Auto Update 2024/12/06 06:31:56

This commit is contained in:
motikan2010-bot 2024-12-06 15:31:56 +09:00
parent fff89fd907
commit b1ae207126
40 changed files with 198 additions and 118 deletions

View file

@ -417,10 +417,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-12-03T10:40:52Z",
"updated_at": "2024-12-06T03:29:54Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 154,
"watchers_count": 154,
"stargazers_count": 156,
"watchers_count": 156,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -437,7 +437,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 154,
"watchers": 156,
"score": 0,
"subscribers_count": 2
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 390,
"watchers_count": 390,
"has_discussions": false,
"forks_count": 121,
"forks_count": 122,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 121,
"forks": 122,
"watchers": 390,
"score": 0,
"subscribers_count": 14

View file

@ -14,10 +14,10 @@
"description": "Location tracking app without location permissions! Makes use of CVE-2018-15835 which makes use of Android OS information leakage.",
"fork": false,
"created_at": "2020-07-13T20:43:36Z",
"updated_at": "2021-09-17T11:03:27Z",
"updated_at": "2024-12-06T02:57:59Z",
"pushed_at": "2020-07-13T23:19:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -76,10 +76,10 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2024-12-05T22:20:59Z",
"updated_at": "2024-12-06T02:24:08Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 210,
"watchers_count": 210,
"stargazers_count": 211,
"watchers_count": 211,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 57,
"watchers": 210,
"watchers": 211,
"score": 0,
"subscribers_count": 9
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2018-12-27T06:30:32Z",
"updated_at": "2024-09-19T11:51:58Z",
"updated_at": "2024-12-06T02:42:13Z",
"pushed_at": "2018-12-30T11:53:08Z",
"stargazers_count": 331,
"watchers_count": 331,
"stargazers_count": 332,
"watchers_count": 332,
"has_discussions": false,
"forks_count": 107,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 107,
"watchers": 331,
"watchers": 332,
"score": 0,
"subscribers_count": 7
},

View file

@ -1907,13 +1907,13 @@
"stargazers_count": 1175,
"watchers_count": 1175,
"has_discussions": false,
"forks_count": 345,
"forks_count": 346,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 345,
"forks": 346,
"watchers": 1175,
"score": 0,
"subscribers_count": 68

View file

@ -45,10 +45,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-12-05T17:21:40Z",
"updated_at": "2024-12-06T01:18:43Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4134,
"watchers_count": 4134,
"stargazers_count": 4135,
"watchers_count": 4135,
"has_discussions": false,
"forks_count": 1099,
"allow_forking": true,
@ -77,7 +77,7 @@
],
"visibility": "public",
"forks": 1099,
"watchers": 4134,
"watchers": 4135,
"score": 0,
"subscribers_count": 149
},

View file

@ -14,10 +14,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-12-05T17:21:40Z",
"updated_at": "2024-12-06T01:18:43Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4134,
"watchers_count": 4134,
"stargazers_count": 4135,
"watchers_count": 4135,
"has_discussions": false,
"forks_count": 1099,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 1099,
"watchers": 4134,
"watchers": 4135,
"score": 0,
"subscribers_count": 149
},

View file

@ -981,10 +981,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-12-03T10:40:52Z",
"updated_at": "2024-12-06T03:29:54Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 154,
"watchers_count": 154,
"stargazers_count": 156,
"watchers_count": 156,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -1001,7 +1001,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 154,
"watchers": 156,
"score": 0,
"subscribers_count": 2
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 410,
"watchers_count": 410,
"has_discussions": false,
"forks_count": 137,
"forks_count": 136,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 137,
"forks": 136,
"watchers": 410,
"score": 0,
"subscribers_count": 4

View file

@ -14,10 +14,10 @@
"description": "PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta",
"fork": false,
"created_at": "2022-04-16T16:36:48Z",
"updated_at": "2024-11-26T07:42:25Z",
"updated_at": "2024-12-06T02:28:07Z",
"pushed_at": "2022-04-16T16:37:23Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 22,
"watchers": 23,
"score": 0,
"subscribers_count": 2
}

View file

@ -5639,7 +5639,7 @@
"stargazers_count": 386,
"watchers_count": 386,
"has_discussions": false,
"forks_count": 52,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -5651,7 +5651,7 @@
"vulnerability-scanners"
],
"visibility": "public",
"forks": 52,
"forks": 53,
"watchers": 386,
"score": 0,
"subscribers_count": 12

