Auto Update 2024/08/06 00:29:25

This commit is contained in:
motikan2010-bot 2024-08-06 09:29:25 +09:00
parent e94e197418
commit 826d9650dd
17 changed files with 99 additions and 60 deletions

View file

@ -13,10 +13,10 @@
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
"fork": false,
"created_at": "2017-09-20T23:32:29Z",
"updated_at": "2024-07-27T02:20:29Z",
"updated_at": "2024-08-05T19:19:15Z",
"pushed_at": "2017-09-23T05:11:45Z",
"stargazers_count": 460,
"watchers_count": 460,
"stargazers_count": 461,
"watchers_count": 461,
"has_discussions": false,
"forks_count": 188,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 188,
"watchers": 460,
"watchers": 461,
"score": 0,
"subscribers_count": 46
},

View file

@ -138,10 +138,10 @@
"description": "Linux Kernel < 4.13.1 - BlueTooth Buffer Overflow (PoC) BlueBorne - Proof of Concept - Unarmed\/Unweaponized - DoS (Crash) only ",
"fork": false,
"created_at": "2024-07-03T12:14:00Z",
"updated_at": "2024-07-06T21:57:19Z",
"updated_at": "2024-08-05T22:41:12Z",
"pushed_at": "2024-07-03T12:16:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2
}

View file

@ -70,13 +70,13 @@
"html_url": "https:\/\/github.com\/Offensive-Panda"
},
"html_url": "https:\/\/github.com\/Offensive-Panda\/NT-AUTHORITY-SYSTEM-CONTEXT-RTCORE",
"description": "This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I\/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and also calculated all offsets.",
"description": "This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I\/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and recalulated the fields offsets",
"fork": false,
"created_at": "2024-08-05T16:55:40Z",
"updated_at": "2024-08-05T17:33:19Z",
"pushed_at": "2024-08-05T17:33:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2024-08-05T23:09:05Z",
"pushed_at": "2024-08-05T18:31:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,7 +27,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 838262530,
@ -43,8 +43,8 @@
"description": "Some test files to make a good nuclei template for a JQuery UI XSS vuln",
"fork": false,
"created_at": "2024-08-05T09:31:05Z",
"updated_at": "2024-08-05T09:33:18Z",
"pushed_at": "2024-08-05T09:31:06Z",
"updated_at": "2024-08-05T22:56:29Z",
"pushed_at": "2024-08-05T22:56:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -73,10 +73,10 @@
"description": "Reverse Shell POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253), PHP Code Injection",
"fork": false,
"created_at": "2024-05-27T15:10:12Z",
"updated_at": "2024-08-02T07:41:03Z",
"updated_at": "2024-08-05T20:09:48Z",
"pushed_at": "2024-05-28T15:10:20Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 23,
"watchers": 24,
"score": 0,
"subscribers_count": 1
},

View file

@ -47,10 +47,10 @@
"description": "Accurately fingerprint and detect vulnerable (and patched!) versions of Netscaler \/ Citrix ADC to CVE-2023-3519",
"fork": false,
"created_at": "2023-07-20T16:05:07Z",
"updated_at": "2024-07-18T02:38:48Z",
"updated_at": "2024-08-05T20:54:13Z",
"pushed_at": "2023-07-23T03:54:44Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -64,7 +64,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 76,
"watchers": 77,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,7 +43,7 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-08-05T17:45:15Z",
"updated_at": "2024-08-05T19:18:22Z",
"pushed_at": "2024-07-25T18:12:57Z",
"stargazers_count": 181,
"watchers_count": 181,

View file

@ -43,10 +43,10 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2024-08-05T14:07:23Z",
"updated_at": "2024-08-05T22:03:55Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 655,
"watchers_count": 655,
"stargazers_count": 656,
"watchers_count": 656,
"has_discussions": false,
"forks_count": 145,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 145,
"watchers": 655,
"watchers": 656,
"score": 0,
"subscribers_count": 10
},

