From c3a0e96eac4d77894e68fd8417e2c3ac9409fca8 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sat, 30 Mar 2024 03:27:25 +0900 Subject: [PATCH] Auto Update 2024/03/29 18:27:25 --- 2010/CVE-2010-3333.json | 30 -------------------------- 2012/CVE-2012-0003.json | 30 -------------------------- 2014/CVE-2014-4114.json | 32 ---------------------------- 2015/CVE-2015-1701.json | 30 -------------------------- 2017/CVE-2017-0143.json | 30 -------------------------- 2017/CVE-2017-5638.json | 4 ++-- 2019/CVE-2019-0708.json | 46 +++++++--------------------------------- 2019/CVE-2019-17026.json | 8 +++---- 2019/CVE-2019-8942.json | 8 +++---- 2020/CVE-2020-11896.json | 8 +++---- 2021/CVE-2021-44228.json | 2 +- 2022/CVE-2022-25949.json | 8 +++---- 2022/CVE-2022-40684.json | 8 +++---- 2023/CVE-2023-0266.json | 8 +++---- 2023/CVE-2023-0386.json | 8 +++---- 2023/CVE-2023-23397.json | 4 ++-- 2023/CVE-2023-28432.json | 4 ++-- 2023/CVE-2023-34152.json | 8 +++---- 2023/CVE-2023-35078.json | 30 ++++++++++++++++++++++++++ 2023/CVE-2023-42931.json | 8 +++---- 2023/CVE-2023-45866.json | 14 ++++++------ 2023/CVE-2023-46604.json | 8 +++---- 2023/CVE-2023-48788.json | 8 +++---- 2024/CVE-2024-0204.json | 8 +++---- 2024/CVE-2024-0582.json | 32 ++++++++++++++++++++++++++++ 2024/CVE-2024-1086.json | 12 +++++------ 2024/CVE-2024-1698.json | 8 +++---- 2024/CVE-2024-2169.json | 12 +++++------ 2024/CVE-2024-21762.json | 4 ++-- 2024/CVE-2024-27198.json | 8 +++---- 2024/CVE-2024-27619.json | 2 +- 2024/CVE-2024-28085.json | 8 +++---- 2024/CVE-2024-29059.json | 12 +++++------ 2024/CVE-2024-3094.json | 32 ++++++++++++++++++++++++++++ README.md | 23 ++++++++++---------- 35 files changed, 208 insertions(+), 297 deletions(-) delete mode 100644 2014/CVE-2014-4114.json create mode 100644 2024/CVE-2024-0582.json create mode 100644 2024/CVE-2024-3094.json diff --git a/2010/CVE-2010-3333.json b/2010/CVE-2010-3333.json index d79840ed94..ea06c35c5a 100644 --- a/2010/CVE-2010-3333.json +++ b/2010/CVE-2010-3333.json @@ -58,35 +58,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 779015110, - "name": "vuln-rabilit-windows7", - "full_name": "chefphenix25\/vuln-rabilit-windows7", - "owner": { - "login": "chefphenix25", - "id": 165333165, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165333165?v=4", - "html_url": "https:\/\/github.com\/chefphenix25" - }, - "html_url": "https:\/\/github.com\/chefphenix25\/vuln-rabilit-windows7", - "description": "ecrit un script python de correction de la vulnérabilités windows 7 pour réponse automatique de wazuh: CVE-2017-0143 (MS17-010 - EternalBlue) CVE-2019-0708 (BlueKeep), CVE-2019-1181 \/ CVE-2019-1182 (BlueKeep II), CVE-2015-1701 (MS15-034), CVE-2010-3333 (MS10-092), CVE-2012-0003 (MS12-020), CVE-2017-8759, CVE-2014-4114 ", - "fork": false, - "created_at": "2024-03-28T21:38:08Z", - "updated_at": "2024-03-28T21:38:08Z", - "pushed_at": "2024-03-28T21:38:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2012/CVE-2012-0003.json b/2012/CVE-2012-0003.json index 2a930164cf..00fdaa0943 100644 --- a/2012/CVE-2012-0003.json +++ b/2012/CVE-2012-0003.json @@ -28,35 +28,5 @@ "watchers": 2, "score": 0, "subscribers_count": 2 - }, - { - "id": 779015110, - "name": "vuln-rabilit-windows7", - "full_name": "chefphenix25\/vuln-rabilit-windows7", - "owner": { - "login": "chefphenix25", - "id": 165333165, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165333165?v=4", - "html_url": "https:\/\/github.com\/chefphenix25" - }, - "html_url": "https:\/\/github.com\/chefphenix25\/vuln-rabilit-windows7", - "description": "ecrit un script python de correction de la vulnérabilités windows 7 pour réponse automatique de wazuh: CVE-2017-0143 (MS17-010 - EternalBlue) CVE-2019-0708 (BlueKeep), CVE-2019-1181 \/ CVE-2019-1182 (BlueKeep II), CVE-2015-1701 (MS15-034), CVE-2010-3333 (MS10-092), CVE-2012-0003 (MS12-020), CVE-2017-8759, CVE-2014-4114 ", - "fork": false, - "created_at": "2024-03-28T21:38:08Z", - "updated_at": "2024-03-28T21:38:08Z", - "pushed_at": "2024-03-28T21:38:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-4114.json b/2014/CVE-2014-4114.json deleted file mode 100644 index a3d11bbda1..0000000000 --- a/2014/CVE-2014-4114.