Auto Update 2024/03/15 00:26:31

This commit is contained in:
motikan2010-bot 2024-03-15 09:26:31 +09:00
parent d67e088dd8
commit 6b1381538f
24 changed files with 104 additions and 69 deletions

View file

@ -73,10 +73,10 @@
"description": "kernel exploit",
"fork": false,
"created_at": "2022-02-07T10:52:51Z",
"updated_at": "2023-07-18T09:56:14Z",
"updated_at": "2024-03-14T20:44:36Z",
"pushed_at": "2022-02-07T14:33:56Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2
}

View file

@ -43,10 +43,10 @@
"description": "Working Proof of Concept Exploit for CVE-2018-17463",
"fork": false,
"created_at": "2022-12-28T02:42:59Z",
"updated_at": "2023-09-30T12:14:38Z",
"updated_at": "2024-03-14T20:36:36Z",
"pushed_at": "2022-12-28T02:45:52Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -78,13 +78,13 @@
"stargazers_count": 125,
"watchers_count": 125,
"has_discussions": false,
"forks_count": 34,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 34,
"forks": 35,
"watchers": 125,
"score": 0,
"subscribers_count": 6

View file

@ -27,6 +27,6 @@
"forks": 10,
"watchers": 12,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
}
]

View file

@ -177,7 +177,7 @@
"forks": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 336189382,

View file

@ -29,7 +29,7 @@
"forks": 52,
"watchers": 162,
"score": 0,
"subscribers_count": 5
"subscribers_count": 6
},
{
"id": 243257176,

View file

@ -297,6 +297,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -108,13 +108,13 @@
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 12,
"watchers": 14,
"score": 0,
"subscribers_count": 5

View file

@ -394,6 +394,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 3
}
]

View file

@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-24T11:58:54Z",
"updated_at": "2024-03-09T03:57:46Z",
"updated_at": "2024-03-14T18:35:18Z",
"pushed_at": "2024-01-29T22:03:03Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 56,
"watchers": 57,
"score": 0,
"subscribers_count": 3
},

View file

@ -403,10 +403,10 @@
"description": "Exploit for CVE-2023-22527 - Atlassian Confluence Data Center and Server",
"fork": false,
"created_at": "2024-01-24T04:44:59Z",
"updated_at": "2024-03-05T09:06:48Z",
"updated_at": "2024-03-15T00:11:11Z",
"pushed_at": "2024-03-13T05:48:15Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -418,7 +418,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-24078 for FuguHub \/ BarracudaDrive",
"fork": false,
"created_at": "2023-06-17T03:39:35Z",
"updated_at": "2024-03-08T08:56:00Z",
"updated_at": "2024-03-14T20:48:09Z",
"pushed_at": "2023-06-19T01:21:42Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "HTTP3ONSTEROIDS - A research on CVE-2023-25950 where HAProxy's HTTP\/3 implementation fails to block a malformed HTTP header field name.",
"fork": false,
"created_at": "2023-07-31T23:57:02Z",
"updated_at": "2024-01-03T10:47:57Z",
"updated_at": "2024-03-15T00:11:10Z",
"pushed_at": "2024-02-10T04:30:45Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 2
}

View file

@ -43,10 +43,10 @@
"description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing",
"fork": false,
"created_at": "2023-06-16T20:15:36Z",
"updated_at": "2024-03-04T08:46:29Z",
"updated_at": "2024-03-15T00:19:23Z",
"pushed_at": "2023-06-20T21:32:56Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 118,
"watchers_count": 118,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 117,
"watchers": 118,
"score": 0,
"subscribers_count": 3
},

