Auto Update 2024/10/06 00:29:50

This commit is contained in:
motikan2010-bot 2024-10-06 09:29:50 +09:00
parent 81a26509b9
commit 7c3e5b3149
20 changed files with 224 additions and 91 deletions

32
2010/CVE-2010-1938.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 868198887,
"name": "cve-2010-1938",
"full_name": "Nexxus67\/cve-2010-1938",
"owner": {
"login": "Nexxus67",
"id": 58827641,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58827641?v=4",
"html_url": "https:\/\/github.com\/Nexxus67"
},
"html_url": "https:\/\/github.com\/Nexxus67\/cve-2010-1938",
"description": "A simple Python script to test an off-by-one vulnerability in the OPIE library (CVE-2010-1938). This vulnerability affects certain FTP servers and may allow for Denial of Service (DoS) or arbitrary code execution.",
"fork": false,
"created_at": "2024-10-05T18:21:40Z",
"updated_at": "2024-10-05T20:15:27Z",
"pushed_at": "2024-10-05T18:27:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -81,10 +81,10 @@
"description": "patches for SNYK-JS-JQUERY-565129, SNYK-JS-JQUERY-567880, CVE-2020-1102, CVE-2020-11023, includes the patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428",
"fork": false,
"created_at": "2020-04-14T19:12:01Z",
"updated_at": "2024-07-17T09:51:35Z",
"updated_at": "2024-10-05T19:47:38Z",
"pushed_at": "2022-08-22T12:00:56Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -105,7 +105,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 25,
"watchers": 26,
"score": 0,
"subscribers_count": 7
},
@ -153,10 +153,10 @@
"description": "Vulnearability Report of the New Jersey official site",
"fork": false,
"created_at": "2022-05-23T08:51:42Z",
"updated_at": "2022-05-23T12:12:39Z",
"updated_at": "2024-10-05T19:49:08Z",
"pushed_at": "2022-05-23T09:07:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -165,7 +165,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "patches for SNYK-JS-JQUERY-565129, SNYK-JS-JQUERY-567880, CVE-2020-1102, CVE-2020-11023, includes the patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428",
"fork": false,
"created_at": "2020-04-14T19:12:01Z",
"updated_at": "2024-07-17T09:51:35Z",
"updated_at": "2024-10-05T19:47:38Z",
"pushed_at": "2022-08-22T12:00:56Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 25,
"watchers": 26,
"score": 0,
"subscribers_count": 7
}

View file

@ -170,6 +170,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -299,36 +299,6 @@
"score": 0,
"subscribers_count": 5
},
{
"id": 444978473,
"name": "testanull-CVE-2021-22005.py",
"full_name": "timb-machine-mirrors\/testanull-CVE-2021-22005.py",
"owner": {
"login": "timb-machine-mirrors",
"id": 49810875,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4",
"html_url": "https:\/\/github.com\/timb-machine-mirrors"
},
"html_url": "https:\/\/github.com\/timb-machine-mirrors\/testanull-CVE-2021-22005.py",
"description": "Clone from gist",
"fork": false,
"created_at": "2022-01-05T23:22:08Z",
"updated_at": "2023-04-08T20:15:10Z",
"pushed_at": "2022-01-05T23:22:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 505737586,
"name": "cve-2021-22005",

View file

@ -228,13 +228,13 @@
"stargazers_count": 1581,
"watchers_count": 1581,
"has_discussions": false,
"forks_count": 483,
"forks_count": 484,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 483,
"forks": 484,
"watchers": 1581,
"score": 0,
"subscribers_count": 28

View file

@ -1276,5 +1276,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 868207969,
"name": "Grafana-CVE-2021-43798",
"full_name": "sazzad1337\/Grafana-CVE-2021-43798",
"owner": {
"login": "sazzad1337",
"id": 59094087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59094087?v=4",
"html_url": "https:\/\/github.com\/sazzad1337"
},
"html_url": "https:\/\/github.com\/sazzad1337\/Grafana-CVE-2021-43798",
"description": "Python implementation of a tool for decrypting and encrypting sensitive data in Grafana, specifically addressing the vulnerabilities associated with CVE-2021-43798. Grafana encrypts all data source passwords using the AES algorithm with the secret_key found in the defaults.ini configuration file.",
"fork": false,
"created_at": "2024-10-05T18:51:12Z",
"updated_at": "2024-10-05T19:49:49Z",
"pushed_at": "2024-10-05T19:49:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence",
"fork": false,
"created_at": "2023-10-06T20:29:44Z",
"updated_at": "2024-10-03T02:32:41Z",
"updated_at": "2024-10-05T21:32:22Z",
"pushed_at": "2023-10-06T21:59:30Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 75,
"watchers_count": 75,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 74,
"watchers": 75,
"score": 0,
"subscribers_count": 2
},

