Auto Update 2024/10/17 18:30:56

This commit is contained in:
motikan2010-bot 2024-10-18 03:30:56 +09:00
parent 7aa142e2bc
commit 01fb153cc2
50 changed files with 335 additions and 189 deletions

View file

@ -13,10 +13,10 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2024-09-19T11:48:22Z",
"updated_at": "2024-10-17T17:28:09Z",
"pushed_at": "2023-01-22T09:39:45Z",
"stargazers_count": 385,
"watchers_count": 385,
"stargazers_count": 386,
"watchers_count": 386,
"has_discussions": false,
"forks_count": 112,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 112,
"watchers": 385,
"watchers": 386,
"score": 0,
"subscribers_count": 18
},

View file

@ -147,6 +147,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -920,8 +920,8 @@
"description": null,
"fork": false,
"created_at": "2023-11-02T16:30:52Z",
"updated_at": "2023-11-02T18:31:07Z",
"pushed_at": "2023-11-02T18:32:38Z",
"updated_at": "2024-10-17T14:42:23Z",
"pushed_at": "2024-10-17T14:42:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -776,8 +776,8 @@
"description": null,
"fork": false,
"created_at": "2024-10-13T11:33:23Z",
"updated_at": "2024-10-13T11:33:56Z",
"pushed_at": "2024-10-13T11:33:53Z",
"updated_at": "2024-10-17T13:28:49Z",
"pushed_at": "2024-10-17T13:28:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -785,7 +785,12 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"cve",
"cve-2019-14287",
"sudo",
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 0,

View file

@ -73,10 +73,10 @@
"description": null,
"fork": false,
"created_at": "2020-09-14T16:52:37Z",
"updated_at": "2024-08-12T20:05:46Z",
"updated_at": "2024-10-17T18:04:09Z",
"pushed_at": "2020-09-14T16:53:07Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 35,
"watchers": 36,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]",
"fork": false,
"created_at": "2022-08-17T19:05:38Z",
"updated_at": "2024-09-02T12:44:39Z",
"updated_at": "2024-10-17T17:17:03Z",
"pushed_at": "2022-08-17T19:20:34Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 3
}

View file

@ -43,10 +43,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2024-10-17T00:05:48Z",
"updated_at": "2024-10-17T18:04:05Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1837,
"watchers_count": 1837,
"stargazers_count": 1838,
"watchers_count": 1838,
"has_discussions": false,
"forks_count": 583,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 583,
"watchers": 1837,
"watchers": 1838,
"score": 0,
"subscribers_count": 44
},
@ -301,10 +301,10 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2024-10-16T15:33:14Z",
"updated_at": "2024-10-17T12:50:50Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 1007,
"watchers_count": 1007,
"stargazers_count": 1008,
"watchers_count": 1008,
"has_discussions": false,
"forks_count": 230,
"allow_forking": true,
@ -313,7 +313,7 @@
"topics": [],
"visibility": "public",
"forks": 230,
"watchers": 1007,
"watchers": 1008,
"score": 0,
"subscribers_count": 26
},

View file

@ -347,10 +347,10 @@
"description": "Laravel RCE Exploit Script - CVE-2021-3129",
"fork": false,
"created_at": "2022-04-16T17:22:55Z",
"updated_at": "2024-10-15T06:05:28Z",
"updated_at": "2024-10-17T15:55:11Z",
"pushed_at": "2024-09-22T13:10:27Z",
"stargazers_count": 84,
"watchers_count": 84,
"stargazers_count": 85,
"watchers_count": 85,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -374,7 +374,7 @@
],
"visibility": "public",
"forks": 19,
"watchers": 84,
"watchers": 85,
"score": 0,
"subscribers_count": 1
},

