From 6b1381538f1935bc1483f2f22e34aa61b846a31e Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Fri, 15 Mar 2024 09:26:31 +0900 Subject: [PATCH] Auto Update 2024/03/15 00:26:31 --- 2015/CVE-2015-1328.json | 8 ++++---- 2018/CVE-2018-17463.json | 8 ++++---- 2018/CVE-2018-19320.json | 4 ++-- 2019/CVE-2019-0211.json | 2 +- 2019/CVE-2019-16113.json | 2 +- 2020/CVE-2020-0688.json | 2 +- 2020/CVE-2020-7961.json | 2 +- 2021/CVE-2021-22986.json | 4 ++-- 2021/CVE-2021-38647.json | 2 +- 2022/CVE-2022-4262.json | 8 ++++---- 2023/CVE-2023-22527.json | 8 ++++---- 2023/CVE-2023-24078.json | 8 ++++---- 2023/CVE-2023-25950.json | 8 ++++---- 2023/CVE-2023-27997.json | 8 ++++---- 2023/CVE-2023-32243.json | 8 ++++---- 2023/CVE-2023-34152.json | 12 ++++++------ 2023/CVE-2023-35086.json | 8 ++++---- 2023/CVE-2023-7028.json | 8 ++++---- 2024/CVE-2024-12883.json | 32 ++++++++++++++++++++++++++++++++ 2024/CVE-2024-1709.json | 8 ++++---- 2024/CVE-2024-21413.json | 8 ++++---- 2024/CVE-2024-25153.json | 8 ++++---- 2024/CVE-2024-27198.json | 4 ++-- README.md | 3 +++ 24 files changed, 104 insertions(+), 69 deletions(-) create mode 100644 2024/CVE-2024-12883.json diff --git a/2015/CVE-2015-1328.json b/2015/CVE-2015-1328.json index be9bdd3bfe..b4a123bb1c 100644 --- a/2015/CVE-2015-1328.json +++ b/2015/CVE-2015-1328.json @@ -73,10 +73,10 @@ "description": "kernel exploit", "fork": false, "created_at": "2022-02-07T10:52:51Z", - "updated_at": "2023-07-18T09:56:14Z", + "updated_at": "2024-03-14T20:44:36Z", "pushed_at": "2022-02-07T14:33:56Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 2 } diff --git a/2018/CVE-2018-17463.json b/2018/CVE-2018-17463.json index 0df2538c27..c1d76be1ac 100644 --- a/2018/CVE-2018-17463.json +++ b/2018/CVE-2018-17463.json @@ -43,10 +43,10 @@ "description": "Working Proof of Concept Exploit for CVE-2018-17463", "fork": false, "created_at": "2022-12-28T02:42:59Z", - "updated_at": "2023-09-30T12:14:38Z", + "updated_at": "2024-03-14T20:36:36Z", "pushed_at": "2022-12-28T02:45:52Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 1 } diff --git a/2018/CVE-2018-19320.json b/2018/CVE-2018-19320.json index b2156e75c6..48492c43e2 100644 --- a/2018/CVE-2018-19320.json +++ b/2018/CVE-2018-19320.json @@ -78,13 +78,13 @@ "stargazers_count": 125, "watchers_count": 125, "has_discussions": false, - "forks_count": 34, + "forks_count": 35, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 34, + "forks": 35, "watchers": 125, "score": 0, "subscribers_count": 6 diff --git a/2019/CVE-2019-0211.json b/2019/CVE-2019-0211.json index 9929da8cea..fa4191dc75 100644 --- a/2019/CVE-2019-0211.json +++ b/2019/CVE-2019-0211.json @@ -27,6 +27,6 @@ "forks": 10, "watchers": 12, "score": 0, - "subscribers_count": 3 + "subscribers_count": 4 } ] \ No newline at end of file diff --git a/2019/CVE-2019-16113.json b/2019/CVE-2019-16113.json index df74fb934e..641fdc42d3 100644 --- a/2019/CVE-2019-16113.json +++ b/2019/CVE-2019-16113.json @@ -177,7 +177,7 @@ "forks": 3, "watchers": 1, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 }, { "id": 336189382, diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json index c4f3a57c39..f04f741592 100644 --- a/2020/CVE-2020-0688.json +++ b/2020/CVE-2020-0688.json @@ -29,7 +29,7 @@ "forks": 52, "watchers": 162, "score": 0, - "subscribers_count": 5 + "subscribers_count": 6 }, { "id": 243257176, diff --git a/2020/CVE-2020-7961.json b/2020/CVE-2020-7961.json index 