Auto Update 2024/05/21 18:29:07

This commit is contained in:
motikan2010-bot 2024-05-22 03:29:07 +09:00
parent df0c41a14b
commit 620456ee1d
36 changed files with 405 additions and 166 deletions

View file

@ -110,7 +110,7 @@
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -133,7 +133,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 2

View file

@ -58,5 +58,35 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 803901018,
"name": "CVE-2013-3900",
"full_name": "Securenetology\/CVE-2013-3900",
"owner": {
"login": "Securenetology",
"id": 89155495,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89155495?v=4",
"html_url": "https:\/\/github.com\/Securenetology"
},
"html_url": "https:\/\/github.com\/Securenetology\/CVE-2013-3900",
"description": null,
"fork": false,
"created_at": "2024-05-21T15:19:49Z",
"updated_at": "2024-05-21T15:20:46Z",
"pushed_at": "2024-05-21T15:20:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -327,6 +327,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -786,6 +786,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -403,10 +403,10 @@
"description": "WebLogic Insecure Deserialization - CVE-2019-2725 payload builder & exploit ",
"fork": false,
"created_at": "2019-08-23T01:42:57Z",
"updated_at": "2023-11-17T06:40:57Z",
"updated_at": "2024-05-21T13:28:54Z",
"pushed_at": "2019-09-26T05:46:14Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -415,7 +415,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 47,
"watchers": 48,
"score": 0,
"subscribers_count": 6
},

View file

@ -572,6 +572,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -43,10 +43,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2024-05-19T14:54:32Z",
"updated_at": "2024-05-21T12:35:07Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1798,
"watchers_count": 1798,
"stargazers_count": 1799,
"watchers_count": 1799,
"has_discussions": false,
"forks_count": 580,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 580,
"watchers": 1798,
"watchers": 1799,
"score": 0,
"subscribers_count": 44
},

View file

@ -236,10 +236,10 @@
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
"fork": false,
"created_at": "2021-07-05T20:13:49Z",
"updated_at": "2024-05-21T07:56:07Z",
"updated_at": "2024-05-21T12:47:20Z",
"pushed_at": "2024-05-19T16:25:52Z",
"stargazers_count": 759,
"watchers_count": 759,
"stargazers_count": 761,
"watchers_count": 761,
"has_discussions": false,
"forks_count": 117,
"allow_forking": true,
@ -248,7 +248,7 @@
"topics": [],
"visibility": "public",
"forks": 117,
"watchers": 759,
"watchers": 761,
"score": 0,
"subscribers_count": 10
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2021-07-27T11:22:21Z",
"updated_at": "2022-04-09T18:27:52Z",
"updated_at": "2024-05-21T15:43:55Z",
"pushed_at": "2022-09-16T17:53:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation",
"fork": false,
"created_at": "2021-07-20T22:16:49Z",
"updated_at": "2024-03-09T22:45:29Z",
"updated_at": "2024-05-21T17:02:49Z",
"pushed_at": "2022-01-16T02:09:46Z",
"stargazers_count": 201,
"watchers_count": 201,
"stargazers_count": 202,
"watchers_count": 202,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 201,
"watchers": 202,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2021-41091",
"fork": false,
"created_at": "2023-05-02T07:25:13Z",
"updated_at": "2024-05-15T15:30:35Z",
"updated_at": "2024-05-21T12:36:35Z",
"pushed_at": "2023-05-20T09:16:34Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 62,
"watchers": 63,
"score": 0,
"subscribers_count": 1
},

View file

@ -857,7 +857,7 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2024-05-10T10:43:29Z",
"updated_at": "2024-05-21T16:33:08Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 925,
"watchers_count": 925,
@ -1268,10 +1268,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2024-05-21T08:48:28Z",
"updated_at": "2024-05-21T14:10:05Z",
"pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 776,
"watchers_count": 776,
"stargazers_count": 777,
"watchers_count": 777,
"has_discussions": false,
"forks_count": 112,
"allow_forking": true,
@ -1285,7 +1285,7 @@
],
"visibility": "public",
"forks": 112,
"watchers": 776,
"watchers": 777,
"score": 0,
"subscribers_count": 11
},
@ -2655,10 +2655,10 @@
"description": "IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-12T13:17:18Z",
"updated_at": "2023-02-26T00:49:44Z",
"updated_at": "2024-05-21T18:02:25Z",
"pushed_at": "2021-12-19T12:42:02Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -2667,7 +2667,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 3
},
@ -11980,7 +11980,7 @@
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -12000,7 +12000,7 @@
"vulnerable"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 7,
"score": 0,
"subscribers_count": 2

