Auto Update 2024/12/02 06:32:09

This commit is contained in:
motikan2010-bot 2024-12-02 15:32:09 +09:00
parent ad5769e126
commit 8a8498cbf2
53 changed files with 343 additions and 199 deletions

View file

@ -102,13 +102,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 0

View file

@ -45,10 +45,10 @@
"description": "CVE-2017-12149 jboss反序列化 可回显",
"fork": false,
"created_at": "2017-11-28T02:52:47Z",
"updated_at": "2024-11-01T02:37:43Z",
"updated_at": "2024-12-02T01:44:37Z",
"pushed_at": "2019-03-13T08:57:50Z",
"stargazers_count": 206,
"watchers_count": 206,
"stargazers_count": 207,
"watchers_count": 207,
"has_discussions": false,
"forks_count": 58,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 58,
"watchers": 206,
"watchers": 207,
"score": 0,
"subscribers_count": 3
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 65,
"watchers_count": 65,
"has_discussions": false,
"forks_count": 29,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 29,
"forks": 30,
"watchers": 65,
"score": 0,
"subscribers_count": 7
@ -50,13 +50,13 @@
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 20,
"score": 0,
"subscribers_count": 2
@ -205,7 +205,7 @@
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -226,7 +226,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 11,
"score": 0,
"subscribers_count": 1

View file

@ -76,19 +76,19 @@
"description": "Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow",
"fork": false,
"created_at": "2021-07-02T16:03:16Z",
"updated_at": "2024-11-29T09:13:48Z",
"updated_at": "2024-12-02T00:41:17Z",
"pushed_at": "2022-09-01T06:33:36Z",
"stargazers_count": 179,
"watchers_count": 179,
"stargazers_count": 180,
"watchers_count": 180,
"has_discussions": false,
"forks_count": 48,
"forks_count": 49,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 179,
"forks": 49,
"watchers": 180,
"score": 0,
"subscribers_count": 7
},

View file

@ -45,10 +45,10 @@
"description": "Nacos Derby命令执行漏洞利用脚本",
"fork": false,
"created_at": "2024-11-22T01:32:37Z",
"updated_at": "2024-11-27T16:18:12Z",
"updated_at": "2024-12-02T02:55:21Z",
"pushed_at": "2024-11-22T01:33:26Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2024-11-28T14:15:13Z",
"updated_at": "2024-12-02T04:25:52Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1342,
"watchers_count": 1342,
"stargazers_count": 1343,
"watchers_count": 1343,
"has_discussions": false,
"forks_count": 322,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 322,
"watchers": 1342,
"watchers": 1343,
"score": 0,
"subscribers_count": 27
},

View file

@ -208,10 +208,10 @@
"description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
"fork": false,
"created_at": "2021-12-07T15:11:34Z",
"updated_at": "2024-11-26T11:52:47Z",
"updated_at": "2024-12-02T04:14:35Z",
"pushed_at": "2024-07-12T14:17:27Z",
"stargazers_count": 244,
"watchers_count": 244,
"stargazers_count": 245,
"watchers_count": 245,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -224,7 +224,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 244,
"watchers": 245,
"score": 0,
"subscribers_count": 6
},

View file

@ -2102,10 +2102,10 @@
"description": "CVE-2022-1388 是一个影响 F5 BIG-IP 应用交付控制器ADC的严重漏洞。以下是对其原理和危害的详细介绍",
"fork": false,
"created_at": "2024-11-23T05:39:26Z",
"updated_at": "2024-11-24T06:35:13Z",
"updated_at": "2024-12-02T02:55:21Z",
"pushed_at": "2024-11-23T05:41:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -2118,7 +2118,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -2143,10 +2143,10 @@
"description": "CVE-2022-26134 是一个影响 Atlassian Confluence Server 和 Data Center 的 远程代码执行漏洞RCE其成因是服务器处理 OGNL 表达式时未能正确过滤输入,从而允许攻击者以特权账户权限执行任意代码。",
"fork": false,
"created_at": "2024-11-23T05:35:59Z",
"updated_at": "2024-11-24T06:37:06Z",
"updated_at": "2024-12-02T02:55:22Z",
"pushed_at": "2024-11-23T05:38:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -2159,7 +2159,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,19 +14,19 @@
"description": "Exploit for CVE-2022-29582 targeting Google's Kernel CTF",
"fork": false,
"created_at": "2022-08-04T15:29:04Z",
"updated_at": "2024-09-24T16:59:16Z",
"updated_at": "2024-12-02T01:02:48Z",
"pushed_at": "2022-08-08T04:13:33Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 11,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 69,
"forks": 10,
"watchers": 70,
"score": 0,
"subscribers_count": 4
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 118,
"watchers_count": 118,
"has_discussions": false,
"forks_count": 27,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 27,
"forks": 24,
"watchers": 118,
"score": 0,
"subscribers_count": 4

