Auto Update 2024/03/06 18:27:11

This commit is contained in:
motikan2010-bot 2024-03-07 03:27:11 +09:00
parent 33990f8d1a
commit 78e10c838c
32 changed files with 360 additions and 110 deletions

View file

@ -36,7 +36,7 @@
"forks": 159,
"watchers": 393,
"score": 0,
"subscribers_count": 27
"subscribers_count": 26
},
{
"id": 77596573,

View file

@ -281,7 +281,7 @@
"forks": 125,
"watchers": 303,
"score": 0,
"subscribers_count": 16
"subscribers_count": 15
},
{
"id": 71787126,

View file

@ -13,10 +13,10 @@
"description": "Hikvision camera CVE-2017-7921-EXP",
"fork": false,
"created_at": "2020-04-27T11:49:40Z",
"updated_at": "2024-02-02T01:33:36Z",
"updated_at": "2024-03-06T17:18:31Z",
"pushed_at": "2023-12-04T15:47:16Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 76,
"watchers": 74,
"score": 0,
"subscribers_count": 3
},
@ -103,10 +103,10 @@
"description": "This python file will decrypt the configurationFile used by hikvision cameras vulnerable to CVE-2017-7921.",
"fork": false,
"created_at": "2021-01-29T16:08:35Z",
"updated_at": "2024-02-22T17:01:56Z",
"updated_at": "2024-03-06T17:18:33Z",
"pushed_at": "2021-01-29T16:22:39Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 83,
"watchers": 82,
"score": 0,
"subscribers_count": 3
},

View file

@ -119,10 +119,10 @@
"description": "Multi-threaded, IPv6 aware, wordlists\/single-user username enumeration via CVE-2018-15473",
"fork": false,
"created_at": "2018-10-03T10:18:04Z",
"updated_at": "2024-03-05T12:18:34Z",
"updated_at": "2024-03-06T15:16:38Z",
"pushed_at": "2019-03-24T11:20:27Z",
"stargazers_count": 89,
"watchers_count": 89,
"stargazers_count": 90,
"watchers_count": 90,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -131,7 +131,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 89,
"watchers": 90,
"score": 0,
"subscribers_count": 1
},

View file

@ -80,10 +80,10 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2024-02-05T05:24:36Z",
"updated_at": "2024-03-06T17:18:29Z",
"pushed_at": "2021-01-08T10:31:22Z",
"stargazers_count": 561,
"watchers_count": 561,
"stargazers_count": 560,
"watchers_count": 560,
"has_discussions": false,
"forks_count": 185,
"allow_forking": true,
@ -102,7 +102,7 @@
],
"visibility": "public",
"forks": 185,
"watchers": 561,
"watchers": 560,
"score": 0,
"subscribers_count": 23
},

View file

@ -1305,10 +1305,10 @@
"description": null,
"fork": false,
"created_at": "2024-02-12T20:54:51Z",
"updated_at": "2024-02-12T20:55:03Z",
"updated_at": "2024-03-06T16:11:54Z",
"pushed_at": "2024-02-12T20:54:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1317,7 +1317,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -108,13 +108,13 @@
"stargazers_count": 255,
"watchers_count": 255,
"has_discussions": false,
"forks_count": 47,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 47,
"forks": 46,
"watchers": 255,
"score": 0,
"subscribers_count": 8

View file

@ -588,10 +588,10 @@
"description": null,
"fork": false,
"created_at": "2022-06-24T13:25:25Z",
"updated_at": "2022-06-24T13:25:39Z",
"updated_at": "2024-03-06T16:11:56Z",
"pushed_at": "2022-06-24T13:25:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -600,7 +600,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
@ -618,10 +618,10 @@
"description": "PrintNightmare (CVE-2021-34527) PoC Exploit",
"fork": false,
"created_at": "2022-08-23T20:20:45Z",
"updated_at": "2024-02-21T19:01:07Z",
"updated_at": "2024-03-06T16:11:58Z",
"pushed_at": "2022-12-17T16:10:46Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 89,
"watchers_count": 89,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -630,7 +630,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 88,
"watchers": 89,
"score": 0,
"subscribers_count": 3
},

