a URL in "real-browser" mode is at risk of exposing sensitive data through screenshots of these files. This issue has been addressed in version 1.23.16 and all users are advised to upgrade. There are no known workarounds for this vulnerability. - - -- [griisemine/CVE-2024-56331](https://github.com/griisemine/CVE-2024-56331) - -### CVE-2024-56431 (2024-12-25) - -oc_huff_tree_unpack in huffdec.c in libtheora in Theora through 1.0 7180717 has an invalid negative left shift. - - -- [UnionTech-Software/libtheora-CVE-2024-56431-PoC](https://github.com/UnionTech-Software/libtheora-CVE-2024-56431-PoC) - -### CVE-2024-56433 (2024-12-26) - -shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid. - - -- [JonnyWhatshisface/CVE-2024-56433](https://github.com/JonnyWhatshisface/CVE-2024-56433) - -### CVE-2024-56512 (2024-12-28) - -Apache NiFi 1.10.0 through 2.0.0 are missing fine-grained authorization checking for Parameter Contexts, referenced Controller Services, and referenced Parameter Providers, when creating new Process Groups.\n\nCreating a new Process Group can include binding to a Parameter Context, but in cases where the Process Group did not reference any Parameter values, the framework did not check user authorization for the bound Parameter Context. Missing authorization for a bound Parameter Context enabled clients to download non-sensitive Parameter values after creating the Process Group.\n\nCreating a new Process Group can also include referencing existing Controller Services or Parameter Providers. The framework did not check user authorization for referenced Controller Services or Parameter Providers, enabling clients to create Process Groups and use these components that were otherwise unauthorized.\n\nThis vulnerability is limited in scope to authenticated users authorized to create Process Groups. The scope is further limited to deployments with component-based authorization policies. Upgrading to Apache NiFi 2.1.0 is the recommended mitigation, which includes authorization checking for Parameter and Controller Service references on Process Group creation. - - -- [absholi7ly/CVE-2024-56512-Apache-NiFi-Exploit](https://github.com/absholi7ly/CVE-2024-56512-Apache-NiFi-Exploit) - -### CVE-2024-57487 (2025-01-13) - -In Code-Projects Online Car Rental System 1.0, the file upload feature does not validate file extensions or MIME types allowing an attacker to upload a PHP shell without any restrictions and execute commands on the server. - - -- [aaryan-11-x/CVE-2024-57487-and-CVE-2024-57488](https://github.com/aaryan-11-x/CVE-2024-57487-and-CVE-2024-57488) - ### CVE-2024-1642470 - [Symbolexe/CVE-2024-1642470](https://github.com/Symbolexe/CVE-2024-1642470) @@ -42636,6 +38855,7 @@ - [VitoBonetti/CVE-2018-16763](https://github.com/VitoBonetti/CVE-2018-16763) - [saccles/CVE-2018-16763-Proof-of-Concept](https://github.com/saccles/CVE-2018-16763-Proof-of-Concept) - [altsun/CVE-2018-16763-FuelCMS-1.4.1-RCE](https://github.com/altsun/CVE-2018-16763-FuelCMS-1.4.1-RCE) +- [Kz0x-337/CVE-2018-16763](https://github.com/Kz0x-337/CVE-2018-16763) ### CVE-2018-16809 (2019-03-07)