Auto Update 2024/08/08 00:29:17

This commit is contained in:
motikan2010-bot 2024-08-08 09:29:18 +09:00
parent 0848103795
commit d3a2417d81
30 changed files with 236 additions and 84 deletions

View file

@ -27,7 +27,7 @@
"forks": 20,
"watchers": 58,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
},
{
"id": 238993261,

View file

@ -27,7 +27,7 @@
"forks": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 37
"subscribers_count": 36
},
{
"id": 320642790,

View file

@ -13,10 +13,10 @@
"description": "Github repository which contains a functional exploit for CVE-2021-39165",
"fork": false,
"created_at": "2022-03-15T18:14:46Z",
"updated_at": "2023-09-28T11:37:04Z",
"updated_at": "2024-08-07T22:13:16Z",
"pushed_at": "2022-07-13T09:39:13Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 23,
"watchers": 22,
"score": 0,
"subscribers_count": 2
},

View file

@ -223,10 +223,10 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2024-08-07T17:10:05Z",
"updated_at": "2024-08-07T20:23:36Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1566,
"watchers_count": 1566,
"stargazers_count": 1567,
"watchers_count": 1567,
"has_discussions": false,
"forks_count": 481,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 481,
"watchers": 1566,
"watchers": 1567,
"score": 0,
"subscribers_count": 28
},

View file

@ -48,13 +48,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
"fork": false,
"created_at": "2022-09-12T19:22:44Z",
"updated_at": "2024-08-06T20:02:08Z",
"updated_at": "2024-08-07T21:16:16Z",
"pushed_at": "2022-09-19T19:41:34Z",
"stargazers_count": 281,
"watchers_count": 281,
"stargazers_count": 282,
"watchers_count": 282,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 281,
"watchers": 282,
"score": 0,
"subscribers_count": 6
},

View file

@ -621,13 +621,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1

View file

@ -407,10 +407,10 @@
"description": "Joomla! < 4.2.8 - Unauthenticated information disclosure",
"fork": false,
"created_at": "2023-03-24T11:50:16Z",
"updated_at": "2024-07-10T16:38:06Z",
"updated_at": "2024-08-07T22:34:01Z",
"pushed_at": "2023-12-27T11:30:46Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -426,7 +426,7 @@
],
"visibility": "public",
"forks": 17,
"watchers": 76,
"watchers": 77,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "pocs & exploit for CVE-2023-24871 (rce + lpe)",
"fork": false,
"created_at": "2024-06-21T15:01:15Z",
"updated_at": "2024-07-29T16:04:10Z",
"updated_at": "2024-08-07T20:47:41Z",
"pushed_at": "2024-07-17T12:34:16Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 41,
"watchers": 42,
"score": 0,
"subscribers_count": 2
}

View file

@ -74,7 +74,7 @@
"fork": false,
"created_at": "2024-04-17T13:36:34Z",
"updated_at": "2024-07-26T13:32:23Z",
"pushed_at": "2024-07-30T22:10:56Z",
"pushed_at": "2024-08-07T22:55:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -43,10 +43,10 @@
"description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing",
"fork": false,
"created_at": "2023-06-16T20:15:36Z",
"updated_at": "2024-07-11T06:01:41Z",
"updated_at": "2024-08-07T19:18:29Z",
"pushed_at": "2024-05-08T16:17:07Z",
"stargazers_count": 124,
"watchers_count": 124,
"stargazers_count": 125,
"watchers_count": 125,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 124,
"watchers": 125,
"score": 0,
"subscribers_count": 3
},

