Auto Update 2024/12/28 12:31:25

This commit is contained in:
motikan2010-bot 2024-12-28 21:31:26 +09:00
parent ad93c6913d
commit d8b1fc4509
26 changed files with 185 additions and 81 deletions

View file

@ -2,15 +2,15 @@
{
"id": 589996875,
"name": "CVE-2014-5460",
"full_name": "brookeses69\/CVE-2014-5460",
"full_name": "F-0x57\/CVE-2014-5460",
"owner": {
"login": "brookeses69",
"login": "F-0x57",
"id": 83194919,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83194919?v=4",
"html_url": "https:\/\/github.com\/brookeses69",
"html_url": "https:\/\/github.com\/F-0x57",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/brookeses69\/CVE-2014-5460",
"html_url": "https:\/\/github.com\/F-0x57\/CVE-2014-5460",
"description": "CVE-2014-5460",
"fork": false,
"created_at": "2023-01-17T12:35:56Z",

View file

@ -143,7 +143,7 @@
"stargazers_count": 669,
"watchers_count": 669,
"has_discussions": false,
"forks_count": 197,
"forks_count": 196,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -151,7 +151,7 @@
"cve-2020-0796"
],
"visibility": "public",
"forks": 197,
"forks": 196,
"watchers": 669,
"score": 0,
"subscribers_count": 26

View file

@ -176,10 +176,10 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2024-12-18T20:38:18Z",
"updated_at": "2024-12-28T12:03:52Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 639,
"watchers_count": 639,
"stargazers_count": 640,
"watchers_count": 640,
"has_discussions": false,
"forks_count": 147,
"allow_forking": true,
@ -188,7 +188,7 @@
"topics": [],
"visibility": "public",
"forks": 147,
"watchers": 639,
"watchers": 640,
"score": 0,
"subscribers_count": 12
},

View file

@ -458,10 +458,10 @@
"description": "GitLab CE\/EE Preauth RCE using ExifTool",
"fork": false,
"created_at": "2021-11-11T04:34:07Z",
"updated_at": "2024-12-14T11:47:23Z",
"updated_at": "2024-12-28T09:16:22Z",
"pushed_at": "2022-01-16T15:54:14Z",
"stargazers_count": 221,
"watchers_count": 221,
"stargazers_count": 222,
"watchers_count": 222,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -477,7 +477,7 @@
],
"visibility": "public",
"forks": 39,
"watchers": 221,
"watchers": 222,
"score": 0,
"subscribers_count": 2
},

View file

@ -204,10 +204,10 @@
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
"fork": false,
"created_at": "2021-02-18T05:42:13Z",
"updated_at": "2024-12-13T08:25:21Z",
"updated_at": "2024-12-28T07:43:36Z",
"pushed_at": "2021-12-14T05:12:17Z",
"stargazers_count": 149,
"watchers_count": 149,
"stargazers_count": 150,
"watchers_count": 150,
"has_discussions": false,
"forks_count": 58,
"allow_forking": true,
@ -216,7 +216,7 @@
"topics": [],
"visibility": "public",
"forks": 58,
"watchers": 149,
"watchers": 150,
"score": 0,
"subscribers_count": 1
},

View file

@ -831,10 +831,10 @@
"description": "Root shell PoC for CVE-2021-3156",
"fork": false,
"created_at": "2021-02-03T19:57:56Z",
"updated_at": "2024-12-17T20:19:20Z",
"updated_at": "2024-12-28T11:22:59Z",
"pushed_at": "2022-02-13T12:21:53Z",
"stargazers_count": 145,
"watchers_count": 145,
"stargazers_count": 146,
"watchers_count": 146,
"has_discussions": false,
"forks_count": 61,
"allow_forking": true,
@ -843,7 +843,7 @@
"topics": [],
"visibility": "public",
"forks": 61,
"watchers": 145,
"watchers": 146,
"score": 0,
"subscribers_count": 1
},

View file

@ -386,7 +386,7 @@
"stargazers_count": 1110,
"watchers_count": 1110,
"has_discussions": false,
"forks_count": 535,
"forks_count": 534,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -394,7 +394,7 @@
"log4shell"
],
"visibility": "public",
"forks": 535,
"forks": 534,
"watchers": 1110,
"score": 0,
"subscribers_count": 23