View file

@ -1274,7 +1274,7 @@
"fork": false,
"created_at": "2023-04-21T08:15:19Z",
"updated_at": "2023-05-05T13:36:18Z",
"pushed_at": "2024-04-17T18:37:11Z",
"pushed_at": "2024-05-21T18:27:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -193,10 +193,10 @@
"description": "Vulnerabilities Exploitation On Ubuntu 22.04",
"fork": false,
"created_at": "2023-05-16T10:26:10Z",
"updated_at": "2024-04-19T07:24:04Z",
"updated_at": "2024-05-21T15:46:40Z",
"pushed_at": "2023-05-16T10:49:19Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -207,7 +207,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 27,
"watchers": 28,
"score": 0,
"subscribers_count": 1
},

View file

@ -321,10 +321,10 @@
"description": "C# \/ .NET version of CVE-2023-21768",
"fork": false,
"created_at": "2024-05-15T17:42:10Z",
"updated_at": "2024-05-20T05:56:30Z",
"updated_at": "2024-05-21T15:40:36Z",
"pushed_at": "2024-05-18T05:22:16Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -333,7 +333,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 2
}

32
2023/CVE-2023-46694.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 765655083,
"name": "CVE-2023-46694",
"full_name": "invisiblebyte\/CVE-2023-46694",
"owner": {
"login": "invisiblebyte",
"id": 42798162,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42798162?v=4",
"html_url": "https:\/\/github.com\/invisiblebyte"
},
"html_url": "https:\/\/github.com\/invisiblebyte\/CVE-2023-46694",
"description": "CVE-2023-46694 proof-of-concept",
"fork": false,
"created_at": "2024-03-01T11:00:19Z",
"updated_at": "2024-05-21T14:33:08Z",
"pushed_at": "2024-03-01T11:02:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -197,8 +197,8 @@
"description": null,
"fork": false,
"created_at": "2024-01-19T08:11:31Z",
"updated_at": "2024-01-19T08:13:06Z",
"pushed_at": "2024-01-19T08:38:16Z",
"updated_at": "2024-05-21T12:56:29Z",
"pushed_at": "2024-05-21T12:56:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-21T05:22:51Z",
"updated_at": "2024-05-21T09:05:46Z",
"updated_at": "2024-05-21T16:44:01Z",
"pushed_at": "2023-12-18T04:25:00Z",
"stargazers_count": 302,
"watchers_count": 302,
"stargazers_count": 303,
"watchers_count": 303,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 302,
"watchers": 303,
"score": 0,
"subscribers_count": 15
},

View file

@ -13,8 +13,8 @@
"description": "Cookie Information | Free GDPR Consent Solution <= 2.0.22 - Authenticated (Subscriber+) Arbitrary Options Update",
"fork": false,
"created_at": "2024-01-30T10:32:54Z",
"updated_at": "2024-01-30T20:59:57Z",
"pushed_at": "2024-01-30T10:34:57Z",
"updated_at": "2024-05-21T13:58:41Z",
"pushed_at": "2024-05-21T13:58:37Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-05-20T15:41:06Z",
"updated_at": "2024-05-21T13:56:18Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 1937,
"watchers_count": 1937,
"stargazers_count": 1938,
"watchers_count": 1938,
"has_discussions": false,
"forks_count": 240,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 240,
"watchers": 1937,
"watchers": 1938,
"score": 0,
"subscribers_count": 21
},

View file

@ -43,10 +43,10 @@
"description": "PoC and Detection for CVE-2024-21626",
"fork": false,
"created_at": "2024-02-01T15:28:37Z",
"updated_at": "2024-05-10T07:37:39Z",
"updated_at": "2024-05-21T12:53:37Z",
"pushed_at": "2024-02-06T16:09:05Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 62,
"watchers": 63,
"score": 0,
"subscribers_count": 3
},

