Auto Update 2024/04/09 00:28:55

This commit is contained in:
motikan2010-bot 2024-04-09 09:28:55 +09:00
parent 41f6e61ab5
commit 85ea98893b
27 changed files with 230 additions and 98 deletions

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2021-01-05T10:02:37Z",
"updated_at": "2021-01-05T10:03:39Z",
"updated_at": "2024-04-08T18:48:05Z",
"pushed_at": "2021-01-05T10:03:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -447,10 +447,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2024-04-05T21:02:43Z",
"updated_at": "2024-04-08T18:26:57Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 811,
"watchers_count": 811,
"stargazers_count": 812,
"watchers_count": 812,
"has_discussions": false,
"forks_count": 427,
"allow_forking": true,
@ -463,7 +463,7 @@
],
"visibility": "public",
"forks": 427,
"watchers": 811,
"watchers": 812,
"score": 0,
"subscribers_count": 11
},

39
2020/CVE-2020-12641.json Normal file
View file

@ -0,0 +1,39 @@
[
{
"id": 783899125,
"name": "CVE-2020-12641",
"full_name": "mbadanoiu\/CVE-2020-12641",
"owner": {
"login": "mbadanoiu",
"id": 18383407,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4",
"html_url": "https:\/\/github.com\/mbadanoiu"
},
"html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2020-12641",
"description": "CVE-2020-12641: Command Injection via “_im_convert_path” Parameter in Roundcube Webmail",
"fork": false,
"created_at": "2024-04-08T19:48:16Z",
"updated_at": "2024-04-08T20:00:29Z",
"pushed_at": "2024-04-08T19:57:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"0-day",
"cve",
"cve-2020-12641",
"cves",
"remote-code-execution",
"unauthenticated"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -470,10 +470,10 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2024-04-07T16:06:23Z",
"updated_at": "2024-04-08T22:34:29Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 920,
"watchers_count": 920,
"stargazers_count": 921,
"watchers_count": 921,
"has_discussions": false,
"forks_count": 236,
"allow_forking": true,
@ -482,7 +482,7 @@
"topics": [],
"visibility": "public",
"forks": 236,
"watchers": 920,
"watchers": 921,
"score": 0,
"subscribers_count": 27
},

View file

@ -84,13 +84,13 @@
"stargazers_count": 1910,
"watchers_count": 1910,
"has_discussions": false,
"forks_count": 510,
"forks_count": 511,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 510,
"forks": 511,
"watchers": 1910,
"score": 0,
"subscribers_count": 21
@ -263,10 +263,10 @@
"description": "PoC for CVE-2021-4034 dubbed pwnkit",
"fork": false,
"created_at": "2022-01-26T01:34:44Z",
"updated_at": "2024-01-30T07:24:57Z",
"updated_at": "2024-04-08T21:13:40Z",
"pushed_at": "2022-01-27T15:13:51Z",
"stargazers_count": 110,
"watchers_count": 110,
"stargazers_count": 111,
"watchers_count": 111,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -275,7 +275,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 110,
"watchers": 111,
"score": 0,
"subscribers_count": 4
},

View file

@ -48,10 +48,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2024-04-08T16:54:19Z",
"updated_at": "2024-04-08T18:35:59Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 713,
"watchers_count": 713,
"stargazers_count": 714,
"watchers_count": 714,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 713,
"watchers": 714,
"score": 0,
"subscribers_count": 13
},

View file

@ -48,13 +48,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "nps认证绕过利用工具CVE-2022-40494使用此工具可在浏览器访问web控制端后台页面或者批量获取socks5和http代理",
"fork": false,
"created_at": "2022-08-04T08:22:41Z",
"updated_at": "2024-04-03T08:09:15Z",
"updated_at": "2024-04-08T23:42:20Z",
"pushed_at": "2022-08-19T09:04:09Z",
"stargazers_count": 271,
"watchers_count": 271,
"stargazers_count": 272,
"watchers_count": 272,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 34,
"watchers": 271,
"watchers": 272,
"score": 0,
"subscribers_count": 6
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 469,
"watchers_count": 469,
"has_discussions": false,
"forks_count": 162,
"forks_count": 163,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 162,
"forks": 163,
"watchers": 469,
"score": 0,
"subscribers_count": 10

View file

@ -13,10 +13,10 @@
"description": "Report and exploit of CVE-2023-36427",
"fork": false,
"created_at": "2023-10-09T16:55:18Z",
"updated_at": "2024-03-05T13:34:14Z",
"updated_at": "2024-04-08T19:53:57Z",
"pushed_at": "2023-11-22T15:31:34Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 89,
"watchers_count": 89,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 17,
"watchers": 88,
"watchers": 89,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-04-08T16:55:12Z",
"updated_at": "2024-04-08T23:28:57Z",
"pushed_at": "2024-04-08T13:43:21Z",
"stargazers_count": 358,
"watchers_count": 358,
"stargazers_count": 361,
"watchers_count": 361,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 358,
"watchers": 361,
"score": 0,
"subscribers_count": 7
},

