Auto Update 2024/02/13 00:26:09

This commit is contained in:
motikan2010-bot 2024-02-13 09:26:09 +09:00
parent d30f8eabe0
commit c59e2a3e54
25 changed files with 178 additions and 73 deletions

View file

@ -48,13 +48,13 @@
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": true,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 12,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "OS X 10.11.6 LPE PoC for CVE-2016-4655 \/ CVE-2016-4656",
"fork": false,
"created_at": "2016-10-02T12:42:14Z",
"updated_at": "2023-12-26T03:49:59Z",
"updated_at": "2024-02-12T18:40:15Z",
"pushed_at": "2016-10-04T16:36:18Z",
"stargazers_count": 98,
"watchers_count": 98,
"stargazers_count": 99,
"watchers_count": 99,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 98,
"watchers": 99,
"score": 0,
"subscribers_count": 7
},

32
2017/CVE-2017-0089.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 754437399,
"name": "Added-Pentest-Ground-to-vulnerable-websites-for-training",
"full_name": "rainhawk13\/Added-Pentest-Ground-to-vulnerable-websites-for-training",
"owner": {
"login": "rainhawk13",
"id": 133608975,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/133608975?v=4",
"html_url": "https:\/\/github.com\/rainhawk13"
},
"html_url": "https:\/\/github.com\/rainhawk13\/Added-Pentest-Ground-to-vulnerable-websites-for-training",
"description": "CVE-2017-0089 Learn more at National Vulnerability Database (NVD) • CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings • CPE Information",
"fork": false,
"created_at": "2024-02-08T03:33:56Z",
"updated_at": "2024-02-13T00:03:41Z",
"pushed_at": "2024-02-13T00:09:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
"fork": false,
"created_at": "2019-12-12T07:58:11Z",
"updated_at": "2024-02-04T20:26:29Z",
"updated_at": "2024-02-12T20:49:58Z",
"pushed_at": "2022-04-14T18:23:38Z",
"stargazers_count": 330,
"watchers_count": 330,
"stargazers_count": 331,
"watchers_count": 331,
"has_discussions": false,
"forks_count": 87,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 87,
"watchers": 330,
"watchers": 331,
"score": 0,
"subscribers_count": 13
},

View file

@ -13,10 +13,10 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2024-01-08T08:13:59Z",
"updated_at": "2024-02-12T21:45:27Z",
"pushed_at": "2021-08-07T16:48:55Z",
"stargazers_count": 396,
"watchers_count": 396,
"stargazers_count": 397,
"watchers_count": 397,
"has_discussions": false,
"forks_count": 70,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 70,
"watchers": 396,
"watchers": 397,
"score": 0,
"subscribers_count": 11
},

View file

@ -1842,13 +1842,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field.",
"fork": false,
"created_at": "2020-03-25T18:18:15Z",
"updated_at": "2024-01-19T12:27:08Z",
"updated_at": "2024-02-12T23:33:39Z",
"pushed_at": "2020-03-29T20:32:16Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 17,
"watchers": 16,
"score": 0,
"subscribers_count": 4
}

View file

@ -1290,5 +1290,65 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 756532685,
"name": "CVE-2021-1675-CVE-2021-34527",
"full_name": "whoami-chmod777\/CVE-2021-1675-CVE-2021-34527",
"owner": {
"login": "whoami-chmod777",
"id": 33582093,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33582093?v=4",
"html_url": "https:\/\/github.com\/whoami-chmod777"
},
"html_url": "https:\/\/github.com\/whoami-chmod777\/CVE-2021-1675-CVE-2021-34527",
"description": null,
"fork": false,
"created_at": "2024-02-12T20:54:51Z",
"updated_at": "2024-02-12T20:55:03Z",
"pushed_at": "2024-02-12T20:54:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 756534030,
"name": "CVE-2021-1675---PrintNightmare-LPE-PowerShell-",
"full_name": "whoami-chmod777\/CVE-2021-1675---PrintNightmare-LPE-PowerShell-",
"owner": {
"login": "whoami-chmod777",
"id": 33582093,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33582093?v=4",
"html_url": "https:\/\/github.com\/whoami-chmod777"
},
"html_url": "https:\/\/github.com\/whoami-chmod777\/CVE-2021-1675---PrintNightmare-LPE-PowerShell-",
"description": null,
"fork": false,
"created_at": "2024-02-12T20:59:08Z",
"updated_at": "2024-02-12T20:59:21Z",
"pushed_at": "2024-02-12T20:59:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -2172,6 +2172,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
"fork": false,
"created_at": "2021-10-11T22:08:47Z",
"updated_at": "2024-02-03T00:28:39Z",
"updated_at": "2024-02-12T21:06:14Z",
"pushed_at": "2021-10-13T22:32:36Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 94,
"watchers_count": 94,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 95,
"watchers": 94,
"score": 0,
"subscribers_count": 7
},