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 779015110, - "name": "vuln-rabilit-windows7", - "full_name": "chefphenix25\/vuln-rabilit-windows7", - "owner": { - "login": "chefphenix25", - "id": 165333165, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165333165?v=4", - "html_url": "https:\/\/github.com\/chefphenix25" - }, - "html_url": "https:\/\/github.com\/chefphenix25\/vuln-rabilit-windows7", - "description": "ecrit un script python de correction de la vulnérabilités windows 7 pour réponse automatique de wazuh: CVE-2017-0143 (MS17-010 - EternalBlue) CVE-2019-0708 (BlueKeep), CVE-2019-1181 \/ CVE-2019-1182 (BlueKeep II), CVE-2015-1701 (MS15-034), CVE-2010-3333 (MS10-092), CVE-2012-0003 (MS12-020), CVE-2017-8759, CVE-2014-4114 ", - "fork": false, - "created_at": "2024-03-28T21:38:08Z", - "updated_at": "2024-03-28T21:38:08Z", - "pushed_at": "2024-03-28T21:38:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2015/CVE-2015-1701.json b/2015/CVE-2015-1701.json index 4bfdc6ee48..482ea0335a 100644 --- a/2015/CVE-2015-1701.json +++ b/2015/CVE-2015-1701.json @@ -91,35 +91,5 @@ "watchers": 0, "score": 0, "subscribers_count": 0 - }, - { - "id": 779015110, - "name": "vuln-rabilit-windows7", - "full_name": "chefphenix25\/vuln-rabilit-windows7", - "owner": { - "login": "chefphenix25", - "id": 165333165, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165333165?v=4", - "html_url": "https:\/\/github.com\/chefphenix25" - }, - "html_url": "https:\/\/github.com\/chefphenix25\/vuln-rabilit-windows7", - "description": "ecrit un script python de correction de la vulnérabilités windows 7 pour réponse automatique de wazuh: CVE-2017-0143 (MS17-010 - EternalBlue) CVE-2019-0708 (BlueKeep), CVE-2019-1181 \/ CVE-2019-1182 (BlueKeep II), CVE-2015-1701 (MS15-034), CVE-2010-3333 (MS10-092), CVE-2012-0003 (MS12-020), CVE-2017-8759, CVE-2014-4114 ", - "fork": false, - "created_at": "2024-03-28T21:38:08Z", - "updated_at": "2024-03-28T21:38:08Z", - "pushed_at": "2024-03-28T21:38:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-0143.json b/2017/CVE-2017-0143.json index 81e3428738..a9d8acbd4e 100644 --- a/2017/CVE-2017-0143.json +++ b/2017/CVE-2017-0143.json @@ -118,35 +118,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 779015110, - "name": "vuln-rabilit-windows7", - "full_name": "chefphenix25\/vuln-rabilit-windows7", - "owner": { - "login": "chefphenix25", - "id": 165333165, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165333165?v=4", - "html_url": "https:\/\/github.com\/chefphenix25" - }, - "html_url": "https:\/\/github.com\/chefphenix25\/vuln-rabilit-windows7", - "description": "ecrit un script python de correction de la vulnérabilités windows 7 pour réponse automatique de wazuh: CVE-2017-0143 (MS17-010 - EternalBlue) CVE-2019-0708 (BlueKeep), CVE-2019-1181 \/ CVE-2019-1182 (BlueKeep II), CVE-2015-1701 (MS15-034), CVE-2010-3333 (MS10-092), CVE-2012-0003 (MS12-020), CVE-2017-8759, CVE-2014-4114 ", - "fork": false, - "created_at": "2024-03-28T21:38:08Z", - "updated_at": "2024-03-28T21:38:08Z", - "pushed_at": "2024-03-28T21:38:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-5638.json b/2017/CVE-2017-5638.json index eea9afc684..96a345dcff 100644 --- a/2017/CVE-2017-5638.json +++ b/2017/CVE-2017-5638.json @@ -295,8 +295,8 @@ "description": null, "fork": false, "created_at": "2017-03-11T10:43:16Z", - "updated_at": "2023-04-04T13:04:57Z", - "pushed_at": "2017-03-24T19:12:10Z", + "updated_at": "2024-03-29T16:06:15Z", + "pushed_at": "2024-03-29T16:06:11Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index dae4505ada..3f2455967e 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1841,10 +1841,10 @@ "description": "Proof of concept for CVE-2019-0708", "fork": false, "created_at": "2019-05-29T16:53:54Z", - "updated_at": "2024-03-27T20:01:48Z", + "updated_at": "2024-03-29T12:23:33Z", "pushed_at": "2021-12-02T12:00:46Z", - "stargazers_count": 1161, - "watchers_count": 1161, + "stargazers_count": 1162, + "watchers_count": 1162, "has_discussions": false, "forks_count": 346, "allow_forking": true, @@ -1853,7 +1853,7 @@ "topics": [], "visibility": "public", "forks": 346, - "watchers": 1161, + "watchers": 1162, "score": 0, "subscribers_count": 68 }, @@ -3107,10 +3107,10 @@ "description": "CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7", "fork": false, "created_at": "2020-03-15T19:33:53Z", - "updated_at": "2024-03-26T07:21:56Z", + "updated_at": "2024-03-29T12:17:26Z", "pushed_at": "2022-03-28T04:10:20Z", - "stargazers_count": 118, - "watchers_count": 118, + "stargazers_count": 119, + "watchers_count": 119, "has_discussions": false, "forks_count": 20, "allow_forking": true, @@ -3119,7 +3119,7 @@ "topics": [], "visibility": "public", "forks": 20, - "watchers": 118, + "watchers": 119, "score": 0, "subscribers_count": 3 }, @@ -3572,35 +3572,5 @@ "watchers": 1, "score": 0, "subscribers_count": 1 - }, - { - "id": 779015110, - "name": "vuln-rabilit-windows7", - "full_name": "chefphenix25\/vuln-rabilit-windows7", - "owner": { - "login": "chefphenix25", - "id": 165333165, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165333165?v=4", - "html_url": "https:\/\/github.com\/chefphenix25" - }, - "html_url": "https:\/\/github.com\/chefphenix25\/vuln-rabilit-windows7", - "description": "ecrit un script python de correction de la vulnérabilités windows 7 pour réponse automatique de wazuh: CVE-2017-0143 (MS17-010 - EternalBlue) CVE-2019-0708 (BlueKeep), CVE-2019-1181 \/ CVE-2019-1182 (BlueKeep II), CVE-2015-1701 (MS15-034), CVE-2010-3333 (MS10-092), CVE-2012-0003 (MS12-020), CVE-2017-8759, CVE-2014-4114 ", - "fork": false, - "created_at": "2024-03-28T21:38:08Z", - "updated_at": "2024-03-28T21:38:08Z", - "pushed_at": "2024-03-28T21:38:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-17026.json b/2019/CVE-2019-17026.json index d21270f247..5460e81657 100644 --- a/2019/CVE-2019-17026.json +++ b/2019/CVE-2019-17026.json @@ -13,10 +13,10 @@ "description": "An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).", "fork": false, "created_at": "2020-08-27T19:32:07Z", - "updated_at": "2024-01-17T16:02:46Z", + "updated_at": "2024-03-29T17:40:16Z", "pushed_at": "2020-08-27T19:33:42Z", - "stargazers_count": 48, - "watchers_count": 48, + "stargazers_count": 49, + "watchers_count": 49, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 48, + "watchers": 49, "score": 0, "subscribers_count": 3 }, diff --git a/2019/CVE-2019-8942.json b/2019/CVE-2019-8942.json index b154e42e0b..b3e883b425 100644 --- a/2019/CVE-2019-8942.json +++ b/2019/CVE-2019-8942.json @@ -13,10 +13,10 @@ "description": "A simple PoC for WordPress RCE (author priviledge), refer to CVE-2019-8942 and CVE-2019-8943.", "fork": false, "created_at": "2019-02-25T06:38:15Z", - "updated_at": "2023-12-26T02:10:10Z", + "updated_at": "2024-03-29T14:08:11Z", "pushed_at": "2019-03-18T01:20:52Z", - "stargazers_count": 72, - "watchers_count": 72, + "stargazers_count": 73, + "watchers_count": 73, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 