View file

@ -912,7 +912,7 @@
"stargazers_count": 1799,
"watchers_count": 1799,
"has_discussions": false,
"forks_count": 524,
"forks_count": 525,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -923,7 +923,7 @@
"security"
],
"visibility": "public",
"forks": 524,
"forks": 525,
"watchers": 1799,
"score": 0,
"subscribers_count": 27
@ -1527,7 +1527,7 @@
"fork": false,
"created_at": "2021-12-11T12:16:45Z",
"updated_at": "2024-04-29T17:48:37Z",
"pushed_at": "2024-10-14T03:02:26Z",
"pushed_at": "2024-10-17T17:27:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]",
"fork": false,
"created_at": "2022-08-17T19:05:38Z",
"updated_at": "2024-09-02T12:44:39Z",
"updated_at": "2024-10-17T17:17:03Z",
"pushed_at": "2022-08-17T19:20:34Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,8 +13,8 @@
"description": "Android kernel exploitation for CVE-2022-20409",
"fork": false,
"created_at": "2022-11-21T22:42:50Z",
"updated_at": "2024-08-14T02:09:31Z",
"pushed_at": "2023-08-05T20:56:12Z",
"updated_at": "2024-10-17T16:27:57Z",
"pushed_at": "2024-10-17T16:26:39Z",
"stargazers_count": 156,
"watchers_count": 156,
"has_discussions": false,
@ -24,6 +24,7 @@
"web_commit_signoff_required": false,
"topics": [
"android-exploitation",
"android-root",
"kernel-exploitation"
],
"visibility": "public",

View file

@ -13,19 +13,19 @@
"description": "CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK) ",
"fork": false,
"created_at": "2024-09-17T06:28:17Z",
"updated_at": "2024-10-17T11:36:28Z",
"updated_at": "2024-10-17T17:37:44Z",
"pushed_at": "2024-10-16T22:27:13Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 5,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 25,
"forks": 7,
"watchers": 28,
"score": 0,
"subscribers_count": 1
}

View file

@ -548,7 +548,7 @@
"description": "Simple Honeypot for Atlassian Confluence (CVE-2022-26134)",
"fork": false,
"created_at": "2022-06-06T15:44:24Z",
"updated_at": "2024-08-12T20:23:54Z",
"updated_at": "2024-10-17T12:57:51Z",
"pushed_at": "2022-06-07T08:51:53Z",
"stargazers_count": 20,
"watchers_count": 20,

View file

@ -163,8 +163,8 @@
"description": "PoC exploit for GLPI - Command injection using a third-party library script",
"fork": false,
"created_at": "2024-04-24T06:39:10Z",
"updated_at": "2024-05-30T15:08:51Z",
"pushed_at": "2024-04-26T05:37:07Z",
"updated_at": "2024-10-17T17:56:49Z",
"pushed_at": "2024-10-17T17:56:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -73,10 +73,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2022-12-26T00:08:55Z",
"updated_at": "2024-09-30T13:25:28Z",
"updated_at": "2024-10-17T13:17:03Z",
"pushed_at": "2023-10-10T16:53:48Z",
"stargazers_count": 119,
"watchers_count": 119,
"stargazers_count": 120,
"watchers_count": 120,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 119,
"watchers": 120,
"score": 0,
"subscribers_count": 8
},

View file

@ -13,19 +13,19 @@
"description": "LPE exploit for CVE-2023-21768",
"fork": false,
"created_at": "2023-03-07T23:00:27Z",
"updated_at": "2024-10-11T14:03:12Z",
"updated_at": "2024-10-17T12:26:30Z",
"pushed_at": "2023-07-10T16:35:49Z",
"stargazers_count": 473,
"watchers_count": 473,
"stargazers_count": 474,
"watchers_count": 474,
"has_discussions": false,
"forks_count": 162,
"forks_count": 163,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 162,
"watchers": 473,
"forks": 163,
"watchers": 474,
"score": 0,
"subscribers_count": 10
},

32
2023/CVE-2023-22098.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 870976805,
"name": "CVE-2023-22098",
"full_name": "Diego-AltF4\/CVE-2023-22098",
"owner": {
"login": "Diego-AltF4",
"id": 55554183,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55554183?v=4",
"html_url": "https:\/\/github.com\/Diego-AltF4"
},
"html_url": "https:\/\/github.com\/Diego-AltF4\/CVE-2023-22098",
"description": "Oracle VM VirtualBox 7.0.10 r158379 Escape",
"fork": false,
"created_at": "2024-10-11T02:53:14Z",
"updated_at": "2024-10-17T17:39:19Z",
"pushed_at": "2024-10-11T02:59:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "MOC3ingbird Exploit for Live2D (CVE-2023-27566)",
"fork": false,
"created_at": "2023-03-03T01:57:28Z",
"updated_at": "2024-10-12T07:47:08Z",
"updated_at": "2024-10-17T13:58:58Z",
"pushed_at": "2023-09-19T01:12:41Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 79,
"watchers_count": 79,
"has_discussions": true,
"forks_count": 6,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 78,
"watchers": 79,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
"fork": false,
"created_at": "2023-06-28T13:22:26Z",
"updated_at": "2024-10-13T02:07:48Z",
"updated_at": "2024-10-17T16:25:49Z",
"pushed_at": "2023-07-28T13:20:45Z",
"stargazers_count": 462,
"watchers_count": 462,
"stargazers_count": 463,
"watchers_count": 463,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 462,
"watchers": 463,
"score": 0,
"subscribers_count": 15
}

