Auto Update 2024/09/15 12:29:56

This commit is contained in:
motikan2010-bot 2024-09-15 21:29:56 +09:00
parent 5ecd0cd44f
commit c09fdb1a58
26 changed files with 209 additions and 69 deletions

View file

@ -48,13 +48,13 @@
"stargazers_count": 340,
"watchers_count": 340,
"has_discussions": false,
"forks_count": 112,
"forks_count": 110,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 112,
"forks": 110,
"watchers": 340,
"score": 0,
"subscribers_count": 48

View file

@ -48,13 +48,13 @@
"stargazers_count": 340,
"watchers_count": 340,
"has_discussions": false,
"forks_count": 112,
"forks_count": 110,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 112,
"forks": 110,
"watchers": 340,
"score": 0,
"subscribers_count": 48

View file

@ -13,10 +13,10 @@
"description": "A coordinated disclosure and security advisory on Fermax Intercom DTML Injection vulneraiblity. Special thanks to Fermax International for prompt responses and allowing details to be publicized.",
"fork": false,
"created_at": "2019-12-20T07:20:50Z",
"updated_at": "2024-09-14T07:20:23Z",
"updated_at": "2024-09-15T10:11:01Z",
"pushed_at": "2020-07-30T19:15:08Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2019-1652 \/CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!",
"fork": false,
"created_at": "2019-01-24T10:12:44Z",
"updated_at": "2024-09-15T03:06:04Z",
"updated_at": "2024-09-15T08:18:14Z",
"pushed_at": "2019-02-08T12:38:05Z",
"stargazers_count": 223,
"watchers_count": 223,
"stargazers_count": 224,
"watchers_count": 224,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 71,
"watchers": 223,
"watchers": 224,
"score": 0,
"subscribers_count": 15
}

View file

@ -13,10 +13,10 @@
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
"fork": false,
"created_at": "2020-02-20T06:22:40Z",
"updated_at": "2024-09-07T09:57:51Z",
"updated_at": "2024-09-15T10:16:59Z",
"pushed_at": "2020-02-20T11:03:18Z",
"stargazers_count": 206,
"watchers_count": 206,
"stargazers_count": 207,
"watchers_count": 207,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 55,
"watchers": 206,
"watchers": 207,
"score": 0,
"subscribers_count": 7
},

View file

@ -43,10 +43,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2024-09-12T09:52:10Z",
"updated_at": "2024-09-15T10:15:11Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1828,
"watchers_count": 1828,
"stargazers_count": 1829,
"watchers_count": 1829,
"has_discussions": false,
"forks_count": 582,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 582,
"watchers": 1828,
"watchers": 1829,
"score": 0,
"subscribers_count": 44
},
@ -301,10 +301,10 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2024-09-10T03:31:59Z",
"updated_at": "2024-09-15T10:16:20Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 998,
"watchers_count": 998,
"stargazers_count": 999,
"watchers_count": 999,
"has_discussions": false,
"forks_count": 231,
"allow_forking": true,
@ -313,7 +313,7 @@
"topics": [],
"visibility": "public",
"forks": 231,
"watchers": 998,
"watchers": 999,
"score": 0,
"subscribers_count": 27
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 18,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"vulnerabilities"
],
"visibility": "public",
"forks": 18,
"forks": 17,
"watchers": 71,
"score": 0,
"subscribers_count": 4

View file

@ -13,10 +13,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-09-15T04:39:00Z",
"updated_at": "2024-09-15T11:17:18Z",
"pushed_at": "2024-08-01T15:09:15Z",
"stargazers_count": 257,
"watchers_count": 257,
"stargazers_count": 258,
"watchers_count": 258,
"has_discussions": true,
"forks_count": 37,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 257,
"watchers": 258,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "LPE exploit for CVE-2023-36802",
"fork": false,
"created_at": "2023-10-09T17:32:15Z",
"updated_at": "2024-08-31T19:35:14Z",
"updated_at": "2024-09-15T12:17:03Z",
"pushed_at": "2023-10-10T17:44:17Z",
"stargazers_count": 155,
"watchers_count": 155,
"stargazers_count": 156,
"watchers_count": 156,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 155,
"watchers": 156,
"score": 0,
"subscribers_count": 5
},