View file

@ -31,6 +31,6 @@
"forks": 10,
"watchers": 41,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
}
]

View file

@ -31,7 +31,7 @@
"forks": 44,
"watchers": 303,
"score": 0,
"subscribers_count": 7
"subscribers_count": 8
},
{
"id": 820964383,
@ -48,10 +48,10 @@
"description": "Bootloader unlock using CVE-2022-38694 for Anbernic Unisoc T820 devices",
"fork": false,
"created_at": "2024-06-27T14:28:13Z",
"updated_at": "2024-11-16T22:45:41Z",
"updated_at": "2024-12-02T01:03:31Z",
"pushed_at": "2024-10-15T10:16:57Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 28,
"watchers": 27,
"score": 0,
"subscribers_count": 3
}

View file

@ -798,10 +798,10 @@
"description": "CVE-2023-20198是思科IOS XE软件Web UI功能中的一个严重漏洞允许未经身份验证的远程攻击者在受影响的系统上创建具有特权级别15的账户从而完全控制设备。",
"fork": false,
"created_at": "2024-11-22T04:10:28Z",
"updated_at": "2024-11-26T15:13:33Z",
"updated_at": "2024-12-02T02:55:22Z",
"pushed_at": "2024-11-22T04:12:11Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -810,7 +810,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 2
}

View file

@ -34,6 +34,6 @@
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "Abusing CVE-2023-28206 to make something useful",
"fork": false,
"created_at": "2023-05-15T14:22:12Z",
"updated_at": "2024-07-30T06:56:49Z",
"updated_at": "2024-12-02T04:38:55Z",
"pushed_at": "2023-05-17T17:39:26Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 9,
"watchers": 8,
"score": 0,
"subscribers_count": 3
}

View file

@ -479,10 +479,10 @@
"description": "cpanel_xss_2023 is a simple Python script designed for finding CVE-2023-29489 vulnerability in cpanel.",
"fork": false,
"created_at": "2024-01-23T20:29:57Z",
"updated_at": "2024-06-03T08:19:43Z",
"updated_at": "2024-12-02T05:38:14Z",
"pushed_at": "2024-01-31T16:23:15Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -491,7 +491,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -48,10 +48,10 @@
"description": "Juniper Firewalls CVE-2023-36845 - RCE",
"fork": false,
"created_at": "2023-09-26T17:56:55Z",
"updated_at": "2024-11-29T01:47:08Z",
"updated_at": "2024-12-02T02:41:52Z",
"pushed_at": "2023-12-29T14:56:44Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -79,7 +79,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 48,
"watchers": 49,
"score": 0,
"subscribers_count": 2
},

View file

@ -1145,10 +1145,10 @@
"description": "CVE-2023-38646是Metabase中的一个远程代码执行漏洞。该漏洞源于Metabase在处理未经身份验证的API端点\/api\/setup\/validate时对JDBC连接字符串的处理存在安全缺陷。攻击者可以通过构造特定的JDBC连接字符串利用该端点在服务器上执行任意命令而无需进行身份验证。",
"fork": false,
"created_at": "2024-11-22T04:15:25Z",
"updated_at": "2024-11-22T13:43:56Z",
"updated_at": "2024-12-02T02:55:22Z",
"pushed_at": "2024-11-22T04:18:53Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1157,7 +1157,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -1426,7 +1426,7 @@
"fork": false,
"created_at": "2024-08-06T13:21:27Z",
"updated_at": "2024-08-06T14:44:37Z",
"pushed_at": "2024-11-18T03:53:26Z",
"pushed_at": "2024-12-02T04:08:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "[漏洞复现] 全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.",
"fork": false,
"created_at": "2023-11-17T10:32:31Z",
"updated_at": "2024-11-30T10:19:33Z",
"updated_at": "2024-12-02T03:13:36Z",
"pushed_at": "2023-11-21T10:45:58Z",
"stargazers_count": 201,
"watchers_count": 201,
"stargazers_count": 202,
"watchers_count": 202,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 34,
"watchers": 201,
"watchers": 202,
"score": 0,
"subscribers_count": 3
},

