Auto Update 2024/02/10 12:25:59

This commit is contained in:
motikan2010-bot 2024-02-10 21:25:59 +09:00
parent 61a0e6bbcf
commit b7d5ab09b6
24 changed files with 118 additions and 79 deletions

View file

@ -13,10 +13,10 @@
"description": "CVE-2013-4786 Go exploitation tool",
"fork": false,
"created_at": "2023-10-23T20:01:37Z",
"updated_at": "2024-02-02T10:02:43Z",
"updated_at": "2024-02-10T07:04:23Z",
"pushed_at": "2023-11-01T19:23:34Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 29,
"watchers": 30,
"score": 0,
"subscribers_count": 4
}

View file

@ -1158,10 +1158,10 @@
"description": "Shellshock exploit + vulnerable environment",
"fork": false,
"created_at": "2016-12-07T23:38:50Z",
"updated_at": "2024-02-05T18:14:56Z",
"updated_at": "2024-02-10T06:26:13Z",
"pushed_at": "2023-05-11T02:12:25Z",
"stargazers_count": 181,
"watchers_count": 181,
"stargazers_count": 182,
"watchers_count": 182,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
@ -1177,7 +1177,7 @@
],
"visibility": "public",
"forks": 57,
"watchers": 181,
"watchers": 182,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container",
"fork": false,
"created_at": "2017-01-09T20:08:56Z",
"updated_at": "2024-01-02T06:44:55Z",
"updated_at": "2024-02-10T07:28:49Z",
"pushed_at": "2018-04-07T00:30:52Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 32,
"watchers": 33,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Blueborne CVE-2017-1000251 PoC for linux machines",
"fork": false,
"created_at": "2017-09-23T06:29:31Z",
"updated_at": "2023-09-28T10:44:39Z",
"updated_at": "2024-02-10T11:17:40Z",
"pushed_at": "2023-03-10T03:04:17Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 2
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 209,
"watchers_count": 209,
"has_discussions": false,
"forks_count": 72,
"forks_count": 73,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 72,
"forks": 73,
"watchers": 209,
"score": 0,
"subscribers_count": 11

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-12-14T01:05:45Z",
"updated_at": "2024-01-27T02:54:03Z",
"pushed_at": "2024-02-04T21:17:22Z",
"pushed_at": "2024-02-10T09:36:11Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -174,7 +174,7 @@
"stargazers_count": 1005,
"watchers_count": 1005,
"has_discussions": false,
"forks_count": 313,
"forks_count": 314,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -184,7 +184,7 @@
"poc"
],
"visibility": "public",
"forks": 313,
"forks": 314,
"watchers": 1005,
"score": 0,
"subscribers_count": 16

View file

@ -1644,10 +1644,10 @@
"description": "一款Spring综合漏洞的利用工具工具目前支持Spring Cloud Gateway RCE(CVE-2022-22947)、Spring Framework RCE (CVE-2022-22965) 的检测以及利用",
"fork": false,
"created_at": "2024-02-06T08:45:19Z",
"updated_at": "2024-02-09T10:07:04Z",
"updated_at": "2024-02-10T09:51:12Z",
"pushed_at": "2024-02-06T09:14:32Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -1656,7 +1656,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-31814 Exploitation Toolkit.",
"fork": false,
"created_at": "2022-09-18T11:10:04Z",
"updated_at": "2023-07-21T00:29:36Z",
"updated_at": "2024-02-10T08:12:19Z",
"pushed_at": "2022-09-21T13:41:29Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Let's control Secure Boot Chain ourselves.",
"fork": false,
"created_at": "2023-12-01T07:32:18Z",
"updated_at": "2024-02-07T23:18:03Z",
"updated_at": "2024-02-10T11:56:08Z",
"pushed_at": "2024-01-25T01:35:44Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-02-07T23:15:26Z",
"updated_at": "2024-02-10T11:56:02Z",
"pushed_at": "2024-02-06T01:58:14Z",
"stargazers_count": 158,
"watchers_count": 158,
"stargazers_count": 159,
"watchers_count": 159,
"has_discussions": true,
"forks_count": 22,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 158,
"watchers": 159,
"score": 0,
"subscribers_count": 7
}

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-07-13T13:17:20Z",
"updated_at": "2024-01-30T02:29:21Z",
"pushed_at": "2024-02-09T16:32:55Z",
"pushed_at": "2024-02-10T12:06:26Z",
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,

View file

@ -73,10 +73,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2024-02-04T11:34:15Z",
"updated_at": "2024-02-10T08:50:07Z",
"pushed_at": "2023-08-02T09:35:14Z",
"stargazers_count": 865,
"watchers_count": 865,
"stargazers_count": 866,
"watchers_count": 866,
"has_discussions": false,
"forks_count": 72,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 72,
"watchers": 865,
"watchers": 866,
"score": 0,
"subscribers_count": 25
},

