Auto Update 2024/10/20 06:30:26

This commit is contained in:
motikan2010-bot 2024-10-20 15:30:26 +09:00
parent 5c682d373d
commit 9b95edb504
30 changed files with 165 additions and 101 deletions

View file

@ -138,10 +138,10 @@
"description": "A Python replicated exploit for Webmin 1.580 \/file\/show.cgi Remote Code Execution",
"fork": false,
"created_at": "2021-09-04T04:01:56Z",
"updated_at": "2024-10-18T04:21:25Z",
"updated_at": "2024-10-20T03:44:56Z",
"pushed_at": "2021-09-28T16:14:13Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 40,
"watchers": 39,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,7 +14,7 @@
"description": "PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container",
"fork": false,
"created_at": "2016-12-26T13:39:03Z",
"updated_at": "2024-08-29T09:36:24Z",
"updated_at": "2024-10-20T05:38:19Z",
"pushed_at": "2023-02-27T06:48:09Z",
"stargazers_count": 403,
"watchers_count": 403,

View file

@ -81,13 +81,13 @@
"stargazers_count": 195,
"watchers_count": 195,
"has_discussions": false,
"forks_count": 48,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 48,
"forks": 50,
"watchers": 195,
"score": 0,
"subscribers_count": 8

View file

@ -14,10 +14,10 @@
"description": "Handlebars Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability",
"fork": false,
"created_at": "2024-10-19T11:05:45Z",
"updated_at": "2024-10-19T11:19:47Z",
"updated_at": "2024-10-20T03:01:18Z",
"pushed_at": "2024-10-19T11:19:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -241,7 +241,7 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -254,7 +254,7 @@
"rce"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 2

View file

@ -386,10 +386,10 @@
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false,
"created_at": "2020-02-22T16:16:20Z",
"updated_at": "2024-09-11T02:44:44Z",
"updated_at": "2024-10-20T04:25:31Z",
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 359,
"watchers_count": 359,
"stargazers_count": 360,
"watchers_count": 360,
"has_discussions": false,
"forks_count": 111,
"allow_forking": true,
@ -404,7 +404,7 @@
],
"visibility": "public",
"forks": 111,
"watchers": 359,
"watchers": 360,
"score": 0,
"subscribers_count": 5
},

View file

@ -14,10 +14,10 @@
"description": "GravCMS Unauthenticated Arbitrary YAML Write\/Update leads to Code Execution (CVE-2021-21425)",
"fork": false,
"created_at": "2021-06-24T13:06:24Z",
"updated_at": "2024-10-11T01:16:54Z",
"updated_at": "2024-10-20T05:32:39Z",
"pushed_at": "2023-04-18T16:30:34Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "Handlebars CVE-2021-23369 Vulnerability",
"fork": false,
"created_at": "2024-10-19T11:27:31Z",
"updated_at": "2024-10-19T11:31:23Z",
"updated_at": "2024-10-20T03:05:09Z",
"pushed_at": "2024-10-19T11:31:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source.",
"fork": false,
"created_at": "2024-10-19T11:37:19Z",
"updated_at": "2024-10-19T11:41:20Z",
"updated_at": "2024-10-20T03:05:37Z",
"pushed_at": "2024-10-19T11:39:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "Kerentanan ini merupakan jenis Local File Inclusion (LFI) yang terdapat pada versi BIQS IT Biqs-drive v1.83 dan di bawahnya. Kerentanan ini dapat dieksploitasi dengan mengirimkan payload tertentu sebagai parameter file ke download\/index.php",
"fork": false,
"created_at": "2024-10-19T19:04:27Z",
"updated_at": "2024-10-19T19:15:31Z",
"pushed_at": "2024-10-19T19:15:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2024-10-20T03:19:51Z",
"pushed_at": "2024-10-20T03:19:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2022-08-20T03:01:30Z",
"updated_at": "2024-09-30T03:01:23Z",
"updated_at": "2024-10-20T03:46:31Z",
"pushed_at": "2023-02-20T23:29:21Z",
"stargazers_count": 154,
"watchers_count": 154,
"stargazers_count": 153,
"watchers_count": 153,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 154,
"watchers": 153,
"score": 0,
"subscribers_count": 12
}