View file

@ -13,10 +13,10 @@
"description": "Original PoC for CVE-2023-32784",
"fork": false,
"created_at": "2023-05-01T17:08:55Z",
"updated_at": "2024-09-24T16:59:26Z",
"updated_at": "2024-10-17T16:59:48Z",
"pushed_at": "2023-08-17T19:26:55Z",
"stargazers_count": 621,
"watchers_count": 621,
"stargazers_count": 622,
"watchers_count": 622,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 56,
"watchers": 621,
"watchers": 622,
"score": 0,
"subscribers_count": 11
},

View file

@ -13,10 +13,10 @@
"description": "Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation",
"fork": false,
"created_at": "2024-03-21T21:39:24Z",
"updated_at": "2024-10-13T04:10:36Z",
"updated_at": "2024-10-17T14:08:23Z",
"pushed_at": "2024-03-22T06:45:43Z",
"stargazers_count": 122,
"watchers_count": 122,
"stargazers_count": 123,
"watchers_count": 123,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 122,
"watchers": 123,
"score": 0,
"subscribers_count": 2
}

View file

@ -154,5 +154,35 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 874221105,
"name": "cve_2023_38408_scanner",
"full_name": "fazilbaig1\/cve_2023_38408_scanner",
"owner": {
"login": "fazilbaig1",
"id": 25384256,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25384256?v=4",
"html_url": "https:\/\/github.com\/fazilbaig1"
},
"html_url": "https:\/\/github.com\/fazilbaig1\/cve_2023_38408_scanner",
"description": "Vulnerability Overview CVE-2023-38408 affects OpenSSH versions < 9.3p2 and stems from improper validation of data when SSH agent forwarding is enabled. When users connect to a remote server with ssh -A, they allow the agent on their local machine to be used for authentication to further systems",
"fork": false,
"created_at": "2024-10-17T13:03:42Z",
"updated_at": "2024-10-17T13:08:15Z",
"pushed_at": "2024-10-17T13:08:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-27T05:09:20Z",
"updated_at": "2024-06-18T13:58:35Z",
"updated_at": "2024-10-17T18:04:45Z",
"pushed_at": "2023-10-12T05:03:19Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 39,
"watchers": 40,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-10-17T09:24:40Z",
"updated_at": "2024-10-17T14:13:39Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1222,
"watchers_count": 1222,
"stargazers_count": 1223,
"watchers_count": 1223,
"has_discussions": false,
"forks_count": 205,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 205,
"watchers": 1222,
"watchers": 1223,
"score": 0,
"subscribers_count": 20
},

View file

@ -13,8 +13,8 @@
"description": "CVE-2023-46371 and CVE-2023-46527 update",
"fork": false,
"created_at": "2024-09-10T13:18:02Z",
"updated_at": "2024-09-10T14:01:36Z",
"pushed_at": "2024-09-10T13:55:29Z",
"updated_at": "2024-10-17T14:48:10Z",
"pushed_at": "2024-10-17T14:48:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2024-05-02T02:17:31Z",
"updated_at": "2024-10-15T07:10:05Z",
"pushed_at": "2024-06-21T08:24:09Z",
"pushed_at": "2024-10-17T18:05:06Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
"fork": false,
"created_at": "2024-04-13T05:53:02Z",
"updated_at": "2024-10-15T14:26:15Z",
"updated_at": "2024-10-17T15:55:21Z",
"pushed_at": "2024-04-16T21:00:14Z",
"stargazers_count": 278,
"watchers_count": 278,
"stargazers_count": 280,
"watchers_count": 280,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 278,
"watchers": 280,
"score": 0,
"subscribers_count": 3
},

View file

@ -73,10 +73,10 @@
"description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ",
"fork": false,
"created_at": "2024-03-13T09:17:28Z",
"updated_at": "2024-10-14T13:08:24Z",
"updated_at": "2024-10-17T14:37:26Z",
"pushed_at": "2024-03-16T00:35:12Z",
"stargazers_count": 119,
"watchers_count": 119,
"stargazers_count": 120,
"watchers_count": 120,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 119,
"watchers": 120,
"score": 0,
"subscribers_count": 5
},

