Auto Update 2024/02/03 00:26:01

This commit is contained in:
motikan2010-bot 2024-02-03 09:26:01 +09:00
parent 97a4733aa4
commit b7f5321790
14 changed files with 113 additions and 43 deletions

View file

@ -13,10 +13,10 @@
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
"fork": false,
"created_at": "2018-01-04T00:28:50Z",
"updated_at": "2024-01-11T16:03:45Z",
"updated_at": "2024-02-02T23:57:26Z",
"pushed_at": "2018-01-10T01:14:44Z",
"stargazers_count": 733,
"watchers_count": 733,
"stargazers_count": 734,
"watchers_count": 734,
"has_discussions": false,
"forks_count": 182,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 182,
"watchers": 733,
"watchers": 734,
"score": 0,
"subscribers_count": 41
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for Joomla JCK Editor 6.4.4 (CVE-2018-17254)",
"fork": false,
"created_at": "2021-03-05T21:06:45Z",
"updated_at": "2023-05-16T18:47:22Z",
"updated_at": "2024-02-02T19:38:11Z",
"pushed_at": "2021-04-17T20:55:23Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -1957,13 +1957,13 @@
"stargazers_count": 335,
"watchers_count": 335,
"has_discussions": false,
"forks_count": 43,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 43,
"forks": 42,
"watchers": 335,
"score": 0,
"subscribers_count": 6

View file

@ -1527,7 +1527,7 @@
"fork": false,
"created_at": "2021-12-11T12:16:45Z",
"updated_at": "2023-05-28T11:06:10Z",
"pushed_at": "2024-01-25T15:10:49Z",
"pushed_at": "2024-02-02T22:33:39Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-0995 exploit",
"fork": false,
"created_at": "2022-03-26T21:46:09Z",
"updated_at": "2024-01-24T11:19:13Z",
"updated_at": "2024-02-02T22:22:48Z",
"pushed_at": "2022-03-27T09:07:01Z",
"stargazers_count": 490,
"watchers_count": 490,
"stargazers_count": 491,
"watchers_count": 491,
"has_discussions": false,
"forks_count": 72,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 72,
"watchers": 490,
"watchers": 491,
"score": 0,
"subscribers_count": 8
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-09-28T05:38:15Z",
"updated_at": "2024-01-15T17:50:10Z",
"pushed_at": "2024-01-07T10:05:40Z",
"pushed_at": "2024-02-02T20:24:04Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-25636",
"fork": false,
"created_at": "2022-03-07T13:38:41Z",
"updated_at": "2024-01-30T19:33:30Z",
"updated_at": "2024-02-02T22:22:28Z",
"pushed_at": "2022-03-07T17:18:19Z",
"stargazers_count": 426,
"watchers_count": 426,
"stargazers_count": 427,
"watchers_count": 427,
"has_discussions": false,
"forks_count": 86,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 86,
"watchers": 426,
"watchers": 427,
"score": 0,
"subscribers_count": 6
},

View file

@ -14,11 +14,11 @@
"fork": false,
"created_at": "2023-02-28T16:37:33Z",
"updated_at": "2024-02-02T00:29:58Z",
"pushed_at": "2023-04-12T16:13:04Z",
"pushed_at": "2024-02-02T23:35:18Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -28,7 +28,7 @@
"cve-2023-27748"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 6,
"score": 0,
"subscribers_count": 3

View file

@ -13,10 +13,10 @@
"description": "A tool to discover Juniper firewalls vulnerable to CVE-2023-36845",
"fork": false,
"created_at": "2023-09-16T09:11:21Z",
"updated_at": "2023-11-17T12:43:22Z",
"updated_at": "2024-02-02T22:59:15Z",
"pushed_at": "2023-09-17T09:14:32Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 56,
"watchers": 57,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,19 +13,19 @@
"description": "The Poc for CVE-2024-20931",
"fork": false,
"created_at": "2024-02-02T01:58:49Z",
"updated_at": "2024-02-02T16:35:04Z",
"updated_at": "2024-02-02T21:12:06Z",
"pushed_at": "2024-02-02T02:05:01Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 11,
"forks": 6,
"watchers": 12,
"score": 0,
"subscribers_count": 0
}

32
2024/CVE-2024-21893.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 752054404,
"name": "CVE-2024-21893.py",
"full_name": "h4x0r-dz\/CVE-2024-21893.py",
"owner": {
"login": "h4x0r-dz",
"id": 26070859,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26070859?v=4",
"html_url": "https:\/\/github.com\/h4x0r-dz"
},
"html_url": "https:\/\/github.com\/h4x0r-dz\/CVE-2024-21893.py",
"description": "CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure",
"fork": false,
"created_at": "2024-02-02T22:59:21Z",
"updated_at": "2024-02-02T23:03:18Z",
"pushed_at": "2024-02-02T23:27:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-22939",
"fork": false,
"created_at": "2024-01-25T07:00:38Z",
"updated_at": "2024-01-25T07:00:38Z",
"updated_at": "2024-02-02T21:14:51Z",
"pushed_at": "2024-01-25T07:30:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -48,13 +48,13 @@
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 77,
"score": 0,
"subscribers_count": 2
@ -73,10 +73,10 @@
"description": "CVE-2024-23897",
"fork": false,
"created_at": "2024-01-26T09:44:32Z",
"updated_at": "2024-02-02T08:26:17Z",
"updated_at": "2024-02-02T19:13:50Z",
"pushed_at": "2024-01-28T06:47:28Z",
"stargazers_count": 136,
"watchers_count": 136,
"stargazers_count": 137,
"watchers_count": 137,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 136,
"watchers": 137,
"score": 0,
"subscribers_count": 3
},
@ -425,5 +425,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 752057600,
"name": "CVE-2024-23897-RCE",
"full_name": "brijne\/CVE-2024-23897-RCE",
"owner": {
"login": "brijne",
"id": 158627341,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158627341?v=4",
"html_url": "https:\/\/github.com\/brijne"
},
"html_url": "https:\/\/github.com\/brijne\/CVE-2024-23897-RCE",
"description": "CVE-2024-23897 jenkins arbitrary file read which leads to unauthenticated RCE",
"fork": false,
"created_at": "2024-02-02T23:13:26Z",
"updated_at": "2024-02-02T23:13:27Z",
"pushed_at": "2024-02-02T23:19:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -109,6 +109,13 @@
- [mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped](https://github.com/mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped)
- [tucommenceapousser/CVE-2024-21887](https://github.com/tucommenceapousser/CVE-2024-21887)
### CVE-2024-21893 (-)
<code>A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.
</code>
- [h4x0r-dz/CVE-2024-21893.py](https://github.com/h4x0r-dz/CVE-2024-21893.py)
### CVE-2024-22145
- [RandomRobbieBF/CVE-2024-22145](https://github.com/RandomRobbieBF/CVE-2024-22145)
@ -258,6 +265,7 @@
- [viszsec/CVE-2024-23897](https://github.com/viszsec/CVE-2024-23897)
- [jopraveen/CVE-2024-23897](https://github.com/jopraveen/CVE-2024-23897)
- [AbraXa5/Jenkins-CVE-2024-23897](https://github.com/AbraXa5/Jenkins-CVE-2024-23897)
- [brijne/CVE-2024-23897-RCE](https://github.com/brijne/CVE-2024-23897-RCE)
### CVE-2024-24134 (2024-01-29)