43
2023/CVE-2023-38709.json Normal file
View file

@ -0,0 +1,43 @@
[
{
"id": 868234685,
"name": "apache-vulnerability-testing",
"full_name": "mrmtwoj\/apache-vulnerability-testing",
"owner": {
"login": "mrmtwoj",
"id": 22832463,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22832463?v=4",
"html_url": "https:\/\/github.com\/mrmtwoj"
},
"html_url": "https:\/\/github.com\/mrmtwoj\/apache-vulnerability-testing",
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-10-05T21:45:45Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache",
"apache2",
"cve-2023-3870",
"cve-2024-38472",
"cve-2024-38473",
"cve-2024-38474",
"cve-2024-38475",
"cve-2024-38476",
"cve-2024-38477",
"cve-2024-39573"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-10-05T15:59:18Z",
"updated_at": "2024-10-05T20:48:56Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1195,
"watchers_count": 1195,
"stargazers_count": 1197,
"watchers_count": 1197,
"has_discussions": false,
"forks_count": 202,
"forks_count": 203,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 202,
"watchers": 1195,
"forks": 203,
"watchers": 1197,
"score": 0,
"subscribers_count": 20
},

View file

@ -106,10 +106,10 @@
"description": "This repository presents a proof-of-concept of CVE-2023-7028",
"fork": false,
"created_at": "2024-01-12T18:29:27Z",
"updated_at": "2024-09-10T15:04:31Z",
"updated_at": "2024-10-05T21:24:30Z",
"pushed_at": "2024-01-13T13:50:20Z",
"stargazers_count": 233,
"watchers_count": 233,
"stargazers_count": 234,
"watchers_count": 234,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
@ -118,7 +118,7 @@
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 233,
"watchers": 234,
"score": 0,
"subscribers_count": 6
},

View file

@ -138,13 +138,13 @@
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 8,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-38200 - Microsoft Office NTLMv2 Disclosure Vulnerability ",
"fork": false,
"created_at": "2024-09-24T19:24:55Z",
"updated_at": "2024-10-05T17:27:08Z",
"updated_at": "2024-10-05T23:15:15Z",
"pushed_at": "2024-10-01T15:38:24Z",
"stargazers_count": 104,
"watchers_count": 104,
"stargazers_count": 105,
"watchers_count": 105,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 104,
"watchers": 105,
"score": 0,
"subscribers_count": 2
}

View file

@ -28,5 +28,46 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 868234685,
"name": "apache-vulnerability-testing",
"full_name": "mrmtwoj\/apache-vulnerability-testing",
"owner": {
"login": "mrmtwoj",
"id": 22832463,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22832463?v=4",
"html_url": "https:\/\/github.com\/mrmtwoj"
},
"html_url": "https:\/\/github.com\/mrmtwoj\/apache-vulnerability-testing",
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-10-05T21:45:45Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache",
"apache2",
"cve-2023-3870",
"cve-2024-38472",
"cve-2024-38473",
"cve-2024-38474",
"cve-2024-38475",
"cve-2024-38476",
"cve-2024-38477",
"cve-2024-39573"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-38816 Proof of Concept",
"fork": false,
"created_at": "2024-09-25T09:36:59Z",
"updated_at": "2024-10-05T13:59:54Z",
"updated_at": "2024-10-05T20:36:34Z",
"pushed_at": "2024-09-26T09:46:19Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
}

View file

@ -73,19 +73,19 @@
"description": "Zimbra - Remote Command Execution (CVE-2024-45519)",
"fork": false,
"created_at": "2024-10-05T00:15:18Z",
"updated_at": "2024-10-05T18:27:11Z",
"updated_at": "2024-10-05T21:42:54Z",
"pushed_at": "2024-10-05T00:18:49Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 7,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 23,
"forks": 9,
"watchers": 29,
"score": 0,
"subscribers_count": 1
}

View file

@ -2290,10 +2290,10 @@
"html_url": "https:\/\/github.com\/mrmtwoj"
},
"html_url": "https:\/\/github.com\/mrmtwoj\/CVE-2024-6387",
"description": null,
"description": "regreSSHion is a security tool designed to test for vulnerabilities related to CVE-2024-6387, specifically focusing on SSH and remote access exploitation. ",
"fork": false,
"created_at": "2024-07-09T14:06:02Z",
"updated_at": "2024-07-09T14:29:34Z",
"updated_at": "2024-10-05T21:02:11Z",
"pushed_at": "2024-07-09T14:29:30Z",
"stargazers_count": 0,
"watchers_count": 0,
@ -2302,7 +2302,9 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"regresshion-cve-2024-6387-ssh-security"
],
"visibility": "public",
"forks": 0,
"watchers": 0,

