Auto Update 2024/08/13 12:30:10

This commit is contained in:
motikan2010-bot 2024-08-13 21:30:10 +09:00
parent 7d910fd64f
commit b0d4228340
42 changed files with 361 additions and 143 deletions

View file

@ -13,10 +13,10 @@
"description": "CVE-2013-4786 Go exploitation tool",
"fork": false,
"created_at": "2023-10-23T20:01:37Z",
"updated_at": "2024-07-11T17:24:16Z",
"updated_at": "2024-08-13T09:47:06Z",
"pushed_at": "2023-11-01T19:23:34Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 35,
"watchers": 36,
"score": 0,
"subscribers_count": 4
}

View file

@ -18,7 +18,7 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -33,7 +33,7 @@
"phpmyadmin-scanner"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0

View file

@ -43,10 +43,10 @@
"description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
"fork": false,
"created_at": "2021-05-22T05:06:33Z",
"updated_at": "2024-08-12T20:13:15Z",
"updated_at": "2024-08-13T08:11:36Z",
"pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 163,
"watchers_count": 163,
"stargazers_count": 162,
"watchers_count": 162,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 38,
"watchers": 163,
"watchers": 162,
"score": 0,
"subscribers_count": 5
},

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-08-12T19:59:34Z",
"updated_at": "2024-08-13T07:31:20Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4082,
"watchers_count": 4082,
"stargazers_count": 4083,
"watchers_count": 4083,
"has_discussions": false,
"forks_count": 1088,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1088,
"watchers": 4082,
"watchers": 4083,
"score": 0,
"subscribers_count": 151
},

View file

@ -13,10 +13,10 @@
"description": "Double-Free BUG in WhatsApp exploit poc.",
"fork": false,
"created_at": "2020-05-10T15:25:59Z",
"updated_at": "2024-08-12T20:01:20Z",
"updated_at": "2024-08-13T11:22:56Z",
"pushed_at": "2020-05-10T15:32:54Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 38,
"watchers": 90,
"watchers": 91,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-08-12T19:59:34Z",
"updated_at": "2024-08-13T07:31:20Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4082,
"watchers_count": 4082,
"stargazers_count": 4083,
"watchers_count": 4083,
"has_discussions": false,
"forks_count": 1088,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1088,
"watchers": 4082,
"watchers": 4083,
"score": 0,
"subscribers_count": 151
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2024-08-05T06:15:26Z",
"updated_at": "2024-08-05T13:25:25Z",
"pushed_at": "2024-08-05T13:25:22Z",
"pushed_at": "2024-08-13T06:34:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -1074,10 +1074,10 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2024-08-12T20:11:14Z",
"updated_at": "2024-08-13T10:42:23Z",
"pushed_at": "2022-01-13T05:48:01Z",
"stargazers_count": 726,
"watchers_count": 726,
"stargazers_count": 727,
"watchers_count": 727,
"has_discussions": false,
"forks_count": 169,
"allow_forking": true,
@ -1086,7 +1086,7 @@
"topics": [],
"visibility": "public",
"forks": 169,
"watchers": 726,
"watchers": 727,
"score": 0,
"subscribers_count": 11
},

View file

@ -574,7 +574,7 @@
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -591,7 +591,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 7,
"score": 0,
"subscribers_count": 0

View file

@ -13,10 +13,10 @@
"description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
"fork": false,
"created_at": "2021-05-22T05:06:33Z",
"updated_at": "2024-08-12T20:13:15Z",
"updated_at": "2024-08-13T08:11:36Z",
"pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 163,
"watchers_count": 163,
"stargazers_count": 162,
"watchers_count": 162,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 38,
"watchers": 163,
"watchers": 162,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-22629 Proof of Concept",
"fork": false,
"created_at": "2022-09-09T17:21:27Z",
"updated_at": "2024-08-12T20:26:53Z",
"updated_at": "2024-08-13T08:43:37Z",
"pushed_at": "2022-09-09T21:23:08Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 50,
"watchers": 51,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2024-08-12T20:23:42Z",
"updated_at": "2024-08-13T08:17:28Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1147,
"watchers_count": 1147,
"stargazers_count": 1148,
"watchers_count": 1148,
"has_discussions": true,
"forks_count": 190,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 190,
"watchers": 1147,
"watchers": 1148,
"score": 0,
"subscribers_count": 19
},