View file

@ -493,10 +493,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2024-02-07T02:03:04Z",
"updated_at": "2024-02-12T21:40:36Z",
"pushed_at": "2023-10-11T18:44:51Z",
"stargazers_count": 776,
"watchers_count": 776,
"stargazers_count": 777,
"watchers_count": 777,
"has_discussions": false,
"forks_count": 174,
"allow_forking": true,
@ -512,7 +512,7 @@
],
"visibility": "public",
"forks": 174,
"watchers": 776,
"watchers": 777,
"score": 0,
"subscribers_count": 19
},

View file

@ -907,12 +907,12 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-02-12T16:42:32Z",
"pushed_at": "2023-11-08T21:02:16Z",
"updated_at": "2024-02-12T22:40:44Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1698,
"watchers_count": 1698,
"has_discussions": false,
"forks_count": 502,
"forks_count": 503,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -923,7 +923,7 @@
"security"
],
"visibility": "public",
"forks": 502,
"forks": 503,
"watchers": 1698,
"score": 0,
"subscribers_count": 27

View file

@ -706,7 +706,7 @@
"description": "I'm trying",
"fork": false,
"created_at": "2022-06-12T21:41:38Z",
"updated_at": "2022-06-12T21:41:38Z",
"updated_at": "2024-02-12T20:12:09Z",
"pushed_at": "2022-06-12T21:49:39Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -13,10 +13,10 @@
"description": "Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.",
"fork": false,
"created_at": "2023-07-13T13:17:20Z",
"updated_at": "2024-02-12T16:48:41Z",
"updated_at": "2024-02-12T18:46:44Z",
"pushed_at": "2024-02-11T03:01:51Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 54,
"watchers": 55,
"score": 0,
"subscribers_count": 2
},

View file

@ -886,10 +886,10 @@
"description": "An advanced RCE tool tailored for exploiting a vulnerability in Cacti v1.2.22. Crafted with precision, this utility aids security researchers in analyzing and understanding the depth of the CVE-2022-46169 flaw. Use responsibly and ethically.",
"fork": false,
"created_at": "2023-09-10T17:00:50Z",
"updated_at": "2023-09-10T17:52:45Z",
"updated_at": "2024-02-12T18:30:39Z",
"pushed_at": "2023-09-10T17:14:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -912,7 +912,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},

View file

@ -416,7 +416,7 @@
"description": "A PoC for CVE 2023-20198",
"fork": false,
"created_at": "2023-10-23T16:04:23Z",
"updated_at": "2023-12-22T01:05:39Z",
"updated_at": "2024-02-12T20:11:46Z",
"pushed_at": "2023-10-23T19:10:41Z",
"stargazers_count": 8,
"watchers_count": 8,

View file

@ -283,10 +283,10 @@
"description": "Atlassian Confluence - Remote Code Execution (CVE-2023-22527)",
"fork": false,
"created_at": "2024-01-23T08:53:46Z",
"updated_at": "2024-01-23T10:20:13Z",
"updated_at": "2024-02-12T18:35:12Z",
"pushed_at": "2024-01-23T09:04:15Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -295,7 +295,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -133,7 +133,7 @@
"description": "A modification to fortra's CVE-2023-28252 exploit, compiled to exe",
"fork": false,
"created_at": "2024-01-22T10:38:02Z",
"updated_at": "2024-02-10T08:19:40Z",
"updated_at": "2024-02-12T21:55:31Z",
"pushed_at": "2024-01-24T13:45:56Z",
"stargazers_count": 43,
"watchers_count": 43,