View file

@ -600,10 +600,10 @@
"description": "This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The vulnerability allows for reading system files. CVE ID: CVE-2024-24919",
"fork": false,
"created_at": "2024-05-31T18:14:19Z",
"updated_at": "2024-10-12T03:22:24Z",
"updated_at": "2024-10-17T16:04:20Z",
"pushed_at": "2024-06-05T16:13:51Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -612,7 +612,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
"fork": false,
"created_at": "2024-06-10T17:02:03Z",
"updated_at": "2024-09-25T07:04:09Z",
"updated_at": "2024-10-17T16:05:29Z",
"pushed_at": "2024-07-04T10:39:15Z",
"stargazers_count": 310,
"watchers_count": 310,
"stargazers_count": 311,
"watchers_count": 311,
"has_discussions": false,
"forks_count": 63,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 310,
"watchers": 311,
"score": 0,
"subscribers_count": 4
},

View file

@ -73,10 +73,10 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2024-10-15T14:05:28Z",
"updated_at": "2024-10-17T13:27:33Z",
"pushed_at": "2024-09-30T08:45:56Z",
"stargazers_count": 397,
"watchers_count": 397,
"stargazers_count": 398,
"watchers_count": 398,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 397,
"watchers": 398,
"score": 0,
"subscribers_count": 8
},

View file

@ -103,10 +103,10 @@
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
"fork": false,
"created_at": "2024-07-15T08:07:05Z",
"updated_at": "2024-10-15T15:57:18Z",
"updated_at": "2024-10-17T13:19:56Z",
"pushed_at": "2024-09-08T21:23:34Z",
"stargazers_count": 406,
"watchers_count": 406,
"stargazers_count": 405,
"watchers_count": 405,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 406,
"watchers": 405,
"score": 0,
"subscribers_count": 18
},

View file

@ -13,19 +13,19 @@
"description": "CVE-2024-30090 - LPE PoC",
"fork": false,
"created_at": "2024-10-17T08:38:47Z",
"updated_at": "2024-10-17T12:18:43Z",
"updated_at": "2024-10-17T18:10:20Z",
"pushed_at": "2024-10-17T09:53:33Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 1,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"forks": 5,
"watchers": 14,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "D-Link NAS CVE-2024-3273 Exploit Tool",
"fork": false,
"created_at": "2024-04-07T03:09:13Z",
"updated_at": "2024-10-08T14:44:15Z",
"updated_at": "2024-10-17T13:27:30Z",
"pushed_at": "2024-04-07T04:41:26Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 89,
"watchers_count": 89,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 88,
"watchers": 89,
"score": 0,
"subscribers_count": 4
},
@ -43,10 +43,10 @@
"description": "Exploit for CVE-2024-3273, supports single and multiple hosts",
"fork": false,
"created_at": "2024-04-07T15:36:18Z",
"updated_at": "2024-08-13T12:07:07Z",
"updated_at": "2024-10-17T12:54:48Z",
"pushed_at": "2024-04-07T15:41:42Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},
@ -103,10 +103,10 @@
"description": "A PoC exploit for CVE-2024-3273 - D-Link Remote Code Execution RCE",
"fork": false,
"created_at": "2024-04-09T12:26:37Z",
"updated_at": "2024-08-03T02:02:13Z",
"updated_at": "2024-10-17T13:18:40Z",
"pushed_at": "2024-04-09T12:51:41Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -131,7 +131,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
@ -149,10 +149,10 @@
"description": "D-Link NAS Command Execution Exploit",
"fork": false,
"created_at": "2024-04-10T00:27:02Z",
"updated_at": "2024-08-22T07:44:13Z",
"updated_at": "2024-10-17T13:28:04Z",
"pushed_at": "2024-04-10T00:36:05Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -161,7 +161,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,19 +13,19 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false,
"created_at": "2024-10-13T19:30:20Z",
"updated_at": "2024-10-17T12:04:02Z",
"updated_at": "2024-10-17T18:16:58Z",
"pushed_at": "2024-10-13T19:46:23Z",
"stargazers_count": 112,
"watchers_count": 112,
"stargazers_count": 124,
"watchers_count": 124,
"has_discussions": false,
"forks_count": 30,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 112,
"forks": 33,
"watchers": 124,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Keycloak admin API allows low privilege users to use administrative functions",
"fork": false,
"created_at": "2024-10-12T09:17:00Z",
"updated_at": "2024-10-15T17:59:38Z",
"updated_at": "2024-10-17T14:59:13Z",
"pushed_at": "2024-10-12T09:48:10Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 1
}