View file

@ -148,5 +148,35 @@
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
{
"id": 857700493,
"name": "WordPress-Exploit-CVE-2024-1071",
"full_name": "Dogu589\/WordPress-Exploit-CVE-2024-1071",
"owner": {
"login": "Dogu589",
"id": 73641405,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73641405?v=4",
"html_url": "https:\/\/github.com\/Dogu589"
},
"html_url": "https:\/\/github.com\/Dogu589\/WordPress-Exploit-CVE-2024-1071",
"description": null,
"fork": false,
"created_at": "2024-09-15T11:28:47Z",
"updated_at": "2024-09-15T12:29:00Z",
"pushed_at": "2024-09-15T12:28:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -27,6 +27,6 @@
"forks": 28,
"watchers": 125,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
}
]

View file

@ -18,7 +18,7 @@
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -28,7 +28,7 @@
"cve-2024-20767"
],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 33,
"score": 0,
"subscribers_count": 1

View file

@ -18,13 +18,13 @@
"stargazers_count": 148,
"watchers_count": 148,
"has_discussions": false,
"forks_count": 30,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 30,
"forks": 32,
"watchers": 148,
"score": 0,
"subscribers_count": 4

View file

@ -268,5 +268,35 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 857714170,
"name": "CVE-2024-23692",
"full_name": "verylazytech\/CVE-2024-23692",
"owner": {
"login": "verylazytech",
"id": 172168670,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4",
"html_url": "https:\/\/github.com\/verylazytech"
},
"html_url": "https:\/\/github.com\/verylazytech\/CVE-2024-23692",
"description": "POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692 ",
"fork": false,
"created_at": "2024-09-15T12:15:35Z",
"updated_at": "2024-09-15T12:30:15Z",
"pushed_at": "2024-09-15T12:30:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -256,10 +256,10 @@
"description": "CVE-2024-23897 - Jenkins 任意文件读取 利用工具",
"fork": false,
"created_at": "2024-01-27T19:34:48Z",
"updated_at": "2024-09-05T08:36:04Z",
"updated_at": "2024-09-15T08:12:18Z",
"pushed_at": "2024-03-16T07:55:41Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -272,7 +272,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 66,
"watchers": 67,
"score": 0,
"subscribers_count": 2
},

View file

@ -910,7 +910,7 @@
"description": null,
"fork": false,
"created_at": "2024-06-02T08:19:50Z",
"updated_at": "2024-06-02T15:37:49Z",
"updated_at": "2024-09-15T08:14:14Z",
"pushed_at": "2024-06-02T08:24:32Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 10
"subscribers_count": 11
}
]

32
2024/CVE-2024-27564.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 857682897,
"name": "SSRF-Exploit-CVE-2024-27564",
"full_name": "MuhammadWaseem29\/SSRF-Exploit-CVE-2024-27564",
"owner": {
"login": "MuhammadWaseem29",
"id": 161931698,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161931698?v=4",
"html_url": "https:\/\/github.com\/MuhammadWaseem29"
},
"html_url": "https:\/\/github.com\/MuhammadWaseem29\/SSRF-Exploit-CVE-2024-27564",
"description": null,
"fork": false,
"created_at": "2024-09-15T10:25:01Z",
"updated_at": "2024-09-15T11:55:28Z",
"pushed_at": "2024-09-15T11:55:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,19 +13,19 @@
"description": "Ivanti EPM AgentPortal RCE Vulnerability",
"fork": false,
"created_at": "2024-09-13T14:02:04Z",
"updated_at": "2024-09-15T04:14:57Z",
"updated_at": "2024-09-15T11:39:02Z",
"pushed_at": "2024-09-13T14:02:30Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"forks": 3,
"watchers": 8,
"score": 0,
"subscribers_count": 4
}

View file

@ -256,10 +256,10 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
"updated_at": "2024-09-15T01:21:55Z",
"updated_at": "2024-09-15T07:47:50Z",
"pushed_at": "2024-08-27T12:22:39Z",
"stargazers_count": 569,
"watchers_count": 569,
"stargazers_count": 570,
"watchers_count": 570,
"has_discussions": false,
"forks_count": 103,
"allow_forking": true,
@ -268,7 +268,7 @@
"topics": [],
"visibility": "public",
"forks": 103,
"watchers": 569,
"watchers": 570,
"score": 0,
"subscribers_count": 4
},