View file

@ -113,10 +113,10 @@
"description": "CVE-2023-47246 是 SysAid On-Premise 软件(版本 23.3.36 之前)中的一个路径遍历漏洞。攻击者可以利用该漏洞将文件写入 Tomcat 的 webroot 目录,从而在服务器上执行任意代码。",
"fork": false,
"created_at": "2024-11-23T05:21:22Z",
"updated_at": "2024-11-24T06:37:21Z",
"updated_at": "2024-12-02T02:55:22Z",
"pushed_at": "2024-11-23T05:24:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -129,7 +129,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -169,10 +169,10 @@
"description": "CVE-2024-0012是Palo Alto Networks PAN-OS软件中的一个身份验证绕过漏洞。该漏洞允许未经身份验证的攻击者通过网络访问管理Web界面获取PAN-OS管理员权限从而执行管理操作、篡改配置或利用其他需要身份验证的特权提升漏洞如CVE-2024-9474 ",
"fork": false,
"created_at": "2024-11-22T14:11:56Z",
"updated_at": "2024-11-22T14:37:08Z",
"updated_at": "2024-12-02T02:55:23Z",
"pushed_at": "2024-11-22T14:37:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
@ -231,8 +231,8 @@
"description": "CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC",
"fork": false,
"created_at": "2024-11-30T16:06:02Z",
"updated_at": "2024-12-01T11:24:41Z",
"pushed_at": "2024-12-01T11:24:38Z",
"updated_at": "2024-12-02T02:33:44Z",
"pushed_at": "2024-12-02T02:33:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-11-29T15:15:14Z",
"updated_at": "2024-12-02T05:48:05Z",
"pushed_at": "2024-07-25T18:12:57Z",
"stargazers_count": 258,
"watchers_count": 258,
"stargazers_count": 260,
"watchers_count": 260,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 258,
"watchers": 260,
"score": 0,
"subscribers_count": 7
},

View file

@ -76,10 +76,10 @@
"description": "CVE-2024-10220 Test repo",
"fork": false,
"created_at": "2024-12-01T05:15:25Z",
"updated_at": "2024-12-01T05:18:42Z",
"updated_at": "2024-12-02T02:55:23Z",
"pushed_at": "2024-12-01T05:18:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": "Exploit for Pandora FMS Remote Code Execution CVE-2024-11320",
"fork": false,
"created_at": "2024-12-01T12:39:49Z",
"updated_at": "2024-12-01T12:54:15Z",
"updated_at": "2024-12-02T01:11:25Z",
"pushed_at": "2024-12-01T12:48:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis",
"fork": false,
"created_at": "2024-11-29T06:13:36Z",
"updated_at": "2024-12-02T00:22:08Z",
"updated_at": "2024-12-02T02:58:44Z",
"pushed_at": "2024-11-29T21:02:56Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 22,
"watchers": 24,
"score": 0,
"subscribers_count": 1
}

