Auto Update 2024/12/13 06:32:22

This commit is contained in:
motikan2010-bot 2024-12-13 15:32:23 +09:00
parent b53a2bb950
commit d7129173d8
31 changed files with 131 additions and 91 deletions

View file

@ -14,10 +14,10 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2024-12-05T23:37:16Z",
"updated_at": "2024-12-13T04:51:48Z",
"pushed_at": "2021-02-24T09:17:24Z",
"stargazers_count": 2306,
"watchers_count": 2306,
"stargazers_count": 2305,
"watchers_count": 2305,
"has_discussions": false,
"forks_count": 461,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 461,
"watchers": 2306,
"watchers": 2305,
"score": 0,
"subscribers_count": 117
},

View file

@ -19,7 +19,7 @@
"stargazers_count": 757,
"watchers_count": 757,
"has_discussions": false,
"forks_count": 169,
"forks_count": 168,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -31,7 +31,7 @@
"spectre"
],
"visibility": "public",
"forks": 169,
"forks": 168,
"watchers": 757,
"score": 0,
"subscribers_count": 41

View file

@ -903,7 +903,7 @@
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 24,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -911,7 +911,7 @@
"cve-2019-0708-exp"
],
"visibility": "public",
"forks": 24,
"forks": 21,
"watchers": 30,
"score": 0,
"subscribers_count": 2

View file

@ -19,13 +19,13 @@
"stargazers_count": 182,
"watchers_count": 182,
"has_discussions": false,
"forks_count": 29,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 29,
"forks": 28,
"watchers": 182,
"score": 0,
"subscribers_count": 7

View file

@ -1081,7 +1081,7 @@
"stargazers_count": 240,
"watchers_count": 240,
"has_discussions": false,
"forks_count": 86,
"forks_count": 85,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1092,7 +1092,7 @@
"smbghost"
],
"visibility": "public",
"forks": 86,
"forks": 85,
"watchers": 240,
"score": 0,
"subscribers_count": 12

View file

@ -112,13 +112,13 @@
"stargazers_count": 1199,
"watchers_count": 1199,
"has_discussions": false,
"forks_count": 288,
"forks_count": 284,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 288,
"forks": 284,
"watchers": 1199,
"score": 0,
"subscribers_count": 34

View file

@ -82,10 +82,10 @@
"description": null,
"fork": false,
"created_at": "2021-07-02T12:10:49Z",
"updated_at": "2024-12-07T00:43:13Z",
"updated_at": "2024-12-13T02:11:55Z",
"pushed_at": "2021-07-02T12:17:50Z",
"stargazers_count": 265,
"watchers_count": 265,
"stargazers_count": 266,
"watchers_count": 266,
"has_discussions": false,
"forks_count": 68,
"allow_forking": true,
@ -94,7 +94,7 @@
"topics": [],
"visibility": "public",
"forks": 68,
"watchers": 265,
"watchers": 266,
"score": 0,
"subscribers_count": 11
},

View file

@ -2383,10 +2383,10 @@
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
"fork": false,
"created_at": "2022-03-12T21:24:55Z",
"updated_at": "2024-12-11T18:43:30Z",
"updated_at": "2024-12-13T00:43:37Z",
"pushed_at": "2022-03-12T21:30:58Z",
"stargazers_count": 100,
"watchers_count": 100,
"stargazers_count": 101,
"watchers_count": 101,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -2404,7 +2404,7 @@
],
"visibility": "public",
"forks": 34,
"watchers": 100,
"watchers": 101,
"score": 0,
"subscribers_count": 2
},

View file

@ -6089,10 +6089,10 @@
"description": "Tools for investigating Log4j CVE-2021-44228",
"fork": false,
"created_at": "2021-12-14T19:08:14Z",
"updated_at": "2024-09-06T00:15:26Z",
"updated_at": "2024-12-13T02:39:37Z",
"pushed_at": "2021-12-23T21:03:08Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 95,
"watchers_count": 95,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -6101,7 +6101,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 94,
"watchers": 95,
"score": 0,
"subscribers_count": 7
},

