Auto Update 2025/01/13 12:33:40

This commit is contained in:
motikan2010-bot 2025-01-13 21:33:40 +09:00
parent 0cc79627f1
commit a68d6b8f4a
31 changed files with 224 additions and 144 deletions

View file

@ -45,10 +45,10 @@
"description": "CVE-2014-4322 Exploit",
"fork": false,
"created_at": "2015-08-16T00:02:45Z",
"updated_at": "2024-10-01T14:26:56Z",
"updated_at": "2025-01-13T10:27:47Z",
"pushed_at": "2016-01-24T16:19:47Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 22,
"watchers": 23,
"score": 0,
"subscribers_count": 8
},

View file

@ -14,10 +14,10 @@
"description": "Local root exploit for Nexus5 Android 4.4.4(KTU84P)",
"fork": false,
"created_at": "2015-01-26T06:33:52Z",
"updated_at": "2024-07-12T09:42:33Z",
"updated_at": "2025-01-13T07:23:51Z",
"pushed_at": "2015-01-27T09:43:42Z",
"stargazers_count": 146,
"watchers_count": 146,
"stargazers_count": 147,
"watchers_count": 147,
"has_discussions": false,
"forks_count": 79,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 79,
"watchers": 146,
"watchers": 147,
"score": 0,
"subscribers_count": 15
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2018-12-20T12:12:59Z",
"updated_at": "2024-09-27T09:58:16Z",
"updated_at": "2025-01-13T07:10:03Z",
"pushed_at": "2019-01-31T23:27:45Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},
@ -76,10 +76,10 @@
"description": "This repository contains a Proof of Concept (PoC) for CVE-2015-9251, a vulnerability in jQuery versions prior to 3.0.0 that allows attackers to perform Cross-Site Scripting (XSS) attacks under certain conditions.",
"fork": false,
"created_at": "2025-01-08T10:03:02Z",
"updated_at": "2025-01-09T08:28:30Z",
"updated_at": "2025-01-13T07:10:15Z",
"pushed_at": "2025-01-09T08:28:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -429,10 +429,10 @@
"description": "An exploit for Apache Struts CVE-2017-5638",
"fork": false,
"created_at": "2017-03-12T02:02:25Z",
"updated_at": "2025-01-07T21:31:09Z",
"updated_at": "2025-01-13T08:45:03Z",
"pushed_at": "2018-05-21T18:33:26Z",
"stargazers_count": 429,
"watchers_count": 429,
"stargazers_count": 428,
"watchers_count": 428,
"has_discussions": false,
"forks_count": 135,
"allow_forking": true,
@ -447,7 +447,7 @@
],
"visibility": "public",
"forks": 135,
"watchers": 429,
"watchers": 428,
"score": 0,
"subscribers_count": 22
},