32
2023/CVE-2023-31355.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 729134774,
"name": "cve-2023-31355-poc",
"full_name": "Freax13\/cve-2023-31355-poc",
"owner": {
"login": "Freax13",
"id": 14952658,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14952658?v=4",
"html_url": "https:\/\/github.com\/Freax13"
},
"html_url": "https:\/\/github.com\/Freax13\/cve-2023-31355-poc",
"description": null,
"fork": false,
"created_at": "2023-12-08T13:51:37Z",
"updated_at": "2024-08-07T19:22:56Z",
"pushed_at": "2023-12-09T13:35:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -297,10 +297,10 @@
"html_url": "https:\/\/github.com\/aditibv"
},
"html_url": "https:\/\/github.com\/aditibv\/MOVEit-CVE-2023-34362",
"description": null,
"description": "This repository investigates the exploitation of CVE-2023-34362 in the MOVEit file transfer server by the TA505 (Cl0p) ransomware group. It explores the group's tactics and past campaigns targeting file transfer applications, aiming to enhance understanding and defensive measures against such threats. ",
"fork": false,
"created_at": "2024-07-04T21:13:48Z",
"updated_at": "2024-07-04T21:47:27Z",
"updated_at": "2024-08-07T20:25:25Z",
"pushed_at": "2024-07-04T21:17:13Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-09-16T09:11:21Z",
"updated_at": "2024-07-27T09:07:06Z",
"pushed_at": "2024-07-30T18:42:09Z",
"pushed_at": "2024-08-07T19:07:56Z",
"stargazers_count": 59,
"watchers_count": 59,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220",
"fork": false,
"created_at": "2024-07-07T15:08:30Z",
"updated_at": "2024-08-04T09:56:43Z",
"updated_at": "2024-08-07T21:43:49Z",
"pushed_at": "2024-07-27T00:19:17Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
@ -129,8 +129,8 @@
"description": "CVE-2023-4220 POC RCE",
"fork": false,
"created_at": "2024-07-08T07:31:35Z",
"updated_at": "2024-07-31T00:01:03Z",
"pushed_at": "2024-07-29T05:46:07Z",
"updated_at": "2024-08-07T23:36:24Z",
"pushed_at": "2024-08-07T23:36:20Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "A vulnerable driver exploited by me (BYOVD) that is capable of terminating several EDRs and antivirus software in the market, rendering them ineffective, working for both x32 and x64(CVE-2023-44976).",
"fork": false,
"created_at": "2023-10-01T18:24:38Z",
"updated_at": "2024-08-06T06:51:47Z",
"updated_at": "2024-08-07T21:38:28Z",
"pushed_at": "2024-07-06T23:35:51Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 55,
"watchers": 54,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. ",
"fork": false,
"created_at": "2023-10-24T17:19:32Z",
"updated_at": "2024-08-03T01:36:40Z",
"updated_at": "2024-08-07T23:24:41Z",
"pushed_at": "2023-10-26T14:16:05Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -41,7 +41,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 68,
"watchers": 69,
"score": 0,
"subscribers_count": 2
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 121,
"watchers_count": 121,
"has_discussions": false,
"forks_count": 23,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 23,
"forks": 24,
"watchers": 121,
"score": 0,
"subscribers_count": 2

View file

@ -43,10 +43,10 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2024-08-05T22:03:55Z",
"updated_at": "2024-08-07T19:15:21Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 656,
"watchers_count": 656,
"stargazers_count": 657,
"watchers_count": 657,
"has_discussions": false,
"forks_count": 146,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 146,
"watchers": 656,
"watchers": 657,
"score": 0,
"subscribers_count": 10
},

View file

@ -48,7 +48,7 @@
"stargazers_count": 122,
"watchers_count": 122,
"has_discussions": false,
"forks_count": 30,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -58,7 +58,7 @@
"redteam"
],
"visibility": "public",
"forks": 30,
"forks": 31,
"watchers": 122,
"score": 0,
"subscribers_count": 1

32
2024/CVE-2024-21978.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 740045599,
"name": "cve-2024-21978-poc",
"full_name": "Freax13\/cve-2024-21978-poc",
"owner": {
"login": "Freax13",
"id": 14952658,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14952658?v=4",
"html_url": "https:\/\/github.com\/Freax13"
},
"html_url": "https:\/\/github.com\/Freax13\/cve-2024-21978-poc",
"description": null,
"fork": false,
"created_at": "2024-01-07T11:07:01Z",
"updated_at": "2024-08-07T19:23:44Z",
"pushed_at": "2024-01-07T15:29:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-21980.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 741649413,
"name": "cve-2024-21980-poc",
"full_name": "Freax13\/cve-2024-21980-poc",
"owner": {
"login": "Freax13",
"id": 14952658,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14952658?v=4",
"html_url": "https:\/\/github.com\/Freax13"
},
"html_url": "https:\/\/github.com\/Freax13\/cve-2024-21980-poc",
"description": null,
"fork": false,
"created_at": "2024-01-10T20:35:38Z",
"updated_at": "2024-08-07T19:24:26Z",
"pushed_at": "2024-01-10T20:43:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
"fork": false,
"created_at": "2024-06-10T17:02:03Z",
"updated_at": "2024-08-06T00:48:12Z",
"updated_at": "2024-08-07T18:37:31Z",
"pushed_at": "2024-07-04T10:39:15Z",
"stargazers_count": 289,
"watchers_count": 289,
"stargazers_count": 290,
"watchers_count": 290,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 57,
"watchers": 289,
"watchers": 290,
"score": 0,
"subscribers_count": 4
},
@ -133,10 +133,10 @@
"description": "A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a privileged user",
"fork": false,
"created_at": "2024-08-04T17:40:51Z",
"updated_at": "2024-08-06T22:05:08Z",
"updated_at": "2024-08-07T23:05:04Z",
"pushed_at": "2024-08-06T22:05:05Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 12,
"watchers": 15,
"score": 0,
"subscribers_count": 1
}

View file

@ -83,10 +83,10 @@
"description": "CVE-2024-32113 Apache OFBIZ Batch Scanning",
"fork": false,
"created_at": "2024-08-07T07:12:56Z",
"updated_at": "2024-08-07T07:18:23Z",
"updated_at": "2024-08-07T22:31:36Z",
"pushed_at": "2024-08-07T07:16:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -95,7 +95,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 0
}

