Auto Update 2024/11/21 00:31:25

This commit is contained in:
motikan2010-bot 2024-11-21 09:31:25 +09:00
parent 2ec3f6652f
commit 8bdc3b8f5d
31 changed files with 183 additions and 98 deletions

View file

@ -14,10 +14,10 @@
"description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. ",
"fork": false,
"created_at": "2021-06-05T18:59:28Z",
"updated_at": "2024-11-15T18:13:01Z",
"updated_at": "2024-11-20T23:14:34Z",
"pushed_at": "2021-06-06T09:41:51Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 54,
"watchers": 55,
"score": 0,
"subscribers_count": 4
},

View file

@ -45,7 +45,7 @@
"description": "CVE-2015-1805 root tool",
"fork": false,
"created_at": "2016-04-01T12:10:14Z",
"updated_at": "2024-11-09T15:25:05Z",
"updated_at": "2024-11-20T19:18:22Z",
"pushed_at": "2017-11-23T20:55:03Z",
"stargazers_count": 270,
"watchers_count": 270,

View file

@ -30,7 +30,7 @@
"forks": 24,
"watchers": 193,
"score": 0,
"subscribers_count": 4
"subscribers_count": 0
},
{
"id": 176323109,

View file

@ -45,10 +45,10 @@
"description": "proof of Concept (PoC) exploit for CVE-2021-31630, targeting the OpenPLC service running on the WifineticTwo box on the Hack The Box platform.",
"fork": false,
"created_at": "2024-03-20T22:02:53Z",
"updated_at": "2024-07-21T09:16:48Z",
"updated_at": "2024-11-20T19:01:18Z",
"pushed_at": "2024-03-21T15:50:45Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -983,7 +983,7 @@
"forks": 189,
"watchers": 1085,
"score": 0,
"subscribers_count": 12
"subscribers_count": 13
},
{
"id": 452311547,

View file

@ -14,8 +14,8 @@
"description": null,
"fork": false,
"created_at": "2024-11-19T21:36:09Z",
"updated_at": "2024-11-20T16:53:56Z",
"pushed_at": "2024-11-20T16:53:53Z",
"updated_at": "2024-11-20T21:59:11Z",
"pushed_at": "2024-11-20T21:59:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -355,10 +355,10 @@
"description": "Bulk scanner + get config from CVE-2023-23752",
"fork": false,
"created_at": "2023-03-09T07:42:03Z",
"updated_at": "2024-10-29T17:33:43Z",
"updated_at": "2024-11-20T20:36:15Z",
"pushed_at": "2023-03-14T06:39:36Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -371,7 +371,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 10,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -77,7 +77,7 @@
"fork": false,
"created_at": "2024-04-17T13:36:34Z",
"updated_at": "2024-10-30T14:55:15Z",
"pushed_at": "2024-11-19T22:32:11Z",
"pushed_at": "2024-11-20T22:21:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -15,7 +15,7 @@
"fork": false,
"created_at": "2023-09-16T09:11:21Z",
"updated_at": "2024-11-16T19:51:18Z",
"pushed_at": "2024-10-30T16:03:04Z",
"pushed_at": "2024-11-20T18:53:14Z",
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,

View file

@ -76,10 +76,10 @@
"description": "CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)",
"fork": false,
"created_at": "2023-11-16T17:41:59Z",
"updated_at": "2024-05-29T16:36:38Z",
"updated_at": "2024-11-20T21:28:27Z",
"pushed_at": "2023-11-16T17:44:39Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-19T08:29:32Z",
"updated_at": "2024-11-20T13:34:00Z",
"updated_at": "2024-11-20T22:26:03Z",
"pushed_at": "2024-11-19T09:28:42Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 12,
"watchers": 14,
"score": 0,
"subscribers_count": 0
},

View file

@ -14,10 +14,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-11-19T06:53:09Z",
"updated_at": "2024-11-20T19:32:20Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2281,
"watchers_count": 2281,
"stargazers_count": 2282,
"watchers_count": 2282,
"has_discussions": false,
"forks_count": 298,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 298,
"watchers": 2281,
"watchers": 2282,
"score": 0,
"subscribers_count": 23
},

View file

@ -181,10 +181,10 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/julesbsz\/CVE-2024-10924",
"description": null,
"description": "POC for CVE-2024-10924 written in Python",
"fork": false,
"created_at": "2024-11-20T13:13:15Z",
"updated_at": "2024-11-20T14:00:15Z",
"updated_at": "2024-11-20T19:40:44Z",
"pushed_at": "2024-11-20T14:00:11Z",
"stargazers_count": 0,
"watchers_count": 0,
@ -193,7 +193,12 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"cve-2024-10924",
"python",
"really-simple-security",
"wordpress"
],
"visibility": "public",
"forks": 0,
"watchers": 0,

