Auto Update 2024/04/24 00:34:30

This commit is contained in:
motikan2010-bot 2024-04-24 09:34:30 +09:00
parent 088444ef3c
commit 2a5c875427
22 changed files with 170 additions and 104 deletions

View file

@ -43,10 +43,10 @@
"description": "CVE-2018-8174_python",
"fork": false,
"created_at": "2018-05-30T03:12:32Z",
"updated_at": "2023-11-25T06:08:01Z",
"updated_at": "2024-04-23T19:59:36Z",
"pushed_at": "2022-04-19T13:24:53Z",
"stargazers_count": 141,
"watchers_count": 141,
"stargazers_count": 140,
"watchers_count": 140,
"has_discussions": false,
"forks_count": 70,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 70,
"watchers": 141,
"watchers": 140,
"score": 0,
"subscribers_count": 2
},

View file

@ -1691,10 +1691,10 @@
"description": "Only Hitting PoC [Tested on Windows Server 2008 r2]",
"fork": false,
"created_at": "2019-05-28T02:25:21Z",
"updated_at": "2024-04-12T11:32:24Z",
"updated_at": "2024-04-23T19:59:37Z",
"pushed_at": "2019-05-28T02:46:19Z",
"stargazers_count": 128,
"watchers_count": 128,
"stargazers_count": 127,
"watchers_count": 127,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -1703,7 +1703,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 128,
"watchers": 127,
"score": 0,
"subscribers_count": 10
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 9,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 7,
"watchers": 45,
"score": 0,
"subscribers_count": 5

View file

@ -43,10 +43,10 @@
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
"updated_at": "2024-04-15T17:24:49Z",
"updated_at": "2024-04-23T18:47:26Z",
"pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 229,
"watchers_count": 229,
"stargazers_count": 230,
"watchers_count": 230,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 229,
"watchers": 230,
"score": 0,
"subscribers_count": 6
},

View file

@ -10653,7 +10653,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 447404470,

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-12-23T10:41:44Z",
"updated_at": "2023-03-10T01:13:38Z",
"pushed_at": "2024-04-20T08:44:47Z",
"pushed_at": "2024-04-23T23:39:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -44,7 +44,7 @@
"fork": false,
"created_at": "2022-12-23T12:33:21Z",
"updated_at": "2023-03-10T01:15:25Z",
"pushed_at": "2024-04-19T08:47:18Z",
"pushed_at": "2024-04-23T23:58:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2024-04-21T17:39:05Z",
"updated_at": "2024-04-23T13:52:33Z",
"pushed_at": "2024-04-23T13:52:30Z",
"updated_at": "2024-04-23T18:57:44Z",
"pushed_at": "2024-04-23T18:57:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
"fork": false,
"created_at": "2023-06-28T13:22:26Z",
"updated_at": "2024-04-17T04:49:09Z",
"updated_at": "2024-04-23T20:02:01Z",
"pushed_at": "2023-07-28T13:20:45Z",
"stargazers_count": 452,
"watchers_count": 452,
"stargazers_count": 453,
"watchers_count": 453,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 452,
"watchers": 453,
"score": 0,
"subscribers_count": 15
}

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-04-23T06:08:08Z",
"updated_at": "2024-04-23T20:32:29Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 1875,
"watchers_count": 1875,
"stargazers_count": 1876,
"watchers_count": 1876,
"has_discussions": false,
"forks_count": 231,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 231,
"watchers": 1875,
"watchers": 1876,
"score": 0,
"subscribers_count": 19
},

View file

@ -13,10 +13,10 @@
"description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.",
"fork": false,
"created_at": "2024-04-12T15:07:42Z",
"updated_at": "2024-04-23T17:12:24Z",
"updated_at": "2024-04-23T19:51:09Z",
"pushed_at": "2024-04-18T14:31:34Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 30,
"watchers": 31,
"score": 0,
"subscribers_count": 5
}

View file

@ -13,19 +13,19 @@
"description": "Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability",
"fork": false,
"created_at": "2024-04-22T07:05:04Z",
"updated_at": "2024-04-23T18:29:42Z",
"updated_at": "2024-04-23T23:41:53Z",
"pushed_at": "2024-04-22T10:08:45Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 115,
"watchers_count": 115,
"has_discussions": false,
"forks_count": 15,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 111,
"forks": 17,
"watchers": 115,
"score": 0,
"subscribers_count": 1
}

