Auto Update 2024/08/25 00:29:15

This commit is contained in:
motikan2010-bot 2024-08-25 09:29:15 +09:00
parent 0798e7e3c1
commit f0849bd428
23 changed files with 162 additions and 64 deletions

View file

@ -73,10 +73,10 @@
"description": "A collection of tools for the Janus exploit [CVE-2017-13156].",
"fork": false,
"created_at": "2019-08-25T16:31:16Z",
"updated_at": "2023-12-26T11:40:49Z",
"updated_at": "2024-08-24T19:27:12Z",
"pushed_at": "2019-10-22T20:04:08Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -96,7 +96,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -27,7 +27,7 @@
"forks": 66,
"watchers": 401,
"score": 0,
"subscribers_count": 11
"subscribers_count": 10
},
{
"id": 271296526,

View file

@ -43,10 +43,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2024-08-12T20:05:34Z",
"updated_at": "2024-08-24T21:16:08Z",
"pushed_at": "2023-07-20T10:51:42Z",
"stargazers_count": 1714,
"watchers_count": 1714,
"stargazers_count": 1715,
"watchers_count": 1715,
"has_discussions": false,
"forks_count": 357,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 357,
"watchers": 1714,
"watchers": 1715,
"score": 0,
"subscribers_count": 87
},

View file

@ -47,7 +47,7 @@
"forks": 1088,
"watchers": 4091,
"score": 0,
"subscribers_count": 151
"subscribers_count": 149
},
{
"id": 307998445,

View file

@ -138,7 +138,7 @@
"forks": 80,
"watchers": 333,
"score": 0,
"subscribers_count": 5
"subscribers_count": 4
},
{
"id": 264347023,

View file

@ -460,6 +460,6 @@
"forks": 1,
"watchers": 11,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation",
"fork": false,
"created_at": "2021-07-20T22:16:49Z",
"updated_at": "2024-07-16T19:17:16Z",
"updated_at": "2024-08-24T22:50:22Z",
"pushed_at": "2022-01-16T02:09:46Z",
"stargazers_count": 205,
"watchers_count": 205,
"stargazers_count": 206,
"watchers_count": 206,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 205,
"watchers": 206,
"score": 0,
"subscribers_count": 5
},

View file

@ -261,10 +261,10 @@
"description": "PoC for CVE-2021-4034",
"fork": false,
"created_at": "2022-01-26T02:02:25Z",
"updated_at": "2024-08-12T20:20:05Z",
"updated_at": "2024-08-24T23:44:02Z",
"pushed_at": "2022-01-26T02:27:53Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -273,7 +273,7 @@
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 61,
"watchers": 62,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "win32k LPE ",
"fork": false,
"created_at": "2022-01-27T03:44:10Z",
"updated_at": "2024-08-12T20:20:06Z",
"updated_at": "2024-08-24T18:49:47Z",
"pushed_at": "2022-01-27T04:18:18Z",
"stargazers_count": 459,
"watchers_count": 459,
"stargazers_count": 458,
"watchers_count": 458,
"has_discussions": false,
"forks_count": 134,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 134,
"watchers": 459,
"watchers": 458,
"score": 0,
"subscribers_count": 14
},

View file

@ -46,10 +46,10 @@
"description": "Bootloader unlock using CVE-2022-38694 for Anbernic Unisoc T820 devices",
"fork": false,
"created_at": "2024-06-27T14:28:13Z",
"updated_at": "2024-08-15T20:53:49Z",
"updated_at": "2024-08-24T19:18:01Z",
"pushed_at": "2024-07-01T22:13:19Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -58,7 +58,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 1
}

View file

@ -179,6 +179,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 642105586,
"name": "CVE-2023-29489",
"full_name": "0-d3y\/CVE-2023-29489",
"owner": {
"login": "0-d3y",
"id": 103077384,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103077384?v=4",
"html_url": "https:\/\/github.com\/0-d3y"
},
"html_url": "https:\/\/github.com\/0-d3y\/CVE-2023-29489",
"description": "Mass Scaning vulnerability in Cpanel [XSS] ",
"fork": false,
"created_at": "2023-05-17T20:46:59Z",
"updated_at": "2024-08-25T00:11:01Z",
"pushed_at": "2024-08-25T00:10:58Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 9,
"score": 0,
"subscribers_count": 0
},
{
"id": 648330999,
"name": "CVE-2023-29489",