View file

@ -133,10 +133,10 @@
"description": "海康威视RCE漏洞 批量检测和利用工具",
"fork": false,
"created_at": "2022-08-03T17:27:59Z",
"updated_at": "2024-01-30T07:00:34Z",
"updated_at": "2024-03-06T17:18:36Z",
"pushed_at": "2022-08-05T19:57:30Z",
"stargazers_count": 119,
"watchers_count": 119,
"stargazers_count": 118,
"watchers_count": 118,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -148,7 +148,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 119,
"watchers": 118,
"score": 0,
"subscribers_count": 2
},

View file

@ -223,10 +223,10 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2024-03-06T02:14:56Z",
"updated_at": "2024-03-06T14:33:20Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1525,
"watchers_count": 1525,
"stargazers_count": 1526,
"watchers_count": 1526,
"has_discussions": false,
"forks_count": 479,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 479,
"watchers": 1525,
"watchers": 1526,
"score": 0,
"subscribers_count": 28
},
@ -493,10 +493,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2024-03-06T02:17:24Z",
"updated_at": "2024-03-06T14:33:41Z",
"pushed_at": "2023-10-11T18:44:51Z",
"stargazers_count": 779,
"watchers_count": 779,
"stargazers_count": 780,
"watchers_count": 780,
"has_discussions": false,
"forks_count": 174,
"allow_forking": true,
@ -512,7 +512,7 @@
],
"visibility": "public",
"forks": 174,
"watchers": 779,
"watchers": 780,
"score": 0,
"subscribers_count": 19
},

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2022-04-14T13:42:54Z",
"updated_at": "2024-02-28T08:50:33Z",
"updated_at": "2024-03-06T15:58:54Z",
"pushed_at": "2022-08-30T16:02:36Z",
"stargazers_count": 4,
"watchers_count": 4,

View file

@ -1268,10 +1268,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2024-03-06T03:24:13Z",
"updated_at": "2024-03-06T17:18:35Z",
"pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 765,
"watchers_count": 765,
"stargazers_count": 764,
"watchers_count": 764,
"has_discussions": false,
"forks_count": 112,
"allow_forking": true,
@ -1285,7 +1285,7 @@
],
"visibility": "public",
"forks": 112,
"watchers": 765,
"watchers": 764,
"score": 0,
"subscribers_count": 11
},

View file

@ -13,10 +13,10 @@
"description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337",
"fork": false,
"created_at": "2022-03-19T08:10:46Z",
"updated_at": "2024-02-21T03:26:19Z",
"updated_at": "2024-03-06T12:24:00Z",
"pushed_at": "2022-09-04T17:28:56Z",
"stargazers_count": 321,
"watchers_count": 321,
"stargazers_count": 322,
"watchers_count": 322,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -41,7 +41,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 321,
"watchers": 322,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": "Atlassian Jira Seraph Authentication Bypass RCECVE-2022-0540",
"fork": false,
"created_at": "2022-05-25T10:47:04Z",
"updated_at": "2024-01-19T10:18:02Z",
"updated_at": "2024-03-06T15:48:50Z",
"pushed_at": "2022-05-25T13:43:16Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 68,
"watchers": 69,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "An unauthenticated data extraction vulnerability in Kyocera printers, which allows for recovery of cleartext address book and domain joined passwords",
"fork": false,
"created_at": "2023-03-15T14:23:41Z",
"updated_at": "2023-12-10T14:44:59Z",
"updated_at": "2024-03-06T13:19:17Z",
"pushed_at": "2023-03-15T14:33:48Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 2
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 1104,
"watchers_count": 1104,
"has_discussions": true,
"forks_count": 186,
"forks_count": 184,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -44,7 +44,7 @@
"gui"
],
"visibility": "public",
"forks": 186,
"forks": 184,
"watchers": 1104,
"score": 0,
"subscribers_count": 18

View file

@ -13,7 +13,7 @@
"description": "H3C_SSL_VPN_XSS(Reflected XSS) CVE-2022-35416",
"fork": false,
"created_at": "2022-07-12T04:35:49Z",
"updated_at": "2024-01-23T02:56:46Z",
"updated_at": "2024-03-06T12:47:23Z",
"pushed_at": "2022-07-12T04:38:50Z",
"stargazers_count": 6,
"watchers_count": 6,