21, - "watchers": 72, + "watchers": 73, "score": 0, "subscribers_count": 2 }, diff --git a/2020/CVE-2020-11896.json b/2020/CVE-2020-11896.json index 04378ec5ea..333dd97a8a 100644 --- a/2020/CVE-2020-11896.json +++ b/2020/CVE-2020-11896.json @@ -13,10 +13,10 @@ "description": "PoC for CVE-2020-11896 Treck TCP\/IP stack and device asset investigation", "fork": false, "created_at": "2020-07-21T03:38:31Z", - "updated_at": "2024-02-22T13:59:04Z", + "updated_at": "2024-03-29T13:07:50Z", "pushed_at": "2020-09-03T06:37:46Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 5abe3848df..345d0ce567 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -12529,7 +12529,7 @@ "fork": false, "created_at": "2024-03-26T18:47:20Z", "updated_at": "2024-03-26T18:47:20Z", - "pushed_at": "2024-03-28T16:46:50Z", + "pushed_at": "2024-03-29T14:19:32Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-25949.json b/2022/CVE-2022-25949.json index aaa4ae26d5..ddb15e3d8a 100644 --- a/2022/CVE-2022-25949.json +++ b/2022/CVE-2022-25949.json @@ -13,10 +13,10 @@ "description": "A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.", "fork": false, "created_at": "2022-03-16T14:42:21Z", - "updated_at": "2024-01-20T09:50:38Z", + "updated_at": "2024-03-29T13:23:45Z", "pushed_at": "2022-03-16T19:51:30Z", - "stargazers_count": 34, - "watchers_count": 34, + "stargazers_count": 35, + "watchers_count": 35, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 34, + "watchers": 35, "score": 0, "subscribers_count": 5 } diff --git a/2022/CVE-2022-40684.json b/2022/CVE-2022-40684.json index ee9fa2df77..801f0f091c 100644 --- a/2022/CVE-2022-40684.json +++ b/2022/CVE-2022-40684.json @@ -13,10 +13,10 @@ "description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager", "fork": false, "created_at": "2022-10-13T14:24:12Z", - "updated_at": "2024-03-25T19:29:35Z", + "updated_at": "2024-03-29T15:39:57Z", "pushed_at": "2022-10-13T15:25:00Z", - "stargazers_count": 327, - "watchers_count": 327, + "stargazers_count": 328, + "watchers_count": 328, "has_discussions": false, "forks_count": 100, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 100, - "watchers": 327, + "watchers": 328, "score": 0, "subscribers_count": 7 }, diff --git a/2023/CVE-2023-0266.json b/2023/CVE-2023-0266.json index 930b03396f..1409f7a483 100644 --- a/2023/CVE-2023-0266.json +++ b/2023/CVE-2023-0266.json @@ -13,10 +13,10 @@ "description": "Demo showing Claude Opus does not find CVE-2023-0266", "fork": false, "created_at": "2024-03-10T04:41:34Z", - "updated_at": "2024-03-29T01:41:59Z", + "updated_at": "2024-03-29T15:48:29Z", "pushed_at": "2024-03-19T14:18:20Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-0386.json b/2023/CVE-2023-0386.json index 1f44881d85..7a02c722db 100644 --- a/2023/CVE-2023-0386.json +++ b/2023/CVE-2023-0386.json @@ -193,10 +193,10 @@ "description": "Vulnerabilities Exploitation On Ubuntu 22.04", "fork": false, "created_at": "2023-05-16T10:26:10Z", - "updated_at": "2024-03-26T08:08:28Z", + "updated_at": "2024-03-29T15:56:57Z", "pushed_at": "2023-05-16T10:49:19Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -207,7 +207,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 25, + "watchers": 26, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-23397.json b/2023/CVE-2023-23397.json index e4bf83a34c..14e2f5b1b5 100644 --- a/2023/CVE-2023-23397.json +++ b/2023/CVE-2023-23397.json @@ -178,13 +178,13 @@ "stargazers_count": 340, "watchers_count": 340, "has_discussions": false, - "forks_count": 63, + "forks_count": 62, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 63, + "forks": 62, "watchers": 340, "score": 0, "subscribers_count": 5 diff --git a/2023/CVE-2023-28432.json b/2023/CVE-2023-28432.json index 54c4be853a..b34ab42ca2 