View file

@ -163,8 +163,8 @@
"description": null,
"fork": false,
"created_at": "2024-01-19T08:11:31Z",
"updated_at": "2024-01-19T08:13:06Z",
"pushed_at": "2024-01-19T08:38:16Z",
"updated_at": "2024-05-21T12:56:29Z",
"pushed_at": "2024-05-21T12:56:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,12 +13,12 @@
"description": "Time Based SQL Injection in Zabbix Server Audit Log --> RCE",
"fork": false,
"created_at": "2024-05-20T03:29:09Z",
"updated_at": "2024-05-21T10:45:01Z",
"updated_at": "2024-05-21T17:28:57Z",
"pushed_at": "2024-05-21T10:30:49Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -28,8 +28,8 @@
"zabbix"
],
"visibility": "public",
"forks": 11,
"watchers": 46,
"forks": 12,
"watchers": 51,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2024-27804",
"fork": false,
"created_at": "2024-05-14T14:17:06Z",
"updated_at": "2024-05-21T11:25:52Z",
"updated_at": "2024-05-21T14:31:41Z",
"pushed_at": "2024-05-14T14:55:23Z",
"stargazers_count": 104,
"watchers_count": 104,
"stargazers_count": 105,
"watchers_count": 105,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 104,
"watchers": 105,
"score": 0,
"subscribers_count": 4
}

View file

@ -149,41 +149,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 798253455,
"name": "CVE-2024-27956",
"full_name": "nancyariah4\/CVE-2024-27956",
"owner": {
"login": "nancyariah4",
"id": 167974334,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167974334?v=4",
"html_url": "https:\/\/github.com\/nancyariah4"
},
"html_url": "https:\/\/github.com\/nancyariah4\/CVE-2024-27956",
"description": "CVE-2024-27956 RCE POC WordPress",
"fork": false,
"created_at": "2024-05-09T12:07:14Z",
"updated_at": "2024-05-13T11:52:50Z",
"pushed_at": "2024-05-13T11:52:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-27956",
"poc",
"rce",
"wordpress"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 800537570,
"name": "WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956",
@ -198,10 +163,10 @@
"description": "WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries",
"fork": false,
"created_at": "2024-05-14T14:21:49Z",
"updated_at": "2024-05-21T12:29:01Z",
"updated_at": "2024-05-21T14:02:16Z",
"pushed_at": "2024-05-18T09:40:01Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -230,7 +195,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 63,
"watchers": 64,
"score": 0,
"subscribers_count": 3
},
@ -263,5 +228,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 803888648,
"name": "CVE-2024-27956",
"full_name": "nancyariah4\/CVE-2024-27956",
"owner": {
"login": "nancyariah4",
"id": 167974334,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167974334?v=4",
"html_url": "https:\/\/github.com\/nancyariah4"
},
"html_url": "https:\/\/github.com\/nancyariah4\/CVE-2024-27956",
"description": "CVE-2024-27956-RCE-POC-Wordpress, Wordpress, CVE-2024-27956-PoC, RCE",
"fork": false,
"created_at": "2024-05-21T14:55:43Z",
"updated_at": "2024-05-21T14:56:35Z",
"pushed_at": "2024-05-21T14:56:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds",
"fork": false,
"created_at": "2024-05-15T13:11:45Z",
"updated_at": "2024-05-20T09:53:02Z",
"updated_at": "2024-05-21T14:32:27Z",
"pushed_at": "2024-05-15T21:40:25Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},
@ -142,8 +142,8 @@
"description": "CVE-2024-29895-CactiRCE-PoC , RCE, POC, CVE-2024-29895",
"fork": false,
"created_at": "2024-05-21T12:30:59Z",
"updated_at": "2024-05-21T12:31:03Z",
"pushed_at": "2024-05-21T12:30:59Z",
"updated_at": "2024-05-21T12:41:52Z",
"pushed_at": "2024-05-21T12:33:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -151,7 +151,12 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"cve-2024-29895",
"cve-2024-29895-cactirce-poc",
"poc",
"rce-exploit"
],
"visibility": "public",
"forks": 0,
"watchers": 0,

