Auto Update 2024/08/02 18:29:09

This commit is contained in:
motikan2010-bot 2024-08-03 03:29:09 +09:00
parent 6f4cf1b4bc
commit 5ba6d6d75e
39 changed files with 306 additions and 135 deletions

View file

@ -57,7 +57,7 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 105
"subscribers_count": 108
},
{
"id": 7564614,

View file

@ -27,6 +27,6 @@
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 107
"subscribers_count": 110
}
]

View file

@ -27,6 +27,6 @@
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 106
"subscribers_count": 109
}
]

View file

@ -417,7 +417,7 @@
"forks": 84,
"watchers": 158,
"score": 0,
"subscribers_count": 8
"subscribers_count": 7
},
{
"id": 18613807,

View file

@ -73,10 +73,10 @@
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-04-17T08:10:07Z",
"updated_at": "2024-07-27T20:22:47Z",
"updated_at": "2024-08-02T16:23:04Z",
"pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 720,
"watchers_count": 720,
"stargazers_count": 722,
"watchers_count": 722,
"has_discussions": false,
"forks_count": 263,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 263,
"watchers": 720,
"watchers": 722,
"score": 0,
"subscribers_count": 48
},

View file

@ -13,10 +13,10 @@
"description": "Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11\/12",
"fork": false,
"created_at": "2018-03-12T16:44:12Z",
"updated_at": "2024-06-28T07:51:23Z",
"updated_at": "2024-08-02T14:13:18Z",
"pushed_at": "2022-10-18T08:53:13Z",
"stargazers_count": 96,
"watchers_count": 96,
"stargazers_count": 97,
"watchers_count": 97,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 96,
"watchers": 97,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": " double-free bug in WhatsApp exploit poc",
"fork": false,
"created_at": "2019-10-03T09:26:24Z",
"updated_at": "2024-06-07T13:28:46Z",
"updated_at": "2024-08-02T18:08:28Z",
"pushed_at": "2021-03-19T17:23:25Z",
"stargazers_count": 268,
"watchers_count": 268,
"stargazers_count": 269,
"watchers_count": 269,
"has_discussions": false,
"forks_count": 78,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 78,
"watchers": 268,
"watchers": 269,
"score": 0,
"subscribers_count": 16
},
@ -43,10 +43,10 @@
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
"fork": false,
"created_at": "2019-10-04T14:43:57Z",
"updated_at": "2024-07-03T20:15:08Z",
"updated_at": "2024-08-02T18:08:30Z",
"pushed_at": "2019-11-30T10:28:01Z",
"stargazers_count": 201,
"watchers_count": 201,
"stargazers_count": 202,
"watchers_count": 202,
"has_discussions": false,
"forks_count": 106,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 106,
"watchers": 201,
"watchers": 202,
"score": 0,
"subscribers_count": 10
},

View file

@ -103,10 +103,10 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2024-08-01T15:44:33Z",
"updated_at": "2024-08-02T14:10:44Z",
"pushed_at": "2024-06-16T15:35:20Z",
"stargazers_count": 943,
"watchers_count": 943,
"stargazers_count": 944,
"watchers_count": 944,
"has_discussions": false,
"forks_count": 179,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 179,
"watchers": 943,
"watchers": 944,
"score": 0,
"subscribers_count": 18
},

View file

@ -13,10 +13,10 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2024-06-28T07:58:05Z",
"updated_at": "2024-08-02T17:56:40Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 715,
"watchers_count": 715,
"stargazers_count": 714,
"watchers_count": 714,
"has_discussions": false,
"forks_count": 175,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 175,
"watchers": 715,
"watchers": 714,
"score": 0,
"subscribers_count": 19
},

View file

@ -13,10 +13,10 @@
"description": "Double-Free BUG in WhatsApp exploit poc.",
"fork": false,
"created_at": "2020-05-10T15:25:59Z",
"updated_at": "2024-07-16T13:09:37Z",
"updated_at": "2024-08-02T18:08:26Z",
"pushed_at": "2020-05-10T15:32:54Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 38,
"watchers": 90,
"watchers": 91,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": "Early 2019 - late 2020. R.I.P. CVE-2020-12928 https:\/\/h0mbre.github.io\/RyzenMaster_CVE\/#",
"fork": false,
"created_at": "2020-11-10T13:08:21Z",
"updated_at": "2024-07-08T15:20:06Z",
"updated_at": "2024-08-02T17:56:42Z",
"pushed_at": "2021-02-14T15:08:01Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 47,
"watchers": 46,
"score": 0,
"subscribers_count": 5
}

