Auto Update 2024/03/26 00:26:45

This commit is contained in:
motikan2010-bot 2024-03-26 09:26:45 +09:00
parent d36bf8d3d4
commit e8640db1e8
26 changed files with 190 additions and 147 deletions

View file

@ -18,7 +18,7 @@
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": true,
@ -28,7 +28,7 @@
"send"
],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 10

View file

@ -163,10 +163,10 @@
"description": "Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)",
"fork": false,
"created_at": "2020-11-13T16:33:52Z",
"updated_at": "2024-02-29T01:54:38Z",
"updated_at": "2024-03-25T23:28:22Z",
"pushed_at": "2020-12-31T20:34:30Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 44,
"watchers": 45,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
"fork": false,
"created_at": "2018-04-28T11:50:00Z",
"updated_at": "2024-03-11T16:13:03Z",
"updated_at": "2024-03-26T00:01:14Z",
"pushed_at": "2022-12-11T10:44:39Z",
"stargazers_count": 515,
"watchers_count": 515,
"stargazers_count": 514,
"watchers_count": 514,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 55,
"watchers": 515,
"watchers": 514,
"score": 0,
"subscribers_count": 55
},

View file

@ -48,13 +48,13 @@
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 37,
"forks_count": 38,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 37,
"forks": 38,
"watchers": 81,
"score": 0,
"subscribers_count": 5

View file

@ -13,10 +13,10 @@
"description": " double-free bug in WhatsApp exploit poc",
"fork": false,
"created_at": "2019-10-03T09:26:24Z",
"updated_at": "2024-03-19T10:36:36Z",
"updated_at": "2024-03-25T22:37:28Z",
"pushed_at": "2021-03-19T17:23:25Z",
"stargazers_count": 265,
"watchers_count": 265,
"stargazers_count": 266,
"watchers_count": 266,
"has_discussions": false,
"forks_count": 82,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 82,
"watchers": 265,
"watchers": 266,
"score": 0,
"subscribers_count": 16
},

View file

@ -13,10 +13,10 @@
"description": "Programa ideal para robar toda la información de un dispositivo remotamente a través de la aplicación AirDroid. [CVE-2019-9599] (https:\/\/www.exploit-db.com\/exploits\/46337)",
"fork": false,
"created_at": "2019-02-09T02:18:37Z",
"updated_at": "2024-03-21T18:08:08Z",
"updated_at": "2024-03-25T23:58:41Z",
"pushed_at": "2019-11-03T17:29:56Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 44,
"watchers": 45,
"score": 0,
"subscribers_count": 2
}

View file

@ -48,7 +48,7 @@
"stargazers_count": 75,
"watchers_count": 75,
"has_discussions": false,
"forks_count": 17,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -57,7 +57,7 @@
"poc"
],
"visibility": "public",
"forks": 17,
"forks": 16,
"watchers": 75,
"score": 0,
"subscribers_count": 2

View file

@ -5528,7 +5528,7 @@
"stargazers_count": 379,
"watchers_count": 379,
"has_discussions": false,
"forks_count": 55,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -5540,7 +5540,7 @@
"vulnerability-scanners"
],
"visibility": "public",
"forks": 55,
"forks": 53,
"watchers": 379,
"score": 0,
"subscribers_count": 12
@ -12422,7 +12422,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 728564712,
@ -12563,13 +12563,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -133,10 +133,10 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2024-03-25T16:50:18Z",
"updated_at": "2024-03-25T19:08:31Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 1067,
"watchers_count": 1067,
"stargazers_count": 1068,
"watchers_count": 1068,
"has_discussions": false,
"forks_count": 218,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 218,
"watchers": 1067,
"watchers": 1068,
"score": 0,
"subscribers_count": 17
},