View file

@ -1012,10 +1012,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-05-21T07:57:32Z",
"updated_at": "2024-05-21T14:53:34Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3466,
"watchers_count": 3466,
"stargazers_count": 3465,
"watchers_count": 3465,
"has_discussions": false,
"forks_count": 233,
"allow_forking": true,
@ -1024,7 +1024,7 @@
"topics": [],
"visibility": "public",
"forks": 233,
"watchers": 3466,
"watchers": 3465,
"score": 0,
"subscribers_count": 38
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -34,7 +34,7 @@
"threat-intel"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 12,
"score": 0,
"subscribers_count": 1

View file

@ -43,12 +43,12 @@
"description": "Exploit PoC for CVE-2024-32002",
"fork": false,
"created_at": "2024-05-17T19:33:08Z",
"updated_at": "2024-05-21T12:24:08Z",
"updated_at": "2024-05-21T17:03:53Z",
"pushed_at": "2024-05-19T07:12:00Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 83,
"watchers_count": 83,
"has_discussions": false,
"forks_count": 36,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -59,8 +59,8 @@
"rce"
],
"visibility": "public",
"forks": 36,
"watchers": 78,
"forks": 37,
"watchers": 83,
"score": 0,
"subscribers_count": 1
},
@ -83,13 +83,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 3,
"score": 0,
"subscribers_count": 1
@ -145,10 +145,10 @@
"description": "CVE-2024-32002 RCE PoC",
"fork": false,
"created_at": "2024-05-18T15:05:28Z",
"updated_at": "2024-05-21T11:08:26Z",
"updated_at": "2024-05-21T16:30:42Z",
"pushed_at": "2024-05-18T15:12:59Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 68,
"watchers_count": 68,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -161,7 +161,7 @@
],
"visibility": "public",
"forks": 19,
"watchers": 66,
"watchers": 68,
"score": 0,
"subscribers_count": 1
},
@ -719,8 +719,8 @@
"description": "CVE-2024-32002 hook POC",
"fork": false,
"created_at": "2024-05-21T12:31:57Z",
"updated_at": "2024-05-21T12:31:57Z",
"pushed_at": "2024-05-21T12:31:57Z",
"updated_at": "2024-05-21T12:36:15Z",
"pushed_at": "2024-05-21T12:36:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -734,5 +734,65 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 803835949,
"name": "git_rce",
"full_name": "Roronoawjd\/git_rce",
"owner": {
"login": "Roronoawjd",
"id": 105417063,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105417063?v=4",
"html_url": "https:\/\/github.com\/Roronoawjd"
},
"html_url": "https:\/\/github.com\/Roronoawjd\/git_rce",
"description": "CVE-2024-32002 POC",
"fork": false,
"created_at": "2024-05-21T13:19:15Z",
"updated_at": "2024-05-21T13:49:15Z",
"pushed_at": "2024-05-21T13:49:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 803851228,
"name": "CVE-2024-32002-Reverse-Shell",
"full_name": "JJoosh\/CVE-2024-32002-Reverse-Shell",
"owner": {
"login": "JJoosh",
"id": 122099216,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122099216?v=4",
"html_url": "https:\/\/github.com\/JJoosh"
},
"html_url": "https:\/\/github.com\/JJoosh\/CVE-2024-32002-Reverse-Shell",
"description": "Este script demuestra cómo explotar la vulnerabilidad CVE-2024-32002 para obtener una reverse shell, proporcionando acceso remoto al sistema afectado. Úselo con precaución en entornos controlados y solo con fines educativos o de pruebas de seguridad.",
"fork": false,
"created_at": "2024-05-21T13:45:58Z",