3d2b27f184..83906d0698 100644 --- a/2020/CVE-2020-7961.json +++ b/2020/CVE-2020-7961.json @@ -297,6 +297,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2021/CVE-2021-22986.json b/2021/CVE-2021-22986.json index 8c916f57be..1b09f3d4a8 100644 --- a/2021/CVE-2021-22986.json +++ b/2021/CVE-2021-22986.json @@ -108,13 +108,13 @@ "stargazers_count": 14, "watchers_count": 14, "has_discussions": false, - "forks_count": 11, + "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 11, + "forks": 12, "watchers": 14, "score": 0, "subscribers_count": 5 diff --git a/2021/CVE-2021-38647.json b/2021/CVE-2021-38647.json index 3b1b2b4066..29abc35f9a 100644 --- a/2021/CVE-2021-38647.json +++ b/2021/CVE-2021-38647.json @@ -394,6 +394,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 3 } ] \ No newline at end of file diff --git a/2022/CVE-2022-4262.json b/2022/CVE-2022-4262.json index 6d656fd35c..2fdd5c1263 100644 --- a/2022/CVE-2022-4262.json +++ b/2022/CVE-2022-4262.json @@ -43,10 +43,10 @@ "description": null, "fork": false, "created_at": "2024-01-24T11:58:54Z", - "updated_at": "2024-03-09T03:57:46Z", + "updated_at": "2024-03-14T18:35:18Z", "pushed_at": "2024-01-29T22:03:03Z", - "stargazers_count": 56, - "watchers_count": 56, + "stargazers_count": 57, + "watchers_count": 57, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 56, + "watchers": 57, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-22527.json b/2023/CVE-2023-22527.json index d3547d1992..0d8610b647 100644 --- a/2023/CVE-2023-22527.json +++ b/2023/CVE-2023-22527.json @@ -403,10 +403,10 @@ "description": "Exploit for CVE-2023-22527 - Atlassian Confluence Data Center and Server", "fork": false, "created_at": "2024-01-24T04:44:59Z", - "updated_at": "2024-03-05T09:06:48Z", + "updated_at": "2024-03-15T00:11:11Z", "pushed_at": "2024-03-13T05:48:15Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -418,7 +418,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-24078.json b/2023/CVE-2023-24078.json index a87a2f9a19..b3fbd3b130 100644 --- a/2023/CVE-2023-24078.json +++ b/2023/CVE-2023-24078.json @@ -13,10 +13,10 @@ "description": "CVE-2023-24078 for FuguHub \/ BarracudaDrive", "fork": false, "created_at": "2023-06-17T03:39:35Z", - "updated_at": "2024-03-08T08:56:00Z", + "updated_at": "2024-03-14T20:48:09Z", "pushed_at": "2023-06-19T01:21:42Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-25950.json b/2023/CVE-2023-25950.json index 2534d763de..ace93cb194 100644 --- a/2023/CVE-2023-25950.json +++ b/2023/CVE-2023-25950.json @@ -13,10 +13,10 @@ "description": "HTTP3ONSTEROIDS - A research on CVE-2023-25950 where HAProxy's HTTP\/3 implementation fails to block a malformed HTTP header field name.", "fork": false, "created_at": "2023-07-31T23:57:02Z", - "updated_at": "2024-01-03T10:47:57Z", + "updated_at": "2024-03-15T00:11:10Z", "pushed_at": "2024-02-10T04:30:45Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -34,7 +34,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-27997.json b/2023/CVE-2023-27997.json index 6f1730c54a..5e7deed143 100644 --- a/2023/CVE-2023-27997.json +++ b/2023/CVE-2023-27997.json @@ -43,10 +43,10 @@ "description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing", "fork": false, "created_at": "2023-06-16T20:15:36Z", - "updated_at": "2024-03-04T08:46:29Z", + "updated_at": "2024-03-15T00:19:23Z", "pushed_at": "2023-06-20T21:32:56Z", - "stargazers_count": 117, - "watchers_count": 