Auto Update 2024/12/17 00:32:18

This commit is contained in:
motikan2010-bot 2024-12-17 09:32:19 +09:00
parent 240a568e4f
commit 9d171c6b40
28 changed files with 100 additions and 130 deletions

View file

@ -546,13 +546,13 @@
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 2,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability", "description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
"fork": false, "fork": false,
"created_at": "2017-10-09T15:13:25Z", "created_at": "2017-10-09T15:13:25Z",
"updated_at": "2024-11-06T02:08:21Z", "updated_at": "2024-12-16T21:39:31Z",
"pushed_at": "2021-07-29T12:00:48Z", "pushed_at": "2021-07-29T12:00:48Z",
"stargazers_count": 138, "stargazers_count": 139,
"watchers_count": 138, "watchers_count": 139,
"has_discussions": false, "has_discussions": false,
"forks_count": 50, "forks_count": 50,
"allow_forking": true, "allow_forking": true,
@ -32,7 +32,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 50, "forks": 50,
"watchers": 138, "watchers": 139,
"score": 0, "score": 0,
"subscribers_count": 11 "subscribers_count": 11
}, },

View file

@ -14,8 +14,8 @@
"description": "Fork of the send module to deal with CVE-2017-20165", "description": "Fork of the send module to deal with CVE-2017-20165",
"fork": false, "fork": false,
"created_at": "2023-01-11T10:20:27Z", "created_at": "2023-01-11T10:20:27Z",
"updated_at": "2024-12-16T06:01:30Z", "updated_at": "2024-12-16T20:04:38Z",
"pushed_at": "2024-12-16T06:01:33Z", "pushed_at": "2024-12-16T20:04:36Z",
"stargazers_count": 13, "stargazers_count": 13,
"watchers_count": 13, "watchers_count": 13,
"has_discussions": false, "has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019", "description": "TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019",
"fork": false, "fork": false,
"created_at": "2019-02-07T06:45:27Z", "created_at": "2019-02-07T06:45:27Z",
"updated_at": "2024-12-09T14:22:47Z", "updated_at": "2024-12-16T18:24:16Z",
"pushed_at": "2022-06-26T06:08:02Z", "pushed_at": "2022-06-26T06:08:02Z",
"stargazers_count": 101, "stargazers_count": 102,
"watchers_count": 101, "watchers_count": 102,
"has_discussions": false, "has_discussions": false,
"forks_count": 20, "forks_count": 20,
"allow_forking": true, "allow_forking": true,
@ -34,7 +34,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 20, "forks": 20,
"watchers": 101, "watchers": 102,
"score": 0, "score": 0,
"subscribers_count": 12 "subscribers_count": 12
} }

View file

@ -14,10 +14,10 @@
"description": "Apache OFBiz 16.11.04 is susceptible to XML external entity injection (XXE injection)", "description": "Apache OFBiz 16.11.04 is susceptible to XML external entity injection (XXE injection)",
"fork": false, "fork": false,
"created_at": "2024-04-24T12:23:21Z", "created_at": "2024-04-24T12:23:21Z",
"updated_at": "2024-06-21T06:39:42Z", "updated_at": "2024-12-16T20:11:35Z",
"pushed_at": "2024-06-21T06:43:10Z", "pushed_at": "2024-06-21T06:43:10Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -32,7 +32,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
} }

View file

@ -45,7 +45,7 @@
"description": "CVE-2020-11023 PoC for bug bounty.", "description": "CVE-2020-11023 PoC for bug bounty.",
"fork": false, "fork": false,
"created_at": "2024-01-03T02:35:37Z", "created_at": "2024-01-03T02:35:37Z",
"updated_at": "2024-06-05T16:58:15Z", "updated_at": "2024-12-16T18:31:44Z",
"pushed_at": "2024-01-03T02:40:45Z", "pushed_at": "2024-01-03T02:40:45Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,

View file

@ -176,10 +176,10 @@
"description": "Exploit for zerologon cve-2020-1472", "description": "Exploit for zerologon cve-2020-1472",
"fork": false, "fork": false,
"created_at": "2020-09-14T19:19:07Z", "created_at": "2020-09-14T19:19:07Z",
"updated_at": "2024-12-08T14:49:17Z", "updated_at": "2024-12-16T19:07:57Z",
"pushed_at": "2020-10-15T18:31:15Z", "pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 636, "stargazers_count": 637,
"watchers_count": 636, "watchers_count": 637,
"has_discussions": false, "has_discussions": false,
"forks_count": 146, "forks_count": 146,
"allow_forking": true, "allow_forking": true,
@ -188,7 +188,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 146, "forks": 146,
"watchers": 636, "watchers": 637,
"score": 0, "score": 0,
"subscribers_count": 12 "subscribers_count": 12
}, },

