Auto Update 2024/08/21 00:29:29

This commit is contained in:
motikan2010-bot 2024-08-21 09:29:29 +09:00
parent b4ce8e3c4b
commit de08c7b803
27 changed files with 191 additions and 117 deletions

View file

@ -13,10 +13,10 @@
"description": "MailMasta wordpress plugin Local File Inclusion vulnerability (CVE-2016-10956)",
"fork": false,
"created_at": "2021-12-10T16:06:46Z",
"updated_at": "2024-08-12T20:18:44Z",
"updated_at": "2024-08-20T19:52:46Z",
"pushed_at": "2022-05-03T10:37:18Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2017-7529- Check and EXPLOIT",
"fork": false,
"created_at": "2023-11-09T17:13:30Z",
"updated_at": "2024-05-01T17:53:28Z",
"updated_at": "2024-08-20T23:55:34Z",
"pushed_at": "2024-05-01T17:53:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}

View file

@ -1326,13 +1326,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 373,
"forks_count": 370,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 373,
"forks": 370,
"watchers": 3,
"score": 0,
"subscribers_count": 0

View file

@ -1422,6 +1422,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,7 +27,7 @@
"forks": 7,
"watchers": 19,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
},
{
"id": 539045907,

View file

@ -5463,10 +5463,10 @@
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
"fork": false,
"created_at": "2021-12-14T06:37:59Z",
"updated_at": "2024-08-12T20:18:52Z",
"updated_at": "2024-08-20T19:59:23Z",
"pushed_at": "2024-04-24T05:35:26Z",
"stargazers_count": 380,
"watchers_count": 380,
"stargazers_count": 381,
"watchers_count": 381,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
@ -5481,7 +5481,7 @@
],
"visibility": "public",
"forks": 53,
"watchers": 380,
"watchers": 381,
"score": 0,
"subscribers_count": 12
},

View file

@ -343,10 +343,10 @@
"description": "Atlassian Confluence - Remote Code Execution",
"fork": false,
"created_at": "2024-01-23T10:55:28Z",
"updated_at": "2024-08-18T20:59:47Z",
"updated_at": "2024-08-20T21:27:37Z",
"pushed_at": "2024-01-23T11:30:10Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -355,7 +355,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 2
},

32
2023/CVE-2023-29929.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 627966808,
"name": "CVE-2023-29929",
"full_name": "YSaxon\/CVE-2023-29929",
"owner": {
"login": "YSaxon",
"id": 11711101,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11711101?v=4",
"html_url": "https:\/\/github.com\/YSaxon"
},
"html_url": "https:\/\/github.com\/YSaxon\/CVE-2023-29929",
"description": null,
"fork": false,
"created_at": "2023-04-14T15:41:12Z",
"updated_at": "2024-08-20T20:59:12Z",
"pushed_at": "2024-08-20T20:59:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -287,10 +287,10 @@
"description": "Looney Tunables Local privilege escalation (CVE-2023-4911) workshop",
"fork": false,
"created_at": "2023-10-25T11:59:34Z",
"updated_at": "2024-06-23T16:46:36Z",
"updated_at": "2024-08-20T21:09:10Z",
"pushed_at": "2023-10-25T12:37:38Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -299,7 +299,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -199,8 +199,8 @@
"description": null,
"fork": false,
"created_at": "2024-08-15T01:16:38Z",
"updated_at": "2024-08-16T04:08:06Z",
"pushed_at": "2024-08-16T04:08:02Z",
"updated_at": "2024-08-20T19:49:17Z",
"pushed_at": "2024-08-20T19:49:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
"fork": false,
"created_at": "2024-04-13T05:53:02Z",
"updated_at": "2024-08-19T14:12:16Z",
"updated_at": "2024-08-20T21:13:09Z",
"pushed_at": "2024-04-16T21:00:14Z",
"stargazers_count": 263,
"watchers_count": 263,
"stargazers_count": 264,
"watchers_count": 264,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 263,
"watchers": 264,
"score": 0,
"subscribers_count": 3
},

View file

@ -198,34 +198,34 @@
"subscribers_count": 1
},
{
"id": 796124892,
"id": 801882404,
"name": "CVE-2024-25600-mass",
"full_name": "RHYru9\/CVE-2024-25600-mass",
"full_name": "svchostmm\/CVE-2024-25600-mass",
"owner": {
"login": "RHYru9",
"id": 164749781,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164749781?v=4",
"html_url": "https:\/\/github.com\/RHYru9"
"login": "svchostmm",
"id": 169925884,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169925884?v=4",
"html_url": "https:\/\/github.com\/svchostmm"
},
"html_url": "https:\/\/github.com\/RHYru9\/CVE-2024-25600-mass",
"html_url": "https:\/\/github.com\/svchostmm\/CVE-2024-25600-mass",
"description": null,
"fork": false,
"created_at": "2024-05-05T02:18:00Z",
"updated_at": "2024-08-03T14:24:47Z",
"pushed_at": "2024-06-12T08:31:18Z",
"stargazers_count": 4,
"watchers_count": 4,
"created_at": "2024-05-17T05:23:51Z",
"updated_at": "2024-05-17T05:23:51Z",
"pushed_at": "2024-05-05T02:22:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
},
{
"id": 809314858,