View file

@ -103,10 +103,10 @@
"description": "检测域内常见一把梭漏洞包括NoPac、ZeroLogon、CVE-2022-26923、PrintNightMare",
"fork": false,
"created_at": "2023-10-17T06:29:44Z",
"updated_at": "2024-07-31T13:16:07Z",
"updated_at": "2024-08-13T10:12:39Z",
"pushed_at": "2023-10-23T04:47:11Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
"updated_at": "2024-08-12T20:22:37Z",
"updated_at": "2024-08-13T11:23:08Z",
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 365,
"watchers_count": 365,
"stargazers_count": 366,
"watchers_count": 366,
"has_discussions": false,
"forks_count": 93,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 93,
"watchers": 365,
"watchers": 366,
"score": 0,
"subscribers_count": 8
},

View file

@ -208,10 +208,10 @@
"description": "Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)",
"fork": false,
"created_at": "2024-07-23T09:44:46Z",
"updated_at": "2024-08-13T04:03:13Z",
"updated_at": "2024-08-13T10:54:39Z",
"pushed_at": "2024-07-23T10:03:08Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -220,7 +220,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 14,
"watchers": 16,
"score": 0,
"subscribers_count": 0
},

View file

@ -46,10 +46,10 @@
"description": "Bootloader unlock using CVE-2022-38694 for Anbernic Unisoc T820 devices",
"fork": false,
"created_at": "2024-06-27T14:28:13Z",
"updated_at": "2024-07-17T16:41:53Z",
"updated_at": "2024-08-13T08:36:58Z",
"pushed_at": "2024-07-01T22:13:19Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -58,7 +58,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-03-11T15:04:51Z",
"updated_at": "2024-08-08T20:02:03Z",
"updated_at": "2024-08-13T10:47:32Z",
"pushed_at": "2024-01-09T21:11:58Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2
}

View file

@ -43,10 +43,10 @@
"description": "cve-2023-21768",
"fork": false,
"created_at": "2023-03-10T03:36:52Z",
"updated_at": "2024-08-13T00:04:38Z",
"updated_at": "2024-08-13T09:47:57Z",
"pushed_at": "2023-03-10T04:03:04Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "pocs & exploit for CVE-2023-24871 (rce + lpe)",
"fork": false,
"created_at": "2024-06-21T15:01:15Z",
"updated_at": "2024-08-07T20:47:41Z",
"updated_at": "2024-08-13T08:19:00Z",
"pushed_at": "2024-07-17T12:34:16Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 42,
"watchers": 43,
"score": 0,
"subscribers_count": 2
}

View file

@ -52,7 +52,7 @@
"stargazers_count": 262,
"watchers_count": 262,
"has_discussions": false,
"forks_count": 37,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -66,7 +66,7 @@
"poc"
],
"visibility": "public",
"forks": 37,
"forks": 36,
"watchers": 262,
"score": 0,
"subscribers_count": 4

32
2023/CVE-2023-3897.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 841902358,
"name": "CVE-2023-3897",
"full_name": "jFriedli\/CVE-2023-3897",
"owner": {
"login": "jFriedli",
"id": 12858685,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12858685?v=4",
"html_url": "https:\/\/github.com\/jFriedli"
},
"html_url": "https:\/\/github.com\/jFriedli\/CVE-2023-3897",
"description": null,
"fork": false,
"created_at": "2024-08-13T09:20:21Z",
"updated_at": "2024-08-13T09:26:04Z",
"pushed_at": "2024-08-13T09:26:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-08-13T03:50:46Z",
"updated_at": "2024-08-13T12:01:00Z",
"pushed_at": "2024-07-24T13:17:05Z",
"stargazers_count": 1051,
"watchers_count": 1051,
"stargazers_count": 1054,
"watchers_count": 1054,
"has_discussions": false,
"forks_count": 180,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 180,
"watchers": 1051,
"watchers": 1054,
"score": 0,
"subscribers_count": 17
},

View file

@ -43,10 +43,10 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
"fork": false,
"created_at": "2023-10-27T05:57:21Z",
"updated_at": "2024-08-03T04:27:34Z",
"updated_at": "2024-08-13T08:45:34Z",
"pushed_at": "2024-01-29T02:28:11Z",
"stargazers_count": 212,
"watchers_count": 212,
"stargazers_count": 213,
"watchers_count": 213,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 212,
"watchers": 213,
"score": 0,
"subscribers_count": 4
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 148,
"watchers_count": 148,
"has_discussions": false,
"forks_count": 33,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 33,
"forks": 30,
"watchers": 148,
"score": 0,
"subscribers_count": 4