View file

@ -3746,6 +3746,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -14,10 +14,10 @@
"description": "CVE-2022-21660", "description": "CVE-2022-21660",
"fork": false, "fork": false,
"created_at": "2022-01-10T05:50:35Z", "created_at": "2022-01-10T05:50:35Z",
"updated_at": "2024-08-19T12:18:08Z", "updated_at": "2024-12-16T23:26:40Z",
"pushed_at": "2022-01-10T05:52:03Z", "pushed_at": "2022-01-10T05:52:03Z",
"stargazers_count": 26, "stargazers_count": 27,
"watchers_count": 26, "watchers_count": 27,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 26, "watchers": 27,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -19,7 +19,7 @@
"stargazers_count": 41, "stargazers_count": 41,
"watchers_count": 41, "watchers_count": 41,
"has_discussions": false, "has_discussions": false,
"forks_count": 5, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -31,7 +31,7 @@
"prestashop" "prestashop"
], ],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 6,
"watchers": 41, "watchers": 41,
"score": 0, "score": 0,
"subscribers_count": 10 "subscribers_count": 10

View file

@ -14,10 +14,10 @@
"description": "Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF\/Contact\/LDAP) syslink control href attribute escape, which was not fully fixed as CVE-2022-44666 in the patches released on December, 2022.", "description": "Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF\/Contact\/LDAP) syslink control href attribute escape, which was not fully fixed as CVE-2022-44666 in the patches released on December, 2022.",
"fork": false, "fork": false,
"created_at": "2023-02-15T18:12:04Z", "created_at": "2023-02-15T18:12:04Z",
"updated_at": "2024-12-09T01:45:01Z", "updated_at": "2024-12-16T20:11:41Z",
"pushed_at": "2023-06-18T21:10:39Z", "pushed_at": "2023-06-18T21:10:39Z",
"stargazers_count": 153, "stargazers_count": 154,
"watchers_count": 153, "watchers_count": 154,
"has_discussions": false, "has_discussions": false,
"forks_count": 26, "forks_count": 26,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 26, "forks": 26,
"watchers": 153, "watchers": 154,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
} }

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false, "fork": false,
"created_at": "2024-01-16T06:52:02Z", "created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-12-16T13:26:52Z", "updated_at": "2024-12-16T21:28:43Z",
"pushed_at": "2024-08-18T08:26:46Z", "pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1297, "stargazers_count": 1299,
"watchers_count": 1297, "watchers_count": 1299,
"has_discussions": false, "has_discussions": false,
"forks_count": 221, "forks_count": 221,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 221, "forks": 221,
"watchers": 1297, "watchers": 1299,
"score": 0, "score": 0,
"subscribers_count": 21 "subscribers_count": 21
}, },

