Auto Update 2024/08/18 18:29:10

This commit is contained in:
motikan2010-bot 2024-08-19 03:29:10 +09:00
parent f5aed05dba
commit 06e3aa51bf
28 changed files with 214 additions and 117 deletions

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "Local privilege escalation PoC exploit for CVE-2019-16098",
"fork": false,
"created_at": "2019-09-10T15:57:36Z",
"updated_at": "2024-08-16T13:41:36Z",
"updated_at": "2024-08-18T16:51:18Z",
"pushed_at": "2019-09-13T20:05:43Z",
"stargazers_count": 190,
"watchers_count": 190,
"stargazers_count": 191,
"watchers_count": 191,
"has_discussions": false,
"forks_count": 61,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 61,
"watchers": 190,
"watchers": 191,
"score": 0,
"subscribers_count": 4
},

View file

@ -3636,10 +3636,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2024-08-16T09:59:13Z",
"updated_at": "2024-08-18T13:45:10Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3393,
"watchers_count": 3393,
"stargazers_count": 3394,
"watchers_count": 3394,
"has_discussions": true,
"forks_count": 740,
"allow_forking": true,
@ -3648,7 +3648,7 @@
"topics": [],
"visibility": "public",
"forks": 740,
"watchers": 3393,
"watchers": 3394,
"score": 0,
"subscribers_count": 57
},
@ -6030,10 +6030,10 @@
"description": "Tools for remediating the recent log4j2 RCE vulnerability (CVE-2021-44228)",
"fork": false,
"created_at": "2021-12-14T21:47:04Z",
"updated_at": "2024-04-16T04:41:12Z",
"updated_at": "2024-08-18T16:13:22Z",
"pushed_at": "2023-03-21T09:51:33Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -6046,7 +6046,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 42,
"watchers": 41,
"score": 0,
"subscribers_count": 9
},

View file

@ -103,10 +103,10 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2024-08-12T20:58:55Z",
"updated_at": "2024-08-18T14:34:56Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 1081,
"watchers_count": 1081,
"stargazers_count": 1082,
"watchers_count": 1082,
"has_discussions": false,
"forks_count": 220,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 220,
"watchers": 1081,
"watchers": 1082,
"score": 0,
"subscribers_count": 17
},

View file

@ -28,5 +28,35 @@
"watchers": 21,
"score": 0,
"subscribers_count": 2
},
{
"id": 844114285,
"name": "CVE-2022-24834-",
"full_name": "DukeSec97\/CVE-2022-24834-",
"owner": {
"login": "DukeSec97",
"id": 59002589,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59002589?v=4",
"html_url": "https:\/\/github.com\/DukeSec97"
},
"html_url": "https:\/\/github.com\/DukeSec97\/CVE-2022-24834-",
"description": null,
"fork": false,
"created_at": "2024-08-18T12:33:36Z",
"updated_at": "2024-08-18T12:39:19Z",
"pushed_at": "2024-08-18T12:39:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -88,35 +88,5 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 818735736,
"name": "SolarView-Compact-6.00-Command-Injection-Exploit-CVE-2023-23333-",
"full_name": "binaryusergearone\/SolarView-Compact-6.00-Command-Injection-Exploit-CVE-2023-23333-",
"owner": {
"login": "binaryusergearone",
"id": 125667320,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125667320?v=4",
"html_url": "https:\/\/github.com\/binaryusergearone"
},
"html_url": "https:\/\/github.com\/binaryusergearone\/SolarView-Compact-6.00-Command-Injection-Exploit-CVE-2023-23333-",
"description": null,
"fork": false,
"created_at": "2024-06-22T17:54:50Z",
"updated_at": "2024-06-22T18:05:03Z",
"pushed_at": "2024-06-22T18:04:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "WonderCMS Authenticated RCE - CVE-2023-41425",
"fork": false,
"created_at": "2023-11-05T15:06:43Z",
"updated_at": "2024-08-15T12:57:35Z",
"updated_at": "2024-08-18T18:29:48Z",
"pushed_at": "2023-11-06T18:56:53Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 9,
"score": 0,
"subscribers_count": 1

View file

@ -73,10 +73,10 @@
"description": "A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.",
"fork": false,
"created_at": "2024-01-16T20:59:38Z",
"updated_at": "2024-08-12T10:38:27Z",
"updated_at": "2024-08-18T17:06:49Z",
"pushed_at": "2024-01-17T00:38:28Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 50,
"watchers": 49,
"score": 0,
"subscribers_count": 2
},

View file

@ -80,12 +80,12 @@
"description": "PoC - Authenticated Remote Code Execution in VMware vCenter Server (Exploit)",
"fork": false,
"created_at": "2024-07-15T07:26:59Z",
"updated_at": "2024-08-18T09:25:54Z",
"updated_at": "2024-08-18T13:17:38Z",
"pushed_at": "2024-07-16T23:22:14Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -102,8 +102,8 @@
"vulnerability"
],
"visibility": "public",
"forks": 6,
"watchers": 37,
"forks": 7,
"watchers": 38,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection",
"fork": false,
"created_at": "2024-05-20T14:34:09Z",
"updated_at": "2024-07-29T03:21:00Z",
"updated_at": "2024-08-18T15:55:57Z",
"pushed_at": "2024-05-21T11:56:19Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 30,
"watchers": 31,
"score": 0,
"subscribers_count": 4
},