View file

@ -13,10 +13,10 @@
"description": "Fortinet FortiClient EMS SQL Injection",
"fork": false,
"created_at": "2024-03-18T20:50:48Z",
"updated_at": "2024-04-05T01:02:40Z",
"updated_at": "2024-04-08T22:38:46Z",
"pushed_at": "2024-03-20T20:42:41Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 30,
"watchers": 31,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,12 +13,12 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-04-08T18:20:38Z",
"updated_at": "2024-04-08T23:41:35Z",
"pushed_at": "2024-04-07T09:34:08Z",
"stargazers_count": 1639,
"watchers_count": 1639,
"stargazers_count": 1655,
"watchers_count": 1655,
"has_discussions": false,
"forks_count": 161,
"forks_count": 162,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"poc"
],
"visibility": "public",
"forks": 161,
"watchers": 1639,
"forks": 162,
"watchers": 1655,
"score": 0,
"subscribers_count": 13
},

View file

@ -13,10 +13,10 @@
"description": "The Poc for CVE-2024-20931",
"fork": false,
"created_at": "2024-02-02T01:58:49Z",
"updated_at": "2024-03-31T14:27:15Z",
"updated_at": "2024-04-08T19:12:37Z",
"pushed_at": "2024-02-02T02:05:01Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 69,
"watchers": 70,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2024-04-08T01:15:21Z",
"updated_at": "2024-04-08T01:15:22Z",
"pushed_at": "2024-04-08T01:27:27Z",
"updated_at": "2024-04-08T23:57:28Z",
"pushed_at": "2024-04-08T23:59:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Privilege Escalation in Microsoft Exchange 2019",
"fork": false,
"created_at": "2024-04-08T10:54:08Z",
"updated_at": "2024-04-08T10:58:27Z",
"updated_at": "2024-04-08T19:31:58Z",
"pushed_at": "2024-04-08T10:58:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-04-08T13:30:53Z",
"updated_at": "2024-04-08T13:30:53Z",
"updated_at": "2024-04-08T19:31:47Z",
"pushed_at": "2024-04-08T13:30:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -193,10 +193,10 @@
"description": null,
"fork": false,
"created_at": "2024-04-08T13:30:55Z",
"updated_at": "2024-04-08T13:31:13Z",
"updated_at": "2024-04-08T19:23:27Z",
"pushed_at": "2024-04-08T13:30:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -73,10 +73,10 @@
"description": "CVE-2024-23897",
"fork": false,
"created_at": "2024-01-26T09:44:32Z",
"updated_at": "2024-04-08T18:27:22Z",
"updated_at": "2024-04-08T19:25:59Z",
"pushed_at": "2024-01-28T06:47:28Z",
"stargazers_count": 162,
"watchers_count": 162,
"stargazers_count": 163,
"watchers_count": 163,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 162,
"watchers": 163,
"score": 0,
"subscribers_count": 2
},

32
2024/CVE-2024-2879.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 783878190,
"name": "CVE-2024-2879",
"full_name": "herculeszxc\/CVE-2024-2879",
"owner": {
"login": "herculeszxc",
"id": 62851950,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62851950?v=4",
"html_url": "https:\/\/github.com\/herculeszxc"
},
"html_url": "https:\/\/github.com\/herculeszxc\/CVE-2024-2879",
"description": "CVE-2024-2879 - LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2024-04-08T18:50:02Z",
"updated_at": "2024-04-08T19:16:31Z",
"pushed_at": "2024-04-08T19:16:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-29399.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 783958528,
"name": "CVE-2024-29399",
"full_name": "ally-petitt\/CVE-2024-29399",
"owner": {
"login": "ally-petitt",
"id": 76501220,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76501220?v=4",
"html_url": "https:\/\/github.com\/ally-petitt"
},
"html_url": "https:\/\/github.com\/ally-petitt\/CVE-2024-29399",
"description": "CVE-2024-29399 reference",
"fork": false,
"created_at": "2024-04-08T23:03:04Z",
"updated_at": "2024-04-08T23:04:23Z",
"pushed_at": "2024-04-08T23:18:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 16,
"score": 0,
"subscribers_count": 1