View file

@ -58,5 +58,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 790920623,
"name": "CVE-2024-21338",
"full_name": "varwara\/CVE-2024-21338",
"owner": {
"login": "varwara",
"id": 167913816,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167913816?v=4",
"html_url": "https:\/\/github.com\/varwara"
},
"html_url": "https:\/\/github.com\/varwara\/CVE-2024-21338",
"description": "PoC for the Untrusted Pointer Dereference in the appid.sys driver",
"fork": false,
"created_at": "2024-04-23T19:09:22Z",
"updated_at": "2024-04-23T19:13:56Z",
"pushed_at": "2024-04-23T19:13:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC",
"fork": false,
"created_at": "2024-02-15T19:57:38Z",
"updated_at": "2024-04-21T00:11:20Z",
"updated_at": "2024-04-23T21:16:13Z",
"pushed_at": "2024-02-17T07:08:49Z",
"stargazers_count": 140,
"watchers_count": 140,
"stargazers_count": 141,
"watchers_count": 141,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 140,
"watchers": 141,
"score": 0,
"subscribers_count": 4
},

View file

@ -133,10 +133,10 @@
"description": "The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.",
"fork": false,
"created_at": "2024-03-17T09:15:22Z",
"updated_at": "2024-04-16T02:02:41Z",
"updated_at": "2024-04-23T19:36:39Z",
"pushed_at": "2024-03-17T09:20:35Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -214,36 +214,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 789406252,
"name": "cve-2024-24576-python",
"full_name": "p14t1num\/cve-2024-24576-python",
"owner": {
"login": "p14t1num",
"id": 163240981,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/163240981?v=4",
"html_url": "https:\/\/github.com\/p14t1num"
},
"html_url": "https:\/\/github.com\/p14t1num\/cve-2024-24576-python",
"description": "a python proof of concept for cve-2024-24576",
"fork": false,
"created_at": "2024-04-20T13:07:54Z",
"updated_at": "2024-04-20T13:22:46Z",
"pushed_at": "2024-04-20T13:14:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 789510981,
"name": "CVE-2024-24576-PoC-Rust",

32
2024/CVE-2024-25277.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 763137888,
"name": "CVE-2024-25277",
"full_name": "maen08\/CVE-2024-25277",
"owner": {
"login": "maen08",
"id": 48031010,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48031010?v=4",
"html_url": "https:\/\/github.com\/maen08"
},
"html_url": "https:\/\/github.com\/maen08\/CVE-2024-25277",
"description": "Resources and PoCs",
"fork": false,
"created_at": "2024-02-25T16:54:33Z",
"updated_at": "2024-04-23T19:11:25Z",
"pushed_at": "2024-04-23T19:11:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -279,8 +279,8 @@
"description": "CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information",
"fork": false,
"created_at": "2024-04-22T22:14:24Z",
"updated_at": "2024-04-23T16:10:59Z",
"pushed_at": "2024-04-23T16:10:56Z",
"updated_at": "2024-04-23T20:07:44Z",
"pushed_at": "2024-04-23T20:07:41Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,

View file

@ -13,7 +13,7 @@
"description": "WallEscape vulnerability in util-linux",
"fork": false,
"created_at": "2024-03-11T00:15:03Z",
"updated_at": "2024-04-23T11:47:49Z",
"updated_at": "2024-04-23T19:58:26Z",
"pushed_at": "2024-03-30T01:32:02Z",
"stargazers_count": 46,
"watchers_count": 46,

View file

@ -493,10 +493,10 @@
"description": "An ssh honeypot with the XZ backdoor. CVE-2024-3094",
"fork": false,
"created_at": "2024-03-30T22:07:24Z",
"updated_at": "2024-04-21T17:07:55Z",
"updated_at": "2024-04-23T20:42:52Z",
"pushed_at": "2024-04-02T03:38:32Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 132,
"watchers_count": 132,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -510,7 +510,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 131,
"watchers": 132,
"score": 0,
"subscribers_count": 8
},
@ -1012,10 +1012,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-04-23T13:32:44Z",
"updated_at": "2024-04-23T22:41:39Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3417,
"watchers_count": 3417,
"stargazers_count": 3421,
"watchers_count": 3421,
"has_discussions": false,
"forks_count": 228,
"allow_forking": true,
@ -1024,7 +1024,7 @@
"topics": [],
"visibility": "public",
"forks": 228,
"watchers": 3417,
"watchers": 3421,
"score": 0,
"subscribers_count": 36
},