View file

@ -153,65 +153,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 776718207,
"name": "spring-security-CVE-2022-22978",
"full_name": "mukeshkumar286\/spring-security-CVE-2022-22978",
"owner": {
"login": "mukeshkumar286",
"id": 17064062,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17064062?v=4",
"html_url": "https:\/\/github.com\/mukeshkumar286"
},
"html_url": "https:\/\/github.com\/mukeshkumar286\/spring-security-CVE-2022-22978",
"description": null,
"fork": false,
"created_at": "2024-03-24T09:42:40Z",
"updated_at": "2024-03-25T15:35:37Z",
"pushed_at": "2024-03-25T15:35:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 777268717,
"name": "spring-security-CVE-2022-22978-Jar",
"full_name": "mukeshkumar286\/spring-security-CVE-2022-22978-Jar",
"owner": {
"login": "mukeshkumar286",
"id": 17064062,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17064062?v=4",
"html_url": "https:\/\/github.com\/mukeshkumar286"
},
"html_url": "https:\/\/github.com\/mukeshkumar286\/spring-security-CVE-2022-22978-Jar",
"description": null,
"fork": false,
"created_at": "2024-03-25T14:30:20Z",
"updated_at": "2024-03-25T14:30:21Z",
"pushed_at": "2024-03-25T15:12:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2022/CVE-2022-32932.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 777471417,
"name": "CVE-2022-32932",
"full_name": "ox1111\/CVE-2022-32932",
"owner": {
"login": "ox1111",
"id": 31942498,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31942498?v=4",
"html_url": "https:\/\/github.com\/ox1111"
},
"html_url": "https:\/\/github.com\/ox1111\/CVE-2022-32932",
"description": null,
"fork": false,
"created_at": "2024-03-25T23:00:41Z",
"updated_at": "2024-03-25T23:00:41Z",
"pushed_at": "2024-03-25T23:26:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager",
"fork": false,
"created_at": "2022-10-13T14:24:12Z",
"updated_at": "2024-03-22T15:39:02Z",
"updated_at": "2024-03-25T19:29:35Z",
"pushed_at": "2022-10-13T15:25:00Z",
"stargazers_count": 326,
"watchers_count": 326,
"stargazers_count": 327,
"watchers_count": 327,
"has_discussions": false,
"forks_count": 100,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 100,
"watchers": 326,
"watchers": 327,
"score": 0,
"subscribers_count": 7
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator",
"fork": false,
"created_at": "2023-02-02T15:34:28Z",
"updated_at": "2024-03-01T08:42:40Z",
"updated_at": "2024-03-25T19:26:03Z",
"pushed_at": "2023-02-02T16:53:37Z",
"stargazers_count": 267,
"watchers_count": 267,
"stargazers_count": 268,
"watchers_count": 268,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 267,
"watchers": 268,
"score": 0,
"subscribers_count": 3
},

View file

@ -73,10 +73,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2022-12-26T00:08:55Z",
"updated_at": "2024-02-17T05:55:35Z",
"updated_at": "2024-03-25T23:57:41Z",
"pushed_at": "2023-10-10T16:53:48Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 118,
"watchers_count": 118,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 117,
"watchers": 118,
"score": 0,
"subscribers_count": 8
},

View file

@ -876,10 +876,10 @@
"description": "Exploit for CVE-2023-23752 (4.0.0 <= Joomla <= 4.2.7).",
"fork": false,
"created_at": "2023-10-25T08:53:12Z",
"updated_at": "2023-10-25T09:39:14Z",
"updated_at": "2024-03-26T00:00:16Z",
"pushed_at": "2023-10-25T09:39:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -888,7 +888,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -47,10 +47,10 @@
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
"fork": false,
"created_at": "2023-05-22T03:06:31Z",
"updated_at": "2024-03-25T17:57:17Z",
"updated_at": "2024-03-25T20:53:11Z",
"pushed_at": "2023-09-10T10:44:32Z",
"stargazers_count": 248,
"watchers_count": 248,
"stargazers_count": 249,
"watchers_count": 249,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -67,7 +67,7 @@
],
"visibility": "public",
"forks": 35,
"watchers": 248,
"watchers": 249,
"score": 0,
"subscribers_count": 4
},

View file

@ -43,10 +43,10 @@
"description": "GameoverlayFS (CVE-2023-2640 and CVE-2023-32629) exploit in Shell Script tested on Ubuntu 20.04 Kernel 5.4.0",
"fork": false,
"created_at": "2023-09-17T23:17:22Z",
"updated_at": "2024-03-25T04:55:13Z",
"updated_at": "2024-03-26T00:05:06Z",
"pushed_at": "2023-09-17T23:38:32Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},

View file

@ -660,5 +660,35 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 777479676,
"name": "CVE-2023-46604",
"full_name": "ph-hitachi\/CVE-2023-46604",
"owner": {
"login": "ph-hitachi",
"id": 91930988,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91930988?v=4",
"html_url": "https:\/\/github.com\/ph-hitachi"
},
"html_url": "https:\/\/github.com\/ph-hitachi\/CVE-2023-46604",
"description": null,
"fork": false,
"created_at": "2024-03-25T23:32:26Z",
"updated_at": "2024-03-25T23:32:26Z",
"pushed_at": "2024-03-25T23:37:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-12-14T09:32:41Z",
"updated_at": "2024-03-24T15:23:36Z",
"updated_at": "2024-03-25T22:35:53Z",
"pushed_at": "2023-12-15T06:29:09Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 51,
"watchers": 52,
"score": 0,
"subscribers_count": 2
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 38,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 38,
"forks": 39,
"watchers": 44,
"score": 0,
"subscribers_count": 1

View file

@ -13,19 +13,19 @@
"description": "A PoC to trigger CVE-2023-5217 from the Browser WebCodecs or MediaRecorder interface.",
"fork": false,
"created_at": "2023-10-06T05:46:16Z",
"updated_at": "2024-02-01T11:40:34Z",
"updated_at": "2024-03-25T21:25:25Z",
"pushed_at": "2023-10-11T04:30:03Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 10,
"forks": 4,
"watchers": 11,
"score": 0,
"subscribers_count": 3
},