View file

@ -13,19 +13,19 @@
"description": "TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.",
"fork": false,
"created_at": "2024-09-29T10:58:15Z",
"updated_at": "2024-10-05T17:20:48Z",
"updated_at": "2024-10-05T19:24:59Z",
"pushed_at": "2024-10-04T09:39:09Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 56,
"forks": 12,
"watchers": 58,
"score": 0,
"subscribers_count": 1
}

View file

@ -133,19 +133,19 @@
"description": null,
"fork": false,
"created_at": "2024-10-05T07:24:57Z",
"updated_at": "2024-10-05T16:03:32Z",
"updated_at": "2024-10-05T19:12:48Z",
"pushed_at": "2024-10-05T07:55:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -4616,6 +4616,7 @@
</code>
- [Abdurahmon3236/CVE-2024-38472](https://github.com/Abdurahmon3236/CVE-2024-38472)
- [mrmtwoj/apache-vulnerability-testing](https://github.com/mrmtwoj/apache-vulnerability-testing)
### CVE-2024-38473 (2024-07-01)
@ -10727,6 +10728,13 @@
- [acesoyeo/METABASE-RCE-CVE-2023-38646-](https://github.com/acesoyeo/METABASE-RCE-CVE-2023-38646-)
- [UserConnecting/Exploit-CVE-2023-38646-Metabase](https://github.com/UserConnecting/Exploit-CVE-2023-38646-Metabase)
### CVE-2023-38709 (2024-04-04)
<code>Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.\n\nThis issue affects Apache HTTP Server: through 2.4.58.
</code>
- [mrmtwoj/apache-vulnerability-testing](https://github.com/mrmtwoj/apache-vulnerability-testing)
### CVE-2023-38743 (2023-09-11)
<code>Zoho ManageEngine ADManager Plus before Build 7200 allows admin users to execute commands on the host machine.
@ -21973,7 +21981,6 @@
- [tiagob0b/CVE-2021-22005](https://github.com/tiagob0b/CVE-2021-22005)
- [Jun-5heng/CVE-2021-22005](https://github.com/Jun-5heng/CVE-2021-22005)
- [shmilylty/cve-2021-22005-exp](https://github.com/shmilylty/cve-2021-22005-exp)
- [timb-machine-mirrors/testanull-CVE-2021-22005.py](https://github.com/timb-machine-mirrors/testanull-CVE-2021-22005.py)
- [InventorMAO/cve-2021-22005](https://github.com/InventorMAO/cve-2021-22005)
### CVE-2021-22006 (2021-09-23)
@ -25891,6 +25898,7 @@
- [topyagyuu/CVE-2021-43798](https://github.com/topyagyuu/CVE-2021-43798)
- [MalekAlthubiany/CVE-2021-43798](https://github.com/MalekAlthubiany/CVE-2021-43798)
- [Sic4rio/Grafana-Decryptor-for-CVE-2021-43798](https://github.com/Sic4rio/Grafana-Decryptor-for-CVE-2021-43798)
- [sazzad1337/Grafana-CVE-2021-43798](https://github.com/sazzad1337/Grafana-CVE-2021-43798)
### CVE-2021-43799 (2022-01-25)
@ -46119,6 +46127,13 @@
- [HandsomeCat00/Spring-CVE-2010-1622](https://github.com/HandsomeCat00/Spring-CVE-2010-1622)
- [E-bounce/cve-2010-1622_learning_environment](https://github.com/E-bounce/cve-2010-1622_learning_environment)
### CVE-2010-1938 (2010-05-28)
<code>Off-by-one error in the __opiereadrec function in readrec.c in libopie in OPIE 2.4.1-test1 and earlier, as used on FreeBSD 6.4 through 8.1-PRERELEASE and other platforms, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long username, as demonstrated by a long USER command to the FreeBSD 8.0 ftpd.
</code>
- [Nexxus67/cve-2010-1938](https://github.com/Nexxus67/cve-2010-1938)
### CVE-2010-2075 (2010-06-15)
<code>UnrealIRCd 3.2.8.1, as distributed on certain mirror sites from November 2009 through June 2010, contains an externally introduced modification (Trojan Horse) in the DEBUG3_DOLOG_SYSTEM macro, which allows remote attackers to execute arbitrary commands.