Auto Update 2024/09/27 00:30:25

This commit is contained in:
motikan2010-bot 2024-09-27 09:30:26 +09:00
parent 8b7b4e9b6d
commit 39ebc3c9bb
22 changed files with 223 additions and 64 deletions

View file

@ -258,10 +258,10 @@
"description": "cve-2018-10933 libssh authentication bypass",
"fork": false,
"created_at": "2018-10-18T19:13:45Z",
"updated_at": "2024-09-03T16:05:32Z",
"updated_at": "2024-09-26T19:51:39Z",
"pushed_at": "2018-10-21T21:24:29Z",
"stargazers_count": 106,
"watchers_count": 106,
"stargazers_count": 107,
"watchers_count": 107,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -270,7 +270,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 106,
"watchers": 107,
"score": 0,
"subscribers_count": 8
},

View file

@ -43,10 +43,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2024-09-25T03:14:00Z",
"updated_at": "2024-09-26T23:52:27Z",
"pushed_at": "2023-07-20T10:51:42Z",
"stargazers_count": 1724,
"watchers_count": 1724,
"stargazers_count": 1725,
"watchers_count": 1725,
"has_discussions": false,
"forks_count": 359,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 359,
"watchers": 1724,
"watchers": 1725,
"score": 0,
"subscribers_count": 86
},

View file

@ -43,10 +43,10 @@
"description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017",
"fork": false,
"created_at": "2022-06-30T04:39:58Z",
"updated_at": "2024-09-24T08:27:54Z",
"updated_at": "2024-09-26T20:04:04Z",
"pushed_at": "2023-11-12T16:29:03Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -58,7 +58,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 93,
"watchers": 94,
"score": 0,
"subscribers_count": 3
},

View file

@ -73,10 +73,10 @@
"description": "SQLPad - Template injection (POC exploit for SQLPad RCE [CVE-2022-0944])",
"fork": false,
"created_at": "2024-09-09T19:09:43Z",
"updated_at": "2024-09-19T09:06:14Z",
"updated_at": "2024-09-27T00:09:01Z",
"pushed_at": "2024-09-10T14:23:01Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-09-20T09:50:26Z",
"updated_at": "2024-09-26T21:07:54Z",
"pushed_at": "2024-08-01T15:09:15Z",
"stargazers_count": 259,
"watchers_count": 259,
"stargazers_count": 260,
"watchers_count": 260,
"has_discussions": true,
"forks_count": 38,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 38,
"watchers": 259,
"watchers": 260,
"score": 0,
"subscribers_count": 5
},

View file

@ -28,5 +28,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 840469662,
"name": "CVE-2022-44149",
"full_name": "geniuszlyy\/CVE-2022-44149",
"owner": {
"login": "geniuszlyy",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszlyy"
},
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-44149",
"description": "it is script designed to interact with a router by sending a payload to its system tools. The script retrieves the router's configuration from environment variables to ensure security. It includes functions for generating an authorization header, sending a payload, and logging the process.",
"fork": false,
"created_at": "2024-08-09T19:27:22Z",
"updated_at": "2024-08-12T17:34:44Z",
"pushed_at": "2024-08-09T19:28:51Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -28,5 +28,35 @@
"watchers": 3,
"score": 0,
"subscribers_count": 2
},
{
"id": 840470520,
"name": "CVE-2022-45701",
"full_name": "geniuszlyy\/CVE-2022-45701",
"owner": {
"login": "geniuszlyy",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszlyy"
},
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-45701",
"description": "it is script designed to exploit certain vulnerabilities in routers by sending payloads through SNMP (Simple Network Management Protocol). The script automates the process of authorization, payload generation, and execution, allowing for remote command execution on the target device.",
"fork": false,
"created_at": "2024-08-09T19:30:20Z",
"updated_at": "2024-08-12T17:34:44Z",
"pushed_at": "2024-08-09T19:31:12Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -28,5 +28,35 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 840471119,
"name": "CVE-2022-46080",
"full_name": "geniuszlyy\/CVE-2022-46080",
"owner": {
"login": "geniuszlyy",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszlyy"
},
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-46080",
"description": "it is script that enables Telnet on routers by sending a specially crafted request. The script allows users to specify the router's URL, Telnet port, and password. It validates the inputs and logs the process, providing feedback on whether the exploit was successful.",
"fork": false,
"created_at": "2024-08-09T19:32:32Z",
"updated_at": "2024-08-12T17:34:44Z",
"pushed_at": "2024-08-11T07:29:30Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -43,10 +43,10 @@
"description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing",
"fork": false,
"created_at": "2023-06-16T20:15:36Z",
"updated_at": "2024-09-16T09:35:08Z",
"updated_at": "2024-09-26T21:58:53Z",
"pushed_at": "2024-05-08T16:17:07Z",
"stargazers_count": 127,
"watchers_count": 127,
"stargazers_count": 128,
"watchers_count": 128,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 127,
"watchers": 128,
"score": 0,
"subscribers_count": 3
},