View file

@ -493,10 +493,10 @@
"description": "An ssh honeypot with the XZ backdoor. CVE-2024-3094",
"fork": false,
"created_at": "2024-03-30T22:07:24Z",
"updated_at": "2024-04-08T15:35:07Z",
"updated_at": "2024-04-08T23:38:04Z",
"pushed_at": "2024-04-02T03:38:32Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -510,7 +510,7 @@
],
"visibility": "public",
"forks": 17,
"watchers": 113,
"watchers": 114,
"score": 0,
"subscribers_count": 6
},
@ -1012,19 +1012,19 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-04-08T17:52:00Z",
"updated_at": "2024-04-08T22:06:57Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3221,
"watchers_count": 3221,
"stargazers_count": 3225,
"watchers_count": 3225,
"has_discussions": false,
"forks_count": 213,
"forks_count": 214,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 213,
"watchers": 3221,
"forks": 214,
"watchers": 3225,
"score": 0,
"subscribers_count": 32
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-31286: WordPress WP Photo Album Plus plugin < 8.6.03.005 - Arbitrary File Upload vulnerability",
"fork": false,
"created_at": "2024-04-08T10:12:03Z",
"updated_at": "2024-04-08T10:58:42Z",
"updated_at": "2024-04-08T19:31:54Z",
"pushed_at": "2024-04-08T10:15:15Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-31345: WordPress Auto Poster plugin <= 1.2 - Arbitrary File Upload vulnerability",
"fork": false,
"created_at": "2024-04-08T08:01:15Z",
"updated_at": "2024-04-08T10:58:46Z",
"updated_at": "2024-04-08T19:31:50Z",
"pushed_at": "2024-04-08T09:13:08Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 5,
"score": 0,
"subscribers_count": 0
}

View file

@ -43,10 +43,10 @@
"description": "Exploit for CVE-2024-3273, supports single and multiple hosts",
"fork": false,
"created_at": "2024-04-07T15:36:18Z",
"updated_at": "2024-04-08T10:47:28Z",
"updated_at": "2024-04-08T19:00:20Z",
"pushed_at": "2024-04-07T15:41:42Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
@ -74,7 +74,7 @@
"fork": false,
"created_at": "2024-04-07T21:15:33Z",
"updated_at": "2024-04-07T21:40:55Z",
"pushed_at": "2024-04-07T22:02:49Z",
"pushed_at": "2024-04-08T19:49:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -234,6 +234,13 @@
- [Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP](https://github.com/Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP)
### CVE-2024-2879 (2024-04-03)
<code>The LayerSlider plugin for WordPress is vulnerable to SQL Injection via the ls_get_popup_markup action in versions 7.9.11 and 7.10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
</code>
- [herculeszxc/CVE-2024-2879](https://github.com/herculeszxc/CVE-2024-2879)
### CVE-2024-3094 (2024-03-29)
<code>Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. \r\nThrough a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.
@ -1151,13 +1158,25 @@
- [ioprojecton/dir-3040_dos](https://github.com/ioprojecton/dir-3040_dos)
### CVE-2024-27630
### CVE-2024-27630 (2024-04-08)
<code>Insecure Direct Object Reference (IDOR) in GNU Savane v.3.12 and before allows a remote attacker to delete arbitrary files via crafted input to the trackers_data_delete_file function.
</code>
- [ally-petitt/CVE-2024-27630](https://github.com/ally-petitt/CVE-2024-27630)
### CVE-2024-27631
### CVE-2024-27631 (2024-04-08)
<code>Cross Site Request Forgery vulnerability in GNU Savane v.3.12 and before allows a remote attacker to escalate privileges via siteadmin/usergroup.php
</code>
- [ally-petitt/CVE-2024-27631](https://github.com/ally-petitt/CVE-2024-27631)
### CVE-2024-27632
### CVE-2024-27632 (2024-04-08)
<code>An issue in GNU Savane v.3.12 and before allows a remote attacker to escalate privileges via the form_id in the form_header() function.
</code>
- [ally-petitt/CVE-2024-27632](https://github.com/ally-petitt/CVE-2024-27632)
### CVE-2024-27665
@ -1266,6 +1285,9 @@
- [ismailcemunver/CVE-2024-29375](https://github.com/ismailcemunver/CVE-2024-29375)
### CVE-2024-29399
- [ally-petitt/CVE-2024-29399](https://github.com/ally-petitt/CVE-2024-29399)
### CVE-2024-30614
- [Lucky-lm/CVE-2024-30614](https://github.com/Lucky-lm/CVE-2024-30614)
@ -24604,6 +24626,13 @@
- [mkelepce/CVE-2020-12629](https://github.com/mkelepce/CVE-2020-12629)
### CVE-2020-12641 (2020-05-04)
<code>rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.
</code>
- [mbadanoiu/CVE-2020-12641](https://github.com/mbadanoiu/CVE-2020-12641)
### CVE-2020-12688
- [TheCyberGeek/Centreon-20.04](https://github.com/TheCyberGeek/Centreon-20.04)