Auto Update 2024/06/11 00:29:13

This commit is contained in:
motikan2010-bot 2024-06-11 09:29:13 +09:00
parent 95337c03aa
commit bef6bc6d0a
22 changed files with 77 additions and 71 deletions

View file

@ -363,19 +363,19 @@
"description": "Exploit for Drupal 7 <= 7.57 CVE-2018-7600",
"fork": false,
"created_at": "2018-04-17T15:38:15Z",
"updated_at": "2024-05-22T01:17:24Z",
"updated_at": "2024-06-10T19:00:59Z",
"pushed_at": "2018-04-26T15:40:28Z",
"stargazers_count": 121,
"watchers_count": 121,
"stargazers_count": 122,
"watchers_count": 122,
"has_discussions": false,
"forks_count": 63,
"forks_count": 64,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 121,
"forks": 64,
"watchers": 122,
"score": 0,
"subscribers_count": 5
},

View file

@ -62,14 +62,14 @@
{
"id": 766075527,
"name": "CVE-2019-1663",
"full_name": "Oraxiage\/CVE-2019-1663",
"full_name": "abrumsen\/CVE-2019-1663",
"owner": {
"login": "Oraxiage",
"login": "abrumsen",
"id": 106036263,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106036263?v=4",
"html_url": "https:\/\/github.com\/Oraxiage"
"html_url": "https:\/\/github.com\/abrumsen"
},
"html_url": "https:\/\/github.com\/Oraxiage\/CVE-2019-1663",
"html_url": "https:\/\/github.com\/abrumsen\/CVE-2019-1663",
"description": "Exploiting the pre-authentication code execution vulnerability found on RV130 cisco routers in 2019.",
"fork": false,
"created_at": "2024-03-02T09:15:26Z",

View file

@ -27,6 +27,6 @@
"forks": 10,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,7 +27,7 @@
"forks": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 38
"subscribers_count": 36
},
{
"id": 320642790,

View file

@ -27,7 +27,7 @@
"forks": 24,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 245688871,

View file

@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "Ubuntu OverlayFS Local Privesc",
"fork": false,
"created_at": "2021-04-19T20:07:01Z",
"updated_at": "2024-05-26T14:45:16Z",
"updated_at": "2024-06-10T19:47:15Z",
"pushed_at": "2024-04-02T02:48:18Z",
"stargazers_count": 394,
"watchers_count": 394,
"stargazers_count": 393,
"watchers_count": 393,
"has_discussions": false,
"forks_count": 132,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 132,
"watchers": 394,
"watchers": 393,
"score": 0,
"subscribers_count": 4
},

View file

@ -33,6 +33,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -34,6 +34,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -34,6 +34,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -34,6 +34,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -34,6 +34,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -10,10 +10,10 @@
"html_url": "https:\/\/github.com\/xcanwin"
},
"html_url": "https:\/\/github.com\/xcanwin\/CVE-2023-4357-Chrome-XXE",
"description": "全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.",
"description": "[漏洞复现] 全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.",
"fork": false,
"created_at": "2023-11-17T10:32:31Z",
"updated_at": "2024-05-29T16:29:28Z",
"updated_at": "2024-06-10T22:12:18Z",
"pushed_at": "2023-11-21T10:45:58Z",
"stargazers_count": 187,
"watchers_count": 187,
@ -22,7 +22,9 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"cve-2023-4357"
],
"visibility": "public",
"forks": 33,
"watchers": 187,

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-06-10T13:51:04Z",
"updated_at": "2024-06-10T22:33:04Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2093,
"watchers_count": 2093,
"stargazers_count": 2094,
"watchers_count": 2094,
"has_discussions": false,
"forks_count": 268,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 268,
"watchers": 2093,
"watchers": 2094,
"score": 0,
"subscribers_count": 24
},

View file

@ -43,10 +43,10 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2024-06-10T02:34:29Z",
"updated_at": "2024-06-10T19:08:59Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 630,
"watchers_count": 630,
"stargazers_count": 629,
"watchers_count": 629,
"has_discussions": false,
"forks_count": 140,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 140,
"watchers": 630,
"watchers": 629,
"score": 0,
"subscribers_count": 9
},

View file

@ -13,19 +13,19 @@
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
"fork": false,
"created_at": "2024-06-10T17:02:03Z",
"updated_at": "2024-06-10T17:17:47Z",
"updated_at": "2024-06-11T00:07:25Z",
"pushed_at": "2024-06-10T17:17:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 0
}