View file

@ -256,10 +256,10 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
"updated_at": "2024-10-16T15:16:45Z",
"updated_at": "2024-10-17T13:19:57Z",
"pushed_at": "2024-08-27T12:22:39Z",
"stargazers_count": 611,
"watchers_count": 611,
"stargazers_count": 610,
"watchers_count": 610,
"has_discussions": false,
"forks_count": 112,
"allow_forking": true,
@ -268,7 +268,7 @@
"topics": [],
"visibility": "public",
"forks": 112,
"watchers": 611,
"watchers": 610,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,19 +13,19 @@
"description": "CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK) ",
"fork": false,
"created_at": "2024-09-17T06:28:17Z",
"updated_at": "2024-10-17T11:36:28Z",
"updated_at": "2024-10-17T17:37:44Z",
"pushed_at": "2024-10-16T22:27:13Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 5,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 25,
"forks": 7,
"watchers": 28,
"score": 0,
"subscribers_count": 1
}

32
2024/CVE-2024-40662.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 874208395,
"name": "net_G2.5_CVE-2024-40662",
"full_name": "Aakashmom\/net_G2.5_CVE-2024-40662",
"owner": {
"login": "Aakashmom",
"id": 76400693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76400693?v=4",
"html_url": "https:\/\/github.com\/Aakashmom"
},
"html_url": "https:\/\/github.com\/Aakashmom\/net_G2.5_CVE-2024-40662",
"description": null,
"fork": false,
"created_at": "2024-10-17T12:39:21Z",
"updated_at": "2024-10-17T12:40:47Z",
"pushed_at": "2024-10-17T12:40:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Unauthenticated Remote Code Execution via Angular-Base64-Upload Library ",
"fork": false,
"created_at": "2024-10-09T14:35:06Z",
"updated_at": "2024-10-15T19:28:33Z",
"updated_at": "2024-10-17T18:14:22Z",
"pushed_at": "2024-10-15T19:28:30Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 1
}

View file

@ -107,19 +107,19 @@
"description": "Exploit for the vulnerability CVE-2024-43044 in Jenkins",
"fork": false,
"created_at": "2024-08-23T20:26:26Z",
"updated_at": "2024-10-16T14:02:27Z",
"updated_at": "2024-10-17T14:09:07Z",
"pushed_at": "2024-10-02T21:58:12Z",
"stargazers_count": 158,
"watchers_count": 158,
"stargazers_count": 159,
"watchers_count": 159,
"has_discussions": false,
"forks_count": 22,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 158,
"forks": 23,
"watchers": 159,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-44000 is a vulnerability in the LiteSpeed Cache plugin, a popular WordPress plugin. This vulnerability affects session management in LiteSpeed Cache, allowing attackers to gain unauthorized access to sensitive data.",
"fork": false,
"created_at": "2024-09-06T03:38:13Z",
"updated_at": "2024-10-10T04:50:14Z",
"updated_at": "2024-10-17T12:34:25Z",
"pushed_at": "2024-09-06T03:54:52Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Ruby-SAML \/ GitLab Authentication Bypass (CVE-2024-45409) exploit",
"fork": false,
"created_at": "2024-10-07T09:24:46Z",
"updated_at": "2024-10-17T07:21:57Z",
"updated_at": "2024-10-17T12:33:46Z",
"pushed_at": "2024-10-07T11:50:17Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 63,
"watchers": 64,
"score": 0,
"subscribers_count": 1
}

View file

@ -48,13 +48,13 @@
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 18,
"forks": 19,
"watchers": 39,
"score": 0,
"subscribers_count": 2

View file

@ -168,13 +168,13 @@
"stargazers_count": 215,
"watchers_count": 215,
"has_discussions": false,
"forks_count": 49,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 49,
"forks": 50,
"watchers": 215,
"score": 0,
"subscribers_count": 4