View file

@ -173,10 +173,10 @@
"description": "CVE-2024-21683 Confluence Post Auth RCE",
"fork": false,
"created_at": "2024-11-29T13:27:37Z",
"updated_at": "2024-11-29T16:57:18Z",
"updated_at": "2024-12-02T02:55:23Z",
"pushed_at": "2024-11-29T13:33:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -185,7 +185,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -200,10 +200,10 @@
"description": "CVE-2024-21762 是 Fortinet 公司的 FortiOS 和 FortiProxy 产品中的一个严重漏洞,存在于其 SSL VPN 组件中。",
"fork": false,
"created_at": "2024-11-24T07:20:45Z",
"updated_at": "2024-11-27T16:15:36Z",
"updated_at": "2024-12-02T02:55:23Z",
"pushed_at": "2024-11-24T08:07:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -169,10 +169,10 @@
"description": "CVE-2024-23113 是一个严重的安全漏洞,影响 Fortinet 的多款产品,包括 FortiOS、FortiProxy、FortiPAM 和 FortiSwitchManager。该漏洞允许未经身份验证的远程攻击者通过特制的请求在受影响的设备上执行任意代码或命令可能导致系统被完全控制。",
"fork": false,
"created_at": "2024-11-22T01:46:58Z",
"updated_at": "2024-11-22T09:54:37Z",
"updated_at": "2024-12-02T02:55:24Z",
"pushed_at": "2024-11-22T01:53:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -186,7 +186,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
@ -205,10 +205,10 @@
"description": "CVE-2024-23113 是一个在 Linux Kernel 中被发现的漏洞,它属于 任意代码执行漏洞,影响了 bpf (Berkeley Packet Filter) 子系统。具体来说,这个漏洞影响了 bpf 程序的 bpf_prog 类型的对象,并且可以允许攻击者通过构造恶意的 BPF 程序来在内核空间执行恶意代码。",
"fork": false,
"created_at": "2024-11-28T06:30:02Z",
"updated_at": "2024-12-02T00:20:29Z",
"updated_at": "2024-12-02T02:55:24Z",
"pushed_at": "2024-11-28T06:35:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -217,7 +217,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -329,10 +329,10 @@
"description": "CVE-2024-23692 是影响 Rejetto HTTP File ServerHFS2.3m 及之前版本的模板注入漏洞。该漏洞允许远程未授权的攻击者通过发送特制的 HTTP 请求,在受影响的系统上执行任意命令。",
"fork": false,
"created_at": "2024-11-23T03:59:13Z",
"updated_at": "2024-11-26T03:21:42Z",
"updated_at": "2024-12-02T02:55:24Z",
"pushed_at": "2024-11-23T04:00:55Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -341,7 +341,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -155,10 +155,10 @@
"description": "PoC for CVE-2024-25641 Authenticated RCE on Cacti v1.2.26",
"fork": false,
"created_at": "2024-11-22T14:05:37Z",
"updated_at": "2024-11-22T14:09:19Z",
"updated_at": "2024-12-02T02:55:25Z",
"pushed_at": "2024-11-22T14:09:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -167,7 +167,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -76,10 +76,10 @@
"description": "CVE-2024-27130是影响QNAP网络附加存储NAS设备的一个严重漏洞。该漏洞源于QTS操作系统中share.cgi脚本的No_Support_ACL函数中不安全地使用strcpy函数导致堆栈缓冲区溢出。攻击者可以利用此漏洞通过精心构造的请求在目标系统上执行任意代码进而完全控制受影响的设备。 ",
"fork": false,
"created_at": "2024-11-22T14:18:08Z",
"updated_at": "2024-11-22T14:56:43Z",
"updated_at": "2024-12-02T02:55:25Z",
"pushed_at": "2024-11-22T14:20:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,19 +14,19 @@
"description": null,
"fork": false,
"created_at": "2024-06-24T10:37:26Z",
"updated_at": "2024-11-29T11:17:11Z",
"updated_at": "2024-12-02T01:29:58Z",
"pushed_at": "2024-07-31T19:11:55Z",
"stargazers_count": 241,
"watchers_count": 241,
"stargazers_count": 242,
"watchers_count": 242,
"has_discussions": false,
"forks_count": 54,
"forks_count": 55,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 241,
"forks": 55,
"watchers": 242,
"score": 0,
"subscribers_count": 3
},