View file

@ -283,10 +283,10 @@
"description": "CVE-2024-3400 Palo Alto OS Command Injection",
"fork": false,
"created_at": "2024-04-16T14:18:08Z",
"updated_at": "2024-04-23T17:24:38Z",
"updated_at": "2024-04-23T18:36:25Z",
"pushed_at": "2024-04-16T22:35:43Z",
"stargazers_count": 114,
"watchers_count": 114,
"stargazers_count": 115,
"watchers_count": 115,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -295,7 +295,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 114,
"watchers": 115,
"score": 0,
"subscribers_count": 1
},
@ -313,10 +313,10 @@
"description": "CVE-2024-3400-RCE",
"fork": false,
"created_at": "2024-04-16T16:18:56Z",
"updated_at": "2024-04-23T18:18:00Z",
"updated_at": "2024-04-23T23:35:06Z",
"pushed_at": "2024-04-22T08:50:27Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -325,7 +325,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 36,
"watchers": 37,
"score": 0,
"subscribers_count": 3
},
@ -493,10 +493,10 @@
"description": "Global Protec Palo Alto File Write Exploit",
"fork": false,
"created_at": "2024-04-17T16:01:20Z",
"updated_at": "2024-04-19T01:42:25Z",
"updated_at": "2024-04-23T21:08:01Z",
"pushed_at": "2024-04-17T19:46:15Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -505,7 +505,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Scanner for CVE-2024-4040",
"fork": false,
"created_at": "2024-04-23T09:31:29Z",
"updated_at": "2024-04-23T16:07:32Z",
"updated_at": "2024-04-23T23:53:17Z",
"pushed_at": "2024-04-23T09:45:57Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,37 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 14,
"watchers": 18,
"score": 0,
"subscribers_count": 0
},
{
"id": 791002416,
"name": "CVE-2024-4040-RCE-POC",
"full_name": "tr4c3rs\/CVE-2024-4040-RCE-POC",
"owner": {
"login": "tr4c3rs",
"id": 167206794,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167206794?v=4",
"html_url": "https:\/\/github.com\/tr4c3rs"
},
"html_url": "https:\/\/github.com\/tr4c3rs\/CVE-2024-4040-RCE-POC",
"description": "CVE-2024-4040 (CrushFTP VFS escape) or (CrushFTP unauthenticated RCE)",
"fork": false,
"created_at": "2024-04-23T23:16:36Z",
"updated_at": "2024-04-23T23:26:37Z",
"pushed_at": "2024-04-23T23:26:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}

View file

@ -406,10 +406,11 @@
### CVE-2024-4040 (2024-04-22)
<code>VFS Sandbox Escape in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox.\n
<code>A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.\n
</code>
- [airbus-cert/CVE-2024-4040](https://github.com/airbus-cert/CVE-2024-4040)
- [tr4c3rs/CVE-2024-4040-RCE-POC](https://github.com/tr4c3rs/CVE-2024-4040-RCE-POC)
### CVE-2024-12883
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
@ -508,6 +509,7 @@
- [hakaioffsec/CVE-2024-21338](https://github.com/hakaioffsec/CVE-2024-21338)
- [UMU618/CVE-2024-21338](https://github.com/UMU618/CVE-2024-21338)
- [varwara/CVE-2024-21338](https://github.com/varwara/CVE-2024-21338)
### CVE-2024-21378 (2024-02-13)
@ -1039,7 +1041,6 @@
- [corysabol/batbadbut-demo](https://github.com/corysabol/batbadbut-demo)
- [mishalhossin/CVE-2024-24576-PoC-Python](https://github.com/mishalhossin/CVE-2024-24576-PoC-Python)
- [lpn/CVE-2024-24576.jl](https://github.com/lpn/CVE-2024-24576.jl)
- [p14t1num/cve-2024-24576-python](https://github.com/p14t1num/cve-2024-24576-python)
- [Gaurav1020/CVE-2024-24576-PoC-Rust](https://github.com/Gaurav1020/CVE-2024-24576-PoC-Rust)
- [SheL3G/CVE-2024-24576-PoC-BatBadBut](https://github.com/SheL3G/CVE-2024-24576-PoC-BatBadBut)
@ -1114,6 +1115,9 @@
### CVE-2024-25270
- [fbkcs/CVE-2024-25270](https://github.com/fbkcs/CVE-2024-25270)
### CVE-2024-25277
- [maen08/CVE-2024-25277](https://github.com/maen08/CVE-2024-25277)
### CVE-2024-25278
- [sajaljat/CVE-2024-25278](https://github.com/sajaljat/CVE-2024-25278)