View file

@ -19,7 +19,7 @@
"stargazers_count": 763,
"watchers_count": 763,
"has_discussions": false,
"forks_count": 159,
"forks_count": 160,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -28,7 +28,7 @@
"cve-2022-22718"
],
"visibility": "public",
"forks": 159,
"forks": 160,
"watchers": 763,
"score": 0,
"subscribers_count": 15

View file

@ -28,7 +28,7 @@
"forks": 3,
"watchers": 6,
"score": 0,
"subscribers_count": 9
"subscribers_count": 10
},
{
"id": 504359221,

View file

@ -62,6 +62,6 @@
"forks": 0,
"watchers": 25,
"score": 0,
"subscribers_count": 1
"subscribers_count": 3
}
]

View file

@ -14,10 +14,10 @@
"description": "Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability",
"fork": false,
"created_at": "2024-04-22T07:05:04Z",
"updated_at": "2024-10-19T13:06:32Z",
"updated_at": "2024-10-20T02:48:52Z",
"pushed_at": "2024-05-09T16:39:55Z",
"stargazers_count": 212,
"watchers_count": 212,
"stargazers_count": 211,
"watchers_count": 211,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 212,
"watchers": 211,
"score": 0,
"subscribers_count": 5
},

View file

@ -28,7 +28,7 @@
"forks": 63,
"watchers": 312,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
},
{
"id": 813503450,

View file

@ -14,19 +14,19 @@
"description": null,
"fork": false,
"created_at": "2024-06-24T10:37:26Z",
"updated_at": "2024-10-19T10:43:10Z",
"updated_at": "2024-10-20T00:38:08Z",
"pushed_at": "2024-07-31T19:11:55Z",
"stargazers_count": 222,
"watchers_count": 222,
"stargazers_count": 223,
"watchers_count": 223,
"has_discussions": false,
"forks_count": 47,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 222,
"forks": 48,
"watchers": 223,
"score": 0,
"subscribers_count": 3
},
@ -45,19 +45,19 @@
"description": "🆘New Windows Kernel Priviledge Escalation Vulnerability",
"fork": false,
"created_at": "2024-06-27T07:05:46Z",
"updated_at": "2024-10-15T01:22:50Z",
"updated_at": "2024-10-20T00:37:39Z",
"pushed_at": "2024-06-27T07:19:11Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
@ -76,19 +76,19 @@
"description": "该漏洞存在于 NtQueryInformationToken 函数中特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。",
"fork": false,
"created_at": "2024-07-05T16:02:56Z",
"updated_at": "2024-10-17T07:47:02Z",
"updated_at": "2024-10-20T00:37:25Z",
"pushed_at": "2024-07-05T16:06:16Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 31,
"forks": 14,
"watchers": 32,
"score": 0,
"subscribers_count": 1
},
@ -200,7 +200,7 @@
"description": "Windows Kernel Elevation of Privilege (PoC) ",
"fork": false,
"created_at": "2024-10-19T13:54:33Z",
"updated_at": "2024-10-19T14:41:12Z",
"updated_at": "2024-10-20T00:35:42Z",
"pushed_at": "2024-10-19T14:41:08Z",
"stargazers_count": 0,
"watchers_count": 0,
@ -214,6 +214,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false,
"created_at": "2024-10-13T19:30:20Z",
"updated_at": "2024-10-19T22:59:56Z",
"updated_at": "2024-10-20T05:20:22Z",
"pushed_at": "2024-10-17T18:36:54Z",
"stargazers_count": 166,
"watchers_count": 166,
"stargazers_count": 167,
"watchers_count": 167,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@ -26,8 +26,8 @@
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 166,
"watchers": 167,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
}
]