View file

@ -88,5 +88,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 847072591,
"name": "CVE-2023-50564-pluck",
"full_name": "thefizzyfish\/CVE-2023-50564-pluck",
"owner": {
"login": "thefizzyfish",
"id": 94797978,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94797978?v=4",
"html_url": "https:\/\/github.com\/thefizzyfish"
},
"html_url": "https:\/\/github.com\/thefizzyfish\/CVE-2023-50564-pluck",
"description": "CVE-2023-50564 - An arbitrary file upload vulnerability in the component \/inc\/modules_install.php of Pluck-CMS v4.7.18 allows attackers to execute arbitrary code via uploading a crafted ZIP file.",
"fork": false,
"created_at": "2024-08-24T19:09:21Z",
"updated_at": "2024-08-24T19:22:05Z",
"pushed_at": "2024-08-24T19:22:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,7 +13,7 @@
"description": "CVE-2023-6319 proof of concept",
"fork": false,
"created_at": "2024-04-11T18:58:17Z",
"updated_at": "2024-08-13T18:01:09Z",
"updated_at": "2024-08-24T19:00:40Z",
"pushed_at": "2024-08-09T18:16:49Z",
"stargazers_count": 31,
"watchers_count": 31,
@ -22,7 +22,12 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"cve-2023-6319",
"exploit",
"tv",
"webos"
],
"visibility": "public",
"forks": 3,
"watchers": 31,

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-08-24T12:51:34Z",
"updated_at": "2024-08-24T22:52:33Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2221,
"watchers_count": 2221,
"stargazers_count": 2222,
"watchers_count": 2222,
"has_discussions": false,
"forks_count": 290,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 290,
"watchers": 2221,
"watchers": 2222,
"score": 0,
"subscribers_count": 23
},

View file

@ -13,10 +13,10 @@
"description": "0Day CVE-2024-28000 Auto Exploiter on WordPress LiteSpeed Cache plugin",
"fork": false,
"created_at": "2024-08-23T13:28:32Z",
"updated_at": "2024-08-24T11:24:27Z",
"updated_at": "2024-08-24T20:26:32Z",
"pushed_at": "2024-08-24T11:24:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
@ -52,19 +52,19 @@
"description": "LiteSpeed Cache Privilege Escalation PoC",
"fork": false,
"created_at": "2024-08-24T05:12:56Z",
"updated_at": "2024-08-24T10:58:50Z",
"updated_at": "2024-08-24T20:51:59Z",
"pushed_at": "2024-08-24T09:38:01Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 0
}

View file

@ -103,10 +103,10 @@
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
"fork": false,
"created_at": "2024-07-15T08:07:05Z",
"updated_at": "2024-08-24T15:13:19Z",
"updated_at": "2024-08-25T00:06:34Z",
"pushed_at": "2024-08-19T15:29:58Z",
"stargazers_count": 304,
"watchers_count": 304,
"stargazers_count": 305,
"watchers_count": 305,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 304,
"watchers": 305,
"score": 0,
"subscribers_count": 17
},

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2024-3183 (FreeIPA Rosting)",
"fork": false,
"created_at": "2024-08-14T14:24:58Z",
"updated_at": "2024-08-22T19:25:13Z",
"updated_at": "2024-08-24T21:17:38Z",
"pushed_at": "2024-08-20T14:16:04Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 9,
"watchers": 11,
"score": 0,
"subscribers_count": 1
}