100644 --- a/2023/CVE-2023-28432.json +++ b/2023/CVE-2023-28432.json @@ -18,7 +18,7 @@ "stargazers_count": 31, "watchers_count": 31, "has_discussions": false, - "forks_count": 7, + "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -27,7 +27,7 @@ "minio" ], "visibility": "public", - "forks": 7, + "forks": 8, "watchers": 31, "score": 0, "subscribers_count": 2 diff --git a/2023/CVE-2023-34152.json b/2023/CVE-2023-34152.json index 435f3c5365..7551967213 100644 --- a/2023/CVE-2023-34152.json +++ b/2023/CVE-2023-34152.json @@ -13,10 +13,10 @@ "description": "CVE-2023-34152", "fork": false, "created_at": "2023-09-27T03:37:25Z", - "updated_at": "2024-03-14T20:52:59Z", + "updated_at": "2024-03-29T17:38:43Z", "pushed_at": "2023-09-27T03:41:30Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-35078.json b/2023/CVE-2023-35078.json index aaf3e19e53..c0dfd7cc80 100644 --- a/2023/CVE-2023-35078.json +++ b/2023/CVE-2023-35078.json @@ -180,5 +180,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 779303130, + "name": "CVE-2023-35078", + "full_name": "0nsec\/CVE-2023-35078", + "owner": { + "login": "0nsec", + "id": 99223413, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99223413?v=4", + "html_url": "https:\/\/github.com\/0nsec" + }, + "html_url": "https:\/\/github.com\/0nsec\/CVE-2023-35078", + "description": "CVE-2023-35078 Remote Unauthenticated API Access vulnerability has been discovered in Ivanti Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core. ", + "fork": false, + "created_at": "2024-03-29T14:15:49Z", + "updated_at": "2024-03-29T14:45:31Z", + "pushed_at": "2024-03-29T14:41:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-42931.json b/2023/CVE-2023-42931.json index 865ca3732b..c38586b5e7 100644 --- a/2023/CVE-2023-42931.json +++ b/2023/CVE-2023-42931.json @@ -13,10 +13,10 @@ "description": "The exploit targets a critical privilege escalation vulnerability in macOS versions Monterey, Ventura, and Sonoma.", "fork": false, "created_at": "2024-03-26T11:01:54Z", - "updated_at": "2024-03-26T11:03:30Z", + "updated_at": "2024-03-29T16:19:38Z", "pushed_at": "2024-03-26T17:16:23Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 83739b5934..9997dcd667 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -13,19 +13,19 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-03-29T11:39:09Z", - "pushed_at": "2024-03-27T18:25:56Z", - "stargazers_count": 233, - "watchers_count": 233, + "updated_at": "2024-03-29T17:37:37Z", + "pushed_at": "2024-03-29T13:34:43Z", + "stargazers_count": 242, + "watchers_count": 242, "has_discussions": false, - "forks_count": 40, + "forks_count": 42, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 40, - "watchers": 233, + "forks": 42, + "watchers": 242, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-46604.json b/2023/CVE-2023-46604.json index 3c94fdd903..94d274c4f8 100644 --- a/2023/CVE-2023-46604.json +++ b/2023/CVE-2023-46604.json @@ -43,10 +43,10 @@ "description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具", "fork": false, "created_at": "2023-10-27T05:57:21Z", - "updated_at": "2024-03-28T01:59:25Z", + "updated_at": "2024-03-29T15:19:35Z", "pushed_at": "2024-01-29T02:28:11Z", - "stargazers_count": 196, - "watchers_count": 196, + "stargazers_count": 197, + "watchers_count": 197, "has_discussions": false, "forks_count": 25, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 25, - "watchers": 196, + "watchers": 197, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-48788.json b/2023/CVE-2023-48788.json index 35c1594367..e84d884555 100644 --- a/2023/CVE-2023-48788.json +++ b/2023/CVE-2023-48788.json @@ -13,10 +13,10 @@ "description": "Fortinet FortiClient EMS SQL