View file

@ -230,10 +230,10 @@
"description": "GeoServer Remote Code Execution",
"fork": false,
"created_at": "2024-07-30T18:43:40Z",
"updated_at": "2024-08-05T19:27:24Z",
"updated_at": "2024-08-07T21:07:02Z",
"pushed_at": "2024-08-02T14:57:26Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -242,7 +242,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 55,
"watchers": 56,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-37085 VMware ESXi RCE Vulnerability",
"fork": false,
"created_at": "2024-08-06T18:23:43Z",
"updated_at": "2024-08-06T18:29:31Z",
"updated_at": "2024-08-07T22:58:24Z",
"pushed_at": "2024-08-06T18:25:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

32
2024/CVE-2024-41570.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 828329292,
"name": "Havoc-C2-SSRF-poc",
"full_name": "chebuya\/Havoc-C2-SSRF-poc",
"owner": {
"login": "chebuya",
"id": 146861503,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146861503?v=4",
"html_url": "https:\/\/github.com\/chebuya"
},
"html_url": "https:\/\/github.com\/chebuya\/Havoc-C2-SSRF-poc",
"description": "CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit",
"fork": false,
"created_at": "2024-07-13T19:54:27Z",
"updated_at": "2024-08-07T20:22:27Z",
"pushed_at": "2024-08-07T20:22:25Z",
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 30,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -260,10 +260,10 @@
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
"fork": false,
"created_at": "2024-07-01T20:33:20Z",
"updated_at": "2024-08-07T10:46:14Z",
"updated_at": "2024-08-07T23:57:00Z",
"pushed_at": "2024-07-14T09:58:48Z",
"stargazers_count": 428,
"watchers_count": 428,
"stargazers_count": 429,
"watchers_count": 429,
"has_discussions": false,
"forks_count": 85,
"allow_forking": true,
@ -278,7 +278,7 @@
],
"visibility": "public",
"forks": 85,
"watchers": 428,
"watchers": 429,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": "Calibre 远程代码执行CVE-2024-6782Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution.",
"fork": false,
"created_at": "2024-08-06T15:31:48Z",
"updated_at": "2024-08-07T13:32:43Z",
"updated_at": "2024-08-07T23:52:59Z",
"pushed_at": "2024-08-06T15:35:37Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -1442,6 +1442,20 @@
- [h4x0r-dz/CVE-2024-21893.py](https://github.com/h4x0r-dz/CVE-2024-21893.py)
- [Chocapikk/CVE-2024-21893-to-CVE-2024-21887](https://github.com/Chocapikk/CVE-2024-21893-to-CVE-2024-21887)
### CVE-2024-21978 (2024-08-05)
<code>Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption.
</code>
- [Freax13/cve-2024-21978-poc](https://github.com/Freax13/cve-2024-21978-poc)
### CVE-2024-21980 (2024-08-05)
<code>Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest's memory or UMC seed resulting in loss of confidentiality and integrity.
</code>
- [Freax13/cve-2024-21980-poc](https://github.com/Freax13/cve-2024-21980-poc)
### CVE-2024-22002 (2024-06-18)
<code>CORSAIR iCUE 5.9.105 with iCUE Murals on Windows allows unprivileged users to insert DLL files in the cuepkg-1.2.6 subdirectory of the installation directory.
@ -3946,6 +3960,9 @@
### CVE-2024-41302
- [patrickdeanramos/CVE-2024-41302-Bookea-tu-Mesa-is-vulnerable-to-SQL-Injection](https://github.com/patrickdeanramos/CVE-2024-41302-Bookea-tu-Mesa-is-vulnerable-to-SQL-Injection)
### CVE-2024-41570
- [chebuya/Havoc-C2-SSRF-poc](https://github.com/chebuya/Havoc-C2-SSRF-poc)
### CVE-2024-41628 (2024-07-26)
<code>Directory Traversal vulnerability in Severalnines Cluster Control 1.9.8 before 1.9.8-9778, 2.0.0 before 2.0.0-9779, and 2.1.0 before 2.1.0-9780 allows a remote attacker to include and display file content in an HTTP request via the CMON API.
@ -7564,6 +7581,13 @@
- [Freax13/cve-2023-31346-poc](https://github.com/Freax13/cve-2023-31346-poc)
### CVE-2023-31355 (2024-08-05)
<code>Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest's UMC seed potentially allowing reading of memory from a decommissioned guest.
</code>
- [Freax13/cve-2023-31355-poc](https://github.com/Freax13/cve-2023-31355-poc)
### CVE-2023-31419 (2023-10-26)
<code>A flaw was discovered in Elasticsearch, affecting the _search API that allowed a specially crafted query string to cause a Stack Overflow and ultimately a Denial of Service.\n\n\n\n\n