View file

@ -458,10 +458,10 @@
"description": "Identify hikvision ip and probe for cve-s (CVE-2017-7921, CVE-2022-28171, CVE-2021-36260)",
"fork": false,
"created_at": "2024-11-26T13:02:18Z",
"updated_at": "2024-11-26T13:23:21Z",
"updated_at": "2025-01-13T11:38:52Z",
"pushed_at": "2024-11-26T13:21:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -470,7 +470,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -55,13 +55,13 @@
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 63,
"forks_count": 61,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 63,
"forks": 61,
"watchers": 13,
"score": 0,
"subscribers_count": 2
@ -112,10 +112,10 @@
"description": "CVE-2019-0708-exploit",
"fork": false,
"created_at": "2019-05-15T02:24:21Z",
"updated_at": "2024-11-20T06:13:32Z",
"updated_at": "2025-01-13T10:04:30Z",
"pushed_at": "2019-05-15T02:26:46Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 118,
"watchers_count": 118,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -124,7 +124,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 117,
"watchers": 118,
"score": 0,
"subscribers_count": 8
},
@ -422,10 +422,10 @@
"description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)",
"fork": false,
"created_at": "2019-05-15T15:01:38Z",
"updated_at": "2024-11-01T02:37:48Z",
"updated_at": "2025-01-13T09:59:12Z",
"pushed_at": "2019-06-13T13:07:03Z",
"stargazers_count": 388,
"watchers_count": 388,
"stargazers_count": 389,
"watchers_count": 389,
"has_discussions": false,
"forks_count": 189,
"allow_forking": true,
@ -445,7 +445,7 @@
],
"visibility": "public",
"forks": 189,
"watchers": 388,
"watchers": 389,
"score": 0,
"subscribers_count": 16
},
@ -1747,10 +1747,10 @@
"description": "Only Hitting PoC [Tested on Windows Server 2008 r2]",
"fork": false,
"created_at": "2019-05-28T02:25:21Z",
"updated_at": "2024-10-07T22:23:45Z",
"updated_at": "2025-01-13T10:03:50Z",
"pushed_at": "2019-05-28T02:46:19Z",
"stargazers_count": 127,
"watchers_count": 127,
"stargazers_count": 128,
"watchers_count": 128,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -1759,7 +1759,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 127,
"watchers": 128,
"score": 0,
"subscribers_count": 10
},
@ -1995,10 +1995,10 @@
"description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits",
"fork": false,
"created_at": "2019-05-31T00:04:12Z",
"updated_at": "2024-10-02T21:50:49Z",
"updated_at": "2025-01-13T10:23:37Z",
"pushed_at": "2021-01-10T04:31:22Z",
"stargazers_count": 344,
"watchers_count": 344,
"stargazers_count": 345,
"watchers_count": 345,
"has_discussions": false,
"forks_count": 125,
"allow_forking": true,
@ -2007,7 +2007,7 @@
"topics": [],
"visibility": "public",
"forks": 125,
"watchers": 344,
"watchers": 345,
"score": 0,
"subscribers_count": 30
},
@ -3086,10 +3086,10 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2025-01-08T03:08:59Z",
"updated_at": "2025-01-13T10:01:48Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 323,
"watchers_count": 323,
"stargazers_count": 324,
"watchers_count": 324,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -3098,7 +3098,7 @@
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 323,
"watchers": 324,
"score": 0,
"subscribers_count": 6
},
@ -3148,10 +3148,10 @@
"description": "CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7",
"fork": false,
"created_at": "2020-03-15T19:33:53Z",
"updated_at": "2024-12-20T16:56:29Z",
"updated_at": "2025-01-13T10:48:31Z",
"pushed_at": "2022-03-28T04:10:20Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 132,
"watchers_count": 132,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -3160,7 +3160,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 131,
"watchers": 132,
"score": 0,
"subscribers_count": 4
},
@ -3644,10 +3644,10 @@
"description": null,
"fork": false,
"created_at": "2024-06-02T12:03:12Z",
"updated_at": "2024-06-02T12:08:26Z",
"updated_at": "2025-01-13T10:34:49Z",
"pushed_at": "2024-06-02T12:08:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -3656,7 +3656,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2024-12-22T19:40:46Z",
"updated_at": "2025-01-13T08:49:52Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1800,
"watchers_count": 1800,
"stargazers_count": 1801,
"watchers_count": 1801,
"has_discussions": false,
"forks_count": 249,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 249,
"watchers": 1800,
"watchers": 1801,
"score": 0,
"subscribers_count": 37
},

View file

@ -132,13 +132,13 @@
"stargazers_count": 181,
"watchers_count": 181,
"has_discussions": false,
"forks_count": 61,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 61,
"forks": 62,
"watchers": 181,
"score": 0,
"subscribers_count": 13

View file

@ -265,10 +265,10 @@
"description": "Identify hikvision ip and probe for cve-s (CVE-2017-7921, CVE-2022-28171, CVE-2021-36260)",
"fork": false,
"created_at": "2024-11-26T13:02:18Z",
"updated_at": "2024-11-26T13:23:21Z",
"updated_at": "2025-01-13T11:38:52Z",
"pushed_at": "2024-11-26T13:21:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -277,7 +277,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -386,7 +386,7 @@
"stargazers_count": 1112,
"watchers_count": 1112,
"has_discussions": false,
"forks_count": 535,
"forks_count": 536,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -394,7 +394,7 @@
"log4shell"
],
"visibility": "public",
"forks": 535,
"forks": 536,
"watchers": 1112,
"score": 0,
"subscribers_count": 23

View file

@ -1163,10 +1163,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2025-01-11T20:50:39Z",
"updated_at": "2025-01-13T06:46:17Z",
"pushed_at": "2023-05-20T05:55:45Z",
"stargazers_count": 565,
"watchers_count": 565,
"stargazers_count": 566,
"watchers_count": 566,
"has_discussions": false,
"forks_count": 144,
"allow_forking": true,
@ -1175,7 +1175,7 @@
"topics": [],
"visibility": "public",
"forks": 144,
"watchers": 565,
"watchers": 566,
"score": 0,
"subscribers_count": 15
},

View file

@ -266,10 +266,10 @@
"description": "警惕 一种针对红队的新型溯源手段!",
"fork": false,
"created_at": "2022-07-27T15:48:19Z",
"updated_at": "2025-01-03T19:17:19Z",
"updated_at": "2025-01-13T10:03:02Z",
"pushed_at": "2022-07-27T15:55:01Z",
"stargazers_count": 395,
"watchers_count": 395,
"stargazers_count": 396,
"watchers_count": 396,
"has_discussions": false,
"forks_count": 82,
"allow_forking": true,
@ -278,7 +278,7 @@
"topics": [],
"visibility": "public",
"forks": 82,
"watchers": 395,
"watchers": 396,
"score": 0,
"subscribers_count": 2
},