View file

@ -1464,5 +1464,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 863722602,
"name": "LAB-DFIR-cve-2023-38831",
"full_name": "ra3edAJ\/LAB-DFIR-cve-2023-38831",
"owner": {
"login": "ra3edAJ",
"id": 122083416,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122083416?v=4",
"html_url": "https:\/\/github.com\/ra3edAJ"
},
"html_url": "https:\/\/github.com\/ra3edAJ\/LAB-DFIR-cve-2023-38831",
"description": "d",
"fork": false,
"created_at": "2024-09-26T19:44:08Z",
"updated_at": "2024-09-26T19:49:33Z",
"pushed_at": "2024-09-26T19:49:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "CVE-2023-4634",
"fork": false,
"created_at": "2023-09-05T07:44:15Z",
"updated_at": "2024-09-24T08:47:25Z",
"updated_at": "2024-09-26T22:02:48Z",
"pushed_at": "2023-09-07T05:36:10Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 10,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 43,
"forks": 9,
"watchers": 44,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,8 +13,8 @@
"description": "CVE-2024-25731",
"fork": false,
"created_at": "2024-02-06T04:38:12Z",
"updated_at": "2024-03-01T23:54:51Z",
"pushed_at": "2024-03-01T23:57:56Z",
"updated_at": "2024-09-26T23:51:13Z",
"pushed_at": "2024-09-26T23:51:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -43,10 +43,10 @@
"description": "Proof of Concept Exploit for CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability",
"fork": false,
"created_at": "2024-09-24T18:12:38Z",
"updated_at": "2024-09-26T10:20:55Z",
"updated_at": "2024-09-26T23:12:16Z",
"pushed_at": "2024-09-24T18:27:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 4
}

View file

@ -103,10 +103,10 @@
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
"fork": false,
"created_at": "2024-07-15T08:07:05Z",
"updated_at": "2024-09-25T14:38:35Z",
"updated_at": "2024-09-26T19:28:32Z",
"pushed_at": "2024-09-08T21:23:34Z",
"stargazers_count": 360,
"watchers_count": 360,
"stargazers_count": 361,
"watchers_count": 361,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 360,
"watchers": 361,
"score": 0,
"subscribers_count": 18
},