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-1671-POC, based on dnslog platform",
"fork": false,
"created_at": "2023-04-24T15:53:42Z",
"updated_at": "2023-11-28T07:20:02Z",
"updated_at": "2024-03-06T16:03:18Z",
"pushed_at": "2023-04-26T02:40:41Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -57,7 +57,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 19,
"watchers": 20,
"score": 0,
"subscribers_count": 2
},

View file

@ -73,10 +73,10 @@
"description": "GameOver(lay) Ubuntu Privilege Escalation",
"fork": false,
"created_at": "2023-10-09T22:02:42Z",
"updated_at": "2024-03-04T19:21:07Z",
"updated_at": "2024-03-06T15:15:05Z",
"pushed_at": "2023-10-09T22:44:21Z",
"stargazers_count": 85,
"watchers_count": 85,
"stargazers_count": 86,
"watchers_count": 86,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 85,
"watchers": 86,
"score": 0,
"subscribers_count": 1
},

View file

@ -62,14 +62,14 @@
{
"id": 726414774,
"name": "CVE-2023-36664",
"full_name": "JeanChpt\/CVE-2023-36664",
"full_name": "jeanchpt\/CVE-2023-36664",
"owner": {
"login": "JeanChpt",
"login": "jeanchpt",
"id": 57096518,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57096518?v=4",
"html_url": "https:\/\/github.com\/JeanChpt"
"html_url": "https:\/\/github.com\/jeanchpt"
},
"html_url": "https:\/\/github.com\/JeanChpt\/CVE-2023-36664",
"html_url": "https:\/\/github.com\/jeanchpt\/CVE-2023-36664",
"description": "Proof of concept developed for the CVE-2023-36664",
"fork": false,
"created_at": "2023-12-02T10:28:10Z",

View file

@ -1,19 +1,19 @@
[
{
"id": 768047429,
"name": "CVE-2023-51448-cacti-command-injection-poc",
"full_name": "jakabakos\/CVE-2023-51448-cacti-command-injection-poc",
"name": "CVE-2023-51448-cacti-sqli-poc",
"full_name": "jakabakos\/CVE-2023-51448-cacti-sqli-poc",
"owner": {
"login": "jakabakos",
"id": 42498816,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4",
"html_url": "https:\/\/github.com\/jakabakos"
},
"html_url": "https:\/\/github.com\/jakabakos\/CVE-2023-51448-cacti-command-injection-poc",
"html_url": "https:\/\/github.com\/jakabakos\/CVE-2023-51448-cacti-sqli-poc",
"description": null,
"fork": false,
"created_at": "2024-03-06T11:23:11Z",
"updated_at": "2024-03-06T11:23:11Z",
"updated_at": "2024-03-06T12:30:05Z",
"pushed_at": "2024-03-06T11:23:11Z",
"stargazers_count": 0,
"watchers_count": 0,