View file

@ -14,10 +14,10 @@
"description": "A Proof of Concept for CVE-2023-50564 vulnerability in Pluck CMS version 4.7.18", "description": "A Proof of Concept for CVE-2023-50564 vulnerability in Pluck CMS version 4.7.18",
"fork": false, "fork": false,
"created_at": "2024-07-21T20:15:10Z", "created_at": "2024-07-21T20:15:10Z",
"updated_at": "2024-12-07T09:46:34Z", "updated_at": "2024-12-16T18:54:55Z",
"pushed_at": "2024-11-27T03:32:02Z", "pushed_at": "2024-11-27T03:32:02Z",
"stargazers_count": 19, "stargazers_count": 20,
"watchers_count": 19, "watchers_count": 20,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 19, "watchers": 20,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-51518: Preauthenticated Java Deserialization via JMX in Apache James", "description": "CVE-2023-51518: Preauthenticated Java Deserialization via JMX in Apache James",
"fork": false, "fork": false,
"created_at": "2024-06-03T19:48:53Z", "created_at": "2024-06-03T19:48:53Z",
"updated_at": "2024-06-03T20:13:29Z", "updated_at": "2024-12-16T20:25:17Z",
"pushed_at": "2024-06-03T20:09:42Z", "pushed_at": "2024-06-03T20:09:42Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -34,7 +34,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-10793 poc exploit", "description": "CVE-2024-10793 poc exploit",
"fork": false, "fork": false,
"created_at": "2024-11-17T18:44:53Z", "created_at": "2024-11-17T18:44:53Z",
"updated_at": "2024-11-18T20:09:02Z", "updated_at": "2024-12-16T19:35:50Z",
"pushed_at": "2024-11-17T19:51:53Z", "pushed_at": "2024-11-17T19:51:53Z",
"stargazers_count": 3, "stargazers_count": 4,
"watchers_count": 3, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 3, "watchers": 4,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -14,10 +14,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false, "fork": false,
"created_at": "2024-03-20T21:16:41Z", "created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-12-16T13:59:35Z", "updated_at": "2024-12-16T23:05:21Z",
"pushed_at": "2024-04-17T16:09:54Z", "pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2300, "stargazers_count": 2301,
"watchers_count": 2300, "watchers_count": 2301,
"has_discussions": false, "has_discussions": false,
"forks_count": 297, "forks_count": 297,
"allow_forking": true, "allow_forking": true,
@ -32,7 +32,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 297, "forks": 297,
"watchers": 2300, "watchers": 2301,
"score": 0, "score": 0,
"subscribers_count": 26 "subscribers_count": 26
}, },

View file

@ -45,8 +45,8 @@
"description": "Proof of concept of the CVE-2024-24549, Exploit in Python. ", "description": "Proof of concept of the CVE-2024-24549, Exploit in Python. ",
"fork": false, "fork": false,
"created_at": "2024-12-09T04:59:07Z", "created_at": "2024-12-09T04:59:07Z",
"updated_at": "2024-12-12T13:53:58Z", "updated_at": "2024-12-16T23:48:16Z",
"pushed_at": "2024-12-09T05:09:43Z", "pushed_at": "2024-12-16T23:48:12Z",
"stargazers_count": 6, "stargazers_count": 6,
"watchers_count": 6, "watchers_count": 6,
"has_discussions": false, "has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "Proof of concept (PoC) for CVE-2024-27316 (tested), CVE-2024-30255 (untested), CVE-2024-31309 (untested), CVE-2024-28182 (untested), CVE-2024-2653 (untested) and CVE-2024-27919 (untested)", "description": "Proof of concept (PoC) for CVE-2024-27316 (tested), CVE-2024-30255 (untested), CVE-2024-31309 (untested), CVE-2024-28182 (untested), CVE-2024-2653 (untested) and CVE-2024-27919 (untested)",
"fork": false, "fork": false,
"created_at": "2024-04-09T08:08:07Z", "created_at": "2024-04-09T08:08:07Z",
"updated_at": "2024-12-06T09:40:39Z", "updated_at": "2024-12-16T23:49:39Z",
"pushed_at": "2024-04-13T09:02:39Z", "pushed_at": "2024-04-13T09:02:39Z",
"stargazers_count": 13, "stargazers_count": 14,
"watchers_count": 13, "watchers_count": 14,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
@ -33,7 +33,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 13, "watchers": 14,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -14,19 +14,19 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver", "description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false, "fork": false,
"created_at": "2024-10-13T19:30:20Z", "created_at": "2024-10-13T19:30:20Z",
"updated_at": "2024-12-16T00:30:08Z", "updated_at": "2024-12-16T23:17:33Z",
"pushed_at": "2024-11-29T16:56:23Z", "pushed_at": "2024-11-29T16:56:23Z",
"stargazers_count": 221, "stargazers_count": 222,
"watchers_count": 221, "watchers_count": 222,
"has_discussions": false, "has_discussions": false,
"forks_count": 46, "forks_count": 47,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 46, "forks": 47,
"watchers": 221, "watchers": 222,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
}, },