"updated_at": "2024-05-21T15:42:18Z",
"pushed_at": "2024-05-21T14:01:26Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -70,5 +70,39 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 803868864,
"name": "CVE-2024-32640-MuraCMS",
"full_name": "nancyariah4\/CVE-2024-32640-MuraCMS",
"owner": {
"login": "nancyariah4",
"id": 167974334,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167974334?v=4",
"html_url": "https:\/\/github.com\/nancyariah4"
},
"html_url": "https:\/\/github.com\/nancyariah4\/CVE-2024-32640-MuraCMS",
"description": "CVE-2024-32640-SQLI-MuraCMS",
"fork": false,
"created_at": "2024-05-21T14:19:01Z",
"updated_at": "2024-05-21T14:21:47Z",
"pushed_at": "2024-05-21T14:19:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-32640-muracms",
"cve-2024-32640-poc",
"cve-2024-32640-sqli-muracms"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,8 +43,8 @@
"description": "Patch your D-Link device affected by CVE-2024-3272 ",
"fork": false,
"created_at": "2024-05-21T08:40:37Z",
"updated_at": "2024-05-21T09:12:24Z",
"pushed_at": "2024-05-21T08:41:52Z",
"updated_at": "2024-05-21T12:37:15Z",
"pushed_at": "2024-05-21T12:37:12Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "(CVE-2024-33559) The XStore theme for WordPress is vulnerable to SQL Injection due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query",
"fork": false,
"created_at": "2024-05-17T04:15:34Z",
"updated_at": "2024-05-17T04:20:32Z",
"updated_at": "2024-05-21T17:18:32Z",
"pushed_at": "2024-05-17T04:20:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,12 +13,12 @@
"description": "This proof-of-concept script demonstrates how to exploit CVE-2024-4323, a memory corruption vulnerability in Fluent Bit, enabling remote code execution.",
"fork": false,
"created_at": "2024-05-20T15:04:13Z",
"updated_at": "2024-05-21T10:58:47Z",
"updated_at": "2024-05-21T15:40:47Z",
"pushed_at": "2024-05-20T15:28:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -26,12 +26,44 @@
"cve-2024-4323",
"cve-2024-4323-exploit-poc",
"exploit",
"exploit-poc"
"exploit-poc",
"fluent-bit",
"rce-exploit"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 803825364,
"name": "CVE-2024-4323",
"full_name": "d0rb\/CVE-2024-4323",
"owner": {
"login": "d0rb",
"id": 10403781,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4",
"html_url": "https:\/\/github.com\/d0rb"
},
"html_url": "https:\/\/github.com\/d0rb\/CVE-2024-4323",
"description": "Critical heap buffer overflow vulnerability in the handle_trace_request and parse_trace_request functions of the Fluent Bit HTTP server.",
"fork": false,
"created_at": "2024-05-21T12:59:16Z",
"updated_at": "2024-05-21T13:15:40Z",
"pushed_at": "2024-05-21T13:15:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
"fork": false,
"created_at": "2024-05-20T10:02:23Z",
"updated_at": "2024-05-21T12:19:39Z",
"updated_at": "2024-05-21T12:44:34Z",
"pushed_at": "2024-05-20T10:18:42Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
@ -43,10 +43,10 @@
"description": "CVE-2024-4367 arbitrary js execution in pdf js",
"fork": false,
"created_at": "2024-05-20T22:56:10Z",
"updated_at": "2024-05-21T11:01:28Z",
"updated_at": "2024-05-21T17:54:42Z",
"pushed_at": "2024-05-20T23:09:43Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 12,
"watchers": 15,
"score": 0,
"subscribers_count": 1
}

