Auto Update 2024/11/15 12:31:34

This commit is contained in:
motikan2010-bot 2024-11-15 21:31:35 +09:00
parent 545bd4e80b
commit cf9b084643
33 changed files with 215 additions and 111 deletions

View file

@ -76,10 +76,10 @@
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
"fork": false,
"created_at": "2017-01-08T14:19:51Z",
"updated_at": "2024-08-12T19:27:01Z",
"updated_at": "2024-11-15T08:20:09Z",
"pushed_at": "2018-04-07T01:10:06Z",
"stargazers_count": 129,
"watchers_count": 129,
"stargazers_count": 130,
"watchers_count": 130,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -95,7 +95,7 @@
],
"visibility": "public",
"forks": 52,
"watchers": 129,
"watchers": 130,
"score": 0,
"subscribers_count": 3
},

View file

@ -174,13 +174,13 @@
"stargazers_count": 136,
"watchers_count": 136,
"has_discussions": false,
"forks_count": 27,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 27,
"forks": 28,
"watchers": 136,
"score": 0,
"subscribers_count": 4

View file

@ -355,10 +355,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-11-08T07:25:01Z",
"updated_at": "2024-11-15T08:52:23Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 201,
"watchers_count": 201,
"stargazers_count": 202,
"watchers_count": 202,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -367,7 +367,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 201,
"watchers": 202,
"score": 0,
"subscribers_count": 4
},
@ -417,10 +417,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-11-15T03:54:33Z",
"updated_at": "2024-11-15T07:23:47Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 128,
"watchers_count": 128,
"stargazers_count": 129,
"watchers_count": 129,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -437,7 +437,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 128,
"watchers": 129,
"score": 0,
"subscribers_count": 2
}

View file

@ -19,7 +19,7 @@
"stargazers_count": 758,
"watchers_count": 758,
"has_discussions": false,
"forks_count": 171,
"forks_count": 169,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -31,7 +31,7 @@
"spectre"
],
"visibility": "public",
"forks": 171,
"forks": 169,
"watchers": 758,
"score": 0,
"subscribers_count": 41

View file

@ -76,10 +76,10 @@
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
"fork": false,
"created_at": "2017-05-26T00:58:25Z",
"updated_at": "2024-10-12T17:01:13Z",
"updated_at": "2024-11-15T10:25:31Z",
"pushed_at": "2022-12-27T20:25:09Z",
"stargazers_count": 378,
"watchers_count": 378,
"stargazers_count": 379,
"watchers_count": 379,
"has_discussions": false,
"forks_count": 100,
"allow_forking": true,
@ -94,7 +94,7 @@
],
"visibility": "public",
"forks": 100,
"watchers": 378,
"watchers": 379,
"score": 0,
"subscribers_count": 10
},

View file

@ -267,10 +267,10 @@
"description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.",
"fork": false,
"created_at": "2021-04-21T16:42:31Z",
"updated_at": "2024-11-03T09:22:28Z",
"updated_at": "2024-11-15T07:40:23Z",
"pushed_at": "2021-04-21T16:46:37Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -279,7 +279,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 46,
"watchers": 47,
"score": 0,
"subscribers_count": 3
},

