Auto Update 2024/09/11 00:29:45

This commit is contained in:
motikan2010-bot 2024-09-11 09:29:45 +09:00
parent f3174a3309
commit 56d188363b
25 changed files with 116 additions and 85 deletions

View file

@ -313,10 +313,10 @@
"description": "Samba 3.0.20 username map script exploit",
"fork": false,
"created_at": "2021-04-11T07:53:20Z",
"updated_at": "2024-06-28T12:57:16Z",
"updated_at": "2024-09-10T20:06:22Z",
"pushed_at": "2021-04-12T01:43:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -325,7 +325,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-09-05T16:11:13Z",
"updated_at": "2024-09-10T20:12:53Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1981,
"watchers_count": 1981,
"stargazers_count": 1982,
"watchers_count": 1982,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1981,
"watchers": 1982,
"score": 0,
"subscribers_count": 36
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-09-05T16:11:13Z",
"updated_at": "2024-09-10T20:12:53Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1981,
"watchers_count": 1981,
"stargazers_count": 1982,
"watchers_count": 1982,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1981,
"watchers": 1982,
"score": 0,
"subscribers_count": 36
},

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-09-05T16:11:13Z",
"updated_at": "2024-09-10T20:12:53Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1981,
"watchers_count": 1981,
"stargazers_count": 1982,
"watchers_count": 1982,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1981,
"watchers": 1982,
"score": 0,
"subscribers_count": 36
},

View file

@ -13,8 +13,8 @@
"description": " CVE-2018-0834 aab\/aar",
"fork": false,
"created_at": "2024-09-09T21:06:35Z",
"updated_at": "2024-09-10T00:39:52Z",
"pushed_at": "2024-09-09T21:08:08Z",
"updated_at": "2024-09-10T21:59:44Z",
"pushed_at": "2024-09-10T21:59:41Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -73,10 +73,10 @@
"description": "ASUS wifi router RCE vulnerability",
"fork": false,
"created_at": "2024-07-03T02:39:25Z",
"updated_at": "2024-09-10T17:25:32Z",
"updated_at": "2024-09-10T22:33:00Z",
"pushed_at": "2024-09-09T13:34:21Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -557,10 +557,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-09-05T16:11:13Z",
"updated_at": "2024-09-10T20:12:53Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1981,
"watchers_count": 1981,
"stargazers_count": 1982,
"watchers_count": 1982,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -590,7 +590,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1981,
"watchers": 1982,
"score": 0,
"subscribers_count": 36
},

View file

@ -28,5 +28,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 855482583,
"name": "CVE-2019-0567-MS-Edge",
"full_name": "NatteeSetobol\/CVE-2019-0567-MS-Edge",
"owner": {
"login": "NatteeSetobol",
"id": 6789925,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6789925?v=4",
"html_url": "https:\/\/github.com\/NatteeSetobol"
},
"html_url": "https:\/\/github.com\/NatteeSetobol\/CVE-2019-0567-MS-Edge",
"description": "My proof of concept for CVE-2019 Microsoft-Edge",
"fork": false,
"created_at": "2024-09-11T00:04:59Z",
"updated_at": "2024-09-11T00:08:42Z",
"pushed_at": "2024-09-11T00:08:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -468,7 +468,7 @@
"forks": 29,
"watchers": 113,
"score": 0,
"subscribers_count": 8
"subscribers_count": 7
},
{
"id": 233609919,

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-09-05T16:11:13Z",
"updated_at": "2024-09-10T20:12:53Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1981,
"watchers_count": 1981,
"stargazers_count": 1982,
"watchers_count": 1982,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1981,
"watchers": 1982,
"score": 0,
"subscribers_count": 36
}

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-09-05T16:11:13Z",
"updated_at": "2024-09-10T20:12:53Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1981,
"watchers_count": 1981,
"stargazers_count": 1982,
"watchers_count": 1982,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1981,
"watchers": 1982,
"score": 0,
"subscribers_count": 36
},

View file

@ -103,10 +103,10 @@
"description": null,
"fork": false,
"created_at": "2024-04-16T13:45:35Z",
"updated_at": "2024-09-10T14:12:34Z",
"updated_at": "2024-09-10T22:24:48Z",
"pushed_at": "2024-04-17T04:44:46Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Exploit code for CVE-2021-1961",
"fork": false,
"created_at": "2022-09-03T13:31:13Z",
"updated_at": "2024-05-07T17:52:18Z",
"updated_at": "2024-09-10T23:47:58Z",
"pushed_at": "2022-09-07T11:47:56Z",
"stargazers_count": 104,
"watchers_count": 104,
"stargazers_count": 105,
"watchers_count": 105,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 104,
"watchers": 105,
"score": 0,
"subscribers_count": 8
}

View file

@ -1268,10 +1268,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2024-09-10T02:56:20Z",
"updated_at": "2024-09-10T23:11:20Z",
"pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 794,
"watchers_count": 794,
"stargazers_count": 795,
"watchers_count": 795,
"has_discussions": false,
"forks_count": 111,
"allow_forking": true,
@ -1285,7 +1285,7 @@
],
"visibility": "public",
"forks": 111,
"watchers": 794,
"watchers": 795,
"score": 0,
"subscribers_count": 11
},

