Auto Update 2024/09/01 00:29:19

This commit is contained in:
motikan2010-bot 2024-09-01 09:29:19 +09:00
parent d8544e3832
commit 3b0ad127f3
20 changed files with 108 additions and 73 deletions

View file

@ -228,13 +228,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -53,10 +53,10 @@
"description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.",
"fork": false,
"created_at": "2018-01-04T23:51:12Z",
"updated_at": "2024-08-12T19:35:16Z",
"updated_at": "2024-08-31T20:57:41Z",
"pushed_at": "2018-02-27T05:22:38Z",
"stargazers_count": 543,
"watchers_count": 543,
"stargazers_count": 542,
"watchers_count": 542,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -74,7 +74,7 @@
],
"visibility": "public",
"forks": 71,
"watchers": 543,
"watchers": 542,
"score": 0,
"subscribers_count": 45
},

View file

@ -80,10 +80,10 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2024-08-28T17:43:30Z",
"updated_at": "2024-08-31T23:43:02Z",
"pushed_at": "2021-01-08T10:31:22Z",
"stargazers_count": 572,
"watchers_count": 572,
"stargazers_count": 573,
"watchers_count": 573,
"has_discussions": false,
"forks_count": 174,
"allow_forking": true,
@ -102,7 +102,7 @@
],
"visibility": "public",
"forks": 174,
"watchers": 572,
"watchers": 573,
"score": 0,
"subscribers_count": 23
},

View file

@ -47,10 +47,10 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2024-08-30T13:53:39Z",
"updated_at": "2024-08-31T20:16:36Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1941,
"watchers_count": 1941,
"stargazers_count": 1942,
"watchers_count": 1942,
"has_discussions": false,
"forks_count": 509,
"allow_forking": true,
@ -59,7 +59,7 @@
"topics": [],
"visibility": "public",
"forks": 509,
"watchers": 1941,
"watchers": 1942,
"score": 0,
"subscribers_count": 21
},

View file

@ -794,14 +794,14 @@
{
"id": 753987117,
"name": "CVE-2023-23397-POC",
"full_name": "alsaeroth\/CVE-2023-23397-POC",
"full_name": "sarsaeroth\/CVE-2023-23397-POC",
"owner": {
"login": "alsaeroth",
"login": "sarsaeroth",
"id": 159212133,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/159212133?v=4",
"html_url": "https:\/\/github.com\/alsaeroth"
"html_url": "https:\/\/github.com\/sarsaeroth"
},
"html_url": "https:\/\/github.com\/alsaeroth\/CVE-2023-23397-POC",
"html_url": "https:\/\/github.com\/sarsaeroth\/CVE-2023-23397-POC",
"description": "C implementation of Outlook 0-click vulnerability",
"fork": false,
"created_at": "2024-02-07T07:08:55Z",

View file

@ -30,21 +30,21 @@
"subscribers_count": 2
},
{
"id": 850418311,
"name": "CVE-2023-29360-",
"full_name": "0xDivyanshu-new\/CVE-2023-29360-",
"id": 850466517,
"name": "CVE-2023-29360",
"full_name": "0xDivyanshu-new\/CVE-2023-29360",
"owner": {
"login": "0xDivyanshu-new",
"id": 135882723,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135882723?v=4",
"html_url": "https:\/\/github.com\/0xDivyanshu-new"
},
"html_url": "https:\/\/github.com\/0xDivyanshu-new\/CVE-2023-29360-",
"description": "POC for CVE-202329360 ",
"html_url": "https:\/\/github.com\/0xDivyanshu-new\/CVE-2023-29360",
"description": "POC for CVE-2023-29360",
"fork": false,
"created_at": "2024-08-31T18:01:46Z",
"updated_at": "2024-08-31T18:09:40Z",
"pushed_at": "2024-08-31T18:09:37Z",
"created_at": "2024-08-31T21:08:39Z",
"updated_at": "2024-08-31T21:11:42Z",
"pushed_at": "2024-08-31T21:11:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -133,10 +133,10 @@
"description": "In Dolibarr 17.0.0 with the CMS Website plugin (core) enabled, an authenticated attacker can obtain remote command execution via php code injection bypassing the application restrictions.",
"fork": false,
"created_at": "2024-06-24T16:22:31Z",
"updated_at": "2024-08-30T20:03:06Z",
"updated_at": "2024-08-31T18:47:59Z",
"pushed_at": "2024-06-24T16:39:15Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "LPE exploit for CVE-2023-36802",
"fork": false,
"created_at": "2023-10-09T17:32:15Z",
"updated_at": "2024-07-23T15:56:21Z",
"updated_at": "2024-08-31T19:35:14Z",
"pushed_at": "2023-10-10T17:44:17Z",
"stargazers_count": 154,
"watchers_count": 154,
"stargazers_count": 155,
"watchers_count": 155,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 154,
"watchers": 155,
"score": 0,
"subscribers_count": 5
},
@ -78,13 +78,13 @@
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 35,
"score": 0,
"subscribers_count": 2