32
2024/CVE-2024-38127.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 857638218,
"name": "CVE-2024-38127",
"full_name": "pwndorei\/CVE-2024-38127",
"owner": {
"login": "pwndorei",
"id": 96749184,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96749184?v=4",
"html_url": "https:\/\/github.com\/pwndorei"
},
"html_url": "https:\/\/github.com\/pwndorei\/CVE-2024-38127",
"description": null,
"fork": false,
"created_at": "2024-09-15T07:38:44Z",
"updated_at": "2024-09-15T08:07:47Z",
"pushed_at": "2024-09-15T07:39:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-08-30T17:24:58Z",
"updated_at": "2024-09-13T13:48:23Z",
"updated_at": "2024-09-15T09:16:35Z",
"pushed_at": "2024-08-31T19:25:38Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Makes IDA (most versions) to crash upon opening it. ",
"fork": false,
"created_at": "2024-08-25T12:33:14Z",
"updated_at": "2024-09-15T04:29:46Z",
"updated_at": "2024-09-15T08:04:44Z",
"pushed_at": "2024-08-30T09:58:12Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 49,
"watchers": 50,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)",
"fork": false,
"created_at": "2024-09-14T06:27:11Z",
"updated_at": "2024-09-15T04:48:54Z",
"updated_at": "2024-09-15T12:24:26Z",
"pushed_at": "2024-09-14T06:32:51Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,8 +25,8 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 9,
"score": 0,
"subscribers_count": 0
"subscribers_count": 3
}
]

View file

@ -271,6 +271,7 @@
- [Matrexdz/CVE-2024-1071](https://github.com/Matrexdz/CVE-2024-1071)
- [Matrexdz/CVE-2024-1071-Docker](https://github.com/Matrexdz/CVE-2024-1071-Docker)
- [fa-rrel/CVE-2024-1071-SQL-Injection](https://github.com/fa-rrel/CVE-2024-1071-SQL-Injection)
- [Dogu589/WordPress-Exploit-CVE-2024-1071](https://github.com/Dogu589/WordPress-Exploit-CVE-2024-1071)
### CVE-2024-1086 (2024-01-31)
@ -2078,6 +2079,7 @@
- [BBD-YZZ/CVE-2024-23692](https://github.com/BBD-YZZ/CVE-2024-23692)
- [0x20c/CVE-2024-23692-EXP](https://github.com/0x20c/CVE-2024-23692-EXP)
- [pradeepboo/Rejetto-HFS-2.x-RCE-CVE-2024-23692](https://github.com/pradeepboo/Rejetto-HFS-2.x-RCE-CVE-2024-23692)
- [verylazytech/CVE-2024-23692](https://github.com/verylazytech/CVE-2024-23692)
### CVE-2024-23705 (2024-05-07)
@ -2915,6 +2917,13 @@
- [secunnix/CVE-2024-27518](https://github.com/secunnix/CVE-2024-27518)
### CVE-2024-27564 (2024-03-05)
<code>A Server-Side Request Forgery (SSRF) in pictureproxy.php of ChatGPT commit f9f4bbc allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the urlparameter.
</code>
- [MuhammadWaseem29/SSRF-Exploit-CVE-2024-27564](https://github.com/MuhammadWaseem29/SSRF-Exploit-CVE-2024-27564)
### CVE-2024-27619 (2024-03-29)
<code>Dlink Dir-3040us A1 1.20b03a hotfix is vulnerable to Buffer Overflow. Any user having read/write access to ftp server can write directly to ram causing buffer overflow if file or files uploaded are greater than available ram. Ftp server allows change of directory to root which is one level up than root of usb flash directory. During upload ram is getting filled and causing system resource exhaustion (no free memory) which causes system to crash and reboot.
@ -4374,6 +4383,13 @@
- [Florian-Hoth/CVE-2024-38100-RCE-POC](https://github.com/Florian-Hoth/CVE-2024-38100-RCE-POC)
### CVE-2024-38127 (2024-08-13)
<code>Windows Hyper-V Elevation of Privilege Vulnerability
</code>
- [pwndorei/CVE-2024-38127](https://github.com/pwndorei/CVE-2024-38127)
### CVE-2024-38189 (2024-08-13)
<code>Microsoft Project Remote Code Execution Vulnerability