View file

@ -103,10 +103,10 @@
"description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ",
"fork": false,
"created_at": "2024-03-13T09:17:28Z",
"updated_at": "2024-03-25T14:41:19Z",
"updated_at": "2024-03-25T20:28:50Z",
"pushed_at": "2024-03-16T00:35:12Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 69,
"watchers": 70,
"score": 0,
"subscribers_count": 3
},

View file

@ -1,6 +1,6 @@
[
{
"id": 745887176,
"id": 777430748,
"name": "CVE-2024-24409",
"full_name": "passtheticket\/CVE-2024-24409",
"owner": {
@ -12,11 +12,11 @@
"html_url": "https:\/\/github.com\/passtheticket\/CVE-2024-24409",
"description": "ADManager Plus Build < 7210 Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2024-01-20T12:58:47Z",
"updated_at": "2024-03-25T15:38:51Z",
"pushed_at": "2024-01-20T14:36:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"created_at": "2024-03-25T20:51:56Z",
"updated_at": "2024-03-25T21:21:22Z",
"pushed_at": "2024-03-25T21:20:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,8 +25,8 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)",
"fork": false,
"created_at": "2024-03-11T10:14:39Z",
"updated_at": "2024-03-25T12:56:33Z",
"updated_at": "2024-03-25T22:33:16Z",
"pushed_at": "2024-03-25T12:56:16Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 15,
"forks": 6,
"watchers": 17,
"score": 0,
"subscribers_count": 0
}

32
2024/CVE-2024-29272.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 777466221,
"name": "CVE-2024-29272",
"full_name": "awjkjflkwlekfdjs\/CVE-2024-29272",
"owner": {
"login": "awjkjflkwlekfdjs",
"id": 164954340,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164954340?v=4",
"html_url": "https:\/\/github.com\/awjkjflkwlekfdjs"
},
"html_url": "https:\/\/github.com\/awjkjflkwlekfdjs\/CVE-2024-29272",
"description": null,
"fork": false,
"created_at": "2024-03-25T22:43:42Z",
"updated_at": "2024-03-25T22:44:59Z",
"pushed_at": "2024-03-25T22:44:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -892,6 +892,9 @@
### CVE-2024-29197
- [mansploit/CVE-2024-29197-exploit](https://github.com/mansploit/CVE-2024-29197-exploit)
### CVE-2024-29272
- [awjkjflkwlekfdjs/CVE-2024-29272](https://github.com/awjkjflkwlekfdjs/CVE-2024-29272)
### CVE-2024-65230
- [CBaekhyunC/cve-2024-65230](https://github.com/CBaekhyunC/cve-2024-65230)
@ -7155,6 +7158,7 @@
- [hh-hunter/cve-2023-46604](https://github.com/hh-hunter/cve-2023-46604)
- [ST3G4N05/ExploitScript-CVE-2023-46604](https://github.com/ST3G4N05/ExploitScript-CVE-2023-46604)
- [Arlenhiack/ActiveMQ-RCE-Exploit](https://github.com/Arlenhiack/ActiveMQ-RCE-Exploit)
- [ph-hitachi/CVE-2023-46604](https://github.com/ph-hitachi/CVE-2023-46604)
### CVE-2023-46615 (2024-02-12)
@ -10037,8 +10041,6 @@
- [aeifkz/CVE-2022-22978](https://github.com/aeifkz/CVE-2022-22978)
- [umakant76705/CVE-2022-22978](https://github.com/umakant76705/CVE-2022-22978)
- [Raghvendra1207/CVE-2022-22978](https://github.com/Raghvendra1207/CVE-2022-22978)
- [mukeshkumar286/spring-security-CVE-2022-22978](https://github.com/mukeshkumar286/spring-security-CVE-2022-22978)
- [mukeshkumar286/spring-security-CVE-2022-22978-Jar](https://github.com/mukeshkumar286/spring-security-CVE-2022-22978-Jar)
### CVE-2022-22980 (2022-06-22)
@ -12378,6 +12380,13 @@
- [ox1111/CVE-2022-32898](https://github.com/ox1111/CVE-2022-32898)
### CVE-2022-32932 (2022-11-01)
<code>The issue was addressed with improved memory handling. This issue is fixed in iOS 15.7.1 and iPadOS 15.7.1, iOS 16.1 and iPadOS 16, watchOS 9.1. An app may be able to execute arbitrary code with kernel privileges.
</code>
- [ox1111/CVE-2022-32932](https://github.com/ox1111/CVE-2022-32932)
### CVE-2022-32947 (2022-11-01)
<code>The issue was addressed with improved memory handling. This issue is fixed in iOS 16.1 and iPadOS 16, macOS Ventura 13, watchOS 9.1. An app may be able to execute arbitrary code with kernel privileges.