View file

@ -2127,10 +2127,10 @@
"description": "A Fullstack Academy Cybersecurity project examining the full cycle of the Follina (CVE-2022-30190) vulnerability, from exploit to detection and defense.",
"fork": false,
"created_at": "2022-08-01T16:47:50Z",
"updated_at": "2022-08-05T16:10:38Z",
"updated_at": "2024-09-10T23:02:11Z",
"pushed_at": "2022-08-05T16:16:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -2139,7 +2139,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
"fork": false,
"created_at": "2022-09-12T19:22:44Z",
"updated_at": "2024-09-06T11:46:06Z",
"updated_at": "2024-09-10T18:59:57Z",
"pushed_at": "2022-09-19T19:41:34Z",
"stargazers_count": 287,
"watchers_count": 287,
"stargazers_count": 288,
"watchers_count": 288,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 287,
"watchers": 288,
"score": 0,
"subscribers_count": 6
},

View file

@ -78,13 +78,13 @@
"stargazers_count": 380,
"watchers_count": 380,
"has_discussions": false,
"forks_count": 65,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 65,
"forks": 62,
"watchers": 380,
"score": 0,
"subscribers_count": 4

View file

@ -13,10 +13,10 @@
"description": "This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220",
"fork": false,
"created_at": "2024-07-07T15:08:30Z",
"updated_at": "2024-09-07T01:57:07Z",
"updated_at": "2024-09-10T21:17:54Z",
"pushed_at": "2024-07-27T00:19:17Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-09-10T16:29:38Z",
"updated_at": "2024-09-10T20:06:25Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2234,
"watchers_count": 2234,
"stargazers_count": 2235,
"watchers_count": 2235,
"has_discussions": false,
"forks_count": 295,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 295,
"watchers": 2234,
"watchers": 2235,
"score": 0,
"subscribers_count": 23
},

View file

@ -50,10 +50,10 @@
"description": "CVE-2024-25641 - RCE Automated Exploit - Cacti 1.2.26",
"fork": false,
"created_at": "2024-08-27T01:19:25Z",
"updated_at": "2024-09-03T14:49:19Z",
"updated_at": "2024-09-10T20:08:19Z",
"pushed_at": "2024-08-28T18:46:58Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -62,7 +62,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "LPE of CVE-2024-26230",
"fork": false,
"created_at": "2024-08-28T16:31:26Z",
"updated_at": "2024-09-10T07:50:25Z",
"updated_at": "2024-09-10T22:24:49Z",
"pushed_at": "2024-09-01T07:03:46Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 1
}

View file

@ -987,13 +987,13 @@
"stargazers_count": 3481,
"watchers_count": 3481,
"has_discussions": false,
"forks_count": 232,
"forks_count": 233,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 232,
"forks": 233,
"watchers": 3481,
"score": 0,
"subscribers_count": 39

View file

@ -163,10 +163,10 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-09-06T07:04:29Z",
"updated_at": "2024-09-10T21:21:15Z",
"pushed_at": "2024-06-22T15:13:52Z",
"stargazers_count": 202,
"watchers_count": 202,
"stargazers_count": 204,
"watchers_count": 204,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 202,
"watchers": 204,
"score": 0,
"subscribers_count": 4
},

View file

@ -2833,10 +2833,10 @@
"description": "This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, and ports. The script can also read addresses from a file.",
"fork": false,
"created_at": "2024-08-28T13:28:08Z",
"updated_at": "2024-09-04T16:27:40Z",
"updated_at": "2024-09-10T23:25:28Z",
"pushed_at": "2024-08-29T14:52:33Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -2845,7 +2845,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},

View file

@ -578,7 +578,7 @@
### CVE-2024-3177 (2024-04-22)
<code>A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service accounts secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets annotation are used together with containers, init containers, and ephemeral containers with the envFrom field populated.\n\n
<code>A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service accounts secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets annotation are used together with containers, init containers, and ephemeral containers with the envFrom field populated.
</code>
- [Cgv-Dev/Metasploit-Module-TFM](https://github.com/Cgv-Dev/Metasploit-Module-TFM)
@ -4729,7 +4729,7 @@
### CVE-2024-44815 (2024-09-10)
<code>An issue in Hathway Skyworth Router CM5100 v.4.1.1.24 allows a physically proximate attacker to obtain sensitive information via SPI flash Firmware W25Q64JV
<code>Vulnerability in Hathway Skyworth Router CM5100 v.4.1.1.24 allows a physically proximate attacker to obtain user credentials via SPI flash Firmware W25Q64JV.
</code>
- [nitinronge91/Extracting-User-credentials-For-Web-portal-and-WiFi-AP-For-Hathway-Router-CVE-2024-44815-](https://github.com/nitinronge91/Extracting-User-credentials-For-Web-portal-and-WiFi-AP-For-Hathway-Router-CVE-2024-44815-)
@ -31632,6 +31632,7 @@
</code>
- [NatteeSetobol/Chakra-CVE-2019-0567](https://github.com/NatteeSetobol/Chakra-CVE-2019-0567)
- [NatteeSetobol/CVE-2019-0567-MS-Edge](https://github.com/NatteeSetobol/CVE-2019-0567-MS-Edge)
### CVE-2019-0604 (2019-03-06)