View file

@ -77,10 +77,10 @@
"description": "This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to steal data, modify data, or disrupt the availability of the server.",
"fork": false,
"created_at": "2024-05-24T05:38:18Z",
"updated_at": "2024-07-31T04:13:17Z",
"updated_at": "2024-08-13T09:36:06Z",
"pushed_at": "2024-05-24T05:56:48Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -89,7 +89,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

32
2024/CVE-2024-23709.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 841887434,
"name": "external_sonivox_CVE-2024-23709",
"full_name": "AbrarKhan\/external_sonivox_CVE-2024-23709",
"owner": {
"login": "AbrarKhan",
"id": 3054615,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3054615?v=4",
"html_url": "https:\/\/github.com\/AbrarKhan"
},
"html_url": "https:\/\/github.com\/AbrarKhan\/external_sonivox_CVE-2024-23709",
"description": null,
"fork": false,
"created_at": "2024-08-13T08:44:25Z",
"updated_at": "2024-08-13T08:52:26Z",
"pushed_at": "2024-08-13T08:52:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -350,19 +350,19 @@
"description": "CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information #RCE #python3",
"fork": false,
"created_at": "2024-08-12T04:46:34Z",
"updated_at": "2024-08-13T04:31:18Z",
"updated_at": "2024-08-13T09:27:51Z",
"pushed_at": "2024-08-12T04:47:04Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"forks": 3,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "A Pwn2Own SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE",
"fork": false,
"created_at": "2024-06-27T13:47:52Z",
"updated_at": "2024-08-05T07:44:30Z",
"updated_at": "2024-08-13T07:55:18Z",
"pushed_at": "2024-07-07T03:36:49Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 80,
"watchers": 81,
"score": 0,
"subscribers_count": 1
}

View file

@ -108,13 +108,13 @@
"stargazers_count": 292,
"watchers_count": 292,
"has_discussions": false,
"forks_count": 26,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 26,
"forks": 27,
"watchers": 292,
"score": 0,
"subscribers_count": 15

View file

@ -498,7 +498,7 @@
"stargazers_count": 142,
"watchers_count": 142,
"has_discussions": false,
"forks_count": 23,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -509,7 +509,7 @@
"xz"
],
"visibility": "public",
"forks": 23,
"forks": 21,
"watchers": 142,
"score": 0,
"subscribers_count": 8

32
2024/CVE-2024-31315.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 710515841,
"name": "frameworks_base_CVE-2024-31315",
"full_name": "uthrasri\/frameworks_base_CVE-2024-31315",
"owner": {
"login": "uthrasri",
"id": 145666390,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
"html_url": "https:\/\/github.com\/uthrasri"
},
"html_url": "https:\/\/github.com\/uthrasri\/frameworks_base_CVE-2024-31315",
"description": null,
"fork": false,
"created_at": "2023-10-26T21:21:46Z",
"updated_at": "2024-08-13T09:07:15Z",
"pushed_at": "2024-08-09T12:52:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "Exploit for CVE-2024-3273, supports single and multiple hosts",
"fork": false,
"created_at": "2024-04-07T15:36:18Z",
"updated_at": "2024-08-01T14:29:58Z",
"updated_at": "2024-08-13T12:07:07Z",
"pushed_at": "2024-04-07T15:41:42Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "BlueStacks privilege escalation through VM backdooring",
"fork": false,
"created_at": "2024-07-16T07:38:19Z",
"updated_at": "2024-08-04T21:59:33Z",
"updated_at": "2024-08-13T08:50:05Z",
"pushed_at": "2024-07-16T09:12:57Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 18,
"watchers": 20,
"score": 0,
"subscribers_count": 1
}