32
2024/CVE-2024-4875.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 803866868,
"name": "CVE-2024-4875",
"full_name": "RandomRobbieBF\/CVE-2024-4875",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-4875",
"description": "HT Mega Absolute Addons For Elementor <= 2.5.2 - Missing Authorization to Options Update",
"fork": false,
"created_at": "2024-05-21T14:15:16Z",
"updated_at": "2024-05-21T14:17:24Z",
"pushed_at": "2024-05-21T14:17:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -517,6 +517,7 @@
</code>
- [skilfoy/CVE-2024-4323-Exploit-POC](https://github.com/skilfoy/CVE-2024-4323-Exploit-POC)
- [d0rb/CVE-2024-4323](https://github.com/d0rb/CVE-2024-4323)
### CVE-2024-4352 (2024-05-16)
@ -556,6 +557,13 @@
- [michredteam/CVE-2024-4761](https://github.com/michredteam/CVE-2024-4761)
### CVE-2024-4875 (2024-05-21)
<code>The HT Mega Absolute Addons For Elementor plugin for WordPress is vulnerable to unauthorized modification of data|loss of data due to a missing capability check on the 'ajax_dismiss' function in versions up to, and including, 2.5.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to update options such as users_can_register, which can lead to unauthorized user registration.
</code>
- [RandomRobbieBF/CVE-2024-4875](https://github.com/RandomRobbieBF/CVE-2024-4875)
### CVE-2024-12883
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
@ -1490,7 +1498,11 @@
- [MaherAzzouzi/CVE-2024-26817-amdkfd](https://github.com/MaherAzzouzi/CVE-2024-26817-amdkfd)
### CVE-2024-27130
### CVE-2024-27130 (2024-05-21)
<code>A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute code via a network.\n\nWe have already fixed the vulnerability in the following version:\nQTS 5.1.7.2770 build 20240520 and later\nQuTS hero h5.1.7.2770 build 20240520 and later
</code>
- [watchtowrlabs/CVE-2024-27130](https://github.com/watchtowrlabs/CVE-2024-27130)
- [d0rb/CVE-2024-27130](https://github.com/d0rb/CVE-2024-27130)
@ -1608,9 +1620,9 @@
- [X-Projetion/CVE-2024-27956-WORDPRESS-RCE-PLUGIN](https://github.com/X-Projetion/CVE-2024-27956-WORDPRESS-RCE-PLUGIN)
- [FoxyProxys/CVE-2024-27956](https://github.com/FoxyProxys/CVE-2024-27956)
- [k3ppf0r/CVE-2024-27956](https://github.com/k3ppf0r/CVE-2024-27956)
- [nancyariah4/CVE-2024-27956](https://github.com/nancyariah4/CVE-2024-27956)
- [AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956](https://github.com/AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956)
- [W3BW/CVE-2024-27956-RCE-File-Package](https://github.com/W3BW/CVE-2024-27956-RCE-File-Package)
- [nancyariah4/CVE-2024-27956](https://github.com/nancyariah4/CVE-2024-27956)
### CVE-2024-27971 (2024-05-17)
@ -1920,6 +1932,8 @@
- [jerrydotlam/cve-2024-32002-3](https://github.com/jerrydotlam/cve-2024-32002-3)
- [1mxml/CVE-2024-32002-poc](https://github.com/1mxml/CVE-2024-32002-poc)
- [Roronoawjd/hook](https://github.com/Roronoawjd/hook)
- [Roronoawjd/git_rce](https://github.com/Roronoawjd/git_rce)
- [JJoosh/CVE-2024-32002-Reverse-Shell](https://github.com/JJoosh/CVE-2024-32002-Reverse-Shell)
### CVE-2024-32004 (2024-05-14)
@ -1992,6 +2006,7 @@
### CVE-2024-32640
- [Stuub/CVE-2024-32640-SQLI-MuraCMS](https://github.com/Stuub/CVE-2024-32640-SQLI-MuraCMS)
- [0x3f3c/CVE-2024-32640-SQLI-MuraCMS](https://github.com/0x3f3c/CVE-2024-32640-SQLI-MuraCMS)
- [nancyariah4/CVE-2024-32640-MuraCMS](https://github.com/nancyariah4/CVE-2024-32640-MuraCMS)
### CVE-2024-32709 (2024-04-24)
@ -8839,6 +8854,9 @@
- [RandomRobbieBF/CVE-2023-46615](https://github.com/RandomRobbieBF/CVE-2023-46615)
### CVE-2023-46694
- [invisiblebyte/CVE-2023-46694](https://github.com/invisiblebyte/CVE-2023-46694)
### CVE-2023-46747 (2023-10-26)
<code>\n\n\nUndisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated\n\n
@ -41366,6 +41384,7 @@
- [snoopopsec/vulnerability-CVE-2013-3900](https://github.com/snoopopsec/vulnerability-CVE-2013-3900)
- [CyberCondor/Fix-WinVerifyTrustSignatureValidationVuln](https://github.com/CyberCondor/Fix-WinVerifyTrustSignatureValidationVuln)
- [Securenetology/CVE-2013-3900](https://github.com/Securenetology/CVE-2013-3900)
### CVE-2013-4002 (2013-07-23)