Auto Update 2024/07/21 00:29:26

This commit is contained in:
motikan2010-bot 2024-07-21 09:29:26 +09:00
parent dbc4a9e163
commit 36b23f189e
26 changed files with 119 additions and 88 deletions

View file

@ -13,10 +13,10 @@
"description": "CVE-2007-2447 - Samba usermap script",
"fork": false,
"created_at": "2018-08-03T18:39:56Z",
"updated_at": "2024-04-15T13:24:04Z",
"updated_at": "2024-07-20T20:59:38Z",
"pushed_at": "2020-08-16T18:54:38Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 55,
"watchers": 56,
"score": 0,
"subscribers_count": 2
},

View file

@ -152,14 +152,14 @@
{
"id": 831187562,
"name": "CVE-2012-1823",
"full_name": "Fatalityx84\/CVE-2012-1823",
"full_name": "Fatalitysec\/CVE-2012-1823",
"owner": {
"login": "Fatalityx84",
"login": "Fatalitysec",
"id": 168249911,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168249911?v=4",
"html_url": "https:\/\/github.com\/Fatalityx84"
"html_url": "https:\/\/github.com\/Fatalitysec"
},
"html_url": "https:\/\/github.com\/Fatalityx84\/CVE-2012-1823",
"html_url": "https:\/\/github.com\/Fatalitysec\/CVE-2012-1823",
"description": "Prova de conceito de PHP CGI Argument Injection.",
"fork": false,
"created_at": "2024-07-19T21:53:37Z",

View file

@ -78,7 +78,7 @@
"stargazers_count": 128,
"watchers_count": 128,
"has_discussions": false,
"forks_count": 54,
"forks_count": 52,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -91,7 +91,7 @@
"vulnerable-container"
],
"visibility": "public",
"forks": 54,
"forks": 52,
"watchers": 128,
"score": 0,
"subscribers_count": 3

View file

@ -103,7 +103,7 @@
"description": "CVE-2017-5689 Proof-of-Concept exploit",
"fork": false,
"created_at": "2017-07-27T21:06:08Z",
"updated_at": "2024-05-24T20:16:55Z",
"updated_at": "2024-07-20T21:35:26Z",
"pushed_at": "2017-07-27T21:08:49Z",
"stargazers_count": 55,
"watchers_count": 55,

View file

@ -13,10 +13,10 @@
"description": "Hikvision camera CVE-2017-7921-EXP",
"fork": false,
"created_at": "2020-04-27T11:49:40Z",
"updated_at": "2024-06-11T08:22:17Z",
"updated_at": "2024-07-20T21:25:23Z",
"pushed_at": "2023-12-04T15:47:16Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 79,
"watchers": 80,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2024-07-17T15:56:42Z",
"updated_at": "2024-07-20T22:39:02Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1788,
"watchers_count": 1788,
"stargazers_count": 1789,
"watchers_count": 1789,
"has_discussions": false,
"forks_count": 247,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 247,
"watchers": 1788,
"watchers": 1789,
"score": 0,
"subscribers_count": 37
},

View file

@ -43,7 +43,7 @@
"description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017",
"fork": false,
"created_at": "2022-06-30T04:39:58Z",
"updated_at": "2024-07-18T12:42:25Z",
"updated_at": "2024-07-20T19:54:10Z",
"pushed_at": "2023-11-12T16:29:03Z",
"stargazers_count": 88,
"watchers_count": 88,

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 2
}
]

View file

@ -2042,10 +2042,10 @@
"description": "Pre-compiled builds for CVE-2021-4034",
"fork": false,
"created_at": "2022-01-27T17:43:24Z",
"updated_at": "2024-05-30T10:52:20Z",
"updated_at": "2024-07-21T00:17:17Z",
"pushed_at": "2022-03-30T15:38:20Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -2054,7 +2054,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 21,
"watchers": 22,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,19 +13,19 @@
"description": "exploit for CVE-2022-2588",
"fork": false,
"created_at": "2022-08-11T06:01:24Z",
"updated_at": "2024-07-03T12:34:56Z",
"updated_at": "2024-07-20T20:55:40Z",
"pushed_at": "2023-03-04T05:52:28Z",
"stargazers_count": 463,
"watchers_count": 463,
"stargazers_count": 464,
"watchers_count": 464,
"has_discussions": false,
"forks_count": 71,
"forks_count": 72,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 463,
"forks": 72,
"watchers": 464,
"score": 0,
"subscribers_count": 50
},