View file

@ -76,10 +76,10 @@
"description": "CVE-2022-46463 harbor公开镜像全自动下载脚本",
"fork": false,
"created_at": "2024-12-23T08:35:30Z",
"updated_at": "2024-12-24T11:26:52Z",
"updated_at": "2024-12-28T07:21:03Z",
"pushed_at": "2024-12-23T08:40:16Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -50,13 +50,13 @@
"stargazers_count": 129,
"watchers_count": 129,
"has_discussions": false,
"forks_count": 31,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 31,
"forks": 32,
"watchers": 129,
"score": 0,
"subscribers_count": 5
@ -271,7 +271,7 @@
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -281,7 +281,7 @@
"openfire"
],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 7,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-03-23T15:25:49Z",
"updated_at": "2024-12-27T00:34:26Z",
"updated_at": "2024-12-28T09:53:36Z",
"pushed_at": "2024-03-23T18:59:30Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-12-26T11:15:44Z",
"updated_at": "2024-12-28T11:30:43Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1312,
"watchers_count": 1312,
"stargazers_count": 1313,
"watchers_count": 1313,
"has_discussions": false,
"forks_count": 222,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 222,
"watchers": 1312,
"watchers": 1313,
"score": 0,
"subscribers_count": 21
},

View file

@ -45,10 +45,10 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
"fork": false,
"created_at": "2023-10-27T05:57:21Z",
"updated_at": "2024-12-27T08:11:46Z",
"updated_at": "2024-12-28T10:59:12Z",
"pushed_at": "2024-01-29T02:28:11Z",
"stargazers_count": 234,
"watchers_count": 234,
"stargazers_count": 235,
"watchers_count": 235,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 234,
"watchers": 235,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-12-25T17:01:10Z",
"updated_at": "2024-12-28T09:50:45Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2311,
"watchers_count": 2311,
"stargazers_count": 2312,
"watchers_count": 2312,
"has_discussions": false,
"forks_count": 299,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 299,
"watchers": 2311,
"watchers": 2312,
"score": 0,
"subscribers_count": 26
},

33
2024/CVE-2024-11616.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 909318592,
"name": "CVE-2024-11616",
"full_name": "inb1ts\/CVE-2024-11616",
"owner": {
"login": "inb1ts",
"id": 87979502,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87979502?v=4",
"html_url": "https:\/\/github.com\/inb1ts",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/inb1ts\/CVE-2024-11616",
"description": "Crash PoC for exploiting Netskope Endpoint DLP double-fetch.",
"fork": false,
"created_at": "2024-12-28T10:48:23Z",
"updated_at": "2024-12-28T11:41:56Z",
"pushed_at": "2024-12-28T11:39:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -19,13 +19,13 @@
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 23,
"score": 0,
"subscribers_count": 5

View file

@ -29,5 +29,36 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 909306710,
"name": "Exploit-PoC-para-CVE-2024-30085",
"full_name": "murdok1982\/Exploit-PoC-para-CVE-2024-30085",
"owner": {
"login": "murdok1982",
"id": 14059710,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14059710?v=4",
"html_url": "https:\/\/github.com\/murdok1982",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/murdok1982\/Exploit-PoC-para-CVE-2024-30085",
"description": " Exploit en Python diseñado para aprovechar la vulnerabilidad de elevación de privilegios CVE-2024-30085",
"fork": false,
"created_at": "2024-12-28T10:03:26Z",
"updated_at": "2024-12-28T10:12:41Z",
"pushed_at": "2024-12-28T10:12:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -169,10 +169,10 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-12-26T06:26:46Z",
"updated_at": "2024-12-28T06:42:23Z",
"pushed_at": "2024-06-22T15:13:52Z",
"stargazers_count": 243,
"watchers_count": 243,
"stargazers_count": 244,
"watchers_count": 244,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 243,
"watchers": 244,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false,
"created_at": "2024-11-19T08:57:18Z",
"updated_at": "2024-12-27T09:39:41Z",
"updated_at": "2024-12-28T09:46:37Z",
"pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 108,
"watchers_count": 108,
"stargazers_count": 109,
"watchers_count": 109,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 108,
"watchers": 109,
"score": 0,
"subscribers_count": 2
},

