Auto Update 2024/11/02 00:30:45

This commit is contained in:
motikan2010-bot 2024-11-02 09:30:45 +09:00
parent bead9a00fb
commit 3106121fef
19 changed files with 155 additions and 148 deletions

View file

@ -29,5 +29,36 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 882060206,
"name": "CVE-2014-0195",
"full_name": "PezwariNaan\/CVE-2014-0195",
"owner": {
"login": "PezwariNaan",
"id": 154484065,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154484065?v=4",
"html_url": "https:\/\/github.com\/PezwariNaan",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/PezwariNaan\/CVE-2014-0195",
"description": "Exploit for CVE-2014-0195",
"fork": false,
"created_at": "2024-11-01T19:46:11Z",
"updated_at": "2024-11-01T19:48:58Z",
"pushed_at": "2024-11-01T19:48:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -174,13 +174,13 @@
"stargazers_count": 136,
"watchers_count": 136,
"has_discussions": false,
"forks_count": 27,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 27,
"forks": 26,
"watchers": 136,
"score": 0,
"subscribers_count": 4

View file

@ -59,7 +59,7 @@
"forks": 583,
"watchers": 1837,
"score": 0,
"subscribers_count": 44
"subscribers_count": 43
},
{
"id": 381799016,

View file

@ -59,6 +59,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -231,10 +231,10 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2024-10-30T00:13:00Z",
"updated_at": "2024-11-01T20:51:33Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1590,
"watchers_count": 1590,
"stargazers_count": 1591,
"watchers_count": 1591,
"has_discussions": false,
"forks_count": 483,
"allow_forking": true,
@ -243,7 +243,7 @@
"topics": [],
"visibility": "public",
"forks": 483,
"watchers": 1590,
"watchers": 1591,
"score": 0,
"subscribers_count": 28
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
"fork": false,
"created_at": "2023-06-28T13:22:26Z",
"updated_at": "2024-10-23T04:37:14Z",
"updated_at": "2024-11-01T18:27:32Z",
"pushed_at": "2023-07-28T13:20:45Z",
"stargazers_count": 464,
"watchers_count": 464,
"stargazers_count": 465,
"watchers_count": 465,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 464,
"watchers": 465,
"score": 0,
"subscribers_count": 15
}

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-10-31T21:55:04Z",
"updated_at": "2024-11-01T22:59:05Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1242,
"watchers_count": 1242,
"stargazers_count": 1243,
"watchers_count": 1243,
"has_discussions": false,
"forks_count": 209,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 209,
"watchers": 1242,
"watchers": 1243,
"score": 0,
"subscribers_count": 20
},

View file

@ -231,10 +231,10 @@
"description": "CVE-2024-23113 是存在于某特定软件或系统中的一个安全漏洞,该漏洞允许恶意攻击者在特定条件下利用系统中的缺陷实现未经授权的行为。这种行为可能包括但不限于远程代码执行、访问敏感信息或以更高权限执行操作。",
"fork": false,
"created_at": "2024-10-27T17:39:00Z",
"updated_at": "2024-10-29T08:21:38Z",
"updated_at": "2024-11-01T23:01:44Z",
"pushed_at": "2024-10-29T08:21:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -248,7 +248,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -76,10 +76,10 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2024-10-31T16:43:24Z",
"updated_at": "2024-11-02T00:07:06Z",
"pushed_at": "2024-09-30T08:45:56Z",
"stargazers_count": 405,
"watchers_count": 405,
"stargazers_count": 406,
"watchers_count": 406,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 405,
"watchers": 406,
"score": 0,
"subscribers_count": 8
},

View file

@ -14,8 +14,8 @@
"description": null,
"fork": false,
"created_at": "2024-11-01T16:19:23Z",
"updated_at": "2024-11-01T17:38:59Z",
"pushed_at": "2024-11-01T17:38:56Z",
"updated_at": "2024-11-01T18:45:37Z",
"pushed_at": "2024-11-01T18:45:33Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's \"KartLANPwn\" buffer overflow vulnerability",
"fork": false,
"created_at": "2024-09-13T00:41:32Z",
"updated_at": "2024-10-14T04:16:05Z",
"updated_at": "2024-11-01T20:09:06Z",
"pushed_at": "2024-10-01T00:57:03Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 51,
"watchers": 52,
"score": 0,
"subscribers_count": 2
}