View file

@ -265,10 +265,10 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)", "description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false, "fork": false,
"created_at": "2024-08-24T18:25:46Z", "created_at": "2024-08-24T18:25:46Z",
"updated_at": "2024-12-11T00:30:32Z", "updated_at": "2024-12-16T19:49:24Z",
"pushed_at": "2024-08-27T12:22:39Z", "pushed_at": "2024-08-27T12:22:39Z",
"stargazers_count": 634, "stargazers_count": 635,
"watchers_count": 634, "watchers_count": 635,
"has_discussions": false, "has_discussions": false,
"forks_count": 116, "forks_count": 116,
"allow_forking": true, "allow_forking": true,
@ -277,7 +277,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 116, "forks": 116,
"watchers": 634, "watchers": 635,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability", "description": "CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability",
"fork": false, "fork": false,
"created_at": "2024-09-24T19:24:55Z", "created_at": "2024-09-24T19:24:55Z",
"updated_at": "2024-12-11T21:46:18Z", "updated_at": "2024-12-16T18:49:12Z",
"pushed_at": "2024-12-09T22:58:22Z", "pushed_at": "2024-12-09T22:58:22Z",
"stargazers_count": 129, "stargazers_count": 130,
"watchers_count": 129, "watchers_count": 130,
"has_discussions": false, "has_discussions": false,
"forks_count": 26, "forks_count": 26,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 26, "forks": 26,
"watchers": 129, "watchers": 130,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -14,19 +14,19 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-12-14T09:22:33Z", "created_at": "2024-12-14T09:22:33Z",
"updated_at": "2024-12-16T11:37:07Z", "updated_at": "2024-12-17T00:04:07Z",
"pushed_at": "2024-12-14T10:13:45Z", "pushed_at": "2024-12-14T10:13:45Z",
"stargazers_count": 16, "stargazers_count": 19,
"watchers_count": 16, "watchers_count": 19,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 8,
"watchers": 16, "watchers": 19,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -154,43 +154,6 @@
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
{
"id": 893561658,
"name": "needrestart-vulnerability-poc",
"full_name": "njeru-codes\/needrestart-vulnerability-poc",
"owner": {
"login": "njeru-codes",
"id": 111843624,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/111843624?v=4",
"html_url": "https:\/\/github.com\/njeru-codes",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/njeru-codes\/needrestart-vulnerability-poc",
"description": "A Local Privilege Escalation poc scipts for CVE-2024-48990, CVE-2024-48991, CVE-2024-48992, CVE-2024-10224, and CVE-2024-11003",
"fork": false,
"created_at": "2024-11-24T18:54:42Z",
"updated_at": "2024-11-24T19:14:23Z",
"pushed_at": "2024-11-24T19:14:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-10224",
"cve-2024-11003",
"cve-2024-48990",
"cve-2024-48991",
"cve-2024-48992"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{ {
"id": 893730273, "id": 893730273,
"name": "CVE-2024-48990-Exploit", "name": "CVE-2024-48990-Exploit",

View file

@ -14,8 +14,8 @@
"description": "A short scraper looking for a POC of CVE-2024-49112", "description": "A short scraper looking for a POC of CVE-2024-49112",
"fork": false, "fork": false,
"created_at": "2024-12-16T13:41:40Z", "created_at": "2024-12-16T13:41:40Z",
"updated_at": "2024-12-16T16:12:54Z", "updated_at": "2024-12-16T19:35:06Z",
"pushed_at": "2024-12-16T14:12:03Z", "pushed_at": "2024-12-16T19:35:02Z",
"stargazers_count": 4, "stargazers_count": 4,
"watchers_count": 4, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)", "description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)",
"fork": false, "fork": false,
"created_at": "2024-12-11T14:19:55Z", "created_at": "2024-12-11T14:19:55Z",
"updated_at": "2024-12-16T16:19:14Z", "updated_at": "2024-12-16T20:09:24Z",
"pushed_at": "2024-12-11T14:23:19Z", "pushed_at": "2024-12-11T14:23:19Z",
"stargazers_count": 18, "stargazers_count": 19,
"watchers_count": 18, "watchers_count": 19,
"has_discussions": false, "has_discussions": false,
"forks_count": 5, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 5,
"watchers": 18, "watchers": 19,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
} }