View file

@ -112,13 +112,13 @@
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 12,
"watchers": 43,
"score": 0,
"subscribers_count": 2

View file

@ -45,10 +45,10 @@
"description": "Identify hikvision ip and probe for cve-s (CVE-2017-7921, CVE-2022-28171, CVE-2021-36260)",
"fork": false,
"created_at": "2024-11-26T13:02:18Z",
"updated_at": "2024-11-26T13:23:21Z",
"updated_at": "2025-01-13T11:38:52Z",
"pushed_at": "2024-11-26T13:21:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -1121,10 +1121,10 @@
"description": "All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps such as Word. This is a very simple POC, feel free to check the sources below for more threat intelligence.",
"fork": false,
"created_at": "2022-06-03T00:25:37Z",
"updated_at": "2024-07-17T14:32:06Z",
"updated_at": "2025-01-13T07:54:46Z",
"pushed_at": "2022-08-06T01:04:51Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -1133,7 +1133,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 23,
"watchers": 24,
"score": 0,
"subscribers_count": 2
},

View file

@ -606,10 +606,10 @@
"description": "confluence CVE-2023-22527 漏洞利用工具,支持冰蝎\/哥斯拉内存马注入,支持设置 http 代理",
"fork": false,
"created_at": "2024-02-26T02:34:44Z",
"updated_at": "2024-12-29T10:33:38Z",
"updated_at": "2025-01-13T08:27:08Z",
"pushed_at": "2024-04-24T02:34:16Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -618,7 +618,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 38,
"watchers": 39,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite \"Lazy Bundle\" mitigation",
"fork": false,
"created_at": "2024-01-20T07:14:06Z",
"updated_at": "2025-01-13T05:51:37Z",
"updated_at": "2025-01-13T09:07:02Z",
"pushed_at": "2024-01-21T05:04:01Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 84,
"watchers_count": 84,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 83,
"watchers": 84,
"score": 0,
"subscribers_count": 4
}

View file

@ -45,10 +45,10 @@
"description": "POC - CVE-202410914- Command Injection Vulnerability in `name` parameter for D-Link NAS",
"fork": false,
"created_at": "2024-11-10T12:01:21Z",
"updated_at": "2024-12-30T21:06:51Z",
"updated_at": "2025-01-13T09:55:07Z",
"pushed_at": "2024-11-27T08:26:29Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -65,7 +65,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 42,
"watchers": 43,
"score": 0,
"subscribers_count": 1
},

View file

@ -76,10 +76,10 @@
"description": "该漏洞存在于 NtQueryInformationToken 函数中特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。",
"fork": false,
"created_at": "2024-07-05T16:02:56Z",
"updated_at": "2024-11-27T08:32:37Z",
"updated_at": "2025-01-13T09:56:20Z",
"pushed_at": "2024-07-05T16:06:16Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 34,
"watchers": 35,
"score": 0,
"subscribers_count": 1
},

View file

@ -957,13 +957,13 @@
"stargazers_count": 3506,
"watchers_count": 3506,
"has_discussions": false,
"forks_count": 240,
"forks_count": 239,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 240,
"forks": 239,
"watchers": 3506,
"score": 0,
"subscribers_count": 38

View file

@ -14,19 +14,19 @@
"description": null,
"fork": false,
"created_at": "2024-12-03T08:56:59Z",
"updated_at": "2025-01-04T03:15:45Z",
"updated_at": "2025-01-13T10:22:54Z",
"pushed_at": "2024-11-18T23:48:31Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 23,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 48,
"forks": 24,
"watchers": 49,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-05T06:13:57Z",
"updated_at": "2025-01-09T08:12:34Z",
"updated_at": "2025-01-13T07:40:10Z",
"pushed_at": "2024-12-05T07:55:04Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},

View file

@ -50,13 +50,13 @@
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 17,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575",
"fork": false,
"created_at": "2024-11-07T21:03:30Z",
"updated_at": "2025-01-12T23:38:11Z",
"updated_at": "2025-01-13T12:27:15Z",
"pushed_at": "2024-11-14T16:25:52Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 80,
"watchers": 81,
"score": 0,
"subscribers_count": 0
},