View file

@ -43,10 +43,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2024-07-27T01:58:42Z",
"updated_at": "2024-08-02T18:15:07Z",
"pushed_at": "2023-07-20T10:51:42Z",
"stargazers_count": 1713,
"watchers_count": 1713,
"stargazers_count": 1712,
"watchers_count": 1712,
"has_discussions": false,
"forks_count": 359,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 359,
"watchers": 1713,
"watchers": 1712,
"score": 0,
"subscribers_count": 87
},

View file

@ -13,10 +13,10 @@
"description": "Hacking Artifactory with server side template injection",
"fork": false,
"created_at": "2020-03-11T13:56:43Z",
"updated_at": "2023-11-13T23:45:39Z",
"updated_at": "2024-08-02T13:41:31Z",
"pushed_at": "2020-03-12T06:55:39Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 15,
"watchers": 50,
"watchers": 51,
"score": 0,
"subscribers_count": 4
}

View file

@ -48,13 +48,13 @@
"stargazers_count": 240,
"watchers_count": 240,
"has_discussions": false,
"forks_count": 74,
"forks_count": 75,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 74,
"forks": 75,
"watchers": 240,
"score": 0,
"subscribers_count": 6

View file

@ -315,8 +315,8 @@
"description": "Reappear-CVE-2022-21449-TLS-PoC",
"fork": false,
"created_at": "2024-08-01T03:27:17Z",
"updated_at": "2024-08-02T09:06:10Z",
"pushed_at": "2024-08-02T09:06:08Z",
"updated_at": "2024-08-02T16:45:30Z",
"pushed_at": "2024-08-02T16:45:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability",
"fork": false,
"created_at": "2022-08-09T15:53:48Z",
"updated_at": "2024-08-01T15:57:23Z",
"updated_at": "2024-08-02T16:54:09Z",
"pushed_at": "2023-09-27T06:44:27Z",
"stargazers_count": 285,
"watchers_count": 285,
"stargazers_count": 286,
"watchers_count": 286,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 59,
"watchers": 285,
"watchers": 286,
"score": 0,
"subscribers_count": 11
},

View file

@ -616,10 +616,10 @@
"description": null,
"fork": false,
"created_at": "2022-06-03T08:51:44Z",
"updated_at": "2024-06-13T21:25:36Z",
"updated_at": "2024-08-02T13:01:19Z",
"pushed_at": "2022-06-03T08:52:06Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -628,7 +628,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 2
},

View file

@ -150,7 +150,7 @@
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 29,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -164,7 +164,7 @@
"text4shell"
],
"visibility": "public",
"forks": 29,
"forks": 30,
"watchers": 76,
"score": 0,
"subscribers_count": 1

32
2023/CVE-2023-22622.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 774948865,
"name": "CVE-2023-22622",
"full_name": "michael-david-fry\/CVE-2023-22622",
"owner": {
"login": "michael-david-fry",
"id": 4213469,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4213469?v=4",
"html_url": "https:\/\/github.com\/michael-david-fry"
},
"html_url": "https:\/\/github.com\/michael-david-fry\/CVE-2023-22622",
"description": "Python Script that will DoS a WP server that is utilizing WP-CRON",
"fork": false,
"created_at": "2024-03-20T13:48:48Z",
"updated_at": "2024-08-02T13:26:56Z",
"pushed_at": "2024-08-02T13:26:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -74,6 +74,36 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 661062372,
"name": "CVE-2023-27372",
"full_name": "Jhonsonwannaa\/CVE-2023-27372",
"owner": {
"login": "Jhonsonwannaa",
"id": 114837630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114837630?v=4",
"html_url": "https:\/\/github.com\/Jhonsonwannaa"
},
"html_url": "https:\/\/github.com\/Jhonsonwannaa\/CVE-2023-27372",
"description": "spip",
"fork": false,
"created_at": "2023-07-01T17:08:36Z",
"updated_at": "2024-08-02T12:55:02Z",
"pushed_at": "2024-08-02T12:54:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 662629965,
"name": "CVE-2023-27372-PoC",

