Auto Update 2024/02/13 06:26:09

This commit is contained in:
motikan2010-bot 2024-02-13 15:26:09 +09:00
parent c59e2a3e54
commit 1d17cf1163
19 changed files with 60 additions and 119 deletions

View file

@ -13,10 +13,10 @@
"description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. ",
"fork": false,
"created_at": "2021-06-05T18:59:28Z",
"updated_at": "2024-02-11T09:53:02Z",
"updated_at": "2024-02-13T03:47:02Z",
"pushed_at": "2021-06-06T09:41:51Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 38,
"watchers": 37,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2024-02-08T03:33:56Z",
"updated_at": "2024-02-13T00:03:41Z",
"pushed_at": "2024-02-13T00:09:43Z",
"pushed_at": "2024-02-13T00:10:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -84,13 +84,13 @@
"stargazers_count": 1889,
"watchers_count": 1889,
"has_discussions": false,
"forks_count": 517,
"forks_count": 518,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 517,
"forks": 518,
"watchers": 1889,
"score": 0,
"subscribers_count": 21
@ -3601,36 +3601,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 467743719,
"name": "CVE-2021-4034-bug-root",
"full_name": "digiboxcc\/CVE-2021-4034-bug-root",
"owner": {
"login": "digiboxcc",
"id": 7570307,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7570307?v=4",
"html_url": "https:\/\/github.com\/digiboxcc"
},
"html_url": "https:\/\/github.com\/digiboxcc\/CVE-2021-4034-bug-root",
"description": null,
"fork": false,
"created_at": "2022-03-09T02:04:07Z",
"updated_at": "2022-03-09T02:04:19Z",
"pushed_at": "2022-03-09T02:04:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 467844609,
"name": "Polkit-s-Pkexec-CVE-2021-4034",
@ -3754,19 +3724,19 @@
{
"id": 470778554,
"name": "CVE-2021-4034",
"full_name": "OpenCVEs\/CVE-2021-4034",
"full_name": "azazelm3dj3d\/CVE-2021-4034",
"owner": {
"login": "OpenCVEs",
"id": 159454354,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/159454354?v=4",
"html_url": "https:\/\/github.com\/OpenCVEs"
"login": "azazelm3dj3d",
"id": 56496067,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56496067?v=4",
"html_url": "https:\/\/github.com\/azazelm3dj3d"
},
"html_url": "https:\/\/github.com\/OpenCVEs\/CVE-2021-4034",
"html_url": "https:\/\/github.com\/azazelm3dj3d\/CVE-2021-4034",
"description": "CVE-2021-4034",
"fork": false,
"created_at": "2022-03-16T23:05:53Z",
"updated_at": "2024-02-08T15:42:59Z",
"pushed_at": "2024-02-08T15:39:03Z",
"updated_at": "2024-02-13T04:47:37Z",
"pushed_at": "2024-02-13T04:46:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -228,13 +228,13 @@
"stargazers_count": 1515,
"watchers_count": 1515,
"has_discussions": false,
"forks_count": 493,
"forks_count": 494,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 493,
"forks": 494,
"watchers": 1515,
"score": 0,
"subscribers_count": 28

View file

@ -3562,40 +3562,5 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 754696322,
"name": "CVE-2021-41773",
"full_name": "OpenCVEs\/CVE-2021-41773",
"owner": {
"login": "OpenCVEs",
"id": 159454354,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/159454354?v=4",
"html_url": "https:\/\/github.com\/OpenCVEs"
},
"html_url": "https:\/\/github.com\/OpenCVEs\/CVE-2021-41773",
"description": "CVE-2021-41773, CVE-2021-42013",
"fork": false,
"created_at": "2024-02-08T15:41:43Z",
"updated_at": "2024-02-08T16:00:54Z",
"pushed_at": "2024-02-08T16:05:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2021-41773",
"cve-2021-42013",
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-02-12T22:40:44Z",
"updated_at": "2024-02-13T01:50:11Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1698,
"watchers_count": 1698,
"stargazers_count": 1699,
"watchers_count": 1699,
"has_discussions": false,
"forks_count": 503,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 503,
"watchers": 1698,
"watchers": 1699,
"score": 0,
"subscribers_count": 27
},

View file

@ -13,10 +13,10 @@
"description": "Let's control Secure Boot Chain ourselves.",
"fork": false,
"created_at": "2023-12-01T07:32:18Z",
"updated_at": "2024-02-10T11:56:08Z",
"updated_at": "2024-02-13T05:53:56Z",
"pushed_at": "2024-01-25T01:35:44Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-02-12T06:44:21Z",
"updated_at": "2024-02-13T05:53:57Z",
"pushed_at": "2024-02-11T02:51:34Z",
"stargazers_count": 162,
"watchers_count": 162,
"stargazers_count": 163,
"watchers_count": 163,
"has_discussions": true,
"forks_count": 22,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 162,
"watchers": 163,
"score": 0,
"subscribers_count": 7
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 55,
"score": 0,
"subscribers_count": 2