View file

@ -241,5 +241,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 847061153,
"name": "CVE-2024-38063",
"full_name": "ynwarcs\/CVE-2024-38063",
"owner": {
"login": "ynwarcs",
"id": 108408574,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108408574?v=4",
"html_url": "https:\/\/github.com\/ynwarcs"
},
"html_url": "https:\/\/github.com\/ynwarcs\/CVE-2024-38063",
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
"updated_at": "2024-08-24T19:15:33Z",
"pushed_at": "2024-08-24T19:13:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,8 +43,8 @@
"description": "Nuclei template to detect Apache servers vulnerable to CVE-2024-38473",
"fork": false,
"created_at": "2024-08-23T14:39:31Z",
"updated_at": "2024-08-23T14:40:14Z",
"pushed_at": "2024-08-23T14:40:11Z",
"updated_at": "2024-08-24T22:42:44Z",
"pushed_at": "2024-08-24T22:42:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -18,7 +18,7 @@
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -32,7 +32,7 @@
"rce-scanner"
],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 29,
"score": 0,
"subscribers_count": 1

View file

@ -260,10 +260,10 @@
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
"fork": false,
"created_at": "2024-07-01T20:33:20Z",
"updated_at": "2024-08-21T20:10:57Z",
"updated_at": "2024-08-24T20:03:21Z",
"pushed_at": "2024-07-14T09:58:48Z",
"stargazers_count": 430,
"watchers_count": 430,
"stargazers_count": 429,
"watchers_count": 429,
"has_discussions": false,
"forks_count": 85,
"allow_forking": true,
@ -278,7 +278,7 @@
],
"visibility": "public",
"forks": 85,
"watchers": 430,
"watchers": 429,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "Will attempt to retrieve DB details for FastAdmin instances",
"fork": false,
"created_at": "2024-08-20T03:09:47Z",
"updated_at": "2024-08-24T17:03:07Z",
"updated_at": "2024-08-24T21:48:51Z",
"pushed_at": "2024-08-20T03:21:56Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 55,
"watchers": 56,
"score": 0,
"subscribers_count": 2
},

View file

@ -3942,6 +3942,7 @@
- [almogopp/Disable-IPv6-CVE-2024-38063-Fix](https://github.com/almogopp/Disable-IPv6-CVE-2024-38063-Fix)
- [Th3Tr1ckst3r/CVE-2024-38063](https://github.com/Th3Tr1ckst3r/CVE-2024-38063)
- [haroonawanofficial/CVE-2024-38063-Research-Tool](https://github.com/haroonawanofficial/CVE-2024-38063-Research-Tool)
- [ynwarcs/CVE-2024-38063](https://github.com/ynwarcs/CVE-2024-38063)
### CVE-2024-38077 (2024-07-09)
@ -7700,6 +7701,7 @@
- [Mostafa-Elguerdawi/CVE-2023-29489.yaml](https://github.com/Mostafa-Elguerdawi/CVE-2023-29489.yaml)
- [Mostafa-Elguerdawi/CVE-2023-29489](https://github.com/Mostafa-Elguerdawi/CVE-2023-29489)
- [whalebone7/EagleEye](https://github.com/whalebone7/EagleEye)
- [0-d3y/CVE-2023-29489](https://github.com/0-d3y/CVE-2023-29489)
- [Abdullah7-ma/CVE-2023-29489](https://github.com/Abdullah7-ma/CVE-2023-29489)
- [tucommenceapousser/CVE-2023-29489](https://github.com/tucommenceapousser/CVE-2023-29489)
- [tucommenceapousser/CVE-2023-29489.py](https://github.com/tucommenceapousser/CVE-2023-29489.py)
@ -12278,6 +12280,7 @@
- [Rai2en/CVE-2023-50564_Pluck-v4.7.18_PoC](https://github.com/Rai2en/CVE-2023-50564_Pluck-v4.7.18_PoC)
- [ipuig/CVE-2023-50564](https://github.com/ipuig/CVE-2023-50564)
- [rwexecute/CVE-2023-50564](https://github.com/rwexecute/CVE-2023-50564)
- [thefizzyfish/CVE-2023-50564-pluck](https://github.com/thefizzyfish/CVE-2023-50564-pluck)
### CVE-2023-50596
- [chandraprarikraj/CVE-2023-50596](https://github.com/chandraprarikraj/CVE-2023-50596)