View file

@ -14,10 +14,10 @@
"description": "win32k LPE ",
"fork": false,
"created_at": "2022-01-27T03:44:10Z",
"updated_at": "2024-12-02T17:18:35Z",
"updated_at": "2024-12-13T06:08:27Z",
"pushed_at": "2022-01-27T04:18:18Z",
"stargazers_count": 461,
"watchers_count": 461,
"stargazers_count": 460,
"watchers_count": 460,
"has_discussions": false,
"forks_count": 134,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 134,
"watchers": 461,
"watchers": 460,
"score": 0,
"subscribers_count": 14
},

View file

@ -14,10 +14,10 @@
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
"fork": false,
"created_at": "2022-09-12T19:22:44Z",
"updated_at": "2024-12-04T22:50:12Z",
"updated_at": "2024-12-13T03:08:22Z",
"pushed_at": "2022-09-19T19:41:34Z",
"stargazers_count": 299,
"watchers_count": 299,
"stargazers_count": 300,
"watchers_count": 300,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 299,
"watchers": 300,
"score": 0,
"subscribers_count": 6
},

View file

@ -76,10 +76,10 @@
"description": "Reverse Shell POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253), PHP Code Injection",
"fork": false,
"created_at": "2024-05-27T15:10:12Z",
"updated_at": "2024-12-12T20:32:55Z",
"updated_at": "2024-12-13T04:47:13Z",
"pushed_at": "2024-05-28T15:10:20Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 36,
"watchers": 37,
"score": 0,
"subscribers_count": 1
},

View file

@ -279,6 +279,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -90,6 +90,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -267,10 +267,10 @@
"description": "This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This script automates the exploitation process, including payload creation, chunked delivery, and seamless command execution.",
"fork": false,
"created_at": "2024-12-11T18:13:32Z",
"updated_at": "2024-12-12T15:48:13Z",
"updated_at": "2024-12-13T03:48:26Z",
"pushed_at": "2024-12-12T15:48:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -279,7 +279,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,18 +14,18 @@
"description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis",
"fork": false,
"created_at": "2024-11-29T06:13:36Z",
"updated_at": "2024-12-12T14:13:59Z",
"updated_at": "2024-12-13T04:19:43Z",
"pushed_at": "2024-12-04T01:01:28Z",
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 42,
"score": 0,
"subscribers_count": 1

View file

@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-26T08:02:00Z",
"updated_at": "2024-11-08T17:33:51Z",
"updated_at": "2024-12-13T00:59:06Z",
"pushed_at": "2024-02-01T06:50:32Z",
"stargazers_count": 98,
"watchers_count": 98,
"stargazers_count": 99,
"watchers_count": 99,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 98,
"watchers": 99,
"score": 0,
"subscribers_count": 1
},
@ -76,10 +76,10 @@
"description": "CVE-2024-23897",
"fork": false,
"created_at": "2024-01-26T09:44:32Z",
"updated_at": "2024-12-06T13:03:02Z",
"updated_at": "2024-12-13T01:07:05Z",
"pushed_at": "2024-01-28T06:47:28Z",
"stargazers_count": 195,
"watchers_count": 195,
"stargazers_count": 196,
"watchers_count": 196,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 195,
"watchers": 196,
"score": 0,
"subscribers_count": 2
},

View file

@ -341,10 +341,10 @@
"description": "An Vulnerability detection and Exploitation tool for CVE-2024-24919",
"fork": false,
"created_at": "2024-05-31T10:18:36Z",
"updated_at": "2024-12-12T12:16:31Z",
"updated_at": "2024-12-13T03:57:33Z",
"pushed_at": "2024-06-05T11:38:12Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -353,7 +353,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 21,
"watchers": 22,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": "For V8CTF M123",
"fork": false,
"created_at": "2024-08-25T12:13:07Z",
"updated_at": "2024-11-12T04:35:38Z",
"updated_at": "2024-12-13T06:23:15Z",
"pushed_at": "2024-08-25T13:04:44Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -324,10 +324,10 @@
"description": "CVE-2024-3400-RCE",
"fork": false,
"created_at": "2024-04-16T16:18:56Z",
"updated_at": "2024-11-07T10:01:55Z",
"updated_at": "2024-12-13T02:54:12Z",
"pushed_at": "2024-04-22T08:50:27Z",
"stargazers_count": 85,
"watchers_count": 85,
"stargazers_count": 86,
"watchers_count": 86,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -336,7 +336,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 85,
"watchers": 86,
"score": 0,
"subscribers_count": 3
},