View file

@ -14,19 +14,19 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
"fork": false,
"created_at": "2025-01-01T15:48:38Z",
"updated_at": "2025-01-13T05:39:08Z",
"updated_at": "2025-01-13T10:22:25Z",
"pushed_at": "2025-01-02T16:07:23Z",
"stargazers_count": 431,
"watchers_count": 431,
"stargazers_count": 437,
"watchers_count": 437,
"has_discussions": false,
"forks_count": 102,
"forks_count": 103,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 102,
"watchers": 431,
"forks": 103,
"watchers": 437,
"score": 0,
"subscribers_count": 3
},
@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2025-01-03T07:05:33Z",
"updated_at": "2025-01-11T11:34:30Z",
"updated_at": "2025-01-13T09:53:17Z",
"pushed_at": "2025-01-03T08:20:03Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},
@ -76,10 +76,10 @@
"description": "Hi, This is to check targets vulnerable for CVE-2024-49113 in bulk, faster.",
"fork": false,
"created_at": "2025-01-06T11:59:02Z",
"updated_at": "2025-01-10T16:41:30Z",
"updated_at": "2025-01-13T09:53:19Z",
"pushed_at": "2025-01-06T12:04:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

33
2024/CVE-2024-50404.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 916015819,
"name": "CVE-2024-50404",
"full_name": "C411e\/CVE-2024-50404",
"owner": {
"login": "C411e",
"id": 35147719,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35147719?v=4",
"html_url": "https:\/\/github.com\/C411e",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/C411e\/CVE-2024-50404",
"description": "CVE-2024-50404",
"fork": false,
"created_at": "2025-01-13T09:47:03Z",
"updated_at": "2025-01-13T10:15:15Z",
"pushed_at": "2025-01-13T10:15:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injection",
"fork": false,
"created_at": "2025-01-12T11:20:21Z",
"updated_at": "2025-01-12T23:10:49Z",
"updated_at": "2025-01-13T10:07:24Z",
"pushed_at": "2025-01-12T16:35:36Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

33
2024/CVE-2024-53691.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 916024485,
"name": "CVE-2024-53691",
"full_name": "C411e\/CVE-2024-53691",
"owner": {
"login": "C411e",
"id": 35147719,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35147719?v=4",
"html_url": "https:\/\/github.com\/C411e",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/C411e\/CVE-2024-53691",
"description": "CVE-2024-53691",
"fork": false,
"created_at": "2025-01-13T10:07:25Z",
"updated_at": "2025-01-13T10:17:01Z",
"pushed_at": "2025-01-13T10:16:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Escape macOS Sandbox using sharedfilelistd exploit",
"fork": false,
"created_at": "2025-01-08T09:55:44Z",
"updated_at": "2025-01-13T02:16:47Z",
"updated_at": "2025-01-13T08:23:43Z",
"pushed_at": "2025-01-09T06:34:50Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 27,
"watchers": 29,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-25T08:16:38Z",
"updated_at": "2024-12-21T21:10:32Z",
"updated_at": "2025-01-13T10:10:25Z",
"pushed_at": "2024-12-21T21:09:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -7481,6 +7481,13 @@
- [neko-hat/CVE-2024-50395](https://github.com/neko-hat/CVE-2024-50395)
### CVE-2024-50404 (2024-12-06)
<code>A link following vulnerability has been reported to affect Qsync Central. If exploited, the vulnerability could allow remote attackers who have gained user access to traverse the file system to unintended locations.\n\nWe have already fixed the vulnerability in the following versions:\nQsync Central 4.4.0.16_20240819 ( 2024/08/19 ) and later
</code>
- [C411e/CVE-2024-50404](https://github.com/C411e/CVE-2024-50404)
### CVE-2024-50427 (2024-10-29)
<code>Unrestricted Upload of File with Dangerous Type vulnerability in Devsoft Baltic OÜ SurveyJS: Drag &amp; Drop WordPress Form Builder.This issue affects SurveyJS: Drag &amp; Drop WordPress Form Builder: from n/a through 1.9.136.
@ -8016,6 +8023,13 @@
- [punitdarji/Apache-struts-cve-2024-53677](https://github.com/punitdarji/Apache-struts-cve-2024-53677)
- [SeanRickerd/CVE-2024-53677](https://github.com/SeanRickerd/CVE-2024-53677)
### CVE-2024-53691 (2024-12-06)
<code>A link following vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to traverse the file system to unintended locations.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.8.2823 build 20240712 and later\nQTS 5.2.0.2802 build 20240620 and later\nQuTS hero h5.1.8.2823 build 20240712 and later\nQuTS hero h5.2.0.2802 build 20240620 and later
</code>
- [C411e/CVE-2024-53691](https://github.com/C411e/CVE-2024-53691)
### CVE-2024-54152 (2024-12-10)
<code>Angular Expressions provides expressions for the Angular.JS web framework as a standalone module. Prior to version 1.4.3, an attacker can write a malicious expression that escapes the sandbox to execute arbitrary code on the system. With a more complex (undisclosed) payload, one can get full access to Arbitrary code execution on the system. The problem has been patched in version 1.4.3 of Angular Expressions. Two possible workarounds are available. One may either disable access to `__proto__` globally or make sure that one uses the function with just one argument.