View file

@ -13,10 +13,10 @@
"description": "Microsoft SharePoint Server Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2023-09-26T16:18:41Z",
"updated_at": "2024-08-02T07:41:45Z",
"updated_at": "2024-08-02T14:08:27Z",
"pushed_at": "2023-09-26T19:04:21Z",
"stargazers_count": 216,
"watchers_count": 216,
"stargazers_count": 217,
"watchers_count": 217,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 31,
"watchers": 216,
"watchers": 217,
"score": 0,
"subscribers_count": 4
},
@ -50,10 +50,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-30T23:17:04Z",
"updated_at": "2024-06-21T00:11:34Z",
"updated_at": "2024-08-02T14:08:31Z",
"pushed_at": "2023-10-10T19:00:30Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -62,7 +62,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 48,
"watchers": 49,
"score": 0,
"subscribers_count": 2
},

View file

@ -28,5 +28,35 @@
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 837227856,
"name": "CVE-2023-50564",
"full_name": "ipuig\/CVE-2023-50564",
"owner": {
"login": "ipuig",
"id": 109107529,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109107529?v=4",
"html_url": "https:\/\/github.com\/ipuig"
},
"html_url": "https:\/\/github.com\/ipuig\/CVE-2023-50564",
"description": "CVE-2023-50564 PoC",
"fork": false,
"created_at": "2024-08-02T13:37:39Z",
"updated_at": "2024-08-02T14:03:32Z",
"pushed_at": "2024-08-02T14:01:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-08-02T08:45:28Z",
"updated_at": "2024-08-02T16:35:12Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2199,
"watchers_count": 2199,
"stargazers_count": 2200,
"watchers_count": 2200,
"has_discussions": false,
"forks_count": 288,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 288,
"watchers": 2199,
"watchers": 2200,
"score": 0,
"subscribers_count": 23
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-21006 exp",
"fork": false,
"created_at": "2024-07-02T06:25:14Z",
"updated_at": "2024-08-02T09:31:21Z",
"updated_at": "2024-08-02T15:58:57Z",
"pushed_at": "2024-07-29T19:39:15Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
"fork": false,
"created_at": "2024-04-13T05:53:02Z",
"updated_at": "2024-07-30T23:08:25Z",
"updated_at": "2024-08-02T14:48:29Z",
"pushed_at": "2024-04-16T21:00:14Z",
"stargazers_count": 248,
"watchers_count": 248,
"stargazers_count": 249,
"watchers_count": 249,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 248,
"watchers": 249,
"score": 0,
"subscribers_count": 3
},
@ -163,12 +163,12 @@
"description": "Windows AppLocker Driver (appid.sys) LPE",
"fork": false,
"created_at": "2024-07-29T13:18:06Z",
"updated_at": "2024-08-02T11:36:50Z",
"updated_at": "2024-08-02T16:38:22Z",
"pushed_at": "2024-07-29T13:29:59Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -179,8 +179,8 @@
"windowd"
],
"visibility": "public",
"forks": 2,
"watchers": 5,
"forks": 4,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "PoC and Detection for CVE-2024-21626",
"fork": false,
"created_at": "2024-02-01T15:28:37Z",
"updated_at": "2024-07-17T13:46:35Z",
"updated_at": "2024-08-02T13:13:35Z",
"pushed_at": "2024-02-06T16:09:05Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 65,
"watchers": 66,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Example exploitable scenarios for CVE-2024-22243 affecting the Spring framework (open redirect & SSRF).",
"fork": false,
"created_at": "2024-02-21T12:55:22Z",
"updated_at": "2024-05-21T05:07:10Z",
"updated_at": "2024-08-02T17:18:27Z",
"pushed_at": "2024-05-20T13:15:00Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -108,7 +108,7 @@
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -120,7 +120,7 @@
"poc"
],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 11,
"score": 0,
"subscribers_count": 1
@ -605,13 +605,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -1813,10 +1813,10 @@
"description": "GNU IFUNC is the real culprit behind CVE-2024-3094",
"fork": false,
"created_at": "2024-07-05T18:36:16Z",
"updated_at": "2024-08-01T13:16:39Z",
"updated_at": "2024-08-02T13:18:24Z",
"pushed_at": "2024-07-25T19:17:59Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1840,7 +1840,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 2
}