View file

@ -921,7 +921,7 @@
"description": "Obsidian notes about CVE-2024-3094",
"fork": false,
"created_at": "2024-04-01T12:41:00Z",
"updated_at": "2024-05-15T20:20:03Z",
"updated_at": "2024-12-02T06:11:03Z",
"pushed_at": "2024-05-05T08:53:07Z",
"stargazers_count": 1,
"watchers_count": 1,
@ -1856,10 +1856,10 @@
"description": "CVE-2024-3094 (XZ Backdoor) Tools",
"fork": false,
"created_at": "2024-12-01T05:22:08Z",
"updated_at": "2024-12-01T05:30:29Z",
"updated_at": "2024-12-02T02:55:25Z",
"pushed_at": "2024-12-01T05:30:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1868,7 +1868,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false,
"created_at": "2024-10-13T19:30:20Z",
"updated_at": "2024-11-29T16:56:26Z",
"updated_at": "2024-12-02T01:54:42Z",
"pushed_at": "2024-11-29T16:56:23Z",
"stargazers_count": 213,
"watchers_count": 213,
"stargazers_count": 214,
"watchers_count": 214,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 213,
"watchers": 214,
"score": 0,
"subscribers_count": 6
},

View file

@ -362,10 +362,10 @@
"description": "geoserver图形化漏洞利用工具",
"fork": false,
"created_at": "2024-10-05T10:08:55Z",
"updated_at": "2024-11-29T14:35:04Z",
"updated_at": "2024-12-02T00:48:15Z",
"pushed_at": "2024-10-08T03:16:26Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -374,7 +374,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 19,
"watchers": 20,
"score": 0,
"subscribers_count": 1
},
@ -455,10 +455,10 @@
"description": "CVE-2024-36401是GeoServer中的一个高危远程代码执行漏洞。GeoServer是一款开源的地理数据服务器软件主要用于发布、共享和处理各种地理空间数据。 ALIYUN 漏洞原理: 该漏洞源于GeoServer在处理属性名称时将其不安全地解析为XPath表达式。具体而言GeoServer调用的GeoTools库API在评估要素类型的属性名称时以不安全的方式将其传递给commons-jxpath库。由于commons-jxpath库在解析XPath表达式时允许执行任意代码攻击者可以通过构造特定的输入利用多个OGC请求参数如WFS GetFeature、WFS GetPropertyValue、WMS GetMap等在未经身份验证的情况下远程执行任意代码。 ",
"fork": false,
"created_at": "2024-11-22T14:21:53Z",
"updated_at": "2024-11-22T14:57:02Z",
"updated_at": "2024-12-02T02:55:25Z",
"pushed_at": "2024-11-22T14:22:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -467,7 +467,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -138,10 +138,10 @@
"description": "CVE-2024-37084是Spring Cloud Data Flow中的一个高危漏洞影响版本为2.11.0至2.11.3。该漏洞允许具有Skipper服务器API访问权限的攻击者通过精心构造的上传请求将任意文件写入服务器文件系统的任意位置进而可能导致远程代码执行严重威胁服务器安全。",
"fork": false,
"created_at": "2024-11-22T13:53:42Z",
"updated_at": "2024-11-22T14:52:35Z",
"updated_at": "2024-12-02T02:55:26Z",
"pushed_at": "2024-11-22T14:02:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -155,7 +155,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -91,5 +91,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 897089761,
"name": "App-vulnerable",
"full_name": "Anthony1078\/App-vulnerable",
"owner": {
"login": "Anthony1078",
"id": 96083496,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96083496?v=4",
"html_url": "https:\/\/github.com\/Anthony1078",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Anthony1078\/App-vulnerable",
"description": " CVE-2024-38816",
"fork": false,
"created_at": "2024-12-02T02:14:49Z",
"updated_at": "2024-12-02T02:15:52Z",
"pushed_at": "2024-12-02T02:15:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -208,10 +208,10 @@
"description": "CVE-2024-38856 是 Apache OFBiz 中的一个严重漏洞,允许未经身份验证的攻击者在受影响的系统上执行任意代码。 ",
"fork": false,
"created_at": "2024-11-23T03:54:28Z",
"updated_at": "2024-11-23T03:57:31Z",
"updated_at": "2024-12-02T02:55:26Z",
"pushed_at": "2024-11-23T03:57:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -220,7 +220,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1