View file

@ -169,10 +169,10 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-11-01T11:02:29Z",
"updated_at": "2024-11-01T19:02:39Z",
"pushed_at": "2024-06-22T15:13:52Z",
"stargazers_count": 220,
"watchers_count": 220,
"stargazers_count": 221,
"watchers_count": 221,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 220,
"watchers": 221,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,8 +14,8 @@
"description": "CVE-2024-48217 Sismart Vulnerability",
"fork": false,
"created_at": "2024-11-01T04:44:17Z",
"updated_at": "2024-11-01T11:56:15Z",
"pushed_at": "2024-11-01T11:56:12Z",
"updated_at": "2024-11-01T20:25:02Z",
"pushed_at": "2024-11-01T20:24:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -1,33 +0,0 @@
[
{
"id": 880182218,
"name": "CVE-2024-48733",
"full_name": "ACN-CVEs\/CVE-2024-48733",
"owner": {
"login": "ACN-CVEs",
"id": 186320916,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186320916?v=4",
"html_url": "https:\/\/github.com\/ACN-CVEs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ACN-CVEs\/CVE-2024-48733",
"description": null,
"fork": false,
"created_at": "2024-10-29T09:16:00Z",
"updated_at": "2024-10-29T09:21:50Z",
"pushed_at": "2024-10-29T09:21:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 880185457,
"name": "CVE-2024-48734",
"full_name": "ACN-CVEs\/CVE-2024-48734",
"owner": {
"login": "ACN-CVEs",
"id": 186320916,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186320916?v=4",
"html_url": "https:\/\/github.com\/ACN-CVEs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ACN-CVEs\/CVE-2024-48734",
"description": null,
"fork": false,
"created_at": "2024-10-29T09:22:54Z",
"updated_at": "2024-10-29T09:23:37Z",
"pushed_at": "2024-10-29T09:23:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 880186162,
"name": "CVE-2024-48735",
"full_name": "ACN-CVEs\/CVE-2024-48735",
"owner": {
"login": "ACN-CVEs",
"id": 186320916,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186320916?v=4",
"html_url": "https:\/\/github.com\/ACN-CVEs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ACN-CVEs\/CVE-2024-48735",
"description": null,
"fork": false,
"created_at": "2024-10-29T09:24:27Z",
"updated_at": "2024-10-29T09:25:07Z",
"pushed_at": "2024-10-29T09:25:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "Exploit for CVE-2024-4885",
"fork": false,
"created_at": "2024-07-08T12:14:42Z",
"updated_at": "2024-10-12T16:14:42Z",
"updated_at": "2024-11-01T19:09:45Z",
"pushed_at": "2024-07-08T12:15:00Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 1
}

79
2024/CVE-2024-9926.json Normal file
View file

@ -0,0 +1,79 @@
[
{
"id": 877508313,
"name": "wordpress-jetpack-broken-access-control-vulnerable-application",
"full_name": "m3ssap0\/wordpress-jetpack-broken-access-control-vulnerable-application",
"owner": {
"login": "m3ssap0",
"id": 705120,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4",
"html_url": "https:\/\/github.com\/m3ssap0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/m3ssap0\/wordpress-jetpack-broken-access-control-vulnerable-application",
"description": "WARNING: This is a vulnerable application to test the exploit for the Jetpack < 13.9.1 broken access control (CVE-2024-9926). Run it at your own risk!",
"fork": false,
"created_at": "2024-10-23T19:12:55Z",
"updated_at": "2024-11-01T20:26:50Z",
"pushed_at": "2024-11-01T18:55:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"broken-access-control",
"cve-2024-9926",
"jetpack",
"vulnerable-application",
"wordpress"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 881924384,
"name": "wordpress-jetpack-broken-access-control-exploit",
"full_name": "m3ssap0\/wordpress-jetpack-broken-access-control-exploit",
"owner": {
"login": "m3ssap0",
"id": 705120,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4",
"html_url": "https:\/\/github.com\/m3ssap0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/m3ssap0\/wordpress-jetpack-broken-access-control-exploit",
"description": "Exploits Jetpack < 13.9.1 broken access control (CVE-2024-9926).",
"fork": false,
"created_at": "2024-11-01T14:03:55Z",
"updated_at": "2024-11-01T20:26:53Z",
"pushed_at": "2024-11-01T18:55:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-9926",
"exploit",
"jetpack",
"security",
"security-tools",
"vulnerability",
"vulnerability-scann",
"wordpress"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1697,6 +1697,10 @@
### CVE-2024-9821
- [RandomRobbieBF/CVE-2024-9821](https://github.com/RandomRobbieBF/CVE-2024-9821)
### CVE-2024-9926
- [m3ssap0/wordpress-jetpack-broken-access-control-vulnerable-application](https://github.com/m3ssap0/wordpress-jetpack-broken-access-control-vulnerable-application)
- [m3ssap0/wordpress-jetpack-broken-access-control-exploit](https://github.com/m3ssap0/wordpress-jetpack-broken-access-control-exploit)
### CVE-2024-9954
- [zetraxz/CVE-2024-9954](https://github.com/zetraxz/CVE-2024-9954)
- [famixcm/CVE-2024-9954](https://github.com/famixcm/CVE-2024-9954)
@ -5761,15 +5765,6 @@
### CVE-2024-48652
- [paragbagul111/CVE-2024-48652](https://github.com/paragbagul111/CVE-2024-48652)
### CVE-2024-48733
- [ACN-CVEs/CVE-2024-48733](https://github.com/ACN-CVEs/CVE-2024-48733)
### CVE-2024-48734
- [ACN-CVEs/CVE-2024-48734](https://github.com/ACN-CVEs/CVE-2024-48734)
### CVE-2024-48735
- [ACN-CVEs/CVE-2024-48735](https://github.com/ACN-CVEs/CVE-2024-48735)
### CVE-2024-48904
- [zetraxz/CVE-2024-48904](https://github.com/zetraxz/CVE-2024-48904)
- [famixcm/CVE-2024-48904](https://github.com/famixcm/CVE-2024-48904)
@ -45063,6 +45058,7 @@
</code>
- [ricedu/CVE-2014-0195](https://github.com/ricedu/CVE-2014-0195)
- [PezwariNaan/CVE-2014-0195](https://github.com/PezwariNaan/CVE-2014-0195)
### CVE-2014-0196 (2014-05-07)