View file

@ -133,19 +133,19 @@
"description": "A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a privileged user",
"fork": false,
"created_at": "2024-08-04T17:40:51Z",
"updated_at": "2024-08-05T13:29:28Z",
"updated_at": "2024-08-05T23:21:43Z",
"pushed_at": "2024-08-04T21:04:55Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 9,
"forks": 3,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "The tool helps in quickly identifying vulnerabilities by examining a comprehensive list of potential paths on a website, making it useful for security assessments.",
"fork": false,
"created_at": "2024-08-03T14:40:08Z",
"updated_at": "2024-08-05T15:01:08Z",
"updated_at": "2024-08-05T23:00:07Z",
"pushed_at": "2024-08-03T15:00:55Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -230,10 +230,10 @@
"description": "GeoServer Remote Code Execution",
"fork": false,
"created_at": "2024-07-30T18:43:40Z",
"updated_at": "2024-08-03T01:33:21Z",
"updated_at": "2024-08-05T19:27:24Z",
"pushed_at": "2024-08-02T14:57:26Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -242,7 +242,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 54,
"watchers": 55,
"score": 0,
"subscribers_count": 1
},

32
2024/CVE-2024-41958.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 838500653,
"name": "CVE-2024-41958-PoC",
"full_name": "OrangeJuiceHU\/CVE-2024-41958-PoC",
"owner": {
"login": "OrangeJuiceHU",
"id": 30298257,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30298257?v=4",
"html_url": "https:\/\/github.com\/OrangeJuiceHU"
},
"html_url": "https:\/\/github.com\/OrangeJuiceHU\/CVE-2024-41958-PoC",
"description": "This is a small proof of concept for CVE-2024-41958",
"fork": false,
"created_at": "2024-08-05T19:10:08Z",
"updated_at": "2024-08-05T23:44:16Z",
"pushed_at": "2024-08-05T20:22:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -493,10 +493,10 @@
"description": "PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template",
"fork": false,
"created_at": "2024-06-08T12:23:35Z",
"updated_at": "2024-07-14T07:51:10Z",
"updated_at": "2024-08-05T20:21:18Z",
"pushed_at": "2024-06-19T16:19:57Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -512,7 +512,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},

View file

@ -722,10 +722,10 @@
"description": "This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH.",
"fork": false,
"created_at": "2024-07-02T06:53:35Z",
"updated_at": "2024-08-03T13:35:46Z",
"updated_at": "2024-08-05T20:33:59Z",
"pushed_at": "2024-07-04T20:04:30Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -734,7 +734,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,19 +13,19 @@
"description": "An Vulnerability detection and Exploitation tool for CVE-2024-7339",
"fork": false,
"created_at": "2024-08-05T16:26:18Z",
"updated_at": "2024-08-05T18:25:15Z",
"updated_at": "2024-08-05T23:40:25Z",
"pushed_at": "2024-08-05T16:41:15Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 0
}

View file

@ -3944,6 +3944,13 @@
- [sh3bu/CVE-2024-41662](https://github.com/sh3bu/CVE-2024-41662)
### CVE-2024-41958 (2024-08-05)
<code>mailcow: dockerized is an open source groupware/email suite based on docker. A vulnerability has been discovered in the two-factor authentication (2FA) mechanism. This flaw allows an authenticated attacker to bypass the 2FA protection, enabling unauthorized access to other accounts that are otherwise secured with 2FA. To exploit this vulnerability, the attacker must first have access to an account within the system and possess the credentials of the target account that has 2FA enabled. By leveraging these credentials, the attacker can circumvent the 2FA process and gain access to the protected account. This issue has been addressed in the `2024-07` release. All users are advised to upgrade. There are no known workarounds for this vulnerability.
</code>
- [OrangeJuiceHU/CVE-2024-41958-PoC](https://github.com/OrangeJuiceHU/CVE-2024-41958-PoC)
### CVE-2024-65230
- [CBaekhyunC/cve-2024-65230](https://github.com/CBaekhyunC/cve-2024-65230)