View file

@ -2479,7 +2479,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 883824974,

View file

@ -107,10 +107,10 @@
"description": "CVE-2022-25845(fastjson1.2.80) exploit in Spring Env!",
"fork": false,
"created_at": "2024-11-07T13:06:44Z",
"updated_at": "2024-12-05T09:34:08Z",
"updated_at": "2024-12-06T02:36:59Z",
"pushed_at": "2024-11-07T13:38:18Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 73,
"watchers": 74,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2024-12-04T07:09:20Z",
"updated_at": "2024-12-06T05:41:39Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1173,
"watchers_count": 1173,
"stargazers_count": 1174,
"watchers_count": 1174,
"has_discussions": true,
"forks_count": 190,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 190,
"watchers": 1173,
"watchers": 1174,
"score": 0,
"subscribers_count": 19
},

View file

@ -56,13 +56,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1

View file

@ -121,6 +121,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -231,10 +231,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2023-01-05T21:50:25Z",
"updated_at": "2024-10-31T21:24:05Z",
"updated_at": "2024-12-06T00:25:02Z",
"pushed_at": "2023-06-13T08:55:50Z",
"stargazers_count": 144,
"watchers_count": 144,
"stargazers_count": 145,
"watchers_count": 145,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -245,7 +245,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 144,
"watchers": 145,
"score": 0,
"subscribers_count": 12
},

View file

@ -14,10 +14,10 @@
"description": "Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit",
"fork": false,
"created_at": "2023-01-30T12:57:48Z",
"updated_at": "2024-11-27T11:57:47Z",
"updated_at": "2024-12-06T05:49:17Z",
"pushed_at": "2023-12-05T12:21:02Z",
"stargazers_count": 268,
"watchers_count": 268,
"stargazers_count": 269,
"watchers_count": 269,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 57,
"watchers": 268,
"watchers": 269,
"score": 0,
"subscribers_count": 5
},

View file

@ -76,10 +76,10 @@
"description": "Reverse Shell POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253), PHP Code Injection",
"fork": false,
"created_at": "2024-05-27T15:10:12Z",
"updated_at": "2024-11-18T18:35:19Z",
"updated_at": "2024-12-06T04:48:34Z",
"pushed_at": "2024-05-28T15:10:20Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 36,
"watchers": 37,
"score": 0,
"subscribers_count": 1
},

View file

@ -716,6 +716,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -45,10 +45,10 @@
"description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021",
"fork": false,
"created_at": "2023-10-14T09:35:07Z",
"updated_at": "2024-11-27T03:12:13Z",
"updated_at": "2024-12-06T05:37:00Z",
"pushed_at": "2024-05-16T07:42:00Z",
"stargazers_count": 221,
"watchers_count": 221,
"stargazers_count": 222,
"watchers_count": 222,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 221,
"watchers": 222,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis",
"fork": false,
"created_at": "2024-11-29T06:13:36Z",
"updated_at": "2024-12-05T15:00:46Z",
"updated_at": "2024-12-06T03:59:20Z",
"pushed_at": "2024-12-04T01:01:28Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 28,
"watchers": 30,
"score": 0,
"subscribers_count": 1
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
"fork": false,
"created_at": "2024-06-10T17:02:03Z",
"updated_at": "2024-11-30T13:35:20Z",
"updated_at": "2024-12-06T04:05:16Z",
"pushed_at": "2024-07-04T10:39:15Z",
"stargazers_count": 322,
"watchers_count": 322,
"stargazers_count": 323,
"watchers_count": 323,
"has_discussions": false,
"forks_count": 63,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 322,
"watchers": 323,
"score": 0,
"subscribers_count": 5
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-31317",
"fork": false,
"created_at": "2024-12-05T01:36:59Z",
"updated_at": "2024-12-05T12:13:55Z",
"updated_at": "2024-12-06T05:23:41Z",
"pushed_at": "2024-12-05T01:52:45Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,8 +26,8 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false,
"created_at": "2024-10-13T19:30:20Z",
"updated_at": "2024-12-02T01:54:42Z",
"updated_at": "2024-12-06T03:52:24Z",
"pushed_at": "2024-11-29T16:56:23Z",
"stargazers_count": 214,
"watchers_count": 214,
"stargazers_count": 215,
"watchers_count": 215,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 214,
"watchers": 215,
"score": 0,
"subscribers_count": 6
},

View file

@ -176,10 +176,10 @@
"description": "geoserver CVE-2024-36401漏洞利用工具",
"fork": false,
"created_at": "2024-07-17T02:25:21Z",
"updated_at": "2024-12-05T10:34:21Z",
"updated_at": "2024-12-06T02:19:36Z",
"pushed_at": "2024-07-24T15:33:03Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -188,7 +188,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 0
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 0,
"score": 0,
"subscribers_count": 0