View file

@ -46,7 +46,7 @@
"fork": false,
"created_at": "2024-01-04T21:44:21Z",
"updated_at": "2024-11-14T17:14:40Z",
"pushed_at": "2024-11-14T17:14:38Z",
"pushed_at": "2024-11-15T09:26:20Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -76,10 +76,10 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2024-11-14T16:17:32Z",
"updated_at": "2024-11-15T08:19:12Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 201,
"watchers_count": 201,
"stargazers_count": 202,
"watchers_count": 202,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 201,
"watchers": 202,
"score": 0,
"subscribers_count": 9
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 2,
"score": 0,
"subscribers_count": 0
@ -339,5 +339,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 888975074,
"name": "CVE-2018-25031-SG",
"full_name": "KonEch0\/CVE-2018-25031-SG",
"owner": {
"login": "KonEch0",
"id": 102297040,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102297040?v=4",
"html_url": "https:\/\/github.com\/KonEch0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/KonEch0\/CVE-2018-25031-SG",
"description": "CVE-2018-25031-SG",
"fork": false,
"created_at": "2024-11-15T11:13:58Z",
"updated_at": "2024-11-15T11:21:40Z",
"pushed_at": "2024-11-15T11:21:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "A simple POC that demonstrates A vulnerability found in IObitUnlocker 1.1.2 that leverages IOCTL codes found it its vulnerable driver (IObitUnlocker.sys), providing ability to unlock, delete, rename, copy, and move running files and a low privileged user.",
"fork": false,
"created_at": "2024-04-14T19:53:03Z",
"updated_at": "2024-09-06T11:57:37Z",
"updated_at": "2024-11-15T10:53:51Z",
"pushed_at": "2024-04-14T20:07:14Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -888,10 +888,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-11-08T07:25:01Z",
"updated_at": "2024-11-15T08:52:23Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 201,
"watchers_count": 201,
"stargazers_count": 202,
"watchers_count": 202,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -900,7 +900,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 201,
"watchers": 202,
"score": 0,
"subscribers_count": 4
},
@ -981,10 +981,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-11-15T03:54:33Z",
"updated_at": "2024-11-15T07:23:47Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 128,
"watchers_count": 128,
"stargazers_count": 129,
"watchers_count": 129,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -1001,7 +1001,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 128,
"watchers": 129,
"score": 0,
"subscribers_count": 2
}

View file

@ -1259,15 +1259,15 @@
{
"id": 868207969,
"name": "Grafana-CVE-2021-43798",
"full_name": "sazzad1337\/Grafana-CVE-2021-43798",
"full_name": "0xSAZZAD\/Grafana-CVE-2021-43798",
"owner": {
"login": "sazzad1337",
"login": "0xSAZZAD",
"id": 59094087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59094087?v=4",
"html_url": "https:\/\/github.com\/sazzad1337",
"html_url": "https:\/\/github.com\/0xSAZZAD",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sazzad1337\/Grafana-CVE-2021-43798",
"html_url": "https:\/\/github.com\/0xSAZZAD\/Grafana-CVE-2021-43798",
"description": "Python implementation of a tool for decrypting and encrypting sensitive data in Grafana, specifically addressing the vulnerabilities associated with CVE-2021-43798. Grafana encrypts all data source passwords using the AES algorithm with the secret_key found in the defaults.ini configuration file.",
"fork": false,
"created_at": "2024-10-05T18:51:12Z",

View file

@ -1100,10 +1100,10 @@
"description": "Rapidly scan filesystems for Java programs potentially vulnerable to Log4Shell (CVE-2021-44228) or \"that Log4j JNDI exploit\" by inspecting the class paths inside files",
"fork": false,
"created_at": "2021-12-11T01:08:00Z",
"updated_at": "2023-03-16T10:47:12Z",
"updated_at": "2024-11-15T10:28:16Z",
"pushed_at": "2022-01-05T23:07:50Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -1120,7 +1120,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 44,
"watchers": 45,
"score": 0,
"subscribers_count": 6
},

View file

@ -14,10 +14,10 @@
"description": "PoC of CVE-2022-20474",
"fork": false,
"created_at": "2024-11-14T08:48:59Z",
"updated_at": "2024-11-15T03:16:49Z",
"pushed_at": "2024-11-14T13:36:16Z",
"stargazers_count": 6,
"watchers_count": 6,
"updated_at": "2024-11-15T11:22:49Z",
"pushed_at": "2024-11-15T11:22:45Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "it's a CVE-2022-3368 ( patched ), but feel free to use it for check any outdated software or reseach",
"fork": false,
"created_at": "2024-03-05T18:31:29Z",
"updated_at": "2024-11-04T20:30:39Z",
"updated_at": "2024-11-15T06:31:07Z",
"pushed_at": "2024-07-08T16:18:51Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -314,10 +314,10 @@
"description": "Confluence后台rce",
"fork": false,
"created_at": "2023-10-20T08:23:47Z",
"updated_at": "2024-06-21T00:11:38Z",
"updated_at": "2024-11-15T06:57:50Z",
"pushed_at": "2023-10-20T08:25:02Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -326,7 +326,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 18,
"watchers": 19,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-11-14T06:54:30Z",
"updated_at": "2024-11-15T08:03:59Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1261,
"watchers_count": 1261,
"stargazers_count": 1263,
"watchers_count": 1263,
"has_discussions": false,
"forks_count": 214,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 214,
"watchers": 1261,
"watchers": 1263,
"score": 0,
"subscribers_count": 20
},