View file

@ -62,14 +62,14 @@
{
"id": 753988072,
"name": "CVE-2023-41064-POC",
"full_name": "alsaeroth\/CVE-2023-41064-POC",
"full_name": "sarsaeroth\/CVE-2023-41064-POC",
"owner": {
"login": "alsaeroth",
"login": "sarsaeroth",
"id": 159212133,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/159212133?v=4",
"html_url": "https:\/\/github.com\/alsaeroth"
"html_url": "https:\/\/github.com\/sarsaeroth"
},
"html_url": "https:\/\/github.com\/alsaeroth\/CVE-2023-41064-POC",
"html_url": "https:\/\/github.com\/sarsaeroth\/CVE-2023-41064-POC",
"description": "C implementation of Image I\/O 0-click vulnerability",
"fork": false,
"created_at": "2024-02-07T07:11:41Z",

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-08-31T16:47:47Z",
"updated_at": "2024-08-31T20:31:45Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1110,
"watchers_count": 1110,
"stargazers_count": 1111,
"watchers_count": 1111,
"has_discussions": false,
"forks_count": 189,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 189,
"watchers": 1110,
"watchers": 1111,
"score": 0,
"subscribers_count": 20
},

View file

@ -302,14 +302,14 @@
{
"id": 753983723,
"name": "CVE-2023-4863-POC",
"full_name": "alsaeroth\/CVE-2023-4863-POC",
"full_name": "sarsaeroth\/CVE-2023-4863-POC",
"owner": {
"login": "alsaeroth",
"login": "sarsaeroth",
"id": 159212133,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/159212133?v=4",
"html_url": "https:\/\/github.com\/alsaeroth"
"html_url": "https:\/\/github.com\/sarsaeroth"
},
"html_url": "https:\/\/github.com\/alsaeroth\/CVE-2023-4863-POC",
"html_url": "https:\/\/github.com\/sarsaeroth\/CVE-2023-4863-POC",
"description": "C implementation of libwebp 0-click vulnerability",
"fork": false,
"created_at": "2024-02-07T06:58:16Z",

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-12T15:08:01Z",
"updated_at": "2024-08-16T19:38:50Z",
"updated_at": "2024-08-31T20:00:16Z",
"pushed_at": "2024-01-14T07:14:33Z",
"stargazers_count": 124,
"watchers_count": 124,
"stargazers_count": 125,
"watchers_count": 125,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 124,
"watchers": 125,
"score": 0,
"subscribers_count": 3
}

View file

@ -48,13 +48,13 @@
"stargazers_count": 667,
"watchers_count": 667,
"has_discussions": false,
"forks_count": 147,
"forks_count": 148,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 147,
"forks": 148,
"watchers": 667,
"score": 0,
"subscribers_count": 10

View file

@ -284,7 +284,7 @@
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -301,7 +301,7 @@
"teamcity"
],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 24,
"score": 0,
"subscribers_count": 1

View file

@ -1814,7 +1814,7 @@
"fork": false,
"created_at": "2024-07-05T18:36:16Z",
"updated_at": "2024-08-31T04:01:41Z",
"pushed_at": "2024-08-31T04:01:38Z",
"pushed_at": "2024-08-31T20:57:28Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,

View file

@ -256,10 +256,10 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
"updated_at": "2024-08-31T17:47:51Z",
"updated_at": "2024-08-31T20:22:17Z",
"pushed_at": "2024-08-27T12:22:39Z",
"stargazers_count": 471,
"watchers_count": 471,
"stargazers_count": 474,
"watchers_count": 474,
"has_discussions": false,
"forks_count": 92,
"allow_forking": true,
@ -268,7 +268,7 @@
"topics": [],
"visibility": "public",
"forks": 92,
"watchers": 471,
"watchers": 474,
"score": 0,
"subscribers_count": 4
},