117, + "stargazers_count": 118, + "watchers_count": 118, "has_discussions": false, "forks_count": 26, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 26, - "watchers": 117, + "watchers": 118, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-32243.json b/2023/CVE-2023-32243.json index 42cd7060f2..713980cd88 100644 --- a/2023/CVE-2023-32243.json +++ b/2023/CVE-2023-32243.json @@ -73,10 +73,10 @@ "description": "CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation", "fork": false, "created_at": "2023-05-15T09:39:45Z", - "updated_at": "2024-02-27T00:39:48Z", + "updated_at": "2024-03-15T00:23:00Z", "pushed_at": "2023-06-05T08:13:19Z", - "stargazers_count": 81, - "watchers_count": 81, + "stargazers_count": 82, + "watchers_count": 82, "has_discussions": false, "forks_count": 26, "allow_forking": true, @@ -89,7 +89,7 @@ ], "visibility": "public", "forks": 26, - "watchers": 81, + "watchers": 82, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-34152.json b/2023/CVE-2023-34152.json index 229b8177b4..435f3c5365 100644 --- a/2023/CVE-2023-34152.json +++ b/2023/CVE-2023-34152.json @@ -13,19 +13,19 @@ "description": "CVE-2023-34152", "fork": false, "created_at": "2023-09-27T03:37:25Z", - "updated_at": "2024-03-01T09:16:37Z", + "updated_at": "2024-03-14T20:52:59Z", "pushed_at": "2023-09-27T03:41:30Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 4, + "forks": 1, + "watchers": 5, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-35086.json b/2023/CVE-2023-35086.json index 5000794c69..2596e948cb 100644 --- a/2023/CVE-2023-35086.json +++ b/2023/CVE-2023-35086.json @@ -13,10 +13,10 @@ "description": "POC of CVE-2023-35086 only DoS", "fork": false, "created_at": "2023-07-25T01:36:07Z", - "updated_at": "2023-10-18T06:35:26Z", + "updated_at": "2024-03-14T20:17:09Z", "pushed_at": "2023-07-25T01:42:02Z", - "stargazers_count": 42, - "watchers_count": 42, + "stargazers_count": 41, + "watchers_count": 41, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 42, + "watchers": 41, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-7028.json b/2023/CVE-2023-7028.json index 9c6372a677..f1410fb651 100644 --- a/2023/CVE-2023-7028.json +++ b/2023/CVE-2023-7028.json @@ -106,10 +106,10 @@ "description": "This repository presents a proof-of-concept of CVE-2023-7028", "fork": false, "created_at": "2024-01-12T18:29:27Z", - "updated_at": "2024-02-28T23:08:03Z", + "updated_at": "2024-03-15T00:11:01Z", "pushed_at": "2024-01-13T13:50:20Z", - "stargazers_count": 224, - "watchers_count": 224, + "stargazers_count": 225, + "watchers_count": 225, "has_discussions": false, "forks_count": 39, "allow_forking": true, @@ -118,7 +118,7 @@ "topics": [], "visibility": "public", "forks": 39, - "watchers": 224, + "watchers": 225, "score": 0, "subscribers_count": 6 }, diff --git a/2024/CVE-2024-12883.json b/2024/CVE-2024-12883.json new file mode 100644 index 0000000000..fb695eb52d --- /dev/null +++ b/2024/CVE-2024-12883.json @@ -0,0 +1,32 @@ +[ + { + "id": 772273310, + "name": "cve-2024-12883", + "full_name": "mhtsec\/cve-2024-12883", + "owner": { + "login": "mhtsec", + "id": 83952182, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83952182?v=4", + "html_url": "https:\/\/github.com\/mhtsec" + }, + "html_url": "https:\/\/github.com\/mhtsec\/cve-2024-12883", + "description": null, + "fork": false, + "created_at": "2024-03-14T21:40:40Z", + "updated_at": "2024-03-14T21:40:41Z", + "pushed_at": "2024-03-14T21:40:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-1709.json