View file

@ -45,10 +45,10 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
"fork": false,
"created_at": "2023-10-27T05:57:21Z",
"updated_at": "2024-11-01T05:52:18Z",
"updated_at": "2024-11-15T11:23:15Z",
"pushed_at": "2024-01-29T02:28:11Z",
"stargazers_count": 222,
"watchers_count": 222,
"stargazers_count": 223,
"watchers_count": 223,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 222,
"watchers": 223,
"score": 0,
"subscribers_count": 4
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -68,5 +68,36 @@
"watchers": 12,
"score": 0,
"subscribers_count": 1
},
{
"id": 888892906,
"name": "D-Link-NAS-CVE-2024-10914-",
"full_name": "Bu0uCat\/D-Link-NAS-CVE-2024-10914-",
"owner": {
"login": "Bu0uCat",
"id": 169526025,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169526025?v=4",
"html_url": "https:\/\/github.com\/Bu0uCat",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Bu0uCat\/D-Link-NAS-CVE-2024-10914-",
"description": "这是一个D-Link rce漏洞 检测程序",
"fork": false,
"created_at": "2024-11-15T07:56:21Z",
"updated_at": "2024-11-15T07:59:44Z",
"pushed_at": "2024-11-15T07:59:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": " Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 9.1.1.1 Authentication Bypass",
"fork": false,
"created_at": "2024-11-14T16:59:52Z",
"updated_at": "2024-11-14T17:01:02Z",
"updated_at": "2024-11-15T08:07:37Z",
"pushed_at": "2024-11-14T17:00:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "exploits for CVE-2024-20017",
"fork": false,
"created_at": "2024-08-30T05:54:36Z",
"updated_at": "2024-11-10T23:05:18Z",
"updated_at": "2024-11-15T10:16:18Z",
"pushed_at": "2024-09-07T10:11:22Z",
"stargazers_count": 134,
"watchers_count": 134,
"stargazers_count": 135,
"watchers_count": 135,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 134,
"watchers": 135,
"score": 0,
"subscribers_count": 3
}

33
2024/CVE-2024-2242.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 888883677,
"name": "CVE-2024-2242",
"full_name": "RandomRobbieBF\/CVE-2024-2242",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-2242",
"description": "Contact Form 7 <= 5.9 - Reflected Cross-Site Scripting",
"fork": false,
"created_at": "2024-11-15T07:32:31Z",
"updated_at": "2024-11-15T07:34:53Z",
"pushed_at": "2024-11-15T07:34:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -327,8 +327,8 @@
"description": "Bash script to automate Local File Inclusion (LFI) attacks on aiohttp server version 3.9.1.",
"fork": false,
"created_at": "2024-11-14T21:43:29Z",
"updated_at": "2024-11-14T23:28:38Z",
"pushed_at": "2024-11-14T21:53:58Z",
"updated_at": "2024-11-15T11:13:41Z",
"pushed_at": "2024-11-15T11:13:38Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -143,13 +143,13 @@
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 4,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 6,
"watchers": 34,
"score": 0,
"subscribers_count": 2

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-06-24T10:37:26Z",
"updated_at": "2024-11-14T08:50:00Z",
"updated_at": "2024-11-15T09:06:56Z",
"pushed_at": "2024-07-31T19:11:55Z",
"stargazers_count": 234,
"watchers_count": 234,
"stargazers_count": 235,
"watchers_count": 235,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 234,
"watchers": 235,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "Files related to the Pwn2Own Toronto 2023 exploit against the Xiaomi 13 Pro.",
"fork": false,
"created_at": "2024-10-14T09:38:04Z",
"updated_at": "2024-11-14T16:33:51Z",
"updated_at": "2024-11-15T06:35:00Z",
"pushed_at": "2024-10-14T09:43:53Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 1
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 73,
"watchers_count": 73,
"has_discussions": false,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 12,
"watchers": 73,
"score": 0,
"subscribers_count": 1