32
2024/CVE-2024-42642.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 850005996,
"name": "CVE-2024-42642",
"full_name": "VL4DR\/CVE-2024-42642",
"owner": {
"login": "VL4DR",
"id": 96614714,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96614714?v=4",
"html_url": "https:\/\/github.com\/VL4DR"
},
"html_url": "https:\/\/github.com\/VL4DR\/CVE-2024-42642",
"description": null,
"fork": false,
"created_at": "2024-08-30T17:24:58Z",
"updated_at": "2024-08-31T19:28:06Z",
"pushed_at": "2024-08-31T19:25:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -107,19 +107,19 @@
"description": "Exploit for the vulnerability CVE-2024-43044 in Jenkins",
"fork": false,
"created_at": "2024-08-23T20:26:26Z",
"updated_at": "2024-08-31T18:25:38Z",
"updated_at": "2024-08-31T23:43:26Z",
"pushed_at": "2024-08-29T17:05:04Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 22,
"forks": 6,
"watchers": 24,
"score": 0,
"subscribers_count": 2
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 11,
"score": 0,
"subscribers_count": 1

View file

@ -4413,6 +4413,9 @@
- [fevar54/CVE-2024-42461](https://github.com/fevar54/CVE-2024-42461)
### CVE-2024-42642
- [VL4DR/CVE-2024-42642](https://github.com/VL4DR/CVE-2024-42642)
### CVE-2024-42657 (2024-08-19)
<code>An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the lack of encryption during login process
@ -5578,7 +5581,7 @@
- [LiveOverflow/webp-CVE-2023-4863](https://github.com/LiveOverflow/webp-CVE-2023-4863)
- [caoweiquan322/NotEnough](https://github.com/caoweiquan322/NotEnough)
- [CrackerCat/CVE-2023-4863-](https://github.com/CrackerCat/CVE-2023-4863-)
- [alsaeroth/CVE-2023-4863-POC](https://github.com/alsaeroth/CVE-2023-4863-POC)
- [sarsaeroth/CVE-2023-4863-POC](https://github.com/sarsaeroth/CVE-2023-4863-POC)
### CVE-2023-4911 (2023-10-03)
@ -6799,7 +6802,7 @@
- [Muhammad-Ali007/OutlookNTLM_CVE-2023-23397](https://github.com/Muhammad-Ali007/OutlookNTLM_CVE-2023-23397)
- [Pushkarup/CVE-2023-23397](https://github.com/Pushkarup/CVE-2023-23397)
- [ducnorth2712/CVE-2023-23397](https://github.com/ducnorth2712/CVE-2023-23397)
- [alsaeroth/CVE-2023-23397-POC](https://github.com/alsaeroth/CVE-2023-23397-POC)
- [sarsaeroth/CVE-2023-23397-POC](https://github.com/sarsaeroth/CVE-2023-23397-POC)
- [TheUnknownSoul/CVE-2023-23397-PoW](https://github.com/TheUnknownSoul/CVE-2023-23397-PoW)
- [Symbolexe/CVE-2023-23397](https://github.com/Symbolexe/CVE-2023-23397)
@ -7796,7 +7799,7 @@
</code>
- [Nero22k/cve-2023-29360](https://github.com/Nero22k/cve-2023-29360)
- [0xDivyanshu-new/CVE-2023-29360-](https://github.com/0xDivyanshu-new/CVE-2023-29360-)
- [0xDivyanshu-new/CVE-2023-29360](https://github.com/0xDivyanshu-new/CVE-2023-29360)
### CVE-2023-29384 (2023-12-20)
@ -10365,7 +10368,7 @@
- [MrR0b0t19/vulnerabilidad-LibWebP-CVE-2023-41064](https://github.com/MrR0b0t19/vulnerabilidad-LibWebP-CVE-2023-41064)
- [MrR0b0t19/CVE-2023-41064](https://github.com/MrR0b0t19/CVE-2023-41064)
- [alsaeroth/CVE-2023-41064-POC](https://github.com/alsaeroth/CVE-2023-41064-POC)
- [sarsaeroth/CVE-2023-41064-POC](https://github.com/sarsaeroth/CVE-2023-41064-POC)
### CVE-2023-41080 (2023-08-25)