View file

@ -45,10 +45,10 @@
"description": "PoC for CVE-2024-42327 \/ ZBX-25623",
"fork": false,
"created_at": "2024-12-03T12:44:07Z",
"updated_at": "2024-12-05T12:13:17Z",
"updated_at": "2024-12-06T02:48:26Z",
"pushed_at": "2024-12-03T12:56:52Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 1
}

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -1687,10 +1687,10 @@
"description": "CVE-2024-4577 RCE PoC",
"fork": false,
"created_at": "2024-11-06T05:30:33Z",
"updated_at": "2024-12-05T02:52:57Z",
"updated_at": "2024-12-06T00:51:45Z",
"pushed_at": "2024-11-20T06:24:59Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -1699,7 +1699,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,8 +14,8 @@
"description": "CVE-2024-47062 PoC",
"fork": false,
"created_at": "2024-11-10T01:10:06Z",
"updated_at": "2024-11-13T02:17:35Z",
"pushed_at": "2024-11-13T02:17:31Z",
"updated_at": "2024-12-06T03:49:02Z",
"pushed_at": "2024-12-06T03:48:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,19 +14,19 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false,
"created_at": "2024-11-19T08:57:18Z",
"updated_at": "2024-12-06T00:01:26Z",
"updated_at": "2024-12-06T06:22:23Z",
"pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 15,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 67,
"forks": 18,
"watchers": 71,
"score": 0,
"subscribers_count": 1
}

33
2024/CVE-2024-50677.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 899289654,
"name": "CVE-2024-50677",
"full_name": "ZumiYumi\/CVE-2024-50677",
"owner": {
"login": "ZumiYumi",
"id": 150757931,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150757931?v=4",
"html_url": "https:\/\/github.com\/ZumiYumi",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ZumiYumi\/CVE-2024-50677",
"description": "This repository presents a proof-of-concept of CVE-2024-50677",
"fork": false,
"created_at": "2024-12-06T01:04:44Z",
"updated_at": "2024-12-06T01:16:38Z",
"pushed_at": "2024-12-06T01:16:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Exploit for CyberPanel Pre-Auth RCE via Command Injection",
"fork": false,
"created_at": "2024-10-29T23:34:27Z",
"updated_at": "2024-12-05T22:11:22Z",
"updated_at": "2024-12-06T02:15:52Z",
"pushed_at": "2024-11-01T10:12:49Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
}

33
2024/CVE-2024-54679.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 899369634,
"name": "CVE-2024-54679",
"full_name": "hotplugin0x01\/CVE-2024-54679",
"owner": {
"login": "hotplugin0x01",
"id": 57496383,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57496383?v=4",
"html_url": "https:\/\/github.com\/hotplugin0x01",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hotplugin0x01\/CVE-2024-54679",
"description": "CVE-2024-54679 - CyberPanel (aka Cyber Panel) Denial of Service",
"fork": false,
"created_at": "2024-12-06T06:02:34Z",
"updated_at": "2024-12-06T06:19:46Z",
"pushed_at": "2024-12-06T06:19:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -121,6 +121,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -2177,7 +2177,11 @@
- [windz3r0day/CVE-2024-11199](https://github.com/windz3r0day/CVE-2024-11199)
### CVE-2024-11201
### CVE-2024-11201 (2024-12-06)
<code>The myCred Loyalty Points and Rewards plugin for WordPress and WooCommerce Give Points, Ranks, Badges, Cashback, WooCommerce rewards, and WooCommerce credits for Gamification plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's mycred_send shortcode in all versions up to, and including, 2.7.5.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
</code>
- [NSQAQ/CVE-2024-11201](https://github.com/NSQAQ/CVE-2024-11201)
### CVE-2024-11252 (2024-11-30)
@ -6969,6 +6973,9 @@
- [SAHALLL/CVE-2024-50657](https://github.com/SAHALLL/CVE-2024-50657)
### CVE-2024-50677
- [ZumiYumi/CVE-2024-50677](https://github.com/ZumiYumi/CVE-2024-50677)
### CVE-2024-50803 (2024-11-19)
<code>The mediapool feature of the Redaxo Core CMS application v 5.17.1 is vulnerable to Cross Site Scripting(XSS) which allows a remote attacker to escalate privileges
@ -7281,6 +7288,13 @@
- [ii5mai1/CVE-2024-53617](https://github.com/ii5mai1/CVE-2024-53617)
### CVE-2024-54679 (2024-12-05)
<code>CyberPanel (aka Cyber Panel) before 6778ad1 does not require the FilemanagerAdmin capability for restartMySQL actions.
</code>
- [hotplugin0x01/CVE-2024-54679](https://github.com/hotplugin0x01/CVE-2024-54679)
### CVE-2024-1642470
- [Symbolexe/CVE-2024-1642470](https://github.com/Symbolexe/CVE-2024-1642470)