View file

@ -176,10 +176,10 @@
"description": "geoserver CVE-2024-36401漏洞利用工具",
"fork": false,
"created_at": "2024-07-17T02:25:21Z",
"updated_at": "2024-12-08T23:44:23Z",
"updated_at": "2024-12-13T01:40:18Z",
"pushed_at": "2024-07-24T15:33:03Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -188,7 +188,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 0
},

View file

@ -11,10 +11,10 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/JAckLosingHeart\/CVE-2024-36823-POC",
"description": null,
"description": "Ninja Framework sensitive information leak due to weak encryption",
"fork": false,
"created_at": "2024-11-03T01:56:11Z",
"updated_at": "2024-11-03T01:56:39Z",
"updated_at": "2024-12-13T06:24:14Z",
"pushed_at": "2024-11-03T01:56:36Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -59,6 +59,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-40711-exp",
"fork": false,
"created_at": "2024-10-16T05:02:27Z",
"updated_at": "2024-12-12T05:04:10Z",
"updated_at": "2024-12-13T02:57:02Z",
"pushed_at": "2024-10-17T01:06:42Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 33,
"watchers": 34,
"score": 0,
"subscribers_count": 1
},

View file

@ -152,7 +152,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 902138431,
@ -183,6 +183,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -552,6 +552,6 @@
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)",
"fork": false,
"created_at": "2024-12-11T14:19:55Z",
"updated_at": "2024-12-12T19:41:32Z",
"updated_at": "2024-12-13T04:51:20Z",
"pushed_at": "2024-12-11T14:23:19Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 12,
"watchers": 14,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": "s2-067(CVE-2024-53677)",
"fork": false,
"created_at": "2024-12-12T08:30:14Z",
"updated_at": "2024-12-12T08:33:23Z",
"updated_at": "2024-12-13T04:39:09Z",
"pushed_at": "2024-12-12T08:33:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,8 +26,8 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 2
}
]

33
2024/CVE-2024-55875.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 902723062,
"name": "CVE-2024-55875",
"full_name": "JAckLosingHeart\/CVE-2024-55875",
"owner": {
"login": "JAckLosingHeart",
"id": 57932150,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57932150?v=4",
"html_url": "https:\/\/github.com\/JAckLosingHeart",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/JAckLosingHeart\/CVE-2024-55875",
"description": "CVE-2024-55875 | GHSA-7mj5-hjjj-8rgw | http4k first CVE",
"fork": false,
"created_at": "2024-12-13T06:21:36Z",
"updated_at": "2024-12-13T06:22:39Z",
"pushed_at": "2024-12-13T06:22:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -7424,6 +7424,13 @@
- [CSIRTTrizna/CVE-2024-55587](https://github.com/CSIRTTrizna/CVE-2024-55587)
### CVE-2024-55875 (2024-12-12)
<code>http4k is a functional toolkit for Kotlin HTTP applications. Prior to version 5.41.0.0, there is a potential XXE (XML External Entity Injection) vulnerability when http4k handling malicious XML contents within requests, which might allow attackers to read local sensitive information on server, trigger Server-side Request Forgery and even execute code under some circumstances. Version 5.41.0.0 contains a patch for the issue.
</code>
- [JAckLosingHeart/CVE-2024-55875](https://github.com/JAckLosingHeart/CVE-2024-55875)
### CVE-2024-1642470
- [Symbolexe/CVE-2024-1642470](https://github.com/Symbolexe/CVE-2024-1642470)