View file

@ -50,10 +50,10 @@
"description": "Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit ",
"fork": false,
"created_at": "2024-06-03T19:08:24Z",
"updated_at": "2024-06-10T12:07:31Z",
"updated_at": "2024-06-10T19:47:07Z",
"pushed_at": "2024-06-03T19:20:10Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -83,7 +83,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)",
"fork": false,
"created_at": "2024-06-10T06:12:20Z",
"updated_at": "2024-06-10T18:27:27Z",
"updated_at": "2024-06-11T00:06:34Z",
"pushed_at": "2024-06-10T07:53:44Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 31,
"watchers": 35,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.",
"fork": false,
"created_at": "2024-06-07T05:50:23Z",
"updated_at": "2024-06-10T11:50:04Z",
"updated_at": "2024-06-11T00:15:09Z",
"pushed_at": "2024-06-07T11:49:08Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 62,
"watchers_count": 62,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 60,
"watchers": 62,
"score": 0,
"subscribers_count": 4
},
@ -163,19 +163,19 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-06-10T15:44:42Z",
"updated_at": "2024-06-10T20:10:39Z",
"pushed_at": "2024-06-07T09:53:15Z",
"stargazers_count": 85,
"watchers_count": 85,
"stargazers_count": 87,
"watchers_count": 87,
"has_discussions": false,
"forks_count": 18,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 85,
"forks": 20,
"watchers": 87,
"score": 0,
"subscribers_count": 2
},
@ -527,15 +527,15 @@
"html_url": "https:\/\/github.com\/xcanwin"
},
"html_url": "https:\/\/github.com\/xcanwin\/CVE-2024-4577-PHP-RCE",
"description": "全球首款利用PHP默认环境的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP共享原创EXP支持SSRF支持绕过WAF。The world's first CVE-2024-4577 PHP-CGI RCE exploit utilizing the default PHP environment. Sharing original exploit, supports SSRF, supports WAF bypass.",
"description": "[漏洞复现] 全球首款利用PHP默认环境的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP共享原创EXP支持SSRF支持绕过WAF。The world's first CVE-2024-4577 PHP-CGI RCE exploit utilizing the default PHP environment. Sharing original exploit, supports SSRF, supports WAF bypass.",
"fork": false,
"created_at": "2024-06-08T13:04:45Z",
"updated_at": "2024-06-10T18:20:28Z",
"pushed_at": "2024-06-10T17:50:22Z",
"stargazers_count": 42,
"watchers_count": 42,
"updated_at": "2024-06-11T00:12:13Z",
"pushed_at": "2024-06-10T18:46:40Z",
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -549,8 +549,8 @@
"xampp"
],
"visibility": "public",
"forks": 8,
"watchers": 42,
"forks": 9,
"watchers": 44,
"score": 0,
"subscribers_count": 1
},

View file

@ -372,13 +372,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -2574,7 +2574,11 @@
### CVE-2024-36821
- [IvanGlinkin/CVE-2024-36821](https://github.com/IvanGlinkin/CVE-2024-36821)
### CVE-2024-37393
### CVE-2024-37393 (2024-06-10)
<code>Multiple LDAP injections vulnerabilities exist in SecurEnvoy MFA before 9.4.514 due to improper validation of user-supplied input. An unauthenticated remote attacker could exfiltrate data from Active Directory through blind LDAP injection attacks against the DESKTOP service exposed on the /secserver HTTP endpoint. This may include ms-Mcs-AdmPwd, which has a cleartext password for the Local Administrator Password Solution (LAPS) feature.
</code>
- [optistream/securenvoy-cve-2024-37393](https://github.com/optistream/securenvoy-cve-2024-37393)
### CVE-2024-65230
@ -29522,7 +29526,7 @@
- [StealYourCode/CVE-2019-1663](https://github.com/StealYourCode/CVE-2019-1663)
- [e180175/CVE-2019-1663-vuln](https://github.com/e180175/CVE-2019-1663-vuln)
- [Oraxiage/CVE-2019-1663](https://github.com/Oraxiage/CVE-2019-1663)
- [abrumsen/CVE-2019-1663](https://github.com/abrumsen/CVE-2019-1663)
### CVE-2019-1759 (2019-03-27)