View file

@ -73,19 +73,19 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2024-08-18T16:15:58Z",
"updated_at": "2024-08-20T19:54:54Z",
"pushed_at": "2024-07-29T12:20:50Z",
"stargazers_count": 350,
"watchers_count": 350,
"stargazers_count": 351,
"watchers_count": 351,
"has_discussions": false,
"forks_count": 46,
"forks_count": 47,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 350,
"forks": 47,
"watchers": 351,
"score": 0,
"subscribers_count": 7
},

View file

@ -133,10 +133,10 @@
"description": "Questa repository contiene una replica (tentativo di replica) scritto in Python per CVE-2024-30088.",
"fork": false,
"created_at": "2024-07-27T10:41:33Z",
"updated_at": "2024-07-27T16:30:39Z",
"updated_at": "2024-08-20T19:17:32Z",
"pushed_at": "2024-07-27T16:30:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -73,10 +73,10 @@
"description": "Exploit PoC for CVE-2024-32002",
"fork": false,
"created_at": "2024-05-17T19:33:08Z",
"updated_at": "2024-08-15T14:27:57Z",
"updated_at": "2024-08-21T00:02:47Z",
"pushed_at": "2024-05-19T07:12:00Z",
"stargazers_count": 483,
"watchers_count": 483,
"stargazers_count": 484,
"watchers_count": 484,
"has_discussions": false,
"forks_count": 140,
"allow_forking": true,
@ -90,7 +90,7 @@
],
"visibility": "public",
"forks": 140,
"watchers": 483,
"watchers": 484,
"score": 0,
"subscribers_count": 3
},

32
2024/CVE-2024-33644.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 845237835,
"name": "ReproducingCVEs_Akshath_Nagulapally",
"full_name": "Akshath-Nagulapally\/ReproducingCVEs_Akshath_Nagulapally",
"owner": {
"login": "Akshath-Nagulapally",
"id": 140837101,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140837101?v=4",
"html_url": "https:\/\/github.com\/Akshath-Nagulapally"
},
"html_url": "https:\/\/github.com\/Akshath-Nagulapally\/ReproducingCVEs_Akshath_Nagulapally",
"description": "Reproducing the following CVEs with dockerfile:CVE-2024-33644 CVE-2024-34370 CVE-2024-22120",
"fork": false,
"created_at": "2024-08-20T21:27:49Z",
"updated_at": "2024-08-20T21:27:53Z",
"pushed_at": "2024-08-20T21:27:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-34102: Unauthenticated Magento XXE",
"fork": false,
"created_at": "2024-06-27T18:10:13Z",
"updated_at": "2024-08-14T15:10:50Z",
"updated_at": "2024-08-20T21:27:09Z",
"pushed_at": "2024-08-14T15:10:47Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},

View file

@ -133,10 +133,10 @@
"description": "CVE-2024-34470 : An Unauthenticated Path Traversal Vulnerability in HSC Mailinspector",
"fork": false,
"created_at": "2024-06-23T02:23:57Z",
"updated_at": "2024-07-02T11:42:41Z",
"updated_at": "2024-08-20T21:27:14Z",
"pushed_at": "2024-07-02T11:42:37Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Exploit POC for CVE-2024-36877",
"fork": false,
"created_at": "2024-08-09T15:33:04Z",
"updated_at": "2024-08-20T14:38:33Z",
"updated_at": "2024-08-20T19:06:12Z",
"pushed_at": "2024-08-14T15:26:18Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 29,
"watchers": 30,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "mitigation script by disabling ipv6 of all interfaces",
"fork": false,
"created_at": "2024-08-15T12:41:01Z",
"updated_at": "2024-08-17T18:27:05Z",
"updated_at": "2024-08-20T22:58:52Z",
"pushed_at": "2024-08-15T13:53:45Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},
@ -73,19 +73,19 @@
"description": "Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.",
"fork": false,
"created_at": "2024-08-17T14:58:36Z",
"updated_at": "2024-08-20T18:21:06Z",
"updated_at": "2024-08-21T00:26:49Z",
"pushed_at": "2024-08-17T15:12:43Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 10,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 26,
"forks": 12,
"watchers": 30,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-08-20T12:41:57Z",
"updated_at": "2024-08-20T15:36:48Z",
"updated_at": "2024-08-21T00:23:24Z",
"pushed_at": "2024-08-20T15:36:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-08-18T11:30:50Z",
"updated_at": "2024-08-19T13:00:48Z",
"updated_at": "2024-08-21T00:23:27Z",
"pushed_at": "2024-08-18T12:27:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -163,19 +163,19 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-08-17T09:33:00Z",
"updated_at": "2024-08-20T20:57:16Z",
"pushed_at": "2024-06-22T15:13:52Z",
"stargazers_count": 189,
"watchers_count": 189,
"stargazers_count": 190,
"watchers_count": 190,
"has_discussions": false,
"forks_count": 42,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 189,
"forks": 43,
"watchers": 190,
"score": 0,
"subscribers_count": 4
},