32
2023/CVE-2023-6246.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 766195734,
"name": "CVE-2023-6246",
"full_name": "elpe-pinillo\/CVE-2023-6246",
"owner": {
"login": "elpe-pinillo",
"id": 30589235,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30589235?v=4",
"html_url": "https:\/\/github.com\/elpe-pinillo"
},
"html_url": "https:\/\/github.com\/elpe-pinillo\/CVE-2023-6246",
"description": null,
"fork": false,
"created_at": "2024-03-02T15:45:52Z",
"updated_at": "2024-03-06T17:10:15Z",
"pushed_at": "2024-03-06T17:10:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-1301.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 754535047,
"name": "CVE-2024-1301---Badgermeter-moni-tool-SQL-Injection",
"full_name": "guillermogm4\/CVE-2024-1301---Badgermeter-moni-tool-SQL-Injection",
"owner": {
"login": "guillermogm4",
"id": 26895345,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26895345?v=4",
"html_url": "https:\/\/github.com\/guillermogm4"
},
"html_url": "https:\/\/github.com\/guillermogm4\/CVE-2024-1301---Badgermeter-moni-tool-SQL-Injection",
"description": "POC Badgermeter moni tool - CVE-2024-1301",
"fork": false,
"created_at": "2024-02-08T09:08:05Z",
"updated_at": "2024-03-06T17:58:31Z",
"pushed_at": "2024-02-08T09:50:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-1302.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 754542610,
"name": "CVE-2024-1302---Badgermeter-moni-tool-Sensitive-information-exposure",
"full_name": "guillermogm4\/CVE-2024-1302---Badgermeter-moni-tool-Sensitive-information-exposure",
"owner": {
"login": "guillermogm4",
"id": 26895345,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26895345?v=4",
"html_url": "https:\/\/github.com\/guillermogm4"
},
"html_url": "https:\/\/github.com\/guillermogm4\/CVE-2024-1302---Badgermeter-moni-tool-Sensitive-information-exposure",
"description": "POC Badgermeter moni tool - CVE-2024-1302",
"fork": false,
"created_at": "2024-02-08T09:27:53Z",
"updated_at": "2024-03-06T17:58:22Z",
"pushed_at": "2024-02-08T09:55:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-1303.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 754543116,
"name": "CVE-2024-1303---Badgermeter-moni-tool-Path-Traversal",
"full_name": "guillermogm4\/CVE-2024-1303---Badgermeter-moni-tool-Path-Traversal",
"owner": {
"login": "guillermogm4",
"id": 26895345,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26895345?v=4",
"html_url": "https:\/\/github.com\/guillermogm4"
},
"html_url": "https:\/\/github.com\/guillermogm4\/CVE-2024-1303---Badgermeter-moni-tool-Path-Traversal",
"description": "POC Badgermeter moni tool - CVE-2024-1303",
"fork": false,
"created_at": "2024-02-08T09:29:14Z",
"updated_at": "2024-03-06T17:58:14Z",
"pushed_at": "2024-02-08T10:00:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-1304.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 754543376,
"name": "CVE-2024-1304---Badgermeter-moni-tool-Reflected-Cross-Site-Scripting-XSS",
"full_name": "guillermogm4\/CVE-2024-1304---Badgermeter-moni-tool-Reflected-Cross-Site-Scripting-XSS",
"owner": {
"login": "guillermogm4",
"id": 26895345,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26895345?v=4",
"html_url": "https:\/\/github.com\/guillermogm4"
},
"html_url": "https:\/\/github.com\/guillermogm4\/CVE-2024-1304---Badgermeter-moni-tool-Reflected-Cross-Site-Scripting-XSS",
"description": "POC Badgermeter moni tool - CVE-2024-1304",
"fork": false,
"created_at": "2024-02-08T09:29:54Z",
"updated_at": "2024-03-06T17:56:15Z",
"pushed_at": "2024-02-08T10:03:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-1403.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 768162174,
"name": "CVE-2024-1403",
"full_name": "horizon3ai\/CVE-2024-1403",
"owner": {
"login": "horizon3ai",
"id": 79593994,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
"html_url": "https:\/\/github.com\/horizon3ai"
},
"html_url": "https:\/\/github.com\/horizon3ai\/CVE-2024-1403",
"description": "Progress OpenEdge Authentication Bypass",
"fork": false,
"created_at": "2024-03-06T15:27:18Z",
"updated_at": "2024-03-06T16:57:44Z",
"pushed_at": "2024-03-06T15:31:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-21338 Windows Kernel Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2024-03-05T18:29:55Z",
"updated_at": "2024-03-06T05:15:35Z",
"updated_at": "2024-03-06T18:22:20Z",
"pushed_at": "2024-03-05T19:46:48Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -73,10 +73,10 @@
"description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762",
"fork": false,
"created_at": "2024-02-28T21:16:10Z",
"updated_at": "2024-03-06T06:55:27Z",
"updated_at": "2024-03-06T16:55:45Z",
"pushed_at": "2024-03-01T20:02:52Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 38,
"watchers": 39,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 99,
"watchers_count": 99,
"has_discussions": false,
"forks_count": 21,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 21,
"forks": 22,
"watchers": 99,
"score": 0,
"subscribers_count": 1