33
2024/CVE-2024-45216.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 897120495,
"name": "CVE-2024-45216-Poc",
"full_name": "congdong007\/CVE-2024-45216-Poc",
"owner": {
"login": "congdong007",
"id": 104914028,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104914028?v=4",
"html_url": "https:\/\/github.com\/congdong007",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/congdong007\/CVE-2024-45216-Poc",
"description": null,
"fork": false,
"created_at": "2024-12-02T04:09:04Z",
"updated_at": "2024-12-02T04:16:12Z",
"pushed_at": "2024-12-02T04:16:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -45,10 +45,10 @@
"description": "This repository contains an exploit demonstration for CVE-2024-45436, a critical vulnerability affecting specific software versions. It highlights the exploitation mechanism and provides insights for security researchers to understand and mitigate the risk. ",
"fork": false,
"created_at": "2024-11-21T09:03:21Z",
"updated_at": "2024-11-22T09:52:29Z",
"updated_at": "2024-12-02T02:55:26Z",
"pushed_at": "2024-11-21T09:08:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -62,7 +62,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -107,10 +107,10 @@
"description": "CVE-2024-45519是Zimbra CollaborationZCS中的一个高危漏洞存在于其postjournal服务中。当该服务被启用时未经身份验证的攻击者可以通过构造特定的SMTP请求远程执行任意命令从而完全控制受影响的服务器。",
"fork": false,
"created_at": "2024-11-22T01:56:21Z",
"updated_at": "2024-11-22T09:01:44Z",
"updated_at": "2024-12-02T02:55:26Z",
"pushed_at": "2024-11-22T02:00:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -124,7 +124,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -548,10 +548,10 @@
"description": "[漏洞复现] 全球首款利用PHP默认环境XAMPP的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP。",
"fork": false,
"created_at": "2024-06-08T13:04:45Z",
"updated_at": "2024-11-20T16:30:49Z",
"updated_at": "2024-12-02T03:14:20Z",
"pushed_at": "2024-07-21T20:27:03Z",
"stargazers_count": 120,
"watchers_count": 120,
"stargazers_count": 121,
"watchers_count": 121,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -560,7 +560,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 120,
"watchers": 121,
"score": 0,
"subscribers_count": 1
},

View file

@ -107,10 +107,10 @@
"description": "CVE-2024-47575是Fortinet的FortiManager和FortiManager Cloud产品中的一个严重漏洞源于fgfmsd守护进程缺乏对关键功能的身份验证。",
"fork": false,
"created_at": "2024-11-22T03:13:03Z",
"updated_at": "2024-11-22T13:43:07Z",
"updated_at": "2024-12-02T02:55:27Z",
"pushed_at": "2024-11-22T03:17:57Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

33
2024/CVE-2024-48307.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 897159186,
"name": "CVE-2024-48307-poc",
"full_name": "iSee857\/CVE-2024-48307-poc",
"owner": {
"login": "iSee857",
"id": 73977770,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73977770?v=4",
"html_url": "https:\/\/github.com\/iSee857",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/iSee857\/CVE-2024-48307-poc",
"description": null,
"fork": false,
"created_at": "2024-12-02T06:17:24Z",
"updated_at": "2024-12-02T06:25:39Z",
"pushed_at": "2024-12-02T06:25:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -79,10 +79,10 @@
"description": "CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6s upgrademysqlstatus endpoint, bypassing CSRF protections.",
"fork": false,
"created_at": "2024-11-26T02:18:24Z",
"updated_at": "2024-11-29T16:57:51Z",
"updated_at": "2024-12-02T02:55:27Z",
"pushed_at": "2024-11-26T02:21:21Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -91,7 +91,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -41,5 +41,36 @@
"watchers": 27,
"score": 0,
"subscribers_count": 1
},
{
"id": 897139433,
"name": "AnySniff",
"full_name": "MKultra6969\/AnySniff",
"owner": {
"login": "MKultra6969",
"id": 40924797,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40924797?v=4",
"html_url": "https:\/\/github.com\/MKultra6969",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MKultra6969\/AnySniff",
"description": "AnySniff is a tool for monitoring TCP connections of processes like AnyDesk on Windows. It uses the CVE-2024-52940 vulnerability to track open connections and log IPs, ports, and other details.",
"fork": false,
"created_at": "2024-12-02T05:15:11Z",
"updated_at": "2024-12-02T06:03:21Z",
"pushed_at": "2024-12-02T06:03:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE",
"fork": false,
"created_at": "2024-11-13T02:50:56Z",
"updated_at": "2024-11-29T16:57:24Z",
"updated_at": "2024-12-02T02:55:27Z",
"pushed_at": "2024-11-29T03:02:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -76,10 +76,10 @@
"description": "CVE-2024-9441是影响Linear eMerge e3系列版本1.00-07及之前的操作系统命令注入漏洞。未经身份验证的远程攻击者可通过HTTP请求中“forgot_password”功能的“login_id”参数执行任意操作系统命令。",
"fork": false,
"created_at": "2024-11-22T02:04:21Z",
"updated_at": "2024-11-22T13:43:44Z",
"updated_at": "2024-12-02T02:55:27Z",
"pushed_at": "2024-11-22T02:07:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -93,7 +93,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,19 +14,19 @@
"description": "PAN-OS auth bypass + RCE",
"fork": false,
"created_at": "2024-11-19T17:26:27Z",
"updated_at": "2024-11-28T09:18:35Z",
"updated_at": "2024-12-02T05:10:47Z",
"pushed_at": "2024-11-19T17:38:29Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 34,
"forks": 19,
"watchers": 35,
"score": 0,
"subscribers_count": 1
},