View file

@ -592,5 +592,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 841861554,
"name": "CVE-2024-34102",
"full_name": "EQSTSeminar\/CVE-2024-34102",
"owner": {
"login": "EQSTSeminar",
"id": 148991397,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148991397?v=4",
"html_url": "https:\/\/github.com\/EQSTSeminar"
},
"html_url": "https:\/\/github.com\/EQSTSeminar\/CVE-2024-34102",
"description": "PoC for CVE-2024-34102",
"fork": false,
"created_at": "2024-08-13T07:33:20Z",
"updated_at": "2024-08-13T08:48:50Z",
"pushed_at": "2024-08-13T08:48:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-36424.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 841733200,
"name": "CVE-2024-36424",
"full_name": "secunnix\/CVE-2024-36424",
"owner": {
"login": "secunnix",
"id": 104568161,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104568161?v=4",
"html_url": "https:\/\/github.com\/secunnix"
},
"html_url": "https:\/\/github.com\/secunnix\/CVE-2024-36424",
"description": "K7 Ultimate Security < v17.0.2019 \"K7RKScan.sys\" Null Pointer Dereference PoC ",
"fork": false,
"created_at": "2024-08-13T00:06:17Z",
"updated_at": "2024-08-13T11:08:05Z",
"pushed_at": "2024-08-13T00:26:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "原文已被作者删除备份用非原创EXP & POC",
"fork": false,
"created_at": "2024-08-09T01:18:48Z",
"updated_at": "2024-08-13T03:43:52Z",
"updated_at": "2024-08-13T11:37:27Z",
"pushed_at": "2024-08-09T17:18:10Z",
"stargazers_count": 303,
"watchers_count": 303,
"stargazers_count": 310,
"watchers_count": 310,
"has_discussions": false,
"forks_count": 212,
"forks_count": 214,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 212,
"watchers": 303,
"forks": 214,
"watchers": 310,
"score": 0,
"subscribers_count": 7
},
@ -43,19 +43,19 @@
"description": "RDL的堆溢出导致的RCE",
"fork": false,
"created_at": "2024-08-09T05:00:44Z",
"updated_at": "2024-08-13T03:20:21Z",
"updated_at": "2024-08-13T12:03:32Z",
"pushed_at": "2024-08-09T10:12:42Z",
"stargazers_count": 149,
"watchers_count": 149,
"stargazers_count": 153,
"watchers_count": 153,
"has_discussions": false,
"forks_count": 58,
"forks_count": 59,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 58,
"watchers": 149,
"forks": 59,
"watchers": 153,
"score": 0,
"subscribers_count": 5
},
@ -103,10 +103,10 @@
"description": "远程探测 remote desktop licensing 服务开放情况,用于 CVE-2024-38077 漏洞快速排查",
"fork": false,
"created_at": "2024-08-09T07:45:25Z",
"updated_at": "2024-08-13T06:32:35Z",
"updated_at": "2024-08-13T07:38:42Z",
"pushed_at": "2024-08-09T08:06:19Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 3
},
@ -193,10 +193,10 @@
"description": "检测RDL服务是否运行快速排查受影响资产",
"fork": false,
"created_at": "2024-08-10T01:10:06Z",
"updated_at": "2024-08-12T13:38:36Z",
"updated_at": "2024-08-13T07:38:52Z",
"pushed_at": "2024-08-10T02:19:43Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856)",
"fork": false,
"created_at": "2024-08-08T02:40:56Z",
"updated_at": "2024-08-13T00:17:16Z",
"updated_at": "2024-08-13T07:57:28Z",
"pushed_at": "2024-08-11T03:28:23Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2024-40348. Will attempt to read \/etc\/passwd from target",
"fork": false,
"created_at": "2024-07-21T00:54:55Z",
"updated_at": "2024-08-06T15:31:57Z",
"updated_at": "2024-08-13T12:27:26Z",
"pushed_at": "2024-07-21T09:54:02Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 24,
"watchers": 25,
"score": 0,
"subscribers_count": 1
}

View file

@ -62,5 +62,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 841861299,
"name": "CVE-2024-43044-POC",
"full_name": "v9d0g\/CVE-2024-43044-POC",
"owner": {
"login": "v9d0g",
"id": 139420834,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139420834?v=4",
"html_url": "https:\/\/github.com\/v9d0g"
},
"html_url": "https:\/\/github.com\/v9d0g\/CVE-2024-43044-POC",
"description": "CVE-2024-43044的利用方式",
"fork": false,
"created_at": "2024-08-13T07:32:35Z",
"updated_at": "2024-08-13T07:43:25Z",
"pushed_at": "2024-08-13T07:43:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -163,10 +163,10 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-08-07T12:42:53Z",
"updated_at": "2024-08-13T08:53:07Z",
"pushed_at": "2024-06-22T15:13:52Z",
"stargazers_count": 185,
"watchers_count": 185,
"stargazers_count": 186,
"watchers_count": 186,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 185,
"watchers": 186,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-07-18T07:52:46Z",
"updated_at": "2024-08-13T02:26:38Z",
"updated_at": "2024-08-13T07:51:01Z",
"pushed_at": "2024-08-12T20:48:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2
}