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-32233: Linux内核中的安全漏洞",
"fork": false,
"created_at": "2023-05-16T03:06:40Z",
"updated_at": "2024-02-05T17:52:45Z",
"updated_at": "2024-02-12T21:42:00Z",
"pushed_at": "2023-05-16T04:34:16Z",
"stargazers_count": 353,
"watchers_count": 353,
"stargazers_count": 354,
"watchers_count": 354,
"has_discussions": false,
"forks_count": 79,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 79,
"watchers": 353,
"watchers": 354,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "Original PoC for CVE-2023-32784",
"fork": false,
"created_at": "2023-05-01T17:08:55Z",
"updated_at": "2024-02-10T06:01:09Z",
"updated_at": "2024-02-12T21:28:17Z",
"pushed_at": "2023-08-17T19:26:55Z",
"stargazers_count": 605,
"watchers_count": 605,
"stargazers_count": 606,
"watchers_count": 606,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 53,
"watchers": 605,
"watchers": 606,
"score": 0,
"subscribers_count": 10
},

View file

@ -43,10 +43,10 @@
"description": "Proof of concept script to check if the site is vulnerable to CVE-2023-35078",
"fork": false,
"created_at": "2023-07-29T19:58:33Z",
"updated_at": "2023-08-12T22:49:34Z",
"updated_at": "2024-02-12T18:33:47Z",
"pushed_at": "2023-07-29T22:49:12Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "PoC and Detection for CVE-2024-21626",
"fork": false,
"created_at": "2024-02-01T15:28:37Z",
"updated_at": "2024-02-12T07:30:29Z",
"updated_at": "2024-02-12T19:54:37Z",
"pushed_at": "2024-02-06T16:09:05Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 44,
"watchers": 45,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "File Upload vulnerability in MCMS 5.3.5",
"fork": false,
"created_at": "2024-02-12T06:19:19Z",
"updated_at": "2024-02-12T15:06:52Z",
"updated_at": "2024-02-12T23:20:54Z",
"pushed_at": "2024-02-12T07:04:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -133,10 +133,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-26T21:39:26Z",
"updated_at": "2024-01-26T21:40:59Z",
"updated_at": "2024-02-12T18:38:29Z",
"pushed_at": "2024-01-26T21:46:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -395,7 +395,11 @@
### CVE-2024-24336
- [nitipoom-jar/CVE-2024-24336](https://github.com/nitipoom-jar/CVE-2024-24336)
### CVE-2024-24337
### CVE-2024-24337 (-)
<code>CSV Injection vulnerability in '/members/moremember.pl' and '/admin/aqbudgets.pl' endpoints in Koha Library Management System version 23.05.05 and earlier allows attackers to to inject DDE commands into csv exports via the 'Budget' and 'Patrons Member' components.
</code>
- [nitipoom-jar/CVE-2024-24337](https://github.com/nitipoom-jar/CVE-2024-24337)
### CVE-2024-24396 (-)
@ -14162,6 +14166,8 @@
- [jj4152/cve-2021-1675](https://github.com/jj4152/cve-2021-1675)
- [r1skkam/PrintNightmare](https://github.com/r1skkam/PrintNightmare)
- [peckre/PNCVE-Win10-20H2-Exploit](https://github.com/peckre/PNCVE-Win10-20H2-Exploit)
- [whoami-chmod777/CVE-2021-1675-CVE-2021-34527](https://github.com/whoami-chmod777/CVE-2021-1675-CVE-2021-34527)
- [whoami-chmod777/CVE-2021-1675---PrintNightmare-LPE-PowerShell-](https://github.com/whoami-chmod777/CVE-2021-1675---PrintNightmare-LPE-PowerShell-)
### CVE-2021-1699 (2021-01-12)
@ -32650,6 +32656,13 @@
- [belyakovvitagmailt/4B5F5F4Bp](https://github.com/belyakovvitagmailt/4B5F5F4Bp)
- [MarkusCarelli1/4B5F5F4Bp](https://github.com/MarkusCarelli1/4B5F5F4Bp)
### CVE-2017-0089 (2017-03-16)
<code>Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka &quot;Uniscribe Remote Code Execution Vulnerability.&quot; This vulnerability is different from those described in CVE-2017-0072, CVE-2017-0083, CVE-2017-0084, CVE-2017-0086, CVE-2017-0087, CVE-2017-0088, and CVE-2017-0090.
</code>
- [rainhawk13/Added-Pentest-Ground-to-vulnerable-websites-for-training](https://github.com/rainhawk13/Added-Pentest-Ground-to-vulnerable-websites-for-training)
### CVE-2017-0100 (2017-03-16)
<code>A DCOM object in Helppane.exe in Microsoft Windows 7 SP1; Windows Server 2008 R2; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows local users to gain privileges via a crafted application, aka &quot;Windows HelpPane Elevation of Privilege Vulnerability.&quot;