View file

@ -43,10 +43,10 @@
"description": "Exploit for CVE-2024-27198 - TeamCity Server",
"fork": false,
"created_at": "2024-03-05T05:43:06Z",
"updated_at": "2024-03-06T03:15:58Z",
"updated_at": "2024-03-06T17:50:30Z",
"pushed_at": "2024-03-05T06:20:55Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 13,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},
@ -103,12 +103,12 @@
"description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4",
"fork": false,
"created_at": "2024-03-06T03:15:03Z",
"updated_at": "2024-03-06T10:50:17Z",
"updated_at": "2024-03-06T17:12:36Z",
"pushed_at": "2024-03-06T05:08:41Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -120,8 +120,8 @@
"teamcity"
],
"visibility": "public",
"forks": 3,
"watchers": 11,
"forks": 5,
"watchers": 14,
"score": 0,
"subscribers_count": 0
}

View file

@ -92,6 +92,18 @@
- [sajaljat/CVE-2024-1269](https://github.com/sajaljat/CVE-2024-1269)
### CVE-2024-1301
- [guillermogm4/CVE-2024-1301---Badgermeter-moni-tool-SQL-Injection](https://github.com/guillermogm4/CVE-2024-1301---Badgermeter-moni-tool-SQL-Injection)
### CVE-2024-1302
- [guillermogm4/CVE-2024-1302---Badgermeter-moni-tool-Sensitive-information-exposure](https://github.com/guillermogm4/CVE-2024-1302---Badgermeter-moni-tool-Sensitive-information-exposure)
### CVE-2024-1303
- [guillermogm4/CVE-2024-1303---Badgermeter-moni-tool-Path-Traversal](https://github.com/guillermogm4/CVE-2024-1303---Badgermeter-moni-tool-Path-Traversal)
### CVE-2024-1304
- [guillermogm4/CVE-2024-1304---Badgermeter-moni-tool-Reflected-Cross-Site-Scripting-XSS](https://github.com/guillermogm4/CVE-2024-1304---Badgermeter-moni-tool-Reflected-Cross-Site-Scripting-XSS)
### CVE-2024-1346 (2024-02-19)
<code>Weak MySQL database root password in LaborOfficeFree affects version 19.10. This vulnerability allows an attacker to calculate the root password of the MySQL database used by LaborOfficeFree using two constants.
@ -99,6 +111,13 @@
- [PeterGabaldon/CVE-2024-1346](https://github.com/PeterGabaldon/CVE-2024-1346)
### CVE-2024-1403 (-)
<code>In OpenEdge Authentication Gateway and AdminServer prior to 11.7.19, 12.2.14, 12.8.1 on all platforms supported by the OpenEdge product, an authentication bypass vulnerability has been identified.  The\nvulnerability is a bypass to authentication based on a failure to properly\nhandle username and password. Certain unexpected\ncontent passed into the credentials can lead to unauthorized access without proper\nauthentication.   \n\n\n\n\n\n\n
</code>
- [horizon3ai/CVE-2024-1403](https://github.com/horizon3ai/CVE-2024-1403)
### CVE-2024-1512 (2024-02-17)
<code>The MasterStudy LMS WordPress Plugin for Online Courses and Education plugin for WordPress is vulnerable to union based SQL Injection via the 'user' parameter of the /lms/stm-lms/order/items REST route in all versions up to, and including, 3.2.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
@ -1954,6 +1973,13 @@
- [hackersroot/CVE-2023-6063-PoC](https://github.com/hackersroot/CVE-2023-6063-PoC)
- [thesafdari/CVE-2023-6063](https://github.com/thesafdari/CVE-2023-6063)
### CVE-2023-6246 (2024-01-31)
<code>A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an application crash or local privilege escalation. This issue affects glibc 2.36 and newer.
</code>
- [elpe-pinillo/CVE-2023-6246](https://github.com/elpe-pinillo/CVE-2023-6246)
### CVE-2023-6289 (2023-12-18)
<code>The Swift Performance Lite WordPress plugin before 2.3.6.15 does not prevent users from exporting the plugin's settings, which may include sensitive information such as Cloudflare API tokens.
@ -5213,7 +5239,7 @@
- [jakabakos/CVE-2023-36664-Ghostscript-command-injection](https://github.com/jakabakos/CVE-2023-36664-Ghostscript-command-injection)