View file

@ -14,10 +14,10 @@
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
"fork": false,
"created_at": "2024-04-13T05:53:02Z",
"updated_at": "2024-11-11T07:17:27Z",
"updated_at": "2024-11-20T18:54:05Z",
"pushed_at": "2024-04-16T21:00:14Z",
"stargazers_count": 283,
"watchers_count": 283,
"stargazers_count": 284,
"watchers_count": 284,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 283,
"watchers": 284,
"score": 0,
"subscribers_count": 3
},

View file

@ -517,10 +517,10 @@
"description": "Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)",
"fork": false,
"created_at": "2024-02-04T20:56:42Z",
"updated_at": "2024-10-29T18:35:47Z",
"updated_at": "2024-11-20T20:01:17Z",
"pushed_at": "2024-02-05T14:10:26Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": true,
"forks_count": 4,
"allow_forking": true,
@ -529,7 +529,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 20,
"watchers": 19,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "macOS\/ XNU kernel buffer overflow. Introduced in macOS 14.0 (xnu-10002.1.13), fixed in macOS 14.5 (xnu-10063.121.3)",
"fork": false,
"created_at": "2024-06-19T22:03:02Z",
"updated_at": "2024-10-16T12:56:44Z",
"updated_at": "2024-11-21T00:13:10Z",
"pushed_at": "2024-06-20T17:23:22Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 30,
"watchers": 32,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,8 +14,8 @@
"description": null,
"fork": false,
"created_at": "2024-03-22T16:50:40Z",
"updated_at": "2024-09-08T14:08:09Z",
"pushed_at": "2024-04-05T12:58:26Z",
"updated_at": "2024-11-20T23:58:06Z",
"pushed_at": "2024-11-20T23:58:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -19,13 +19,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -45,12 +45,12 @@
"description": "Cobalt Strike 的 CVE-2024-35250 的 BOF。(请给我加个星,谢谢。) ",
"fork": false,
"created_at": "2024-10-15T07:23:47Z",
"updated_at": "2024-11-20T16:31:07Z",
"updated_at": "2024-11-20T19:21:13Z",
"pushed_at": "2024-11-19T05:55:15Z",
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -60,7 +60,7 @@
"lpe"
],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 25,
"score": 0,
"subscribers_count": 1

View file

@ -420,10 +420,10 @@
"description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP\/IP stack that allows for remote code execution (RCE)",
"fork": false,
"created_at": "2024-08-31T13:56:26Z",
"updated_at": "2024-11-07T07:03:40Z",
"updated_at": "2024-11-20T19:42:32Z",
"pushed_at": "2024-11-02T09:01:42Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -432,7 +432,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "poc code for CVE-2024-38080",
"fork": false,
"created_at": "2024-09-01T11:25:22Z",
"updated_at": "2024-11-20T16:31:03Z",
"updated_at": "2024-11-20T18:43:04Z",
"pushed_at": "2024-09-01T11:35:25Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 2
}

View file

@ -45,10 +45,10 @@
"description": "Nuclei template to detect Apache servers vulnerable to CVE-2024-38473",
"fork": false,
"created_at": "2024-08-23T14:39:31Z",
"updated_at": "2024-11-20T08:05:33Z",
"updated_at": "2024-11-20T22:45:58Z",
"pushed_at": "2024-08-24T22:42:42Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 25,
"watchers": 26,
"score": 0,
"subscribers_count": 1
}

View file

@ -50,8 +50,8 @@
"description": "Unauthenticated Remote Code Execution via Angular-Base64-Upload Library (npm:bower)",
"fork": false,
"created_at": "2024-11-19T23:54:30Z",
"updated_at": "2024-11-20T11:09:57Z",
"pushed_at": "2024-11-19T23:58:17Z",
"updated_at": "2024-11-20T22:15:15Z",
"pushed_at": "2024-11-20T22:15:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-44258",
"fork": false,
"created_at": "2024-10-29T09:45:03Z",
"updated_at": "2024-11-20T14:39:02Z",
"updated_at": "2024-11-20T23:55:41Z",
"pushed_at": "2024-11-02T19:20:44Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 51,
"watchers": 53,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "The provided exploit code leverages a stored Cross-Site Scripting (XSS) vulnerability (CVE-2024-4439) in WordPress Core versions up to 6.5.1.",
"fork": false,
"created_at": "2024-05-06T09:07:36Z",
"updated_at": "2024-11-08T04:04:22Z",
"updated_at": "2024-11-20T23:45:41Z",
"pushed_at": "2024-05-06T09:09:18Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},