View file

@ -342,5 +342,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 874384484,
"name": "CUPS-CVE-2024-47176",
"full_name": "gianlu335\/CUPS-CVE-2024-47176",
"owner": {
"login": "gianlu335",
"id": 43763664,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43763664?v=4",
"html_url": "https:\/\/github.com\/gianlu335"
},
"html_url": "https:\/\/github.com\/gianlu335\/CUPS-CVE-2024-47176",
"description": "A Mass Scanner designed to detect the CVE-2024-47176 vulnerability across systems running the Common Unix Printing System (CUPS). ",
"fork": false,
"created_at": "2024-10-17T18:21:10Z",
"updated_at": "2024-10-17T18:29:17Z",
"pushed_at": "2024-10-17T18:29:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "PoC honeypot for detecting exploit attempts against CVE-2024-47177",
"fork": false,
"created_at": "2024-09-27T05:18:23Z",
"updated_at": "2024-10-10T07:40:14Z",
"updated_at": "2024-10-17T15:31:58Z",
"pushed_at": "2024-09-30T04:36:30Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"forks": 2,
"watchers": 7,
"score": 0,
"subscribers_count": 2
}

View file

@ -260,10 +260,10 @@
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
"fork": false,
"created_at": "2024-07-01T20:33:20Z",
"updated_at": "2024-10-16T10:59:01Z",
"updated_at": "2024-10-17T14:11:26Z",
"pushed_at": "2024-09-24T19:18:56Z",
"stargazers_count": 451,
"watchers_count": 451,
"stargazers_count": 450,
"watchers_count": 450,
"has_discussions": false,
"forks_count": 84,
"allow_forking": true,
@ -278,7 +278,7 @@
],
"visibility": "public",
"forks": 84,
"watchers": 451,
"watchers": 450,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,19 +13,19 @@
"description": "A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension. ",
"fork": false,
"created_at": "2024-09-10T06:27:59Z",
"updated_at": "2024-10-17T12:13:47Z",
"updated_at": "2024-10-17T17:33:37Z",
"pushed_at": "2024-10-17T05:12:29Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 11,
"forks": 1,
"watchers": 13,
"score": 0,
"subscribers_count": 0
}

View file

@ -4991,6 +4991,13 @@
- [nidhihcl75/frameworks_av_AOSP10_r33_CVE-2024-40658](https://github.com/nidhihcl75/frameworks_av_AOSP10_r33_CVE-2024-40658)
### CVE-2024-40662 (2024-09-11)
<code>In scheme of Uri.java, there is a possible way to craft a malformed Uri object due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
</code>
- [Aakashmom/net_G2.5_CVE-2024-40662](https://github.com/Aakashmom/net_G2.5_CVE-2024-40662)
### CVE-2024-40673
- [Aakashmom/G3_libcore_native_CVE-2024-40673](https://github.com/Aakashmom/G3_libcore_native_CVE-2024-40673)
@ -5450,6 +5457,7 @@
- [gumerzzzindo/CVE-2024-47176](https://github.com/gumerzzzindo/CVE-2024-47176)
- [MalwareTech/CVE-2024-47176-Scanner](https://github.com/MalwareTech/CVE-2024-47176-Scanner)
- [AxthonyV/CVE-2024-47176](https://github.com/AxthonyV/CVE-2024-47176)
- [gianlu335/CUPS-CVE-2024-47176](https://github.com/gianlu335/CUPS-CVE-2024-47176)
### CVE-2024-47177
- [referefref/cupspot-2024-47177](https://github.com/referefref/cupspot-2024-47177)
@ -7507,6 +7515,13 @@
- [emad-almousa/CVE-2023-22074](https://github.com/emad-almousa/CVE-2023-22074)
### CVE-2023-22098 (2023-10-17)
<code>Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: Only applicable to 7.0.x platform. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
</code>
- [Diego-AltF4/CVE-2023-22098](https://github.com/Diego-AltF4/CVE-2023-22098)
### CVE-2023-22432 (2023-03-05)
<code>Open redirect vulnerability exists in web2py versions prior to 2.23.1. When using the tool, a web2py user may be redirected to an arbitrary website by accessing a specially crafted URL. As a result, the user may become a victim of a phishing attack.
@ -10793,6 +10808,7 @@
- [classic130/CVE-2023-38408](https://github.com/classic130/CVE-2023-38408)
- [wxrdnx/CVE-2023-38408](https://github.com/wxrdnx/CVE-2023-38408)
- [mrtacojr/CVE-2023-38408](https://github.com/mrtacojr/CVE-2023-38408)
- [fazilbaig1/cve_2023_38408_scanner](https://github.com/fazilbaig1/cve_2023_38408_scanner)
### CVE-2023-38434 (2023-07-18)