View file

@ -1752,6 +1752,13 @@
- [uthrasri/CVE-2024-23708](https://github.com/uthrasri/CVE-2024-23708)
### CVE-2024-23709 (2024-05-07)
<code>In multiple locations, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.
</code>
- [AbrarKhan/external_sonivox_CVE-2024-23709](https://github.com/AbrarKhan/external_sonivox_CVE-2024-23709)
### CVE-2024-23722 (2024-03-26)
<code>In Fluent Bit 2.1.8 through 2.2.1, a NULL pointer dereference can be caused via an invalid HTTP payload with the content type of x-www-form-urlencoded. It crashes and does not restart. This could result in logs not being delivered properly.
@ -2949,6 +2956,13 @@
- [Abdurahmon3236/-CVE-2024-31211](https://github.com/Abdurahmon3236/-CVE-2024-31211)
### CVE-2024-31315 (2024-07-09)
<code>In multiple functions of ManagedServices.java, there is a possible way to hide an app with notification access in the Device &amp; app notifications settings due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
</code>
- [uthrasri/frameworks_base_CVE-2024-31315](https://github.com/uthrasri/frameworks_base_CVE-2024-31315)
### CVE-2024-31351 (2024-05-17)
<code>Unrestricted Upload of File with Dangerous Type vulnerability in Copymatic Copymatic AI Content Writer &amp; Generator.This issue affects Copymatic AI Content Writer &amp; Generator: from n/a through 1.6.
@ -3298,6 +3312,7 @@
- [etx-Arn/CVE-2024-34102-RCE](https://github.com/etx-Arn/CVE-2024-34102-RCE)
- [etx-Arn/CVE-2024-34102-RCE-PoC](https://github.com/etx-Arn/CVE-2024-34102-RCE-PoC)
- [wubinworks/magento2-cosmic-sting-patch](https://github.com/wubinworks/magento2-cosmic-sting-patch)
- [EQSTSeminar/CVE-2024-34102](https://github.com/EQSTSeminar/CVE-2024-34102)
### CVE-2024-34144 (2024-05-02)
@ -3575,6 +3590,13 @@
- [kva55/CVE-2024-36416](https://github.com/kva55/CVE-2024-36416)
### CVE-2024-36424 (2024-08-06)
<code>K7RKScan.sys in K7 Ultimate Security before 17.0.2019 allows local users to cause a denial of service (BSOD) because of a NULL pointer dereference.
</code>
- [secunnix/CVE-2024-36424](https://github.com/secunnix/CVE-2024-36424)
### CVE-2024-36527 (2024-06-17)
<code>puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal. Attackers can exploit the URL parameter using the file protocol to read sensitive information from the server.
@ -4115,6 +4137,7 @@
- [HwMex0/CVE-2024-43044](https://github.com/HwMex0/CVE-2024-43044)
- [jenkinsci-cert/SECURITY-3430](https://github.com/jenkinsci-cert/SECURITY-3430)
- [v9d0g/CVE-2024-43044-POC](https://github.com/v9d0g/CVE-2024-43044-POC)
### CVE-2024-56662
- [nimosec/cve-2024-56662](https://github.com/nimosec/cve-2024-56662)
@ -4862,6 +4885,13 @@
- [AnugiArrawwala/CVE-Research](https://github.com/AnugiArrawwala/CVE-Research)
### CVE-2023-3897 (2023-07-25)
<code>\nUsername enumeration is possible through Bypassing CAPTCHA in On-premise SureMDM Solution on Windows deployment allows attacker to enumerate local user information via error message.\n\nThis issue affects SureMDM On-premise: 6.31 and below version \n\n
</code>
- [jFriedli/CVE-2023-3897](https://github.com/jFriedli/CVE-2023-3897)
### CVE-2023-3971 (2023-10-04)
<code>An HTML injection flaw was found in Controller in the user interface settings. This flaw allows an attacker to capture credentials by creating a custom login page by injecting HTML, resulting in a complete compromise.