Injection", "fork": false, "created_at": "2024-03-18T20:50:48Z", - "updated_at": "2024-03-29T03:33:46Z", + "updated_at": "2024-03-29T15:40:30Z", "pushed_at": "2024-03-20T20:42:41Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 25, + "watchers": 26, "score": 0, "subscribers_count": 4 } diff --git a/2024/CVE-2024-0204.json b/2024/CVE-2024-0204.json index d44557e373..fe613a80a7 100644 --- a/2024/CVE-2024-0204.json +++ b/2024/CVE-2024-0204.json @@ -13,10 +13,10 @@ "description": "Authentication Bypass in GoAnywhere MFT", "fork": false, "created_at": "2024-01-23T20:16:14Z", - "updated_at": "2024-03-20T08:55:32Z", + "updated_at": "2024-03-29T14:34:35Z", "pushed_at": "2024-01-23T20:33:30Z", - "stargazers_count": 58, - "watchers_count": 58, + "stargazers_count": 59, + "watchers_count": 59, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 58, + "watchers": 59, "score": 0, "subscribers_count": 4 }, diff --git a/2024/CVE-2024-0582.json b/2024/CVE-2024-0582.json new file mode 100644 index 0000000000..2d615e84c3 --- /dev/null +++ b/2024/CVE-2024-0582.json @@ -0,0 +1,32 @@ +[ + { + "id": 779314046, + "name": "io_uring_LPE-CVE-2024-0582", + "full_name": "ysanatomic\/io_uring_LPE-CVE-2024-0582", + "owner": { + "login": "ysanatomic", + "id": 41269324, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41269324?v=4", + "html_url": "https:\/\/github.com\/ysanatomic" + }, + "html_url": "https:\/\/github.com\/ysanatomic\/io_uring_LPE-CVE-2024-0582", + "description": "LPE exploit for CVE-2024-0582 (io_uring)", + "fork": false, + "created_at": "2024-03-29T14:45:22Z", + "updated_at": "2024-03-29T16:31:36Z", + "pushed_at": "2024-03-29T16:05:31Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 74304464da..03b25efbb2 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -13,12 +13,12 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-03-29T12:29:47Z", + "updated_at": "2024-03-29T18:25:20Z", "pushed_at": "2024-03-27T09:22:28Z", - "stargazers_count": 730, - "watchers_count": 730, + "stargazers_count": 792, + "watchers_count": 792, "has_discussions": false, - "forks_count": 79, + "forks_count": 85, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -30,8 +30,8 @@ "poc" ], "visibility": "public", - "forks": 79, - "watchers": 730, + "forks": 85, + "watchers": 792, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-1698.json b/2024/CVE-2024-1698.json index 25423974ca..1cfe7357fb 100644 --- a/2024/CVE-2024-1698.json +++ b/2024/CVE-2024-1698.json @@ -13,10 +13,10 @@ "description": "This is an exploit script to find out wordpress admin's username and password hash by exploiting CVE-2024-1698.", "fork": false, "created_at": "2024-03-29T04:11:06Z", - "updated_at": "2024-03-29T09:27:39Z", + "updated_at": "2024-03-29T17:44:55Z", "pushed_at": "2024-03-29T04:31:31Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 4, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-2169.json b/2024/CVE-2024-2169.json index e49fcbce01..fa714d91c4 100644 --- a/2024/CVE-2024-2169.json +++ b/2024/CVE-2024-2169.json @@ -13,19 +13,19 @@ "description": "This Python script automates the process of scanning for systems potentially vulnerable to the Loop DoS attack and the hypothetical CVE-2024-2169 vulnerability. It focuses on scanning ports associated with protocols susceptible to denial-of-service (DoS) attacks. The script can be used for educational purposes or authorized penetration testing.", "fork": false, "created_at": "2024-03-24T07:53:52Z", - "updated_at": "2024-03-24T07:56:54Z", + "updated_at": "2024-03-29T12:55:04Z", "pushed_at": "2024-03-24T08:00:24Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 0, + "forks": 1, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json index d591757c8a..7e73f56816 100644 --- a/2024/CVE-2024-21762.json +++ b/2024/CVE-2024-21762.json @@ -108,13 +108,13 @@ "stargazers_count": 71, "watchers_count": 71, "has_discussions": false, - "forks_count": 12, + "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 12, + "forks": 13, "watchers": 71, "score": 0, "subscribers_count": 4 diff --git a/2024/CVE-2024-27198.json b/2024/CVE-2024-27198.json index fe945b911d..60a2a29274 100644 --- a/2024/CVE-2024-27198.json +++ b/2024/CVE-2024-27198.json @@ -76,10 +76,10 @@ "description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4", "fork": false, "created_at": "2024-03-06T03:15:03Z", - "updated_at": "2024-03-26T07:59:38Z", + "updated_at": "2024-03-29T13:25:37Z", "pushed_at": "2024-03-11T07:57:40Z", - "stargazers_count": 108, - "watchers_count": 108, + "stargazers_count": 109, + "watchers_count": 109, "has_discussions": false, "forks_count": 27, "allow_forking": true, @@ -98,7 +98,7 @@ ], "visibility": "public", "forks": 27, - "watchers": 108, + "watchers": 109, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-27619.json b/2024/CVE-2024-27619.json index e7d6d077ad..ed122b6dbe 100644 --- a/2024/CVE-2024-27619.json +++ b/2024/CVE-2024-27619.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2024-02-24T19:21:00Z", "updated_at": "2024-03-05T14:45:29Z", - "pushed_at": "2024-02-24T19:53:47Z", + "pushed_at": "2024-03-29T17:01:41Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-28085.json b/2024/CVE-2024-28085.json index f2dcb7ba02..52bd05560f 100644 --- a/2024/CVE-2024-28085.json +++ b/2024/CVE-2024-28085.json @@ -13,10 +13,10 @@ "description": "WallEscape vulnerability in util-linux", "fork": false, "created_at": "2024-03-11T00:15:03Z", - "updated_at": "2024-03-29T11:34:25Z", + "updated_at": "2024-03-29T14:19:04Z", "pushed_at": "2024-03-12T00:28:14Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 16, + "watchers": 18, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-29059.json b/2024/CVE-2024-29059.json index 8d26fc0cf1..f754c34b33 100644 --- a/2024/CVE-2024-29059.json +++ b/2024/CVE-2024-29059.json @@ -13,19 +13,19 @@ "description": "Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)", "fork": false, "created_at": "2024-03-11T10:14:39Z", - "updated_at": "2024-03-29T10:11:09Z", + "updated_at": "2024-03-29T16:23:57Z", "pushed_at": "2024-03-25T12:56:16Z", - "stargazers_count": 42, - "watchers_count": 42, + "stargazers_count": 46, + "watchers_count": 46, "has_discussions": false, - "forks_count": 8, + "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 8, - "watchers": 42, + "forks": 9, + "watchers": 46, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json new file mode 100644 index 0000000000..d5ffc8c129 --- /dev/null +++ b/2024/CVE-2024-3094.json @@ -0,0 +1,32 @@ +[ + { + "id": 779364261, + "name": "CVE-2024-3094-info", + "full_name": "byinarie\/CVE-2024-3094-info", + "owner": { + "login": "byinarie", + "id": 20119926, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20119926?v=4", + "html_url": "https:\/\/github.com\/byinarie" + }, + "html_url": "https:\/\/github.com\/byinarie\/CVE-2024-3094-info", + "description": "Information for CVE-2024-3094", + "fork": false, + "created_at": "2024-03-29T17:03:01Z", + "updated_at": "2024-03-29T17:06:14Z", + "pushed_at": "2024-03-29T18:25:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/README.md b/README.md index 0f32223543..aa709b60ac 100644 --- a/README.md +++ b/README.md @@ -25,6 +25,13 @@ - [m-cetin/CVE-2024-0204](https://github.com/m-cetin/CVE-2024-0204) - [adminlove520/CVE-2024-0204](https://github.com/adminlove520/CVE-2024-0204) +### CVE-2024-0582 (2024-01-16) + +A memory leak flaw was found in the Linux kernel’s io_uring functionality in how a user registers a buffer ring with IORING_REGISTER_PBUF_RING, mmap() it, and then frees it. This flaw allows a local user to crash or potentially escalate their privileges on the system. + + +- [ysanatomic/io_uring_LPE-CVE-2024-0582](https://github.com/ysanatomic/io_uring_LPE-CVE-2024-0582) + ### CVE-2024-0679 (2024-01-20) The ColorMag theme for WordPress is vulnerable to unauthorized access due to a missing capability check on the plugin_action_callback() function in all versions up to, and including, 3.1.