33
2024/CVE-2024-48990.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 891671184,
"name": "CVE-2024-48990-PoC",
"full_name": "makuga01\/CVE-2024-48990-PoC",
"owner": {
"login": "makuga01",
"id": 20490978,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20490978?v=4",
"html_url": "https:\/\/github.com\/makuga01",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/makuga01\/CVE-2024-48990-PoC",
"description": "PoC for CVE-2024-48990",
"fork": false,
"created_at": "2024-11-20T18:41:25Z",
"updated_at": "2024-11-20T18:49:37Z",
"pushed_at": "2024-11-20T18:49:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-10-08T12:42:59Z",
"updated_at": "2024-11-20T13:54:20Z",
"updated_at": "2024-11-20T21:49:50Z",
"pushed_at": "2024-10-16T12:45:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -11,15 +11,15 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ebrasha\/abdal-anydesk-remote-ip-detector",
"description": "CVE-2024-52940 - A critical zero-day vulnerability in AnyDesk's \"Allow Direct Connections\" feature, discovered and registered by Ebrahim Shafiei (EbraSha), exposing public and private IP addresses. For details, visit the NVD, Tenable, or MITRE pages.",
"description": "CVE-2024-52940 - A zero-day vulnerability in AnyDesk's \"Allow Direct Connections\" feature, discovered and registered by Ebrahim Shafiei (EbraSha), exposing public and private IP addresses. For details, visit the NVD, Tenable, or MITRE pages.",
"fork": false,
"created_at": "2024-10-27T15:29:56Z",
"updated_at": "2024-11-20T16:19:21Z",
"updated_at": "2024-11-21T00:17:23Z",
"pushed_at": "2024-11-18T15:09:32Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -37,8 +37,8 @@
"zero-day-vulnerability"
],
"visibility": "public",
"forks": 6,
"watchers": 5,
"forks": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "A PoC tool for exploiting CVE-2024-7029 in AvTech devices, enabling RCE, vulnerability scanning, and an interactive shell.",
"fork": false,
"created_at": "2024-09-02T10:16:49Z",
"updated_at": "2024-09-11T10:45:21Z",
"updated_at": "2024-11-20T19:07:31Z",
"pushed_at": "2024-09-02T11:43:07Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": true,
"forks_count": 3,
"allow_forking": true,
@ -66,7 +66,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,19 +14,19 @@
"description": "PAN-OS auth bypass + RCE",
"fork": false,
"created_at": "2024-11-19T17:26:27Z",
"updated_at": "2024-11-20T16:39:47Z",
"updated_at": "2024-11-20T22:42:11Z",
"pushed_at": "2024-11-19T17:38:29Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 10,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 10,
"forks": 12,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},
@ -60,5 +60,36 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 891754275,
"name": "CVE-2024-9474",
"full_name": "deathvu\/CVE-2024-9474",
"owner": {
"login": "deathvu",
"id": 47398055,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47398055?v=4",
"html_url": "https:\/\/github.com\/deathvu",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/deathvu\/CVE-2024-9474",
"description": "PoC for PAN-OS Exploit",
"fork": false,
"created_at": "2024-11-20T22:31:50Z",
"updated_at": "2024-11-20T22:35:13Z",
"pushed_at": "2024-11-20T22:35:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1838,6 +1838,7 @@
- [Chocapikk/CVE-2024-9474](https://github.com/Chocapikk/CVE-2024-9474)
- [k4nfr3/CVE-2024-9474](https://github.com/k4nfr3/CVE-2024-9474)
- [deathvu/CVE-2024-9474](https://github.com/deathvu/CVE-2024-9474)
### CVE-2024-9570 (2024-10-07)
@ -6512,6 +6513,13 @@
- [BrotherOfJhonny/CVE-2024-48955_Overview](https://github.com/BrotherOfJhonny/CVE-2024-48955_Overview)
### CVE-2024-48990 (2024-11-19)
<code>Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.
</code>
- [makuga01/CVE-2024-48990-PoC](https://github.com/makuga01/CVE-2024-48990-PoC)
### CVE-2024-49039 (2024-11-12)
<code>Windows Task Scheduler Elevation of Privilege Vulnerability
@ -6519,7 +6527,11 @@
- [je5442804/WPTaskScheduler_CVE-2024-49039](https://github.com/je5442804/WPTaskScheduler_CVE-2024-49039)
### CVE-2024-49203
### CVE-2024-49203 (2024-11-20)
<code>Querydsl 5.1.0 allows SQL/HQL injection in orderBy in JPAQuery.
</code>
- [CSIRTTrizna/CVE-2024-49203](https://github.com/CSIRTTrizna/CVE-2024-49203)
### CVE-2024-49328 (2024-10-20)
@ -6876,7 +6888,11 @@
- [famixcm/CVE-2024-52316](https://github.com/famixcm/CVE-2024-52316)
- [TAM-K592/CVE-2024-52316](https://github.com/TAM-K592/CVE-2024-52316)
### CVE-2024-52677
### CVE-2024-52677 (2024-11-20)
<code>HkCms &lt;= v2.3.2.240702 is vulnerable to file upload in the getFileName method in /app/common/library/Upload.php.
</code>
- [J-0k3r/CVE-2024-52677](https://github.com/J-0k3r/CVE-2024-52677)
### CVE-2024-52711 (2024-11-19)