View file

@ -5582,6 +5582,7 @@
- [startsw1th/cve-2024-38816-demo](https://github.com/startsw1th/cve-2024-38816-demo)
- [WULINPIN/CVE-2024-38816-PoC](https://github.com/WULINPIN/CVE-2024-38816-PoC)
- [Galaxy-system/cve-2024-38816](https://github.com/Galaxy-system/cve-2024-38816)
- [Anthony1078/App-vulnerable](https://github.com/Anthony1078/App-vulnerable)
### CVE-2024-38821 (2024-10-28)
@ -6354,6 +6355,13 @@
- [latte-soft/kartlanpwn](https://github.com/latte-soft/kartlanpwn)
### CVE-2024-45216 (2024-10-16)
<code>Improper Authentication vulnerability in Apache Solr.\n\nSolr instances using the PKIAuthenticationPlugin, which is enabled by default when Solr Authentication is used, are vulnerable to Authentication bypass.\nA fake ending at the end of any Solr API URL path, will allow requests to skip Authentication while maintaining the API contract with the original URL Path.\nThis fake ending looks like an unprotected API path, however it is stripped off internally after authentication but before API routing.\n\n\nThis issue affects Apache Solr: from 5.3.0 before 8.11.4, from 9.0.0 before 9.7.0.\n\nUsers are recommended to upgrade to version 9.7.0, or 8.11.4, which fix the issue.
</code>
- [congdong007/CVE-2024-45216-Poc](https://github.com/congdong007/CVE-2024-45216-Poc)
### CVE-2024-45241 (2024-08-26)
<code>A traversal vulnerability in GeneralDocs.aspx in CentralSquare CryWolf (False Alarm Management) through 2024-08-09 allows unauthenticated attackers to read files outside of the working web directory via the rpt parameter, leading to the disclosure of sensitive information.
@ -6619,6 +6627,13 @@
- [ajrielrm/CVE-2024-48217](https://github.com/ajrielrm/CVE-2024-48217)
### CVE-2024-48307 (2024-10-31)
<code>JeecgBoot v3.7.1 was discovered to contain a SQL injection vulnerability via the component /onlDragDatasetHead/getTotalData.
</code>
- [iSee857/CVE-2024-48307-poc](https://github.com/iSee857/CVE-2024-48307-poc)
### CVE-2024-48322 (2024-11-11)
<code>UsersController.php in Run.codes 1.5.2 and older has a reset password race condition vulnerability.
@ -7194,6 +7209,7 @@
</code>
- [ebrasha/abdal-anydesk-remote-ip-detector](https://github.com/ebrasha/abdal-anydesk-remote-ip-detector)
- [MKultra6969/AnySniff](https://github.com/MKultra6969/AnySniff)
### CVE-2024-53255 (2024-11-25)