View file

@ -14,10 +14,10 @@
"description": "Scanner for CVE-2024-4040",
"fork": false,
"created_at": "2024-04-23T09:31:29Z",
"updated_at": "2024-07-31T12:18:30Z",
"updated_at": "2024-10-20T02:48:52Z",
"pushed_at": "2024-05-17T06:48:43Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 50,
"watchers": 49,
"score": 0,
"subscribers_count": 8
},

View file

@ -108,7 +108,7 @@
"fork": false,
"created_at": "2024-05-22T23:18:20Z",
"updated_at": "2024-08-17T19:52:12Z",
"pushed_at": "2024-10-13T04:39:48Z",
"pushed_at": "2024-10-20T04:08:37Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -169,10 +169,10 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-10-10T22:58:25Z",
"updated_at": "2024-10-20T05:56:35Z",
"pushed_at": "2024-06-22T15:13:52Z",
"stargazers_count": 215,
"watchers_count": 215,
"stargazers_count": 216,
"watchers_count": 216,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 215,
"watchers": 216,
"score": 0,
"subscribers_count": 4
},

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -237,10 +237,10 @@
"description": "Unauthenticated RCE on cups-browsed (exploit and nuclei template)",
"fork": false,
"created_at": "2024-10-03T15:53:04Z",
"updated_at": "2024-10-11T00:37:50Z",
"updated_at": "2024-10-20T03:11:59Z",
"pushed_at": "2024-10-03T17:11:17Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -257,7 +257,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
@ -414,6 +414,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension. ",
"fork": false,
"created_at": "2024-09-10T06:27:59Z",
"updated_at": "2024-10-19T15:19:37Z",
"updated_at": "2024-10-20T04:34:05Z",
"pushed_at": "2024-10-17T05:12:29Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 24,
"watchers": 25,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,12 +14,12 @@
"description": "Exploit for Grafana arbitrary file-read (CVE-2024-9264)",
"fork": false,
"created_at": "2024-10-19T13:50:52Z",
"updated_at": "2024-10-19T20:20:04Z",
"updated_at": "2024-10-20T05:50:59Z",
"pushed_at": "2024-10-19T16:01:12Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -37,8 +37,70 @@
"vulnerability"
],
"visibility": "public",
"forks": 4,
"watchers": 6,
"forks": 5,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
{
"id": 875437112,
"name": "File-Read-CVE-2024-9264",
"full_name": "z3k0sec\/File-Read-CVE-2024-9264",
"owner": {
"login": "z3k0sec",
"id": 135271952,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135271952?v=4",
"html_url": "https:\/\/github.com\/z3k0sec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/z3k0sec\/File-Read-CVE-2024-9264",
"description": "File Read Proof of Concept for CVE-2024-9264",
"fork": false,
"created_at": "2024-10-20T01:13:37Z",
"updated_at": "2024-10-20T02:20:27Z",
"pushed_at": "2024-10-20T02:20:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 875485476,
"name": "CVE-2024-9264",
"full_name": "zgimszhd61\/CVE-2024-9264",
"owner": {
"login": "zgimszhd61",
"id": 114722053,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114722053?v=4",
"html_url": "https:\/\/github.com\/zgimszhd61",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zgimszhd61\/CVE-2024-9264",
"description": "Exploit for Grafana arbitrary file-read (CVE-2024-9264)",
"fork": false,
"created_at": "2024-10-20T05:23:31Z",
"updated_at": "2024-10-20T05:34:52Z",
"pushed_at": "2024-10-20T05:34:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -1614,6 +1614,8 @@
### CVE-2024-9264
- [nollium/CVE-2024-9264](https://github.com/nollium/CVE-2024-9264)
- [z3k0sec/File-Read-CVE-2024-9264](https://github.com/z3k0sec/File-Read-CVE-2024-9264)
- [zgimszhd61/CVE-2024-9264](https://github.com/zgimszhd61/CVE-2024-9264)
### CVE-2024-9441
- [adhikara13/CVE-2024-9441](https://github.com/adhikara13/CVE-2024-9441)