View file

@ -1687,8 +1687,8 @@
"description": "CVE-2024-4577 RCE PoC",
"fork": false,
"created_at": "2024-11-06T05:30:33Z",
"updated_at": "2024-11-15T06:02:28Z",
"pushed_at": "2024-11-15T06:02:24Z",
"updated_at": "2024-11-15T09:01:14Z",
"pushed_at": "2024-11-15T09:01:10Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,

View file

@ -14,19 +14,19 @@
"description": "Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575",
"fork": false,
"created_at": "2024-11-07T21:03:30Z",
"updated_at": "2024-11-15T06:19:18Z",
"updated_at": "2024-11-15T12:21:08Z",
"pushed_at": "2024-11-14T16:25:52Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 14,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 19,
"forks": 17,
"watchers": 27,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": "Just a local Dos bug in Linux kernel",
"fork": false,
"created_at": "2024-11-12T08:08:55Z",
"updated_at": "2024-11-13T18:37:36Z",
"updated_at": "2024-11-15T07:06:25Z",
"pushed_at": "2024-11-12T08:14:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,8 +14,8 @@
"description": "common-user-management is a robust Spring Boot application featuring user management services designed to control user access dynamically. There is a critical security vulnerability in the application endpoint \/api\/v1\/customer\/profile-picture. This endpoint allows file uploads without proper validation or restrictions leads to (RCE)",
"fork": false,
"created_at": "2024-11-14T16:04:00Z",
"updated_at": "2024-11-14T16:07:31Z",
"pushed_at": "2024-11-14T16:07:28Z",
"updated_at": "2024-11-15T10:19:14Z",
"pushed_at": "2024-11-15T10:19:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -511,6 +511,13 @@
- [uthrasri/CVE-2024-2193](https://github.com/uthrasri/CVE-2024-2193)
### CVE-2024-2242 (2024-03-13)
<code>The Contact Form 7 plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the active-tab parameter in all versions up to, and including, 5.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
</code>
- [RandomRobbieBF/CVE-2024-2242](https://github.com/RandomRobbieBF/CVE-2024-2242)
### CVE-2024-2257 (2024-05-10)
<code>This vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version : v3.2.02) due to improper implementation of password policies. An attacker with physical access could exploit this by creating password that do not adhere to the defined security standards/policy on the vulnerable system.\n\nSuccessful exploitation of this vulnerability could allow the attacker to expose the router to potential security threats.
@ -1971,6 +1978,7 @@
- [imnotcha0s/CVE-2024-10914](https://github.com/imnotcha0s/CVE-2024-10914)
- [verylazytech/CVE-2024-10914](https://github.com/verylazytech/CVE-2024-10914)
- [Bu0uCat/D-Link-NAS-CVE-2024-10914-](https://github.com/Bu0uCat/D-Link-NAS-CVE-2024-10914-)
### CVE-2024-10924 (2024-11-15)
@ -27435,7 +27443,7 @@
- [topyagyuu/CVE-2021-43798](https://github.com/topyagyuu/CVE-2021-43798)
- [MalekAlthubiany/CVE-2021-43798](https://github.com/MalekAlthubiany/CVE-2021-43798)
- [Sic4rio/Grafana-Decryptor-for-CVE-2021-43798](https://github.com/Sic4rio/Grafana-Decryptor-for-CVE-2021-43798)
- [sazzad1337/Grafana-CVE-2021-43798](https://github.com/sazzad1337/Grafana-CVE-2021-43798)
- [0xSAZZAD/Grafana-CVE-2021-43798](https://github.com/0xSAZZAD/Grafana-CVE-2021-43798)
### CVE-2021-43799 (2022-01-25)
@ -41173,6 +41181,7 @@
- [geozin/POC-CVE-2018-25031](https://github.com/geozin/POC-CVE-2018-25031)
- [h2oa/CVE-2018-25031](https://github.com/h2oa/CVE-2018-25031)
- [natpakun/SSRF-CVE-2018-25031-](https://github.com/natpakun/SSRF-CVE-2018-25031-)
- [KonEch0/CVE-2018-25031-SG](https://github.com/KonEch0/CVE-2018-25031-SG)
### CVE-2018-25032 (2022-03-25)