View file

@ -13,19 +13,19 @@
"description": "CVE-2024-38200 - Microsoft Office NTLMv2 Disclosure Vulnerability ",
"fork": false,
"created_at": "2024-09-24T19:24:55Z",
"updated_at": "2024-09-26T18:26:36Z",
"updated_at": "2024-09-26T20:59:32Z",
"pushed_at": "2024-09-25T21:57:51Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 16,
"forks": 7,
"watchers": 18,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "WBW Product Table Pro <= 1.9.4 - Unauthenticated Arbitrary SQL Execution to RCE",
"fork": false,
"created_at": "2024-09-24T05:50:03Z",
"updated_at": "2024-09-25T13:15:25Z",
"updated_at": "2024-09-26T18:48:28Z",
"pushed_at": "2024-09-24T05:52:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "A proof of concept of traefik CVE to understand the impact",
"fork": false,
"created_at": "2024-09-26T09:58:27Z",
"updated_at": "2024-09-26T13:45:12Z",
"updated_at": "2024-09-26T21:26:32Z",
"pushed_at": "2024-09-26T13:45:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -133,8 +133,8 @@
"description": "[CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner",
"fork": false,
"created_at": "2024-05-26T06:50:48Z",
"updated_at": "2024-09-21T09:10:12Z",
"pushed_at": "2024-09-21T09:10:09Z",
"updated_at": "2024-09-26T23:28:23Z",
"pushed_at": "2024-09-26T23:28:20Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,

View file

@ -1183,10 +1183,10 @@
"description": "CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.",
"fork": false,
"created_at": "2024-07-02T14:41:43Z",
"updated_at": "2024-09-19T07:50:40Z",
"updated_at": "2024-09-26T18:36:14Z",
"pushed_at": "2024-07-02T15:16:04Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -1205,7 +1205,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 22,
"watchers": 23,
"score": 0,
"subscribers_count": 2
},

32
2024/CVE-2024-6769.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 849466467,
"name": "CVE-2024-6769",
"full_name": "fortra\/CVE-2024-6769",
"owner": {
"login": "fortra",
"id": 117669217,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117669217?v=4",
"html_url": "https:\/\/github.com\/fortra"
},
"html_url": "https:\/\/github.com\/fortra\/CVE-2024-6769",
"description": "Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)",
"fork": false,
"created_at": "2024-08-29T16:40:49Z",
"updated_at": "2024-09-26T20:33:30Z",
"pushed_at": "2024-09-25T12:00:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.",
"fork": false,
"created_at": "2024-09-16T19:04:57Z",
"updated_at": "2024-09-24T08:22:44Z",
"updated_at": "2024-09-26T22:30:08Z",
"pushed_at": "2024-09-16T19:44:54Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 27,
"watchers": 28,
"score": 0,
"subscribers_count": 5
},

View file

@ -1363,6 +1363,9 @@
- [fortra/CVE-2024-6768](https://github.com/fortra/CVE-2024-6768)
### CVE-2024-6769
- [fortra/CVE-2024-6769](https://github.com/fortra/CVE-2024-6769)
### CVE-2024-6782 (2024-08-06)
<code>Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution.
@ -10636,6 +10639,7 @@
- [MaorBuskila/Windows-X64-RAT](https://github.com/MaorBuskila/Windows-X64-RAT)
- [yezzfusl/cve_2023_38831_scanner](https://github.com/yezzfusl/cve_2023_38831_scanner)
- [FirFirdaus/CVE-2023-38831](https://github.com/FirFirdaus/CVE-2023-38831)
- [ra3edAJ/LAB-DFIR-cve-2023-38831](https://github.com/ra3edAJ/LAB-DFIR-cve-2023-38831)
### CVE-2023-38836 (2023-08-21)
@ -19295,6 +19299,7 @@
</code>
- [yerodin/CVE-2022-44149](https://github.com/yerodin/CVE-2022-44149)
- [geniuszlyy/CVE-2022-44149](https://github.com/geniuszlyy/CVE-2022-44149)
### CVE-2022-44183 (2022-11-21)
@ -19577,6 +19582,7 @@
</code>
- [yerodin/CVE-2022-45701](https://github.com/yerodin/CVE-2022-45701)
- [geniuszlyy/CVE-2022-45701](https://github.com/geniuszlyy/CVE-2022-45701)
### CVE-2022-45728 (2023-01-12)
@ -19636,6 +19642,7 @@
</code>
- [yerodin/CVE-2022-46080](https://github.com/yerodin/CVE-2022-46080)
- [geniuszlyy/CVE-2022-46080](https://github.com/geniuszlyy/CVE-2022-46080)
### CVE-2022-46087 (2023-01-30)