View file

@ -697,13 +697,13 @@
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 15,
"score": 0,
"subscribers_count": 1
@ -1343,10 +1343,10 @@
"description": "CVE-2024-6387 : Vulnerability Detection tool for regreSSHion Remote Unauthenticated Code Execution in OpenSSH Server",
"fork": false,
"created_at": "2024-07-02T17:04:52Z",
"updated_at": "2024-07-10T13:48:18Z",
"updated_at": "2024-08-20T21:26:57Z",
"pushed_at": "2024-07-02T17:47:29Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -1355,7 +1355,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
@ -1662,10 +1662,10 @@
"description": "SSH Exploit for CVE-2024-6387 : RCE in OpenSSH's server, on glibc-based Linux systems",
"fork": false,
"created_at": "2024-07-03T08:22:57Z",
"updated_at": "2024-07-31T06:59:40Z",
"updated_at": "2024-08-20T21:05:45Z",
"pushed_at": "2024-07-04T15:07:21Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -1681,7 +1681,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
@ -2778,13 +2778,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "An Vulnerability detection and Exploitation tool for CVE-2024-7339",
"fork": false,
"created_at": "2024-08-05T16:26:18Z",
"updated_at": "2024-08-20T07:40:29Z",
"updated_at": "2024-08-20T21:25:50Z",
"pushed_at": "2024-08-10T17:38:53Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Will attempt to retrieve DB details for FastAdmin instances",
"fork": false,
"created_at": "2024-08-20T03:09:47Z",
"updated_at": "2024-08-20T14:22:25Z",
"updated_at": "2024-08-20T22:14:16Z",
"pushed_at": "2024-08-20T03:21:56Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 10,
"score": 0,
"subscribers_count": 0
}

View file

@ -2323,7 +2323,7 @@
- [hy011121/CVE-2024-25600-wordpress-Exploit-RCE](https://github.com/hy011121/CVE-2024-25600-wordpress-Exploit-RCE)
- [K3ysTr0K3R/CVE-2024-25600-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2024-25600-EXPLOIT)
- [X-Projetion/WORDPRESS-CVE-2024-25600-EXPLOIT-RCE](https://github.com/X-Projetion/WORDPRESS-CVE-2024-25600-EXPLOIT-RCE)
- [RHYru9/CVE-2024-25600-mass](https://github.com/RHYru9/CVE-2024-25600-mass)
- [svchostmm/CVE-2024-25600-mass](https://github.com/svchostmm/CVE-2024-25600-mass)
- [ivanbg2004/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress](https://github.com/ivanbg2004/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress)
- [k3lpi3b4nsh33/CVE-2024-25600](https://github.com/k3lpi3b4nsh33/CVE-2024-25600)
- [WanLiChangChengWanLiChang/CVE-2024-25600](https://github.com/WanLiChangChengWanLiChang/CVE-2024-25600)
@ -3314,6 +3314,13 @@
- [absholi7ly/WordPress-XStore-theme-SQL-Injection](https://github.com/absholi7ly/WordPress-XStore-theme-SQL-Injection)
### CVE-2024-33644 (2024-05-17)
<code>Improper Control of Generation of Code ('Code Injection') vulnerability in WPCustomify Customify Site Library allows Code Injection.This issue affects Customify Site Library: from n/a through 0.0.9.
</code>
- [Akshath-Nagulapally/ReproducingCVEs_Akshath_Nagulapally](https://github.com/Akshath-Nagulapally/ReproducingCVEs_Akshath_Nagulapally)
### CVE-2024-33722
- [fuzzlove/soplanning-1.52-exploits](https://github.com/fuzzlove/soplanning-1.52-exploits)
@ -7634,6 +7641,9 @@
- [3yujw7njai/CVE-2023-29923-Scan](https://github.com/3yujw7njai/CVE-2023-29923-Scan)
- [Le1a/CVE-2023-29923](https://github.com/Le1a/CVE-2023-29923)
### CVE-2023-29929
- [YSaxon/CVE-2023-29929](https://github.com/YSaxon/CVE-2023-29929)
### CVE-2023-29930 (2023-05-10)
<code>An issue was found in Genesys CIC Polycom phone provisioning TFTP Server all version allows a remote attacker to execute arbitrary code via the login crednetials to the TFTP server configuration page.