View file

@ -1493,10 +1493,10 @@
"description": "Proof of Concept of CVE-2022-30190",
"fork": false,
"created_at": "2022-06-08T10:58:23Z",
"updated_at": "2024-04-02T17:40:41Z",
"updated_at": "2024-07-20T23:16:34Z",
"pushed_at": "2022-10-06T14:49:56Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -1513,7 +1513,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 36,
"watchers": 37,
"score": 0,
"subscribers_count": 1
},
@ -2613,18 +2613,18 @@
"description": "Educational exploit for CVE-2022-30190",
"fork": false,
"created_at": "2024-07-20T17:50:48Z",
"updated_at": "2024-07-20T18:23:41Z",
"updated_at": "2024-07-20T19:56:33Z",
"pushed_at": "2024-07-20T18:23:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0

View file

@ -453,10 +453,10 @@
"description": "PoC of Imagemagick's Arbitrary File Read",
"fork": false,
"created_at": "2023-07-03T18:13:44Z",
"updated_at": "2024-05-09T13:17:28Z",
"updated_at": "2024-07-21T00:04:34Z",
"pushed_at": "2023-07-03T18:34:24Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -465,7 +465,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -168,7 +168,7 @@
"fork": false,
"created_at": "2024-07-10T05:39:01Z",
"updated_at": "2024-07-17T01:01:38Z",
"pushed_at": "2024-07-17T01:01:35Z",
"pushed_at": "2024-07-20T23:27:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -103,10 +103,10 @@
"description": " Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604) ",
"fork": false,
"created_at": "2023-11-03T22:06:09Z",
"updated_at": "2024-07-03T04:25:40Z",
"updated_at": "2024-07-20T19:08:56Z",
"pushed_at": "2024-01-20T16:59:23Z",
"stargazers_count": 98,
"watchers_count": 98,
"stargazers_count": 99,
"watchers_count": 99,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 98,
"watchers": 99,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-07-17T06:24:33Z",
"updated_at": "2024-07-20T22:11:54Z",
"pushed_at": "2024-06-19T12:24:50Z",
"stargazers_count": 157,
"watchers_count": 157,
"stargazers_count": 158,
"watchers_count": 158,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 157,
"watchers": 158,
"score": 0,
"subscribers_count": 5
},

View file

@ -77,10 +77,10 @@
"description": "This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to steal data, modify data, or disrupt the availability of the server.",
"fork": false,
"created_at": "2024-05-24T05:38:18Z",
"updated_at": "2024-07-10T04:22:47Z",
"updated_at": "2024-07-20T19:16:57Z",
"pushed_at": "2024-05-24T05:56:48Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -89,7 +89,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
"fork": false,
"created_at": "2024-06-10T17:02:03Z",
"updated_at": "2024-07-20T10:03:05Z",
"updated_at": "2024-07-20T23:14:08Z",
"pushed_at": "2024-07-04T10:39:15Z",
"stargazers_count": 278,
"watchers_count": 278,
"stargazers_count": 279,
"watchers_count": 279,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 57,
"watchers": 278,
"watchers": 279,
"score": 0,
"subscribers_count": 3
},

View file

@ -103,19 +103,19 @@
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
"fork": false,
"created_at": "2024-07-15T08:07:05Z",
"updated_at": "2024-07-20T18:27:00Z",
"updated_at": "2024-07-20T23:37:09Z",
"pushed_at": "2024-07-18T01:28:46Z",
"stargazers_count": 224,
"watchers_count": 224,
"stargazers_count": 227,
"watchers_count": 227,
"has_discussions": false,
"forks_count": 19,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 224,
"forks": 21,
"watchers": 227,
"score": 0,
"subscribers_count": 11
}