View file

@ -45,10 +45,10 @@
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.", "description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
"fork": false, "fork": false,
"created_at": "2024-12-13T17:42:55Z", "created_at": "2024-12-13T17:42:55Z",
"updated_at": "2024-12-16T12:06:11Z", "updated_at": "2024-12-16T19:31:01Z",
"pushed_at": "2024-12-16T09:23:33Z", "pushed_at": "2024-12-16T09:23:33Z",
"stargazers_count": 8, "stargazers_count": 9,
"watchers_count": 8, "watchers_count": 9,
"has_discussions": false, "has_discussions": false,
"forks_count": 5, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 5,
"watchers": 8, "watchers": 9,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -14,8 +14,8 @@
"description": "Exploit for Grafana arbitrary file-read and RCE (CVE-2024-9264)", "description": "Exploit for Grafana arbitrary file-read and RCE (CVE-2024-9264)",
"fork": false, "fork": false,
"created_at": "2024-10-19T13:50:52Z", "created_at": "2024-10-19T13:50:52Z",
"updated_at": "2024-12-09T22:38:11Z", "updated_at": "2024-12-16T20:15:32Z",
"pushed_at": "2024-11-21T17:43:56Z", "pushed_at": "2024-12-16T20:15:28Z",
"stargazers_count": 88, "stargazers_count": 88,
"watchers_count": 88, "watchers_count": 88,
"has_discussions": false, "has_discussions": false,

View file

@ -4303,7 +4303,11 @@
- [swsmith2391/CVE-2024-29510](https://github.com/swsmith2391/CVE-2024-29510) - [swsmith2391/CVE-2024-29510](https://github.com/swsmith2391/CVE-2024-29510)
### CVE-2024-29671 ### CVE-2024-29671 (2024-12-16)
<code>Buffer Overflow vulnerability in NEXTU FLATA AX1500 Router v.1.0.2 allows a remote attacker to execute arbitrary code via the POST request handler component.
</code>
- [laskdjlaskdj12/CVE-2024-29671-POC](https://github.com/laskdjlaskdj12/CVE-2024-29671-POC) - [laskdjlaskdj12/CVE-2024-29671-POC](https://github.com/laskdjlaskdj12/CVE-2024-29671-POC)
### CVE-2024-29824 (2024-05-31) ### CVE-2024-29824 (2024-05-31)
@ -6914,7 +6918,6 @@
- [felmoltor/CVE-2024-48990](https://github.com/felmoltor/CVE-2024-48990) - [felmoltor/CVE-2024-48990](https://github.com/felmoltor/CVE-2024-48990)
- [Cyb3rFr0g/CVE-2024-48990-PoC](https://github.com/Cyb3rFr0g/CVE-2024-48990-PoC) - [Cyb3rFr0g/CVE-2024-48990-PoC](https://github.com/Cyb3rFr0g/CVE-2024-48990-PoC)
- [pentestfunctions/CVE-2024-48990-PoC-Testing](https://github.com/pentestfunctions/CVE-2024-48990-PoC-Testing) - [pentestfunctions/CVE-2024-48990-PoC-Testing](https://github.com/pentestfunctions/CVE-2024-48990-PoC-Testing)
- [njeru-codes/needrestart-vulnerability-poc](https://github.com/njeru-codes/needrestart-vulnerability-poc)
- [ally-petitt/CVE-2024-48990-Exploit](https://github.com/ally-petitt/CVE-2024-48990-Exploit) - [ally-petitt/CVE-2024-48990-Exploit](https://github.com/ally-petitt/CVE-2024-48990-Exploit)
- [r0xdeadbeef/CVE-2024-48990](https://github.com/r0xdeadbeef/CVE-2024-48990) - [r0xdeadbeef/CVE-2024-48990](https://github.com/r0xdeadbeef/CVE-2024-48990)
- [CyberCrowCC/CVE-2024-48990](https://github.com/CyberCrowCC/CVE-2024-48990) - [CyberCrowCC/CVE-2024-48990](https://github.com/CyberCrowCC/CVE-2024-48990)
@ -7472,7 +7475,11 @@
- [kuzgunaka/CVE-2024-55099-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability-](https://github.com/kuzgunaka/CVE-2024-55099-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability-) - [kuzgunaka/CVE-2024-55099-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability-](https://github.com/kuzgunaka/CVE-2024-55099-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability-)
### CVE-2024-55557 ### CVE-2024-55557 (2024-12-16)
<code>ui/pref/ProxyPrefView.java in weasis-core in Weasis 4.5.1 has a hardcoded key for symmetric encryption of proxy credentials.
</code>
- [partywavesec/CVE-2024-55557](https://github.com/partywavesec/CVE-2024-55557) - [partywavesec/CVE-2024-55557](https://github.com/partywavesec/CVE-2024-55557)
### CVE-2024-55587 (2024-12-11) ### CVE-2024-55587 (2024-12-11)