View file

@ -73,10 +73,10 @@
"description": "Exploit PoC for CVE-2024-32002",
"fork": false,
"created_at": "2024-05-17T19:33:08Z",
"updated_at": "2024-08-01T13:27:05Z",
"updated_at": "2024-08-02T15:55:18Z",
"pushed_at": "2024-05-19T07:12:00Z",
"stargazers_count": 477,
"watchers_count": 477,
"stargazers_count": 478,
"watchers_count": 478,
"has_discussions": false,
"forks_count": 141,
"allow_forking": true,
@ -90,7 +90,7 @@
],
"visibility": "public",
"forks": 141,
"watchers": 477,
"watchers": 478,
"score": 0,
"subscribers_count": 3
},
@ -1741,5 +1741,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 837339196,
"name": "CVE-2024-32002",
"full_name": "chrisWalker11\/CVE-2024-32002",
"owner": {
"login": "chrisWalker11",
"id": 51098965,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51098965?v=4",
"html_url": "https:\/\/github.com\/chrisWalker11"
},
"html_url": "https:\/\/github.com\/chrisWalker11\/CVE-2024-32002",
"description": null,
"fork": false,
"created_at": "2024-08-02T18:30:01Z",
"updated_at": "2024-08-02T18:33:39Z",
"pushed_at": "2024-08-02T18:33:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -673,10 +673,10 @@
"description": "Python script to check Palo Alto firewalls for CVE-2024-3400 exploit attempts",
"fork": false,
"created_at": "2024-04-18T16:45:51Z",
"updated_at": "2024-04-19T12:23:40Z",
"updated_at": "2024-08-02T15:51:45Z",
"pushed_at": "2024-04-18T18:06:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -693,7 +693,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-34102: Unauthenticated Magento XXE",
"fork": false,
"created_at": "2024-06-27T18:10:13Z",
"updated_at": "2024-07-29T04:29:09Z",
"updated_at": "2024-08-02T15:39:05Z",
"pushed_at": "2024-07-29T04:29:07Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},

View file

@ -230,10 +230,10 @@
"description": "GeoServer Remote Code Execution",
"fork": false,
"created_at": "2024-07-30T18:43:40Z",
"updated_at": "2024-08-02T10:08:34Z",
"pushed_at": "2024-08-01T14:50:30Z",
"stargazers_count": 50,
"watchers_count": 50,
"updated_at": "2024-08-02T17:05:54Z",
"pushed_at": "2024-08-02T14:57:26Z",
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -242,7 +242,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 50,
"watchers": 51,
"score": 0,
"subscribers_count": 1
},

32
2024/CVE-2024-37085.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 837225608,
"name": "CVE-2024-37085",
"full_name": "mahmutaymahmutay\/CVE-2024-37085",
"owner": {
"login": "mahmutaymahmutay",
"id": 171496549,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171496549?v=4",
"html_url": "https:\/\/github.com\/mahmutaymahmutay"
},
"html_url": "https:\/\/github.com\/mahmutaymahmutay\/CVE-2024-37085",
"description": "Vulnerability Scanner for CVE-2024-37085 and Exploits ( For Educational Purpose only)",
"fork": false,
"created_at": "2024-08-02T13:31:59Z",
"updated_at": "2024-08-02T13:45:36Z",
"pushed_at": "2024-08-02T13:45:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -138,7 +138,7 @@
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 8,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -159,7 +159,7 @@
"sftp"
],
"visibility": "public",
"forks": 8,
"forks": 7,
"watchers": 52,
"score": 0,
"subscribers_count": 2

View file

@ -13,19 +13,19 @@
"description": "CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow",
"fork": false,
"created_at": "2024-07-12T10:32:37Z",
"updated_at": "2024-08-01T01:52:43Z",
"updated_at": "2024-08-02T15:39:09Z",
"pushed_at": "2024-07-13T10:46:32Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 19,
"forks": 7,
"watchers": 20,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-5009 : WhatsUp Gold SetAdminPassword Privilege Escalation",
"fork": false,
"created_at": "2024-07-09T16:56:49Z",
"updated_at": "2024-07-12T00:51:11Z",
"updated_at": "2024-08-02T15:38:52Z",
"pushed_at": "2024-07-09T17:14:52Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -260,12 +260,12 @@
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
"fork": false,
"created_at": "2024-07-01T20:33:20Z",
"updated_at": "2024-07-31T20:01:07Z",
"updated_at": "2024-08-02T17:26:00Z",
"pushed_at": "2024-07-14T09:58:48Z",
"stargazers_count": 424,
"watchers_count": 424,
"stargazers_count": 426,
"watchers_count": 426,
"has_discussions": false,
"forks_count": 84,
"forks_count": 85,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -277,8 +277,8 @@
"redteam"
],
"visibility": "public",
"forks": 84,
"watchers": 424,
"forks": 85,
"watchers": 426,
"score": 0,
"subscribers_count": 6
},