View file

@ -107,10 +107,10 @@
"description": "Apache TomcatCVE-2024-50379条件竞争致远程代码执行漏洞批量检测脚本",
"fork": false,
"created_at": "2024-12-20T05:24:10Z",
"updated_at": "2024-12-23T07:43:06Z",
"updated_at": "2024-12-28T09:53:18Z",
"pushed_at": "2024-12-20T05:41:23Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 2
},
@ -200,10 +200,10 @@
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
"fork": false,
"created_at": "2024-12-23T07:20:47Z",
"updated_at": "2024-12-27T16:21:41Z",
"updated_at": "2024-12-28T09:53:36Z",
"pushed_at": "2024-12-23T07:30:27Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 50,
"watchers": 51,
"score": 0,
"subscribers_count": 3
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 7,
"score": 0,
"subscribers_count": 1

View file

@ -14,12 +14,12 @@
"description": "Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE",
"fork": false,
"created_at": "2024-11-13T02:50:56Z",
"updated_at": "2024-12-08T18:32:03Z",
"updated_at": "2024-12-28T07:43:14Z",
"pushed_at": "2024-11-29T03:02:09Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -31,8 +31,8 @@
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 0
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 12,
"score": 0,
"subscribers_count": 5

View file

@ -60,5 +60,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 909321616,
"name": "CVE-2024-9234",
"full_name": "Nxploited\/CVE-2024-9234",
"owner": {
"login": "Nxploited",
"id": 188819918,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4",
"html_url": "https:\/\/github.com\/Nxploited",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-9234",
"description": null,
"fork": false,
"created_at": "2024-12-28T11:00:02Z",
"updated_at": "2024-12-28T11:11:34Z",
"pushed_at": "2024-12-28T11:11:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -19,13 +19,13 @@
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 12,
"watchers": 44,
"score": 0,
"subscribers_count": 4

View file

@ -19,13 +19,13 @@
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 27,
"score": 0,
"subscribers_count": 4

View file

@ -1858,6 +1858,7 @@
- [RandomRobbieBF/CVE-2024-9234](https://github.com/RandomRobbieBF/CVE-2024-9234)
- [CallMeBatosay/CVE-2024-9234](https://github.com/CallMeBatosay/CVE-2024-9234)
- [Nxploited/CVE-2024-9234](https://github.com/Nxploited/CVE-2024-9234)
### CVE-2024-9264 (2024-10-18)
@ -2349,6 +2350,13 @@
- [TheN00bBuilder/cve-2024-11477-writeup](https://github.com/TheN00bBuilder/cve-2024-11477-writeup)
### CVE-2024-11616 (2024-12-19)
<code>Netskope was made aware of a security vulnerability in Netskope Endpoint DLPs Content Control Driver where a double-fetch issue leads to heap overflow. The vulnerability arises from the fact that the NumberOfBytes argument to ExAllocatePoolWithTag, and the Length argument for RtlCopyMemory, both independently dereference their value from the user supplied input buffer inside the EpdlpSetUsbAction function, known as a double-fetch. If this length value grows to a higher value in between these two calls, it will result in the RtlCopyMemory call copying user-supplied memory contents outside the range of the allocated buffer, resulting in a heap overflow. A malicious attacker will need admin privileges to exploit the issue.\nThis issue affects Endpoint DLP version below R119.
</code>
- [inb1ts/CVE-2024-11616](https://github.com/inb1ts/CVE-2024-11616)
### CVE-2024-11680 (2024-11-26)
<code>ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
@ -4516,6 +4524,7 @@
</code>
- [Adamkadaban/CVE-2024-30085](https://github.com/Adamkadaban/CVE-2024-30085)
- [murdok1982/Exploit-PoC-para-CVE-2024-30085](https://github.com/murdok1982/Exploit-PoC-para-CVE-2024-30085)
### CVE-2024-30088 (2024-06-11)
@ -47794,7 +47803,7 @@
<code>Unrestricted file upload vulnerability in the Tribulant Slideshow Gallery plugin before 1.4.7 for WordPress allows remote authenticated users to execute arbitrary code by uploading a PHP file, then accessing it via a direct request to the file in wp-content/uploads/slideshow-gallery/.
</code>
- [brookeses69/CVE-2014-5460](https://github.com/brookeses69/CVE-2014-5460)
- [F-0x57/CVE-2014-5460](https://github.com/F-0x57/CVE-2014-5460)
### CVE-2014-6271 (2014-09-24)