View file

@ -595,13 +595,13 @@
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 9,
"score": 0,
"subscribers_count": 1

View file

@ -76,10 +76,10 @@
"description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4",
"fork": false,
"created_at": "2024-03-06T03:15:03Z",
"updated_at": "2024-08-13T02:04:20Z",
"updated_at": "2024-08-18T17:32:09Z",
"pushed_at": "2024-03-11T07:57:40Z",
"stargazers_count": 130,
"watchers_count": 130,
"stargazers_count": 131,
"watchers_count": 131,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -98,7 +98,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 130,
"watchers": 131,
"score": 0,
"subscribers_count": 3
},

View file

@ -73,10 +73,10 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2024-08-09T11:34:12Z",
"updated_at": "2024-08-18T16:15:58Z",
"pushed_at": "2024-07-29T12:20:50Z",
"stargazers_count": 349,
"watchers_count": 349,
"stargazers_count": 350,
"watchers_count": 350,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 349,
"watchers": 350,
"score": 0,
"subscribers_count": 7
},

View file

@ -982,10 +982,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-08-16T07:57:19Z",
"updated_at": "2024-08-18T15:56:03Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3483,
"watchers_count": 3483,
"stargazers_count": 3484,
"watchers_count": 3484,
"has_discussions": false,
"forks_count": 233,
"allow_forking": true,
@ -994,7 +994,7 @@
"topics": [],
"visibility": "public",
"forks": 233,
"watchers": 3483,
"watchers": 3484,
"score": 0,
"subscribers_count": 39
},

View file

@ -240,7 +240,7 @@
"stargazers_count": 97,
"watchers_count": 97,
"has_discussions": false,
"forks_count": 22,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -250,7 +250,7 @@
"rce"
],
"visibility": "public",
"forks": 22,
"forks": 21,
"watchers": 97,
"score": 0,
"subscribers_count": 3

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-32640 | Automated SQLi Exploitation PoC",
"fork": false,
"created_at": "2024-05-16T01:02:32Z",
"updated_at": "2024-08-16T08:36:14Z",
"updated_at": "2024-08-18T17:23:33Z",
"pushed_at": "2024-05-16T21:07:32Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 58,
"watchers": 59,
"score": 0,
"subscribers_count": 1
},

32
2024/CVE-2024-35538.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 844197058,
"name": "Typecho-Multiple-Vulnerabilities",
"full_name": "cyberaz0r\/Typecho-Multiple-Vulnerabilities",
"owner": {
"login": "cyberaz0r",
"id": 35109470,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35109470?v=4",
"html_url": "https:\/\/github.com\/cyberaz0r"
},
"html_url": "https:\/\/github.com\/cyberaz0r\/Typecho-Multiple-Vulnerabilities",
"description": "Exploits for Typecho CVE-2024-35538, CVE-2024-35539 and CVE-2024-35540",
"fork": false,
"created_at": "2024-08-18T17:09:05Z",
"updated_at": "2024-08-18T17:10:37Z",
"pushed_at": "2024-08-18T17:10:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-07-09T19:44:40Z",
"updated_at": "2024-07-30T02:28:42Z",
"updated_at": "2024-08-18T15:32:52Z",
"pushed_at": "2024-07-09T20:21:22Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -88,5 +88,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 844208301,
"name": "CVE-2024-37085",
"full_name": "WTN-arny\/CVE-2024-37085",
"owner": {
"login": "WTN-arny",
"id": 178199794,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/178199794?v=4",
"html_url": "https:\/\/github.com\/WTN-arny"
},
"html_url": "https:\/\/github.com\/WTN-arny\/CVE-2024-37085",
"description": null,
"fork": false,
"created_at": "2024-08-18T17:48:34Z",
"updated_at": "2024-08-18T17:49:21Z",
"pushed_at": "2024-08-18T17:49:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -73,7 +73,7 @@
"description": "CVE-2024-38063 PoC. CVE-2024-38063 Demo",
"fork": false,
"created_at": "2024-08-17T06:35:10Z",
"updated_at": "2024-08-18T07:10:52Z",
"updated_at": "2024-08-18T16:56:39Z",
"pushed_at": "2024-08-18T07:10:49Z",
"stargazers_count": 0,
"watchers_count": 0,
@ -103,19 +103,19 @@
"description": "Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.",
"fork": false,
"created_at": "2024-08-17T14:58:36Z",
"updated_at": "2024-08-18T12:04:25Z",
"updated_at": "2024-08-18T16:54:40Z",
"pushed_at": "2024-08-17T15:12:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -133,10 +133,10 @@
"description": "CVE-2024-38077本仓库仅用作备份",
"fork": false,
"created_at": "2024-08-09T07:46:09Z",
"updated_at": "2024-08-15T07:40:05Z",
"updated_at": "2024-08-18T17:48:39Z",
"pushed_at": "2024-08-09T07:45:58Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 0
},