View file

@ -1813,8 +1813,8 @@
"description": "GNU IFUNC is the real culprit behind CVE-2024-3094",
"fork": false,
"created_at": "2024-07-05T18:36:16Z",
"updated_at": "2024-07-20T17:35:41Z",
"pushed_at": "2024-07-20T17:35:38Z",
"updated_at": "2024-07-20T19:46:42Z",
"pushed_at": "2024-07-20T19:46:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -523,5 +523,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 831567895,
"name": "CVE-2024-34102-PoC",
"full_name": "ex-ARnX\/CVE-2024-34102-PoC",
"owner": {
"login": "ex-ARnX",
"id": 176180820,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176180820?v=4",
"html_url": "https:\/\/github.com\/ex-ARnX"
},
"html_url": "https:\/\/github.com\/ex-ARnX\/CVE-2024-34102-PoC",
"description": "CVE-2024-34102 unauthenticated RCE PoC for Magento\/adobe commerce and (NEW 0DAY)?",
"fork": false,
"created_at": "2024-07-21T00:22:54Z",
"updated_at": "2024-07-21T00:25:18Z",
"pushed_at": "2024-07-21T00:25:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -73,10 +73,10 @@
"description": "Exploiter a Vulnerability detection and Exploitation tool for GeoServer Unauthenticated Remote Code Execution CVE-2024-36401.",
"fork": false,
"created_at": "2024-07-05T15:24:50Z",
"updated_at": "2024-07-05T15:33:12Z",
"updated_at": "2024-07-20T21:01:18Z",
"pushed_at": "2024-07-05T15:33:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.",
"fork": false,
"created_at": "2024-07-06T00:49:40Z",
"updated_at": "2024-07-20T09:39:49Z",
"updated_at": "2024-07-20T23:23:18Z",
"pushed_at": "2024-07-12T00:41:36Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 93,
"watchers": 94,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web servers worldwide, potentially leading to source code disclosure and server-side request forgery (SSRF) attacks.",
"fork": false,
"created_at": "2024-07-19T03:51:54Z",
"updated_at": "2024-07-20T15:52:40Z",
"updated_at": "2024-07-21T00:11:43Z",
"pushed_at": "2024-07-19T04:01:13Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 14,
"watchers": 17,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.",
"fork": false,
"created_at": "2024-06-07T05:50:23Z",
"updated_at": "2024-06-25T10:23:02Z",
"updated_at": "2024-07-20T23:31:20Z",
"pushed_at": "2024-06-11T04:46:42Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 73,
"watchers_count": 73,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 71,
"watchers": 73,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "a signal handler race condition in OpenSSH's server (sshd)",
"fork": false,
"created_at": "2024-07-01T10:55:29Z",
"updated_at": "2024-07-20T11:10:29Z",
"updated_at": "2024-07-20T22:34:17Z",
"pushed_at": "2024-07-01T10:54:02Z",
"stargazers_count": 428,
"watchers_count": 428,
"stargazers_count": 429,
"watchers_count": 429,
"has_discussions": false,
"forks_count": 180,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 180,
"watchers": 428,
"watchers": 429,
"score": 0,
"subscribers_count": 5
},

View file

@ -3059,6 +3059,7 @@
- [bughuntar/CVE-2024-34102](https://github.com/bughuntar/CVE-2024-34102)
- [bughuntar/CVE-2024-34102-Python](https://github.com/bughuntar/CVE-2024-34102-Python)
- [Phantom-IN/CVE-2024-34102](https://github.com/Phantom-IN/CVE-2024-34102)
- [ex-ARnX/CVE-2024-34102-PoC](https://github.com/ex-ARnX/CVE-2024-34102-PoC)
### CVE-2024-34220 (-)
@ -43708,7 +43709,7 @@
- [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2)
- [cyberharsh/PHP_CVE-2012-1823](https://github.com/cyberharsh/PHP_CVE-2012-1823)
- [0xl0k1/CVE-2012-1823](https://github.com/0xl0k1/CVE-2012-1823)
- [Fatalityx84/CVE-2012-1823](https://github.com/Fatalityx84/CVE-2012-1823)
- [Fatalitysec/CVE-2012-1823](https://github.com/Fatalitysec/CVE-2012-1823)
### CVE-2012-1870 (2012-07-10)