View file

@ -73,10 +73,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2024-02-11T17:41:17Z",
"updated_at": "2024-02-13T05:14:18Z",
"pushed_at": "2023-08-02T09:35:14Z",
"stargazers_count": 866,
"watchers_count": 866,
"stargazers_count": 868,
"watchers_count": 868,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 866,
"watchers": 868,
"score": 0,
"subscribers_count": 25
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-20963 PoC (Android WorkSource parcel\/unparcel logic mismatch)",
"fork": false,
"created_at": "2023-06-12T10:44:59Z",
"updated_at": "2024-02-09T10:25:25Z",
"updated_at": "2024-02-13T05:58:53Z",
"pushed_at": "2023-07-27T08:58:10Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 1
},

View file

@ -73,10 +73,10 @@
"description": "POC for CVE-2023-24488",
"fork": false,
"created_at": "2023-07-04T18:02:50Z",
"updated_at": "2024-02-03T07:57:35Z",
"updated_at": "2024-02-13T05:17:08Z",
"pushed_at": "2023-07-04T18:39:03Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},

View file

@ -63,7 +63,7 @@
"forks": 1,
"watchers": 6,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 739947067,

View file

@ -27,7 +27,7 @@
"forks": 8,
"watchers": 21,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 743886715,

View file

@ -34,6 +34,6 @@
"forks": 4,
"watchers": 42,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -27,7 +27,7 @@
"forks": 5,
"watchers": 18,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 755420593,

View file

@ -27,6 +27,6 @@
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 3,
"watchers": 18,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
}
]

View file

@ -139,7 +139,11 @@
- [h4x0r-dz/CVE-2024-21893.py](https://github.com/h4x0r-dz/CVE-2024-21893.py)
- [Chocapikk/CVE-2024-21893-to-CVE-2024-21887](https://github.com/Chocapikk/CVE-2024-21893-to-CVE-2024-21887)
### CVE-2024-22024
### CVE-2024-22024 (-)
<code>An XML external entity or XXE vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x), Ivanti Policy Secure (9.x, 22.x) and ZTA gateways which allows an attacker to access certain restricted resources without authentication.
</code>
- [0dteam/CVE-2024-22024](https://github.com/0dteam/CVE-2024-22024)
- [labesterOct/CVE-2024-22024](https://github.com/labesterOct/CVE-2024-22024)
@ -6907,7 +6911,11 @@
- [louiselalanne/CVE-2023-49314](https://github.com/louiselalanne/CVE-2023-49314)
### CVE-2023-49339
### CVE-2023-49339 (-)
<code>Ellucian Banner 9.17 allows Insecure Direct Object Reference (IDOR) via a modified bannerId to the /StudentSelfService/ssb/studentCard/retrieveData endpoint.
</code>
- [3zizme/CVE-2023-49339](https://github.com/3zizme/CVE-2023-49339)
### CVE-2023-49438 (2023-12-26)
@ -14864,12 +14872,11 @@
- [Squirre17/CVE-2021-4034](https://github.com/Squirre17/CVE-2021-4034)
- [Jesrat/make_me_root](https://github.com/Jesrat/make_me_root)
- [defhacks/cve-2021-4034](https://github.com/defhacks/cve-2021-4034)
- [digiboxcc/CVE-2021-4034-bug-root](https://github.com/digiboxcc/CVE-2021-4034-bug-root)
- [ITMarcin2211/Polkit-s-Pkexec-CVE-2021-4034](https://github.com/ITMarcin2211/Polkit-s-Pkexec-CVE-2021-4034)
- [edsonjt81/CVE-2021-4034-Linux](https://github.com/edsonjt81/CVE-2021-4034-Linux)
- [nel0x/pwnkit-vulnerability](https://github.com/nel0x/pwnkit-vulnerability)
- [TomSgn/CVE-2021-4034](https://github.com/TomSgn/CVE-2021-4034)
- [OpenCVEs/CVE-2021-4034](https://github.com/OpenCVEs/CVE-2021-4034)
- [azazelm3dj3d/CVE-2021-4034](https://github.com/azazelm3dj3d/CVE-2021-4034)
- [TheJoyOfHacking/berdav-CVE-2021-4034](https://github.com/TheJoyOfHacking/berdav-CVE-2021-4034)
- [tzwlhack/CVE-2021-4034](https://github.com/tzwlhack/CVE-2021-4034)
- [jcatala/f_poc_cve-2021-4034](https://github.com/jcatala/f_poc_cve-2021-4034)
@ -18585,7 +18592,6 @@
- [OfriOuzan/CVE-2021-41773_CVE-2021-42013_Exploits](https://github.com/OfriOuzan/CVE-2021-41773_CVE-2021-42013_Exploits)
- [belajarqywok/CVE-2021-41773-MSF](https://github.com/belajarqywok/CVE-2021-41773-MSF)
- [Iris288/CVE-2021-41773](https://github.com/Iris288/CVE-2021-41773)
- [OpenCVEs/CVE-2021-41773](https://github.com/OpenCVEs/CVE-2021-41773)
### CVE-2021-41784 (2022-08-29)