- [winkler-winsen/Scan_GhostScript](https://github.com/winkler-winsen/Scan_GhostScript)
- [JeanChpt/CVE-2023-36664](https://github.com/JeanChpt/CVE-2023-36664)
- [jeanchpt/CVE-2023-36664](https://github.com/jeanchpt/CVE-2023-36664)
### CVE-2023-36723 (2023-10-10)
@ -7695,28 +7721,60 @@
- [geraldoalcantara/CVE-2023-49977](https://github.com/geraldoalcantara/CVE-2023-49977)
### CVE-2023-49978
### CVE-2023-49978 (-)
<code>Incorrect access control in Customer Support System v1 allows non-administrator users to access administrative pages and execute actions reserved for administrators.
</code>
- [geraldoalcantara/CVE-2023-49978](https://github.com/geraldoalcantara/CVE-2023-49978)
### CVE-2023-49979
### CVE-2023-49979 (-)
<code>A directory listing vulnerability in Customer Support System v1 allows attackers to list directories and sensitive files within the application without requiring authorization.
</code>
- [geraldoalcantara/CVE-2023-49979](https://github.com/geraldoalcantara/CVE-2023-49979)
### CVE-2023-49980
### CVE-2023-49980 (-)
<code>A directory listing vulnerability in Best Student Result Management System v1.0 allows attackers to list directories and sensitive files within the application without requiring authorization.
</code>
- [geraldoalcantara/CVE-2023-49980](https://github.com/geraldoalcantara/CVE-2023-49980)
### CVE-2023-49981
### CVE-2023-49981 (-)
<code>A directory listing vulnerability in School Fees Management System v1.0 allows attackers to list directories and sensitive files within the application without requiring authorization.
</code>
- [geraldoalcantara/CVE-2023-49981](https://github.com/geraldoalcantara/CVE-2023-49981)
### CVE-2023-49982
### CVE-2023-49982 (-)
<code>Broken access control in the component /admin/management/users of School Fees Management System v1.0 allows attackers to escalate privileges and perform Administrative actions, including adding and deleting user accounts.
</code>
- [geraldoalcantara/CVE-2023-49982](https://github.com/geraldoalcantara/CVE-2023-49982)
### CVE-2023-49983
### CVE-2023-49983 (-)
<code>A cross-site scripting (XSS) vulnerability in the component /management/class of School Fees Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter.
</code>
- [geraldoalcantara/CVE-2023-49983](https://github.com/geraldoalcantara/CVE-2023-49983)
### CVE-2023-49984
### CVE-2023-49984 (-)
<code>A cross-site scripting (XSS) vulnerability in the component /management/settings of School Fees Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter.
</code>
- [geraldoalcantara/CVE-2023-49984](https://github.com/geraldoalcantara/CVE-2023-49984)
### CVE-2023-49985
### CVE-2023-49985 (-)
<code>A cross-site scripting (XSS) vulnerability in the component /management/class of School Fees Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the cname parameter.
</code>
- [geraldoalcantara/CVE-2023-49985](https://github.com/geraldoalcantara/CVE-2023-49985)
### CVE-2023-49986
@ -7946,7 +8004,7 @@
<code>Cacti provides an operational monitoring and fault management framework. Version 1.2.25 has a Blind SQL Injection (SQLi) vulnerability within the SNMP Notification Receivers feature in the file `managers.php`. An authenticated attacker with the “Settings/Utilities” permission can send a crafted HTTP GET request to the endpoint `/cacti/managers.php` with an SQLi payload in the `selected_graphs_array` HTTP GET parameter. As of time of publication, no patched versions exist.
</code>
- [jakabakos/CVE-2023-51448-cacti-command-injection-poc](https://github.com/jakabakos/CVE-2023-51448-cacti-command-injection-poc)
- [jakabakos/CVE-2023-51448-cacti-sqli-poc](https://github.com/jakabakos/CVE-2023-51448-cacti-sqli-poc)
### CVE-2023-51467 (2023-12-26)