b/2024/CVE-2024-1709.json index 2134d6e7fe..730c82ad11 100644 --- a/2024/CVE-2024-1709.json +++ b/2024/CVE-2024-1709.json @@ -13,10 +13,10 @@ "description": "ScreenConnect AuthBypass(cve-2024-1709) --> RCE!!!", "fork": false, "created_at": "2024-02-21T09:42:04Z", - "updated_at": "2024-03-13T06:18:47Z", + "updated_at": "2024-03-15T00:09:55Z", "pushed_at": "2024-02-22T05:22:35Z", - "stargazers_count": 85, - "watchers_count": 85, + "stargazers_count": 86, + "watchers_count": 86, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -34,7 +34,7 @@ ], "visibility": "public", "forks": 24, - "watchers": 85, + "watchers": 86, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json index 5bb38ede58..b8e074283b 100644 --- a/2024/CVE-2024-21413.json +++ b/2024/CVE-2024-21413.json @@ -43,10 +43,10 @@ "description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability", "fork": false, "created_at": "2024-02-16T15:17:59Z", - "updated_at": "2024-03-13T23:27:06Z", + "updated_at": "2024-03-14T21:35:19Z", "pushed_at": "2024-02-19T20:00:35Z", - "stargazers_count": 539, - "watchers_count": 539, + "stargazers_count": 540, + "watchers_count": 540, "has_discussions": false, "forks_count": 122, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 122, - "watchers": 539, + "watchers": 540, "score": 0, "subscribers_count": 6 }, diff --git a/2024/CVE-2024-25153.json b/2024/CVE-2024-25153.json index d489e3fd44..8398223d63 100644 --- a/2024/CVE-2024-25153.json +++ b/2024/CVE-2024-25153.json @@ -13,10 +13,10 @@ "description": "Proof-of-concept exploit for CVE-2024-25153.", "fork": false, "created_at": "2024-03-12T17:26:10Z", - "updated_at": "2024-03-14T14:40:58Z", + "updated_at": "2024-03-14T22:40:17Z", "pushed_at": "2024-03-13T09:46:07Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 15, + "watchers_count": 15, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 10, + "watchers": 15, "score": 0, "subscribers_count": 5 } diff --git a/2024/CVE-2024-27198.json b/2024/CVE-2024-27198.json index bb82e837c2..aea111dc2c 100644 --- a/2024/CVE-2024-27198.json +++ b/2024/CVE-2024-27198.json @@ -81,7 +81,7 @@ "stargazers_count": 92, "watchers_count": 92, "has_discussions": false, - "forks_count": 24, + "forks_count": 25, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -97,7 +97,7 @@ "teamcity" ], "visibility": "public", - "forks": 24, + "forks": 25, "watchers": 92, "score": 0, "subscribers_count": 2 diff --git a/README.md b/README.md index 0806101c6d..95cf65ccab 100644 --- a/README.md +++ b/README.md @@ -151,6 +151,9 @@ ### CVE-2024-2432 - [Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP](https://github.com/Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP) +### CVE-2024-12883 +- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883) + ### CVE-2024-20291 (-) A vulnerability in the access control list (ACL) programming for port channel subinterfaces of Cisco Nexus 3000 and 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, remote attacker to send traffic that should be blocked through an affected device.\r\n\r This vulnerability is due to incorrect hardware programming that occurs when configuration changes are made to port channel member ports. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access network resources that should be protected by an ACL that was applied on port channel subinterfaces.