View file

@ -73,10 +73,10 @@
"description": "CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation",
"fork": false,
"created_at": "2023-05-15T09:39:45Z",
"updated_at": "2024-02-27T00:39:48Z",
"updated_at": "2024-03-15T00:23:00Z",
"pushed_at": "2023-06-05T08:13:19Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -89,7 +89,7 @@
],
"visibility": "public",
"forks": 26,
"watchers": 81,
"watchers": 82,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,19 +13,19 @@
"description": "CVE-2023-34152",
"fork": false,
"created_at": "2023-09-27T03:37:25Z",
"updated_at": "2024-03-01T09:16:37Z",
"updated_at": "2024-03-14T20:52:59Z",
"pushed_at": "2023-09-27T03:41:30Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "POC of CVE-2023-35086 only DoS",
"fork": false,
"created_at": "2023-07-25T01:36:07Z",
"updated_at": "2023-10-18T06:35:26Z",
"updated_at": "2024-03-14T20:17:09Z",
"pushed_at": "2023-07-25T01:42:02Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 42,
"watchers": 41,
"score": 0,
"subscribers_count": 1
}

View file

@ -106,10 +106,10 @@
"description": "This repository presents a proof-of-concept of CVE-2023-7028",
"fork": false,
"created_at": "2024-01-12T18:29:27Z",
"updated_at": "2024-02-28T23:08:03Z",
"updated_at": "2024-03-15T00:11:01Z",
"pushed_at": "2024-01-13T13:50:20Z",
"stargazers_count": 224,
"watchers_count": 224,
"stargazers_count": 225,
"watchers_count": 225,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -118,7 +118,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 224,
"watchers": 225,
"score": 0,
"subscribers_count": 6
},

32
2024/CVE-2024-12883.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 772273310,
"name": "cve-2024-12883",
"full_name": "mhtsec\/cve-2024-12883",
"owner": {
"login": "mhtsec",
"id": 83952182,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83952182?v=4",
"html_url": "https:\/\/github.com\/mhtsec"
},
"html_url": "https:\/\/github.com\/mhtsec\/cve-2024-12883",
"description": null,
"fork": false,
"created_at": "2024-03-14T21:40:40Z",
"updated_at": "2024-03-14T21:40:41Z",
"pushed_at": "2024-03-14T21:40:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "ScreenConnect AuthBypass(cve-2024-1709) --> RCE!!!",
"fork": false,
"created_at": "2024-02-21T09:42:04Z",
"updated_at": "2024-03-13T06:18:47Z",
"updated_at": "2024-03-15T00:09:55Z",
"pushed_at": "2024-02-22T05:22:35Z",
"stargazers_count": 85,
"watchers_count": 85,
"stargazers_count": 86,
"watchers_count": 86,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 85,
"watchers": 86,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,10 +43,10 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2024-03-13T23:27:06Z",
"updated_at": "2024-03-14T21:35:19Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 539,
"watchers_count": 539,
"stargazers_count": 540,
"watchers_count": 540,
"has_discussions": false,
"forks_count": 122,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 122,
"watchers": 539,
"watchers": 540,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": "Proof-of-concept exploit for CVE-2024-25153.",
"fork": false,
"created_at": "2024-03-12T17:26:10Z",
"updated_at": "2024-03-14T14:40:58Z",
"updated_at": "2024-03-14T22:40:17Z",
"pushed_at": "2024-03-13T09:46:07Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 10,
"watchers": 15,
"score": 0,
"subscribers_count": 5
}

View file

@ -81,7 +81,7 @@
"stargazers_count": 92,
"watchers_count": 92,
"has_discussions": false,
"forks_count": 24,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -97,7 +97,7 @@
"teamcity"
],
"visibility": "public",
"forks": 24,
"forks": 25,
"watchers": 92,
"score": 0,
"subscribers_count": 2

View file

@ -151,6 +151,9 @@
### CVE-2024-2432
- [Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP](https://github.com/Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP)
### CVE-2024-12883
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
### CVE-2024-20291 (-)
<code>A vulnerability in the access control list (ACL) programming for port channel subinterfaces of Cisco Nexus 3000 and 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, remote attacker to send traffic that should be blocked through an affected device.\r\n\r This vulnerability is due to incorrect hardware programming that occurs when configuration changes are made to port channel member ports. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access network resources that should be protected by an ACL that was applied on port channel subinterfaces.