View file

@ -133,10 +133,10 @@
"description": "A modification to fortra's CVE-2023-28252 exploit, compiled to exe",
"fork": false,
"created_at": "2024-01-22T10:38:02Z",
"updated_at": "2024-02-08T17:57:50Z",
"updated_at": "2024-02-10T08:19:40Z",
"pushed_at": "2024-01-24T13:45:56Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 42,
"watchers": 43,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "EXP for CVE-2023-28434 MinIO unauthorized to RCE",
"fork": false,
"created_at": "2023-03-27T08:53:04Z",
"updated_at": "2024-02-09T21:21:52Z",
"updated_at": "2024-02-10T06:27:30Z",
"pushed_at": "2023-04-04T05:26:59Z",
"stargazers_count": 291,
"watchers_count": 291,
"stargazers_count": 292,
"watchers_count": 292,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 291,
"watchers": 292,
"score": 0,
"subscribers_count": 3
}

View file

@ -174,10 +174,10 @@
"description": "CVE-2023-38831 PoC (Proof Of Concept)",
"fork": false,
"created_at": "2023-08-28T04:56:10Z",
"updated_at": "2024-01-31T08:07:52Z",
"updated_at": "2024-02-10T07:22:57Z",
"pushed_at": "2023-08-28T20:41:57Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -186,7 +186,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 51,
"watchers": 50,
"score": 0,
"subscribers_count": 0
},

View file

@ -40,11 +40,11 @@
"html_url": "https:\/\/github.com\/tarimoe"
},
"html_url": "https:\/\/github.com\/tarimoe\/blackjump",
"description": "JumpServer 堡垒机未授权综合漏洞利用, CVE-2023-42442 \/ CVE-2023-42820 Exploit",
"description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021",
"fork": false,
"created_at": "2023-10-14T09:35:07Z",
"updated_at": "2024-01-23T01:03:08Z",
"pushed_at": "2023-10-15T01:28:07Z",
"updated_at": "2024-02-10T09:41:11Z",
"pushed_at": "2024-02-10T09:42:29Z",
"stargazers_count": 96,
"watchers_count": 96,
"has_discussions": false,

View file

@ -193,10 +193,10 @@
"description": null,
"fork": false,
"created_at": "2023-12-18T23:12:25Z",
"updated_at": "2024-01-27T22:39:35Z",
"updated_at": "2024-02-10T10:06:56Z",
"pushed_at": "2024-01-22T14:29:21Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 33,
"watchers": 34,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-12T15:08:01Z",
"updated_at": "2024-02-08T17:52:23Z",
"updated_at": "2024-02-10T11:04:24Z",
"pushed_at": "2024-01-14T07:14:33Z",
"stargazers_count": 102,
"watchers_count": 102,
"stargazers_count": 104,
"watchers_count": 104,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 102,
"watchers": 104,
"score": 0,
"subscribers_count": 1
}

View file

@ -48,13 +48,13 @@
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 8,
"score": 0,
"subscribers_count": 1

View file

@ -13,19 +13,19 @@
"description": "Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure",
"fork": false,
"created_at": "2024-02-09T14:31:56Z",
"updated_at": "2024-02-10T05:28:40Z",
"updated_at": "2024-02-10T09:11:55Z",
"pushed_at": "2024-02-09T15:14:03Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"forks": 2,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
@ -43,8 +43,8 @@
"description": "CVE-2024-22024 vulnerability in Ivanti Connect Secure",
"fork": false,
"created_at": "2024-02-10T06:23:44Z",
"updated_at": "2024-02-10T06:23:45Z",
"pushed_at": "2024-02-10T06:27:21Z",
"updated_at": "2024-02-10T06:37:03Z",
"pushed_at": "2024-02-10T06:38:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-02-04T07:37:21Z",
"updated_at": "2024-02-07T12:22:55Z",
"updated_at": "2024-02-10T10:04:06Z",
"pushed_at": "2024-02-05T02:11:42Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 2
}

32
2024/CVE-2024-24816.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 755475889,
"name": "CVE-2024-24816",
"full_name": "afine-com\/CVE-2024-24816",
"owner": {
"login": "afine-com",
"id": 105647610,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105647610?v=4",
"html_url": "https:\/\/github.com\/afine-com"
},
"html_url": "https:\/\/github.com\/afine-com\/CVE-2024-24816",
"description": "CKEditor 4 < 4.24.0-lts - XSS vulnerability in samples that use the \"preview\" feature.",
"fork": false,
"created_at": "2024-02-10T10:26:35Z",
"updated_at": "2024-02-10T10:26:36Z",
"pushed_at": "2024-02-10T10:32:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -416,6 +416,13 @@
- [minj-ae/CVE-2024-24488](https://github.com/minj-ae/CVE-2024-24488)
### CVE-2024-24816 (-)
<code>CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A cross-site scripting vulnerability vulnerability has been discovered in versions prior to 4.24.0-lts in samples that use the `preview` feature. All integrators that use these samples in the production code can be affected. The vulnerability allows an attacker to execute JavaScript code by abusing the misconfigured preview feature. It affects all users using the CKEditor 4 at version &lt; 4.24.0-lts with affected samples used in a production environment. A fix is available in version 4.24.0-lts.
</code>
- [afine-com/CVE-2024-24816](https://github.com/afine-com/CVE-2024-24816)
### CVE-2024-65230
- [CBaekhyunC/cve-2024-65230](https://github.com/CBaekhyunC/cve-2024-65230)