View file

@ -13,10 +13,10 @@
"description": "Proof of Concept code for exploitation of CVE-2024-38793 (Best Restaurant Menu by PriceListo <= 1.4.1 - Authenticated (Contributor+) SQL Injection)",
"fork": false,
"created_at": "2024-08-18T10:26:23Z",
"updated_at": "2024-08-18T10:38:51Z",
"updated_at": "2024-08-18T18:09:55Z",
"pushed_at": "2024-08-18T10:38:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -66,5 +66,35 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 844163753,
"name": "CVE-2024-38856-ApacheOfBiz",
"full_name": "Praison001\/CVE-2024-38856-ApacheOfBiz",
"owner": {
"login": "Praison001",
"id": 60835238,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4",
"html_url": "https:\/\/github.com\/Praison001"
},
"html_url": "https:\/\/github.com\/Praison001\/CVE-2024-38856-ApacheOfBiz",
"description": "Exploit for CVE-2024-38856 affecting Apache OFBiz versions before 18.12.15",
"fork": false,
"created_at": "2024-08-18T15:19:58Z",
"updated_at": "2024-08-18T15:27:43Z",
"pushed_at": "2024-08-18T15:27:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -228,13 +228,13 @@
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 2,
"watchers": 17,
"score": 0,
"subscribers_count": 1

View file

@ -13,8 +13,8 @@
"description": "This is a python written PoC of a recent vulnerability in a wordpress plugin. More information on that here",
"fork": false,
"created_at": "2024-07-21T04:59:31Z",
"updated_at": "2024-08-06T23:54:03Z",
"pushed_at": "2024-08-06T23:54:00Z",
"updated_at": "2024-08-18T18:15:10Z",
"pushed_at": "2024-08-18T18:15:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -2233,19 +2233,19 @@
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
"fork": false,
"created_at": "2024-07-08T11:27:49Z",
"updated_at": "2024-08-17T23:30:09Z",
"updated_at": "2024-08-18T18:23:13Z",
"pushed_at": "2024-08-14T07:15:57Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 10,
"forks": 8,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},

View file

@ -3609,6 +3609,9 @@
- [efekaanakkar/CVE-2024-35511](https://github.com/efekaanakkar/CVE-2024-35511)
### CVE-2024-35538
- [cyberaz0r/Typecho-Multiple-Vulnerabilities](https://github.com/cyberaz0r/Typecho-Multiple-Vulnerabilities)
### CVE-2024-36079 (-)
<code>An issue was discovered in Vaultize 21.07.27. When uploading files, there is no check that the filename parameter is correct. As a result, a temporary file will be created outside the specified directory when the file is downloaded. To exploit this, an authenticated user would upload a file with an incorrect file name, and then download it.
@ -3736,6 +3739,7 @@
- [mahmutaymahmutay/CVE-2024-37085](https://github.com/mahmutaymahmutay/CVE-2024-37085)
- [Florian-Hoth/CVE-2024-37085-RCE-POC](https://github.com/Florian-Hoth/CVE-2024-37085-RCE-POC)
- [WTN-arny/Vmware-ESXI](https://github.com/WTN-arny/Vmware-ESXI)
- [WTN-arny/CVE-2024-37085](https://github.com/WTN-arny/CVE-2024-37085)
### CVE-2024-37147 (2024-07-10)
@ -3931,6 +3935,7 @@
- [securelayer7/CVE-2024-38856_Scanner](https://github.com/securelayer7/CVE-2024-38856_Scanner)
- [ThatNotEasy/CVE-2024-38856](https://github.com/ThatNotEasy/CVE-2024-38856)
- [Praison001/CVE-2024-38856-ApacheOfBiz](https://github.com/Praison001/CVE-2024-38856-ApacheOfBiz)
### CVE-2024-39031 (2024-07-09)
@ -6449,7 +6454,6 @@
- [Timorlover/CVE-2023-23333](https://github.com/Timorlover/CVE-2023-23333)
- [Mr-xn/CVE-2023-23333](https://github.com/Mr-xn/CVE-2023-23333)
- [emanueldosreis/nmap-CVE-2023-23333-exploit](https://github.com/emanueldosreis/nmap-CVE-2023-23333-exploit)
- [binaryusergearone/SolarView-Compact-6.00-Command-Injection-Exploit-CVE-2023-23333-](https://github.com/binaryusergearone/SolarView-Compact-6.00-Command-Injection-Exploit-CVE-2023-23333-)
### CVE-2023-23388 (2023-03-14)
@ -14820,6 +14824,7 @@
</code>
- [convisolabs/CVE-2022-24834](https://github.com/convisolabs/CVE-2022-24834)
- [DukeSec97/CVE-2022-24834-](https://github.com/DukeSec97/CVE-2022-24834-)
### CVE-2022-24853 (2022-04-14)