View file

@ -2944,6 +2944,7 @@
- [charlesgargasson/CVE-2024-32002](https://github.com/charlesgargasson/CVE-2024-32002)
- [NishanthAnand21/CVE-2024-32002-PoC](https://github.com/NishanthAnand21/CVE-2024-32002-PoC)
- [tiyeume25112004/CVE-2024-32002](https://github.com/tiyeume25112004/CVE-2024-32002)
- [chrisWalker11/CVE-2024-32002](https://github.com/chrisWalker11/CVE-2024-32002)
### CVE-2024-32004 (2024-05-14)
@ -3478,6 +3479,13 @@
- [CERTologists/-CVE-2024-37081-POC](https://github.com/CERTologists/-CVE-2024-37081-POC)
- [CERTologists/Modified-CVE-2024-37081-POC](https://github.com/CERTologists/Modified-CVE-2024-37081-POC)
### CVE-2024-37085 (2024-06-25)
<code>VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
</code>
- [mahmutaymahmutay/CVE-2024-37085](https://github.com/mahmutaymahmutay/CVE-2024-37085)
### CVE-2024-37147 (2024-07-10)
<code>GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An authenticated user can attach a document to any item, even if the user has no write access on it. Upgrade to 10.0.16.
@ -5917,6 +5925,13 @@
- [sofianeelhor/CVE-2023-22621-POC](https://github.com/sofianeelhor/CVE-2023-22621-POC)
### CVE-2023-22622 (2023-01-05)
<code>WordPress through 6.1.1 depends on unpredictable client visits to cause wp-cron.php execution and the resulting security updates, and the source code describes &quot;the scenario where a site may not receive enough visits to execute scheduled tasks in a timely manner,&quot; but neither the installation guide nor the security guide mentions this default behavior, or alerts the user about security risks on installations with very few visits.
</code>
- [michael-david-fry/CVE-2023-22622](https://github.com/michael-david-fry/CVE-2023-22622)
### CVE-2023-22726 (2023-01-20)
<code>act is a project which allows for local running of github actions. The artifact server that stores artifacts from Github Action runs does not sanitize path inputs. This allows an attacker to download and overwrite arbitrary files on the host from a Github Action. This issue may lead to privilege escalation. The /upload endpoint is vulnerable to path traversal as filepath is user controlled, and ultimately flows into os.Mkdir and os.Open. The /artifact endpoint is vulnerable to path traversal as the path is variable is user controlled, and the specified file is ultimately returned by the server. This has been addressed in version 0.2.40. Users are advised to upgrade. Users unable to upgrade may, during implementation of Open and OpenAtEnd for FS, ensure to use ValidPath() to check against path traversal or clean the user-provided paths manually.
@ -6714,6 +6729,7 @@
- [nuts7/CVE-2023-27372](https://github.com/nuts7/CVE-2023-27372)
- [Chocapikk/CVE-2023-27372](https://github.com/Chocapikk/CVE-2023-27372)
- [Jhonsonwannaa/CVE-2023-27372](https://github.com/Jhonsonwannaa/CVE-2023-27372)
- [0SPwn/CVE-2023-27372-PoC](https://github.com/0SPwn/CVE-2023-27372-PoC)
- [izzz0/CVE-2023-27372-POC](https://github.com/izzz0/CVE-2023-27372-POC)
- [ThatNotEasy/CVE-2023-27372](https://github.com/ThatNotEasy/CVE-2023-27372)
@ -11644,6 +11660,7 @@
</code>
- [Rai2en/CVE-2023-50564_Pluck-v4.7.18_PoC](https://github.com/Rai2en/CVE-2023-50564_Pluck-v4.7.18_PoC)
- [ipuig/CVE-2023-50564](https://github.com/ipuig/CVE-2023-50564)
### CVE-2023-50596
- [chandraprarikraj/CVE-2023-50596](https://github.com/chandraprarikraj/CVE-2023-50596)