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to install and activate arbitrary plugins. @@ -188,6 +195,9 @@ ### CVE-2024-2432 - [Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP](https://github.com/Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP) +### CVE-2024-3094 +- [byinarie/CVE-2024-3094-info](https://github.com/byinarie/CVE-2024-3094-info) + ### CVE-2024-12883 - [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883) @@ -5051,6 +5061,7 @@ - [synfinner/CVE-2023-35078](https://github.com/synfinner/CVE-2023-35078) - [emanueldosreis/nmap-CVE-2023-35078-Exploit](https://github.com/emanueldosreis/nmap-CVE-2023-35078-Exploit) - [Blue-number/CVE-2023-35078](https://github.com/Blue-number/CVE-2023-35078) +- [0nsec/CVE-2023-35078](https://github.com/0nsec/CVE-2023-35078) ### CVE-2023-35080 (2023-11-14) @@ -26617,7 +26628,6 @@ - [Ravaan21/Bluekeep-Hunter](https://github.com/Ravaan21/Bluekeep-Hunter) - [davidfortytwo/bluekeep](https://github.com/davidfortytwo/bluekeep) - [tranqtruong/Detect-BlueKeep](https://github.com/tranqtruong/Detect-BlueKeep) -- [chefphenix25/vuln-rabilit-windows7](https://github.com/chefphenix25/vuln-rabilit-windows7) ### CVE-2019-0709 (2019-06-12) @@ -33766,7 +33776,6 @@ - [NatteeSetobol/Etern-blue-Windows-7-Checker](https://github.com/NatteeSetobol/Etern-blue-Windows-7-Checker) - [c0d3cr4f73r/MS17-010_CVE-2017-0143](https://github.com/c0d3cr4f73r/MS17-010_CVE-2017-0143) - [SampatDhakal/Metasploit-Attack-Report](https://github.com/SampatDhakal/Metasploit-Attack-Report) -- [chefphenix25/vuln-rabilit-windows7](https://github.com/chefphenix25/vuln-rabilit-windows7) ### CVE-2017-0144 (2017-03-16) @@ -37520,7 +37529,6 @@ - [hfiref0x/CVE-2015-1701](https://github.com/hfiref0x/CVE-2015-1701) - [Anonymous-Family/CVE-2015-1701](https://github.com/Anonymous-Family/CVE-2015-1701) - [Anonymous-Family/CVE-2015-1701-download](https://github.com/Anonymous-Family/CVE-2015-1701-download) -- [chefphenix25/vuln-rabilit-windows7](https://github.com/chefphenix25/vuln-rabilit-windows7) ### CVE-2015-1769 (2015-08-14) @@ -38639,13 +38647,6 @@ - [sam-b/CVE-2014-4113](https://github.com/sam-b/CVE-2014-4113) - [wikiZ/cve-2014-4113](https://github.com/wikiZ/cve-2014-4113) -### CVE-2014-4114 (2014-10-15) - -Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object in an Office document, as exploited in the wild with a "Sandworm" attack in June through October 2014, aka "Windows OLE Remote Code Execution Vulnerability." - - -- [chefphenix25/vuln-rabilit-windows7](https://github.com/chefphenix25/vuln-rabilit-windows7) - ### CVE-2014-4140 (2014-10-15) Microsoft Internet Explorer 8 through 11 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Internet Explorer ASLR Bypass Vulnerability." @@ -39503,7 +39504,6 @@ - [k0keoyo/CVE-2012-0003_eXP](https://github.com/k0keoyo/CVE-2012-0003_eXP) -- [chefphenix25/vuln-rabilit-windows7](https://github.com/chefphenix25/vuln-rabilit-windows7) ### CVE-2012-0056 (2012-01-27) @@ -40062,7 +40062,6 @@ - [whiteHat001/cve-2010-3333](https://github.com/whiteHat001/cve-2010-3333) - [Sunqiz/CVE-2010-3333-reproduction](https://github.com/Sunqiz/CVE-2010-3333-reproduction) -- [chefphenix25/vuln-rabilit-windows7](https://github.com/chefphenix25/vuln-rabilit-windows7) ### CVE-2010-3490 (2010-09-28)